• Title/Summary/Keyword: Probabilistic environment

Search Result 286, Processing Time 0.024 seconds

Deinterleaving of Multiple Radar Pulse Sequences Using Genetic Algorithm (유전자 알고리즘을 이용한 다중 레이더 펄스열 분리)

  • 이상열;윤기천
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.6
    • /
    • pp.98-105
    • /
    • 2003
  • We propose a new technique of deinterleaving multiple radar pulse sequences by means of genetic algorithm for threat identification in electronic warfare(EW) system. The conventional approaches based on histogram or continuous wavelet transform are so deterministic that they are subject to failing in detection of individual signal characteristics under real EW signal environment that suffers frequent signal missing, noise, and counter-EW signal. The proposed algorithm utilizes the probabilistic optimization procedure of genetic algorithm. This method, a time-of-arrival(TOA) only strategy, constructs an initial chromosome set using the difference of TOA. To evaluate the fitness of each gene, the defined pulse phase is considered. Since it is rare to meet with a single radar at a moment in EW field of combat, multiple solutions are to be derived in the final stage. Therefore it is designed to terminate genetic process at the prematured generation followed by a chromosome grouping. Experimental results for simulated and real radar signals show the improved performance in estimating both the number of radar and the pulse repetition interval.

Particle Filter SLAM for Indoor Navigation of a Mobile Robot Using Ultrasonic Beacons (초음파 비이컨을 사용한 이동로봇 실내 주행용 파티클 필터 SLAM)

  • Kim, Tae-Gyun;Ko, Nak-Yong;Noh, Sung-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.391-399
    • /
    • 2012
  • This paper proposes a particle filter approach for SLAM(Simultaneous Localization and Mapping) of a mobile robot. The SLAM denotes estimation of both the robot location and map while the robot navigates in an unknown environment without map. The proposed method estimates robot location simultaneously with the locations of the ultrasonic beacons which constitute landmarks for navigation. The particle filter method represents the locations of the robot and landmarks in probabilistic manner by the distribution of particles. The method takes care of the uncertainty of the landmarks' location as well as that of the robot motion. Therefore, the locations of the landmarks are updated including uncertainty at every sampling time. Performance of the proposed method is verified through simulation and experiments. The method yields practically useful mapping information even if the range data from the landmarks include random noise. Also, it provides more accurate and robust estimation of the robot location than the usual least squares methods or dead-reckoning method.

A Life Browser based on Probabilistic and Semantic Networks for Visualization and Retrieval of Everyday-Life (일상생활 시각화와 검색을 위한 확률망과 의미망 기반 라이프 브라우저)

  • Lee, Young-Seol;Hwang, Keum-Sung;Kim, Kyung-Joong;Cho, Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.3
    • /
    • pp.289-300
    • /
    • 2010
  • Recently, diverse information which are location, call history, SMS history, photographs, and video can be collected constantly from mobile devices such as cellular phone, smart phone, and PDA. There are many researchers who study services for searching and abstraction of personal daily life with contextual information in mobile environment. In this paper, we introduce MyLifeBrowser which is developed in our previous work. Also, we explain LPS and correction of GPS coordinates as extensions of previous work and show LPS performance test and evaluate the performance of expanded keywords. MyLifeBrowser which provides searching personal information in mobile device and support of detecting related information according to a fragmentary keyword and common knowledge in ConceptNet. It supports the functionality of searching related locations using Bayesian network that is designed by the authors. In our experiment, we visualize real data through MyLifeBrowser and show the feasibility of LPS server and expanded keywords using both Bayesian network and ConceptNet.

Probabilistic Inference of User's Context for Mobile Social Network Services (모바일 소셜 네트워크 서비스를 위한 사용자 컨텍스트의 확률추론)

  • Min, Jun-Ki;Jang, Su-Hyung;Cho, Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.3
    • /
    • pp.361-365
    • /
    • 2010
  • In recent years, social networks come into the spotlight as the important ways to find people or share information. Especially, existing social network services based on the Internet, such as Facebook.com and Cyworld.com, are now extended into the mobile environment. A mobile phone easily collects the personal information since it is carried by the user at all times, and various types of data can be gathered together with the advance of sensor technologies. These features differentiate the mobile social network services from the previous Internet-based services. In this paper, we estimate the user's mobile social contexts like closeness and relationship between the user and surrounding people using Bayesian networks. The mobile social contexts can be employed as important information for providing mobile social network services, and experimental results on real world data have verified their possibilities.

A Bayesian Inference Model for Landmarks Detection on Mobile Devices (모바일 디바이스 상에서의 특이성 탐지를 위한 베이지안 추론 모델)

  • Hwang, Keum-Sung;Cho, Sung-Bae;Lea, Jong-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.1
    • /
    • pp.35-45
    • /
    • 2007
  • The log data collected from mobile devices contains diverse meaningful and practical personal information. However, this information is usually ignored because of its limitation of memory capacity, computation power and analysis. We propose a novel method that detects landmarks of meaningful information for users by analyzing the log data in distributed modules to overcome the problems of mobile environment. The proposed method adopts Bayesian probabilistic approach to enhance the inference accuracy under the uncertain environments. The new cooperative modularization technique divides Bayesian network into modules to compute efficiently with limited resources. Experiments with artificial data and real data indicate that the result with artificial data is amount to about 84% precision rate and about 76% recall rate, and that including partial matching with real data is about 89% hitting rate.

The method of securing water supply resources of existing dam by using Blue dam (Blue dam을 활용한 기존 댐 시설물 상수도 원수 추가 확보 방안)

  • Choo, Tai-Ho;Yoon, Hyeon-Cheol;Yun, Gwan-Seon;Kwon, Yong-Been;Shim, Su-Yong;Chae, Soo-Kwon
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.29 no.2
    • /
    • pp.243-249
    • /
    • 2015
  • To improve stability of the water resources that were seriously affected by climate change and various environmental effects and to supply the clean water always, continuous efforts are essential. Provision of measures with respect of hardware is basically essential to improve the water resources stability due to the topographic characteristic in Korea. However, building a new dam becomes gradually very difficult because of a hardship in selecting right places, opposition forces such as environment and local residents, negative publicity for large civil engineering projects, and so on. The present study, therefore, proposes the Blue dam as an alternative for securing the water resources of a new concept considering domestic conditions. To evaluate the effect of the Blue dam, the Hec-ResSim model is used and the probabilistic discharge flow rate is applied. As a result, when Dam Yeongcheon is applied as a study area, securing water resources of 14 million tons are predicted be secured and the flood control of 15.4 million tons is expected, in comparison with operation of the existing dam only. Consequently, Blue dams are supposed to carry out the function of securing water resources, controling flood, maintaining eco-environmental instream flow, generating hydroelectric power, and providing spaces for recreational activities.

Adaptive Data Hiding Techniques for Secure Communication of Images (자기유사성 네트워크에서 트래픽 제어에 의한 성능 개선)

  • 석경휴;나상동
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6B
    • /
    • pp.575-583
    • /
    • 2004
  • In this paper, we extend the multiple time scale control framework to the window-based congestion control, in particular, such as the TCP. This is performed by interfacing the TCP with a large time scale control module which adjusts the aggressiveness of the bandwidth consumption behavior exhibited by the TCP as a function of large time scale Self-Similar network state. i.e., conformation that exceeds the horizon of the feedback loop as determined by the RTT. How to effectively utilize such an information-due to its probabilistic nature, dispersion over the multiple time scales, and affection on the top of the existing window-based congestion controls-is a non-trivial problem. The evaluation performance of the multiple time scale TCP is facilitated by a simulation of the bench-mark environment which is based on the physical modeling of a self-similar traffic. We explicate our methodology for discerning and evaluating the impact of changes in transport protocols in the protocol stack under the self-similar traffic conditions. We discuss issues arising in the comparative performance evaluation under heavy-tailed workloads.

Bluetooth Beacon Planing Considering Position Estimation Accuracy in Small and Isolated In-Door Environment (소형독립공간에서 실내측위 정확도를 고려한 블루투스 비컨 위치선정)

  • Ahn, Heejune;Thuy, Tran Vinh;Lee, Ye Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1307-1312
    • /
    • 2015
  • The recent adoption of Bluetooth LE technology in smart phones triggered commercial interest in RSSI-based positioning technology. Estimation error in RSSI measurement due to the antenna pattern, multipath fading, environmental noise has to be considered for designing beacon systems. The paper proposes an analysis method and beacon planning rules for a small and isolated indoor service area, based on probabilistic model of RSSI estimation error. As an practically important guide, the beacons have to be installed at the boundary of the service area to minimize the maximum position error, whereas the beacons have to be evenly distributed in the service space to minimize the average estimation error.

A Multi-stage Markov Process Model to Evaluate the Performance of Priority Queues in Discrete-Event Simulation: A Case Study with a War Game Model (이산사건 시뮬레이션에서의 우선순위 큐 성능분석을 위한 다단계 마코브 프로세스 모델: 창조 모델에 대한 사례연구)

  • Yim, Dong-Soon
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.61-69
    • /
    • 2008
  • In order to evaluate the performance of priority queues for future event list in discrete-event simulations, models representing patterns of enqueue and dequeue processes are required. The time complexities of diverse priority queue implementations can be compared using the performance models. This study aims at developing such performance models especially under the environment that a developed simulation model is used repeatedly for a long period. The developed performance model is based on multi-stage Markov process models; probabilistic patterns of enqueue and dequeue are considered by incorporating non-homogeneous transition probability. All necessary parameters in this performance model would be estimated by analyzing a results obtained by executing the simulation model. A case study with a war game simulation model shows how the parameters defined in muti-stage Markov process models are estimated.

  • PDF

Fuzzy Logic based Next Hop Node Selection Method for Energy Efficient PVFS in WSN (무선 센서 네트워크에서 확률적 투표 기반 여과 기법의 에너지 효율성을 위한 퍼지 로직 시스템 기반의 다음 이웃 노드 선택 기법)

  • Lee, Jae Kwan;Nam, Su Man;Cho, Tae Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.2
    • /
    • pp.65-72
    • /
    • 2014
  • Sensor nodes are easily compromised by attacker when which are divided in open environment. The attacker may inject false report and false vote attack through compromised sensor node. These attacks interrupt to transmission legitimate report or the energy of sensor node is exhausted. PVFS are proposed by Li and Wu for countermeasure in two attacks. The scheme use inefficiency to energy of sensor node as fixed report threshold and verification node. In this paper, our propose the next neighbor node selection scheme based on fuzzy logic system for energy improvement of PVFS. The parameter of fuzzy logic system are energy, hops, verification success count, CH select high the next neighbor node among neighbor nodes of two as deduction based on fuzzy logic system. In the experimental, our proposed scheme was improvement to energy of about 9% compare to PVFS.