• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.032 seconds

A Performance Comparison of Protein Profiles for the Prediction of Protein Secondary Structures (단백질 이차 구조 예측을 위한 단백질 프로파일의 성능 비교)

  • Chi, Sang-Mun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.26-32
    • /
    • 2018
  • The protein secondary structures are important information for studying the evolution, structure and function of proteins. Recently, deep learning methods have been actively applied to predict the secondary structure of proteins using only protein sequence information. In these methods, widely used input features are protein profiles transformed from protein sequences. In this paper, to obtain an effective protein profiles, protein profiles were constructed using protein sequence search methods such as PSI-BLAST and HHblits. We adjust the similarity threshold for determining the homologous protein sequence used in constructing the protein profile and the number of iterations of the profile construction using the homologous sequence information. We used the protein profiles as inputs to convolutional neural networks and recurrent neural networks to predict the secondary structures. The protein profile that was created by adding evolutionary information only once was effective.

Downlink Scheduling Algorithm Based on Probability of Incumbent User Presence for Cognitive Radio Networks (인지 라디오 네트워크에서 우선 사용자 출현 확률을 고려한 하향링크 스케줄링 알고리즘)

  • Heo, Dae-Cheol;Kim, Jung-Jong;Lee, Jung-Won;Hwang, Jun-Ho;Lee, Won-Cheol;Shin, Yo-An;Yoo, Myung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2B
    • /
    • pp.178-187
    • /
    • 2009
  • Cognitive radio (CR) technology is to maximize the spectrum utilization by allocating the unused spectrums to the unlicensed users. In CR environment, it is strictly required for the unlicensed users not to interference with the licensed users. Thus, it is essential to rely on the scheduling algorithm to avoid the interference when utilizing spectrum holes that are changing in time and frequency. However, the existing scheduling algorithms that are applied for the wireless communication environment considering the licensed users only is not appropriate for CR environment. In this paper, we propose downlink scheduling algorithm based on probability of incumbent user presence for cognitive radio networks. With computer simulations, it is shown that the proposed scheduling algorithm outperforms the conventional scheduling algorithm.

Analytical Approach of Fast Inter-Domain Handover Scheme in Proxy Mobile IPv6 Networks with Multicasting Support (멀티캐스팅을 지원하는 프록시 모바일IPv6 네트워크에서 빠른 도메인간 핸드오버 기법의 분석적 접근법)

  • Yoo, Se-Won;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.153-166
    • /
    • 2012
  • Multicast service will be required to be an important form of communication without interruption to the delivery of multicast service in mobile networks increasing MNs. In this paper, we review current status of PMIPv6(Proxy Mobile IPv6) multicast listener support being standardized in the IETF and point out limitations of the current approach and we proposed a fast multicast handover procedure in inter domain PMIPv6 network of network-based mobility management. The proposed Fast multicast handover procedure in inter domain optimizes multicast management by using the context of the MNs. We evaluate the proposed fast multicast handover procedure compared to the based one through the developed analytical models and confirm that introduced fast multicast handover procedure provides the reduced service interruption time and total network overhead compared to the based one during handovers.

Analysis of Energy Efficiency Considering Device-to-Device (D2D) Communications in Cellular Networks (셀룰러 네트워크에서 D2D 통신을 고려한 에너지 효율성 분석)

  • Jung, Minchae;Choi, Sooyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.7
    • /
    • pp.571-579
    • /
    • 2013
  • This paper proposes an energy-efficient mode selection and power allocation scheme in device-to-device (D2D) communication system as an underlay coexistence with cellular networks. We analyze the energy efficiency which is defined as the summation of the energy efficiencies for all devices. The proposed scheme consists of two steps. First, we calculate the transmission power maximizing the energy efficiency for all possible modes of each device. Although the proposed power cannot maximize the system capacity, we prove that the proposed transmission power is the optimal power which maximizes the energy efficiency. In the second step, we select a mode which has the maximal energy efficiency among all possible mode combinations of the devices. Then we can jointly obtain the transmission power and the mode which can maximize the energy efficiency. The proposed scheme has the optimal performance with respect to the energy efficiency and outperforms the conventional schemes.

Low Power MAC Protocol Design for Wireless Sensor Networks using Recursive Estimation Methods (회귀적 추정 방식을 이용한 무선 센서 네트워크용 저전력 MAC 프로토콜)

  • Pak, Wooguil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.3
    • /
    • pp.239-246
    • /
    • 2014
  • In the context of wireless sensor networks, one of major issues is energy conservation. For low power communication, by utilizing our experimental results for the relation between clock drift and synchronization interval, we designed a new protocol which can support a wide range of duty cycles for applications with very low traffic rate and insensitive delay. The transmission (TX) node in the protocol synchronizes with the reception (RX) node very before transmitting a packet, and it can adaptively estimate the synchronization error size according to the synchronization interval from minutes to hours. We conducted simulations and a testbed implementation to show the efficacy of the proposed protocol. We found that our protocol substantially outperforms other state-of-the-art protocols, resulting in order-of-magnitude increase in network lifetime over a variety of duty cycles.

6G in the sky: On-demand intelligence at the edge of 3D networks (Invited paper)

  • Strinati, Emilio Calvanese;Barbarossa, Sergio;Choi, Taesang;Pietrabissa, Antonio;Giuseppi, Alessandro;De Santis, Emanuele;Vidal, Josep;Becvar, Zdenek;Haustein, Thomas;Cassiau, Nicolas;Costanzo, Francesca;Kim, Junhyeong;Kim, Ilgyu
    • ETRI Journal
    • /
    • v.42 no.5
    • /
    • pp.643-657
    • /
    • 2020
  • Sixth generation will exploit satellite, aerial, and terrestrial platforms jointly to improve radio access capability and unlock the support of on-demand edge cloud services in three-dimensional (3D) space, by incorporating mobile edge computing (MEC) functionalities on aerial platforms and low-orbit satellites. This will extend the MEC support to devices and network elements in the sky and forge a space-borne MEC, enabling intelligent, personalized, and distributed on-demand services. End users will experience the impression of being surrounded by a distributed computer, fulfilling their requests with apparently zero latency. In this paper, we consider an architecture that provides communication, computation, and caching (C3) services on demand, anytime, and everywhere in 3D space, integrating conventional ground (terrestrial) base stations and flying (non-terrestrial) nodes. Given the complexity of the overall network, the C3 resources and management of aerial devices need to be jointly orchestrated via artificial intelligence-based algorithms, exploiting virtualized network functions dynamically deployed in a distributed manner across terrestrial and non-terrestrial nodes.

A multi carrier selectable routing scheme by normalized transmission characteristics (MCS-NTC) at marine multi-carrier MANETs (다중캐리어 해상 MANET에서 여러 캐리어 선택가능하고 정규화된 전송특성에 의한 경로배정방식)

  • Son, Jooyoung
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.37 no.2
    • /
    • pp.199-204
    • /
    • 2013
  • Marine data communications still look for a novel data communication system at sea because of the restriction of bandwidths and costs of current carriers. In order to make the most efficient use of the broadband land carriers at sea, this paper proposes a routing scheme (MCS-NTC) at a marine MANET model. The routing scheme optimizes the route by choosing optimal nodes and carriers among the traditional and land carriers based on normalized transmission characteristics of applications and carriers. The performance is compared with the max-win method (OMH-MW) scheme considering the specific values of transmission characteristics. The result shows that our scheme derives more efficient routes than the previous one in terms of the transmission characteristics such as bandwidth, cost, delay, the number of hops and carriers.

A Comparison of BER Performance for Receivers of NOMA in 5G Mobile Communication System (5G 이동 통신 시스템에서 비직교 다중접속의 수신기들에 대한 BER 성능의 비교)

  • Chung, Kyuhyuk
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.7-14
    • /
    • 2020
  • In the fifth generation (5G) mobile networks, the mobile services require 100 times faster connections. One of the promising 5G technologies is non-orthogonal multiple access (NOMA). In NOMA, the users share the channel resources, so that the more users can be served simultaneously. There are several advantages offered by NOMA, such as higher spectrum efficiency and low transmission latency, compared to orthogonal multiple access (OMA), which is usually used in the fourth generation (4G) mobile networks, for example, long term evolution (LTE). In this paper, we compare the receivers for NOMA. The standard NOMA receiver, the non-SIC NOMA receiver, and the symmetric superposition coding (SC) NOMA receiver are compared. Specifically, it is shown that the performance of the standard receiver is the best, whereas the performances of the non-SIC receiver and symmetric SC receiver are dependent on the power allocation.

Strongly-Connected Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Static Wireless Sensor Networks (정적 무선 센서 네트워크를 위한 강한 연결성을 가진 계층적 그리드 기반의 키 선분배 기법)

  • Nyang Dae-Hun;Abedelaziz Mohaisen
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.14-23
    • /
    • 2006
  • Wireless Sensor Network(WSN) consists of huge number of sensor nodes which are small and inexpensive with very limited resources. The public key cryptography is undesirable to be used in WSN because of the limitations of the resources. A key management and predistribution techniques are required to apply the symmetric key cryptography in such a big network. Many key predistribution techniques and approaches have been proposed, but most of-them didn't consider the real WSN assumptions, In this paper, we propose a security framework that is based on a hierarchical grid for WSN considering the proper assumptions of the communication traffic and required connectivity. We apply simple keying material distribution scheme to measure the value of our framework. Finally, we provide security analysis for possible security threats in WSN.

A Leverage Strategy of the Cyber warfare Security Policy Based on systems Thinking (시스템 사고를 이용한 사이버전 보안 정책 레버리지 전략 연구)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Park, Ho-Kyun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.77-83
    • /
    • 2013
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. The concept of the battlefield is also changing to one that includes not only physical spaces but all areas including the networks of the nation's key industries and military facilities, energy facilities, transportation, and communication networks. In light of the changing warfare in terms of how it is conducted and what form it takes, the Korea military has to seek ways to effectively respond to threats of cyber warfare. In the past, although partial strategies on cyber warfare were studied, no research was done through the overall system flow. In this paper, key variables related to cyber warfare security are classified into personnel, management, and technology. A simple model and an extended model are suggested for each area, and based on the technology area of the extended model, formal methods are used to verify the validity and a detailed response strategy is suggested according to the identified leverage.