2016 (371)
2015 (174)
2014 (125)
2013 (94)
2012 (43)
2011 (36)
2010 (22)
2009 (22)
2008 (15)
Influence of Waveform on Positioning Performance in a TOA/AOA based IR-UWB System
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.4 No.3 2011.09 pp.1-12
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The waveform influences on the performance of positioning system based on IR-UWB, but the performance of positioning system under the condition of different waveforms has not studied enough. In this paper, the positioning performance of a hybrid TOA/AOA scheme is evaluated with various waveforms over various IEEE 802. 15. 4a channel models (CMs). Simulation results show that the MHP pulse outperforms other waveforms in CM3 and CM5, and the RRCP outperforms other considered waveforms in CM1 and CM7.
Subgoal Discovery in Reinforcement Learning Using Local Graph Clustering
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.4 No.3 2011.09 pp.13-24
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Reinforcement Learning is an area of machine learning that studies the problem of solving sequential decision making problems. The agent must learn behavior through trial-and-error interaction with a dynamic environment. Learning efficiently in large scale problems and complex tasks demands a decomposition of the original complex task into simple and smaller subtasks. In this paper, we present a subgoal-based method for automatically creating useful skills in reinforcement Learning. Our method identifies subgoals using a local graph clustering algorithm. The main advantage of the proposed algorithm is that only the local information of the graph is considered to cluster the agent state space. Clustering of the transition graphs corresponding to MDPs can be performed in linear time using the proposed method. Subgoals discovered by the algorithm are then used to generate skills using the option framework. Experimental results show that the proposed subgoal discovery algorithm has a dramatic effect on the learning performance.
Optical CDMA Networks Using Different Detection Techniques and Coding Schemes
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.4 No.3 2011.09 pp.25-34
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents the comparative performance of different detection and coding schemes for spectral-amplitude-coded optical code division multiple access (SAC-OCDMA) system. SAC-OCDMA systems are receiving more attention because of their ability to completely eliminate multiple access interference (MAI). Fiber Bragg grating (FBGs) are used as encoder/decoder. Experimental simulation was carried out using OptiSystem version 5.0 and performance of OCDMA network is characterized through bit error rate (BER) received power and no of filters required for a particular code.
The Specificity Property for the Exchange-Interaction
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.4 No.3 2011.09 pp.35-46
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The proposed work deals with highly complex, multi-dimensional systems/processes that cannot be described using low-level details. This is due to the complexity and uncertainty inherent in their nature of functionality, behaviour, interaction, hierarchy and geometry. To keep pace with such complexity and uncertainty, abstract modelling would be useful in predicting the level and nature of the exchange-interaction between processes and the consequent occurrence of events, thus devising rational strategies for tradeoffs. A set of principle analytical expressions are constructed to analyse and assess the performance or outcome of diverse processes (e.g. environment, economics, technology or globalization).
Current Distribution Dynamics in Microstrip Patch Antenna Arrays
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.4 No.3 2011.09 pp.47-60
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents a novel way for achieving endfire radiation pattern using microstrip patch antenna array. The extensively used microstrip patch antennas i.e. rectangular and circular microstrip patch antennas, either single patch or in an array configuration do not have an endfire radiation pattern. The antenna array presented in this paper is designed by changing the geometry of the antenna and current distribution. Array consists of U-shaped radiating elements which alter the radiation pattern of individual radiating element and a partial ground plane is used to change the current distribution. In start, the paper presents the parametric study of novel single U-shaped antenna and afterwards a complete analysis of current distribution for two element, four element and eight element U-shaped microstrip antenna arrays is given.
Investigations on Energy Efficiency for WSN Routing Protocols for Realistic Radio Models
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.4 No.3 2011.09 pp.61-72
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we have extended the Prowler simulator by integrating different realistic radio models into it and comparatively analyzed the effect of the channel behavior on the network layer specifically the WSN routing protocols. The simulation results indicate that the CF protocol consumes the highest energy amongst all the protocols in case of RMGMF while RTS protocol has the highest energy efficiency in case of NRM. Thus it has been concluded that the RTS protocol can be applied to achieve energy efficient routing in wireless sensor networks.
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.4 No.3 2011.09 pp.73-86
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we consider business process management for a certain business process of telecom companies. Generally, business process management is the management of flow of business activities in an effective and efficient way. If companies have effective and efficient business management process, that is a strong weapon for those companies in this fast changing business environments. This paper focuses on business process management of fulfillment and operations and support readiness business processes for telecom companies. For the fulfillment process, we derive recommended standard functions for a company with eTOM (Enhanced Telecom Operations Map). After deriving recommended standard functions, we draw business flow diagram for a certain process in the fulfillment. For operations support and readiness process we derive recommended standard functions for certain processes. In addition, we show some examples to evaluate process performance and optimize a function of a process. This paper is a very helpful guide to transform a company’s business process or optimize it.
An Advanced Efficient Secured Blind Authentication and Verification Crypto Protocol
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.4 No.3 2011.09 pp.87-94
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The main objective of this application is to provide biometric verification protocol for the financial server with template protection and validity of trustable server. Most biometric systems assume that the template in the system is secure due to human supervision or physical protection. Authentication over insecure public networks or with untrusted servers raises more concerns in privacy and security. The primary concern is related to the security of the plain biometric templates, which cannot be replaced once they are compromised. The main objective of this system is to provide secure and blind biometric authentication protocol to protect the biometric template data with high security and accuracy. The protocol is blind in the sense that it reveals only the identity, and no additional information about the user or the biometric to the authenticating server or vice-versa. As the protocol is based on asymmetric encryption of the biometric data, it captures the advantages of biometric authentication as well as the security of public key cryptography. The encryption also provides template protection, the ability to revoke enrolled templates, and alleviates the concern on privacy in widespread use of biometrics. The proposed approach makes the communication between the concern and its client in a trustable mode
A Study on the Design of Coaxial Isolator with Filter Circuit
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.4 No.3 2011.09 pp.95-106
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, the detailed design of the 1.8 GHz band Y-junction stripline circulator with the low pass filter circuit in the center conductor in order to higher attenuations below value of -30 dB at 3rd order harmonics is proposed and presented. The HFSS is used to simulate designed 1.8GHz band circulator to check the non-reciprocal characteristics at operating frequency range and the results are compared with the experiment data. From these measurement results, We confirm that the proposed Y-junction stripline circulator using center conductor with filter circuit is effective in achieving very high attenuations below of -30 dB at 3rd order harmonics.
Impact of Quantization Matrix on the Performance of JPEG
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.4 No.3 2011.09 pp.107-118
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With the increase in imaging sensor resolution, the captured images are becoming larger and larger, which requires higher image compression ratio. Discrete Cosine Transform (DCT) quantization and entropy encoding are the two main steps in the Joint Photographic Experts Group (JPEG) image Compression standard. In order to investigate the impact of quantization matrix on the performance of JPEG, a sample DCT was calculated, images were quantized using several quantization matrices. The results are compared with the standard quantization matrix. The performance of JPEG is also analyzed for different images with different compression factors.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.