• Title/Summary/Keyword: hidden-nodes

Search Result 202, Processing Time 0.027 seconds

A MAC Protocol for Efficient Burst Data Transmission in Multihop Wireless Sensor Networks (멀티홉 무선 센서 네트워크에서 버스트 데이타의 효율적인 전송을 위한 프로토콜에 관한 연구)

  • Roh, Tae-Ho;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.3
    • /
    • pp.192-206
    • /
    • 2008
  • Multihop is the main communication style for wireless sensor networks composed of tiny sensor nodes. Until now, most applications have treated the periodic small sized sensing data. Recently, the burst traffic with the transient and continuous nature is increasingly introduced due to the advent of wireless multimedia sensor networks. Therefore, the efficient communication protocol to support this trend is required. In this paper, we propose a novel PIGAB(Packet Interval Gap based on Adaptive Backoff) protocol to efficiently transmit the burst data in multihop wireless sensor networks. The contention-based PIGAB protocol consists of the PIG(Packet Interval Gap) control algorithm in the source node and the MF(MAC-level Forwarding) algorithm in the relay node. The PIGAB is on basis of the newly proposed AB(Adaptive Backoff), CAB(Collision Avoidance Backoff), and UB(Uniform Backoff). These innovative algorithms and schemes can achieve the performance of network by adjusting the gap of every packet interval, recognizing the packet transmission of the hidden node. Through the simulations and experiments, we identify that the proposed PIGAB protocol considerably has the stable throughput and low latency in transmitting the burst data in multihop wireless sensor networks.

Improvements of an English Pronunciation Dictionary Generator Using DP-based Lexicon Pre-processing and Context-dependent Grapheme-to-phoneme MLP (DP 알고리즘에 의한 발음사전 전처리와 문맥종속 자소별 MLP를 이용한 영어 발음사전 생성기의 개선)

  • 김회린;문광식;이영직;정재호
    • The Journal of the Acoustical Society of Korea
    • /
    • v.18 no.5
    • /
    • pp.21-27
    • /
    • 1999
  • In this paper, we propose an improved MLP-based English pronunciation dictionary generator to apply to the variable vocabulary word recognizer. The variable vocabulary word recognizer can process any words specified in Korean word lexicon dynamically determined according to the current recognition task. To extend the ability of the system to task for English words, it is necessary to build a pronunciation dictionary generator to be able to process words not included in a predefined lexicon, such as proper nouns. In order to build the English pronunciation dictionary generator, we use context-dependent grapheme-to-phoneme multi-layer perceptron(MLP) architecture for each grapheme. To train each MLP, it is necessary to obtain grapheme-to-phoneme training data from general pronunciation dictionary. To automate the process, we use dynamic programming(DP) algorithm with some distance metrics. For training and testing the grapheme-to-phoneme MLPs, we use general English pronunciation dictionary with about 110 thousand words. With 26 MLPs each having 30 to 50 hidden nodes and the exception grapheme lexicon, we obtained the word accuracy of 72.8% for the 110 thousand words superior to rule-based method showing the word accuracy of 24.0%.

  • PDF

Convergence Implementing Emotion Prediction Neural Network Based on Heart Rate Variability (HRV) (심박변이도를 이용한 인공신경망 기반 감정예측 모형에 관한 융복합 연구)

  • Park, Sung Soo;Lee, Kun Chang
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.5
    • /
    • pp.33-41
    • /
    • 2018
  • The purpose of this study is to develop more accurate and robust emotion prediction neural network (EPNN) model by combining heart rate variability (HRV) and neural network. For the sake of improving the prediction performance more reliably, the proposed EPNN model is based on various types of activation functions like hyperbolic tangent, linear, and Gaussian functions, all of which are embedded in hidden nodes to improve its performance. In order to verify the validity of the proposed EPNN model, a number of HRV metrics were calculated from 20 valid and qualified participants whose emotions were induced by using money game. To add more rigor to the experiment, the participants' valence and arousal were checked and used as output node of the EPNN. The experiment results reveal that the F-Measure for Valence and Arousal is 80% and 95%, respectively, proving that the EPNN yields very robust and well-balanced performance. The EPNN performance was compared with competing models like neural network, logistic regression, support vector machine, and random forest. The EPNN was more accurate and reliable than those of the competing models. The results of this study can be effectively applied to many types of wearable computing devices when ubiquitous digital health environment becomes feasible and permeating into our everyday lives.

The Implementable Functions of the CoreNet of a Multi-Valued Single Neuron Network (단층 코어넷 다단입력 인공신경망회로의 함수에 관한 구현가능 연구)

  • Park, Jong Joon
    • Journal of IKEEE
    • /
    • v.18 no.4
    • /
    • pp.593-602
    • /
    • 2014
  • One of the purposes of an artificial neural netowrk(ANNet) is to implement the largest number of functions as possible with the smallest number of nodes and layers. This paper presents a CoreNet which has a multi-leveled input value and a multi-leveled output value with a 2-layered ANNet, which is the basic structure of an ANNet. I have suggested an equation for calculating the capacity of the CoreNet, which has a p-leveled input and a q-leveled output, as $a_{p,q}={\frac{1}{2}}p(p-1)q^2-{\frac{1}{2}}(p-2)(3p-1)q+(p-1)(p-2)$. I've applied this CoreNet into the simulation model 1(5)-1(6), which has 5 levels of an input and 6 levels of an output with no hidden layers. The simulation result of this model gives, the maximum 219 convergences for the number of implementable functions using the cot(${\sqrt{x}}$) input leveling method. I have also shown that, the 27 functions are implementable by the calculation of weight values(w, ${\theta}$) with the multi-threshold lines in the weight space, which are diverged in the simulation results. Therefore the 246 functions are implementable in the 1(5)-1(6) model, and this coincides with the value from the above eqution $a_{5,6}(=246)$. I also show the implementable function numbering method in the weight space.

Effect of Interference in CSMA/CA Based MAC Protocol for Underwater Network (CSMA/CA 기반 수중 통신망에서 간섭의 영향 연구)

  • Song, Min-je;Cho, Ho-shin;Jang, Youn-seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1631-1636
    • /
    • 2015
  • With the advance of wireless communication technology in terrestrial area, underwater communication is also evolving very fast from a simple point-to-point transmission to an elaborate networked communications. Underwater acoustic channel has quite different features comparing with the terrestrial radio channel in terms of propagation delay, Doppler shift, multipath, and path loss. Thus, existing technologies developed for terrestrial communication might not work properly in underwater channel. Especially medium access control (MAC) protocols which highly depend on propagation phenomenon should be newly designed for underwater network. CSMA/CA has drawn lots of attention as a candidate of underwater MAC protocol, since it is able to resolve a packet collision and the hidden node problem. However, a received signal could be degraded by the interferences from the nodes locating outside the receiver's propagation radius. In this paper, we study the effects of interference on the CSMA/CA based underwater network. We derived the SNR with the interference using the sonar equation and analyzed the degradation of the RTS/CTS effects. These results are compared with the terrestrial results to understand the differences. Finally we summarized the design considerations in CSMA/CA based underwater network.

Analysis of Network Dynamics from Annals of the Chosun Dynasty (조선왕조실록 네트워크의 동적 변화 분석)

  • Kim, Hak Yong;Kim, Hak Bong
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.529-537
    • /
    • 2014
  • To establish a foundation to objectively interpret Chosun history, we construct people network of the Chosun dynasty. The network shows scale free network properties as if most social networks do. The people network is composed of 1,379 nodes and 3,874 links and its diameter is 14. To analysis of the network dynamics, whole network that is composed of 27 king networks were constructed by adding the first king, Taejo network to the second king, Jeongjong network and then continuously adding the next king networks. Interestingly, betweenness and closeness centralities were gradually decreased but stress centrality was drastically increased. These results indicate that information flow is gradually slowing and hub node position is more centrally oriented as growing the network. To elucidate key persons from the network, k-core and MCODE algorithms that can extract core or module structures from whole network were employed. It is a possible to obtain new insight and hidden information by analyzing network dynamics. Due to lack of the dynamic interacting data, there is a limit for network dynamic research. In spite of using concise data, this research provides us a possibility that annals of the Chosun dynasty are very useful historical data for analyzing network dynamics.

An Enhanced WLAN MAC Protocol for Directional Broadcast (지향성 브로드캐스트를 위한 무선 LAN MAC 프로토콜)

  • Cha, Woo-Suk;Cho, Gi-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.16-27
    • /
    • 2006
  • The wireless transmission medium inherently broadcasts a signal to all neighbor nodes in the transmission range. Existing asynchronous MAC protocols do not provide a concrete solution for reliable broadcast in link layer. This mainly comes from that an omni-directional broadcasting causes to reduce the network performance due to the explosive collisions and contentions. This paper proposes a reliable broadcast protocol in link taller based on directional antennas, named MDB(MAC protocol for Directional Broadcasting). This protocol makes use of DAST(Directional Antennas Statement Table) information and D-MACA(Directional Multiple Access and Collision Avoidance) scheme through 4-way handshake to resolve the many collision problem wit]1 omni-directional antenna. To analyze its performance, MDB protocol is compared with IEEE 802.11 DCF protocol [9] and the protocol 2 of reference [3], in terms of the success rate of broadcast and the collision rate. As a result of performance analysis through simulation, it was confirmed that the collision rate of the MDB protocol is lower than those of IEEE 802.11 and the protocol 2 of reference [3], and that the completion rate of broadcast of MDB protocol is higher than those of IEEE 802.11 and the protocol 2 of reference [3].

Extraction of System-Wide Sybil-Resistant Trust Value embedded in Online Social Network Graph (온라인 소셜 네트워크 그래프에 내포된 시스템-차원 시빌-저항 신뢰도 추출)

  • Kim, Kyungbaek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.533-540
    • /
    • 2013
  • Anonymity is the one of main reasons for substantial improvement of Internet. It encourages various users to express their opinion freely and helps Internet based distributed systems vitalize. But, anonymity can cause unexpected threats because personal information of an online user is hidden. Especially, distributed systems are threatened by Sybil attack, where one malicious user creates and manages multiple fake online identities. To prevent Sybil attack, the traditional solutions include increasing the complexity of identity generation and mapping online identities to real-world identities. But, even though the high complexity of identity generation increases the generation cost of Sybil identities, eventually they are generated and there is no further way to suppress their activity. Also, the mapping between online identities and real identities may cause high possibility of losing anonymity. Recently, some methods using online social network to prevent Sybil attack are researched. In this paper, a new method is proposed for extracting a user's system-wide Sybil-resistant trust value by using the properties embedded in online social network graphs. The proposed method can be categorized into 3 types based on sampling and decision strategies. By using graphs sampled from Facebook, the performance of the 3 types of the proposed method is evaluated. Moreover, the impact of Sybil attack on nodes with different characteristics is evaluated in order to understand the behavior of Sybil attack.

Bhumipol Dam Operation Improvement via smart system for the Thor Tong Daeng Irrigation Project, Ping River Basin, Thailand

  • Koontanakulvong, Sucharit;Long, Tran Thanh;Van, Tuan Pham
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.164-175
    • /
    • 2019
  • The Tor Tong Daeng Irrigation Project with the irrigation area of 61,400 hectares is located in the Ping Basin of the Upper Central Plain of Thailand where farmers depended on both surface water and groundwater. In the drought year, water storage in the Bhumipol Dam is inadequate to allocate water for agriculture, and caused water deficit in many irrigation projects. Farmers need to find extra sources of water such as water from farm pond or groundwater as a supplement. The operation of Bhumipol Dam and irrigation demand estimation are vital for irrigation water allocation to help solve water shortage issue in the irrigation project. The study aims to determine the smart dam operation system to mitigate water shortage in this irrigation project via introduction of machine learning to improve dam operation and irrigation demand estimation via soil moisture estimation from satellite images. Via ANN technique application, the inflows to the dam are generated from the upstream rain gauge stations using past 10 years daily rainfall data. The input vectors for ANN model are identified base on regression and principal component analysis. The structure of ANN (length of training data, the type of activation functions, the number of hidden nodes and training methods) is determined from the statistics performance between measurements and ANN outputs. On the other hands, the irrigation demand will be estimated by using satellite images, LANDSAT. The Enhanced Vegetation Index (EVI) and Temperature Vegetation Dryness Index (TVDI) values are estimated from the plant growth stage and soil moisture. The values are calibrated and verified with the field plant growth stages and soil moisture data in the year 2017-2018. The irrigation demand in the irrigation project is then estimated from the plant growth stage and soil moisture in the area. With the estimated dam inflow and irrigation demand, the dam operation will manage the water release in the better manner compared with the past operational data. The results show how smart system concept was applied and improve dam operation by using inflow estimation from ANN technique combining with irrigation demand estimation from satellite images when compared with the past operation data which is an initial step to develop the smart dam operation system in Thailand.

  • PDF

Ventilation at Supra-Optimal Temperature Leading High Relative Humidity Controls Powdery Mildew, Silverleaf Whitefly, Mite and Inhibits the Flowering of Korean Melon in a Greenhouse Cultivation (참외 시설 재배 시 고온에서의 환기 처리에 의한 상대습도 상승과 흰가루병, 담배가루이, 응애 방제 및 개화 억제)

  • Seo, Tae Cheol;Kim, Jin Hyun;Kim, Seung Yu;Cho, Myeong Whan;Choi, Man Kwon;Ryu, Hee Ryong;Shin, Hyun Ho;Lee, Choung Keun
    • Journal of Bio-Environment Control
    • /
    • v.31 no.1
    • /
    • pp.43-51
    • /
    • 2022
  • This study was conducted to investigate the effect of ventilation at high temperature on the control of powdery mildew, silverleaf whitefly two-spotted spider mite occurred at Korean melon cultivation greenhouse, and on leaf rolling and flowering of the plant in summer season. 'Alchanggul' grafted onto 'Hidden Power' rootstock was planted on soil bed with the distance of 40 cm. Three ventilation temperatures of 45℃, 40℃, and 35℃ as set points were compared. Ventilation treatment was done by control of side window operation from 18th June to 13th July when silverleaf whitefly, mite, and powdery mildew were occurred in all greenhouses. The temperature inside greenhouse was increased up to the set temperature point on sunny days and maintained for about 9 hours with high relative humidity at 45℃ condition. The differences of day maximum air temperature and day minimum RH were the highest at 45℃ treatment. After 11 days of treatments, the damage by powdery mildew and two-spotted spider mite was almost recovered at 45℃ treatment but not at 40 and 35℃. The population of silverleaf whitefly and two-spotted spider mite were significantly decreased at 45℃ treatment at 14 days after treatment, while powdery mildew symptom was not significantly decreased. Leaf rolling was observed at high temperature but not severe at 45℃ treatment. After 26 days of treatments, female flowers did not bloom at all at 45℃ treatment, and the number of male flowers was 1.2 among 15 nodes of newly grown shoots. As the result, it indicates that ventilation at the high temperature of 45℃ for about 2 to 3 weeks can be an applicable method to control above mentioned pests and disease, and to recover the vegetative growth of Korean melon by reducing flowering of the plant.