5 research outputs found

    Active User Detection for Massive Machine-type Communications via Dimension Spreading Deep Neural Network

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ •๋ณด๊ณตํ•™๋ถ€, 2019. 2. ์‹ฌ๋ณ‘ํšจ.๋Œ€์šฉ๋Ÿ‰ ์‚ฌ๋ฌผ ํ†ต์‹  (massive machine type communication, mMTC)์€ ๋‹ค์ˆ˜์˜ ์‚ฌ๋ฌผ ํ†ต์‹  ๊ธฐ๊ธฐ๋“ค์ด ๊ธฐ์ง€๊ตญ์— ์ ‘์†ํ•˜๋Š” ์ƒํ™ฉ๊ณผ ๊ด€๊ณ„๊ฐ€ ์žˆ๋‹ค. ๋Œ€๊ทœ๋ชจ ์—ฐ๊ฒฐ์„ฑ์„ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•˜์—ฌ ์ตœ๊ทผ์— ๋น„์Šน์ธ ์ ‘์†๊ณผ ๋น„์ง๊ต ๋‹ค์ค‘ ์ ‘์† (non-orthogonal multiple access, NOMA)์ด ๊ณ ๋ ค๋˜์—ˆ๋‹ค. ๋น„์Šน์ธ ๊ธฐ๋ฐ˜ ์ „์†ก ์‹œ, ๊ฐ ๊ธฐ๊ธฐ๋Š” ์Šน์ธ ์ ˆ์ฐจ ์—†์ด ์ •๋ณด๋ฅผ ์ „์†กํ•˜๊ธฐ ๋•Œ๋ฌธ์— ๊ธฐ์ง€๊ตญ์€ ๋ชจ๋“  ๊ธฐ๊ธฐ๋“ค ์ค‘ ํ™œ์„ฑ ์ƒํƒœ์— ์žˆ๋Š” ๊ธฐ๊ธฐ๋“ค๋งŒ์„ ๊ฒ€์ถœํ•˜๋Š” ๊ณผ์ •์„ ์ˆ˜ํ–‰ํ•ด์•ผ ํ•œ๋‹ค. ์ด๋Ÿฌํ•œ ์ ˆ์ฐจ๋ฅผ ํ™œ์„ฑ ๊ธฐ๊ธฐ ๊ฒ€์ถœ (active user detection, AUD)์ด๋ผ๊ณ  ํ•˜๋ฉฐ, ๋น„์ง๊ต ๋‹ค์ค‘ ์ ‘์† ๊ธฐ๋ฐ˜์˜ ์‹œ์Šคํ…œ์—์„œ๋Š” ์ˆ˜์‹  ์‹ ํ˜ธ์— ํ™œ์„ฑ ๊ธฐ๊ธฐ๋“ค์˜ ์‹ ํ˜ธ๋“ค์ด ์ค‘์ฒฉ๋˜์–ด ์žˆ๊ธฐ ๋•Œ๋ฌธ์— ํ™œ์„ฑ ๊ธฐ๊ธฐ๋ฅผ ๊ฒ€์ถœํ•˜๋Š” ๊ฒƒ์€ ์–ด๋ ค์šด ๋ฌธ์ œ์ด๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์ „์ฒด ๊ธฐ๊ธฐ์˜ ์ˆ˜๊ฐ€ ๋งค์šฐ ๋งŽ์€ ๋Œ€์šฉ๋Ÿ‰ ์‚ฌ๋ฌผ ํ†ต์‹ ์— ์ ํ•ฉํ•œ ์ƒˆ๋กœ์šด ๋ฐฉ์‹์˜ ํ™œ์„ฑ ๊ธฐ๊ธฐ ๊ฒ€์ถœ ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. ์ด ๊ธฐ์ˆ ์„ ์ฐจ์› ํ™•์žฅ ์‹ฌ์ธต ์‹ ๊ฒฝ๋ง ๊ธฐ๋ฐ˜์˜ ํ™œ์„ฑ ๊ธฐ๊ธฐ ๊ฒ€์ถœ (dimension spreading deep neural network based active user detection, DSDNN-AUD)์ด๋ผ๊ณ  ๋ช…๋ช…ํ•˜๋ฉฐ, ๋ณธ ๊ธฐ์ˆ ์˜ ํ•ต์‹ฌ์ ์ธ ํŠน์ง•์€ ์€๋‹‰์ธต์˜ ์ฐจ์›์„ ์†ก์‹  ์ •๋ณด ๋ฒกํ„ฐ์˜ ํฌ๊ธฐ๋ณด๋‹ค ํฌ๊ฒŒ ์„ค์ •ํ•จ์œผ๋กœ์จ ์„œํฌํŠธ ๊ฒ€์ถœ ๋Šฅ๋ ฅ์„ ํ–ฅ์ƒ์‹œํ‚ค๋Š” ๊ฒƒ์ด๋‹ค. ๋ชจ์˜ ์‹คํ—˜ ๊ฒฐ๊ณผ๋ฅผ ํ†ตํ•ด ์ œ์•ˆํ•˜๋Š” ํ™œ์„ฑ ๊ธฐ๊ธฐ ๊ฒ€์ถœ ๊ธฐ์ˆ ์ด ๊ธฐ์กด์˜ ๊ธฐ๋ฒ•๋“ค๋ณด๋‹ค ํ™œ์„ฑ ๊ธฐ๊ธฐ ๊ฒ€์ถœ ์„ฑ๊ณต ํ™•๋ฅ ๊ณผ ์Šค๋ฃจํ’‹ ์„ฑ๋Šฅ ๊ด€์ ์—์„œ ์šฐ์ˆ˜ํ•จ์„ ํ™•์ธํ–ˆ๋‹ค.Massive machine-type communication (mMTC) concerns the access of massive machine-type communication devices to the basestation. To support the massive connectivity, grant-free access and non-orthogonal multiple access (NOMA) have been recently introduced. In the grant-free transmission, each device transmits information without the granting process so that the basestation needs to identify the active devices among all potential devices. This process, called an active user detection (AUD), is a challenging problem in the NOMA-based systems since it is difficult to find out the active devices from the superimposed received signal. An aim of this paper is to propose a new type of AUD scheme suitable for the highly overloaded mMTC, referred to as dimension spreading deep neural network-based AUD (DSDNN-AUD). The key feature of DSDNN-AUD is to set the dimension of hidden layers being larger than the size of a transmit vector to improve the representation quality of the support. Numerical results demonstrate that the proposed AUD scheme outperforms the conventional approaches in both AUD success probability and throughput performance.1 Introduction 2 Grant-free Non-orthogonal Multiple Access 2.1 AUD System Model 2.2 Conventional AUD 3 Support Function Approximation via DNN 3.1 Network Description 3.2 Training Issue in DSDNN 4 Simulations and Discussions 4.1 Simulation Setup 4.2 Simulation Results 5 ConclusionMaste

    ๋‘๊ฒฝ๋ถ€์•”์˜ ์ข…์–‘ํ‘œ์ง€์ž๋กœ์„œ glutathione S-transferase ฯ€์— ๊ด€ํ•œ ํ˜ˆ์ฒญํ•™์  ๋ฐ ๋ฉด์—ญ์กฐ์งํ™”ํ•™์  ์—ฐ๊ตฌ

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :์น˜์˜ํ•™๊ณผ ๊ตฌ๊ฐ•์•…์•ˆ์™ธ๊ณผํ•™์ „๊ณต,1995.Maste

    ๊ตฌ๊ฐ•ํŽธํ‰์„ธํฌ์•”์ข…์˜ ์˜ˆํ›„์ธ์ž๋กœ์„œ ์ž„ํŒŒ์ ˆ์—์„œ์˜ CK 5, CEA ๋ฐ survivin์˜ mRNA๋ฐœํ˜„

    No full text
    Thesis(doctoral)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :์น˜์˜ํ•™๊ณผ ๊ตฌ๊ฐ•์•…์•ˆ๋ฉด์™ธ๊ณผํ•™์ „๊ณต,2005.Docto

    Microanatomy of Philtral ridge

    No full text
    Many efforts are made to achieve satisfactory cosmetic and functional result in the repair of cleft lip. However, repair may be complicated in many cases by distortion of the vermilion border, obliteration of the normal contour of the philtrum, and eclabium in spite of many methods used in these days. To achieve better results in cleft lip repair, thorough understandings of the relationship between the surface morphology of the upper and lower lip and the underlying musculature is necessary but reports about this topic is rare. So, our studies were performed on the full-thickness upper lips containing both philtral ridge up to columelar base and lower lip, 4 post-mortem specimens of 2 females and 2 males aged from 16 to 42, using serial histological sections taken in the transverse and vertical planes under light microscopy. Thorough understanding of the anatomical relationships is established and on the basis of our findings, we can postulate some criteria to create a normal and natural philtrum in a patient with a cleft lip, it would be necessary to restore the normal deep muscle attachments and superficial dermal attachments of the orbicularis muscle, to close the lip without tension, to restore thickness of the philtral ridge, and to minimise nonelastic scar tissue

    Open rhinoplasty in cleft nasal repair

    No full text
    ์ €์ž๋“ค์€ 1991๋…„์—์„œ 1999๋…„๊นŒ์ง€ 13๋ก€์˜ ๊ตฌ์ˆœ์—ดํ™˜์ž์˜ ๊ฐœ๋ฐฉํ˜• ๋น„์„ฑํ˜•์ˆ ์„ ์‹œํ–‰ํ•˜์—ฌ ๋น„๋ณ€ํ˜•์ด ํŠนํžˆ ์‹ฌํ•œ ๊ฒฝ์šฐ ์ข‹์€ ๊ฒฐ๊ณผ๋ฅผ ์–ป์—ˆ์œผ๋ฉฐ, ๊ฐœ๋ฐฉํ˜•๋น„์„ฑํ˜•์ˆ ์€ ์žฅ๋ ฅ์ด๋‚˜ ์™œ๊ณก์ด ์—†์ด ๋ณด๋‹ค ์ž์—ฐ์Šค๋Ÿฌ์šด ์ƒํƒœ์—์„œ ๋…ธ์ถœ์‹œํ‚ฌ ์ˆ˜ ์žˆ๊ธฐ ๋•Œ๋ฌธ์— ๋น„๋ณ€ํ˜•์˜ ๋” ์ •ํ™•ํ•œ ํ‰๊ฐ€๊ฐ€ ๊ฐ€๋Šฅํ•˜์˜€๋‹ค. ๊ทธ๋ฆฌ๊ณ  ๋น„๊ตฌ์กฐ๋ฅผ ๋” ๋งŒ์ด ๋…ธ์ถœ์‹œํ‚ฌ ์ˆ˜ ์žˆ์—ˆ๊ธฐ ๋•Œ๋ฌธ์— ์ˆ˜์ˆ ์ด ์šฉ์ดํ•˜์˜€์œผ๋ฉฐ, ๊ณจ์—ฐ๊ณจ ๊ตฌ์กฐ์˜ ๋ณ€๊ฒฝ์— ์žˆ์–ด ์ด์‹์ฒด์˜ ๋Œ€์นญ์  ์œ„์น˜ ๋ฐ ๊ณ ์ •ํ•˜๋Š”๋ฐ ๋งŽ์€ ์žฅ์ ์ด ์žˆ์—ˆ๋‹ค
    corecore