• Title/Summary/Keyword: edge connectivity

Search Result 75, Processing Time 0.025 seconds

Efficient Design of Structured LDPC Codes (구조적 LDPC 부호의 효율적인 설계)

  • Chung Bi-Woong;Kim Joon-Sung;Song Hong-Yeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.1C
    • /
    • pp.14-19
    • /
    • 2006
  • The high encoding complexity of LDPC codes can be solved by designing structured parity-check matrix. If the parity-check matrix of LDPC codes is composed of same type of blocks, decoder implementation can be simple, this structure allow structured decoding and required memory for storing the parity-check matrix can be reduced largely. In this parer, we propose a construction algorithm for short block length structured LDPC codes based on girth condition, PEG algorithm and variable node connectivity. The code designed by this algorithm shows similar performance to other codes without structured constraint in low SNR and better performance in high SNR than those by simulation

6G in the sky: On-demand intelligence at the edge of 3D networks (Invited paper)

  • Strinati, Emilio Calvanese;Barbarossa, Sergio;Choi, Taesang;Pietrabissa, Antonio;Giuseppi, Alessandro;De Santis, Emanuele;Vidal, Josep;Becvar, Zdenek;Haustein, Thomas;Cassiau, Nicolas;Costanzo, Francesca;Kim, Junhyeong;Kim, Ilgyu
    • ETRI Journal
    • /
    • v.42 no.5
    • /
    • pp.643-657
    • /
    • 2020
  • Sixth generation will exploit satellite, aerial, and terrestrial platforms jointly to improve radio access capability and unlock the support of on-demand edge cloud services in three-dimensional (3D) space, by incorporating mobile edge computing (MEC) functionalities on aerial platforms and low-orbit satellites. This will extend the MEC support to devices and network elements in the sky and forge a space-borne MEC, enabling intelligent, personalized, and distributed on-demand services. End users will experience the impression of being surrounded by a distributed computer, fulfilling their requests with apparently zero latency. In this paper, we consider an architecture that provides communication, computation, and caching (C3) services on demand, anytime, and everywhere in 3D space, integrating conventional ground (terrestrial) base stations and flying (non-terrestrial) nodes. Given the complexity of the overall network, the C3 resources and management of aerial devices need to be jointly orchestrated via artificial intelligence-based algorithms, exploiting virtualized network functions dynamically deployed in a distributed manner across terrestrial and non-terrestrial nodes.

Adaptive Real-Time Ship Detection and Tracking Using Morphological Operations

  • Arshad, Nasim;Moon, Kwang-Seok;Kim, Jong-Nam
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.168-172
    • /
    • 2014
  • In this paper, we propose an algorithm that can efficiently detect and monitor multiple ships in real-time. The proposed algorithm uses morphological operations and edge information for detecting and tracking ships. We used smoothing filter with a $3{\times}3$ Gaussian window and luminance component instead of RGB components in the captured image. Additionally, we applied Sobel operator for edge detection and a threshold for binary images. Finally, object labeling with connectivity and morphological operation with open and erosion were used for ship detection. Compared with conventional methods, the proposed method is meant to be used mainly in coastal surveillance systems and monitoring systems of harbors. A system based on this method was tested for both stationary and non-stationary backgrounds, and the results of the detection and tracking rates were more than 97% on average. Thousands of image frames and 20 different video sequences in both online and offline modes were tested, and an overall detection rate of 97.6% was achieved.

A study of energy consumption and savings potential in wired network equipment (유선 네트워크 장비의 에너지 소모량과 절약 잠재성 연구)

  • Kim, Ki-Young;Suh, Yu-Hwa
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.12
    • /
    • pp.6469-6477
    • /
    • 2013
  • As the Internet has grown, energy consumption and GHG emission from internet use have become issues in recent years. On the other hand, such interest in greening the Internet has focused on edge devices, and there is a lack of deeper related studies of the energy wasted by excessive network-connectivity and the savings potential in wired network equipment. This study presents the background and reasonability of studies on the energy efficiency of wired networks in terms of the environment, economy and energy resources. The energy consumption and savings potential of network equipment were also estimated and the major factors of energy consumption was analyzed based on the data, and future studies for the Internet are presented.

Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing

  • Lin, Te-Yuan;Fuh, Chiou-Shann
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5654-5668
    • /
    • 2018
  • Driven by security and real-time demands of Internet of Things (IoT), the timing of fog computing and edge computing have gradually come into place. Gateways bear more nearby computing, storage, analysis and as an intelligent broker of the whole computing lifecycle in between local devices and the remote cloud. In fog computing, the edge broker requires X-aware capabilities that combines software programmability, stream processing, hardware optimization and various connectivity to deal with such as security, data abstraction, network latency, service classification and workload allocation strategy. The prosperous of Field Programmable Gate Array (FPGA) pushes the possibility of gateway capabilities further landed. In this paper, we propose a software-defined gateway (SDG) scheme for fog computing paradigm termed as Fog Computing Zero-Knowledge Gateway that strengthens data protection and resilience merits designed for industrial internet of things or highly privacy concerned hybrid cloud scenarios. It is a proxy for fog nodes and able to integrate with existing commodity gateways. The contribution is that it converts Privacy-Enhancing Technologies rules into provable statements without knowing original sensitive data and guarantees privacy rules applied to the sensitive data before being propagated while preventing potential leakage threats. Some logical functions can be offloaded to any programmable micro-controller embedded to achieve higher computing efficiency.

Bridge-edges Mining in Complex Power Optical Cable Network based on Minimum Connected Chain Attenuation Topological Potential

  • Jiang, Wanchang;Liu, Yanhui;Wang, Shengda;Guo, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1030-1050
    • /
    • 2021
  • The edges with "bridge characteristic" play the role of connecting the communication between regions in power optical cable network. To solve the problem of mining edges with "bridge characteristic" in provincial power optical cable network, the complex power optical cable network model is constructed. Firstly, to measure the generated potential energy of all nodes in n-level neighborhood local structure for one edge, the n-level neighborhood local structure topological potential is designed. And the minimum connected chain attenuation is designed to measure the attenuation degree caused by substituted edges. On the basis of that, the minimum connected chain attenuation topological potential based measurement is designed. By using the designed measurement, a bridge-edges mining algorithm is proposed to mine edges with "bridge characteristic". The experiments are conducted on the physical topology of the power optical cable network in Jilin Province. Compared with that of other three typical methods, the network efficiency and connectivity of the proposed method are decreased by 3.58% and 28.79% on average respectively. And the proposed method can not only mine optical cable connection with typical "bridge characteristic" but also can mine optical cables without obvious characteristics of city or voltage, but it have "bridge characteristic" in the topology structure.

Cloudification of On-Chip Flash Memory for Reconfigurable IoTs using Connected-Instruction Execution (연결기반 명령어 실행을 이용한 재구성 가능한 IoT를 위한 온칩 플래쉬 메모리의 클라우드화)

  • Lee, Dongkyu;Cho, Jeonghun;Park, Daejin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.14 no.2
    • /
    • pp.103-111
    • /
    • 2019
  • The IoT-driven large-scaled systems consist of connected things with on-chip executable embedded software. These light-weighted embedded things have limited hardware space, especially small size of on-chip flash memory. In addition, on-chip embedded software in flash memory is not easy to update in runtime to equip with latest services in IoT-driven applications. It is becoming important to develop light-weighted IoT devices with various software in the limited on-chip flash memory. The remote instruction execution in cloud via IoT connectivity enables to provide high performance software execution with unlimited software instruction in cloud and low-power streaming of instruction execution in IoT edge devices. In this paper, we propose a Cloud-IoT asymmetric structure for providing high performance instruction execution in cloud, still low power code executable thing in light-weighted IoT edge environment using remote instruction execution. We propose a simulated approach to determine efficient partitioning of software runtime in cloud and IoT edge. We evaluated the instruction cloudification using remote instruction by determining the execution time by the proposed structure. The cloud-connected instruction set simulator is newly introduced to emulate the behavior of the processor. Experimental results of the cloud-IoT connected software execution using remote instruction showed the feasibility of cloudification of on-chip code flash memory. The simulation environment for cloud-connected code execution successfully emulates architectural operations of on-chip flash memory in cloud so that the various software services in IoT can be accelerated and performed in low-power by cloudification of remote instruction execution. The execution time of the program is reduced by 50% and the memory space is reduced by 24% when the cloud-connected code execution is used.

Mesh Simplification for Volume and Boundary Preservation (볼륨과 경계보존을 고려한 메쉬 간략화)

  • 조진화;김성수;김영택
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10b
    • /
    • pp.583-585
    • /
    • 1999
  • 대부분의 3차원 모델을 가시화해주기 위한 시스템들은 삼각 메쉬를 기반으로 한 모델 표현법을 사용하고 있다. 이러한 시스템들은 복잡한 3차원 모델을 원격 엑세스할 때에는 모델을 가공하지 않으면 전송 및 랜더링시에 많은 제약이 따른다. 이러한 전송 시간과 랜더링 시간, 저장공간을 줄이기 위해 모델을 간략화하거나 압축하는 많은 기법들이 소개되어져 왔다. 본 논문에서는 메쉬 간략화를 위해 소개되어진 많은 다른 방법에서 사용한 에지 축약(Edge Collapse) 기반의 간략화 알고리즘을 제시한다. 기본적인 접근 방법으로는 기하학적인 메쉬 구성요소들 중에서 에지의 특성에 따라 제거 기준을 설정한 후 간략화해 나간다. 에지 축약을 위한 우선순위와 축약 이후 새로운 정점의 위치는 원본 모델을 참조하지 않고 간략화 단계의 모델에서 삼각형의 연결성(connectivity)과 정점의 위치만을 이용하여 계산하였다. 실제 이 방법은 방대한 다각형 메쉬를 간략화할 경우 메모리를 효율적으로 이용할 수 있으며, 처리 속도를 개선할 수 있다. 또한, 간략화이후에도 원본 모델의 위상(topology)을 유지할 수 있는 기법을 제시하고 있다. 세가지 모델에 대한 실험 결과에서 기하학적 에러(geometric error)를 최소화하였고, Heckbert가 제안한 방법(QSlim V2.0)과의 비교에서는 처리 속도가 개선되었다.

  • PDF

THE MULTIPLICATIVE VERSION OF WIENER INDEX

  • Hua, Hongbo;Ashrafi, Ali Reza
    • Journal of applied mathematics & informatics
    • /
    • v.31 no.3_4
    • /
    • pp.533-544
    • /
    • 2013
  • The multiplicative version of Wiener index (${\pi}$-index), proposed by Gutman et al. in 2000, is equal to the product of the distances between all pairs of vertices of a (molecular) graph G. In this paper, we first present some sharp bounds in terms of the order and other graph parameters including the diameter, degree sequence, Zagreb indices, Zagreb coindices, eccentric connectivity index and Merrifield-Simmons index for ${\pi}$-index of general connected graphs and trees, as well as a Nordhaus-Gaddum-type bound for ${\pi}$-index of connected triangle-free graphs. Then we study the behavior of ${\pi}$-index upon the case when removing a vertex or an edge from the underlying graph. Finally, we investigate the extremal properties of ${\pi}$-index within the set of trees and unicyclic graphs.

On-road Vehicle and Area Detection Using Edge Connectivity and Corner Clustering (에지 연결성과 코너 군집화를 이용한 도로영역 및 차량 검출)

  • Yu, Jae-Hyung;Han, Young-Joon;Hahn, Hern-Soo
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.1035-1036
    • /
    • 2008
  • 본 논문은 주행 중인 자동차에서 획득한 영상에서 배경과 도로영역 및 물체를 분리하기 위한 영역분할 기법과 물체 검출 기법을 제안하고자 한다. 영상내의 에지라인의 화소 간 연결성을 이용한 라인검출을 이용하여 도로의 윤곽선 정보를 추출하고 컬러분포를 통해 배경과 도로영역을 분리한다. 물체가 가지는 코너 특성을 이용하여 나타난 정보들의 군집화를 통해 후보영역을 얻고 컬러 성분을 이용하여 개별 물체를 분리해냈다. 제안된 알고리즘은 복잡한 배경을 갖는 도로영상의 경우에도 도로영역과 물체의 검출에 강인함을 실험을 통해 검증하였다.

  • PDF