• Title/Summary/Keyword: receivers

Search Result 1,188, Processing Time 0.03 seconds

Evaluation of Near Subsurface 2D Vs Distribution Map using SPT-Uphole Tomography Method (SPT-업홀 토모그래피 기법을 이용한 지반의 2차원 전단파 속도 분포의 도출)

  • Bang, Eun-Seok;Kim, Jong-Tae;Kim, Dong-Soo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.3C
    • /
    • pp.143-155
    • /
    • 2006
  • SPT-Uphole tomography method was introduced for the evaluation of near subsurface shear wave velocity (Vs) distribution map. In SPT-Uphole method, SPT (Standard Penetration Test) which is common in geotechnical site investigation was used as a source and several surface geophones in line were used as receivers. Vs distribution map which is the triangular shape around the boring point can be developed by tomography inversion. To obtain the exact travel time information of shear wave component, a procedure using the magnitude summation of vertical and horizontal components was used based on the evaluation of particle motion at the surface. It was verified that proposed method could give reliable Vs distribution map through the numerical study using the FEM (Finite Element Method) model. Finally, SPT-Uphole tomography method was performed at the weathered soil site where several boring data with SPT-N values are available, and the feasibility of proposed method was verified in the field.

Feedback on Peer Feedback in EFL Composing: Four Stories

  • Huh, Myung-Hye;Lee, Jang Ho
    • Journal of English Language & Literature
    • /
    • v.57 no.6
    • /
    • pp.977-998
    • /
    • 2011
  • The purpose of this study is to investigate prospective teachers' perceptions of the peer review comments readily available to them during the writing process in a teacher training class. Given these needs, we employ a qualitative method of inquiry giving voice to the learner's own view of peer feedback. The data we wish to consider is first-person narratives elicited from four EFL college students, who are prospective teachers of English. With regard to the EFL students' narrative considered here, all were attentive to the feedback they received. Moreover, the way in which these EFL writers talk about peer response activity reflects that they still welcome peer feedback because of the benefits to be accrued from it. Although this study, covering only four EFL students in total, can hardly be considered conclusive, we attempt to offer a synthesis of their stories. First of all, students indicate that they received responses from "authentic readers" (Mittan 1989, 209). We do note, consequently, that students gain a clear understanding of readers' needs by receiving feedback on what they did well and on what seems unclear. Perhaps the greater effect of peer feedback claimed by these students is that they take active roles in utilizing peer comments. Since they feel uncertain about the validity of their classmates' responses, students feel that they have autonomy over their own text and can make their own decisions on whether they should accept their peer comments or not. This contrasts with their treatment of teacher comments that they accept begrudgingly even if they disagree with them. Four EFL writers talked a lot, typically in a positive way, about peer response to their writing, yet they have expressed reservations about the extent to which they should put any credence in comments offered by their fellow students. Perhaps this is because their fellow students are still developing writers and EFL learners. In turn, they were sometimes reluctant to accept the peers' comments. Thus, in EFL contexts, L1 use can be suggested during peer feedback sessions. In particular, we have come to feel that L1 use enables both reviewers and receivers to have more productive peer review experiences. Additionally, we need to train students not "to see peer feedback as potentially bad advice" (Silva et al. 2003, 111). Teachers should focus on training students to utilize their peers' comments. Without such training, students will either ignore feedback or fail to use it constructively.

The Impact of Family Caregiving for the Elderly with Dementia on Depression in the United States: Does the Relationship of Caregivers to Care Recipients Matter? (미국 치매노인 부양자의 우울증에 영향을 미치는 요소: 배우자 부양자와 딸 부양자 비교 연구)

  • Baek, Ju-Hee;Zarit, Steven H.
    • 한국노년학
    • /
    • v.29 no.4
    • /
    • pp.1591-1609
    • /
    • 2009
  • Adult child caregivers and spousal caregivers might deal with differential challenges. Studies about caregivers' psychological outcomes, however, tended to investigate associations between caregiving and its outcomes by pooling adult child caregivers and spousal caregivers together. By using a U. S. sample of family caregivers who assisted a relative with dementia, this study examined whether the relationship of caregivers to care receivers (daughter caregivers or spousal caregivers) made a difference in levels of depressive symptoms. The result showed that wife caregivers were more likely to be depressed than daughter caregivers. For daughter caregivers, role overload, role captivity, and behavior problems significantly influenced on depression. Besides these variables, the level of education was a significant predictor for wife caregivers. Role captivity and behavior problems significantly impacted on depression for husband caregivers. Thus, role captivity and behavioral problems were common predictors for all the caregivers. Specifically, higher levels of role captivity and behavioral problems were likely to make caregivers more depressed. The implication of these results were discussed.

A Review of Deep Learning-based Trace Interpolation and Extrapolation Techniques for Reconstructing Missing Near Offset Data (가까운 벌림 빠짐 해결을 위한 딥러닝 기반의 트레이스 내삽 및 외삽 기술에 대한 고찰)

  • Jiho Park;Soon Jee Seol;Joongmoo Byun
    • Geophysics and Geophysical Exploration
    • /
    • v.26 no.4
    • /
    • pp.185-198
    • /
    • 2023
  • In marine seismic surveys, the inevitable occurrence of trace gaps in the near offset resulting from geometrical differences between sources and receivers adversely affects subsequent seismic data processing and imaging. The absence of data in the near-offset region hinders accurate seismic imaging. Therefore, reconstructing the missing near-offset information is crucial for mitigating the influence of seismic multiples, particularly in the case of offshore surveys where the impact of multiple reflections is relatively more pronounced. Conventionally, various interpolation methods based on the Radon transform have been proposed to address the issue of the nearoffset data gap. However, these methods have several limitations, leading to the recent emergence of deep-learning (DL)-based approaches as alternatives. In this study, we conducted an in-depth analysis of two representative DL-based studies to scrutinize the challenges that future studies on near-offset interpolation must address. Furthermore, through field data experiments, we precisely analyze the limitations encountered when applying previous DL-based trace interpolation techniques to near-offset situations. Consequently, we suggest that near-offset data gaps must be approached by extrapolation rather than interpolation.

A 2×2 MIMO Spatial Multiplexing 5G Signal Reception in a 500 km/h High-Speed Vehicle using an Augmented Channel Matrix Generated by a Delay and Doppler Profiler

  • Suguru Kuniyoshi;Rie Saotome;Shiho Oshiro;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.1-10
    • /
    • 2023
  • This paper proposes a method to extend Inter-Carrier Interference (ICI) canceling Orthogonal Frequency Division Multiplexing (OFDM) receivers for 5G mobile systems to spatial multiplexing 2×2 MIMO (Multiple Input Multiple Output) systems to support high-speed ground transportation services by linear motor cars traveling at 500 km/h. In Japan, linear-motor high-speed ground transportation service is scheduled to begin in 2027. To expand the coverage area of base stations, 5G mobile systems in high-speed moving trains will have multiple base station antennas transmitting the same downlink (DL) signal, forming an expanded cell size along the train rails. 5G terminals in a fast-moving train can cause the forward and backward antenna signals to be Doppler-shifted in opposite directions, so the receiver in the train may have trouble estimating the exact channel transfer function (CTF) for demodulation. A receiver in such high-speed train sees the transmission channel which is composed of multiple Doppler-shifted propagation paths. Then, a loss of sub-carrier orthogonality due to Doppler-spread channels causes ICI. The ICI Canceller is realized by the following three steps. First, using the Demodulation Reference Symbol (DMRS) pilot signals, it analyzes three parameters such as attenuation, relative delay, and Doppler-shift of each multi-path component. Secondly, based on the sets of three parameters, Channel Transfer Function (CTF) of sender sub-carrier number n to receiver sub-carrier number l is generated. In case of n≠l, the CTF corresponds to ICI factor. Thirdly, since ICI factor is obtained, by applying ICI reverse operation by Multi-Tap Equalizer, ICI canceling can be realized. ICI canceling performance has been simulated assuming severe channel condition such as 500 km/h, 8 path reverse Doppler Shift for QPSK, 16QAM, 64QAM and 256QAM modulations. In particular, 2×2MIMO QPSK and 16QAM modulation schemes, BER (Bit Error Rate) improvement was observed when the number of taps in the multi-tap equalizer was set to 31 or more taps, at a moving speed of 500 km/h and in an 8-pass reverse doppler shift environment.

2D Backtracking Method of Ultrasonic Signal (초음파 신호의 2차원 역추적 방법에 관한 연구)

  • Kyu-Joung Lee;Choong Ho Lee
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.3
    • /
    • pp.172-177
    • /
    • 2023
  • In this paper, 2-dimensional backtracking method for ultrasonic signals. Ultrasonic sensors are a common technology used in industrial fields as many studies have been conducted on distance measurement and indoor location tracking using transmission and reception devices in pairs. A method for tracking a signal of an arbitrary ultrasonic transmission device on a 2D plane using only a receiver of an ultrasonic signal is proposed. In order to track the ultrasonic signal, the receiver receives the signal by making at least three. The three receivers may calculate a direction and a distance using a time difference in which the ultrasound reception sound is reached. The existing method of tracking signal sources using ultrasonic waves has a problem of time synchronization of devices because the transceivers must be paired or installed independently for each sensor. In order to solve this problem, the distance of the ultrasonic receiver is minimized, and it is configured as one device. The sensor installed as one device may be processed by one operator, thereby solving the time synchronization problem. To increase time difference accuracy, high-speed 32-bit timers with high time resolution can be used to quickly calculate and track distances and directions.

Adaptive Power Saving Mechanism of Low Power Wake-up Receivers against Battery Draining Attack (배터리 소모 공격에 대응하는 저전력 웨이크업 리시버의 적응형 파워 세이빙 메커니즘)

  • So-Yeon Kim;Seong-Won Yoon;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.393-401
    • /
    • 2024
  • Recently, the Internet of Things (IoT) has been widely used in industries and daily life that directly affect human safety, life, and assets. However, IoT devices, which need to meet low-cost, lightweight, and low-power requirements, face a significant problem of shortened battery lifetime due to battery draining attacks and interference. To solve this problem, the 802.11ba standard for the Wake-up Receiver (WuR) has emerged, this feature is playing a crucial role in minimizing energy consumption. However, the WuR protocol did not consider security mechanisms in order to reduce latency and overhead. Therefore, in this study, anAdaptive Power Saving Mechanism (APSM) is proposed for low-power WuR to counter battery draining attacks. APSM can minimize abnormally occurring power consumption by exponentially increasing power-saving time in environments prone to attacks. According to experimental results, the proposed APSM improved energy consumption efficiency by a minimum of 13.77% compared to the traditional Legacy Power Saving Mechanism (LPSM) when attack traffic ratio is 10% or more of the total traffic.

The Effect of Message Completeness and Leakage Cues on the Credibility of Mobile Promotion Messages (기업의 스마트폰 메시지에 대한 고객 신뢰도에 관한 연구: 메시지 정교화 모델을 중심으로)

  • Hyun Jun Jeon;Jin Seon Choe;Jai-Yeol Son
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.61-80
    • /
    • 2018
  • Individuals often receive smishing campaigns (mobile phishing messages), which they treat as spam. Thus, firms should understand how their customers distinguish their promotion messages from smishing. However, only a few studies examined this important issue. The present study employs the elaboration likelihood model to develop research hypotheses on the relationship between message cue and message credibility. The message cue in this study is classified as content cue, which is found in the content of promotion messages, and as leakage cue, which is found in peripheral information in the message. Leakage cue includes orthography (inclusion of special characters)and an abbreviated link sent by a faithless sender. We also propose that contextualization has a moderating effect on the relationship between content cue and credibility. We conducted a survey experiment to examine the effect of message cues on message credibility in the context of respondents receiving discount coupons through mobile messages. The result of data analysis based on 166 responses suggests that leakage cue had a negative effect on message credibility. A message with defective content cue has a marginally negative effect on message credibility. In particular, defective content cue in a high-contextual message has a strong negative impact on message credibility. This effect was not observed in low-contextual messages. Moreover, message credibility is significantly low regardless of the degree of contextualization if there is a leakage cue in the message. Our findings suggest that mobile promotion messages should be customized for message receivers and should have no leakage cues.

Optimal deployment of sonobuoy for unmanned aerial vehicles using reinforcement learning considering the target movement (표적의 이동을 고려한 강화학습 기반 무인항공기의 소노부이 최적 배치)

  • Geunyoung Bae;Juhwan Kang;Jungpyo Hong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.2
    • /
    • pp.214-224
    • /
    • 2024
  • Sonobuoys are disposable devices that utilize sound waves for information gathering, detecting engine noises, and capturing various acoustic characteristics. They play a crucial role in accurately detecting underwater targets, making them effective detection systems in anti-submarine warfare. Existing sonobuoy deployment methods in multistatic systems often rely on fixed patterns or heuristic-based rules, lacking efficiency in terms of the number of sonobuoys deployed and operational time due to the unpredictable mobility of the underwater targets. Thus, this paper proposes an optimal sonobuoy placement strategy for Unmanned Aerial Vehicles (UAVs) to overcome the limitations of conventional sonobuoy deployment methods. The proposed approach utilizes reinforcement learning in a simulation-based experimental environment that considers the movements of the underwater targets. The Unity ML-Agents framework is employed, and the Proximal Policy Optimization (PPO) algorithm is utilized for UAV learning in a virtual operational environment with real-time interactions. The reward function is designed to consider the number of sonobuoys deployed and the cost associated with sound sources and receivers, enabling effective learning. The proposed reinforcement learning-based deployment strategy compared to the conventional sonobuoy deployment methods in the same experimental environment demonstrates superior performance in terms of detection success rate, deployed sonobuoy count, and operational time.

A Study on Information Sharing Methods for Casualties in Maritime Emergency Scenes (해양응급현장에서의 사상자 정보 공유 방안에 관한 연구)

  • Seungyong Kim;Incheol Hwang;Dongsik Kim;Jungjae Shin
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.1
    • /
    • pp.206-212
    • /
    • 2024
  • Purpose: This study conducted research on the sharing of information to enhance the survival rate of emergency patients by swiftly transferring them to appropriate hospitals through sharing the patients' conditions, treatment histories, and transportation information with the Maritime Police Agency and relevant agencies when emergencies occur in the marine environment. Methods: In this study, emergency patient information classified in a smartphone app was received, stored, and transmitted using the LoRa communication method by electronic triage tags, and the transmitted emergency patient information was implemented to be collected in real-time through a hybrid triage system along with LoRa receivers. Results: Through the hybrid triage system, it was possible to receive emergency patient information according to the distance or confirm delayed reception. It was observed that most data were received when the distance was short, while data reception was unsuccessful in relatively longer distances. Conclusion: It was confirmed that in mass disaster environments where internet communication is impossible, rapid and accurate understanding of casualty information at disaster sites and appropriate disaster responses can be achieved using self-networking methods such as LoRa communication. However, limitations inherent in communication methods were also recognized. Further research on various communication methods is required to collect emergency patient information and transfer them to appropriate hospitals in situations where internet communication is unavailable.