• Title/Summary/Keyword: time sensitive communication

Search Result 183, Processing Time 0.028 seconds

Fabrication and characterization of silicon-based microsensors for detecting offensive $CH_3SH\;and\; (CH_3)_3N$ gases

  • Lee, Kyu-Chung;Hur, Chang-Wu
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.1
    • /
    • pp.38-42
    • /
    • 2008
  • Highly sensitive and mechanically stable gas sensors have been fabricated using the microfabrication and micromachining techniques. The sensing materials used to detect the offensive $CH_3SH$ and $(CH_3)_3N$ gases are 1 wt% Pd-doped $SnO_2$ and 6 wt% $Al_2O_3$-doped ZnO, respectively. The optimum operating temperatures of the devices are $250^{\circ}C$ and $350^{\circ}C$ for $CH_3SH$ and $(CH_3)_3N$, respectively and the corresponding heater power is, respectively, about 55mW and 85mW. Excellent thermal insulation is achieved by the use of a double-layer membrane: i.e. $0.2{\mu}m$-thick silicon nitride and $1.4{\mu}m$-thick phosphosilicate glass. The sensors are mechanically stable enough to endure the heat cycles between room temperature and $350^{\circ}C$, at least for 30 days.

Large Flows Detection, Marking, and Mitigation based on sFlow Standard in SDN

  • Afaq, Muhammad;Rehman, Shafqat;Song, Wang-Cheol
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.189-198
    • /
    • 2015
  • Despite the fact that traffic engineering techniques have been comprehensively utilized in the past to enhance the performance of communication networks, the distinctive characteristics of Software Defined Networking (SDN) demand new traffic engineering techniques for better traffic control and management. Considering the behavior of traffic, large flows normally carry out transfers of large blocks of data and are naturally packet latency insensitive. However, small flows are often latency-sensitive. Without intelligent traffic engineering, these small flows may be blocked in the same queue behind megabytes of file transfer traffic. So it is very important to identify large flows for different applications. In the scope of this paper, we present an approach to detect large flows in real-time without even a short delay. After the detection of large flows, the next problem is how to control these large flows effectively and prevent network jam. In order to address this issue, we propose an approach in which when the controller is enabled, the large flow is mitigated the moment it hits the predefined threshold value in the control application. This real-time detection, marking, and controlling of large flows will assure an optimize usage of an overall network.

[ $^{99m}Tc-DISIDA$ ] Scintigraphic Findings of Hepatocellular Carcinoma (간세포암의 $^{99m}Tc-DISIDA$ 신티그램 소견)

  • Kim, Sung-Hoon;Chung, Soo-Kyo;Bahk, Yong-Whee
    • The Korean Journal of Nuclear Medicine
    • /
    • v.20 no.1
    • /
    • pp.33-37
    • /
    • 1986
  • It is well known that $^{99m}Tc-sulfur$ colloid or phytate hepatic scintigraphy is highly sensitive but not specific. Both $^{99m}Tc-DISIDA$ and bilirubin have been shown to share the same anionic transport pathway in the liver. Hepatocellular carcinoma(HCC) retains the ability to produce bile but has marked limitation to excreting it resulting in accumulation of bile within the tumor cells. Based upon such a fact, $^{99m}Tc-DISIDA$ hepatobiliary scintigraphy is used for the diagnosis of HCC. The present communication deals with our experience of DISIDA scintigraphic exploration of 9 cases of HCC in a retrospective way. We have made an observation on intensity of positive radio nuclide accumulation in the cold area of HCC as it is demonstrated by phytate scintigraphy. In addition we have semi quantitatively analyzed time-activity pattern and the following results were obtained. (1) All of 9 cases showed an increased uptake of $^{99m}Tc-DISIDA$ in delayed scintigrams. Of these 5 cases showed accumulation less than, 3 equal to, 1 more than the surrounding liver tissue. (2) The mean of the first appearing time of $^{99m}Tc-DISIDA$ activity in tumoral region was 2 hours and 20 minutes. (3) DISIDA scintigraphy provides us with positive informations of diagnostic value.

  • PDF

Design of a Channel Estimator for the LTE System Based on the Multirate Signal Processing (다속신호처리 기법을 이용한 LTE 시스템 채널 추정기법 설계)

  • Yoo, Kyung-Yul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.11
    • /
    • pp.2108-2113
    • /
    • 2010
  • The Long Term Evolution (LTE) system is based on the Orthogonal Frequency Division Multiplexing (OFDM) and relies its channel estimation on the lattice-type pilot samples in the multipath fading channel environment. The estimation of the channel frequency response (CFR) makes use of the least squares estimate (LSE) for each pilot samples, followed by an interpolation both in time- and in frequency-domain to fill up the channel estimates for subcarriers corresponding to data samples. Any interpolation scheme could be adopted for this purpose. Depending on the requirements of the target system, we may choose a simple linear interpolation or a sophisticated one. For any choice of an interpolation scheme, these is a trade-off between estimation accuracy and numerical cost. For those wireless communication systems based on the OFDM and the preamble-type pilot structure, the DFT-based channel estimation and its variants have been successfully. Yet, it may not be suitable for the lattice-type pilot structure, since the pilot samples are not sufficient to provide an accurate estimate and it is known to be sensitive to the location as well as the length of the time-domain window. In this paper, we propose a simple interpolated based on the upsampling mechanism in the multirate signal processing. The proposed method provides an excellent alternative to the DFT-based methods in terms of numerical cost and accuracy. The performance of the proposed technique is verified on a multipath environment suggested on a 3GPP LTE specification.

Design of Dynamic Slot Assignment Protocol for Wireless Multimedia Communication (무선 멀티미디어 통신을 위한 동적 슬롯 할당 MAC 프로토콜 설계)

  • Yoe Hyun;Kang Sang-Wook;Koh Jin-Gwang
    • Journal of Internet Computing and Services
    • /
    • v.4 no.5
    • /
    • pp.61-68
    • /
    • 2003
  • In this paper, we propose a wireless MAC protocol named APRMA, which is capable of supporting the ABR type data service and Maximizing channel utilization. Data terminals with random data packets are not provided slot reservation with PRMA protocol. That is, slot reservation is applicable to the time constraint voice packet exclusively. But the reservation scheme have to be performed for loss sensitive data packet, and contended their quality of service, Therefore, in wireless MAC, reservation technique has to be used for both voice and data services. So the terminal which wants to request for ABR type service, is allocated a minimum bandwidth from system for the first time, If the system have some extra available bandwidth, ABR terminals would acquire additional bandwidth slot by slot, As a result, APRMA protocol can support the data service with loss sensitivity and maintain their channel utilization high.

  • PDF

A Pilot Study on the Practical Model of Nonverbal Communication for the Effective Information Services (정보조사제공에 있어서 비언어적 커뮤니케이션의 응용모형개발을 위한 실증적 연구)

  • Han Sang-Wan
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.25
    • /
    • pp.83-150
    • /
    • 1993
  • Traditionally, the emphasis of the information services had been placed on the information provider's knowledge of information sources or information systems. However, in view of the increasing complexity of the information environment. and changes taking place in information professions the evaluation of the information services has callded for further research in interpersonal communication aspects of the librarian user interface especially that which links to user satisfaction. This experimental study was carried out for the purpose of exploring the implications of nonverbal behaviors in measuring user satisfaction in the light of the fact that the meaning of nonverbal clues includes more than verbal communication especially in dealing with variable barriers even though they operate at low levels of awareness. In this sense, among the wide range of nonverbal communication areas in particular kinesics, artifacts and the proximics were examined to suggest alternative model which can be applied effectively in our specific set of information work environment. Two major university libraries and two research libraries in Korea were chosen and visited for the anlysis and per each refernce/information interview the librarian's nonverbal behaviors were checked on the observer's checklist and the qustionnaires completed by the user at a time. On the basis of these data firstly, the relation of user satisfaction concerned with the librarian's nonverbal communication to user satisfaction with information services was analyzed and the possible communication barriers were investigated. In addition, the effect of training the information librarian with positive nonverbal communication skills on the user's satisfaction was analyzed in a SAS computer program in the area of kinesics. On the other hand, the effect of other nonverbal behaviors such as proximics and artifacts known very important clues to improving a complex human interaction was discussed along with their experimental results. In conclusion, it was found that most of users were not sensitive to the importance of nonverbal behaviors exposed by the information librarian, but it was proved that the ultimate user satisfaction and the satisfaction of the librarian's nonverbal behaviors are correlated positively, Moreover, nonverbal behaviors displayed by the trained librarian toward the user had a considerable effect on the user's evalution of information services compared with those by the untrained. These findings imply that in order to control the librarian's nonverbal behaviors and to help the user overcome his barriers the information librarian as a specialist needs to assure and modify willilingly his communication behavior. Without making effective use of such nonverbal communication, information librarian could not expect to meet the user's information needs either. However, when these positive nonverbal behaviors are applied it would be highly desirable to be aware of cultural and contextual differences. With regard to increasing information services success the applicable nonverbal communication model for library management and education can be suggested as below.

  • PDF

A Study on Face Recognition Using Diretional Face Shape and SOFM (방향성 얼굴형상과 SOFM을 이용한 얼굴 인식에 관한 연구)

  • Kim, Seung-Jae;Lee, Jung-Jae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.109-116
    • /
    • 2019
  • This study proposed a robust detection algorithm. It detects face more stably with respect to changes in light and rotation for the identification of a face shape. Also it satisfies both efficiency of calculation and the function of detection. The algorithm proposed segmented the face area through pre-processing using a face shape as input information in an environment with a single camera and then identified the shape using a Self Organized Feature Map(SOFM). However, as it is not easy to exactly recognize a face area which is sensitive to light, it has a large degree of freedom, and there is a large error bound, to enhance the identification rate, rotation information on the face shape was made into a database and then a principal component analysis was conducted. Also, as there were fewer calculations due to the fewer dimensions, the time for real-time identification could be decreased.

End-to-end Delay Guarantee in IEEE 802.1 TSN with Non-work conserving scheduler (비작업보존 스케줄러를 갖는 IEEE 802.1 TSN에서 단대단 지연시간 보장)

  • Joung, Jinoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.121-126
    • /
    • 2018
  • IEEE 802.1 TSN TG is developing standards for end-to-end delay bounds and zero packet loss based on Ethernet technology. We focus on packet forwarding techniques. TSN packet forwarding techniques can be classified into Synchronous and Asynchronous framework. Synchronous approach allocates fixed time period for a class, yet is complex for large networks. Asynchronous approach provides delay guarantee by regulator-scheduler pair, yet is unnecessarily complex, too. We propose network components for TSN Asynchronous architecture, which remove the complexity of maintaining flow state for regulation decisions. Despite such a simplicity, the proposed architecture satisfies the TSN's delay requirements provided the limited high priority traffic's maximum packet length.

Montgomery Multiplier with Very Regular Behavior

  • Yoo-Jin Baek
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.17-28
    • /
    • 2024
  • As listed as one of the most important requirements for Post-Quantum Cryptography standardization process by National Institute of Standards and Technology, the resistance to various side-channel attacks is considered very critical in deploying cryptosystems in practice. In fact, cryptosystems can easily be broken by side-channel attacks, even though they are considered to be secure in the mathematical point of view. The timing attack(TA) and the simple power analysis attack(SPA) are such side-channel attack methods which can reveal sensitive information by analyzing the timing behavior or the power consumption pattern of cryptographic operations. Thus, appropriate measures against such attacks must carefully be considered in the early stage of cryptosystem's implementation process. The Montgomery multiplier is a commonly used and classical gadget in implementing big-number-based cryptosystems including RSA and ECC. And, as recently proposed as an alternative of building blocks for implementing post quantum cryptography such as lattice-based cryptography, the big-number multiplier including the Montgomery multiplier still plays a role in modern cryptography. However, in spite of its effectiveness and wide-adoption, the multiplier is known to be vulnerable to TA and SPA. And this paper proposes a new countermeasure for the Montgomery multiplier against TA and SPA. Briefly speaking, the new measure first represents a multiplication operand without 0 digits, so the resulting multiplication operation behaves in a very regular manner. Also, the new algorithm removes the extra final reduction (which is intrinsic to the modular multiplication) to make the resulting multiplier more timing-independent. Consequently, the resulting multiplier operates in constant time so that it totally removes any TA and SPA vulnerabilities. Since the proposed method can process multi bits at a time, implementers can also trade-off the performance with the resource usage to get desirable implementation characteristics.

A Practical Approach to Implement QoS in Broadband Access Networks (광대역 접속망에서 QoS 구현을 위한 현실적 접근법)

  • Park Seung-Chul
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.277-287
    • /
    • 2006
  • Most of the existing broadband access networks based on DSL, cable modem, and Ethernet support the best-effort internet access service, and adopt the flat rate pricing mechanism. It is almost impossible to provide the differentiated communication services, in current broadband access networks, for the different users and/or the different application services. Currently, however, the advances in multimedia, communication, and security technologies push the interactive and/or streaming multimedia services and VPN services to be widely deployed over Internet, and they require more QoS-sensitive services than the best-effort service. Though various QoS technologies such as RSVP-based IntServ and DiffSern were already developed and under standardization in Internet world, it is impractical to replace the existing QoS-unaware access networks with the QoS-enabled ones at a time to deploy QoS-sensitive services. In this paper, after analyzing current broadband access network architectures and the status of QoS support, we propose a practical approach to support multimedia QoS in the broadband access networks. The approach will be based on the integration of the differentiated pricing and the DiffServ technology. And it will be a step-wise approach to support backward compatibility with the legacy broadband access networks as much as possible.