• 제목/요약/키워드: Computer Networks

검색결과 5,189건 처리시간 0.035초

eMCCA: An Enhanced Mesh Coordinated Channel Access Mechanism for IEEE 802.11s Wireless Mesh Networks

  • Islam, Md. Shariful;Alam, Muhammad Mahbub;Hong, Choong-Seon;Lee, Sung-Won
    • Journal of Communications and Networks
    • /
    • 제13권6호
    • /
    • pp.639-654
    • /
    • 2011
  • In this paper, we present a channel access mechanism, referred to as the enhanced mesh coordinated channel access (eMCCA) mechanism, for IEEE 802.11s-based wireless mesh networks. The current draft of IEEE 802.11s includes an optional medium access control (MAC), denoted as MCCA, which is designed to provide collision-free and guaranteed channel access during reserved periods. However, the MCCA mechanism fails to achieve the desired goal in the presence of contending non-MCCA nodes; this is because non-MCCA nodes are not aware of MCCA reservations and have equal access opportunities during reserved periods. We first present a probabilistic analysis that reveals the extent to which the performance of MCCA may be affected by contending non-MCCA nodes. We then propose eMCCA, which allows MCCA-enabled nodes to enjoy collision-free and guaranteed channel access during reserved periods by means of prioritized and preemptive access mechanisms. Finally, we evaluate the performance of eMCCA through extensive simulations under different network scenarios. The simulation results indicate that eMCCA outperforms other mechanisms in terms of success rate, network throughput, end-to-end delay, packet-loss rate, and mesh coordinated channel access opportunity-utilization.

Energy-Aware QoS Provisioning for Wireless Sensor Networks: Analysis and Protocol

  • Alam, Muhammad Mahbub;Razzaque, Abdur;Mamun-Or-Rashid, Mamun-Or-Rashid;Hong, Choong-Seon
    • Journal of Communications and Networks
    • /
    • 제11권4호
    • /
    • pp.390-405
    • /
    • 2009
  • Wireless sensor networks (WSNs) are envisioned to facilitate information gathering for various applications and depending on the application types they may require certain quality of service (QoS) guarantee for successful and guaranteed event perception. Therefore, QoS in WSNs is an important issue and two most important parameters that hinder the goal of guaranteed event perception are time-sensitive and reliable delivery of gathered information, while a minimum energy consumption is desired. In this paper, we propose an energy-aware, multi-constrained and multipath QoS provisioning mechanism for WSNs based on optimization approach. Hence, a detailed analytical analysis of reliability, delay and energy consumption is presented to formulate the optimization problem in an analytical way. A greedy algorithm is proposed to achieve the desired QoS guarantee while keeping the energy consumption minimum. Also, a simple but efficient retransmission mechanism is proposed to enhance the reliability further, while keeping the delay within delay bound. Simulation results demonstrate the effectiveness of our scheme.

Dynamic Cell Reconfiguration Framework for Energy Conservation in Cellular Wireless Networks

  • Son, Kyuho;Guruprasad, Ranjini;Nagaraj, Santosh;Sarkar, Mahasweta;Dey, Sujit
    • Journal of Communications and Networks
    • /
    • 제18권4호
    • /
    • pp.567-579
    • /
    • 2016
  • Several energy saving techniques in cellular wireless networks such as active base station (BS) selection, transmit power budget adaptation and user association have been studied independently or only part of these aspects have been considered together in literature. In this paper, we jointly tackle these three problems and propose an integrated framework, called dynamic cell reconfiguration (DCR). It manages three techniques operating on different time scales for ultimate energy conservation while guaranteeing the quality of service (QoS) level of users. Extensive simulations under various configurations, including the real dataset of BS topology and utilization, demonstrate that the proposed DCR can achieve the performance close to an optimal exhaustive search. Compared to the conventional static scheme where all BSs are always turned on with their maximum transmit powers, DCR can significantly reduce energy consumption, e.g., more than 30% and 50% savings in uniform and non-uniform traffic distribution, respectively.

영상변형:얼굴 스케치와 사진간의 증명가능한 영상변형 네트워크 (Image Translation: Verifiable Image Transformation Networks for Face Sketch-Photo and Photo-Sketch)

  • 숭타이리엥;이효종
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2019년도 춘계학술발표대회
    • /
    • pp.451-454
    • /
    • 2019
  • In this paper, we propose a verifiable image transformation networks to transform face sketch to photo and vice versa. Face sketch-photo is very popular in computer vision applications. It has been used in some specific official departments such as law enforcement and digital entertainment. There are several existing face sketch-photo synthesizing methods that use feed-forward convolution neural networks; however, it is hard to assure whether the results of the methods are well mapped by depending only on loss values or accuracy results alone. In our approach, we use two Resnet encoder-decoder networks as image transformation networks. One is for sketch-photo and another is for photo-sketch. They depend on each other to verify their output results during training. For example, using photo-sketch transformation networks to verify the photo result of sketch-photo by inputting the result to the photo-sketch transformation networks and find loss between the reversed transformed result with ground-truth sketch. Likely, we can verify the sketch result as well in a reverse way. Our networks contain two loss functions such as sketch-photo loss and photo-sketch loss for the basic transformation stages and the other two-loss functions such as sketch-photo verification loss and photo-sketch verification loss for the verification stages. Our experiment results on CUFS dataset achieve reasonable results compared with the state-of-the-art approaches.

도로 네트워크 환경에서 이동 객체의 현재 위치 관리를 위한 효율적인 색인 기법 (Effective indexing of moving objects for current position management in Road Networks)

  • 김태규;신숭선;정원일;배해영
    • 한국컴퓨터정보학회논문지
    • /
    • 제16권10호
    • /
    • pp.33-43
    • /
    • 2011
  • 최근 위치 확인 기술과 이동 통신의 발전에 따라 이동 객체의 위치에 기반한 서비스의 요구가 증가하고 있다. 이에 따라, 이동 객체의 위치 정보를 관리할 수 있는 다양한 색인에 대한 연구가 진행되고 있다. 유클리드 공간의 색인은 이동의 제약이 없기 때문에 이동의 제약이 강한 실세계에 적용하기 어렵다. 도로 네트워크 공간의 색인의 경우에는 인접도로의 연결 정보 알기 위해 추가적인 비용이 드는 문제점이 있다. 또한, 기존의 연구들은 건물, 병원과 같은 위치가 고정되어 있는 객체는 고려하지 않고 있다. 본 논문에서는 도로 네트워크 공간에서 이동 객체의 현재 위치를 효율적으로 관리하기 위한 색인을 제안한다. 제안하는 색인 구조는 도로망을 격자로 분할하여 도로 연결 정보를 색인 구조에포함하였고 고정 객체를 위해 별도의 색인을 유지한다. 그리고 실험을 통하여 기존의 기법보다 제안 색인의 성능이 우수함을 보인다.

A Handover Management Scheme Based on User-Preferences and Network-Centric Approach

  • Khan, Murad;Park, Gisu;Cho, Wooseong;Seong, Gihyuk;Han, Kijun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권1호
    • /
    • pp.344-357
    • /
    • 2015
  • With the increase in a number of access technologies and data rates, a continuous connection among different networks is demand of the future wireless networks. In the last decade, user connectivity among different access networks remained a challenging job. Therefore, in this article, we proposed a user-centric and user-perspective based network selection mechanism for fast handover management in heterogeneous wireless networks. The proposed scheme selects the most appropriate network among available networks on the basis of resources i.e. cost, data rate, and link quality. Initially, we load the Media Independent Information Service (MIIS) with the information of cost and data rate provided by different network operators. Similarly, Mobile Node (MN) is also loaded with the user preferred cost and data rate for different applications. The MN obtains the information of cost and data rate from MIIS server upon a predefined threshold, and make a decision for handover according to its current cost and data rate. Furthermore, we employ an optimal threshold mechanism for initiation of the handover execution phase to minimize false handover indications. The proposed scheme is based on a survey for network selection and its implementation in C programming language to validate its performance and accuracy. The simulation result shows that the proposed scheme performs superior then the schemes present in the current literature.

Game Theory for Routing Modeling in Communication Networks - A Survey

  • Pavlidou, Fotini-Niovi;Koltsidas, Georgios
    • Journal of Communications and Networks
    • /
    • 제10권3호
    • /
    • pp.268-286
    • /
    • 2008
  • In this work, we review the routing models that use game theoretical methodologies. A very common assumption in the analysis and development of networking algorithms is the full cooperation of the participating nodes. Most of the analytical tools are based on this assumption. However, the reality may differ considerably. The existence of multiple domains belonging to different authorities or even the selfishness of the nodes themselves could result in a performance that significantly deviates from the expected one. Even though it is known to be extensively used in the fields of economics and biology, game theory has attracted the interest of researchers in the field of communication networking as well. Nowadays, game theory is used for the analysis and modeling of protocols in several layers, routing included. This review aims at providing an elucidation of the terminology and principles behind game theory and the most popular and recent routing models. The examined networks are both the traditional networks where latency is of paramount importance and the emerging ad hoc and sensor networks, where energy is the main concern.

Lightpaths Routing for Single Link Failure Survivability in IP-over-WDM Networks

  • Javed, Muhammad;Thulasiraman, Krishnaiyan;Xue, Guoliang(Larry)
    • Journal of Communications and Networks
    • /
    • 제9권4호
    • /
    • pp.394-401
    • /
    • 2007
  • High speed all optical network is a viable option to satisfy the exponential growth of internet usage in the recent years. Optical networks offer very high bit rates and, by employing technologies like internet protocol over wavelength division multiplexing(IP-over-WDM), these high bit rates can be effectively utilized. However, failure of a network component, carrying such high speed data traffic can result in enormous loss of data in a few seconds and persistence of a failure can severely degrade the performance of the entire network. Designing IP-over-WDM networks, which can withstand failures, has been subject of considerable interest in the research community recently. Most of the research is focused on the failure of optical links in the network. This paper addresses the problem of designing IP-over-WDM networks that do not suffer service degradation in case of a single link failure. The paper proposes an approach based on the framework provided by a recent paper by M. Kurant and P. Thiran. The proposed approach can be used to design large survivable IP-over-WDM networks.

영상 잡음 제거 필터를 위한 퍼지 순환 신경망 연구 (A study on the Fuzzy Recurrent Neural Networks for the image noise elimination filter)

  • 변오성
    • 한국컴퓨터정보학회논문지
    • /
    • 제16권6호
    • /
    • pp.61-70
    • /
    • 2011
  • 본 논문은 퍼지를 적용한 순환 신경망을 이용하여 잡음 제거용 필터를 구현하였다. 제안된 퍼지 순환 신경망 구조는 기본적으로 순환 신경망 구조를 이용하여 가중치 및 반복횟수가 일정한 값에 수렴하도록 하였으며, 하이브리드 퍼지 소속 함수 연산자를 적용하여 수학적인 계산량 및 복잡성를 단순화하였다. 본 논문은 제안된 퍼지 순환 신경망 구조 필터가 일반적인 순환 신경망 구조 필터보다 평균 0.38dB 정도 영상복원이 개선됨을 PSNR을 이용하여 증명하였다. 또한 결과 영상 비교에서 제안된 방법을 적용하여 얻은 영상이 기존 방법을 적용하여 얻은 영상보다 원영상과 더 유사함을 확인하였다.

Generative Adversarial Networks: A Literature Review

  • Cheng, Jieren;Yang, Yue;Tang, Xiangyan;Xiong, Naixue;Zhang, Yuan;Lei, Feifei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권12호
    • /
    • pp.4625-4647
    • /
    • 2020
  • The Generative Adversarial Networks, as one of the most creative deep learning models in recent years, has achieved great success in computer vision and natural language processing. It uses the game theory to generate the best sample in generator and discriminator. Recently, many deep learning models have been applied to the security field. Along with the idea of "generative" and "adversarial", researchers are trying to apply Generative Adversarial Networks to the security field. This paper presents the development of Generative Adversarial Networks. We review traditional generation models and typical Generative Adversarial Networks models, analyze the application of their models in natural language processing and computer vision. To emphasize that Generative Adversarial Networks models are feasible to be used in security, we separately review the contributions that their defenses in information security, cyber security and artificial intelligence security. Finally, drawing on the reviewed literature, we provide a broader outlook of this research direction.