• Title/Summary/Keyword: Tracking network

Search Result 1,002, Processing Time 0.026 seconds

The Congestion Control using Multiple Time Scale under Self-Similar Traffic of TCP (TCP의 자기 유사성 트래픽 조건하에서 다중 시간 간격을 이용한 혼잡 제어)

  • 김광준;윤찬호;김천석
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.310-323
    • /
    • 2004
  • In this paper, we extend the multiple time scale control framework to window-based congestion control, in particular, TCP This is performed by interfacing TCP with a large tine scale control nodule which adjusts the aggressiveness of bandwidth consumption behavior exhibited by TCP as a function of "large time scale" network state. i.e., conformation that exceeds the horizon of the feedback loop as determined by RTT Our contribution is threefold. First, we define a modular extension of TCP-a function call with a simple interface-that applies to various flavors of TCP-e.g., Tahoe, Reno, Vegas and show that it significantly improves performance. Second, we show that multiple time scale TCP endows the underlying feedback control with preactivity by bridging the uncertainty gap associated with reactive controls which is exacerbated by the high delay-bandwidth product in broadband wide area networks. Third, we investigate the influence of three traffic control dimensions-tracking ability, connection duration, and fairness-on performance. Performance evaluation of multiple time scale TCP is facilitated by a simulation bench-mark environment which is based on physical modeling of self-similar traffic.

Tag-Reader Mutual Authentication Protocol for secure RFID environments (안전한 RFID 환경을 위한 태그-리더 상호 인증 프로토콜)

  • Lee, Young-Seok;Choi, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.357-364
    • /
    • 2015
  • Tags and Readers is receiving and sending the data using the wireless communication in the RFID environment. Therefore, it could allow an attacker to participate in the network without the physical constraints, which can be easily exposed to a variety of attacks, such as taps and data forgery. Also, it is not easy to apply the security techniques to defend external attacks because the resource constraints of RFID tags is high. In this paper, new tag-reader mutual authentication protocol is proposed to protect the external cyber attacks such as spoofing attacks, replay attacks, traffic analysis attacks, location tracking attacks. The performance evaluation of the proposed mutual authentication protocol is performed and the simulation results are presented.

Numerical Formula and Verification of Web Robot for Collection Speedup of Web Documents

  • Kim Weon;Kim Young-Ki;Chin Yong-Ok
    • Journal of Internet Computing and Services
    • /
    • v.5 no.6
    • /
    • pp.1-10
    • /
    • 2004
  • A web robot is a software that has abilities of tracking and collecting web documents on the Internet(l), The performance scalability of recent web robots reached the limit CIS the number of web documents on the internet has increased sharply as the rapid growth of the Internet continues, Accordingly, it is strongly demanded to study on the performance scalability in searching and collecting documents on the web. 'Design of web robot based on Multi-Agent to speed up documents collection ' rather than 'Sequentially executing Web Robot based on the existing Fork-Join method' and the results of analysis on its performance scalability is presented in the thesis, For collection speedup, a Multi-Agent based web robot performs the independent process for inactive URL ('Dead-links' URL), which is caused by overloaded web documents, temporary network or web-server disturbance, after dividing them into each agent. The agents consist of four component; Loader, Extractor, Active URL Scanner and inactive URL Scanner. The thesis models a Multi-Agent based web robot based on 'Amdahl's Law' to speed up documents collection, introduces a numerical formula for collection speedup, and verifies its performance improvement by comparing data from the formula with data from experiments based on the formula. Moreover, 'Dynamic URL Partition algorithm' is introduced and realized to minimize the workload of the web server by maximizing a interval of the web server which can be a collection target.

  • PDF

Design and Implementation of User Tracking System Based on An Low Cost IR (Infrared Ray) Image Processing (적외선 영상처리 기반 저비용 사용자 추적 시스템 설계 및 구현)

  • Noh, Gil-woo;Park, Dea-min;Jeon, Min-ho;Kim, Han-eum;Shin, DongHyun;Kim, Changhwa
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.1470-1473
    • /
    • 2015
  • 최근 빠른 인터넷 속도를 이용하여 SNS (Social Network Service), 인터넷 방송 등의 엔터테인먼트를 즐기는 사용자가 증가하였다. 이와 함께 직접 사진, 동영상 등의 멀티미디어를 직접 제작해 제공하는 사례도 크게 증가함에 따라 영상처리 기술이 발전하였다. 이에 따라 셀프촬영이 점점 증가하고 있지만, 동영상의 경우는 셀프촬영을 하는데 있어 한계가 있다. 이 문제를 해결하기 위한 한 방법으로 영상처리를 이용할 수 있다. 하지만 현재의 기술은 고성능에 초점이 맞춰있기 때문에 시스템 구현을 위해 비용 낭비가 발생할 수 있다. 따라서 본 논문에서는 셀프 동영상 촬영 분야의 적외선 영상처리 기반 저비용 사용자 추적 시스템을 제안한다. 실제 단순히 인식률을 측정한 결과 80%를 보였으며, 속도에 따라 1.5m/s에서 76%의 인식률을 보였다.

Parameter Estimation of Recurrent Neural Networks Using A Unscented Kalman Filter Training Algorithm and Its Applications to Nonlinear Channel Equalization (언센티드 칼만필터 훈련 알고리즘에 의한 순환신경망의 파라미터 추정 및 비선형 채널 등화에의 응용)

  • Kwon Oh-Shin
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.5
    • /
    • pp.552-559
    • /
    • 2005
  • Recurrent neural networks(RNNs) trained with gradient based such as real time recurrent learning(RTRL) has a drawback of slor convergence rate. This algorithm also needs the derivative calculation which is not trivialized in error back propagation process. In this paper a derivative free Kalman filter, so called the unscented Kalman filter(UKF), for training a fully connected RNN is presented in a state space formulation of the system. A derivative free Kalman filler learning algorithm makes the RNN have fast convergence speed and good tracking performance without the derivative computation. Through experiments of nonlinear channel equalization, performance of the RNNs with a derivative free Kalman filter teaming algorithm is evaluated.

Odor Source Tracking of Mobile Robot with Vision and Odor Sensors (비전과 후각 센서를 이용한 이동로봇의 냄새 발생지 추적)

  • Ji, Dong-Min;Lee, Jeong-Jun;Kang, Geun-Taek;Lee, Won-Chang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.6
    • /
    • pp.698-703
    • /
    • 2006
  • This paper proposes an approach to search for the odor source using an autonomous mobile robot equipped with vision and odor sensors. The robot is initially navigating around the specific area with vision system until it looks for an object in the camera image. The robot approaches the object found in the field of view and checks it with the odor sensors if it is releasing odor. If so, the odor is classified and localized with the classification algorithm based on neural network The AMOR(Autonomous Mobile Olfactory Robot) was built up and used for the experiments. Experimental results on the classification and localization of odor sources show the validity of the proposed algorithm.

Communication Performance of BLE-based IoT Devices and Routers for Tracking Indoor Construction Resources

  • Yoo, Moo-Young;Yoo, Sung Geun;Park, Sangil
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.27-38
    • /
    • 2019
  • Sensors collect information for Internet of Things (IoT)-based services. However, indoor construction sites have a poor communication environment and many interfering elements that make it difficult to collect sensor information. In this study, a network was constructed between a Bluetooth Low Energy (BLE)-based IoT device based on a serverless IoT framework and a router. This experimental environment was applied to large- and small-scale indoor construction sites. Experiments were performed to test the communication performance of BLE-based IoT devices and routers at indoor construction sites. An analysis of the received signal strength indication (RSSI) graph patterns collected from the communication between the BLE-based IoT devices and routers for different testbed site situation revealed areas with good communication performance and poor communication performance due to interfering factors. The results confirmed that structural components of the building as well as the materials, equipment, and temporary facilities used in indoor construction interfere with the communication performance. Construction project managers will require improved technical knowledge of IoT, such as optimizing the router placement and matching communication between the router and workers, to improve the communication performance for large-scale indoor construction.

Sound Event Detection based on Deep Neural Networks (딥 뉴럴네트워크 기반의 소리 이벤트 검출)

  • Chung, Suk-Hwan;Chung, Yong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.389-396
    • /
    • 2019
  • In this paper, various architectures of deep neural networks were applied for sound event detection and their performances were compared using a common audio database. The FNN, CNN, RNN and CRNN were implemented using hyper-parameters optimized for the database as well as the architecture of each neural network. Among the implemented deep neural networks, CRNN performed best at all testing conditions and CNN followed CRNN in performance. Although RNN has a merit in tracking the time-correlations in audio signals, it showed poor performance compared with CNN and CRNN.

Observational Arc-Length Effect on Orbit Determination for KPLO Using a Sequential Estimation Technique

  • Kim, Young-Rok;Song, Young-Joo;Bae, Jonghee;Choi, Seok-Weon
    • Journal of Astronomy and Space Sciences
    • /
    • v.35 no.4
    • /
    • pp.295-308
    • /
    • 2018
  • In this study, orbit determination (OD) simulation for the Korea Pathfinder Lunar Orbiter (KPLO) was accomplished for investigation of the observational arc-length effect using a sequential estimation algorithm. A lunar polar orbit located at 100 km altitude and $90^{\circ}$ inclination was mainly considered for the KPLO mission operation phase. For measurement simulation and OD for KPLO, the Analytical Graphics Inc. Systems Tool Kit 11 and Orbit Determination Tool Kit 6 software were utilized. Three deep-space ground stations, including two deep space network (DSN) antennas and the Korea Deep Space Antenna, were configured for the OD simulation. To investigate the arc-length effect on OD, 60-hr, 48-hr, 24-hr, and 12-hr tracking data were prepared. Position uncertainty by error covariance and orbit overlap precision were used for OD performance evaluation. Additionally, orbit prediction (OP) accuracy was also assessed by the position difference between the estimated and true orbits. Finally, we concluded that the 48-hr-based OD strategy is suitable for effective flight dynamics operation of KPLO. This work suggests a useful guideline for the OD strategy of KPLO mission planning and operation during the nominal lunar orbits phase.

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions

  • Gafurov, Khusanbek;Chung, Tai-Myoung
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.797-819
    • /
    • 2019
  • Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.