• Title/Summary/Keyword: CA Algorithm

Search Result 226, Processing Time 0.033 seconds

Coefficient Allocated DV-Hop algorithm for Wireless Sensor Networks localization (무선 센서 네트워크를 위한 DV-Hop 기반 계수 할당을 통한 위치 인식 알고리즘)

  • Ekale, Etinge Martin;Lee, Chaewoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.837-840
    • /
    • 2010
  • Wireless Sensor Networks have been proposed for several location-dependent applications. For such systems, the cost and limitations of the hardware on sensing nodes prevent the use of range-based localization schemes that depend on absolute point to point distance estimates. Because coarse accuracy is sufficient for most sensor network applications, solutions in range-free localization are being pursued as a cost-effective alternative to more expensive range-based approaches. In this paper, we proposed a Coefficient Allocated DV-Hop (CA DV-Hop) algorithm which reduces node's location error by awarding a credit value with respect to number of hops of each anchor to an unknown node. Simulation results have verified the high estimation accuracy with our approach which outperforms the classical DV-Hop.

Detection and Classification of Major Aerosol Type Using the Himawari-8/AHI Observation Data (Himawari-8/AHI 관측자료를 이용한 주요 대기 에어로솔 탐지 및 분류 방법)

  • Lee, Kwon-Ho;Lee, Kyu-Tae
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.34 no.3
    • /
    • pp.493-507
    • /
    • 2018
  • Due to high spatio-temporal variability of amount and optical/microphysical properties of atmospheric aerosols, satellite-based observations have been demanded for spatiotemporal monitoring the major aerosols. Observations of the heavy aerosol episodes and determination on the dominant aerosol types from a geostationary satellite can provide a chance to prepare in advance for harmful aerosol episodes as it can repeatedly monitor the temporal evolution. A new geostationary observation sensor, namely the Advanced Himawari Imager (AHI), onboard the Himawari-8 platform, has been observing high spatial and temporal images at sixteen wavelengths from 2016. Using observed spectral visible reflectance and infrared brightness temperature (BT), the algorithm to find major aerosol type such as volcanic ash (VA), desert dust (DD), polluted aerosol (PA), and clean aerosol (CA), was developed. RGB color composite image shows dusty, hazy, and cloudy area then it can be applied for comparing aerosol detection product (ADP). The CALIPSO level 2 vertical feature mask (VFM) data and MODIS level 2 aerosol product are used to be compared with the Himawari-8/AHI ADP. The VFM products can deliver nearly coincident dataset, but not many match-ups can be returned due to presence of clouds and very narrow swath. From the case study, the percent correct (PC) values acquired from this comparisons are 0.76 for DD, 0.99 for PA, 0.87 for CA, respectively. The MODIS L2 Aerosol products can deliver nearly coincident dataset with many collocated locations over ocean and land. Increased accuracy values were acquired in Asian region as POD=0.96 over land and 0.69 over ocean, which were comparable to full disc region as POD=0.93 over land and 0.48 over ocean. The Himawari-8/AHI ADP algorithm is going to be improved continuously as well as the validation efforts will be processed by comparing the larger number of collocation data with another satellite or ground based observation data.

An Optimal Model for Indoor Pedestrian Evacuation considering the Entire Distribution of Building Pedestrians (건물내 전체 인원분포를 고려한 실내 보행자 최적 대피모형)

  • Kwak, Su-Yeong;Nam, Hyun-Woo;Jun, Chul-Min
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.20 no.2
    • /
    • pp.23-29
    • /
    • 2012
  • Existing pedestrian and evacuation models generally seek to find locally optimal solutions for the shortest or the least time paths to exits from individual locations considering pedestrian's characteristics (eg. speed, direction, sex, age, weight and size). These models are not designed to produce globally optimal solutions that reduce the total evacuation time of the entire pedestrians in a building when all of them evacuate at the same time. In this study, we suggest a globally optimal model for indoor pedestrian evacuation to minimize the total evacuation time of occupants in a building considering different distributions of them. We used the genetic algorithm, one of meta-heuristic techniques because minimizing the total evacuation time can not be easily solved by polynomial expressions. We found near-optimal evacuation path and time by expressing varying pedestrians distributions using chromosomes and repeatedly filtering solutions. In order to express and experiment our suggested algorithm, we used CA(cellular automata)-based simulator and applied to different indoor distributions and presented the results.

Design of E-Tongue System using Neural Network (신경회로망을 이용한 휴대용 전자 혀 시스템의 설계)

  • Jung, Young-Chang;Kim, Dong-Jin;Kim, Jeong-Do;Jung, Woo-Suk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.6 no.2
    • /
    • pp.149-158
    • /
    • 2005
  • In this paper, we have designed and implemented a portable e-tongue (electronic tongue) system using MACS (multi array chemical sensor) and PDA. The system embedded in PDA has merits such as comfortable user interface and data transfer by internet from on-site to remote computer. MACS was made up 7 electrodes (${NH_4}^+$, $Na^+$, $Cl^-$, ${NO_3}^-$, $K^+$, $Ca^{2+}$, $Na^+$, pH) and a reference electrode. For learning the system, we adapted the Levenberg-Marquardt algorithm based on the back-propagation, which could iteratively learned the pre-determined standard patterns, in e-tongue system. Conclusionally, the relationship between the standard patterns and unknown pattern can be easily analyzed. The e-tongue was applied to whiskeys and cognac (one high level whisky, one low level whiskey, two cognac) and 2 sample whiskeys for each standard patterns and unknown patterns. The relationship between the standard patterns and unknown patterns can be easily analyzed.

  • PDF

The Method of Localization using Radical Line among Sensor Nodes under the Internet Of Things (사물 인터넷 환경에서 Radical Line을 이용한 센서 노드간의 지역화방법)

  • Shin, Bong-Hi;Jeon, Hye-Kyoung
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.207-212
    • /
    • 2015
  • The sensor network that is component of the Internet of Things require a lot of research to select the best route to send information to the anchor node, to collect a number of environment and cost efficient for communication between the sensor life. On the sensor network in one of the components of IOT's environment, sensor nodes are an extension device with low power low capacity. For routing method for data transmission between the sensor nodes, the connection between the anchor and the node must be accurate with in adjacent areas relatively. Localization CA (Centroid Algorithm) is often used although an error frequently occurs. In this paper, we propose a range-free localization method between sensor nodes based on the Radical Line in order to solve this problem.

A Study on Detecting Selfish Nodes in Wireless LAN using Tsallis-Entropy Analysis (뜨살리스-엔트로피 분석을 통한 무선 랜의 이기적인 노드 탐지 기법)

  • Ryu, Byoung-Hyun;Seok, Seung-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.12-21
    • /
    • 2012
  • IEEE 802.11 MAC protocol standard, DCF(CSMA/CA), is originally designed to ensure the fair channel access between mobile nodes sharing the local wireless channel. It has been, however, revealed that some misbehavior nodes transmit more data than other nodes through artificial means in hot spot area spreaded rapidly. The misbehavior nodes may modify the internal process of their MAC protocol or interrupt the MAC procedure of normal nodes to achieve more data transmission. This problem has been referred to as a selfish node problem and almost literatures has proposed methods of analyzing the MAC procedures of all mobile nodes to detect the selfish nodes. However, these kinds of protocol analysis methods is not effective at detecting all kinds of selfish nodes enough. This paper address this problem of detecting selfish node using Tsallis-Entropy which is a kind of statistical method. Tsallis-Entropy is a criteria which can show how much is the density or deviation of a probability distribution. The proposed algorithm which operates at a AP node of wireless LAN extracts the probability distribution of data interval time for each node, then compares the one with a threshold value to detect the selfish nodes. To evaluate the performance of proposed algorithm, simulation experiments are performed in various wireless LAN environments (congestion level, how selfish node behaviors, threshold level) using ns2. The simulation results show that the proposed algorithm achieves higher successful detection rate.

Development of TLD Algorithms by Monochromatic Fluorescence Radiations and Continuous Spectrum X-rays (단일에너지 형광 X선 및 연속 스펙트럼 X선장에 의한 TLD 알고리즘 개발)

  • Kim, Jang-Lyul;Kim, Bong-Hwan;Chang, Si-Young;Lee, Jai-Ki
    • Journal of Radiation Protection and Research
    • /
    • v.23 no.3
    • /
    • pp.159-174
    • /
    • 1998
  • Personal dosimetry system is required to measure the personal dose equivalent accurately in a wide range of radiation fields, but the dose evaluation algorithms have been developed with the X-ray fields described in MOST Ordinance (equivalent to the ANSI N13.11) from which the actual fields to be monitored may be significantly different. To evaluate the dose more accurately when workers are exposed to the non-ANSI N13.11 radiation fields, two algorithms for monochromatic radiations (one algorithm was used for various ratios of TL dosimeter and the other for matrix approximation) were developed with the experimental data of the energy responses of the $CaSO_4:Dy$ TL materials irradiated by monochromatic X-ray fields recently established in KAERI, and compared with the another algorithm developed on the basis of the ANSI N13.11 continuous spectrum X-ray fields. Then it follows the discussions for some results of the algorithm testing including mixed fields irradiations and angular response conducted in IAEA/RCA intercomparison as well as ANSI and ISO continuous spectrum X-ray and monochromatic radiation fields. The developed algorithms were successfully performed the test not only in the continuous spectrum X-ray fields given by MOST Ordinance but also in the several non-MOST Ordinance radiation fields which could be encountered in the practical working environments.

  • PDF

Image Encryption Scheme using Complemented MLCA and Special Chaos Map (여원 MLCA와 특수 혼돈 함수를 이용한 영상 암호화 기법)

  • Jeong, Hyun-Soo;Park, Kyu-Chil;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.873-880
    • /
    • 2020
  • The proposed encryption algorithm strengthens its security by converting pixel-specific values and changing pixel positions. The state transition matrix created by Wolfram's rule creates a complemented CA sequence with the maximum length. Then, we convert the sequence into a 2D basis image and go through a XOR operation with the original image. The final encrypted image is created by shear stressing and rearranging. The image stability analysis verified that the proposed encryption method has high security.

Design and Implementation of Secure Vehicle Communication Protocols for WAVE Communication Systems (WAVE 통신 시스템을 위한 차량 보안 통신 프로토콜의 설계 및 구현)

  • Park, Seung-Peom;Ahn, Jae-Won;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.841-847
    • /
    • 2015
  • The WAVE(Wireless Access in Vehicular Environments) communication system supports wireless communication environments between vehicles. As the utilization of wireless communication has been increased, attack methods have been varied. There is a high risk on packet manipulations conducted by third party. In this paper, we have designed a secure communication protocol between CA and vehicles. Our designed protocol uses a ECIES(Elliptic Curve Integrated Encryption Scheme) for vehicle authentication and AES(Advanced Encryption Standard) algorithm for protecting packet integrity and confidentiality.

Numerical Study of Particle Motion and Particle Beam Formation Through a Critical Orifice (임계 오리피스를 통과한 입자의 운동특성과 입자 빔에 관한 수치적 연구)

  • Ahn, Jin-Hong;Ahn, Kang-Ho
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.23 no.10
    • /
    • pp.1240-1247
    • /
    • 1999
  • Particle motion through a disk type critical orifice placed in a 3.0cm diameter chamber has been studied numerically. In the simulation, the velocity field is solved using Pantankar's SIMPLER algorithm for the compressible flow and convergence of the computation is confirmed if the mass source at each control volume is smaller than $10^{-7}$. The particle motion in the flow field is solved in Lagrangian method. The particle trajectories showed that the particles injected away from the center line are expanded rapidly. At lower pressures, this expansion phenomena are more dominant. At lower pressures, the clear difference in particle and air speed is showed all the way down to the exit plan. It was found that particles with Stokes number of ca.2.5 tend to focus close to the center line very well except the particles travelling near the wall. However, particles with Stokes number greater than ca.2.5 show a tendency to cross the center line.