• Title/Summary/Keyword: Quality metric

Search Result 368, Processing Time 0.024 seconds

A Comprehensive Analysis of the End-to-End Delay for Wireless Multimedia Sensor Networks

  • Abbas, Nasim;Yu, Fengqi
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.6
    • /
    • pp.2456-2467
    • /
    • 2018
  • Wireless multimedia sensor networks (WMSNs) require real-time quality-of-service (QoS) guarantees to be provided by the network. The end-to-end delay is very critical metric for QoS guarantees in WMSNs. In WMSNs, due to the transmission errors incurred over wireless channels, it is difficult to obtain reliable delivery of data in conjunction with low end-to-end delay. In order to improve the end-to-end delay performance, the system has to drop few packets during network congestion. In this article, our proposal is based on optimization of end-to end delay for WMSNs. We optimize end-to-end delay constraint by assuming that each packet is allowed fixed number of retransmissions. To optimize the end-to-end delay, first, we compute the performance measures of the system, such as end-to-end delay and reliability for different network topologies (e.g., linear topology, tree topology) and against different choices of system parameters (e.g., data rate, number of nodes, number of retransmissions). Second, we study the impact of the end-to-end delay and packet delivery ratio on indoor and outdoor environments in WMSNs. All scenarios are simulated with multiple run-times by using network simulator-2 (NS-2) and results are evaluated and discussed.

An Efficient QoE-Aware Transport Stream Assessment Schemes for Realtime Mobile IPTV's Distorting Contents Evaluation (실시간 모바일 IPTV의 열화 컨텐츠 평가를 위한 효율적 QoE 인지형 전송 스트림 측정 스키마)

  • Kim, Jin-Sul;Yoon, Chang-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.352-360
    • /
    • 2010
  • Supporting user perceptual QoE-guaranteed IP-based multimedia service such as IPTV and Mobile IPTV, we represent an efficient QoE-aware transport stream assessment schemes to apply realtime mobile IPTV's contents distorted by various network errors such as bandwidth, delay, jitter, and packet loss. This paper proposes in detail an efficient matching and QoE-aware measurement methods. The brightness of the digitized contents per each frames of transport streams is used and applied to reduced-reference method. The hybrid video quality metric is designed by QoE-indicators such as blur, block, edge busyness, and color error. We compare original with processed source to evaluate them in a high precision degree of accuracy.

Asbestos Exposure and Health Risk Assessment in Asbestos-Containing Buildings (석면함유 건축물의 석면 노출 및 위해성 평가)

  • Jeong, Jae-Won;Kim, Kwang-Su;Cho, Sun-Ja;Lee, Sang-Joon
    • Journal of Environmental Science International
    • /
    • v.21 no.9
    • /
    • pp.1069-1078
    • /
    • 2012
  • This study was performed to evaluate the asbestos exposure levels and to calculate excess lifetime cacer risks(ELCRs) in asbestos-containing buildings for maintenance and management. The range of airborne asbestos concentration of 33 buildings was 0.0018 ~ 0.0126 f/cc and one site exceeded indoor air-quality recommended limit 0.01 f/cc. And ELCRs based on US EPA IRIS(Integrated risk information system) model are 1.5E-06 ~ 3.9E-05 levels, and there was no site showed 1.0E-04 (one person per million) level or more, and 11 sites showed 1.0E-05 (one person per 100,000 people) level or more. To prevent the release of asbestos fibers, it needs operation and maintenance of asbestos-containing building materials, and there are some methods such as removal, repairment, enclosure and encapsulation. In conclusion, a risk-based air action level for asbestos in air is an appropriate metric for asbestos-containing building management.

A Solution to Privacy Preservation in Publishing Human Trajectories

  • Li, Xianming;Sun, Guangzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3328-3349
    • /
    • 2020
  • With rapid development of ubiquitous computing and location-based services (LBSs), human trajectory data and associated activities are increasingly easily recorded. Inappropriately publishing trajectory data may leak users' privacy. Therefore, we study publishing trajectory data while preserving privacy, denoted privacy-preserving activity trajectories publishing (PPATP). We propose S-PPATP to solve this problem. S-PPATP comprises three steps: modeling, algorithm design and algorithm adjustment. During modeling, two user models describe users' behaviors: one based on a Markov chain and the other based on the hidden Markov model. We assume a potential adversary who intends to infer users' privacy, defined as a set of sensitive information. An adversary model is then proposed to define the adversary's background knowledge and inference method. Additionally, privacy requirements and a data quality metric are defined for assessment. During algorithm design, we propose two publishing algorithms corresponding to the user models and prove that both algorithms satisfy the privacy requirement. Then, we perform a comparative analysis on utility, efficiency and speedup techniques. Finally, we evaluate our algorithms through experiments on several datasets. The experiment results verify that our proposed algorithms preserve users' privay. We also test utility and discuss the privacy-utility tradeoff that real-world data publishers may face.

A Secure MQAM Scheme Based on Signal Constellation Hopping

  • Zhang, Yingxian;Liu, Aijun;Pan, Xiaofei;Ye, Zhan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2246-2260
    • /
    • 2014
  • In this paper, a secure multilevel quadrature amplitude modulation (MQAM) scheme is proposed for the physical layer security (PLS) of the wireless communications. In the proposed scheme, each transmitted symbol's signal constellation (SC) is hopping with the control of two unique factors: amplitude distortion (AD) factor and phase hopping (PH) factor. With unknown the two factors, the eavesdropper cannot extract effective information from the received signal. We first introduce a security metric, referred to as secrecy gain, and drive a lower bound on the gain that the secrecy capacity can be improved. Then, we investigate the relationship among the secrecy gain, the signal to noise power ratios (SNRs) of the main and wiretap channels, and the secrecy capacity. Next, we analyze the security of the proposed scheme, and the results indicate that the secrecy capacity is improved by our scheme. Specifically, a positive secrecy capacity is always obtained, whether the quality of the main channel is better than that of the wiretap channel or not. Finally, the numerical results are provided to prove the analytical work, which further suggests the security of the proposed scheme.

Dynamic Tree Formation Protocol in UAV Formation Flying Network for Disaster Monitoring (재난 모니터링을 위한 편대비행 UAV 네트워크에서 동적 트리 형성 프로토콜)

  • Park, Jin-Hee;Kim, Yeon-Joo;Chung, Jin-Wook
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.271-277
    • /
    • 2012
  • In this paper, we propose a dynamic tree formation protocol for multiple UAV which is gathering data or accomplishing a mission such as disaster monitoring, environment monitoring, and disaster relief. Especilly, we designed Hop-LQI Weight algorithm to form optimal tree in wireless dynamic environment applying situation of radio signal attenuation over distance and implemented our algorithm in MSP 430 K-mote sensor platform using TinyOS codes. We verified performance of our algorithm by comparing average link setup time by the number of nodes with minimum LQI, link cost calculation method in wireless communication.

Virtual Queue Based QoS Layered Vertical Mapping in Wireless Networks

  • Fang, Shu-Guang;Tang, Ri-Zhao;Dong, Yu-Ning;Zhang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.1869-1880
    • /
    • 2014
  • Wireless communication is one of most active areas in modern communication researches, QoS (Quality of Service) assurance is very important for wireless communication systems design, especially for applications such as streaming video etc., which requires strict QoS assurance. The modern wireless networks multi-layer protocol stack structure results in QoS metrics layered and acting in cascade and QoS metrics vertical mapping between protocol layers. Based on virtual buffer between protocol layers and queuing technology, a unified layered QoS mapping framework is proposed in this paper, in which we first propose virtual queue concept, give a novelty united neighboring protocol layers QoS metric mapping framework, and analysis method based on dicerete-time Markov chain, and numerical results show that our proposed framework represents a significant improvement over previous model.

Analysis of Various Ecological Parameters from Molecular to Community Levels for Ecological Health Assessments (생태 건강성 평가로서 분자지표에서 군집지표 수준까지의 다양한 변수분석)

  • Lee, Jae-Hoon;An, Kwang-Guk
    • Korean Journal of Ecology and Environment
    • /
    • v.43 no.1
    • /
    • pp.24-34
    • /
    • 2010
  • This study was carried out to analyze some influences on ecological health conditions, threaten by various stressors such as physical, chemical and biological parameters. We collected samples in 2008 from three zones of upstream, midstream and downstream, Gap Stream. We applied multi-metric fish assessment index (MFAI), based on biotic integrity model to the three zones along with habitat evaluations based on Qualitative Habitat Evaluation Index (QHEI). We also examined fish fauna and compositions, and analyzed relations with MFAI values, QHEI values, and various guild types. Chemical parameters such as oragnic matter (BOD, COD), nutrients (TP, $NH_3$-N), coli-form number (as MPN), and suspended solids (SS) were analyzed to identify the relationship among multiple stressor effects. Using the sentinel species of Zacco platypus, the population structures and condition factors were analyzed along with DNA damages related with genotoxicant effects by comet assay. This study using all these parameters showed that stream condition was degraded along the longitudinal gradient from upstream to downstream, and the downstream, especially, was impacted by nutrient enrichment and toxicant exposure from the point source, wastewater treatment plant. Overall results indicated that our approaches applying various parameters may be used as a cause-effect technique in the stream health assessments and also used as a pre-warning tool for diagnosis of ecological degradation.

Beamforming Strategy Using Adaptive Beam Patterns and Power Control for Common Control Channel in Hierarchical Cell Structure Networks

  • You, Cheol-Woo;Jung, Young-Ho;Cho, Sung-Hyun
    • Journal of Communications and Networks
    • /
    • v.13 no.4
    • /
    • pp.319-326
    • /
    • 2011
  • Beamforming techniques have been successfully utilized for traffic channels in order to solve the interference problem. However, their use for control channels has not been sufficiently investigated. In this paper, a (semi-) centralized beamforming strategy that adaptively changes beam patterns and controls the total transmit power of cells is proposed for the performance enhancement of the common channel in hierarchical cell structure (HCS) networks. In addition, some examples of its practical implementation with low complexity are presented for two-tier HCS networks consisting of macro and pico cells. The performance of the proposed scheme has been evaluated through multi-cell system-level simulations under optimistic and pessimistic interference scenarios. The cumulative distribution function of user geometry or channel quality has been used as a performance metric since in the case of common control channel the number of outage users is more important than the sum rate. Simulation results confirm that the proposed scheme provides a significant gain compared to the random beamforming scheme as well as conventional systems that do not use the proposed algorithm. Finally, the proposed scheme can be applied simultaneously to several adjacent macro and pico cells even if it is designed primarily for the pico cell within macro cells.

Classification-Based Approach for Hybridizing Statistical and Rule-Based Machine Translation

  • Park, Eun-Jin;Kwon, Oh-Woog;Kim, Kangil;Kim, Young-Kil
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.541-550
    • /
    • 2015
  • In this paper, we propose a classification-based approach for hybridizing statistical machine translation and rulebased machine translation. Both the training dataset used in the learning of our proposed classifier and our feature extraction method affect the hybridization quality. To create one such training dataset, a previous approach used auto-evaluation metrics to determine from a set of component machine translation (MT) systems which gave the more accurate translation (by a comparative method). Once this had been determined, the most accurate translation was then labelled in such a way so as to indicate the MT system from which it came. In this previous approach, when the metric evaluation scores were low, there existed a high level of uncertainty as to which of the component MT systems was actually producing the better translation. To relax such uncertainty or error in classification, we propose an alternative approach to such labeling; that is, a cut-off method. In our experiments, using the aforementioned cut-off method in our proposed classifier, we managed to achieve a translation accuracy of 81.5% - a 5.0% improvement over existing methods.