• Title/Summary/Keyword: mobile cluster

Search Result 308, Processing Time 0.024 seconds

Analyzing the market of corporate e-learning (기업 이러닝 시장 분석 연구)

  • Byun, Sook-Young;Lee, Soo-Kyoung
    • Journal of Digital Contents Society
    • /
    • v.10 no.4
    • /
    • pp.543-550
    • /
    • 2009
  • In these days mobile handsets have come to be used at almost every user. The performance improvement of mobile devices and networks have made this trend possible. As a great variety of mobile applications are published, the necessity of running large-scale mobile applications becomes greater than before. To accomplish this, the existing researchers have developed mobile cluster computing libraries like Mobile-JPVM. In this paper, we implement a compute-intensive Animated GIF generating application and its cell phone viewer software using Mobile-JPVM library. We find out by the real execution of our softwares on the KTF handsets that they can sufficiently run on cellular phones. Our Animated GIF generator and its viewer are going to be commercially used for the mobile fashion advertisement systems.

  • PDF

P2P Ranging-Based Cooperative Localization Method for a Cluster of Mobile Nodes Containing IR-UWB PHY

  • Cho, Seong Yun;Kim, Joo Young;Enkhtur, Munkhzul
    • ETRI Journal
    • /
    • v.35 no.6
    • /
    • pp.1084-1093
    • /
    • 2013
  • problem of pedestrian localization using mobile nodes containing impulse radio ultra wideband (IR-UWB) is considered. IEEE 802.15.4a-based IR-UWB can achieve accurate ranging. However, the coverage is as short as 30 m, owing to the restricted transmit power. This factor may cause a poor geometric relationship among the mobile nodes and anchor nodes in certain environments. To localize a group of pedestrians accurately, an enhanced cooperative localization method is proposed. We describe a sequential algorithm and define problems that may occur in the implementation of the algorithm. To solve these problems, a batch algorithm is proposed. The batch algorithm can be carried out after performing the sequential algorithm to linearize the nonlinear range equation. When a sequential algorithm cannot be performed due to a poor geometric relationship among nodes, a batch algorithm can be carried out directly. Herein, Monte Carlo simulations are presented to illustrate the proposed method and verify its performance.

A Study of Efficiency Distributed routing path using LTD(Load Tolerance Density-distribution) in Mobile Ad-hoc Networks (모바일 애드 혹 네트워크에서 LTD(Load Tolerance Density-distribution)를 이용한 효율적인 분산경로에 관한 연구)

  • Oh, Dong-kuen;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.105-107
    • /
    • 2015
  • In this paper, we proposed LTD(Load Tolerance Density-distribution) algorithm using dynamic density for analyzing distribute routing path. MANET(Mobile Ad-hoc Networks) consists of the node that has a mobility. By the Mobility, the topology is exchanged frequently. To reduce the exchange of topology, the hierarchy network is studied. However, if the load is concentrated at the cluster head node, the communication is disconnected. the proposed algorithm measure the dynamic density of the node using poisson distribution. And this algorithm provides distribute routing path using dynamic density. The simulation results, the proposed algorithm shows improved packet delivery ratio than the compared algorithm.

  • PDF

Sonar Map Construction for Autonomous Mobile Robots Using Data Association Filter (데이터 연관 필터를 이용한 자율이동로봇의 초음파지도 작성)

  • Lee Yu-Chul;Lim Jong-Hwan;Cho Dong-Woo
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.9
    • /
    • pp.539-546
    • /
    • 2005
  • This paper describes a method of building the probability grid map for an autonomous mobile robot using the ultrasonic DAF(data association filter). The DAF, which evaluates the association of each data with the rest and removes the data affected by the specular reflection effect, can improve the reliability of the data for the Probability grid map. This method is based on the evaluation of possibility that the acquired data are all from the same object. Namely, the data from specular reflection have very few possibilities of detecting the same object, so that they are excluded from the data cluster during the process of the DAF. Therefore, the uncertain data corrupted by the specular reflection and/or multi-path effect, are not used to update the probability map, and hence building a good quality of a grid map is possible even in a specular environment. In order to verify the effectiveness of the DAF, it was applied to the Bayesian model and the orientation probability model which are the typical ones of a grid map. We demonstrate the experimental results using a real mobile robot in the real world.

Mobile User Interface Pattern Clustering Using Improved Semi-Supervised Kernel Fuzzy Clustering Method

  • Jia, Wei;Hua, Qingyi;Zhang, Minjun;Chen, Rui;Ji, Xiang;Wang, Bo
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.986-1016
    • /
    • 2019
  • Mobile user interface pattern (MUIP) is a kind of structured representation of interaction design knowledge. Several studies have suggested that MUIPs are a proven solution for recurring mobile interface design problems. To facilitate MUIP selection, an effective clustering method is required to discover hidden knowledge of pattern data set. In this paper, we employ the semi-supervised kernel fuzzy c-means clustering (SSKFCM) method to cluster MUIP data. In order to improve the performance of clustering, clustering parameters are optimized by utilizing the global optimization capability of particle swarm optimization (PSO) algorithm. Since the PSO algorithm is easily trapped in local optima, a novel PSO algorithm is presented in this paper. It combines an improved intuitionistic fuzzy entropy measure and a new population search strategy to enhance the population search capability and accelerate the convergence speed. Experimental results show the effectiveness and superiority of the proposed clustering method.

An energy-efficient technique for mobile-wireless-sensor-network-based IoT

  • Singla, Jatin;Mahajan, Rita;Bagai, Deepak
    • ETRI Journal
    • /
    • v.44 no.3
    • /
    • pp.389-399
    • /
    • 2022
  • Wireless sensor networks (WSNs) are one of the basic building blocks of Internet of Things (IoT) systems. However, the wireless sensing nodes in WSNs suffer from energy constraint issues because the replacement/recharging of the batteries of the nodes tends to be difficult. Furthermore, a number of realistic IoT scenarios, such as habitat and battlefield monitoring, contain mobile sensing elements, which makes the energy issues more critical. This research paper focuses on realistic WSN scenarios that involve mobile sensing elements with the aim of mitigating the attendant energy constraint issues using the concept of radio-frequency (RF) energy extraction. The proposed technique incorporates a cluster head election workflow for WSNs that includes mobile sensing elements capable of RF energy harvesting. The extensive simulation analysis demonstrated the higher efficacy of the proposed technique compared with the existing techniques in terms of residual energy, number of functional nodes, and network lifetime, with approximately 50% of the nodes found to be functional at the 4000th, 5000th, and 6000th rounds for the proposed technique with initial energies of 0.25, 0.5 and 1 J, respectively.

A Study on DDoS Detection Technique based on Cluster in Mobile Ad-hoc Network (무선 애드혹 망에서 클러스터 기반 DDoS 탐지 기법에 관한 연구)

  • Yang, Hwan-Seok;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.25-30
    • /
    • 2011
  • MANET has a weak construction in security more because it is consisted of only moving nodes and doesn't have central management system. The DDoS attack is a serious attack among these attacks which threaten wireless network. The DDoS attack has various object and trick and become intelligent. In this paper, we propose the technique to raise DDoS detection rate by classifying abnormal traffic pattern. Cluster head performs sentinel agent after nodes which compose MANET are made into cluster. The decision tree is applied to detect abnormal traffic pattern after the sentinel agent collects all traffics and it judges traffic pattern and detects attack also. We confirm high attack detection rate of proposed detection technique in this study through experimentation.

Social-Aware Resource Allocation Based on Cluster Formation and Matching Theory in D2D Underlaying Cellular Networks

  • Zhuang, Wenqin;Chen, Mingkai;Wei, Xin;Li, Haibo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.1984-2002
    • /
    • 2020
  • With the appearance of wireless spectrum crisis in traditional cellular network, device-to-device (D2D) communication has been regarded as a promising solution to ease heavy traffic burden by enabling precise content delivery among mobile users. However, due to the channel sharing, the interference between D2D and cellular users can affect the transmission rate and narrow the throughput in the network. In this paper, we firstly present a weighted interference minimization cluster formation model involving both social attribute and physical closeness. The weighted-interference, which is evaluated under the susceptible-infected(SI) model, is utilized to gather user in social and physical proximity. Then, we address the cluster formation problem via spectrum clustering with iterative operation. Finally, we propose the stable matching theory algorithm in order to maximize rate oriented to accomplish the one-to-one resource allocation. Numerical results show that our proposed scheme acquires quite well clustering effect and increases the accumulative transmission rate compared with the other two advanced schemes.

Moving Object Detection Using SURF and Label Cluster Update in Active Camera (SURF와 Label Cluster를 이용한 이동형 카메라에서 동적물체 추출)

  • Jung, Yong-Han;Park, Eun-Soo;Lee, Hyung-Ho;Wang, De-Chang;Huh, Uk-Youl;Kim, Hak-Il
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.1
    • /
    • pp.35-41
    • /
    • 2012
  • This paper proposes a moving object detection algorithm for active camera system that can be applied to mobile robot and intelligent surveillance system. Most of moving object detection algorithms based on a stationary camera system. These algorithms used fixed surveillance system that does not consider the motion of the background or robot tracking system that track pre-learned object. Unlike the stationary camera system, the active camera system has a problem that is difficult to extract the moving object due to the error occurred by the movement of camera. In order to overcome this problem, the motion of the camera was compensated by using SURF and Pseudo Perspective model, and then the moving object is extracted efficiently using stochastic Label Cluster transport model. This method is possible to detect moving object because that minimizes effect of the background movement. Our approach proves robust and effective in terms of moving object detection in active camera system.

Performance Evaluation and Analysis of Implicit Cluster-based Ad hoc Multicast Mechanism (암시적 클러스터기반 애드 혹 멀티캐스트 기법 성능 평가 및 분석)

  • Choi, Young-Hwan;Park, Soo-Chang;Lee, Eui-Sin;Yu, Fucai;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.5
    • /
    • pp.457-461
    • /
    • 2008
  • Previous studies on overlay ad hoc multi-casting are mainly divided into two categories: hierarchical structure-based multicast schemes and non-hierarchical structure-based multicast schemes. They do not reflect their real-time location information for routing updates. This can be a cause of low performance on energy consumption, throughput, and latency. For improving the problems, we propose an implicit cluster based overlay ad hoc multicast scheme with analysis of related work, and then we evaluate performance through computer simulation.