• Title/Summary/Keyword: Sensor nodes

Search Result 2,025, Processing Time 0.038 seconds

Gesture Recognition Method using Tree Classification and Multiclass SVM (다중 클래스 SVM과 트리 분류를 이용한 제스처 인식 방법)

  • Oh, Juhee;Kim, Taehyub;Hong, Hyunki
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.238-245
    • /
    • 2013
  • Gesture recognition has been widely one of the research areas for natural user interface. This paper presents a novel gesture recognition method using tree classification and multiclass SVM(Support Vector Machine). In the learning step, 3D trajectory of human gesture obtained by a Kinect sensor is classified into the tree nodes according to their distributions. The gestures are resampled and we obtain the histogram of the chain code from the normalized data. Then multiclass SVM is applied to the classified gestures in the node. The input gesture classified using the constructed tree is recognized with multiclass SVM.

Dynamic Tree Formation Protocol in UAV Formation Flying Network for Disaster Monitoring (재난 모니터링을 위한 편대비행 UAV 네트워크에서 동적 트리 형성 프로토콜)

  • Park, Jin-Hee;Kim, Yeon-Joo;Chung, Jin-Wook
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.271-277
    • /
    • 2012
  • In this paper, we propose a dynamic tree formation protocol for multiple UAV which is gathering data or accomplishing a mission such as disaster monitoring, environment monitoring, and disaster relief. Especilly, we designed Hop-LQI Weight algorithm to form optimal tree in wireless dynamic environment applying situation of radio signal attenuation over distance and implemented our algorithm in MSP 430 K-mote sensor platform using TinyOS codes. We verified performance of our algorithm by comparing average link setup time by the number of nodes with minimum LQI, link cost calculation method in wireless communication.

Buffer Scheme Optimization of Epidemic Routing in Delay Tolerant Networks

  • Shen, Jian;Moh, Sangman;Chung, Ilyong;Sun, Xingming
    • Journal of Communications and Networks
    • /
    • v.16 no.6
    • /
    • pp.656-666
    • /
    • 2014
  • In delay tolerant networks (DTNs), delay is inevitable; thus, making better use of buffer space to maximize the packet delivery rate is more important than delay reduction. In DTNs, epidemic routing is a well-known routing protocol. However, epidemic routing is very sensitive to buffer size. Once the buffer size in nodes is insufficient, the performance of epidemic routing will be drastically reduced. In this paper, we propose a buffer scheme to optimize the performance of epidemic routing on the basis of the Lagrangian and dual problem models. By using the proposed optimal buffer scheme, the packet delivery rate in epidemic routing is considerably improved. Our simulation results show that epidemic routing with the proposed optimal buffer scheme outperforms the original epidemic routing in terms of packet delivery rate and average end-to-end delay. It is worth noting that the improved epidemic routing needs much less buffer size compared to that of the original epidemic routing for ensuring the same packet delivery rate. In particular, even though the buffer size is very small (e.g., 50), the packet delivery rate in epidemic routing with the proposed optimal buffer scheme is still 95.8%, which can satisfy general communication demand.

Determination of Variable Rate Fertilizing Amount in Small Size Fields Using Geographic Information System

  • S. I. Cho;I. S. Kang;Park, S. H.
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 2000.11b
    • /
    • pp.236-245
    • /
    • 2000
  • The feasibility of precision farming for small sized fields was studied by determining fertilizing amount of nitrogenous and calcareous to a cite specific region. A detailed soil survey at three experimental fields of 672㎡, 300㎡ and 140㎡ revealed a considerable spatial variation of the pH and organic matter(OM) levels. Soil organic matter was measured using Walkley-Black method and soil pH was measured with a pH sensor. Soil sample was obtained by Grid Node Sampling Method. The soil sampling depth was 10 - 20 cm from the soil surface. To display soil nutrient variation, a soil map was made using Geographic Information System (GIS) software. In soil mapping, soil data between nodes was interpolated using Inverse Distance Weighting (IDW) method. The variation was about 1 - 1.8 in pH value and 1.4 -7 % in OM content. Fertilizing Amount of nitrogenous and calcareous was determined by the fertilizing equation which was proposed by National Institute of Agricultural Science and Technology.(NIAST). The variation of fertilizing amount was about 3 - 11 kg/10a in nitrogenous and 70 - 140 kg/10a in calcareous. The results showed a feasibility of precision fertilizing for small size fields.

  • PDF

EFFICIENT USN MIDDLEWARE FOR ASSET TRACKING

  • Kim, Kwang-Soo;Kim, Min-Soo;Jo, Jung-Hee;Pyo, Cheol-Sig;Park, Shin-Young
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.361-364
    • /
    • 2007
  • A small sized device with computing, communicating, sensing capability is changing our life. It will be deployed in the world and acquire a lot of data from the world. It is used for various applications such as military surveillance, environmental monitoring, structure health monitoring, building management, asset tracking, etc. In this paper we focus on USN middleware for asset tracking. A mobile asset is moving here and there within a specific area. The USN middleware tracks the mobile assets in real-time by using sensor nodes and notify their current positions to a user. To achieve the goal, the USN middleware provides some features related to the positions of mobile assets.. They are storing location data by using 3D indexing method, retrieving them by using spatio-temporal query, making trace of an asset, and retrieving the history data of an asset. In the paper, we developed USN middleware to adapt the requirements of asset tracking. It can help users increase the efficiency of their business related to mobile assets and make a valuable decision.

  • PDF

A Lightweight Integrity Authentication Scheme based on Reversible Watermark for Wireless Body Area Networks

  • Liu, Xiyao;Ge, Yu;Zhu, Yuesheng;Wu, Dajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4643-4660
    • /
    • 2014
  • Integrity authentication of biometric data in Wireless Body Area Network (WBAN) is a critical issue because the sensitive data transmitted over broadcast wireless channels could be attacked easily. However, traditional cryptograph-based integrity authentication schemes are not suitable for WBAN as they consume much computational resource on the sensor nodes with limited memory, computational capability and power. To address this problem, a novel lightweight integrity authentication scheme based on reversible watermark is proposed for WBAN and implemented on a TinyOS-based WBAN test bed in this paper. In the proposed scheme, the data is divided into groups with a fixed size to improve grouping efficiency; the histogram shifting technique is adopted to avoid possible underflow or overflow; local maps are generated to restore the shifted data; and the watermarks are generated and embedded in a chaining way for integrity authentication. Our analytic and experimental results demonstrate that the integrity of biometric data can be reliably authenticated with low cost, and the data can be entirely recovered for healthcare applications by using our proposed scheme.

Mechanism of Authentication Procedure between Ad Hoc Network and Sensor Network (에드 홉 네트워크와 개별 센서 네트워크 간의 인증 절차 메카니즘)

  • Kim, Seungmin;Yang, Jisoo;Kim, Hankyu;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.160-161
    • /
    • 2013
  • Extending mobile IP to ad hoc networks with the foreign agent acting as the bridge between the wired network and ad hoc networks can provide the global Internet connectivity for ad hoc hosts. The existing research in the area of the integrated wired and ad hoc network is carried out in a non-adversarial setting. This paper analysed an effective solution to solve the security related problems encountered in these integrated networks. This security protocol also excludes malicious nodes from performing the ad hoc network routing. This paper focuses on preventing ad hoc hosts from the attacks of anti-integrity.

  • PDF

Three-Dimensional Location Tracking System for Automatic Landing of an Unmanned Helicopter (무인 헬기 자동 착륙을 위한 3차원 위치 추적 시스템)

  • Choo, Young-Yeol;Kang, Seong-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.6
    • /
    • pp.608-614
    • /
    • 2008
  • This paper describes a location tracking system to guide landing process of an Unmanned Helicopter(UMH) exploiting MIT Cricket nodes. For automatic landing of a UMH, a precise positioning system is indispensable. However, GPS(Global Positioning System) is inadequate for tracking the three dimensional position of a UMH because of large positioning errors. The Cricket systems use Time-Difference-of-Arrival(TDoA) method with ultrasonic and RF(Radio Frequency) signals to measure distances. They operate in passive mode in that a listener attached to a moving device receives distance signals from several beacons located at fixed points on ground. Inevitably, this passive type of implementation causes large disturbances in measuring distances between beacons and the listener due to wind blow from propeller and turbulence of UMH body. To cope with this problem, we proposed active type of implementation for positioning a UMH. In this implementation, a beacon is set up at UMH body and four listeners are located at ground area at least where the UMH will land. A pair of Ultrasonic and RF signals from the beacon arrives at several listeners to calculate the position of the UMH. The distance signals among listeners are synchronized with a counter value appended to each distance signals from the beacon.

A Study on the Robust Efficiency of a Cluster Head Election for USN (USN에서 클러스터헤드 선출의 강건한 효율성 연구)

  • Cho, Do-Hyeoun;Lee, Chul;Choi, Jin-Tek;Kim, Jin-Soo;Lee, Sang-Hun;Lee, Jong-Yong
    • 전자공학회논문지 IE
    • /
    • v.46 no.2
    • /
    • pp.11-17
    • /
    • 2009
  • This study speak abut demerit of LEACH, EACHS, and HEED. There are demerits that LEACH, EACHS shall be rest energy of all nodes and HEED can't guarantee the number of cluster head. Proposed energy efficiency of selected cluster head guarantees the number of cluster head which is a demerit of HEED and minimizes the node of DEAD. Energy efficiency of simulation is compared by MA TLAB.

Design and fabrication of the Built-in Testing Circuit for Improving IC Reliability (IC 신뢰성 향상을 위한 내장형 고장검출 회로의 설계 및 제작)

  • Ryu, Jang-Woo;Kim, Hoo-Sung;Yoon, Jee-Young;Hwang, Sang-Joon;Sung, Man-Young
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.18 no.5
    • /
    • pp.431-438
    • /
    • 2005
  • In this paper, we propose the built-in current testing circuit for improving reliability As the integrated CMOS circuits in a chip are increased, the testability on design and fabrication should be considered to reduce the cost of testing and to guarantee the reliability In addition, the high degree of integration makes more failures which are different from conventional static failures and introduced by the short between transistor nodes and the bridging fault. The proposed built-in current testing method is useful for detecting not only these failures but also low current level failures and faster than conventional method. In normal mode, the detecting circuit is turned off to eliminate the degradation of CUT(Circuits Under Testing). The differential input stage in detecting circuit prevents the degradation of CUT in test mode. It is expected that this circuit improves the quality of semiconductor products, the reliability and the testability.