• Title/Summary/Keyword: metrics

Search Result 1,948, Processing Time 0.03 seconds

Performance Analysis of MAP Algorithm by Robust Equalization Techniques in Nongaussian Noise Channel (비가우시안 잡음 채널에서 Robust 등화기법을 이용한 터보 부호의 MAP 알고리즘 성능분석)

  • 소성열
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.9A
    • /
    • pp.1290-1298
    • /
    • 2000
  • Turbo Code decoder is an iterate decoding technology, which extracts extrinsic information from the bit to be decoded by calculating both forward and backward metrics, and uses the information to the next decoding step Turbo Code shows excellent performance, approaching Shannon Limit at the view of BER, when the size of Interleaver is big and iterate decoding is run enough. But it has the problems which are increased complexity and delay and difficulty of real-time processing due to Interleaver and iterate decoding. In this paper, it is analyzed that MAP(maximum a posteriori) algorithm which is used as one of Turbo Code decoding, and the factor which determines its performance. MAP algorithm proceeds iterate decoding by determining soft decision value through the environment and transition probability between all adjacent bits and received symbols. Therefore, to improve the performance of MAP algorithm, the trust between adjacent received symbols must be ensured. However, MAP algorithm itself, can not do any action for ensuring so the conclusion is that it is needed more algorithm, so to decrease iterate decoding. Consequently, MAP algorithm and Turbo Code performance are analyzed in the nongaussian channel applying Robust equalization technique in order to input more trusted information into MAP algorithm for the received symbols.

  • PDF

The Development and Application of Multi-metric Water Quality Assessment Model for Reservoir Managements in Korea. (우리나라 인공호 관리를 위한 다변수 수질평가 모델의 개발 및 적용)

  • Lee, Hyun-Joon;An, Kwang-Guk
    • Korean Journal of Ecology and Environment
    • /
    • v.42 no.2
    • /
    • pp.242-252
    • /
    • 2009
  • The purpose of this study was to develop a Multi-metric Water Quality Assessment (MWQA) model and apply it to dataset sampled from Paldang and Daechung reservoir in 2008. The various water dataset used to this study included 5 year data sets (2003${\sim}$2007) in Korean reservoirs which were obtained from the Ministry of Environment, Korea. In this study, suggested MWQA model has 4 metrics that were composed of 4 parameters such as chemical, physical, biological, and hydrological variables. And, each of the variables attributed total phosphorus (TP) concentration in water, secchi depth (SD) measure in water, chlorophyll-${\alpha}$(Chl-${\alpha}$) concentration in water and the ratio of inflow of water into lakes and efflux of water from lakes, input/output (I/O). First, we established the criteria for trophic boundaries. The boundary between oligotrophic and mesotrophic categories was defined by the lower third of the cumulative distribution of the values. The mesotrophic-eutrophic boundary was defined by the upper third of the distribution. Second, each metric was given by a point-oligo=1, meso=3, eu=5. And then, obtained total score from each metric was divided 5 grade-Excellent, Good, Fair, Poor, and Very poor. As the results of applying the proposed MWQA model, the Paldang reservoir obtained "Fair" or "Poor" grade and Daechung reservoir obtained "Excellent" or "Good" grade. The suggested MWQA model through these procedures will enable to manage efficiently the reservoir. And, more studies such as metric numbers and attributes should be done for the accurate application of the new model.

A Priority Based Multipath Routing Mechanism in the Tactical Backbone Network (전술 백본망에서 우선순위를 고려한 다중 경로 라우팅 방안)

  • Kim, Yongsin;Shin, Sang-heon;Kim, Younghan
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1057-1064
    • /
    • 2015
  • The tactical network is system based on wireless networking technologies that ties together surveillance reconnaissance systems, precision strike systems and command and control systems. Several alternative paths exist in the network because it is connected as a grid to improve its survivability. In addition, the network topology changes frequently as forces and combatants change their network access points while conducting operations. However, most Internet routing standards have been designed for use in stable backbone networks. Therefore, tactical networks may exhibit a deterioration in performance when these standards are implemented. In this paper, we propose Priority based Multi-Path routing with Local Optimization(PMPLO) for a tactical backbone network. The PMPLO separately manages the global and local metrics. The global metric propagates to other routers through the use of a routing protocol, and it is used for a multi-path configuration that is guaranteed to be loop free. The local metric reflects the link utilization that is used to find an alternate path when congestion occurs, and it is managed internally only within each router. It also produces traffic that has a high priority privilege when choosing the optimal path. Finally, we conducted a simulation to verify that the PMPLO can effectively distribute the user traffic among available routers.

An Efficient Load-Balancing Algorithm based on Bandwidth Reservation Scheme in Wireless Multimedia Networks (무선 멀티미디어 망에서 대역폭 예약을 이용한 효율적인 부하 균형 알고리즘)

  • 정영석;우매리;김종근
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.4
    • /
    • pp.441-449
    • /
    • 2002
  • For multimedia traffics to be supported successfully in wireless network environment, it is necessary to provide Qualify-of-Service(QoS) guarantees among mobile hosts(clients). In order to guarantee the QoS, we have to keep the call blocking probability below a target value during hand-off session. However, the QoS negotiated between the client and the network may not be guaranteed due to lack of available channels for traffic of a new cell, since on service mobile clients should be able to continue their sessions. In this paper, we propose an efficient load-balancing algorithm based on the adaptive bandwidth reservation scheme for enlarging available channels in a cell. Proposed algorithm predicts the direction of clients in a cell and adjusts the amount of the channel to be reserved according to the load status of the cell. This method is used to reserve a part of bandwidths of a cell for hand-off calls to its adjacent cells and this reserved bandwidth can be used for hand-off call prior to new connection requests. If the number of free channels is also under a low threshold value, our scheme use a load-balancing algorithm with an adaptive bandwidth reservation. In order to evaluate the performance of our algorithm, we measure metrics such as the blocking probability of new calls and dropping probability of hand-off calls, and compare with those of existing schemes.

  • PDF

Detecting Errors in POS-Tagged Corpus on XGBoost and Cross Validation (XGBoost와 교차검증을 이용한 품사부착말뭉치에서의 오류 탐지)

  • Choi, Min-Seok;Kim, Chang-Hyun;Park, Ho-Min;Cheon, Min-Ah;Yoon, Ho;Namgoong, Young;Kim, Jae-Kyun;Kim, Jae-Hoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.7
    • /
    • pp.221-228
    • /
    • 2020
  • Part-of-Speech (POS) tagged corpus is a collection of electronic text in which each word is annotated with a tag as the corresponding POS and is widely used for various training data for natural language processing. The training data generally assumes that there are no errors, but in reality they include various types of errors, which cause performance degradation of systems trained using the data. To alleviate this problem, we propose a novel method for detecting errors in the existing POS tagged corpus using the classifier of XGBoost and cross-validation as evaluation techniques. We first train a classifier of a POS tagger using the POS-tagged corpus with some errors and then detect errors from the POS-tagged corpus using cross-validation, but the classifier cannot detect errors because there is no training data for detecting POS tagged errors. We thus detect errors by comparing the outputs (probabilities of POS) of the classifier, adjusting hyperparameters. The hyperparameters is estimated by a small scale error-tagged corpus, in which text is sampled from a POS-tagged corpus and which is marked up POS errors by experts. In this paper, we use recall and precision as evaluation metrics which are widely used in information retrieval. We have shown that the proposed method is valid by comparing two distributions of the sample (the error-tagged corpus) and the population (the POS-tagged corpus) because all detected errors cannot be checked. In the near future, we will apply the proposed method to a dependency tree-tagged corpus and a semantic role tagged corpus.

End-to-end Packet Statistics Analysis using OPNET Modeler Wireless Suite (OPNET Modeler Wireless Suite를 이용한 종단간 패킷 통계 분석)

  • Kim, Jeong-Su
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.265-278
    • /
    • 2011
  • The objective of this paper is to analyze and characterize end-to-end packet statistics after modeling and simulation of WiFi (IEEE 802.11g) and WiMAX (IEEE 802.16e) of a virtual wireless network using OPNET Modeler Wireless Suite. Wireless internal and external network simulators such as Remcom's Wireless InSite Real Time (RT) module, WinProp: W-LAN/Fixed WiMAX/Mobile WiMAX, and SMI system, are designed to consider data transfer rate based on wireless propagation signal strength. However, we approached our research in a different perspective without support for characteristic of these wireless network simulators. That is, we will discuss the purpose of a visual analysis for these packets, how to receive each point packets (e.g., wireless user, base station or access point, and http server) through end-to-end virtual network modeling based on integrated wired and wireless network without wireless propagation signal strength. Measuring packet statistics is important in QoS metric analysis among wireless network performance metrics. Clear packet statistics is an especially essential metric in guaranteeing QoS for WiMAX users. We have found some interesting results through modeling and simulation for virtual wireless network using OPNET Modeler Wireless Suite. We are also able to analyze multi-view efficiency through experiment/observation result.

ICARP: Interference-based Charging Aware Routing Protocol for Opportunistic Energy Harvesting Wireless Networks (ICARP: 기회적 에너지 하베스팅 무선 네트워크를 위한 간섭 기반 충전 인지 라우팅 프로토콜)

  • Kim, Hyun-Tae;Ra, In-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.27 no.1
    • /
    • pp.1-6
    • /
    • 2017
  • Recent researches on radio frequency energy harvesting networks(RF-EHNs) with limited energy resource like battery have been focusing on the development of a new scheme that can effectively extend the whole lifetime of a network to semipermanent. In order for considerable increase both in the amount of energy obtained from radio frequency energy harvesting and its charging effectiveness, it is very important to design a network that supports energy harvesting and data transfer simultaneously with the full consideration of various characteristics affecting the performance of a RF-EHN. In this paper, we proposes an interference-based charging aware routing protocol(ICARP) that utilizes interference information and charging time to maximize the amount of energy harvesting and to minimize the end-to-end delay from a source to the given destination node. To accomplish the research objectives, this paper gives a design of ICARP adopting new network metrics such as interference information and charging time to minimize end-to-end delay in energy harvesting wireless networks. The proposed method enables a RF-EHN to reduce the number of packet losses and retransmissions significantly for better energy consumption. Finally, simulation results show that the network performance in the aspects of packet transmission rate and end-to-end delay has enhanced with the comparison of existing routing protocols.

Common Services Platform for M2M Supporting Security Standards (보안 표준 지원 M2M 공통 서비스 플랫폼)

  • Vakkosov, Sardorjon;Namgung, Jung-Il;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.3
    • /
    • pp.76-88
    • /
    • 2016
  • Machine to Machine (M2M) is a technology that presents communication between two or more devices with or without human intervention. M2M communications can be applied for various use cases such as environmental monitoring, health care, smart metering and etc. In most use cases, M2M utilizes sensor nodes to collect data from the intended environment and the data is transmitted back to M2M application through other devices (gateways, sink nodes). In some use cases, M2M devices are being designed to store and process sensor data for improving the reliability of the service; Gateways and sink nodes are also intended to store and process the gathered data from sensor nodes. This kind of approach is very challenging for both academy and industry. In order to enhance the performance of this approach, in this paper, we propose our Common Service Security Platform (CSSP) for M2M devices and gateways. CSSP platform presents solutions for the devices and gateways by making them operate more accurately and efficiently. Besides, we present a comparative analysis of communication protocols and present their performance in accordance with selected metrics.

Monitoring Vegetation Phenology Using MODIS in Northern Plateau Region, North Korea (MODIS자료를 이용한 북한 개마고원 및 백무고원 식생의 생물계절 모니터링)

  • Cha, Su-Young;Seo, Dong-Jo;Park, Chong-Hwa
    • Korean Journal of Remote Sensing
    • /
    • v.25 no.5
    • /
    • pp.399-409
    • /
    • 2009
  • Many researches have shown that NDVI provides a potential methods to derive meaningful metrics that describe ecosystem functions. In this paper we investigated the use of the MODIS NDVI (Normalized Difference Vegetation Index) to monitor vegetation phenology dynamics of Northern plateau region, North Korea, during last 9-years (2000~2008). The findings of this paper can be summarized as follows. First, the length of growing season ranged from a low of 128 days in 2003 to a high of 176 days in 2000 and 2005. On the average of the last 9 years, the highest NDVI of 0.86 was marked on 28 July. Greenup onset occurs at the start of May, while the senescence begins between late September and October. Second, these annual vegetation cycles were compared with Seorak and Jiri Mountain regions of South Korea which have similar vegetation condition. Greenup onsets in South Korea were observed earlier than those of North Korea and the average time lag between the South and North Korea in Greenup was about 16 days which is a time-resolution of remotely sensed data. Sub-alpine conifers of such areas may be severely affected by the large of phenological characteristics due to the global warming trend.

GIS-based Assessment of the Lateral Connectivity in the Cheongmi-cheon Stream, South Korea (청미천에서 GIS 기반 횡적 연결성 평가)

  • Jin, Seung-Nam;Cho, Hyunsuk;Chu, Yunsoo;Cho, Kang-Hyun
    • Ecology and Resilient Infrastructure
    • /
    • v.6 no.3
    • /
    • pp.154-162
    • /
    • 2019
  • Lateral connectivity between the channel and the floodplains has been damaged by the levee construction and channelization in most streams of South Korea. The purpose of this study was to develop a technique for easily and remotely assessing lateral connectivity using GIS in the streams and to evaluate the effectiveness of the assessment method by applying it to Cheongmi-cheon Stream, a representative stream in the central Korean Peninsula. The metrics of the lateral connectivity assessment are composed of (1) existence of remaining wetlands and (2) land use property as a habitat quality of the former floodplain outside the levee and (3) existence of levee barrier, (4) connectivity to the stream and (5) connectivity to the upland natural habitats as a connectivity from the channel through floodplain to the upland forest. According to the result of applying the assessment method to Cheongmi-cheon Stream, the lateral connectivity was severely damaged due to the levee construction and land use change in the former floodplain. The GIS-based assessment of the lateral connectivity developed in this study is expected to be used as a useful tool for identifying limitations of current connectivity in various attempts to restore lateral connectivity in riparian ecosystems.