Search results for: dual data scheme
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25644

Search results for: dual data scheme

25614 Comparison of Student Grades in Dual-Enrollment Courses Taken Inside and Outside of Texas High Schools

Authors: Cynthia A. Gallardo, Kelly S. Hall, Kristopher Garza, Linda Challoo, Mais Nijim

Abstract:

Dual-enrollment programs have become more prevalent in college and high school settings. Also known as early college programs, dual-enrollment programs help students acquire a head start in earning college credit for post-secondary studies. The number and percentage of high school students who take college courses while in high school is growing. However, little is known about how dual-enrolled students fare. The classroom environment is important to learning. This study compares dually enrolled high school students who take courses that yield college credit either within their high school or at some other location. Mann-Whitney U was the statistical test used. Mean proportions were compared for each of the five standard letter grades earned across the state of Texas. Results indicated that students earn similar passing A, B, and C grades when they take dual-enrollment courses at their high school location but are more likely to fail if they take dual-enrollment courses at non-high school locations. Implications of results are that student success rate of dual-enrollment college courses may have a significant difference between the locations and student performance.

Keywords: educational leadership, dual-enrollment, student performance, college

Procedia PDF Downloads 66
25613 Omni-Relay (OR) Scheme-Aided LTE-A Communication Systems

Authors: Hassan Mahasneh, Abu Sesay

Abstract:

We propose the use of relay terminals at the cell edge of an LTE-based cellar system. Each relay terminal is equipped with an omni-directional antenna. We refer to this scheme as the Omni-Relay (OR) scheme. The OR scheme coordinates the inter-cell interference (ICI) stemming from adjacent cells and increases the desired signal level at cell-edge regions. To validate the performance of the OR scheme, we derive the average signal-to-interference plus noise ratio (SINR) and the average capacity and compare it with the conventional universal frequency reuse factor (UFRF). The results show that the proposed OR scheme provides higher average SINR and average capacity compared to the UFRF due to the assistance of the distributed relay nodes.

Keywords: the UFRF scheme, the OR scheme, ICI, relay terminals, SINR, spectral efficiency

Procedia PDF Downloads 311
25612 Pool Fire Tests of Dual Purpose Casks for Spent Nuclear Fuel

Authors: K. S. Bang, S. H. Yu, J. C. Lee, K. S. Seo, S. H. Lee

Abstract:

Dual purpose casks are used for storage and transport of spent nuclear fuel assemblies. Therefore, they satisfy the requirements prescribed in the Korea NSSC Act 2013-27, the IAEA Safety Standard Series No. SSR-6, and US 10 CFR Part 71. These regulatory guidelines classify the dual purpose cask as a Type B package, and state that a Type B package must be able to withstand a temperature of 800°C for a period of 30 min. Therefore, a fire test was conducted using a one-sixth slice of a real cask to estimate the thermal integrity of the dual purpose cask at a temperature of 800°C. The neutron shield reached a maximum temperature of 183°C, which indicates that dual purpose cask was properly insulated from the heat of the flames. The temperature rise of the basket during the fire test was 29°C. Therefore, the integrity of a spent nuclear fuel is estimated to be maintained. The temperature was lower when a cooling pin was installed. The neutron shielding was therefore protected adequately by cooling pin. As a result, the thermal integrity of the dual purpose cask was maintained and the cask is judged to be sufficiently safe for temperatures under 800°C.

Keywords: dual purpose cask, spent nuclear fuel, pool fire test, integrity

Procedia PDF Downloads 436
25611 Reversible and Adaptive Watermarking for MRI Medical Images

Authors: Nisar Ahmed Memon

Abstract:

A new medical image watermarking scheme delivering high embedding capacity is presented in this paper. Integer Wavelet Transform (IWT), Companding technique and adaptive thresholding are used in this scheme. The proposed scheme implants, recovers the hidden information and restores the input image to its pristine state at the receiving end. Magnetic Resonance Imaging (MRI) images are used for experimental purposes. The scheme first segment the MRI medical image into non-overlapping blocks and then inserts watermark into wavelet coefficients having a high frequency of each block. The scheme uses block-based watermarking adopting iterative optimization of threshold for companding in order to avoid the histogram pre and post processing. Results show that proposed scheme performs better than other reversible medical image watermarking schemes available in literature for MRI medical images.

Keywords: adaptive thresholding, companding technique, data authentication, reversible watermarking

Procedia PDF Downloads 269
25610 Dual Role of Women and Its Influence on Farmers’ Household Income and Consumption Pattern: Study of Informal Women Workers in the District Mandalle, Pangkep, South Sulawesi Province

Authors: Ida Rosada, Nurliani

Abstract:

Today, the number of women who seek additional income to help her husband is increasing. They do that in order to be able to express themselves in the midst of the family and society. Nonetheless, housewives are in charge of managing family’s income and prepare food for the family. The objective of this research is 1) to analyze the effect of the dual role of women to household income and 2) to analyze the effect of the dual role to consumption patterns. The study used a qualitative approach, data collection techniques are through observation, interviews, and documentation on farming households. The data was analysed qualitative descriptively. The results found that: 1) The revenue contribution of women who play double role in the informal sector amounted to 34.07% (less than 50%). 2) The main reason that the respondents worked in the informal sector is to be able to send their children to school (34%) and to improve household economy condition (28%). 3) After earning additional income, respondents said that they can contribute to increase the family’s income and to cover the family shortage (82%); 4) Respondents’ opinion to changes in food consumption after performing the dual role is the ability to purchase and provide the desired food (44%) and changing patterns of consumption per day (30%).

Keywords: dual role, the informal sector, consumption patterns, household income

Procedia PDF Downloads 241
25609 Evaluation of Dual Polarization Rainfall Estimation Algorithm Applicability in Korea: A Case Study on Biseulsan Radar

Authors: Chulsang Yoo, Gildo Kim

Abstract:

Dual polarization radar provides comprehensive information about rainfall by measuring multiple parameters. In Korea, for the rainfall estimation, JPOLE and CSU-HIDRO algorithms are generally used. This study evaluated the local applicability of JPOLE and CSU-HIDRO algorithms in Korea by using the observed rainfall data collected on August, 2014 by the Biseulsan dual polarization radar data and KMA AWS. A total of 11,372 pairs of radar-ground rain rate data were classified according to thresholds of synthetic algorithms into suitable and unsuitable data. Then, evaluation criteria were derived by comparing radar rain rate and ground rain rate, respectively, for entire, suitable, unsuitable data. The results are as follows: (1) The radar rain rate equation including KDP, was found better in the rainfall estimation than the other equations for both JPOLE and CSU-HIDRO algorithms. The thresholds were found to be adequately applied for both algorithms including specific differential phase. (2) The radar rain rate equation including horizontal reflectivity and differential reflectivity were found poor compared to the others. The result was not improved even when only the suitable data were applied. Acknowledgments: This work was supported by the Basic Science Research Program through the National Research Foundation of Korea, funded by the Ministry of Education (NRF-2013R1A1A2011012).

Keywords: CSU-HIDRO algorithm, dual polarization radar, JPOLE algorithm, radar rainfall estimation algorithm

Procedia PDF Downloads 181
25608 Dual-Network Memory Model for Temporal Sequences

Authors: Motonobu Hattori

Abstract:

In neural networks, when new patters are learned by a network, they radically interfere with previously stored patterns. This drawback is called catastrophic forgetting. We have already proposed a biologically inspired dual-network memory model which can much reduce this forgetting for static patterns. In this model, information is first stored in the hippocampal network, and thereafter, it is transferred to the neocortical network using pseudo patterns. Because, temporal sequence learning is more important than static pattern learning in the real world, in this study, we improve our conventional dual-network memory model so that it can deal with temporal sequences without catastrophic forgetting. The computer simulation results show the effectiveness of the proposed dual-network memory model.

Keywords: catastrophic forgetting, dual-network, temporal sequences, hippocampal

Procedia PDF Downloads 239
25607 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 441
25606 Minimum Vertices Dominating Set Algorithm for Secret Sharing Scheme

Authors: N. M. G. Al-Saidi, K. A. Kadhim, N. A. Rajab

Abstract:

Over the past decades, computer networks and data communication system has been developing fast, so, the necessity to protect a transmitted data is a challenging issue, and data security becomes a serious problem nowadays. A secret sharing scheme is a method which allows a master key to be distributed among a finite set of participants, in such a way that only certain authorized subsets of participants to reconstruct the original master key. To create a secret sharing scheme, many mathematical structures have been used; the most widely used structure is the one that is based on graph theory (graph access structure). Subsequently, many researchers tried to find efficient schemes based on graph access structures. In this paper, we propose a novel efficient construction of a perfect secret sharing scheme for uniform access structure. The dominating set of vertices in a regular graph is used for this construction in the following way; each vertex represents a participant and each minimum independent dominating subset represents a minimal qualified subset. Some relations between dominating set, graph order and regularity are achieved, and can be used to demonstrate the possibility of using dominating set to construct a secret sharing scheme. The information rate that is used as a measure for the efficiency of such systems is calculated to show that the proposed method has some improved values.

Keywords: secret sharing scheme, dominating set, information rate, access structure, rank

Procedia PDF Downloads 363
25605 Efficient Variable Modulation Scheme Based on Codebook in the MIMO-OFDM System

Authors: Yong-Jun Kim, Jae-Hyun Ro, Chang-Bin Ha, Hyoung-Kyu Song

Abstract:

Because current wireless communication requires high reliability in a limited bandwidth environment, this paper proposes the variable modulation scheme based on the codebook. The variable modulation scheme adjusts transmission power using the codebook in accordance with hannel state. Also, if the codebook is composed of many bits, the reliability is more improved by the proposed scheme. The simulation results show that the performance of proposed scheme has better reliability than the the performance of conventional scheme.

Keywords: MIMO-OFDM, variable modulation, codebook, channel state

Procedia PDF Downloads 552
25604 Study of Dual Fuel Engine as Environmentally Friendly Engine

Authors: Nilam S. Octaviani, Semin

Abstract:

The diesel engine is an internal combustion engine that uses compressed air to combust. The diesel engines are widely used in the world because it has the most excellent combustion efficiency than other types of internal combustion engine.  However, the exhaust emissions of it produce pollutants that are harmful to human health and the environment. Therefore, natural gas used as an alternative fuel using on compression ignition engine to respond those environment issues. This paper aims to discuss the comparison of the technical characteristics and exhaust gases emission from conventional diesel engine and dual fuel diesel engine. According to the study, the dual fuel engine applications have a lower compression pressure and has longer ignition delay compared with normal diesel mode. The engine power is decreased at dual fuel mode. However, the exhaust gases emission on dual fuel engine significantly reduce the nitrogen oxide (NOx), carbon dioxide (CO2) and particular metter (PM) emissions.

Keywords: diesel engine, dual fuel diesel engine, emission reduction, technical characteristics

Procedia PDF Downloads 270
25603 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 447
25602 Monotone Rational Trigonometric Interpolation

Authors: Uzma Bashir, Jamaludin Md. Ali

Abstract:

This study is concerned with the visualization of monotone data using a piece-wise C1 rational trigonometric interpolating scheme. Four positive shape parameters are incorporated in the structure of rational trigonometric spline. Conditions on two of these parameters are derived to attain the monotonicity of monotone data and other two are left-free. Figures are used widely to exhibit that the proposed scheme produces graphically smooth monotone curves.

Keywords: trigonometric splines, monotone data, shape preserving, C1 monotone interpolant

Procedia PDF Downloads 243
25601 Research on the Torsional Vibration of a Power-Split Hybrid Powertrain Equipped with a Dual Mass Flywheel

Authors: Xiaolin Tang, Wei Yang, Xiaoan Chen

Abstract:

The research described in this paper was aimed at exploring the torsional vibration characteristics of a power-split hybrid powertrain equipped with a dual mass flywheel. The dynamic equations of governing torsional vibration for this hybrid driveline are presented, and the multi-body dynamic model for the powertrain is established with the software of ADAMS. Accordingly, different parameters of dual mass flywheel are investigated by forced vibration to reduce the torsional vibration of hybrid drive train. The analysis shows that the implementation of a dual mass flywheel is an effective way to decrease the torsional vibration of the hybrid powertrain. At last, the optimal combination of parameters yielding the lowest vibration is provided.

Keywords: dual mass flywheel, hybrid electric vehicle, torsional vibration, powertrain, dynamics

Procedia PDF Downloads 377
25600 PDDA: Priority-Based, Dynamic Data Aggregation Approach for Sensor-Based Big Data Framework

Authors: Lutful Karim, Mohammed S. Al-kahtani

Abstract:

Sensors are being used in various applications such as agriculture, health monitoring, air and water pollution monitoring, traffic monitoring and control and hence, play the vital role in the growth of big data. However, sensors collect redundant data. Thus, aggregating and filtering sensors data are significantly important to design an efficient big data framework. Current researches do not focus on aggregating and filtering data at multiple layers of sensor-based big data framework. Thus, this paper introduces (i) three layers data aggregation and framework for big data and (ii) a priority-based, dynamic data aggregation scheme (PDDA) for the lowest layer at sensors. Simulation results show that the PDDA outperforms existing tree and cluster-based data aggregation scheme in terms of overall network energy consumptions and end-to-end data transmission delay.

Keywords: big data, clustering, tree topology, data aggregation, sensor networks

Procedia PDF Downloads 302
25599 Mediating Role of Burnout in Personality and Marital Satisfaction of Single and Dual Career Couples

Authors: Sara Subhan

Abstract:

Married couples tend to experience various bio-psycho-social issues that may eventually impact the quality of their marital relationship and mental wellbeing. This study aimed to find out the comparison between the single and dual-career couples’ personality, burnout and marital satisfaction. For that purpose Big Five Inventory, Couple Satisfaction Inventory, and Maslach Burnout Inventory-General Survey was used to measure the relationship between variables. The main study was carried out on 200 samples of single and dual-earner couples with the age range of 23-52 (mean= 34.58; standard deviation= 6.51) by using a purposive sampling strategy. The results showed that burnout tendencies like exhaustion, cynicism and professional efficacy are playing a mediation role between the personality and marital satisfaction of both single and dual career couples. Also, the results revealed that dual-career couples are more likely to have marital satisfaction as compared to single career couples. The results were further discussed in the light of its implications in its cultural context and counseling areas.

Keywords: dual career couples, marital satisfaction, burnout tendencies, personality

Procedia PDF Downloads 137
25598 Gender Role Attitudes and Work-Life Balance among Dual-Earner Couples: A Case Study of Pakistan

Authors: Tipu Sultan

Abstract:

The proposed research intends to explore the gender role attitudes and work-life balance among dual-earner couples in Pakistan. With the increase of female labor force participation in Pakistan, the trend of dual-earner couples has been increased than ever before. This new trend of dual-earner families has significantly affected the personal life of dual-earner couples. Due to major change in household structures, the traditions and the routine activities are in continuous transition. Balancing work and family life is more complex in the patriarchal society of Pakistan because of the social expectations of gender roles. A dichotomous behavioral reflection is being observed in Pakistani society. The one group of people having an egalitarian attitude are supporting the new gender roles of females, whereas the other group of people having a traditional mindset is still in the favor of patriarchy. Therefore, gender roles are re-evaluated, and it would be more interesting to raise questions on the interplay of new gender roles and work-life balance among dual-earners. The semi-structured interview guide will be utilized to explore gender role attitudes, ideal and in-practice gender roles, experiences of work-life imbalances/balances, possible strategies to create a balance between work and family life among dual-earner couples.

Keywords: dual-earner couples, gender role attitudes, Pakistan, work-life balance

Procedia PDF Downloads 121
25597 Performance Improvement of Cooperative Scheme in Wireless OFDM Systems

Authors: Ki-Ro Kim, Seung-Jun Yu, Hyoung-Kyu Song

Abstract:

Recently, the wireless communication systems are required to have high quality and provide high bit rate data services. Researchers have studied various multiple antenna scheme to meet the demand. In practical application, it is difficult to deploy multiple antennas for limited size and cost. Cooperative diversity techniques are proposed to overcome the limitations. Cooperative communications have been widely investigated to improve performance of wireless communication. Among diversity schemes, space-time block code has been widely studied for cooperative communication systems. In this paper, we propose a new cooperative scheme using pre-coding and space-time block code. The proposed cooperative scheme provides improved error performance than a conventional cooperative scheme using space-time block coding scheme.

Keywords: cooperative communication, space-time block coding, pre-coding

Procedia PDF Downloads 329
25596 Difference Expansion Based Reversible Data Hiding Scheme Using Edge Directions

Authors: Toshanlal Meenpal, Ankita Meenpal

Abstract:

A very important technique in reversible data hiding field is Difference expansion. Secret message as well as the cover image may be completely recovered without any distortion after data extraction process due to reversibility feature. In general, in any difference expansion scheme embedding is performed by integer transform in the difference image acquired by grouping two neighboring pixel values. This paper proposes an improved reversible difference expansion embedding scheme. We mainly consider edge direction for embedding by modifying the difference of two neighboring pixels values. In general, the larger difference tends to bring a degraded stego image quality than the smaller difference. Image quality in the range of 0.5 to 3.7 dB in average is achieved by the proposed scheme, which is shown through the experimental results. However payload wise it achieves almost similar capacity in comparisons with previous method.

Keywords: information hiding, wedge direction, difference expansion, integer transform

Procedia PDF Downloads 453
25595 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 351
25594 A Hybrid P2P Storage Scheme Based on Erasure Coding and Replication

Authors: Usman Mahmood, Khawaja M. U. Suleman

Abstract:

A peer-to-peer storage system has challenges like; peer availability, data protection, churn rate. To address these challenges different redundancy, replacement and repair schemes are used. This paper presents a hybrid scheme of redundancy using replication and erasure coding. We calculate and compare the storage, access, and maintenance costs of our proposed scheme with existing redundancy schemes. For realistic behaviour of peers a trace of live peer-to-peer system is used. The effect of different replication, and repair schemes are also shown. The proposed hybrid scheme performs better than existing double coding hybrid scheme in all metrics and have an improved maintenance cost than hierarchical codes.

Keywords: erasure coding, P2P, redundancy, replication

Procedia PDF Downloads 364
25593 Wireless Transmission of Big Data Using Novel Secure Algorithm

Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha

Abstract:

This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.

Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance

Procedia PDF Downloads 456
25592 Efficient Relay Selection Scheme Utilizing OVSF Code in Cooperative Communication System

Authors: Yeong-Seop Ahn, Myoung-Jin Kim, Young-Min Ko, Hyoung-Kyu Song

Abstract:

This paper proposes a relay selection scheme utilizing an orthogonal variable spreading factor (OVSF) code in a cooperative communication. The relay selection scheme influences on the communication performance in the cooperative communication. Conventional relay selection schemes such as the best harmonic mean relay selection scheme or the threshold-based relay selection scheme should know information such as channel state information (CSI) in advance. The proposed relay selection scheme does not require information in advance by using a reference signal utilizing the OVSF code. The simulation result shows that bit error rate (BER) performance of proposed relay selection scheme is similar to the best harmonic mean relay selection scheme that is known as one of the optimal relay selection schemes.

Keywords: cooperative communication, relay selection, OFDM, OVSF code

Procedia PDF Downloads 604
25591 Signaling Using Phase Shifting in Wi-Fi Backscatter System

Authors: Chang-Bin Ha, Young-Min Ko, Seongjoo Lee, Hyoung-Kyu Song

Abstract:

In this paper, the signaling scheme using phase shifting is proposed for the improved performance of the Wi-Fi backscatter system. Because the communication in the Wi-Fi backscatter system is based on on-off modulation and impedance modulation by unit of packet, the data rate is very low compared to the conventional wireless systems. Also, because the Wi-Fi backscatter system is based on the RF-powered device, the achievement of high reliability is difficult. In order to increase the low data rate, the proposed scheme transmits information of multiple bits during one packet period. Also, in order to increase the reliability, the proposed scheme shifts the phase of signal in according to the transmitting information. The simulation result shows that the proposed scheme has the improved throughput performance.

Keywords: phase shifting, RF-powered device, Wi-Fi backscatter system, IoT

Procedia PDF Downloads 412
25590 Effect of Martensite Content and Its Morphology on Mechanical Properties of Microalloyed Dual Phase Steel

Authors: M. K. Manoj, V. Pancholi, S. K. Nath

Abstract:

Microalloyed dual phase steels have been prepared by intercritical austenitisation (ICA) treatment of normalized steel at different temperature and time. Water quenching wad carried to obtain different martensite volume fraction (MVF) in DP steels. DP steels and normalized steels have been characterized by optical and scanning electron microscopy, Vickers hardness measurements and tensile properties determination. The effect of MVF and martensite morphology on mechanical properties and fracture behavior of microalloyed dual phase steels have been explained in the present work.

Keywords: dual phase steel, martensite morphology, hardness, tensile strength

Procedia PDF Downloads 300
25589 Efficient Signal Detection Using QRD-M Based on Channel Condition in MIMO-OFDM System

Authors: Jae-Jeong Kim, Ki-Ro Kim, Hyoung-Kyu Song

Abstract:

In this paper, we propose an efficient signal detector that switches M parameter of QRD-M detection scheme is proposed for MIMO-OFDM system. The proposed detection scheme calculates the threshold by 1-norm condition number and then switches M parameter of QRD-M detection scheme according to channel information. If channel condition is bad, the parameter M is set to high value to increase the accuracy of detection. If channel condition is good, the parameter M is set to low value to reduce complexity of detection. Therefore, the proposed detection scheme has better trade off between BER performance and complexity than the conventional detection scheme. The simulation result shows that the complexity of proposed detection scheme is lower than QRD-M detection scheme with similar BER performance.

Keywords: MIMO-OFDM, QRD-M, channel condition, BER

Procedia PDF Downloads 332
25588 A Secure Proxy Signature Scheme with Fault Tolerance Based on RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Due to the rapid growth in modern communication systems, fault tolerance and data security are two important issues in a secure transaction. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a secure proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: proxy signature, fault tolerance, rsa, key agreement protocol

Procedia PDF Downloads 255
25587 A Study of Curriculum for a Dual Bachelor’s Degree Including a Teaching Certificate

Authors: Hyeon Seok Kim, Inhoi Lee, Seong Baeg Kim, Kyunghee Ko, Kyung Eon Lee, Dong Sik Kang

Abstract:

In the age of globalization, higher education institutions attempt to equip students with global competence. In response, most universities have been developing and running various international programs. However, teacher education has been a neglected area in this trend. Therefore, in this study, we suggest a program that offers a dual bachelor’s degree from both universities located on different countries, focusing on teacher education institutions with different policies and regulations of teacher education programs that may become obstacles to designing a dual degree program. We discuss a possible way to get a dual degree including a teaching certificate at a specialized college, college of secondary education. To be specific, this research presents a way to attain two diplomas from Jeju National University (JNU) in Korea and Boise State University (BSU) in the U.S. It attempts to build an effective plan for students to declare simultaneous degrees at both universities. From the study, we find that it takes about 5 years to fulfill requirements for the dual degree at the undergraduate level.

Keywords: dual degree, curriculum, teaching certificate, college of secondary education, international program

Procedia PDF Downloads 262
25586 Improved Performance of Cooperative Scheme in the Cellular and Broadcasting System

Authors: Hyun-Jee Yang, Bit-Na Kwon, Yong-Jun Kim, Hyoung-Kyu Song

Abstract:

In the cooperative transmission scheme, both the cellular system and broadcasting system are composed. Two cellular base stations (CBSs) communicating with a user in the cell edge use cooperative transmission scheme in the conventional scheme. In the case that the distance between two CBSs and the user is distant, the conventional scheme does not guarantee the quality of the communication because the channel condition is bad. Therefore, if the distance between CBSs and a user is distant, the performance of the conventional scheme is decreased. Also, the bad channel condition has bad effects on the performance. The proposed scheme uses two relays to communicate well with CBSs when the channel condition between CBSs and the user is poor. Using the relay in the high attenuation environment can obtain both advantages of the high bit error rate (BER) and throughput performance.

Keywords: cooperative communications, diversity gain, OFDM, interworking system

Procedia PDF Downloads 543
25585 Improved Performance Scheme for Joint Transmission in Downlink Coordinated Multi-Point Transmission

Authors: Young-Su Ryu, Su-Hyun Jung, Myoung-Jin Kim, Hyoung-Kyu Song

Abstract:

In this paper, improved performance scheme for joint transmission is proposed in downlink (DL) coordinated multi-point(CoMP) in case of constraint transmission power. This scheme is that serving transmission point (TP) request a joint transmission to inter-TP and selects one pre-coding technique according to channel state information(CSI) from user equipment(UE). The simulation results show that the bit error rate(BER) and throughput performances of the proposed scheme provide high spectral efficiency and reliable data at the cell edge.

Keywords: CoMP, joint transmission, minimum mean square error, zero-forcing, zero-forcing dirty paper coding

Procedia PDF Downloads 524