• Title/Summary/Keyword: Occupancy network

Search Result 72, Processing Time 0.029 seconds

ACA: Automatic search strategy for radioactive source

  • Jianwen Huo;Xulin Hu;Junling Wang;Li Hu
    • Nuclear Engineering and Technology
    • /
    • v.55 no.8
    • /
    • pp.3030-3038
    • /
    • 2023
  • Nowadays, mobile robots have been used to search for uncontrolled radioactive source in indoor environments to avoid radiation exposure for technicians. However, in the indoor environments, especially in the presence of obstacles, how to make the robots with limited sensing capabilities automatically search for the radioactive source remains a major challenge. Also, the source search efficiency of robots needs to be further improved to meet practical scenarios such as limited exploration time. This paper proposes an automatic source search strategy, abbreviated as ACA: the location of source is estimated by a convolutional neural network (CNN), and the path is planned by the A-star algorithm. First, the search area is represented as an occupancy grid map. Then, the radiation dose distribution of the radioactive source in the occupancy grid map is obtained by Monte Carlo (MC) method simulation, and multiple sets of radiation data are collected through the eight neighborhood self-avoiding random walk (ENSAW) algorithm as the radiation data set. Further, the radiation data set is fed into the designed CNN architecture to train the network model in advance. When the searcher enters the search area where the radioactive source exists, the location of source is estimated by the network model and the search path is planned by the A-star algorithm, and this process is iterated continuously until the searcher reaches the location of radioactive source. The experimental results show that the average number of radiometric measurements and the average number of moving steps of the ACA algorithm are only 2.1% and 33.2% of those of the gradient search (GS) algorithm in the indoor environment without obstacles. In the indoor environment shielded by concrete walls, the GS algorithm fails to search for the source, while the ACA algorithm successfully searches for the source with fewer moving steps and sparse radiometric data.

Efficient Congestion Detection and Control Algorithm based on Threshold for Wireless Sensor Network (무선 센서 네트워크를 위한 임계치 기반 효율적인 혼잡 탐지 및 제어 알고리즘)

  • Lee, Dae-Woon;Lee, Tae-Woo;Choi, Seung-Kwon;Lee, Joon-Suk;Jin, Guangxun;Lee, Jae-Youp
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.45-56
    • /
    • 2010
  • This paper reports a new mechanism for congestion controls. The proposed congestion detection algorithm can be provided with delay and unnecessary energy consumption. Conventional congestion control methods decide congestion by queue occupancy or mean packet arrival rate of MAC layer only, however, our method can perform precise detection by considering queue occupancy and mean packet arrival rate. In addition, the congestion avoiding method according to congestion degree and scheduling method using priority for real time packets are proposed. Finally, simulation results show that proposed congestion detection and control methods outperforms conventional scheduling schemes for wireless sensor network.

Internet Worm Propagation Modeling using a Statistical Method (통계적 방법을 이용한 웜 전파 모델링)

  • Woo, Kyung-Moon;Kim, Chong-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3B
    • /
    • pp.212-218
    • /
    • 2012
  • An Internet worm is a self-replicating malware program which uses a computer network. As the network connectivity among computers increases, Internet worms have become widespread and are still big threats. There are many approaches to model the propagation of Internet worms such as Code Red, Nimda, and Slammer to get the insight of their behaviors and to devise possible defense methods to suppress worms' propagation activities. The influence of the network characteristics on the worm propagation has usually been modeled by medical epidemic model, named SI model, due to its simplicity and the similarity of propagation patterns. So far, SI model is still dominant and new variations of the SI model, called SI-style models, are being proposed for the modeling of new Internet worms. In this paper, we elaborate the problems of SI-style models and then propose a new accurate stochastic model using an occupancy problem.

A study on the capacity analysis of wide area radio trunking system (광역 무선 Trunking 시스템의 통신용량 분석에 관한 연구)

  • 김낙명
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.4
    • /
    • pp.1-11
    • /
    • 1997
  • In this paper, modeling of the communication channel occupancy characteristics at the base station in the wide area radio trunking syste has been performed. Using the results, mathematical analysis for the switching capacity at the network switch has also been done. Specificatlly, we propose a G/M/m queueing model for the single service area modeling, and analyze changes in call blockingprobabilities accoridng to changes in the burstness characteristics of group paging calls. As a result, we have observe dthat the channel occupancy variations become larger as the burstness characteristics become more apparent, to make the call blocking probability higher. Next, based on the single service area analysis, we have anayzed mathematically the average switching capacity required to serve mobile subscribers for a wide area radio trunking sytem, where multiple switching port assignments are required when the people in the same group are distributed over several base stations. Accordingly, we have observed that the average and the variance of switching channel occupancy are closely related to the mobility characteristics of subscribers, and that we need a netowrk switch having bigger capacity as subscribers show wider distribution. Especially, with the call dropping probability within 0.2%, a switch having about 5 to 6 times bigger can be required, compared with the one when the mobility of subscribers is mostly restricte dto a single service area.

  • PDF

The Efficient Bandwidth Control Method for Variable Data using ATM-GFR Service (ATM-GFR 서비스를 이용한 가변 데이터의 효과적인 대역폭 관리)

  • Kim Jung-Gyu;Lee Young-Dong
    • Journal of Digital Contents Society
    • /
    • v.2 no.2
    • /
    • pp.129-138
    • /
    • 2001
  • With the explosive growth and pervasive of the Internet, dynamic bandwidth allocation is nessary for ATM streams that carry various traffic. In order to provide quality of service(QoS) guarantees and to give the minimum cell rate, new bandwidth allocation scheme requires to be implemented. DFBA(Differential Fair Buffer Allocation) scheme is one of the methods for ATM GFR(Guaranteed Frame Rate) services. DFBA scheme treats cells selectively in a region between low buffer occupancy threshold and high buffer occupancy threshold. A big unbalance is introduced when the value being selected by DFBA scheme is greater than minimum rate. In a try to reduce the unbalance modified DFBA scheme is proposed. Selecting parameter according to the situation of network, this scheme is very effective to control the bandwidth in the various network situation.

  • PDF

Network Adaptive Congestion Control Scheme to Improve Bandwidth Occupancy and RTT Fairness in HBDP Networks (HBDP 네트워크에서 대역폭 점유와 RTT 공정성 향상을 위한 네트워크 적응적 혼잡제어 기법)

  • Oh, Junyeol;Chung, Kwangsue
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1162-1174
    • /
    • 2015
  • These days, the networks have exhibited HBDP (High Bandwidth Delay Product) characteristics. The legacy TCP slowly increases the size of the congestion window and drastically decreases the size of a congestion window. The legacy TCP has been found to be unsuitable for HBDP networks. TCP mechanisms for solving the problems of the legacy TCP can be categorized into the loss-based TCP and the delay-based TCP. Most of the TCP mechanisms use the standard slow start phase, which leads to a heavy packet loss event caused by the overshoot. Also, in the case of congestion avoidance, the loss-based TCP has shown problems of wastage in terms of the bandwidth and RTT (Round Trip Time) fairness. The delay-based TCP has shown a slow increase in speed and low occupancy of the bandwidth. In this paper, we propose a new scheme for improving the over shoot, increasing the speed of the bandwidth and overcoming the bandwidth occupancy and RTT fairness issues. By monitoring the buffer condition in the bottleneck link, the proposed scheme does congestion control and solves problems of slow start and congestion avoidance. By evaluating performance, we prove that our proposed scheme offers better performance in HBDP networks compared to the previous TCP mechanisms.

An implementation of the dynamic rate leaky bucket algorithm combined with a neural network based prediction (신경회로망 예측기법을 결합한 Dynamic Rate Leaky Bucket 알고리즘의 구현)

  • 이두헌;신요안;김영한
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.2
    • /
    • pp.259-267
    • /
    • 1997
  • The advent of B-ISDN using ATM(asynchronous transfer mode) made possible a variety of new multimedia services, however it also created a problem of congestion control due to bursty nature of various traffic sources. To tackle this problem, UPC/NPC(user parameter control/network parameter control) have been actively studied and DRLB(dynamic rate leaky bucket) algorithm, in which the token generation rate is changed according to states of data source andbuffer occupancy, is a good example of the UPC/NPC. However, the DRLB algorithm has drawbacks of low efficiency and difficult real-time implementation for bursty traffic sources because the determination of token generation rate in the algorithm is based on the present state of network. In this paper, we propose a more plastic and effective congestion control algorithm by combining the DRLB algorithm and neural network based prediction to remedy the drawbacks of the DRLB algorithm, and verify the efficacy of the proposed method by computer simulations.

  • PDF

Optimal buffer partition for provisioning QoS of wireless network

  • Phuong Nguyen Cao;Dung Le Xuan;Quan Tran Hong
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.57-60
    • /
    • 2004
  • Next generation wireless network is evolving toward IP-based network that can various provide multimedia services. A challenge in wireless mobile Internet is support of quality of service over wireless access networks. DiffServ architecture is proposed for evolving wireless mobile Internet. In this paper we propose an algorithm for optimal buffer partitioning which requires the minimal channel capacity to satisfy the QoS requirements of input traffic. We used a partitioned buffer with size B to serve a layered traffic at each DiffServ router. We consider a traffic model with a single source generates traffic having J $(J\geq2)$ quality of service (QoS) classes. QoS in this case is described by loss probability $\varepsilon_j$. for QoS class j. Traffic is admitted or rejected based on the buffer occupancy and its service class. Traffic is generated by heterogeneous Markov-modulated fluid source (MMFS).

  • PDF

A Cruise Ship Itinerary Planning Model for Passenger Satisfaction

  • Cho, Seong-Cheol
    • Journal of Navigation and Port Research
    • /
    • v.43 no.5
    • /
    • pp.273-280
    • /
    • 2019
  • This study developed an optimization model, defined as the IPS (Itinerary for Passenger Satisfaction), for a cruise ship to identify an itinerary that maximizes passenger satisfaction. A 0-1 integer programming model was developed to provide an optimal sequence of ports of call, assigning a destination to each day of the cruise. The concepts of the destination access network and the neighborhood of a destination were designed and manipulated to organize the complex network of destinations so that each next destination is selected within a practical overnight sail. The developed model can also be viewed as a reduced variant of the traveling salesperson problem with less constraints. A set of example tests shows that practical scenarios of the IPS with moderate cruise duration can be easily solved with light computation loads. Considering cruise ship passengers usually make their decisions not relying on only one destination but on an itinerary in its entirety, the purpose of this study was to identify itinerary alternatives to attract potential cruise passengers for attaining maximum occupancy level.

New Tree Routing Protocol with Adaptive Metrics Based on Hop Count

  • BeomKyu Suh;Ismatov Akobir;Ki-Il Kim
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.3
    • /
    • pp.207-214
    • /
    • 2024
  • In wireless sensor networks, the implementation of routing protocols is crucial owing to their limited computational capacities. Tree routing is a suitable method in wireless sensors owing to its minimal routing overhead. However, single-hop metric schemes, such as hop count, cause congestion at specific nodes, whereas multiple metric schemes cannot control dynamically changing network environments. To address these issues, we propose a scheme to implement enhanced tree routing with adaptive metrics based on hop count. This approach assigns different weights to metrics to select suitable parent nodes based on hop count. The parent-selection algorithm utilizes hop count, buffer occupancy, and received signal strength indicator (RSSI) as metrics. This study evaluates the performance through simulation scenarios to analyze whether improvements can be made to address problems encountered in traditional tree routing. The performance metrics include packet delivery speed, throughput, and end-to-end delay, which vary depending on the volume of network traffic.