• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.029 seconds

ANN-based Adaptive Distance Measurement Using Beacon (비콘을 사용한 ANN기반 적응형 거리 측정)

  • Noh, Jiwoo;Kim, Taeyeong;Kim, Suntae;Lee, Jeong-Hyu;Yoo, Hee-Kyung;Kang, Yungu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.147-153
    • /
    • 2018
  • Beacon enables one to measure distance indoors based on low-power Bluetooth low energy (BLE) technology, while GPS (Global Positioning System) only can be used outdoors. In measuring indoor distance using Beacon, RSSI (Received Signal Strength Indication) is considered as the one of the key factors, however, it is influenced by various environmental factors so that it causes the huge gap between the estimated distance and the real. In order to handle this issue, we propose the adaptive ANN (Artificial Neural Network) based approach to measuring the exact distance using Beacon. First, we has carried out the preprocessing of the RSSI signals by applying the extended Kalman filter and the signal stabilization filter into decreasing the noise. Then, we suggest the multi-layered ANNs, each of which layer is learned by specific training data sets. The results showed an average error of 0.67m, a precision of 0.78.

Weakly-supervised Semantic Segmentation using Exclusive Multi-Classifier Deep Learning Model (독점 멀티 분류기의 심층 학습 모델을 사용한 약지도 시맨틱 분할)

  • Choi, Hyeon-Joon;Kang, Dong-Joong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.227-233
    • /
    • 2019
  • Recently, along with the recent development of deep learning technique, neural networks are achieving success in computer vision filed. Convolutional neural network have shown outstanding performance in not only for a simple image classification task, but also for tasks with high difficulty such as object segmentation and detection. However many such deep learning models are based on supervised-learning, which requires more annotation labels than image-level label. Especially image semantic segmentation model requires pixel-level annotations for training, which is very. To solve these problems, this paper proposes a weakly-supervised semantic segmentation method which requires only image level label to train network. Existing weakly-supervised learning methods have limitations in detecting only specific area of object. In this paper, on the other hand, we use multi-classifier deep learning architecture so that our model recognizes more different parts of objects. The proposed method is evaluated using VOC 2012 validation dataset.

A New Cell Selection Scheme with Adaptive Bias for Ultra Dense Heterogeneous Mobile Communication Networks (초밀집 이종 이동 통신망을 위한 적응형 편향치를 활용한 새로운 셀 선택 기법)

  • Jo, Jung-Yeon;Ban, Tae-Won;Jung, Bang Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.63-66
    • /
    • 2015
  • As smart-phones become popular, mobile data traffic has been dramatically increasing and intensive researches on the next-generation mobile communication network is in progress to meet the increasing demand for mobile data traffic. In particular, heterogeneous network (HetNet) is attracting much interest because it can significantly enhance the network capacity by increasing the spatial resue with macro and small cells. In the HetNet, we have several problems such as load imbalance and interference because of the difference in transmit power between macro and small cells and cell range expansion (CRE) can mitigate the problems. In this paper, we propose a new cell selection scheme with adaptive cell range expansion bias (CREB) for ultra dense HetNet and we analyze the performance of the proposed scheme in terms of average cell transmission rate through system-level simulations and compare it with those of other schemes.

  • PDF

Integrated FR traffic policing mechanism in a FR-ATM Interworking (FR-ATM 연동에서 Frame Relay 트래픽 통합 감시제어 방안)

  • Nam, Yun-Seok;Gang, Beop-Ju
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.407-412
    • /
    • 2002
  • A FR-ATM interworking function that has FR and ATM interfaces, should guarantee the QoS of both frame relay and ATM networks. The IWF requires the policing mechanisms for FR and ATM respectively, and needs to map the traffic parameters each other. In this case, traffic parameter mapping and policing function are performed independently. In the aspect of FR traffic policing, this function degrades processor performance if it is worked by software, or includes additional hardware function. The best way to solve this is to integrate this function into ATM function because ATM is performed by well defined hardware already. In this paper we propose the integrated traffic control mechanism. That is, frames are segmented to cells first, and then policing mechanism is applied to the cells to guarantee the FR QoS. Therefore proper policing algorithm is essential to the integrated FR traffic mechanism. The evaluations are done with simulations in comparison of existing FR algorithms, ATM VBR and GFR policing algorithms, and the proposed algorithm.

Family Resilience in Divorced Female Single-Parent Families : In Case of Residents in the Institutional Facility for Female Single-Parent Families (이혼한 여성 한부모가족의 가족레질리언스(Family Resilience) 연구 : 모자보호시설 입소자를 중심으로)

  • Kim, Kyung-Soon;Lee, Mi-Sook
    • Journal of Families and Better Life
    • /
    • v.27 no.1
    • /
    • pp.89-105
    • /
    • 2009
  • A family resilience approach aims to identify and fortify key interactional processes that enable families to withstand and rebound from disruptive life challenges. Walsh(1998) described family belief systems, organizational patterns, and communication processes as the three main keys of family resilience. The purpose of this study was to identify the three key factors of family resilience in case of divorced female single-parent families in Korea. The study participants were seven divorced mothers who were living in the institutional facility for female single-parent families. Using a qualitative approach, in-depth interviews were audiotaped and transcribed verbatim for analysis. The study findings were as follows. First, the participants showed positive thinking rather than fear about the adversity induced by the divorce. They also showed the senses of competence, control, and self-esteem. However, the senses of transcendence and spirituality were barely evident. Second, emotional and economic supports from parents, brothers and sisters, and community networks (i.e., mother-child protection institution, healthy family support center) enhanced the family resilience of the participants. Third, the participants showed clear communication, open emotional expression, and shared decision making. This study suggests that more counseling services and parent education be provided by healthy family support center and institutional facilities as important family resilience factors for divorced female single-parent families who are below the poverty line.

Research on Security Model and Requirements for Fog Computing: Survey (포그 컴퓨팅 보안 모델과 보안 요구사항 연구: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.5
    • /
    • pp.27-32
    • /
    • 2018
  • IoT technology is developing with various application areas in $4^{th}$ Industrial revolution. There are many users using the application services. Sensing data from various environment need to be transferred to cloud computing storage and store in the cloud storage. However, physical distance from the end node to cloud computing storage is far away, and it is not efficient to transfer data from sensors and store the sensing data in the cloud storage whenever sensing data happen. Therefore, Fog computing is proposed to solve these problems which can process and store the sensing data. However, Fog computing is new emerging technology, there is no standard security model and requirements. This research proposes to security requirements and security model for Fog computing to establish a secure and efficient cloud computing environment.

Classification of Consonants by SOM and LVQ (SOM과 LVQ에 의한 자음의 분류)

  • Lee, Chai-Bong;Lee, Chang-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.1
    • /
    • pp.34-42
    • /
    • 2011
  • In an effort to the practical realization of phonetic typewriter, we concentrate on the classification of consonants in this paper. Since many of consonants do not show periodic behavior in time domain and thus the validity for Fourier analysis of them are not convincing, vector quantization (VQ) via LBG clustering is first performed to check if the feature vectors of MFCC and LPCC are ever meaningful for consonants. Experimental results of VQ showed that it's not easy to draw a clear-cut conclusion as to the validity of Fourier analysis for consonants. For classification purpose, two kinds of neural networks are employed in our study: self organizing map (SOM) and learning vector quantization (LVQ). Results from SOM revealed that some pairs of phonemes are not resolved. Though LVQ is free from this difficulty inherently, the classification accuracy was found to be low. This suggests that, as long as consonant classification by LVQ is concerned, other types of feature vectors than MFCC should be deployed in parallel. However, the combination of MFCC/LVQ was not found to be inferior to the classification of phonemes by language-moded based approach. In all of our work, LPCC worked worse than MFCC.

Adaptive Control Technique for the Random Access Channel in DVB-RCS2 based Next Generation Military Satellite Networks (DVB-RCS2 기반 차세대 군 위성 네트워크 랜덤 액세스 채널 적응형 제어 기법)

  • Lee, WonKyun;Jang, Dae-Hee;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.99-108
    • /
    • 2020
  • In this paper, we analyze the most suitable RA method among PAMA, DAMA, and RA classified by the multiple access method of satellite communication in the rapidly changing traffic environment according to the emergency and tactical situation. It suggests an alternative to improve the limit of output degradation. Based on the CRDSA protocol selected as the standard of DVB-RCS2 among the current satellite communication methods, CRDSA2R (Contention) maintains an optimal RA channel environment by checking the limitations in an environment where packet volume is rapidly increasing and observing channel load and channel conditions. We propose a Resolution Diversity Slotted ALOHA with Adaptive Random Access.

Design and Implementation of a Protocol for u-Safety Service (u-안심 서비스 프로토콜 설계 및 구현)

  • Cho, Byung Soon;Lee, Jae Min
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.12
    • /
    • pp.117-128
    • /
    • 2013
  • u-safety service system inter-works with the diverse operation agencies, through CCTV network, such as the emergency call terminal with built-in GPS, the mobile communication network, u-safety service provider, relay system and CCTV control center. In the case of the emergency call, this service searches the location of caller in real time, and then continues to search the location of caller through the control of CCTV in the searched place, and can provide the several agencies like guardian, police office, fire station, hospitals, relief organizations and municipalities, with the diverse information necessary for the secure rescue through SMS and wired network. In this paper, a new protocol and specification for u-safety service relay system is designed and implemented. The effectiveness of presented protocol is verified by computer simulation. The designed protocol of u-safety service is applied to real 3GPP and 3GPP2 mobile communication networks to verify its performance.

Performace Evaluation of Global MANET adapted to Internet Access solution (인터넷 억세스 솔루션을 적용한 Global MANET의 성능 분석)

  • Jung, Chan-Hyuk;Oh, Se-Duk;Kim, Hyun-Wook;Lee, Kwang-Bae;Yu, Choung-Ryoul;Mun, Tae-Su
    • Journal of IKEEE
    • /
    • v.10 no.1 s.18
    • /
    • pp.75-86
    • /
    • 2006
  • The MANET that can make autonomous distributed Network with Routing function has many differences than past wireless communication. For upcoming ALL-IP environment, MANET device should be connected with wired Internet Network and MANET is required to have a gateway to bridge two different networks to share information from any place. In this paper, Using the GMAHN Algorithm proposed Proactive, Reactive, Hybrid method that provides Inteface between Wired Internet network and MANET, we learned each method's the advantage and disadvantage through the various network environments. And also, we presented the optimization method of Hybrid combined Proactive with Reactive.

  • PDF