• Title/Summary/Keyword: request

Search Result 2,843, Processing Time 0.022 seconds

MAC Protocol for Bursty Traffic in Wireless ATM Networks (무선 ATM망에서 버스트 트래픽을 위한 MAC 프로토콜)

  • 임인택;양성룡;허정석
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.117-120
    • /
    • 2001
  • In this paper, a contention-based reservation MAC protocol is proposed for non-real-time bursty traffic services in the wireless ATM networks. In order to reduce the collisions of the reservation request packets, the base station scheduler calculates the transmission probability using the number of RAS minislots and the estimated load of the reservation request packets. And it broadcasts the calculated transmission probability through the downlink control channel. Mobile terminals, which have a traffic burst, select randomly a RAS minislot and transmit the reservation request packet with the received transmission probability. The reservation request packet contains the number of packets in the buffer. The base station allocates slots based on the buffer status of the received reservation request packets.

  • PDF

A study on the phase noise performance improvement of CATV transmission system using the simulator (시뮬레이터를 이용한 CATV 전송시스템 위상잡음성능 개선에 관한 연구)

  • Lee, Yong-Woo;Oh, Seung-Hyeub;Chang, Sang-Hyun;Lee, Il-Kyoo
    • Journal of Satellite, Information and Communications
    • /
    • v.5 no.1
    • /
    • pp.1-5
    • /
    • 2010
  • Recently, the transmission amount of information that each single person requires is growing by development of electron information communication technology. So in this paper we analysis the phase noise characteristics to obtain a most suitable of SNR performance request characteristic by BER on CATV transmission system that satisfy performance request DOCSIS 2.0 standard. Especially we get the parameter value of PLL that satisfy phase noise characteristic request standard using developed simulator. Presented method can be used to obtain a performance request standard connection performance request standard of high speed CATV transmission system in the future.

The effects of explicit and implicit pragmatic instruction in Korean request strategies for Chinese learners (명시적 교수와 암시적 교수가 요청 화행 전략 표현 학습에 미치는 효과 비교 연구 - 중국인 한국어 학습자를 대상으로 -)

  • Lee, YeonKyung
    • Journal of Korean language education
    • /
    • v.25 no.1
    • /
    • pp.115-144
    • /
    • 2014
  • The purpose of this paper is to compare the two different instruction methods for Korean learners of academic purposes in learning request expression. Participants were divided into two groups, explicit and implicit group. Both groups viewed several scenes from the drama that involved native speakers interacting in different situations. The instructional treatment for the explicit group included metapragmatic information while the treatment for the implicit group did not. On the other hand, the treatment for the implicit group followed implicit techniques, which were repetition of the video presentation and a script reading activity. This study was made up of a pre-test, a post-test, and a delayed-test. The pre-test was conducted prior to the instructional treatment. The post-test was administered a day after the last instruction and the delayed-test was conducted five weeks after the treatments. Two types of tests, speaking and writing, were used in this study to examine subjects' knowledge of Korean request. The result of this research reveals that implicit treatment was more effective than explicit treatment in Korean learners' request acquisition. This results might have been due to the operationalization of the implicit condition in this study. Implicit instruction may help language learners make rules by themselves through tasks.

Uniform Sensor-node Request Scheme for the Recovery of Sensing Holes on IoT Network (IoT 네트워크의 센싱홀 복구를 위한 센서 이동 균등 요청 방법)

  • Kim, Moonseong;Park, Sooyeon;Lee, Woochan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.9-17
    • /
    • 2020
  • When IoT sensor nodes are deployed in areas where data collection is challenging, sensors must be relocated if sensing holes occur due to improper placement of sensors or energy depletion, and data collection is impossible. The sensing hole's cluster header transmits a request message for sensor relocation to an adjacent cluster header through a specific relay node. However, since a specific relay node is frequently used, a member sensor located in a specific cluster area adjacent to the sensing hole can continuously receive the movement message. In this paper, we propose a method that avoids the situation in which the sensing hole cluster header monopolizes a specific relay node and allows the cluster header to use multiple relay nodes fairly. Unlike the existing method in which the relay node immediately responds to the request of the header, the method proposed in this paper solves a ping-pong problem and a problem that the request message is concentrated on a specific relay node by applying a method of responding to the request of the header using a timer. OMNeT++ simulator was used to analyze the performance of the proposed method.

An Unload and Load Request Logic for Semiconductor Fab Considering Inter-Bay Material Flow (Inter-Bay 물류 흐름을 고려한 반도체 Fab의 Unload 및 Load Request Logic 개발)

  • Suh, Jung-Dae;Koo, Pyung-Hoi;Jang, Jae-Jin
    • IE interfaces
    • /
    • v.17 no.spc
    • /
    • pp.131-140
    • /
    • 2004
  • The purpose of this paper is to develop and show the efficiency of the URL(Unload Request Logic) and LRL(Load Request Logic) of the dispatcher in the Fab(Fabrication) Manufacturing Execution System. These logics are the core procedures which control the material(wafer and glass substrate) flow efficiently in the semiconductor and LCD fab considering inter-bay as well as intra-bay material flow. We use the present and future status information of the system by look-ahead and the information about the future transportation schedule of Automated Guided Vehicles. The simulation results show that the URL and LRL presented in this paper reduce the average lead time, average and maximum WIP level, and the average available AGV waiting time.

RAS: Request Assignment Simulator for Cloud-Based Applications

  • Rajan, R. Arokia Paul;Francis, F. Sagayaraj
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2035-2049
    • /
    • 2015
  • Applications deployed in cloud receive a huge volume of requests from geographically distributed users whose satisfaction with the cloud service is directly proportional to the efficiency with which the requests are handled. Assignment of user requests based on appropriate load balancing principles significantly improves the performance of such cloud-based applications. To study the behavior of such systems, there is a need for simulation tools that will help the designer to set a test bed and evaluate the performance of the system by experimenting with different load balancing principles. In this paper, a novel architecture for cloud called Request Assignment Simulator (RAS) is proposed. It is a customizable, visual tool that simulates the request assignment process based on load balancing principles with a set of parameters that impact resource utilization. This simulator will help to ascertain the best possible resource allocation technique by facilitating the designer to apply and test different load balancing principles for a given scenario.

Selection Method of Remodeling Based on User Request (사용자 요구에 따른 공동주택 리모델링 선정방법)

  • Lim, Jae-Hyun;Yun, Yer-Wan;Yang, Keek-young
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2003.11a
    • /
    • pp.119-123
    • /
    • 2003
  • Lately Construction industry tends to prefer remodeling of existing building rather then new construction or reconstruction of buildings due to strengthening of several restriction related to real estates along with prolonged depression. Specially in case of Apartment houses, since vagueness on ownership and management authority on common part exists. So in this study we are to present the procedure of analyzing apartment house remodeling method through user request by approaching to several considerable factors in user request side.

  • PDF

Ultra Low Power Data Aggregation for Request Oriented Sensor Networks

  • Hwang, Kwang-Il;Jang, In
    • Journal of Information Processing Systems
    • /
    • v.10 no.3
    • /
    • pp.412-428
    • /
    • 2014
  • Request oriented sensor networks have stricter requirements than conventional event-driven or periodic report models. Therefore, in this paper we propose a minimum energy data aggregation (MEDA), which meets the requirements for request oriented sensor networks by exploiting a low power real-time scheduler, on-demand time synchronization, variable response frame structure, and adaptive retransmission. In addition we introduce a test bed consisting of a number of MEDA prototypes, which support near real-time bidirectional sensor networks. The experimental results also demonstrate that the MEDA guarantees deterministic aggregation time, enables minimum energy operation, and provides a reliable data aggregation service.

Adaptive Filtering Scheme for Defense of Energy Consumption Attacks against Wireless Computing Devices

  • Lee, Wan Yeon
    • International journal of advanced smart convergence
    • /
    • v.7 no.3
    • /
    • pp.101-109
    • /
    • 2018
  • In this paper, we propose an adaptive filtering scheme of connection requests for the defense of malicious energy consumption attacks against wireless computing devices with limited energy budget. The energy consumption attack tries to consume the battery energy of a wireless device with repeated connection requests and shut down the wireless device by exhausting its energy budget. The proposed scheme blocks a connection request of the energy consumption attack in the middle, if the same connection request is repeated and its request result is failed continuously. In order to avoid the blocking of innocuous mistakes of normal users, the scheme gives another chance to allow connection request after a fixed blocking time. The scheme changes the blocking time adaptively by comparing the message arriving ate during non-blocking period and that during blocking period. Evaluation shows that the proposed defense scheme saves up to 94% energy consumption compared to the non-defense case.

A Study on Routine Formulas and Downgraders of Request Act in High School English Textbooks

  • Yang, Eun-Mi
    • English Language & Literature Teaching
    • /
    • v.11 no.2
    • /
    • pp.111-134
    • /
    • 2005
  • This paper examines high school English textbooks to ascertain if they appropriately reflect the kinds and frequencies of routine formulas and downgraders of request act used by English native speakers. It is important to present authentic routine formulas in textbooks for students to acquire proper, efficient and safe communication strategies to communicate with other English speakers. For the analysis, currently available 7 series of 21 high school English textbooks under the $7^{th}$ National Curriculum were selected. Each series of textbooks contains 3 school grade textbooks as High School English, High School English I, and High School English II. The results show that the high school English textbooks generally demonstrate a secund reflection of the English native speakers' use of request strategies and downgraders. That is, the textbooks were found to have presented mostly casual forms of routine formulas while they have not presented sufficient coverage of elaborated polite routine formulas for requesting which English native speakers frequently use. The presence of some kinds of the frequently used downgraders was also very small in proportion in the textbooks. More effort should be given to complement the deficiency in this area by teachers and researchers.

  • PDF