• Title/Summary/Keyword: Network Log

Search Result 372, Processing Time 0.022 seconds

Group Manchester Code Scheme for Medical In-body WBAN Systems (의료용 in-body WBAN 시스템을 위한 Group Manchester code 변조 방식)

  • Choi, Il-Muk;Won, Kyung-Hoon;Choi, Hyung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10C
    • /
    • pp.597-604
    • /
    • 2011
  • In this paper, we propose group Manchester code (GM) modulation scheme for medical in-body wireless body area network (WBAN) systems. In IEEE, the WBAN system is assigned as 802.15. Task Group 6 (TG 6), and the related standardization is being progressed, Recently, in this Group, group pulse position modulation (GPPM), which can obtain data rate increase by grouping pulse position modulation (PPM) symbols, is proposed as a new modulation scheme for low-power operation of WBAN system. However, the conventional method suffers from BER performance degradation due to the absence of gray coding and its demodulation characteristics. Therefore, in this paper, we propose a modified GM scheme which groups Manchester code instead of PPM. In the proposed GM scheme, a low-complexity maximum likelihood (ML) demodulation method is employed in order to maximize the BER performances, Also, log likelihood ratio (LLR) decision method is proposed to employ the Turbo code as forward error correction (FEC), Finally, we verified that the proposed method has a good performance and is an appropriate scheme for in-body WBAN system through extensive performance evaluation.

Temporal attention based animal sound classification (시간 축 주의집중 기반 동물 울음소리 분류)

  • Kim, Jungmin;Lee, Younglo;Kim, Donghyeon;Ko, Hanseok
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.5
    • /
    • pp.406-413
    • /
    • 2020
  • In this paper, to improve the classification accuracy of bird and amphibian acoustic sound, we utilize GLU (Gated Linear Unit) and Self-attention that encourages the network to extract important features from data and discriminate relevant important frames from all the input sequences for further performance improvement. To utilize acoustic data, we convert 1-D acoustic data to a log-Mel spectrogram. Subsequently, undesirable component such as background noise in the log-Mel spectrogram is reduced by GLU. Then, we employ the proposed temporal self-attention to improve classification accuracy. The data consist of 6-species of birds, 8-species of amphibians including endangered species in the natural environment. As a result, our proposed method is shown to achieve an accuracy of 91 % with bird data and 93 % with amphibian data. Overall, an improvement of about 6 % ~ 7 % accuracy in performance is achieved compared to the existing algorithms.

Directory Cache Coherence Scheme using the Number-Balanced Binary Tree (수 평형 이진트리를 이용한 디렉토리 캐쉬 일관성 유지 기법)

  • Seo, Dae-Wha
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.3
    • /
    • pp.821-830
    • /
    • 1997
  • The directory-based cache coherence scheme is an attractive approach to solve the caceh coherence problem in a large-scale shared-memory multiprocessor.However, the exsting directory-based schemes have some problens such as the enormous storage overhead for a directory, the long invalidation latency, the heavy network condes-tion, and the low scalability.For resolving these problems, we propose a new directroy- based caceh coherence scheme which is suitable for building scalable, shred-memory multiprocessors.In this scheme, each directory en-try ofr a given memory block is a number-balanced binaty tree(NBBT) stucture.The NBBT has several proper-ties to effciently maintain the directory for the cache consistency such that the shape is unique, the maximum depth is [log$_2$n], and the tree has the minimum number of leaf nodes among the binarry tree with n nodes.Therefore, this scheme can reduce the storage overhead, the network traffic, and the inbalidation latency and can ensutr the high- scalability the large-scale shared-memory multiprocessors.

  • PDF

Development of User-customized Device Intelligent Character using IoT-based Lifelog data in Hyper-Connected Society (초연결사회에서 IoT 기반의 라이프로그 데이터를 활용한 사용자 맞춤형 디바이스 지능형 캐릭터 개발)

  • Seong, Ki Hun;Kim, Jung Woo;Sul, Sang Hun;Kang, Sung Pil;Choi, Jae Boong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.21-31
    • /
    • 2018
  • In Hyper-Connected Society, IoT-based Lifelog data is used throughout the Internet and is an important component of customized services that reflect user requirements. Also, Users are using social network services to easily express their interests and feelings, and various life log data are being accumulated. In this paper, Intelligent characters using IoT based lifelog data have been developed and qualitative/quantitative data are collected and analyzed in order to systematically grasp emotions of users. For this, qualitative data through the social network service used by the user and quantitative data through the wearable device are collected. The collected data is verified for reliability by comparison with the persona through esnography. In the future, more intelligent characters will be developed to collect more user life log data to ensure data reliability and reduce errors in the analysis process to provide personalized services.

Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network (모바일 Ad-hoc 네트워크에서 Hamming Distance를 이용한 인증프로토콜)

  • Lee, Seok-Lae;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.47-57
    • /
    • 2006
  • Mobile Ad-hoc networks have various implementation constraints such as infrastructure-free, no trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability and so on have been arisen in mobile Ad-hoc networks. But we focus on authentication of these security issues because it is quitely affected by the characteristics of networks. In this paper, we propose the authentication protocol that can limit the size of certificate repository as $log_2N$ and assures to make a trusted certificate path from one node to another, adopting the concept of Hamming distance. Particularly, our protocol can construct a trusted certificate path in spite of decreasing or increasing the number of nodes in mobile Ad-hoc network.

DNA Sequences Compression using Repeat technique and Selective Encryption using modified Huffman's Technique

  • Syed Mahamud Hossein; Debashis De; Pradeep Kumar Das Mohapatra
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.85-104
    • /
    • 2024
  • The DNA (Deoxyribonucleic Acid) database size increases tremendously transmuting from millions to billions in a year. Ergo for storing, probing the DNA database requires efficient lossless compression and encryption algorithm for secure communication. The DNA short pattern repetitions are of paramount characteristics in biological sequences. This algorithm is predicated on probing exact reiterate, substring substitute by corresponding ASCII code and engender a Library file, as a result get cumulating of the data stream. In this technique the data is secured utilizing ASCII value and engendering Library file which acts as a signature. The security of information is the most challenging question with veneration to the communication perspective. The selective encryption method is used for security purpose, this technique is applied on compressed data or in the library file or in both files. The fractional part of a message is encrypted in the selective encryption method keeping the remaining part unchanged, this is very paramount with reference to selective encryption system. The Huffman's algorithm is applied in the output of the first phase reiterate technique, including transmuting the Huffman's tree level position and node position for encryption. The mass demand is the minimum storage requirement and computation cost. Time and space complexity of Repeat algorithm are O(N2) and O(N). Time and space complexity of Huffman algorithm are O(n log n) and O(n log n). The artificial data of equipollent length is additionally tested by this algorithm. This modified Huffman technique reduces the compression rate & ratio. The experimental result shows that only 58% to 100% encryption on actual file is done when above 99% modification is in actual file can be observed and compression rate is 1.97bits/base.

A Method of Coupling Expected Patch Log Likelihood and Guided Filtering for Image De-noising

  • Wang, Shunfeng;Xie, Jiacen;Zheng, Yuhui;Wang, Jin;Jiang, Tao
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.552-562
    • /
    • 2018
  • With the advent of the information society, image restoration technology has aroused considerable interest. Guided image filtering is more effective in suppressing noise in homogeneous regions, but its edge-preserving property is poor. As such, the critical part of guided filtering lies in the selection of the guided image. The result of the Expected Patch Log Likelihood (EPLL) method maintains a good structure, but it is easy to produce the ladder effect in homogeneous areas. According to the complementarity of EPLL with guided filtering, we propose a method of coupling EPLL and guided filtering for image de-noising. The EPLL model is adopted to construct the guided image for the guided filtering, which can provide better structural information for the guided filtering. Meanwhile, with the secondary smoothing of guided image filtering in image homogenization areas, we can improve the noise suppression effect in those areas while reducing the ladder effect brought about by the EPLL. The experimental results show that it not only retains the excellent performance of EPLL, but also produces better visual effects and a higher peak signal-to-noise ratio by adopting the proposed method.

An Integrated Face Detection and Recognition System (통합된 시스템에서의 얼굴검출과 인식기법)

  • 박동희;배철수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1312-1317
    • /
    • 2003
  • This paper presents an integrated approach to unconstrained face recognition in arbitrary scenes. The front end of the system comprises of a scale and pose tolerant face detector. Scale normalization is achieved through novel combination of a skin color segmentation and log-polar mapping procedure. Principal component analysis is used with the multi-view approach proposed in[10] to handle the pose variations. For a given color input image, the detector encloses a face in a complex scene within a circular boundary and indicates the position of the nose. Next, for recognition, a radial grid mapping centered on the nose yields a feature vector within the circular boundary. As the width of the color segmented region provides an estimated size for the face, the extracted feature vector is scale normalized by the estimated size. The feature vector is input to a trained neural network classifier for face identification. The system was evaluated using a database of 20 person's faces with varying scale and pose obtained on different complex backgrounds. The performance of the face recognizer was also quite good except for sensitivity to small scale face images. The integrated system achieved average recognition rates of 87% to 92%.

Channel Analysis of Wireless Sensor Networks (무선 센서 네트워크 채널 분석)

  • Jung, Kyung-Kwon;Choi, Woo-Seung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.179-186
    • /
    • 2008
  • In proportion as the growth of the wireless sensor network applications, we need for more accuracy wireless channel information. In the case of indoor or outdoor wireless sensor networks, multipath propagation causes severe problems in terms of fading. Therefore, a path-loss model for multipath environment is required to optimize communication systems. This paper deals with log-normal path loss modeling of the indoor 2.4 GHz channel. We measured variation of the received signal strength between the sender and receiver of which separation was increased from 1 to 30m. The path-loss exponent and the standard deviation of wireless channel were determined by fitting of the measured data. By using the PRR(Packet Reception Rate) of this model. Wireless sensor channel is defined CR(Connect Region), DR(Disconnected Region). In order to verify the characteristics of wireless channel, we performed simulations and experiments. We demonstrated that connection ranges are 24m in indoor, and 14m in outdoor.

  • PDF

Base Flow Estimation in Uppermost Nakdong River Watersheds Using Chemical Hydrological Curve Separation Technique (화학적 수문곡선 분리기법을 이용한 낙동강 최상류 유역 기저유출량 산정)

  • Kim, Ryoungeun;Lee, Okjeong;Choi, Jeonghyeon;Won, Jeongeun;Kim, Sangdan
    • Journal of Korean Society on Water Environment
    • /
    • v.36 no.6
    • /
    • pp.489-499
    • /
    • 2020
  • Effective science-based management of the basin water resources requires an understanding of the characteristics of the streams, such as the baseflow discharge. In this study, the base flow was estimated in the two watersheds with the least artificial factors among the Nakdong River watersheds, as determined using the chemical hydrograph separation technique. The 16-year (2004-2019) discontinuous observed stream flow and electrical conductivity data in the Total Maximum Daily Load (TMDL) monitoring network were extended to continuous daily data using the TANK model and the 7-parameter log-linear model combined with the minimum variance unbiased estimator. The annual base flows at the upper Namgang Dam basin and the upper Nakdong River basin were both analyzed to be about 56% of the total annual flow. The monthly base flow ratio showed a high monthly deviation, as it was found to be higher than 0.9 in the dry season and about 0.46 in the rainy season. This is in line with the prevailing common sense notion that in winter, most of the stream flow is base flow, due to the characteristics of the dry season winter in Korea. It is expected that the chemical-based hydrological separation technique involving TANK and the 7-parameter log-linear models used in this study can help quantify the base flow required for systematic watershed water environment management.