• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.03 seconds

Temporal and spatial outlier detection in wireless sensor networks

  • Nguyen, Hoc Thai;Thai, Nguyen Huu
    • ETRI Journal
    • /
    • v.41 no.4
    • /
    • pp.437-451
    • /
    • 2019
  • Outlier detection techniques play an important role in enhancing the reliability of data communication in wireless sensor networks (WSNs). Considering the importance of outlier detection in WSNs, many outlier detection techniques have been proposed. Unfortunately, most of these techniques still have some potential limitations, that is, (a) high rate of false positives, (b) high time complexity, and (c) failure to detect outliers online. Moreover, these approaches mainly focus on either temporal outliers or spatial outliers. Therefore, this paper aims to introduce novel algorithms that successfully detect both temporal outliers and spatial outliers. Our contributions are twofold: (i) modifying the Hampel Identifier (HI) algorithm to achieve high accuracy identification rate in temporal outlier detection, (ii) combining the Gaussian process (GP) model and graph-based outlier detection technique to improve the performance of the algorithm in spatial outlier detection. The results demonstrate that our techniques outperform the state-of-the-art methods in terms of accuracy and work well with various data types.

Information Dissemination Model of Microblogging with Internet Marketers

  • Xu, Dongliang;Pan, Jingchang;Wang, Bailing;Liu, Meng;Kang, Qinma
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.853-864
    • /
    • 2019
  • Microblogging services (such as Twitter) are the representative information communication networks during the Web 2.0 era, which have gained remarkable popularity. Weibo has become a popular platform for information dissemination in online social networks due to its large number of users. In this study, a microblog information dissemination model is presented. Related concepts are introduced and analyzed based on the dynamic model of infectious disease, and new influencing factors are proposed to improve the susceptible-infective-removal (SIR) information dissemination model. Correlation analysis is conducted on the existing information dissemination risk and the rumor dissemination model of microblog. In this study, web hyper is used to model rumor dissemination. Finally, the experimental results illustrate the effectiveness of the method in reducing the rumor dissemination of microblogs.

Matching game based resource allocation algorithm for energy-harvesting small cells network with NOMA

  • Wang, Xueting;Zhu, Qi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5203-5217
    • /
    • 2018
  • In order to increase the capacity and improve the spectrum efficiency of wireless communication systems, this paper proposes a rate-based two-sided many-to-one matching game algorithm for energy-harvesting small cells with non-orthogonal multiple access (NOMA) in heterogeneous cellular networks (HCN). First, we use a heuristic clustering based channel allocation algorithm to assign channels to small cells and manage the interference. Then, aiming at addressing the user access problem, this issue is modeled as a many-to-one matching game with the rate as its utility. Finally, considering externality in the matching game, we propose an algorithm that involves swap-matchings to find the optimal matching and to prove its stability. Simulation results show that this algorithm outperforms the comparing algorithm in efficiency and rate, in addition to improving the spectrum efficiency.

Convolutional Neural Network Based on Accelerator-Aware Pruning for Object Detection in Single-Shot Multibox Detector (싱글숏 멀티박스 검출기에서 객체 검출을 위한 가속 회로 인지형 가지치기 기반 합성곱 신경망 기법)

  • Kang, Hyeong-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.141-144
    • /
    • 2020
  • Convolutional neural networks (CNNs) show high performance in computer vision tasks including object detection, but a lot of weight storage and computation is required. In this paper, a pruning scheme is applied to CNNs for object detection, which can remove much amount of weights with a negligible performance degradation. Contrary to the previous ones, the pruning scheme applied in this paper considers the base accelerator architecture. With the consideration, the pruned CNNs can be efficiently performed on an ASIC or FPGA accelerator. Even with the constrained pruning, the resulting CNN shows a negligible degradation of detection performance, less-than-1% point degradation of mAP on VOD0712 test set. With the proposed scheme, CNNs can be applied to objection dtection efficiently.

3D Visualization for Extremely Dark Scenes Using Merging Reconstruction and Maximum Likelihood Estimation

  • Lee, Jaehoon;Cho, Myungjin;Lee, Min-Chul
    • Journal of information and communication convergence engineering
    • /
    • v.19 no.2
    • /
    • pp.102-107
    • /
    • 2021
  • In this paper, we propose a new three-dimensional (3D) photon-counting integral imaging reconstruction method using a merging reconstruction process and maximum likelihood estimation (MLE). The conventional 3D photon-counting reconstruction method extracts photons from elemental images using a Poisson random process and estimates the scene using statistical methods such as MLE. However, it can reduce the photon levels because of an average overlapping calculation. Thus, it may not visualize 3D objects in severely low light environments. In addition, it may not generate high-quality reconstructed 3D images when the number of elemental images is insufficient. To solve these problems, we propose a new 3D photon-counting merging reconstruction method using MLE. It can visualize 3D objects without photon-level loss through a proposed overlapping calculation during the reconstruction process. We confirmed the image quality of our proposed method by performing optical experiments.

Optimal Cluster Head Selection Method for Sectorized Wireless Powered Sensor Networks (섹터기반 무선전력 센서 네트워크를 위한 최적 클러스터 헤드 선택 방법)

  • Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.176-179
    • /
    • 2022
  • In this paper, we consider a sectorized wireless powered sensor network (WPSN), wherein sensor nodes are clustered based on sectors and transmit data to the cluster head (CH) using energy harvested from a hybrid access point. We construct a system model for this sectorized WPSN and find optimal coordinates of CH that maximize the achievable transmission rate of sensing data. To obtain the optimal CH with low overhead, we perform an asymptotic geometric analysis (GA). Simulation results show that the proposed GA-based CH selection method is close to the optimal performance exhibited by exhaustive search with a low feedback overhead.

Optimizing Network Lifetime of RPL Based IOT Networks Using Neural Network Based Cuckoo Search Algorithm

  • Prakash, P. Jaya;Lalitha, B.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.255-261
    • /
    • 2022
  • Routing Protocol for Low-Power and Lossy Networks (RPLs) in Internet of Things (IoT) is currently one of the most popular wireless technologies for sensor communication. RPLs are typically designed for specialized applications, such as monitoring or tracking, in either indoor or outdoor conditions, where battery capacity is a major concern. Several routing techniques have been proposed in recent years to address this issue. Nevertheless, the expansion of the network lifetime in consideration of the sensors' capacities remains an outstanding question. In this research, aANN-CUCKOO based optimization technique is applied to obtain a more efficient and dependable energy efficient solution in IOT-RPL. The proposed method uses time constraints to minimise the distance between source and sink with the objective of a low-cost path. By considering the mobility of the nodes, the technique outperformed with an efficiency of 98% compared with other methods. MATLAB software is used to simulate the proposed model.

The Roles of Political Network Diversity and Social Media News Access in Political Participation in the United States and South Korea

  • Lee, Sun Kyong;Kim, Kyun Soo;Franklyn, Amanda
    • Asian Journal for Public Opinion Research
    • /
    • v.10 no.3
    • /
    • pp.178-199
    • /
    • 2022
  • Two surveys for exploring communicative paths toward political participation were conducted with relatively large samples of Americans (N = 1001) and South Koreans (N = 1166). Hierarchical regression modeling of the relationships among demographics, personal networks, news consumption, and cross-cutting discussion and political participation demonstrated mostly commonalities between the two samples, including the interaction between political diversity and Twitter usage for news access but with distinct effect sizes of cross-cutting discussion on political participation. We attribute the differences to the two countries' distinct histories of democracy and culture, and the commonalities to the general relationships between cross-cutting discussion and political participation moderated by strong ties political homogeneity.

Significance and Research Challenges of Defensive and Offensive Cybersecurity in Smart Grid

  • Hana, Mujlid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.29-36
    • /
    • 2022
  • Smart grid (SG) software platforms and communication networks that run and manage the entire grid are increasingly concerned about cyber security. Characteristics of the smart grid networks, including heterogeneity, time restrictions, bandwidth, scalability, and other factors make it difficult to secure. The age-old strategy of "building bigger walls" is no longer sufficient given the rise in the quantity and size of cyberattacks as well as the sophisticated methods threat actor uses to hide their actions. Cyber security experts utilize technologies and procedures to defend IT systems and data from intruders. The primary objective of every organization's cybersecurity team is to safeguard data and information technology (IT) infrastructure. Consequently, further research is required to create guidelines and methods that are compatible with smart grid security. In this study, we have discussed objectives of of smart grid security, challenges of smart grid security, defensive cybersecurity techniques, offensive cybersecurity techniques and open research challenges of cybersecurity.

Improving Adversarial Domain Adaptation with Mixup Regularization

  • Bayarchimeg Kalina;Youngbok Cho
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.2
    • /
    • pp.139-144
    • /
    • 2023
  • Engineers prefer deep neural networks (DNNs) for solving computer vision problems. However, DNNs pose two major problems. First, neural networks require large amounts of well-labeled data for training. Second, the covariate shift problem is common in computer vision problems. Domain adaptation has been proposed to mitigate this problem. Recent work on adversarial-learning-based unsupervised domain adaptation (UDA) has explained transferability and enabled the model to learn robust features. Despite this advantage, current methods do not guarantee the distinguishability of the latent space unless they consider class-aware information of the target domain. Furthermore, source and target examples alone cannot efficiently extract domain-invariant features from the encoded spaces. To alleviate the problems of existing UDA methods, we propose the mixup regularization in adversarial discriminative domain adaptation (ADDA) method. We validated the effectiveness and generality of the proposed method by performing experiments under three adaptation scenarios: MNIST to USPS, SVHN to MNIST, and MNIST to MNIST-M.