• Title/Summary/Keyword: Detection of Probability

Search Result 1,123, Processing Time 0.03 seconds

Hybrid Spectrum Sensing System for Machine-to-Machine(M2M) (사물지능통신(M2M)을 위한 하이브리드 스펙트럼 센싱 시스템)

  • Kim, Nam-Sun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.2
    • /
    • pp.184-191
    • /
    • 2017
  • This paper presents cluster based hybrid spectrum sensing system for M2M services. For each cluster, secondary nodes within the transmission radius of the primary node use hard decision method through local spectrum sensing to determine whether the primary node exists. And the other secondary nodes and the secondary nodes having poor radio channel conditions judge the existence of the primary node through the soft decision method of the values obtained by performing the cooperative spectrum sensing. In the proposed hybrid spectrum sensing system, the performance according to the number of secondary nodes is analyzed with the conventional system over Rayleigh fading channel. As the number of cooperative sensing users increased to 2, 3 and 4, the cluster error probability decreased to 0.5608, 0.5252 and 0.4001 at SNR of -10[dB] respectively. Since the proposed system uses less overhead traffic, it is found that it is more effective in terms of frequency usage than the conventional system using soft decision-soft decision and soft decision-hard decision methods.

A Study on Resource Allocations of Multi Function Radar in a Warship (함정의 다기능레이더(MFR) 자원할당 방안에 관한 연구)

  • Park, Young-Man;Lee, Jinho;Cho, Hyunjin;Park, Kyeongju;Kim, Ha-Chul;Lim, Yo-Joon;Kim, Haekeun;Lee, Hochul;Chung, Suk-Moon
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.1
    • /
    • pp.67-79
    • /
    • 2019
  • A warship equipped with Multi Function Radar(MFR) performs operations by evaluating the degree of threats based on threats' symptom and allocating the resource of MFR to the corresponding threats. This study suggests a simulation-based approach and greedy algorithm in order to effectively allocate the resource of an MFR for warships, and compares these two approaches. As a detection probability function depending on the amount of allocations to each threat, we consider linear and exponential functions. Experimental results show that both the simulation-based approach and greedy algorithm allocate resource similarly to the randomly generated threats, and the greedy algorithm outperforms the simulation-based approach in terms of computational perspective. For a various cases of threats, we analyze the results of MFR resource allocation using the greedy algorithm.

Development of GK2A Convective Initiation Algorithm for Localized Torrential Rainfall Monitoring (국지성 집중호우 감시를 위한 천리안위성 2A호 대류운 전조 탐지 알고리즘 개발)

  • Park, Hye-In;Chung, Sung-Rae;Park, Ki-Hong;Moon, Jae-In
    • Atmosphere
    • /
    • v.31 no.5
    • /
    • pp.489-510
    • /
    • 2021
  • In this paper, we propose an algorithm for detecting convective initiation (CI) using GEO-KOMPSAT-2A/advanced meteorological imager data. The algorithm identifies clouds that are likely to grow into convective clouds with radar reflectivity greater than 35 dBZ within the next two hours. This algorithm is developed using statistical and qualitative analysis of cloud characteristics, such as atmospheric instability, cloud top height, and phase, for convective clouds that occurred on the Korean Peninsula from June to September 2019. The CI algorithm consists of four steps: 1) convective cloud mask, 2) cloud object clustering and tracking, 3) interest field tests, and 4) post-processing tests to remove non-convective objects. Validation, performed using 14 CI events that occurred in the summer of 2020 in Korean Peninsula, shows a total probability of detection of 0.89, false-alarm ratio of 0.46, and mean lead-time of 39 minutes. This algorithm can be useful warnings of rapidly developing convective clouds in future by providing information about CI that is otherwise difficult to predict from radar or a numerical prediction model. This CI information will be provided in short-term forecasts to help predict severe weather events such as localized torrential rainfall and hail.

Statistical Verification of Precipitation Forecasts from MM5 for Heavy Snowfall Events in Yeongdong Region (영동대설 사례에 대한 MM5 강수량 모의의 통계적 검증)

  • Lee, Jeong-Soon;Kwon, Tae-Yong;Kim, Deok-Rae
    • Atmosphere
    • /
    • v.16 no.2
    • /
    • pp.125-139
    • /
    • 2006
  • Precipitation forecasts from MM5 have been verified for the period 1989-2001 over Yeongdong region to show a tendency of model forecast. We select 57 events which are related with the heavy snowfall in Yeongdong region. They are classified into three precipitation types; mountain type, cold-coastal type, and warm type. The threat score (TS), the probability of detection (POD), and the false-alarm rate (FAR) are computed for categorical verification and the mean squared error (MSE) is also computed for scalar accuracy measures. In the case of POD, warm, mountain, and cold-coastal precipitation type are 0.71, 0.69, and 0.55 in turn, respectively. In aspect of quantitative verification, mountain and cold-coastal type are relatively well matched between forecasts and observations, while for warm type MM5 tends to overestimate precipitation. There are 12 events for the POD below 0.2, mountain, cold-coastal, warm type are 2, 7, 3 events, respectively. Most of their precipitation are distributed over the East Sea nearby Yeongdong region. These events are also shown when there are no or very weak easterlies in the lower troposphere. Even in the case that we use high resolution sea surface temperature (about 18 km) for the boundary condition, there are not much changes in the wind direction to compare that with low resolution sea surface temperature (about 100 km).

Design and Performance Analysis of an Enhanced MAC Algorithm for the IEEE 802.11 DCF (IEEE 802.11 DCF 성능 개선을 위한 매체접근제어 알고리즘의 설계 및 성능 분석)

  • Hwang, An-Kyu;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.10 s.340
    • /
    • pp.39-50
    • /
    • 2005
  • In this paper, we propose a performance improving MAC algerian for the IEEE 802.11 DCF. WLAN based IEEE 802.11 uses two control methods called 'Distributed Coordination Function(UF)' and 'Point Coordination Function(PCF)'. The nF controls the Urnsmission based on carrier sense multiple access with collision detection(CSMA/CA), that decides a random backoff time with the range of contention window for each terminal. Normally, each terminal the CW double after collision, and reduces the CW to the minimum after successful transmission. This paper proposes an enhanced DCF algorithm that decreases the CW smoothly after successful transmission in order to reduce the collision Probability by utilizing the current status information of WLAN. We also analyze the throughput and delay performance for the unsaturated case mathematically. Simulation results show that our algorithm enhances the saturation throughput of WLAN. They also coincide well with the analytical results.

Detection of Disguised Packet and Valid Reconstruction Identification Using Network Coding in IoT Environment (IoT 환경에서 네트워크 코딩의 위장패킷 탐지와 유효한 복구의 식별 알고리즘)

  • Lee, Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.29-37
    • /
    • 2020
  • Work to improve network throughput has been focused on network coding as the utilization of IoT-based application services increases and network usage increases rapidly. In network coding, nodes transform packets received from neighboring nodes into a combination of encoded packets for transmission and decoding at the destination. This scheme is based on trust among nodes, but in the IoT environment where nodes are free to join, a malicious node can fabricate the packet if it legally participates in the configuration. It is difficult to identify the authenticity of the encoded packet since the packet received at destination is not a single source but a combination of packets generated by several nodes. In this paper, we propose a method to detect "look-like-valid" packets that have been attacked and disguised in packets received at destination, and to identify valid messages in the reconstructions. This method shows that network coding performance is significantly improved because the destination can reconstruct a valid message with only received packets without retransmission with a high probability, despite the presence of disguised packets.

A Key distribution Scheme for Information Security at Wireless Sensor Networks (무선 센서 네트워크에서 정보 보호를 위한 키 분배 기법)

  • Kim, Hoi-Bok;Shin, Jung-Hoon;Kim, Hyoung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.51-57
    • /
    • 2009
  • Wireless sensor networks consist of numerous sensor nodes that have inexpensive and limited resources. Generally, most of the sensors are assigned to the hazardous or uncontrollable environments. If the sensor nodes are randomly assigned to the wide target area, it is very hard to see the accurate locations of sensor nodes. Therefore, this study provides an efficient key distribution scheme to solve these problems. Based on the provided scheme, the study enabled the closely neighboring nodes to exchange information with each other after securing safe links by using the pre-distributed keys. At the same time, the provided scheme could increase the probability of multiparty key detection among nodes by using the location information of sensor node. Lastly, the study intended to show the superiority of the limitation method through a performance test.

Sybil Attack Detection with Energy Efficiency in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 시빌 공격 탐지)

  • Heo, Junyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.115-120
    • /
    • 2013
  • There are lots of vulnerability and chance to be attacked in wireless sensor networks, which has many applications. Among those attacks, sybil attack is to generate a lot of false node and to inject false information into networks. When a user uses such false information without recognizing the attack, there might be a disaster. Although authentication method can be used to protect such attack, the method is not a good choice in wireless sensor networks, where sensor nodes have a limited battery and low power. In this paper, we propose a novel method to detect sybil attack with a little extra overhead. The proposed method use the characteristics that there is a weak connection between a group of normal nodes and a group of false nodes. In addition, the method uses energy aware routing based on random routing and adds a little information into the routing. Experimental results show that the proposed method detects false node by more than 90% probability with a little energy overhead.

Elliptical Clustering with Incremental Growth and its Application to Skin Color Region Segmentation (점증적으로 증가하는 타원형 군집화 : 피부색 영역 검출에의 적용)

  • Lee Kyoung-Mi
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1161-1170
    • /
    • 2004
  • This paper proposes to segment skin color areas using a clustering algorithm. Most of previously proposed clustering algorithms have some difficulties, since they generally detect hyperspherical clusters, run in a batch mode, and predefine a number of clusters. In this paper, we use a well-known elliptical clustering algorithm, an EM algorithm, and modify it to learn on-line and find automatically the number of clusters, called to an EAM algorithm. The effectiveness of the EAM algorithm is demonstrated on a task of skin color region segmentation. Experimental results present the EAM algorithm automatically finds a right number of clusters in a given image without any information on the number. Comparing with the EM algorithm, we achieved better segmentation results with the EAM algorithm. Successful results were achieved to detect and segment skin color regions using a conditional probability on a region. Also, we applied to classify images with persons and got good classification results.

The Effectiveness of Independent Verification and Validation of Safety-critical Aviation Systems (항공 안전 필수 시스템에 대한 독립적 검증 및 확인의 효과도 분석)

  • Kim, Young-Hoon;Yoo, Beong-Seon;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.2
    • /
    • pp.155-162
    • /
    • 2017
  • In recent years, aviation-related safety-critical systems have been developed in Korea, but these products have not satisfied the specified requirements and thus have not been commercialized or commercialized. Due to increasing complexity of the modern aviation system, traditional verification and validation techniques are not sufficient to identify and reduce latent risks in the system. To overcome this shortcoming, a new method which is called 'Independent verification and validation (IV&V)' is suggested. However, academic researches on the effectiveness of this independent verification and validation have not been conducted domestically, and it is performed very rarely even overseas. Therefore, in this paper, we investigated the application of independent verification and validation of the safety-critical aviation systems performed by advanced aviation organizations, and analyzed various positive effects on projects. As a result of the analysis, IV&V shows that early error detection rate is increased, potential risk is mitigated early, and the complex reworking probability, which appears later in the development life cycle, is reduced, greatly preventing the development schedule and costs from increasing.