• Title/Summary/Keyword: Information Processing Technology

Search Result 7,830, Processing Time 0.032 seconds

A New Incentive Based Bandwidth Allocation Scheme For Cooperative Non-Orthogonal Multiple Access (협력 비직교 다중 접속 네트워크에서 새로운 인센티브 기반 주파수 할당 기법)

  • Kim, Jong Won;Kim, Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.6
    • /
    • pp.173-180
    • /
    • 2021
  • Non Orthogonal Multiple Access (NOMA) is a technology to guarantee the explosively increased Quality of Service(QoS) of users in 5G networks. NOMA can remove the frequent orthogonality in Orthogonal Multiple Access (OMA) while allocating the power differentially to classify user signals. NOMA can guarantee higher communication speed than OMA. However, the NOMA has one disadvantage; it consumes a more energy power when the distance increases. To solve this problem, relay nodes are employed to implement the cooperative NOMA control idea. In a cooperative NOMA network, relay node participations for cooperative communications are essential. In this paper, a new bandwidth allocation scheme is proposed for cooperative NOMA platform. By employing the idea of Vickrey-Clarke-Groves (VCG) mechanism, the proposed scheme can effectively prevent selfishly actions of relay nodes in the cooperative NOMA network. Especially, base stations can pay incentives to relay nodes as much as the contributes of relay nodes. Therefore, the proposed scheme can control the selfish behavior of relay nodes to improve the overall system performance.

A Study on the Design and Implementation of Multi-Disaster Drone System Using Deep Learning-Based Object Recognition and Optimal Path Planning (딥러닝 기반 객체 인식과 최적 경로 탐색을 통한 멀티 재난 드론 시스템 설계 및 구현에 대한 연구)

  • Kim, Jin-Hyeok;Lee, Tae-Hui;Han, Yamin;Byun, Heejung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.4
    • /
    • pp.117-122
    • /
    • 2021
  • In recent years, human damage and loss of money due to various disasters such as typhoons, earthquakes, forest fires, landslides, and wars are steadily occurring, and a lot of manpower and funds are required to prevent and recover them. In this paper, we designed and developed a disaster drone system based on artificial intelligence in order to monitor these various disaster situations in advance and to quickly recognize and respond to disaster occurrence. In this study, multiple disaster drones are used in areas where it is difficult for humans to monitor, and each drone performs an efficient search with an optimal path by applying a deep learning-based optimal path algorithm. In addition, in order to solve the problem of insufficient battery capacity, which is a fundamental problem of drones, the optimal route of each drone is determined using Ant Colony Optimization (ACO) technology. In order to implement the proposed system, it was applied to a forest fire situation among various disaster situations, and a forest fire map was created based on the transmitted data, and a forest fire map was visually shown to the fire fighters dispatched by a drone equipped with a beam projector. In the proposed system, multiple drones can detect a disaster situation in a short time by simultaneously performing optimal path search and object recognition. Based on this research, it can be used to build disaster drone infrastructure, search for victims (sea, mountain, jungle), self-extinguishing fire using drones, and security drones.

Current status analysis for the protection of emotional workers in Pyeongtaek area (평택지역 감정노동자 보호를 위한 현황분석)

  • Jung, Hye Jung;Jung, Su Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.55-60
    • /
    • 2021
  • In order to prepare basic data for research on the protection of emotional workers in Pyeongtaek with the support of Pyeongtaek City, this study conducted a survey centered on 104 counselors classified as emotional laborers. Based on the results of the survey centered on 104 emotional workers, basic research data on the difficulties of emotional workers can be prepared, and protection methods for emotional workers who are currently interested in each local government can be found. As a result of selecting a sample centering on counselors in Pyeongtaek City for a survey on the actual condition of emotional workers, and conducting a survey based on the selected samples, it was found that emotional workers did not find their rights to human rights and were not protected even in the workplace. Currently, a bill to protect emotional workers is being announced, but it is not protected, so it is confirmed that system improvement is necessary. This study focused on 104 items that were significant through pre-processing among the recovered questionnaires. It was analyzed using SPSS, R, and it was confirmed that there is a need for a regulation that can provide an institutional device in Pyeongtaek City. In this study, it is judged that it is necessary to prepare a protective device for emotional workers by selecting more samples corresponding to the occupational group of emotional workers.

Effective Utilization of Domain Knowledge for Relational Reinforcement Learning (관계형 강화 학습을 위한 도메인 지식의 효과적인 활용)

  • Kang, MinKyo;Kim, InCheol
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.3
    • /
    • pp.141-148
    • /
    • 2022
  • Recently, reinforcement learning combined with deep neural network technology has achieved remarkable success in various fields such as board games such as Go and chess, computer games such as Atari and StartCraft, and robot object manipulation tasks. However, such deep reinforcement learning describes states, actions, and policies in vector representation. Therefore, the existing deep reinforcement learning has some limitations in generality and interpretability of the learned policy, and it is difficult to effectively incorporate domain knowledge into policy learning. On the other hand, dNL-RRL, a new relational reinforcement learning framework proposed to solve these problems, uses a kind of vector representation for sensor input data and lower-level motion control as in the existing deep reinforcement learning. However, for states, actions, and learned policies, It uses a relational representation with logic predicates and rules. In this paper, we present dNL-RRL-based policy learning for transportation mobile robots in a manufacturing environment. In particular, this study proposes a effective method to utilize the prior domain knowledge of human experts to improve the efficiency of relational reinforcement learning. Through various experiments, we demonstrate the performance improvement of the relational reinforcement learning by using domain knowledge as proposed in this paper.

The Effect of Ground Heterogeneity on the GPR Signal: Numerical Analysis (지반의 불균질성이 GPR탐사 신호에 미치는 영향에 대한 수치해석적 분석)

  • Lee, Sangyun;Song, Ki-il;Ryu, Heehwan;Kang, Kyungnam
    • Journal of the Korean GEO-environmental Society
    • /
    • v.23 no.8
    • /
    • pp.29-36
    • /
    • 2022
  • The importance of subsurface information is becoming crucial in urban area due to increase of underground construction. The position of underground facilities should be identified precisely before excavation work. Geophyiscal exporation method such as ground penetration radar (GPR) can be useful to investigate the subsurface facilities. GPR transmits electromagnetic waves to the ground and analyzes the reflected signals to determine the location and depth of subsurface facilities. Unfortunately, the readability of GPR signal is not favorable. To overcome this deficiency and automate the GPR signal processing, deep learning technique has been introduced recently. The accuracy of deep learning model can be improved with abundant training data. The ground is inherently heteorogeneous and the spacially variable ground properties can affact on the GPR signal. However, the effect of ground heterogeneity on the GPR signal has yet to be fully investigated. In this study, ground heterogeneity is simulated based on the fractal theory and GPR simulation is carried out by using gprMax. It is found that as the fractal dimension increases exceed 2.0, the error of fitting parameter reduces significantly. And the range of water content should be less than 0.14 to secure the validity of analysis.

A Study on the Blockchain-Based Access Control Using Random-List in Industrial Control System (산업제어시스템에서 랜덤리스트를 이용한 블록체인 기반 접근제어 방식에 관한 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.147-156
    • /
    • 2022
  • Industrial control systems that manage and maintain various industries were mainly operated in closed environment without external connection, but with the recent development of the Internet and the introduction of ICT technology, the access to the industrial control system of external or attackers has become easier. Such incorrect approaches or attacks can undermine the availability, a major attribute of the industrial control system, and violation of availability can cause great damage. In this paper, when issuing commands in an industrial control system, a verification group is formed using a random list to verify and execute commands, and a trust score technique is introduced that applies feedback to the verification group that conducted verification using the command execution result. This technique can reduce overhead generated by random generation in the process of requesting command verification, give flexibility to the verification process, and ensure system availability. For the performance analysis of the system, we measured the time and gas usage when deploying a smart contract, gas usage when verifying a command. As a result, we confirmed that although the proposed system generates a random list compared to the legacy system, there was little difference in the time when it took to deploy smart contract and that the gas used to deploy smart contract increased by about 1.4 times in the process of generating a random list. However, the proposed system does not perform random operations even though the operation of command verification and confidence score technique is performed together during the command verification process, thus it uses about 9% less gas per verification, which ensures availability in the verification process.

A study on the correction of the connection part of the underground facility 3D model and the correction of irregularities (지하시설물 3차원 모델 연결부 보정 및 요철보정에 관한 연구)

  • Kim, Sung Su;Han, Kyu Won;Heo, Sung Seo;Han, Sang Hoon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.6
    • /
    • pp.429-435
    • /
    • 2021
  • The integrated underground space map shows the underground facility(water supply, sewage, gas, electric power, communication, heating), underground structures (subway, underpass, underground walkway, underground parking lot, underground shopping mall, common ward), ground(drilling, coffin, geology) refers to a map constructed so that a total of 15 types of underground information can be checked at a glance on a three-dimensional basis. The purpose of this study is to develop a technology to correct the problem of curved surface processing and the unevenness of underground facility pipelines that occur in converting 2D underground facility data into 3D-based underground space integrated map(3D underground facility model). do it with. To this end, we first investigated and reviewed the domestic and foreign status of technologies that generate data on underground facilities based on three dimensions, and developed a surface correction algorithm and an unevenness correction algorithm to solve practical problems. Algorithms to verify the developed algorithm This applied correction program was developed. Based on the above process, the three-dimensional model of the underground facility could be produced identically to reality. This study is judged to have significance as a basic study to improve the utilization of the underground spatial integration map.

Development of Data Analysis and Interpretation Methods for a Hybrid-type Unmanned Aircraft Electromagnetic System (하이브리드형 무인 항공 전자탐사시스템 자료의 분석 및 해석기술 개발)

  • Kim, Young Su;Kang, Hyeonwoo;Bang, Minkyu;Seol, Soon Jee;Kim, Bona
    • Geophysics and Geophysical Exploration
    • /
    • v.25 no.1
    • /
    • pp.26-37
    • /
    • 2022
  • Recently, multiple methods using small aircraft for geophysical exploration have been suggested as a result of the development of information and communication technology. In this study, we introduce the hybrid unmanned aircraft electromagnetic system of the Korea Institute of Geosciences and Mineral resources, which is under development. Additionally, data processing and interpretation methods are suggested via the analysis of datasets obtained using the system under development to verify the system. Because the system uses a three-component receiver hanging from a drone, the effects of rotation on the obtained data are significant and were therefore corrected using a rotation matrix. During the survey, the heights of the source and the receiver and their offsets vary in real time and the measured data are contaminated with noise. The noise makes it difficult to interpret the data using the conventional method. Therefore, we developed a recurrent neural network (RNN) model to enable rapid predictions of the apparent resistivity using magnetic field data. Field data noise is included in the training datasets of the RNN model to improve its performance on noise-contaminated field data. Compared with the results of the electrical resistivity survey, the trained RNN model predicted similar apparent resistivities for the test field dataset.

Comparative Study of Anomaly Detection Accuracy of Intrusion Detection Systems Based on Various Data Preprocessing Techniques (다양한 데이터 전처리 기법 기반 침입탐지 시스템의 이상탐지 정확도 비교 연구)

  • Park, Kyungseon;Kim, Kangseok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.11
    • /
    • pp.449-456
    • /
    • 2021
  • An intrusion detection system is a technology that detects abnormal behaviors that violate security, and detects abnormal operations and prevents system attacks. Existing intrusion detection systems have been designed using statistical analysis or anomaly detection techniques for traffic patterns, but modern systems generate a variety of traffic different from existing systems due to rapidly growing technologies, so the existing methods have limitations. In order to overcome this limitation, study on intrusion detection methods applying various machine learning techniques is being actively conducted. In this study, a comparative study was conducted on data preprocessing techniques that can improve the accuracy of anomaly detection using NGIDS-DS (Next Generation IDS Database) generated by simulation equipment for traffic in various network environments. Padding and sliding window were used as data preprocessing, and an oversampling technique with Adversarial Auto-Encoder (AAE) was applied to solve the problem of imbalance between the normal data rate and the abnormal data rate. In addition, the performance improvement of detection accuracy was confirmed by using Skip-gram among the Word2Vec techniques that can extract feature vectors of preprocessed sequence data. PCA-SVM and GRU were used as models for comparative experiments, and the experimental results showed better performance when sliding window, skip-gram, AAE, and GRU were applied.

A research on cyber target importance ranking using PageRank algorithm (PageRank 알고리즘을 활용한 사이버표적 중요성 순위 선정 방안 연구)

  • Kim, Kook-jin;Oh, Seung-hwan;Lee, Dong-hwan;Oh, Haeng-rok;Lee, Jung-sik;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.115-127
    • /
    • 2021
  • With the development of science and technology around the world, the realm of cyberspace, following land, sea, air, and space, is also recognized as a battlefield area. Accordingly, it is necessary to design and establish various elements such as definitions, systems, procedures, and plans for not only physical operations in land, sea, air, and space but also cyber operations in cyberspace. In this research, the importance of cyber targets that can be considered when prioritizing the list of cyber targets selected through intermediate target development in the target development and prioritization stage of targeting processing of cyber operations was selected as a factor to be considered. We propose a method to calculate the score for the cyber target and use it as a part of the cyber target prioritization score. Accordingly, in the cyber target prioritization process, the cyber target importance category is set, and the cyber target importance concept and reference item are derived. We propose a TIR (Target Importance Rank) algorithm that synthesizes parameters such as Event Prioritization Framework based on PageRank algorithm for score calculation and synthesis for each derived standard item. And, by constructing the Stuxnet case-based network topology and scenario data, a cyber target importance score is derived with the proposed algorithm, and the cyber target is prioritized to verify the proposed algorithm.