• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.033 seconds

Transmission Power-Based Spectrum Sensing for Cognitive Ad Hoc Networks

  • Choi, Hyun-Ho
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.2
    • /
    • pp.97-103
    • /
    • 2014
  • In spectrum sensing, there is a tradeoff between the probability of missed detection and the probability of a false alarm according to the value of the sensing threshold. Therefore, it is important to determine the sensing threshold suitable to the environment of cognitive radio networks. In this study, we consider a cognitive radio-based ad hoc network where secondary users directly communicate by using the same frequency band as the primary system and control their transmit power on the basis of the distance between them. First, we investigate a condition in which the primary and the secondary users can share the same frequency band without harmful interference from each other, and then, propose an algorithm that controls the sensing threshold dynamically on the basis of the transmit power of the secondary user. The analysis and simulation results show that the proposed sensing threshold control algorithm has low probabilities of both missed detection and a false alarm and thus, enables optimized spectrum sharing between the primary and the secondary systems.

Measurement Allocation by Shapley Value in Wireless Sensor Networks

  • Byun, Sang-Seon
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.1
    • /
    • pp.38-42
    • /
    • 2018
  • In this paper, we consider measurement allocation problem in a spatially correlated sensor field. Our goal is to determine the probability of each sensor's being measured based on its contribution to the estimation reliability; it is desirable that a sensor improving the estimation reliability is measured more frequently. We consider a spatial correlation model of a sensor field reflecting transmission power limit, noise in measurement and transmission channel, and channel attenuation. Then the estimation reliability is defined distortion error between event source and its estimation at sink. Motivated by the correlation nature, we model the measurement allocation problem into a cooperative game, and then quantify each sensor's contribution using Shapley value. Against the intractability in the computation of exact Shapley value, we deploy a randomized method that enables to compute the approximate Shapley value within a reasonable time. Besides, we envisage a measurement scheduling achieving the balance between network lifetime and estimation reliability.

Ensemble of Degraded Artificial Intelligence Modules Against Adversarial Attacks on Neural Networks

  • Sutanto, Richard Evan;Lee, Sukho
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.3
    • /
    • pp.148-152
    • /
    • 2018
  • Adversarial attacks on artificial intelligence (AI) systems use adversarial examples to achieve the attack objective. Adversarial examples consist of slightly changed test data, causing AI systems to make false decisions on these examples. When used as a tool for attacking AI systems, this can lead to disastrous results. In this paper, we propose an ensemble of degraded convolutional neural network (CNN) modules, which is more robust to adversarial attacks than conventional CNNs. Each module is trained on degraded images. During testing, images are degraded using various degradation methods, and a final decision is made utilizing a one-hot encoding vector that is obtained by summing up all the output vectors of the modules. Experimental results show that the proposed ensemble network is more resilient to adversarial attacks than conventional networks, while the accuracies for normal images are similar.

An Efficient Extraction of Data Feature By Using Neural Networks of Hybrid Learning Algorithm (조합형 학습알고리즘의 신경망을 이용한 데이터의 효율적인 특징추출)

  • Jo, Yong-Hyeon;Yun, Jung-Hwan;Park, Yong-Su
    • The KIPS Transactions:PartB
    • /
    • v.8B no.2
    • /
    • pp.130-136
    • /
    • 2001
  • 본 논문에서는 새로운 학습알고리즘의 비선형 주요성분분석 신경망을 이용한 영상데이터의 효율적인 특징추출에 대하여 제안한다. 제안된 학습알고리즘에서는 최적해로 수렴하는 과정에서 발생할 수도 있는 진동을 억제하여 빠른 속도의 수렴이 가능하도록 하기 위해 모멘트를 이용하였고, 국소최적해를 만났을 때 이를 벗어난 전역최적해로의 수렴을 위한 새로운 연결가중치의 설정을 위하여 동적터널링을 이용함으로써 빠른 수렴속도로 전역최적해에 수렴되도록 학습시킬 수 있다. 제안된 학습알고리즘을 이용한 신경망을 256$\times$256 픽셀의 간암영상과 128$\times$128 픽셀의 얼굴영상을 대상으로 실험한 결과, 기울기하강의 학습알고리즘을 이용한 기존 비선형 주요성분분석 신경망보다 우수한 수렴성능과 특징추출성능이 있음을 확인 할 수 있었다.

  • PDF

Step-Size Control for Width Adaptation in Radial Basis Function Networks for Nonlinear Channel Equalization

  • Kim, Nam-Yong
    • Journal of Communications and Networks
    • /
    • v.12 no.6
    • /
    • pp.600-604
    • /
    • 2010
  • A method of width adaptation in the radial basis function network (RBFN) using stochastic gradient (SG) algorithm is introduced. Using Taylor's expansion of error signal and differentiating the error with respect to the step-size, the optimal time-varying step-size of the width in RBFN is derived. The proposed approach to adjusting widths in RBFN achieves superior learning speed and the steady-state mean square error (MSE) performance in nonlinear channel environment. The proposed method has shown enhanced steady-state MSE performance by more than 3 dB in both nonlinear channel environments. The results confirm that controlling over step-size of the width in RBFN by the proposed algorithm can be an effective approach to enhancement of convergence speed and the steady-state value of MSE.

A New Group Key Management Protocol for WSN

  • Gerelbayar, Tegshbayar;Lee, Sang-Min;Park, Jong-Sou
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.143-152
    • /
    • 2008
  • Sensor networks have a wide spectrum of military and civil applications, particularly with respect to security and secure keys for encryption and authentication. This thesis presents a new centralized approach which focuses on the group key distribution with revocation capability for Wireless Sensor Networks. We propose a new personal key share distribution. When utilized, this approach proves to be secure against k-number of illegitimate colluding nodes. In contrast to related approaches, our scheme can overcome the security shortcomings while keeping the small overhead requirements per node. It will be shown that our scheme is unconditionally secure and achieves both forward secrecy and backward secrecy. The analysis is demonstrated in terms of communication and storage overheads.

  • PDF

RF Spectrum Cognition Technologies for IoT Wireless Sensors (IoT 무선 센서를 위한 RF 스펙트럼 인지 기술)

  • Yoon, Won-Sang;Han, Sang-Min
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.122-127
    • /
    • 2016
  • In this paper, new spectrum sensing schemes based on analog/RF front-end processing are introduced for IoT wireless sensor networks. While the conventional approaches for wireless channel cognition have been issued in signal processing area, the RF spectrum cognition concept makes it feasible to achieve cognitive wireless sensor networks (C-WSNs). The spectrum cognition at RF processing is categorized as four kinds of sensing mechanisms. Two recent reseaches are described as promising candidates for the C-WSN. One senses spectrum by the frequency discriminating receiver, the other senses and detects from the frequency selective super-regenerative receiver. The introduced systems with simple and low-power RF architectures play dual roles of channel sensing and demodulation. simultaneously. Therefore, introduced spectrum sensing receivers can be one of the best candidates for IoT wireless sensor devices in C-WSN environments.

Performance Evaluation of Transmission Power Control Algorithms in SIR-based Cellular Wireless Networks (SIR 기반의 셀룰러 무선망에서 전송 전력 제어 알고리듬의 성능 비교)

  • Jung, Bo-Hwan;Kim, Moon-Gab
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.64-69
    • /
    • 2009
  • In this paper, we evaluate a performance on a transmission power control algorithm in a SIR-based wireless networks. We consider the existing iterative power control algorithms into a unified dynamic state system formulation in both continuous-time and discrete-time system. Numerical experiments are performed under the disturbance of sinusoidal. These results indicate that the proposed power control scheme has a performance improvement with a better disturbance elimination in wireless mobile systems.

Achievable Sum Rate Enhancement by Sectorization for Dirty Paper Coding Aided Multihop Cellular Networks (Dirty Paper Coding을 이용한 다중 도약 셀룰러 네트워크에서 Sectorization을 통한 전송률 향상)

  • Park, Sung-Soo;Song, Hyung-Joon;Lim, Sung-Mook;You, Cheol-Woo;Hong, Dae-Sik
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.241-242
    • /
    • 2008
  • This paper proposes a sectorization and exclusive subcarrier allocation technique for dirty paper coding (DPC) aided orthogonal frequency division multiple access (OFDMA) multihop cellular networks. Simulation result shows that the proposed technique significantly increases the achievable sum rate compared to the conventional mobile station selection approach.

  • PDF

An Architecture Design of Military Operation System Utilizing Cellular Networks (군작전 효율화를 위한 셀룰라망 연동구조 설계)

  • Kim, Jae-Cheol;Kim, In-Taek
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.257-282
    • /
    • 2011
  • In this paper, we propose an architecture design of military operation system utilizing cellular networks. The main contribution of this paper is to provide a cost-effective military operation solution for ground forces, which is based on IT(information technology). By employing the cellular phones of officers' and non-commissioned officers' as the tools of operational communication, the proposed system can be constructed in the minimum duration and be built on the four components: command and control system, gateway, security system, and terminal(cell phone). This system is most effective for the warfare of limited area, but the effectiveness does not decrease under the total war covering the whole land of Korea. For the environmental change of near future, expanded architecture is also provided to utilize the functionalities of smart phones.

  • PDF