• Title/Summary/Keyword: Lightweight network

Search Result 280, Processing Time 0.025 seconds

Selective Inference in Modular Bayesian Networks for Lightweight Context Inference in Cell Phones (휴대폰에서의 경량 상황추론을 위한 모듈형 베이지안 네트워크의 선택적 추론)

  • Lee, Seung-Hyun;Lim, Sung-Soo;Cho, Sung-Bae
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.10
    • /
    • pp.736-744
    • /
    • 2010
  • Log data collected from mobile devices contain diverse and meaningful personal information. However, it is not easy to implement a context-aware mobile agent using this personal information due to the inherent limitation in mobile platform such as memory capacity, computation power and its difficulty of analysis of the data. We propose a method of selective inference for modular Bayesian Network for context-aware mobile agent with effectiveness and reliability. Each BN module performs inference only when it can change the result by comparing to the history module which contains evidences and posterior probability, and gets results effectively using a method of influence score of the modules. We adopt memory decay theory and virtual linking method for the evaluation of the reliability and conservation of casual relationship between BN modules, respectively. Finally, we confirm the usefulness of the proposed method by several experiments on mobile phones.

A Study on Development of Disaster Prevention Automation System on IT using One-chip Type PLC (원칩형 PLC를 이용한 IT 기반 방재용 자동화시스템 개발에 관한 연구)

  • Kwak, Dong-Kurl
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.16 no.2
    • /
    • pp.97-104
    • /
    • 2011
  • This paper deals with the quick and precise disaster prevention automation system (DPAS) based on information communication technology (IT) that detects fire and disasters in the building automatically and quickly and then activates the facilities to extinguish fire and disasters, monitoring such situation in a real time through wire-wireless communication network. The proposed DPAS is applied a programmable logic controller (PLC) of one-chip type which is smallsize and lightweight and also has highly sensitive-precise reliabilities. The one-chip type PLC analyzes detected signals from sensors in a case of fire and disasters, then activates fire extinguishing facilities for rapid suppression. The detected data is also transferred to a remote situation room through wire-wireless network of RS232c and bluetooth communication. The transferred data sounds an emergency alarm signal, and operates a monitoring program. The proposed DPAS based on IT will minimize the life and wealth loss from rapid measures while prevents fire and disasters.

A Time Synchronization Method of Sensor Network using Single Flooding Algorithm (단일 플러딩 라우팅 알고리즘을 활용한 센서 네트워크의 시간 동기화 기법)

  • Shin, Jae-Hyuck;Kim, Young-Sin;Jeon, Joong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.18C no.1
    • /
    • pp.15-22
    • /
    • 2011
  • Usually time synchronization is performed after routing tree is constructed. This thesis proposes a time synchronization algorithm combined with single-flooding routing tree construction algorithm in a single path. TSRA (Time Synchronization Routing Algorithm) uses routing packets to construct a routing tree. Two types of time information are added to the routing packet: one is the packet receiving time, and the other is the packet sending time. Time offset and transmission time-delay between parent node and child node could be retrieved from the added time information using LTS (Lightweight Time Synchronization) algorithm. Then parent node sends the time offset and transmission time to children nodes and children nodes can synchronize their time to the parent node time along the routing tree. The performance of proposed algorithm is compared to the TPSN (Timing-sync Protocol for Sensor Networks) which is known to have high accuracy using NS2 simulation tool. The simulation result shows that the accuracy of time synchronization is comparable to TPSN, the synchronization time of all sensor nodes is faster than TPSN, and the energy consumption is less than TPSN.

Hijacking Attack using Wireless Network Security Vulnerability in Drone and Its Countermeasure (드론의 무선 네트워크 보안 취약점을 이용한 탈취 및 대응)

  • Son, Juhwan;Sim, Jaebum;Lee, Jae-Gu;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.327-330
    • /
    • 2017
  • In recent years, Drone(lightweight unmanned aerial vehicle) is used for broadcast shooting, disaster scene, leisure, observation and military purposes. However, as the use of drones increases the threat of hacking is also rising. Especially when a flying drone is seized, a dangerous situation can occur which is abused regardless of the driver's intention. Already in Iran and China, there is a case of hacking and stealing the drones of other countries under reconnaissance. In this paper, we analyze the security vulnerabilities of Wi-Fi and Bluetooth communication in wireless network which are used in drones for stealing the commercial drones. The results provide a countermeasure to safeguard the drones against attempts by the unauthorized attacker to take out the drones.

  • PDF

A study on UAV (Unmanned Aerial Vehicle) Real Time Location Tracking Control Using Mobile Communication Network (이동통신망을 이용한 UAV(Unmanned Aerial Vehicle) 실시간 위치 추적 관제 방안에 관한 연구)

  • Choi, Hyun-Taek;Ryu, Gab-Sang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.535-544
    • /
    • 2017
  • In this paper, to overcome the limitation of information transmission and reception according to the RF system of UAV, it is necessary to check the position of many UAVs in flight on the basis of mobile communication and to make the LTE modem lightweight and low power And UAVs that are in operation are received and controlled. Through this study, we proposed a method to control real-time location tracking by connecting high-resolution images to the network anytime and anywhere. For this purpose, we propose the requirements and requirements of LTE modem using real-time high-speed data communication technology (3G, 4G LTE, Bluetooth) by presenting the communication module system of LTE-based UAV. N:N control system concept and implementation technology(Control system structure, control data flow chart, flight planning and transmission, real-time location tracking).

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN

  • Kakarla, Jagadeesh;Majhi, Banshidhar;Battula, Ramesh Babu
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1229-1242
    • /
    • 2017
  • In this paper, an interference aware distributed multi-channel MAC (IDMMAC) protocol is proposed for wireless sensor and actor networks (WSANs). The WSAN consists of a huge number of sensors and ample amount of actors. Hence, in the IDMMAC protocol a lightweight channel selection mechanism is proposed to enhance the sensor's lifetime. The IDMMAC protocol divides the beacon interval into two phases (i.e., the ad-hoc traffic indication message (ATIM) window phase and data transmission phase). When a sensor wants to transmit event information to the actor, it negotiates the maximum packet reception ratio (PRR) and the capacity channel in the ATIM window with its 1-hop sensors. The channel negotiation takes place via a control channel. To improve the packet delivery ratio of the IDMMAC protocol, each actor selects a backup cluster head (BCH) from its cluster members. The BCH is elected based on its residual energy and node degree. The BCH selection phase takes place whenever an actor wants to perform actions in the event area or it leaves the cluster to help a neighbor actor. Furthermore, an interference and throughput aware multi-channel MAC protocol is also proposed for actor-actor coordination. An actor selects a minimum interference and maximum throughput channel among the available channels to communicate with the destination actor. The performance of the proposed IDMMAC protocol is analyzed using standard network parameters, such as packet delivery ratio, end-to-end delay, and energy dissipation, in the network. The obtained simulation results indicate that the IDMMAC protocol performs well compared to the existing MAC protocols.

Fixed IP-port based Application-Level Internet Traffic Classification (고정 IP-port 기반 응용 레벨 인터넷 트래픽 분석에 관한 연구)

  • Yoon, Sung-Ho;Park, Jun-Sang;Park, Jin-Wan;Lee, Sang-Woo;Kim, Myung-Sup
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.205-214
    • /
    • 2010
  • As network traffic is dramatically increasing due to the popularization of Internet, the need for application traffic classification becomes important for the effective use of network resources. In this paper, we present an application traffic classification method based on fixed IP-port information. A fixed IP-port is a {IP address, port number, transport protocol}triple dedicated to only one application, which is automatically collected from the behavior analysis of individual applications. We can classify the Internet traffic more accurately and quickly by simple packet header matching to the collected fixed IP-port information. Therefore, we can construct a lightweight, fast, and accurate real-time traffic classification system than other classification method. In this paper we propose a novel algorithm to extract the fixed IP-port information and the system architecture. Also we prove the feasibility and applicability of our proposed method by an acceptable experimental result.

Modified YOLOv4S based on Deep learning with Feature Fusion and Spatial Attention (특징 융합과 공간 강조를 적용한 딥러닝 기반의 개선된 YOLOv4S)

  • Hwang, Beom-Yeon;Lee, Sang-Hun;Lee, Seung-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.31-37
    • /
    • 2021
  • In this paper proposed a feature fusion and spatial attention-based modified YOLOv4S for small and occluded detection. Conventional YOLOv4S is a lightweight network and lacks feature extraction capability compared to the method of the deep network. The proposed method first combines feature maps of different scales with feature fusion to enhance semantic and low-level information. In addition expanding the receptive field with dilated convolution, the detection accuracy for small and occluded objects was improved. Second by improving the conventional spatial information with spatial attention, the detection accuracy of objects classified and occluded between objects was improved. PASCAL VOC and COCO datasets were used for quantitative evaluation of the proposed method. The proposed method improved mAP by 2.7% in the PASCAL VOC dataset and 1.8% in the COCO dataset compared to the Conventional YOLOv4S.

Design and Simulation of an On-body Microstrip Patch Antenna for Lower Leg Osteoporosis Monitoring (하지 골다공증 감시를 위한 온-바디 마이크로 스트립 패치 안테나의 설계 및 모의실험)

  • Kim, Byung-Mun;Yun, Lee-Ho;Lee, Sang-Min;Park, Young-Ja;Hong, Jae-Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.4
    • /
    • pp.763-770
    • /
    • 2021
  • In this paper, in order to exclude the influence of BAN(Body Area Network) signals operating in the ISM band, the design and optimization process of an on-body microstrip patch antenna operating at 4.567 GHz is presented. The antenna for the monitoring of the lower legs with cancellous osteoporosis is designed to be lightweight and compact with improved return loss and bandwidth. The structure around the applied lower leg consisted of a five-layer dielectric plane. Taking into account losses, the complex dielectric constant of each layer is calculated using multi Cole-Cole model parameters, whereas a unipolar model is used for normal or osteoporotic cancellous bones. The return loss of the coaxial feed antenna on the phantom is -67.26 dB at 4.567 GHz, and in the case of osteoporosis, at the same frequency the return loss difference is 35.88 dB, and the resonance frequency difference is about 7 MHz.

Blockchain-based lightweight consensus algorithm (L-PBFT) for building trust networks in IoT environment (IoT 환경에서 신뢰 네트워크 구축을 위한 블록체인 기반의 경량 합의 알고리즘(L-PBFT))

  • Park, Jung-Oh
    • Journal of Industrial Convergence
    • /
    • v.20 no.6
    • /
    • pp.37-45
    • /
    • 2022
  • With the development of the Internet of Things (IoT), related network infrastructures require new technologies to protect against threats such as external hacking. This study proposes an L-PBFT consensus algorithm that can protect IoT networks based on a blockchain consensus algorithm. We designed a blockchain (private) model suitable for small networks, tested processing performance for ultra-small/low-power IoT devices, and verified stability. As a result of performance analysis, L-PBFT proved that at least the number of nodes complies with the operation of the consensus algorithm(minimum 14%, maximum 29%) and establishes a trust network(separation of secure channels) different from existing security protocols. This study is a 4th industry convergence research and will be a foundation technology that will help develop IoT device security products in the future.