• 제목/요약/키워드: CA Algorithm

검색결과 227건 처리시간 0.023초

Multi-Channel MAC Protocol Using Statistical Channel Utilization for Cognitive Networks

  • Xiang, Gao;Zhu, Wen-Min;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • 제8권3호
    • /
    • pp.273-276
    • /
    • 2010
  • Opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

ATM기반 유무선 통합망에서 이동성으로 인한 핸드오프 QoS보장 방안 (Handoff QoS guarnatee on ATM-based wired/wireless integrated network)

  • 장경훈;강경훈;심재정;김덕진
    • 전자공학회논문지S
    • /
    • 제34S권10호
    • /
    • pp.33-51
    • /
    • 1997
  • On ATM-based wired/wireless integrated network, we apply the connection re-routing method[1] which reduced the inter-cluster handoff delay by reserving VPI/VCLs for possible inter-cluster handoff calls in advance. Additionally, we propose wired resource reservation methods, which are ausiliary method and split method, for handoff QoS guarantee of various expected services. The characteristics of these methods reserve wired connection resources based on the information on the possible inter-cluster handoff calls. With mathematical analysis, we also propose each algorithm and cost function for deciding an optimal amount in reserving resources. With numberical examples, we can see that the auxiliary method effectively reduces the cost in all cases(.alpha.>.betha., .alpha.=.betha., and .alpha.<.betha.). The split method has a little cost-reduction effects, when handoffs call does not have priority over new calls (that is, .alpha..leq..betha.) and the total capacity is relatively large. In other cases, the split method, however, has effective cost-reduction effects. The numerical resutls show that these reservation methods ca flexibly cope with the time-variant environment and meet the QoS requriements on the inter-cluster handoff calls.

  • PDF

DEVCS 모델을 사용한 심근 활성화과정의 시뮬레이션 (A Simulation of the Myocardium Activation Process using the Discrete Event Cell Space Model)

  • 김광년;정동근;김기련;최병철;이정태;전계록
    • 한국시뮬레이션학회논문지
    • /
    • 제13권4호
    • /
    • pp.1-16
    • /
    • 2004
  • The modelling and simulation of the activation process for the heart system is meaningful to understand special excitatory and conductive system in the heart and to study cardiac functions because the heart activation conducts through this system. This thesis proposes two dimensional cellular automaton(CA) model for the activation process of the myocardium and conducted simulation by means of discrete time and discrete event algorithm. In the model, cells are classified into anatomically similar characteristic parts of the heart and each of cells has a set of cells with preassigned properties. Each cell in this model has state variables to represent the state of the cell and has some state transition rules to change values of state variables executed by state transition function. The state transition rule is simple as follows. First, the myocardium cell at rest stay in passive state. Second, if any one of neighborhood cell in the myocardium cell is active state then the state is change from passive to active state. Third, if cell's state is an active then automatically go to the refractory state after activation phase. Four, if cell's state is refractory then automatically go to the passive state after refractory phase. These state transition is processed repeatedly in all cells through the termination of simulation.

  • PDF

지문 생체알고리즘을 통한 개인 인증 연구 (Thank with CA method of biologic algorithm)

  • 정지문;신정길;장동진;최성
    • 한국데이타베이스학회:학술대회논문집
    • /
    • 한국데이타베이스학회 2000년도 추계학술대회 E-Business와 정보보안
    • /
    • pp.253-258
    • /
    • 2000
  • 오늘날 많은 국가들이 전자상거래 부문을 세계 여러 국가들 보다 빨리 선점하기 위해서 많이 노력하고 있다. 그리고 전자상거래가 활성화된 국가에서는 앞선 기술로서 가상공간에서의 자국의 위치를 높이고 있다. 우리나라도 전자상거래가 활성화되는 과정에 있다. 그러나 가상공간 즉, 인터넷에서 해결되지 못한 문제들이 많이 있다. 그 중에서도 세계 여러 나라들도 해결하지 못한 문제 바로 보안에 관한 문제이다. 인터넷에서의 보안문제는 여러 가지 문제들이 있다. 그러나 본 논문에서는 개인 인증에 관하여 중점적으로 다루려 한다. 개인 인증 방법에는 PKI 개념에서 RSA 암호알고리즘과, 전자서명 등이 있다. 그리고 공인 인증기관에서 개인에 대한 인증을 해 주는 경우가 있다. 현재 이러한 인증방법에 대해서 알아보고, 문제점과 함께 해결방안으로 생체알고리즘을 통한 인증 방법, 특히 지문에 대해서 개인 인증 방법을 다루려 한다. 특히 지문을 통한 생체알고리즘은 패턴 인식방향 보다 이미지에 대한 직접적인 의미 부여를 통해서 전송속도와 전송량을 줄이려고 노력했다. 이런 방식으로 얻어낸 이미지를 전자주민 카드 지문 시스템과 상호 호환이 될 수 있도록 연구하였다.

  • PDF

Algorithms for Classifying the Results at the Baccalaureate Exam-Comparative Analysis of Performances

  • Marcu, Daniela;Danubianu, Mirela;Barila, Adina;Simionescu, Corina
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.35-42
    • /
    • 2021
  • In the current context of digitalization of education, the use of modern methods and techniques of data analysis and processing in order to improve students' school results has a very important role. In our paper, we aimed to perform a comparative study of the classification performances of AdaBoost, SVM, Naive Bayes, Neural Network and kNN algorithms to classify the results obtained at the Baccalaureate by students from a college in Suceava, during 2012-2019. To evaluate the results we used the metrics: AUC, CA, F1, Precision and Recall. The AdaBoost algorithm achieves incredible performance for classifying the results into two categories: promoted / rejected. Next in terms of performance is Naive Bayes with a score of 0.999 for the AUC metric. The Neural Network and kNN algorithms obtain scores of 0.998 and 0.996 for AUC, respectively. SVM shows poorer performance with the score 0.987 for AUC. With the help of the HeatMap and DataTable visualization tools we identified possible correlations between classification results and some characteristics of data.

Design and characterization of a Muon tomography system for spent nuclear fuel monitoring

  • Park, Chanwoo;Baek, Min Kyu;Kang, In-soo;Lee, Seongyeon;Chung, Heejun;Chung, Yong Hyun
    • Nuclear Engineering and Technology
    • /
    • 제54권2호
    • /
    • pp.601-607
    • /
    • 2022
  • In recent years, monitoring of spent nuclear fuel inside dry cask storage has become an important area of national security. Muon tomography is a useful method for monitoring spent nuclear fuel because it uses high energy muons that penetrate deep into the target material and provides a 3-D structure of the inner materials. We designed a muon tomography system consisting of four 2-D position sensitive detector and characterized and optimized the system parameters. Each detector, measuring 200 × 200 cm2, consists of a plastic scintillator, wavelength shifting (WLS) fibers and, SiPMs. The reconstructed image is obtained by extracting the intersection of the incoming and outgoing muon tracks using a Point-of-Closest-Approach (PoCA) algorithm. The Geant4 simulation was used to evaluate the performance of the muon tomography system and to optimize the design parameters including the pixel size of the muon detector, the field of view (FOV), and the distance between detectors. Based on the optimized design parameters, the spent fuel assemblies were modeled and the line profile was analyzed to conduct a feasibility study. Line profile analysis confirmed that muon tomography system can monitor nuclear spent fuel in dry storage container.

Metaheuristic-reinforced neural network for predicting the compressive strength of concrete

  • Hu, Pan;Moradi, Zohre;Ali, H. Elhosiny;Foong, Loke Kok
    • Smart Structures and Systems
    • /
    • 제30권2호
    • /
    • pp.195-207
    • /
    • 2022
  • Computational drawbacks associated with regular predictive models have motivated engineers to use hybrid techniques in dealing with complex engineering tasks like simulating the compressive strength of concrete (CSC). This study evaluates the efficiency of tree potential metaheuristic schemes, namely shuffled complex evolution (SCE), multi-verse optimizer (MVO), and beetle antennae search (BAS) for optimizing the performance of a multi-layer perceptron (MLP) system. The models are fed by the information of 1030 concrete specimens (where the amount of cement, blast furnace slag (BFS), fly ash (FA1), water, superplasticizer (SP), coarse aggregate (CA), and fine aggregate (FA2) are taken as independent factors). The results of the ensembles are compared to unreinforced MLP to examine improvements resulted from the incorporation of the SCE, MVO, and BAS. It was shown that these algorithms can considerably enhance the training and prediction accuracy of the MLP. Overall, the proposed models are capable of presenting an early, inexpensive, and reliable prediction of the CSC. Due to the higher accuracy of the BAS-based model, a predictive formula is extracted from this algorithm.

Key-based dynamic S-Box approach for PRESENT lightweight block cipher

  • Yogaraja CA;Sheela Shobana Rani K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권12호
    • /
    • pp.3398-3415
    • /
    • 2023
  • Internet-of-Things (IoT) is an emerging technology that interconnects millions of small devices to enable communication between the devices. It is heavily deployed across small scale to large scale industries because of its wide range of applications. These devices are very capable of transferring data over the internet including critical data in few applications. Such data is exposed to various security threats and thereby raises privacy-related concerns. Even devices can be compromised by the attacker. Modern cryptographic algorithms running on traditional machines provide authentication, confidentiality, integrity, and non-repudiation in an easy manner. IoT devices have numerous constraints related to memory, storage, processors, operating systems and power. Researchers have proposed several hardware and software implementations for addressing security attacks in lightweight encryption mechanism. Several works have made on lightweight block ciphers for improving the confidentiality by means of providing security level against cryptanalysis techniques. With the advances in the cipher breaking techniques, it is important to increase the security level to much higher. This paper, focuses on securing the critical data that is being transmitted over the internet by PRESENT using key-based dynamic S-Box. Security analysis of the proposed algorithm against other lightweight block cipher shows a significant improvement against linear and differential attacks, biclique attack and avalanche effect. A novel key-based dynamic S-Box approach for PRESENT strongly withstands cryptanalytic attacks in the IoT Network.

초음파영상에서 갑상선 결절의 컴퓨터자동진단을 위한 Texture Features 알고리즘 응용 (Application of Texture Features algorithm using Computer Aided Diagnosis of Papillary Thyroid Cancer in the Ultrasonography)

  • 고성진;이진수;예수영;김창수
    • 한국콘텐츠학회논문지
    • /
    • 제13권5호
    • /
    • pp.303-310
    • /
    • 2013
  • 초음파영상은 갑상선 질병에서 결절성 갑상선 질병을 진단하는 검사로서 결절의 위치, 크기, 개수, 내부 에코 특성에 대한 정보를 제공하여 암의 가능성이 높은 고위험 결절을 선별하며, 세침흡인 검사 시 정확한 유도를 가능하게 한다. 갑상선 결절 중 악성으로 진단되는 경우는 5% 미만이지만 초음파에서 감별진단이 중요하다. 그러므로 본 연구에서는 병리학적으로 갑상선 유두암으로 진단된 증례를 실험 대상으로 하며, 영역을 묘사하는 알고리즘으로 그 질감을 정량화하는 방법으로 질감특징 분석(TFA)를 적용하여 컴퓨터자동진단의 검출 효율을 실험하였다. 초음파영상에서 관심영역을 설정하여 $50{\times}50$ 픽셀 크기, 히스토그램 평활화로 전처리하여 실험영상을 획득하였다. 전체영상 70증례에서 갑상선 유두암의 영상 35증례를 테스트 영상으로 하고, 고유영상 생성의 정상영상 35증례를 학습영상으로 실험하였다. 질감특징 분석 알고리즘을 적용한 실험결과 GLavg, SKEW, UN, ENT 4개 파라미터의 질병 검출 효율이 91~100%로 높게 나타났다. 이는 갑상선 결절 질병을 감별하는 컴퓨터자동진단의 응용을 나타내며, 갑상선 질병의 감별진단에 전처리 자동진단 가능성을 나타낸다. 향후 추가적인 관련 알고리즘의 연구가 계속 진행된다면 갑상선 질병의 컴퓨터자동진단의 실용화기반을 마련할 수 있을 것이고, 다양한 초음파영상의 질병에 대한 적용이 가능할 것으로 사료된다.

폐암의 세기조절방사선치료에서 PBC 알고리즘과 AAA 알고리즘의 비교연구 (Comparison of Intensity Modulated Radiation Therapy Dose Calculations with a PBC and AAA Algorithms in the Lung Cancer)

  • 오세안;강민규;예지원;김성훈;김기환;김성규
    • 한국의학물리학회지:의학물리
    • /
    • 제23권1호
    • /
    • pp.48-53
    • /
    • 2012
  • 방사선치료계획장치에서 선량계산을 위해 PBC 알고리즘(pencil beam convolution)은 가장 널리 사용되고 있다. Varian (Varian Medical System, Palo Alto, CA)사는 광자의 선량 계산을 위해서 AAA 알고리즘을 새롭게 선량계산모델로 탑재하였다. 본 연구는 폐와 같은 저밀도 영역에 종양부위가 있는 환자를 대상으로 세기조절방사선치료를 시행할 경우에 PBC 알고리즘과 AAA 알고리즘으로 계산했을 때 차이를 정량적으로 알고자 하는데 목적이 있다. 두 알고리즘의 정량적 분석을 위해서 Eclipse planning system과 I'mRT matrixx (IBA, Schwarzenbruck, Germany)를 사용하였다. 또한 두 알고리즘으로 계산된 선량과 실제 측정된 선량의 차이를 확인하기 위해서 인체모형펜텀(Alderson Rando phantom)속에 TLD-100 (LiF)을 위치 시켰다. 종양부위 주위의 중요장기인 trachea, esophagus, lung, PRV spinal cord의최대선량, 평균선량, 최소선량은 알고리즘의 변화에 따라서 거의 변화가 없었으나, PTV의 V95는 PBC와 비교하여 AAA가 약 6% 감소하는 결과를 얻었다. 이러한 결과는 I'mRT matrixx를 이용하여 저밀도를 가지는 폐의 위치에서 확연하게 나타남을 확인할 수 있었다. 또한 인체모형펜텀(Alderson Rando phantom)과 TLD-100 (LiF)을 이용한 계산선량과 실제 측정치의 결과는 PBC 알고리즘은 평균 4.6%의 차이를 보였으며, AAA 알고리즘은 평균 2.7%의 차이를 보였다. 이 결과로 저밀도를 가지는 폐암에서의 세기조절방사선치료를 시행할 경우에 PBC 알고리즘보다 AAA 알고리즘이 더 유효함을 알 수 있다.