• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.028 seconds

Cascade Fusion-Based Multi-Scale Enhancement of Thermal Image (캐스케이드 융합 기반 다중 스케일 열화상 향상 기법)

  • Kyung-Jae Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.301-307
    • /
    • 2024
  • This study introduces a novel cascade fusion architecture aimed at enhancing thermal images across various scale conditions. The processing of thermal images at multiple scales has been challenging due to the limitations of existing methods that are designed for specific scales. To overcome these limitations, this paper proposes a unified framework that utilizes cascade feature fusion to effectively learn multi-scale representations. Confidence maps from different image scales are fused in a cascaded manner, enabling scale-invariant learning. The architecture comprises end-to-end trained convolutional neural networks to enhance image quality by reinforcing mutual scale dependencies. Experimental results indicate that the proposed technique outperforms existing methods in multi-scale thermal image enhancement. Performance evaluation results are provided, demonstrating consistent improvements in image quality metrics. The cascade fusion design facilitates robust generalization across scales and efficient learning of cross-scale representations.

Content and Producer Popularity-Based eFficient Cache Policy in CCN (CCN에서 콘텐츠·생성자 인기도 기반 효율적 캐시 기법)

  • Dong-Geon Lee;Tae-Wook Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.5
    • /
    • pp.817-826
    • /
    • 2024
  • Modern networks and the internet now handle an unprecedented volume of data packets, making efficient traffic management increasingly challenging. To address this issue, next-generation network architectures like Content-Centric Networks (CCN) have emerged. CCN focuses on content-centric data processing to minimize unnecessary traffic. Traditional internet architectures primarily use an end-to-end approach, where multiple users requesting content simultaneously can lead to a surge in traffic. In contrast, CCN optimizes traffic by utilizing in-network cache functions, reducing the time required to serve content to users. Therefore, in CCN, it is crucial to determine which caching policy to apply for effective content management. Existing research has proposed various caching methods based on factors like Hit count and producer popularity. However, these methods often fail to consider content type, resulting in situations where less popular videos are removed in favor of images, potentially increasing network traffic. This study proposes a caching strategy that distinguishes between content type and producer popularity to further reduce network traffic and response time.

Reliable multi-hop communication for structural health monitoring

  • Nagayama, Tomonori;Moinzadeh, Parya;Mechitov, Kirill;Ushita, Mitsushi;Makihata, Noritoshi;Ieiri, Masataka;Agha, Gul;Spencer, Billie F. Jr.;Fujino, Yozo;Seo, Ju-Won
    • Smart Structures and Systems
    • /
    • v.6 no.5_6
    • /
    • pp.481-504
    • /
    • 2010
  • Wireless smart sensor networks (WSSNs) have been proposed by a number of researchers to evaluate the current condition of civil infrastructure, offering improved understanding of dynamic response through dense instrumentation. As focus moves from laboratory testing to full-scale implementation, the need for multi-hop communication to address issues associated with the large size of civil infrastructure and their limited radio power has become apparent. Multi-hop communication protocols allow sensors to cooperate to reliably deliver data between nodes outside of direct communication range. However, application specific requirements, such as high sampling rates, vast amounts of data to be collected, precise internodal synchronization, and reliable communication, are quite challenging to achieve with generic multi-hop communication protocols. This paper proposes two complementary reliable multi-hop communication solutions for monitoring of civil infrastructure. In the first approach, termed herein General Purpose Multi-hop (GPMH), the wide variety of communication patterns involved in structural health monitoring, particularly in decentralized implementations, are acknowledged to develop a flexible and adaptable any-to-any communication protocol. In the second approach, termed herein Single-Sink Multi-hop (SSMH), an efficient many-to-one protocol utilizing all available RF channels is designed to minimize the time required to collect the large amounts of data generated by dense arrays of sensor nodes. Both protocols adopt the Ad-hoc On-demand Distance Vector (AODV) routing protocol, which provides any-to-any routing and multi-cast capability, and supports a broad range of communication patterns. The proposed implementations refine the routing metric by considering the stability of links, exclude functionality unnecessary in mostly-static WSSNs, and integrate a reliable communication layer with the AODV protocol. These customizations have resulted in robust realizations of multi-hop reliable communication that meet the demands of structural health monitoring.

A Study on the Viewer Usage and Evaluation of Television Network Websites and the Respective Feedback (지상파 TV 3사의 홈페이지 이용실태와 서비스 평가에 관한 연구)

  • Seol, Jin-Ah
    • Korean journal of communication and information
    • /
    • v.32
    • /
    • pp.147-168
    • /
    • 2006
  • This study attempts to evaluate the Korean terrestrial television networks‘ internet site effectiveness, specifically in addressing user motivations and user evaluations and in gauging the broadcasters' feedback. The result shows that the primary motive for using a broadcaster's internet homepage was to obtain information. Overall, the users tended to be dissatisfied with the services, especially with regards to its navigational structure and design and with the insufficient number of appropriate content items. The reason cited highest for dissatisfaction was the fee-based services. Among the three networks, Seoul Broadcasting System, the sole commercial network, received the most complaints from the respondents in this respect. The study results reveal that broadcasters' feedback systems to users were deemed responsive and timely, but a true interactivity between the broadcasters and the viewers was lacking. In conclusion, network televisions' internet sites and increased content access through them have provided a platform for increased communication with their viewers, however, these sites are not yet being fully utilized as effective interactive communication feedback channels but more as a unidirectional information source. In addition, the network television services seem to be lacking in providing users with efficient navigational structure, good design, or adequate content level and quality. Thus, to better serve the public, it is recommended that they improve internet homepage usability by assessing and applying qualitative researches regarding the users.

  • PDF

Experimental Design of AODV Routing Protocol with Maximum Life Time (최대 수명을 갖는 AODV 라우팅 프로토콜 실험 설계)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.29-45
    • /
    • 2017
  • Ad hoc sensor network is characterized by decentralized structure and ad hoc deployment. Sensor networks have all basic features of ad hoc network except different degrees such as lower mobility and more stringent energy requirements. Existing protocols provide different tradeoffs among some desirable characteristics such as fault tolerance, distributed computation, robustness, scalability and reliability. wireless protocols suggested so far are very limited, generally focusing on communication to a single base station or on aggregating sensor data. The main reason having such restrictions is due to maximum lifetime to maintain network activities. The network lifetime is an important design metric in ad hoc networks. Since every node does a router role, it is not possible for other nodes to communicate with each other if some nodes do not work due to energy lack. In this paper, we suggest an experimental ad-hoc on-demand distance vector routing protocol to optimize the communication of energy of the network nodes.The load distribution avoids the choice of exhausted nodes at the route selection phase, thus balances the use of energy among nodes and maximizing the network lifetime. In transmission control phase, there is a balance between the choice of a high transmission power that lead to increase in the range of signal transmission thus reducing the number of hops and lower power levels that reduces the interference on the expense of network connectivity.

Improvement of Computational Complexity of Device-to-Device (D2D) Resource Allocation Algorithm in LTE-Advanced Networks (LTE-Advanced 환경에서 D2D 자원 할당 알고리즘의 계산 복잡도 개선)

  • Lee, Han Na;Kim, Hyang-Mi;Kim, SangKyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.762-768
    • /
    • 2015
  • D2D communication as an underlaying LTE-Advanced network has proven to be efficient in improving the network performance and decreasing the traffic load of eNodeB(enhanced NodeB). However large amount of interference can be caused by sharing the resources between the cellular users and D2D pairs. So, a resource allocation for D2D communication to coordinate the interference is necessary. Related works for resource allocation that D2D can reuse the resources of more than one cellular user with best CQI(Channel Quality Indicator) have been proposed. D2D communications may still cause interference to the primary cellular network when radio resource are shared between them. To avoid this problem, we propose a radio resource allocation algorithm with low computational complexity for D2D communication in OFDM-based wireless cellular networks. Unlike the previous works, the proposed algorithm utilizes unused ones of the whole resource. The unused resource allocate to on D2D pair can be shared only with other D2D pairs. In other words, if the distance between the D2D pairs is sufficient, we allowed more than two D2D pairs to share the same resources. The simulation results have proven that the proposed algorithm has up to 11 times lower computational complexity than the compared one according to the number of D2D.

A Study on New Genre of Public Art in Mullae Art Village: Focus on Adorno's Mimesis and Benjamin's Active Companion (문래동 예술촌의 공공예술 실천에 대한 연구: 아도르노의 미메시스(Mimesis)와 벤야민의 '적극적 동반자' 개념을 중심으로)

  • Jung, Na-Ri;Kang, Jin-Suk
    • Korean journal of communication and information
    • /
    • v.66
    • /
    • pp.87-109
    • /
    • 2014
  • The purpose of this study is to investigate public art in Mullae art Village based on Adorno's Mimesis and explore a wide range of possibilities of new genre of public art. This study found out the new possibility of not only artist network, but also networks of local villagers and iron factory workers, and considered in-depth analysis of new genre public art in Mullae art village focusing on their active participations in art programs. By analyzing the artists' stories through interviews, low-cost rental accommodation brought a influx of artists into the village, and they formed their artist networks working by themselves. At this point, this could be judged a critical phenomenon in accordance with Adorno's mimesis. However, by external pressures such as government policies for setting up Mullae Art factory or downtown redevelopment, artists sought independent role in Mullae-dong and doing active public art programs grounded on mimesis. Artists were seeking a way to cope with the economy mechanism doing new genre of public art based on mimesis, and found out the possibility of formation of relationships with local residents and iron factory workers. This study was seemed to suggest the direction of new genre of public art through Mullae art village case, and considers new political measure plans for culture and art policy.

  • PDF

An Efficient Group Key Distribution Mechanism for the Secure Multicast Communication in Mobile Ad Hoc Networks (이동 애드혹 네트워크에서 안전한 멀티캐스트 통신을 위한 효율적인 그룹 키 분배 방식)

  • Lim Yu-Jin;Ahn Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.339-344
    • /
    • 2006
  • Secure delivery of multicast data can be achieved with the use of a group key for data encryption in mobile ad hoc network (MANET) applications based on the group communication. However, for the support of dynamic group membership, the group key has to be updated for each member joining/leaving and, consequently, a mechanism distributing an updated group key to members is required. The two major categories of the group key distribution mechanisms proposed for wired networks are the naive and the tree-based approaches. The naive approach is based on unicast, so it is not appropriate for large group communication environment. On the other hand, the tree-based approach is scalable in terms of the group size, but requires the reliable multicast mechanism for the group key distribution. In the sense that the reliable multicast mechanism requires a large amount of computing resources from mobile nodes, the tree-based approach is not desirable for the small-sized MANET environment. Therefore, in this paper, we propose a new key distribution protocol, called the proxy-based key management protocol (PROMPT), which is based on the naive approach in the small-sized MANET environment. PROMPT reduces the message overhead of the naive through the first-hop grouping from a source node and the last-hop grouping from proxy nodes using the characteristics of a wireless channel.

Implementation of Analysis System for H.323 Traffic (H.323 트래픽 분석 시스템의 개발)

  • Lee Sun-Hun;Chung Kwang-Sue
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.471-480
    • /
    • 2006
  • Recently, multimedia communication services, such as video conferencing and voice over IP, have been rapidly spread. H.323 is an international standard that specifies the components, protocols and procedures that provide multimedia communication services of real-time audio, video, and data communications over packet networks, including IP based networks. H.323 is applied to many commercial services because it supports various network environments and has a good performance. But communication services based on H.323 may have some problem because of current network trouble or mis-implementation of H.323. The understanding of this problem is a critical issue because it improves the quality of service and is easy to service maintenance. In this paper, we implement the analysis system for H.323 protocol wihch includes H.245, H.225.0, RTP, RTCP, and so on. Tills system is able to capture, parse, and present the H.323 protocol in real-time. Through the operation test and performance evaluation, we prove that our system is a useful to analyze and understand the problems for communication services based on H.323.

Adaptation of p-Cycle considering QoS Constraints in WDM Networks (WDM 망에서 QoS 제약 조건을 고려한 p-Cycle 적용 방안)

  • Shin, Sang-Heon;Shin, Hae-Joon;Kim, Young-Tak
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.5
    • /
    • pp.668-675
    • /
    • 2003
  • In this paper, we propose an enhanced p-cycle (preconfigured protection cycle) scheme for WDM mesh networks with QoS constraints. In the previous researches on p-cycle, it is assumed that user's connection has a hi-directional connectivity and the same bandwidth on both direction. Therefore it is difficult to apply p-cycle based link protection to uni-directional connections for multicasting or asymmetric broadband multimedia communications with hi-directional connectivity. And it didn't consider QoS of backup path. We enhanced the p-cycles to accomodate uni-directional connections for multicasting or asymmetric bandwidth communications with hi-directional connectivity. And we propose a selection procedure of p-cycle to assure QoS of backup path. We were able to reduce a required backup bandwidth by applying a uni-directional p-cycle concept to asymmetric broadband multimedia communication environment. The proposed p-cycle selection procedure is applied to the U.S. sample network to evaluate whether the configured p-cycles can support QoS constraint of working path and backup path.