• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.03 seconds

Service-Oriented Wireless Sensor Networks Ontology for Ubiquitous Services (유비쿼터스 서비스를 위한 서비스 지향 센서 네트워크 온톨로지)

  • Kim, Jeong-Hee;Kwon, Hoon;Kim, Do-Hyeun;Kwak, Ho-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.971-978
    • /
    • 2008
  • This paper designs a service-oriented wireless sensor network ontology model which can be used as a knowledge base in future ubiquitous computing. In contrast to legacy approaches, this paper defines the new service classes (ServiceProperty, LocationProperty, and PhysicalProperty), as well as their properties and constraints that enable the service-oriented service based on service items. The service item merging between the proposed model and the legacy ontology was processed using the "equivalentClass" object property of OWL. The Protege 3.3.1 and RACER 1.9.0 inference tools were used for the validation and consistency check of the proposed ontology model, respectively, and the results of service query was applied to the newly defined property in SPARQL language without reference to the properties of legacy ontology.

A Study on Error Resilience of Header Parameters considering the activity of macroblock (매크로블록의 활동성을 고려한 헤더정보의 오류 복원에 관한 연구)

  • Kim, Jong-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.837-842
    • /
    • 2008
  • Any errors that are generated in the channels and networks distort the video quality and are propagated in both the spatial and temporal domains. In particular, header errors ran result in serious visual degradation of the output video encoding/decoding schemes that can make an error resilient compressed bit-stream in error prone environments, such as mobile networks. In this paper, we proposes an header error resilience method that consider the activity of macroblock in video bitstream syntex. The extract of header error repaetedly embeds the header parameters into the least significant bits(LSB) of the quantized DCT coefficients prior to VLC. Experimental results show that the proposed error resilience method restores good image quality despite the detected error on header parameters.

Design of the Energy Efficient Virtual Backbone Construction in the Zigbee Network (지그비 네트워크에서 효율적인 에너지 관리를 위한 가상 백본 설계)

  • Kim, Bo-Nam;Lee, Jin-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2413-2418
    • /
    • 2007
  • IN wireless sensor networks (WSNs), one challenging issue is to In wireless sensor networks (WSNs), one challenging issue is to construct a virtual backbone in a distributed and localized way while considering energy limitation. Dominating set has been used extensively as core or virtual backbone in WSNs for the purposes like routing and message broadcast. To ensure network performance, a good dominating set construction protocols should be simple and avoid introducing extra message. In addition, the resulting dominating set should be small, connected, and take into account the energy level at each node. This paper studies efficient and simple virtual backbone construction protocol using defer time in IEEE 802.15.4- based WSNs (e.g. Zigbee). The efficiency of our proposed protocol is confirmed through simulation results.

Design, calibration and application of wireless sensors for structural global and local monitoring of civil infrastructures

  • Yu, Yan;Ou, Jinping;Li, Hui
    • Smart Structures and Systems
    • /
    • v.6 no.5_6
    • /
    • pp.641-659
    • /
    • 2010
  • Structural Health Monitoring (SHM) gradually becomes a technique for ensuring the health and safety of civil infrastructures and is also an important approach for the research of the damage accumulation and disaster evolving characteristics of civil infrastructures. It is attracting prodigious research interests and the active development interests of scientists and engineers because a great number of civil infrastructures are planned and built every year in mainland China. In a SHM system the sheer number of accompanying wires, fiber optic cables, and other physical transmission medium is usually prohibitive, particularly for such structures as offshore platforms and long-span structures. Fortunately, with recent advances in technologies in sensing, wireless communication, and micro electro mechanical systems (MEMS), wireless sensor technique has been developing rapidly and is being used gradually in the SHM of civil engineering structures. In this paper, some recent advances in the research, development, and implementation of wireless sensors for the SHM of civil infrastructures in mainland China, especially in Dalian University of Technology (DUT) and Harbin Institute of Technology (HIT), are introduced. Firstly, a kind of wireless digital acceleration sensors for structural global monitoring is designed and validated in an offshore structure model. Secondly, wireless inclination sensor systems based on Frequency-hopping techniques are developed and applied successfully to swing monitoring of large-scale hook structures. Thirdly, wireless acquisition systems integrating with different sensing materials, such as Polyvinylidene Fluoride(PVDF), strain gauge, piezoresistive stress/strain sensors fabricated by using the nickel powder-filled cement-based composite, are proposed for structural local monitoring, and validating the characteristics of the above materials. Finally, solutions to the key problem of finite energy for wireless sensors networks are discussed, with future works also being introduced, for example, the wireless sensor networks powered by corrosion signal for corrosion monitoring and rapid diagnosis for large structures.

H.263-Based Scalable Video Codec (H.263을 기반으로 한 확장 가능한 비디오 코덱)

  • 노경택
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.29-32
    • /
    • 2000
  • Layered video coding schemes allow the video information to be transmitted in multiple video bitstreams to achieve scalability. they are attractive in theory for two reasons. First, they naturally allow for heterogeneity in networks and receivers in terms of client processing capability and network bandwidth. Second, they correspond to optimal utilization of available bandwidth when several video qualify levels are desired. In this paper we propose a scalable video codec architectures with motion estimation, which is suitable for real-time audio and video communication over packet networks. The coding algorithm is compatible with ITU-T recommendation H.263+ and includes various techniques to reduce complexity. Fast motion estimation is Performed at the H.263-compatible base layer and used at higher layers, and perceptual macroblock skipping is performed at all layers before motion estimation. Error propagation from packet loss is avoided by Periodically rebuilding a valid Predictor in Intra mode at each layer.

  • PDF

Identification of Profane Words in Cyberbullying Incidents within Social Networks

  • Ali, Wan Noor Hamiza Wan;Mohd, Masnizah;Fauzi, Fariza
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.1
    • /
    • pp.24-34
    • /
    • 2021
  • The popularity of social networking sites (SNS) has facilitated communication between users. The usage of SNS helps users in their daily life in various ways such as sharing of opinions, keeping in touch with old friends, making new friends, and getting information. However, some users misuse SNS to belittle or hurt others using profanities, which is typical in cyberbullying incidents. Thus, in this study, we aim to identify profane words from the ASKfm corpus to analyze the profane word distribution across four different roles involved in cyberbullying based on lexicon dictionary. These four roles are: harasser, victim, bystander that assists the bully, and bystander that defends the victim. Evaluation in this study focused on occurrences of the profane word for each role from the corpus. The top 10 common words used in the corpus are also identified and represented in a graph. Results from the analysis show that these four roles used profane words in their conversation with different weightage and distribution, even though the profane words used are mostly similar. The harasser is the first ranked that used profane words in the conversation compared to other roles. The results can be further explored and considered as a potential feature in a cyberbullying detection model using a machine learning approach. Results in this work will contribute to formulate the suitable representation. It is also useful in modeling a cyberbullying detection model based on the identification of profane word distribution across different cyberbullying roles in social networks for future works.

Optimization Algorithm for Minimizing Network Energy Consumption with Traffic Redundancy Elimination (트래픽 중복 제거로 네트워크 에너지 소비를 최소화하기 위한 최적화 알고리즘)

  • Jang, Kil-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.930-939
    • /
    • 2021
  • In recent years, the use of broadband bandwidth and redundant links for stable transmission in networks has resulted in excessive energy consumption and reduced transmission efficiency. In this paper, we propose an optimization algorithm that reduces the number of transmission links and minimizes transmission energy by removing redundant traffic in networks where traffic redundancy is allowed. The optimization algorithm proposed in this paper uses the meta-heuristic method using Tabu search algorithm. The proposed optimization algorithm minimizes transmission energy by designing a neighborhood generation method that efficiently routes overlapping traffic. The performance evaluation of the proposed optimization algorithm was performed in terms of the number of links used to transmit all traffic generated in the network and the transmission energy consumed. From the performance evaluation results, it was confirmed that the proposed algorithm is superior to other algorithms previously proposed.

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜)

  • Lee, Jong-kwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.729-738
    • /
    • 2019
  • In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.

A Practical Implementation of Deep Learning Method for Supporting the Classification of Breast Lesions in Ultrasound Images

  • Han, Seokmin;Lee, Suchul;Lee, Jun-Rak
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.24-34
    • /
    • 2019
  • In this research, a practical deep learning framework to differentiate the lesions and nodules in breast acquired with ultrasound imaging has been proposed. 7408 ultrasound breast images of 5151 patient cases were collected. All cases were biopsy proven and lesions were semi-automatically segmented. To compensate for the shift caused in the segmentation, the boundaries of each lesion were drawn using Fully Convolutional Networks(FCN) segmentation method based on the radiologist's specified point. The data set consists of 4254 benign and 3154 malignant lesions. In 7408 ultrasound breast images, the number of training images is 6579, and the number of test images is 829. The margin between the boundary of each lesion and the boundary of the image itself varied for training image augmentation. The training images were augmented by varying the margin between the boundary of each lesion and the boundary of the image itself. The images were processed through histogram equalization, image cropping, and margin augmentation. The networks trained on the data with augmentation and the data without augmentation all had AUC over 0.95. The network exhibited about 90% accuracy, 0.86 sensitivity and 0.95 specificity. Although the proposed framework still requires to point to the location of the target ROI with the help of radiologists, the result of the suggested framework showed promising results. It supports human radiologist to give successful performance and helps to create a fluent diagnostic workflow that meets the fundamental purpose of CADx.

Game-Based Content Caching and Data Sponsor Scheme for the Content Network (콘텐츠 네트워크 환경에서 게임이론을 이용한 콘텐츠 캐싱 및 데이터 스폰서 기법)

  • Won, JoongSeop;Kim, SungWook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.7
    • /
    • pp.167-176
    • /
    • 2019
  • Recently, as the types of services that can be enjoyed in mobile telecommunication networks such as social networks and video streaming are increasing, mobile users(MUs) can access mobile contents easily by consuming mobile data. However, under a mobile telecommunication environment, MUs have to pay a high data fee to a network service provider(SP) in order to enjoy contents. The 'data sponsor' technique, introduced as a way to solve this problem, has attracted attention as a breakthrough method for enhancing contents accessibility of MUs. In this paper, we propose an algorithm that determines the optimal discount rate through the Stackelberg game in the data sponsor environment. We also propose an algorithm to design edge caching, which caches highly popular content for MUs on edge server, through many-to-many matching game. Simulation results clearly indicate that the profit for CP's content consumption is improved by about 6~11%, and the profit of CP according to the ratio of edge caching is improved by about 12% than the other existing schemes under data sponsor environment.