• Title/Summary/Keyword: multi-user detection

Search Result 110, Processing Time 0.022 seconds

A Design of TDMA/TDD MAC Protocol for Full-Duplex Multi-User Voice Communication Systems Based on Sensor Network (센서 네트워크 기반의 다수 사용자간 Full-Duplex 음성 통신 시스템을 위한 TDMA/TDD MAC 프로토콜 설계)

  • Kim, Jisoo;Lee, Jae Hyoung;Cho, Sung Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.3
    • /
    • pp.239-246
    • /
    • 2013
  • The IEEE 802.15.4 offers standard about PHY and MAC layer and features low power, low bandwidth, and low speed data communication. Because of this reason, IEEE 802.15.4 is only within a limited range such as sensor detection and home network; nevertheless, the research about transmission multimedia data like voice packet through wireless sensor networks is conducted widely. In this paper, we proposed the group communication system based on the sensor network. TDMA/TDD MAC based on the IEEE 802.15.4 PHY for voice communication on the sensor network is designed by improvement existing peer-to-peer voice communication on the sensor network and hardware is implemented for group communication. To measure the quality of designed system, mean opinion score (MOS) is obtained from the experiment and verified by using sine wave method. As a result of an experiment, we expect that a many cases of application solution can be developed using presented system.

Design and Implementation of Multiple View Image Synthesis Scheme based on RAM Disk for Real-Time 3D Browsing System (실시간 3D 브라우징 시스템을 위한 램 디스크 기반의 다시점 영상 합성 기법의 설계 및 구현)

  • Sim, Chun-Bo;Lim, Eun-Cheon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.5
    • /
    • pp.13-23
    • /
    • 2009
  • One of the main purpose of multiple-view image processing technology is support realistic 3D image to device user by using multiple viewpoint display devices and compressed data restoration devices. This paper proposes a multiple view image synthesis scheme based on RAM disk which makes possible to browse 3D images generated by applying effective composing method to real time input stereo images. The proposed scheme first converts input images to binary image. We applies edge detection algorithm such as Sobel algorithm and Prewiit algorithm to find edges used to evaluate disparities from images of 4 multi-cameras. In addition, we make use of time interval between hardware trigger and software trigger to solve the synchronization problem which has stated ambiguously in related studies. We use a unique identifier on each snapshot of images for distributed environment. With respect of performance results, the proposed scheme takes 0.67 sec in each binary array. to transfer entire images which contains left and right side with disparity information for high quality 3D image browsing. We conclude that the proposed scheme is suitable for real time 3D applications.

A Feasibility Study on Opportunistic Interference Alignment: Improved Energy Efficiency via Power Control (기회적 간섭 정렬의 실현 가능성 연구: 전력 제어를 통한 에너지 효율성 개선)

  • Shin, Won-Yong;Yoon, Jangho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1077-1083
    • /
    • 2015
  • In this paper, we introduce an energy-efficient opportunistic interference alignment (OIA) scheme that greatly improves the sum-rates in multi-cell uplink networks. Each user employs optimal transmit vector design and power control in the sense of minimizing the amount of generated interference to other-cell base stations while satisfying a required signal quality. As our main result, it is shown that owing to the reduced interference level, the proposed OIA schemes attains larger sum-rates than those of OIA with no power control for almost all signal-to-noise ratio regions. In addition, when both zero-forcing and minimum mean square error (MMSE) detectors are employed at the receiver along with the OIA scheme, it is shown that the OIA scheme with MMSE detection shows superior performance.

Dynamic Summarization and Summary Description Scheme for Efficient Video Browsing (효율적인 비디오 브라우징을 위한 동적 요약 및 요약 기술구조)

  • 김재곤;장현성;김문철;김진웅;김형명
    • Journal of Broadcast Engineering
    • /
    • v.5 no.1
    • /
    • pp.82-93
    • /
    • 2000
  • Recently, the capability of efficient access to the desired video content is of growing importance because more digital video data are available at an increasing rate. A video summary abstracting the gist from the entirety enables the efficient browsing as well as the fast skimming of the video contents. In this paper, we discuss a novel dynamic summarization method based on the detection of highlights which represent semantically significant content and the description scheme (DS) proposed to MPEG-7 aiming to provide summary description. The summary DS proposed to MPEG-7 allows for efficient navigation and browsing to the contents of interest through the functionalities of multi-level highlights, hierarchical browsing and user-customized summarization. In this paper, we also show the validation and the usefulness of the methodology for dynamic summarization and the summary DS in real applications with soccer video sequences.

  • PDF

Multi-constellation Local-area Differential GNSS for Unmanned Explorations in the Polar Regions

  • Kim, Dongwoo;Kim, Minchan;Lee, Jinsil;Lee, Jiyun
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.8 no.2
    • /
    • pp.79-85
    • /
    • 2019
  • The mission tasks of polar exploration utilizing unmanned systems such as glacier monitoring, ecosystem research, and inland exploration have been expanded. To facilitate unmanned exploration mission tasks, precise and robust navigation systems are required. However, limitations on the utilization of satellite navigation system are present due to satellite orbital characteristics at the polar region located in a high latitude. The orbital inclination of global positioning system (GPS), which was developed to be utilized in mid-latitude sites, was designed at $55^{\circ}$. This means that as the user is located in higher latitudes, the satellite visibility and vertical precision become worse. In addition, the use of satellite-based wide-area augmentation system (SBAS) is also limited in higher latitude regions than the maximum latitude of signal reception by stationary satellites, which is $70^{\circ}$. This study proposes a local-area augmentation system that additionally utilizes Global Navigation Satellite System (GLONASS) considering satellite navigation system environment in Polar Regions. The orbital inclination of GLONASS is $64.8^{\circ}$, which is suitable in order to ensure satellite visibility in high-latitude regions. In contrast, GLONASS has different system operation elements such as configuration elements of navigation message and update cycle and has a statistically different signal error level around 4 m, which is larger than that of GPS. Thus, such system characteristics must be taken into consideration to ensure data integrity and monitor GLONASS signal fault. This study took GLONASS system characteristics and performance into consideration to improve previously developed fault detection algorithm in the local-area augmentation system based on GPS. In addition, real GNSS observation data were acquired from the receivers installed at the Antarctic King Sejong Station to analyze positioning accuracy and calculate test statistics of the fault monitors. Finally, this study analyzed the satellite visibility of GPS/GLONASS-based local-area augmentation system in Polar Regions and conducted performance evaluations through simulations.

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

A Study on the UAV-based Vegetable Index Comparison for Detection of Pine Wilt Disease Trees (소나무재선충병 피해목 탐지를 위한 UAV기반의 식생지수 비교 연구)

  • Jung, Yoon-Young;Kim, Sang-Wook
    • Journal of Cadastre & Land InformatiX
    • /
    • v.50 no.1
    • /
    • pp.201-214
    • /
    • 2020
  • This study aimed to early detect damaged trees by pine wilt disease using the vegetation indices of UAV images. The location data of 193 pine wilt disease trees were constructed through field surveys and vegetation index analyses of NDVI, GNDVI, NDRE and SAVI were performed using multi-spectral UAV images at the same time. K-Means algorithm was adopted to classify damaged trees and confusion matrix was used to compare and analyze the classification accuracy. The results of the study are summarized as follows. First, the overall accuracy of the classification was analyzed in order of NDVI (88.04%, Kappa coefficient 0.76) > GNDVI (86.01%, Kappa coefficient 0.72) > NDRE (77.35%, Kappa coefficient 0.55) > SAVI (76.84%, Kappa coefficient 0.54) and showed the highest accuracy of NDVI. Second, K-Means unsupervised classification method using NDVI or GNDVI is possible to some extent to find out the damaged trees. In particular, this technique is to help early detection of damaged trees due to its intensive operation, low user intervention and relatively simple analysis process. In the future, it is expected that the utilization of time series images or the application of deep learning techniques will increase the accuracy of classification.

Evil-Twin Detection Scheme Using SVM with Multi-Factors (다중 요소를 가지는 SVM을 이용한 이블 트윈 탐지 방법)

  • Kang, SungBae;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.2
    • /
    • pp.334-348
    • /
    • 2015
  • Widespread use of smart devices accompanies increase of use of access point (AP), which enables the connection to the wireless network. If the appropriate security is not served when a user tries to connect the wireless network through an AP, various security problems can arise due to the rogue APs. In this paper, we are going to examine the threat by evil-twin, which is a kind of rogue APs. Most of recent researches for detecting rogue APs utilize the measured time difference, such as round trip time (RTT), between the evil-twin and authorized APs. These methods, however, suffer from the low detection rate in the network congestion. Due to these reasons, in this paper, we suggest a new factor, packet inter-arrival time (PIAT), in order to detect evil-twins. By using both RTT and PIAT as the learning factors for the support vector machine (SVM), we determine the non-linear metric to classify evil-twins and authorized APs. As a result, we can detect evil-twins with the probability of up to 96.5% and at least 89.75% even when the network is congested.

A study on Parallel Interference Cancellation scheme based sorting method for a Multi-carrier DS/CDMA System (MC-DS/CDMA 시스템에서 정렬기법을 이용한 병렬형 간섭제거기법의 성능개선에 관한 연구)

  • Park Jae-Won;Park Yong-Wan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.1
    • /
    • pp.17-27
    • /
    • 2005
  • In this paper, we introduce a Parallel Interference Canceller (PIC) based sorting method to improve performance in the MC-DS/CDMA environment. A conventional PIC estimates and subtracts out all of the MAI (Multiple Access Interference) for each user in parallel. The parallel process ensures the low delay for the detection of all users. Also this scheme requires more stages for having better performance. Since the performance of PIC is strongly related to the correct MAI estimation, we introduce the IC (Interference Cancellation) scheme to estimate the accurate weaker signal group than the desired signal using conventional PIC. The principle of the proposed receiver sorts in descending order by the strength of signal and subtracts the MAI of the strong interferers from the desired signal for the accurate estimate of the weaker signals. Following this, the proposed scheme cancels out the improved weaker interference from the desired signal, using the output of the pre-step. In this result, the proposed system obtains better BER performance than the conventional PIC because the accuracy of the strong signal is improved. However, a disadvantage exists in that the processing time has slightly longer delay than the PIC owing to the power sorting and the MAI estimation process. The system performance evaluates and compares other non-liner It according to the number of sub-carriers in the limited-bandwidth.

DOVE : A Distributed Object System for Virtual Computing Environment (DOVE : 가상 계산 환경을 위한 분산 객체 시스템)

  • Kim, Hyeong-Do;Woo, Young-Je;Ryu, So-Hyun;Jeong, Chang-Sung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.2
    • /
    • pp.120-134
    • /
    • 2000
  • In this paper we present a Distributed Object oriented Virtual computing Environment, called DOVE which consists of autonomous distributed objects interacting with one another via method invocations based on a distributed object model. DOVE appears to a user logically as a single virtual computer for a set of heterogeneous hosts connected by a network as if objects in remote site reside in one virtual computer. By supporting efficient parallelism, heterogeneity, group communication, single global name service and fault-tolerance, it provides a transparent and easy-to-use programming environment for parallel applications. Efficient parallelism is supported by diverse remote method invocation, multiple method invocation for object group, multi-threaded architecture and synchronization schemes. Heterogeneity is achieved by automatic data arshalling and unmarshalling, and an easy-to-use and transparent programming environment is provided by stub and skeleton objects generated by DOVE IDL compiler, object life control and naming service of object manager. Autonomy of distributed objects, multi-layered architecture and decentralized approaches in hierarchical naming service and object management make DOVE more extensible and scalable. Also,fault tolerance is provided by fault detection in object using a timeout mechanism, and fault notification using asynchronous exception handling methods

  • PDF