• Title/Summary/Keyword: network time-delay

Search Result 1,471, Processing Time 0.027 seconds

Normalized Recognition Method using Characteristic Vector of Speech Signal (음성의 특징벡터를 사용한 정규화 인식수법)

  • Choi, Jae-Seung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.616-618
    • /
    • 2011
  • 본 논문에서는 음성의 특징벡터를 추출하여 음성인식을 위한 인식 알고리즘을 제안한다. 본 논문에서 제안하는 방법은 사람의 음성을 정규화하여 시간지연신경회로망을 사용하여 음성인식을 하는 인식 알고리즘이다. 본 논문에서는 시간지연신경회로망을 이용하여 입력되는 음성정보를 일정시간 동안 학습시킨 후에 새로이 입력되는 정보를 인식하는 수법이다. 본 실험에서는 음성인식률에 의하여 본 알고리즘의 유효성을 확인한다.

  • PDF

Realizing TDNN for Word Recognition on a Wavefront Toroidal Mesh-array Neurocomputer

  • Hong Jeong;Jeong, Cha-Gyun;Kim, Myung-Won
    • Journal of Electrical Engineering and information Science
    • /
    • v.1 no.1
    • /
    • pp.98-107
    • /
    • 1996
  • In this paper, we propose a scheme that maps the time-delay neural network (TDNN) into the neurocomputer called EMIND-II which has the wavefront toroidal mesh-array structure. This neurocomputer is scalable, consists of many timeshared virtual neurons, is equipped with programmable on-chip learning, and is versatile for building many types of neural networks. Also we define the programming model of this array and derive the parallel algorithms about TDNN for the proposed neurocomputer EMIND-II. In addition, the computational complexities for the parallel and serial algorithms are compared. Finally, we introduce an application of this neurocomputer to word recognition.

  • PDF

A congestion control scheme estimating global channel busy ratio in VANETs

  • Kim, Tae-won;Jung, Jae-il;Lee, Joo-young
    • Journal of IKEEE
    • /
    • v.21 no.2
    • /
    • pp.115-122
    • /
    • 2017
  • In vehicular safety service, every vehicle broadcasts Basic Safety Message (BSM) periodically to inform neighbor vehicles of host vehicle information. However, this can cause network congestion in a region that is crowded with vehicles resulting in a reduction in the message delivery ratio and an increase in the end-to-end delay. Therefore, it could destabilize the vehicular safety service system. In this paper, in order to improve the congestion control and to consider the hidden node problem, we propose a congestion control scheme using entire network congestion level estimation combined with transmission power control, data rate control and time slot based transmission control algorithm. The performance of this scheme is evaluated using a Qualnet network simulator. The simulation result shows that our scheme mitigates network congestion in heavy traffic cases and enhances network capacity in light traffic cases, so that packet error rate is perfectly within 10% and entire network load level is maintained within 60~70%. Thus, it can be concluded that the proposed congestion control scheme has quite good performance.

NETWORK-ADAPTIVE ERROR CONTROL FOR VIDEO STREAMING OVER WIRELESS MULTI-HOP NETWORKS

  • Bae, Jung-Tae;Kim, Jong-Won
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.385-389
    • /
    • 2009
  • Multi-hop wireless mesh networks (WMNs) suffer from significant packet losses due to insufficient available bandwidth and high channel error probability. To conquer packet losses, end-to-end (E2E) error control schemes have been proposed. However, in WMNs, E2E error control schemes are not effective in adapting to the time-varying network condition due to large delay. Thus, in this paper, we propose a network-adaptive error control for video streaming over WMNs that flexibly operates E2E and hop-by-hop (HbH) error control according to network condition. Moreover, to provide lightweight support at intermediate nodes for HbH error control, we use path-partition-based adaptation. To verify the proposed scheme, we implement it and evaluate its transport performance through MPEG-2 video streaming over a real IEEE 802.11a-based WMN testbed.

  • PDF

Optimized Security Algorithm for IEC 61850 based Power Utility System

  • Yang, Hyo-Sik;Kim, Sang-Sig;Jang, Hyuk-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.3
    • /
    • pp.443-450
    • /
    • 2012
  • As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, which may jeopardize the national security, vulnerability of communication infrastructure has a serious impact on the power grid network. While security aspects of power grid network have been studied much, security mechanisms are rarely adopted in power gird communication network. For security issues, strict timing requirements are defined in IEC 61850 for mission critical messages (i.e., GOOSE). In this paper, we apply security algorithms (i.e., MD-5, SHA-1, and RSA) and measure their processing time and transmission delay of secured mission critical messages. The results show the algorithms satisfying the timing requirements defined in IEC 61850 and we observer the algorithm that is optimal for secure communication of mission critical messages. Numerical analysis shows that SHA-1 is preferable for secure GOOSE message sending.

Node Incentive Mechanism in Selfish Opportunistic Network

  • WANG, Hao-tian;Chen, Zhi-gang;WU, Jia;WANG, Lei-lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1481-1501
    • /
    • 2019
  • In opportunistic network, the behavior of a node is autonomous and has social attributes such as selfishness.If a node wants to forward information to another node, it is bound to be limited by the node's own resources such as cache, power, and energy.Therefore, in the process of communication, some nodes do not help to forward information of other nodes because of their selfish behavior. This will lead to the inability to complete cooperation, greatly reduce the success rate of message transmission, increase network delay, and affect the overall network performance. This article proposes a hybrid incentive mechanism (Mim) based on the Reputation mechanism and the Credit mechanism.The selfishness model, energy model (The energy in the article exists in the form of electricity) and transaction model constitute our Mim mechanism. The Mim classifies the selfishness of nodes and constantly pay attention to changes in node energy, and manage the wealth of both sides of the node by introducing the Central Money Management Center. By calculating the selfishness of the node, the currency trading model is used to differentiate pricing of the node's services. Simulation results show that by using the Mim, the information delivery rate in the network and the fairness of node transactions are improved. At the same time, it also greatly increases the average life of the network.

FPGA Implementation of a Burst Cell Synchroniser for the ATM-PON Upstream (ATM-PON의 상향에서 버스트 셀 동기장치의 FPGA 구현)

  • Kim, Tae-Min;Chung, Hae;Shin, Gun-Soon;Kim, Jin-Hee;Sohn, Soo-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.12
    • /
    • pp.1-9
    • /
    • 2001
  • In the APON(ATM Passive Optical Network), the transmission of the upstream traffic is based on a TDMA(Time Division Multiple Access) method that an OLT(Optical Line Termination) permits ONUs(Optical Network Units) sending cells by allocating time slots. Because the upstream is not a streaming mode, the cell synchronizer has to be operated in the burst mode. Also, the cell phase monitor is required to prevent collisions between cells which are transmitted by multiple ONUs through a single optical fiber. In this paper, a TDMA burst cell synchroniser is implemented with the FPGA(Field Programmable Gate Array) being used in the APON based on G.983.1 for transmitting upstream cells. It has two main functions which are the upstream data recovery and the phase monitoring. The former is to recover the upstream data and clock in the OLT by seeking the preamble which is the overhead of the upstream time slot and by aligning the phase of the bit and cell with the system clock. The latter is to provide the information to the ONU to compensate for the equalization delay by monitoring continuously the phase difference between adjacent cells to avoid the cell collision on the upstream.

  • PDF

Control of an Inverted Pendulum System with CAN for Communication Medium (CAN을 통신매체로 하는 역진자 시스템의 제어)

  • Cho Sung-Min;Choi Hyoun-Chul;Hong Suk-Kyo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.4
    • /
    • pp.346-352
    • /
    • 2006
  • In a networked control system (NCS), time delays which are larger than one sampling period can change the control period. As a result, it may cause system instability. This paper presents a control method for an NCS using the controller area network (CAN), where time delays arise in the control loop. Specifically, a simple yet efficient method is proposed to improve control performance in the presence of time delays. The proposed method, which can be regarded as a gain scheduling method, selects a suitable LQ control gain among several gains to deal with the problems due to the change of control period. It is found that the gain can be scheduled in terms of the relation between the gain and the sampling period, which is represented by first-order algebraic equations. The proposed method is evaluated with an inverted cart pendulum system where the actuator and sensors are connected through the CAN. Experiment results are presented to show the efficiency of the proposed method.

A Cell Shaping Scheme on The Traffic Characteristics in ATM Network (ATM 망에서 트래픽 특성에 의한 셀 쉐이핑)

  • Yoon Seok-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.195-200
    • /
    • 2004
  • The change of traffic by the CDV is entered in a condensed form in UUC/NPC, overflowing the buffer of the net and possibly causing its congestion. For this reason this paper proposes the Cell Spacing Scheme. As the Cell Shaping Scheme, two method is proposed ; RAT based on the time in which cells enter the spacer and RDT based on the time in which cells come out from the spacer. This paper proposes the improved spacing sheme in which the departure time of the present cell determines the departure time of the next one, by combining with Leaky Bucket and on the traffic characteristics of ATM network.

  • PDF

Multipath Searcher for W-CDMA System (W-CDMA 시스템을 위한 다중경노 탐색기)

  • 원석호;김환우
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6B
    • /
    • pp.601-609
    • /
    • 2002
  • In multi-path wireless channels with time-variant delay profile, a mobile station measures the received signal strength and report it to network which performs network control function such as handover. In order to improve the maximum ratio combining (MRC) gain, it also should search the strongest signal paths and measure their time offsets fast and exactly. This paper proposes some methods of fast and exactly measuring the multi-path signal strength and time offset. Since the W-CDMA system adopts antenna diversity technique for the next generation high speed packet access (HSDPA) service, we derive the optimum design parameter values for the proposed methods through computer simulations under the HSDPA conditions o( low speed of mobile, of no power control, and of multi-path wireless environment with transmit and receive antenna diversity. Finally, we prove the validity of the proposed methods by showing the improvement of the bit error rate (BER) performance.