• Title/Summary/Keyword: source analysis

Search Result 9,196, Processing Time 0.039 seconds

Analysis for Ad Hoc Routing Protocol based-on Dynamic Source Routing (Dynamic Source Routing 기반의 Ad Hoc Routing Protocol 분석)

  • 이광재;김탁근;김동일;최삼길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.121-124
    • /
    • 2001
  • Dynamic Source Route(DSR) protocol is a simple and efficient routing protocol designed specially for use of the multi-hop Ad Hoc Network. DSR allows the network to be completely self-organized and self-configured without the need for any existing infrastructure or administration. DSR protocol consists of the two mechanisms of Router discovery and Router Maintenance, works entirely On-demand in all aspects. In this paper, we will present the performance of DSR protocol on the multi-hop wireless Ad Hoc Networks, illustrate it with simulation, and then analysis the algorism of DSR.

  • PDF

Blind Source Separation of Acoustic Signals Based on Multistage Independent Component Analysis

  • SARUWATARI Hiroshi;NISHIKAWA Tsuyoki;SHIKANO Kiyohiro
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • spring
    • /
    • pp.9-14
    • /
    • 2002
  • We propose a new algorithm for blind source separation (BSS), in which frequency-domain independent component analysis (FDICA) and time-domain ICA (TDICA) are combined to achieve a superior source-separation performance under reverberant conditions. Generally speaking, conventional TDICA fails to separate source signals under heavily reverberant conditions because of the low convergence in the iterative learning of the inverse of the mixing system. On the other hand, the separation performance of conventional FDICA also degrades significantly because the independence assumption of narrow-band signals collapses when the number of subbands increases. In the proposed method, the separated signals of FDICA are regarded as the input signals for TDICA, and we can remove the residual crosstalk components of FDICA by using TDICA. The experimental results obtained under the reverberant condition reveal that the separation performance of the proposed method is superior to that of conventional ICA-based BSS methods.

  • PDF

A Study on the analysis of actual state and establishment method of the power source installations in the entertainment spaces (공연장 전원설비의 현장실태분석 및 시설방식에 관한 연구)

  • Yi, G.H.;Bae, S.M.;Kim, H.S.;Gil, H.J.
    • Proceedings of the KIEE Conference
    • /
    • 2003.07c
    • /
    • pp.1707-1709
    • /
    • 2003
  • This paper deals with the analysis of actual state and establishment method of the power source installations in the entertainment spaces. This paper shows the result that investigate actual state of the power source installations in the entertainment spaces. In this paper, in other to improve the safely and authoritativeness of entertainment spaces, an author propose establishment method of the power source installations in consideration of the special quality of stage equipments.

  • PDF

Analysis of Real-time Error for Geo/D/1/1 Model (Geo/D/1/1 모형에서의 실시간 원격 추정값의 오차 분석)

  • Yutae, Lee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.135-138
    • /
    • 2023
  • In this paper, we study real-time error in the context of monitoring a binary information source through a delay system. To derive the average real-time error, we model the delay system as a discrete time Geo/D/1/1 queueing model. Using a discrete time three-dimensional Markov chain with finite state space, we analyze the queueing model. We also perform some numerical analysis on various system parameters: state transition probabilities of binary information source; transmission times; and transmission frequencies. When the state changes of the information source are positively correlated and negatively correlated, we investigate the relationship between transmission time and transmission frequency.

Analysis of Micro-grid Operations Including PV Source and Li Battery (태양광 전원과 Li 배터리를 포함하는 마이크로 그리드의 운영특성 해석)

  • Kim, Deok Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4692-4697
    • /
    • 2014
  • A micro-grid including photovoltaic source and Li battery has been installed and operated for several years at the campus of USF and been used as a test bed. Photovoltaic power source has been strongly influenced by the location, weather and climate of the installed area. To compensate for the uncertainty of photovoltaic source's power output, a Li battery is connected directly to the photovoltaic source and supplies electric power to the grid. The Li battery is operated to supply power output to the grid according to the charging or discharging mode of the battery based on the average power output of the photovoltaic source, which is calculated from the monitored data for several years. The grid of the photovoltaic and Li battery system is operated as a severe loading condition and the operating characteristics of PV source and Li battery cells are analyzed in detail.

A Study of the Effect of Grouting Region on the Solution of Line Source Analysis (그라우팅 영역이 선형열원 해석에 미치는 영향에 관한 연구)

  • Lee, Se-Kyoun;Woo, Joung-Son;Ro, Jeong-Geun
    • Journal of Energy Engineering
    • /
    • v.19 no.3
    • /
    • pp.143-150
    • /
    • 2010
  • Line source method of borehole system assumes the entire surrounding medium is uniform. However, thermal properties of grouting region are considerably different from those of surrounding soil. In this study we investigate the effect of grouting materials on the solution of line source method with the aid of numerical analysis. This numerical model generates the temperature of borehole fluid with which line source solution can be obtained. Then this solution can be compared with input condition of numerical model. The results of this comparison show that thermal conductivity and borehole thermal resistance of line source solution are approximately 86% and 91% of the input condition of numerical model. Chart method is developed in this study to find the numerical input conditions (thermal conductivity and borehole thermal resistance) from the line source solution. Thermal response test of test borehole is conducted, the results of which are approximately consistent with the Chart method. Thermal property changes of grouting materials on the line source solution are also examined.

STEAM education cases study analysis using Open Source : Focusing on the use of the Knitting Machine (오픈소스를 활용한 융합인재교육(STEAM) 사례분석 연구 : 니팅기의 활용을 중심으로)

  • Park, Ji-Hoon;Nam, Won-Suk;Jang, Joong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.199-204
    • /
    • 2019
  • This study was designed to identify the expected effects and implications of STEAM education using open source-based knitwear to be designed as an open source task in the future by analyzing the current status, trends and case studies of domestic and foreign STEAM education using open source widely used in various fields. As a research method, the theoretical examination was conducted based on the literature research, and the current status and trend of STEAM education using open source at home and abroad were investigated and analyzed. As a result, the social interest in STEAM education using open source was confirmed to be increasing, and the education was designed for the purpose of generating interest, self directed learning ability, and creative thinking development, and the positive effects of the education were visible. Based on these implications, the expected effects of using an open source made knitter are presented and the design direction and significance of the STEAM training to be designed in the future are reviewed.

A Plagiarism Detection Technique for Java Program Using Bytecode Analysis (바이트코드 분석을 이용한 자바 프로그램 표절검사기법)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.7
    • /
    • pp.442-451
    • /
    • 2008
  • Most plagiarism detection systems evaluate the similarity of source codes and detect plagiarized program pairs. If we use the source codes in plagiarism detection, the source code security can be a significant problem. Plagiarism detection based on target code can be used for protecting the security of source codes. In this paper, we propose a new plagiarism detection technique for Java programs using bytecodes without referring their source codes. The plagiarism detection procedure using bytecode consists of two major steps. First, we generate the token sequences from the Java class file by analyzing the code area of methods. Then, we evaluate the similarity between token sequences using the adaptive local alignment. According to the experimental results, we can find the distributions of similarities of the source codes and that of bytecodes are very similar. Also, the correlation between the similarities of source code pairs and those of bytecode pairs is high enough for typical test data. The plagiarism detection system using bytecode can be used as a preliminary verifying tool before detecting the plagiarism by source code comparison.

A Study on the Development and Application of Efficient Evaluation Criteria for Performance Testing of Commercial Open Source Vulnerability Scanning Tools (상용 오픈소스 취약점 스캐닝 도구의 성능 시험을 위한 효율적 평가 기준 개발 및 적용)

  • Shin, Kangsik;Jung, Dong-Jae;Choe, Min-Ji;Cho, Ho-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.709-722
    • /
    • 2022
  • The recent "Log4j Security Vulnerability Incident" has occurred, and the information system that uses the open source "Log4J" has been exposed to vulnerabilities. The incident brought great vulnerabilities in the information systems of South Korea's major government agencies or companies and global information systems, causing problems with open source vulnerabilities. Despite the advantages of many advantages, the current development paradigm, which is developed using open source, can easily spread software security vulnerabilities, ensuring open source safety and reliability. You need to check the open source. However, open source vulnerability scan tools have various languages and functions. Therefore, the existing software evaluation criteria are ambiguous and it is difficult to evaluate advantages and weaknesses, so this paper has developed a new evaluation criteria for the vulnerability analysis tools of open source