• Title/Summary/Keyword: Two-mode Networks

Search Result 130, Processing Time 0.028 seconds

Active pulse classification algorithm using convolutional neural networks (콘볼루션 신경회로망을 이용한 능동펄스 식별 알고리즘)

  • Kim, Geunhwan;Choi, Seung-Ryul;Yoon, Kyung-Sik;Lee, Kyun-Kyung;Lee, Donghwa
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.1
    • /
    • pp.106-113
    • /
    • 2019
  • In this paper, we propose an algorithm to classify the received active pulse when the active sonar system is operated as a non-cooperative mode. The proposed algorithm uses CNN (Convolutional Neural Networks) which shows good performance in various fields. As an input of CNN, time frequency analysis data which performs STFT (Short Time Fourier Transform) of the received signal is used. The CNN used in this paper consists of two convolution and pulling layers. We designed a database based neural network and a pulse feature based neural network according to the output layer design. To verify the performance of the algorithm, the data of 3110 CW (Continuous Wave) pulses and LFM (Linear Frequency Modulated) pulses received from the actual ocean were processed to construct training data and test data. As a result of simulation, the database based neural network showed 99.9 % accuracy and the feature based neural network showed about 96 % accuracy when allowing 2 pixel error.

Adaptive Usage Parameter Control Mechanism using a Variable Token Pool in ATM Networks (ATM망에서 가변 토큰풀을 이용한 적응적 사용 파라메터 제어 메카니즘)

  • Koo, Ja-Gwang;Lee, Hwan-Chung;Kim, Chong-Gun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2366-2377
    • /
    • 1997
  • An Adaptive Usage Parameter Control(UPC) mechanism using a Variable Token Pool(VTP) which is kind of preventive traffic control in the Asynchronous Transfer Mode(ATM) networks is described. The VTP mechanism can monitor violations of the average bit rate and burst duration as well as peak bit rate for the ON-OFF type traffic. The VTP can vary the token pool size by monitoring burst duration and silence duration for a long term. It also improves the sensitivity against the violation of burst duration and average bit rate and enables to response for the violating traffic situation quickly. The variable token pool size is varied in step size by every burst duration and silence duration. Two important parameters for controlling token pool size are Down_size and Up_size. We compare the performance of LB and JW mechanism with the proposed VTP mechanism by computer simulations. We have known that the proposed method is more effective than the previous mechanisms. It is shown that the cell loss rate of the VTP quite depends on the value of Down_size and Up_size. The two parameters should be decided as a propr value according to traffic situations.

  • PDF

Internetworking Models Between Wireless Sensor Networks and the Internet Based on IPv6 (무선 센서 네트워크와 IPv6 기반 인터넷 간의 연동 모델)

  • Kwon, Hoon;Kim, Jeong-Hee;Kwak, Ho-Young;Do, Yang-Hoi;Kim, Dae-Young;Kim, Do-Hyeun
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.11
    • /
    • pp.1474-1482
    • /
    • 2006
  • Recently, it is advanced about the variable research of IPv6 and the wireless sensor network. However, the existed researches are not enough about the internetworking technology between the wireless sensor network and the Internet based on IPv6 for supporting ubiquitous service. Accordingly, this paper proposes two internetworking models for connecting the wireless sensor network and Internet based on IPv6. The relay router in the first model and the sink node of the wireless sensor network in the second mode] were used as a gateway. Then we analyze and compare with two internetworking models. Additionally we construct the test-bed connected between the wireless sensor network and KOREN(KOrea advanced REsearch Network) based on IPv6 using the first model. And we verified the operation of the test-bed by experiments.

  • PDF

Changes in the Laterality of Functional Connectivity Associated with Tinnitus: Resting-State fMRI Study

  • Shin, Yeji;Ryu, Chang-Woo;Jahng, Geon-Ho;Park, Moon Suh;Byun, Jae Yong
    • Investigative Magnetic Resonance Imaging
    • /
    • v.23 no.1
    • /
    • pp.55-64
    • /
    • 2019
  • Purpose: One of the suggested potential mechanisms of tinnitus is an alteration in perception in the neural auditory pathway. The aim of this study was to investigate the difference in laterality in functional connectivity between tinnitus patients and healthy controls using resting state functional MRI (rs-fMRI). Materials and Methods: Thirty-eight chronic tinnitus subjects and 45 age-matched healthy controls were enrolled in this study. Connectivity was investigated using independent component analysis, and the laterality index map was calculated based on auditory (AN) and dorsal attention (DAN), default mode (DMN), sensorimotor, salience (SalN), and visual networks (VNs). The laterality index (LI) of tinnitus subjects was compared with that of normal controls using region-of-interest (ROI) and voxel-based methods and a two-sample unpaired t-test. Pearson correlation was conducted to assess the associations between the LI in each network and clinical variables. Results: The AN and VN showed significant differences in LI between the two groups in ROI analysis (P < 0.05), and the tinnitus group had clusters with significantly decreased laterality of AN, SalN, and VN in voxel-based comparisons. The AN was positively correlated with tinnitus distress (tinnitus handicap inventory), and the SalN was negatively correlated with symptom duration (P < 0.05). Conclusion: The results of this study suggest that various functional networks related to psychological distress can be modified by tinnitus, and that this interrelation can present differently on the right and left sides, according to the dominance of the network.

A Network Processor-based In-Line Mode Intrusion Detection System for High-Speed Networks (고속 망에 적합한 네트워크 프로세서 기반 인-라인 모드 침입탐지 시스템)

  • 강구홍;김익균;장종수
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.363-374
    • /
    • 2004
  • In this paper, we propose an in-line mode NIDS using network processors(NPs) that achieve performance comparable to ASIC and flexibility comparable to general-purpose processors. Even if many networking applications using NPs have been proposed, we cannot find any NP applications to NIDS in the literature. The proposed NIDS supports packet payload inspection detecting attacks, as well as packet filtering and traffic metering. In particular, we separate the filtering and metering functions from the complicated and time-consuming operations of the deep packet inspection function using two-level searching scheme, thus we can improve the performance, stability, and scalability of In-line mode system. We also implement a proto-type based on a PC platform and the Agere PayloadPlus (APP) 2.5G NP solution, and present a payload inspection algorithm to apply APP NP.

An Effectiveness of Simultaneous Measurement of PM10, PM2.5, and PM1.0 Concentrations in Asian Dust and Haze Monitoring

  • Cho, Changbum;Park, Gilun;Kim, Baekjo
    • Journal of Environmental Science International
    • /
    • v.22 no.6
    • /
    • pp.651-666
    • /
    • 2013
  • This study introduces a novel approach to the differentiation of two phenomena, Asian Dust and haze, which are extremely difficult to distinguish based solely on comparisons of PM10 concentration, through use of the Optical Particle Counter (OPC), which simultaneously generates PM10, PM2.5 and PM1.0 concentration. In the case of Asian Dust, PM10 concentration rose to the exclusion of PM2.5 and PM1.0 concentration. The relative ratios of PM2.5 and PM1.0 concentration versus PM10 concentration were below 40%, which is consistent with the conclusion that Asian Dust, as a prime example of the coarse-particle phenomenon, only impacts PM10 concentration, not PM2.5 and PM1.0 concentration. In contrast, PM10, PM2.5 and PM1.0 concentration simultaneously increased with haze. The relative ratios of PM2.5 and PM1.0 concentration versus PM10 concentration were generally above 70%. In this case, PM1.0 concentration varies because a haze event consists of secondary aerosol in the fine-mode, and the relative ratios of PM10 and PM2.5 concentration remain intact as these values already subsume PM1.0 concentration. The sequential shift of the peaks in PM10, PM2.5 and PM1.0 concentrations also serve to individually track the transport of coarse-mode versus fine-mode aerosols. The distinction in the relative ratios of PM2.5 and PM1.0 concentration versus PM10 concentration in an Asian Dust versus a haze event, when collected on a national or global scale using OPC monitoring networks, provides realistic information on outbreaks and transport of Asian Dust and haze.

Design and Verification of LAN Emulation Function for Hybrid Two-Stage AWG based WDM-PON (혼합형 2단 AWG 기반의 WDM-PON을 위한 LAN 에뮬레이션 기능 설계 및 검증)

  • Han, Kyeong-Eun;Yang, Won-Hyuk;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3B
    • /
    • pp.91-99
    • /
    • 2008
  • In this paper, we design the function of ULSLE(Upper Layer Shared LAN Emulation) to provide both the efficient LAN service and compatibility with 802.1D bridge in Hybrid two-stage AWG based WDM-PON. The ULSLE layer lies above MAC control layer in order to provide a mean to interface WDM-PON and 802.1D bridge. It also performs LAN emulation based on PON-Tag which is only used to decide both the transmission mode and the destination of frames transmitted from ONUs. That is, the PON-Tag is not used for downstream frames but destination address field in original frame instead. This decreases the processing overhead and complexity caused by PON-Tag at OLT and ONU. The verification of designed ULSLE is performed according to the specific scenarios based on transmission mode and destination using OPNET.

On the Optimal Selection of Wireless Access in Interoperating Heterogeneous Wireless Networks (3G/WLAN/휴대인터넷 연동상황을 고려한 사용자의 최적 무선접속서비스 선택방법에 대한 연구)

  • Cho Geun-Ho;Choe Jin-Woo;Jun Sung-Ik;Kim Young-Sae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.456-477
    • /
    • 2006
  • Due to advances in wireless communication technology and increasing demand for various types of wireless access, cellular, WLAN, and portable internet(such as WiBro and IEEE 802.16) systems are likely to be integrated into a unified wireless access system. This expectation premises the availability of multi-mode handsets and cooperative interworking of heterogenous wireless access networks allied by roaming contracts. Under such environments, a user may lie in the situation where more than one wireless accesses are available at his/her location, and he/she will want to choose the 'best' access among them. In this paper, we define the 'best' access(es) as the access(es) that charges minimum cost while fulfilling the required QoS of wireless access, and address the problem of choosing the optimal set of accesses theoretically by introducing a graph representation of service environment. Two optimal selection algorithms are proposed, which individually consider cases where single or multiple wireless access can be supported by multi-mode handsets.

Dynamic OD Estimation with Hybrid Discrete Choice of Traveler Behavior in Transportation Network (복합 통행행태모형을 이용한 동적 기.종점 통행량 추정)

  • Kim, Chae-Man;Jo, Jung-Rae
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.6 s.92
    • /
    • pp.89-102
    • /
    • 2006
  • The purpose of this paper is to develop a dynamic OD estimating model to overcome the limitation of depicting teal situations in dynamic simulation models based on static OD trip. To estimate dynamic OD matrix we used the hybrid discrete choice model(called the 'Demand Simulation Model'), which combines travel departure time with travel mode and travel path. Using this Demand Simulation Model, we deduced that the traveler chooses the departure time and mode simultaneously, and then choose his/her travel path over the given situation In this paper. we developed a hybrid simulation model by joining a demand simulation model and the supply simulation model (called LiCROSIM-P) which was Previously developed. We simulated the hybrid simulation model for dependent/independent networks which have two origins and one destination. The simulation results showed that AGtt(Average gap expected travel time and simulated travel time) did not converge, but average schedule delay gap converged to a stable state in transportation network consisted of multiple origins and destinations, multiple paths, freeways and some intersections controlled by signal. We present that the hybrid simulation model can estimate dynamic OD and analyze the effectiveness by changing the attributes or the traveler and networks. Thus, the hybrid simulation model can analyze the effectiveness that reflects changing departure times, travel modes and travel paths by demand management Policy, changing network facilities, traffic information supplies. and so on.

Implementation of VPN Accelerator Board Used 10 Giga Security Processor (10Giga 급 보안 프로세서를 이용한 VPN 가속보드 구현)

  • Kim, Ki-Hyun;Yoo, Jang-Hee;Chung, Kyo-Il
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.233-236
    • /
    • 2005
  • Our country compares with advanced nations by supply of super high speed network and information communication infra construction has gone well very. Many people by extension of on-line transaction and various internet services can exchange, or get information easily in this environment. But, virus or poisonous information used to Cyber terror such as hacking was included within such a lot of information and such poisonous information are threatening national security as well as individual's private life. There were always security and speed among a lot of items to consider networks equipment from these circumstance to now when develop and install in trade-off relation. In this paper, we present a high speed VPN Acceleration Board(VPN-AB) that balances both speed and security requirements of high speed network environment. Our VPN-AB supports two VPN protocols, IPsec and SSL. The protocols have a many cryptographic algorithms, DES, 3DES, AES, MD5, and SHA-1, etc.. The acceleration board process data packets into the system with In-line mode. So it is possible that VPN-AB processes inbound and outbound packets by 10Gbps. We use Nitrox-II CN2560 security processor VPN-AB is designed using that supports many hardware security modules and two SPI-4.2 interfaces to design VPN-AB.

  • PDF