• Title/Summary/Keyword: probabilistic scheme

Search Result 163, Processing Time 0.024 seconds

Probabilistic Assessment of Drought Characteristics based on Homogeneous Hidden Markov Model (동질성 은닉 마코프 모형을 적용한 가뭄특성의 확률론적 평가)

  • Yoo, Ji-Young;Kwon, Hyun-Han;Kim, Tae-Woong;Lee, Seung-Oh
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.34 no.1
    • /
    • pp.145-153
    • /
    • 2014
  • Several studies regarding drought indices and criteria have been widely studied in the literature. If one defines the onset, severity, and end of droughts, in general, a certain threshold needs to be set to assess the drought events. However, the uncertainty associated with the threshold is a critical problem in drought analysis. To take full advantage of the inherent features in the rainfall series, a Hidden Markov Model (HMM) based probabilistic drought analysis was proposed rather than using the existing threshold based analysis. As a result, the proposed HMM based probabilistic drought analysis scheme shows better performance in terms of defining drought state and understanding underlying characteristics of the drought. In addition, the HMM based approach is capable of quantifying the uncertainties associated with the classifying meteorological drought condition in a systematic way.

A Preventive Intra-Path Load Balancing Based on the Probabilistic Characteristics of the Quality-of-service (서비스 품질의 확률적 특성에 기초한 예방적 경로 부하 밸런싱)

  • Kim, Tae-Joon;Suh, Bong-Sue
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.2
    • /
    • pp.279-286
    • /
    • 2010
  • Unbalanced traffic load offered to the nodes making up a path in the network guaranteeing quality-of-service has been known as a main cause deteriorating the capability of the path in admitting traffic flows. Several path load balancing methods have been developed to resolve this problem which used a feedback control scheme that adjusts the delay budget of a flow allocated to each node according to the conditions of available resource in the path. Because of no consideration about the probabilistic characteristics of the service quality, it is impossible for them to prevent in advance a bottleneck on the path which leads to a native restriction in the improvement of the capability being deteriorated. This paper proposes a preventive intra-path load balancing method applicable to the RSVP system which is based on the probabilistic characteristics of the quality-of-service of the offered load. The results of the simulation of the proposed method on a simple evaluation network showed that it provides the gain of 4~22% compared to the legacy one in terms of the number of admitted flows.

Probabilistic Neural Network for Prediction of Leakage in Water Distribution Network (급배수관망 누수예측을 위한 확률신경망)

  • Ha, Sung-Ryong;Ryu, Youn-Hee;Park, Sang-Young
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.20 no.6
    • /
    • pp.799-811
    • /
    • 2006
  • As an alternative measure to replace reactive stance with proactive one, a risk based management scheme has been commonly applied to enhance public satisfaction on water service by providing a higher creditable solution to handle a rehabilitation problem of pipe having high potential risk of leaks. This study intended to examine the feasibility of a simulation model to predict a recurrence probability of pipe leaks. As a branch of the data mining technique, probabilistic neural network (PNN) algorithm was applied to infer the extent of leaking recurrence probability of water network. PNN model could classify the leaking level of each unit segment of the pipe network. Pipe material, diameter, C value, road width, pressure, installation age as input variable and 5 classes by pipe leaking probability as output variable were built in PNN model. The study results indicated that it is important to pay higher attention to the pipe segment with the leak record. By increase the hydraulic pipe pressure to meet the required water demand from each node, simulation results indicated that about 6.9% of total number of pipe would additionally be classified into higher class of recurrence risk than present as the reference year. Consequently, it was convinced that the application of PNN model incorporated with a data base management system of pipe network to manage municipal water distribution network could make a promise to enhance the management efficiency by providing the essential knowledge for decision making rehabilitation of network.

Audio Fingerprint Extraction Method Using Multi-Level Quantization Scheme (다중 레벨 양자화 기법을 적용한 오디오 핑거프린트 추출 방법)

  • Song Won-Sik;Park Man-Soo;Kim Hoi-Rin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.25 no.4
    • /
    • pp.151-158
    • /
    • 2006
  • In this paper, we proposed a new audio fingerprint extraction method, based on Philips' music retrieval algorithm, which uses the energy difference of neighboring filter-bank and probabilistic characteristics of music. Since Philips method uses too many filter-banks in limited frequency band, it may cause audio fingerprints to be highly sensitive to additive noises and to have too high correlation between neighboring bands. The proposed method improves robustness to noises by reducing the number of filter-banks while it maintains the discriminative power by representing the energy difference of bands with 2 bits where the quantization levels are determined by probabilistic characteristics. The correlation which exists among 4 different levels in 2 bits is not only utilized in similarity measurement. but also in efficient reduction of searching area. Experiments show that the proposed method is not only more robust to various environmental noises (street, department, car, office, and restaurant), but also takes less time for database search than Philips in the case where music is highly degraded.

A Probabilistic Prediction of Weapon Systems Evaluation Test Execution Ratio and Management Scheme (무기체계 평가시험 수행율의 확률적 예측 및 관리기법)

  • Jang, Young-sik;Han, Sung-hee;Han, Hyun-goo;Mun, Chang-min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.468-474
    • /
    • 2017
  • A test service for the weapon systems evaluation is one of the most important processes during the weapon systems acquisition or development life cycle. Before completion of weapon systems development, the appropriate evaluation test can reduce risk and expense which might be expected during weapon systems development procedure. In this paper, it is suggested that a probabilistic prediction method based on Monte Carlo simulation for how much the annual weapon systems evaluation test excution ratio can be reached compared to the yearly initial planned test quantity. And then a weapon systems evaluation test quantitative management scheme is suggested to assist decision making for the test schedule manager who can arrange monthly test schedule based on the prediction result of annual test excution ratio. And the proposed method is applied for the weapon systems evaluation firing test data of the 8th directorate, Agency for Defense Development(ADD). And also the application result is examined.

An Enhanced Reverse-link Traffic Control and its Performance Analysis in cdma2000 1xEV-DO Systems (cdma2000 1xEV-DO 시스템에서 개선된 역방향 트래픽 제어와 성능 분석)

  • Yeo, Woon-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9A
    • /
    • pp.891-899
    • /
    • 2008
  • The cdma2000 1xEV-DO system controls the data rates of mobile terminals based on a binary overload indicator from the base station and a simple probabilistic model. However, this traffic control scheme has difficulty in controlling the reverse-link traffic load effectively and in guaranteeing a stable operation of the reverse link because each mobile terminal determines the next data rate autonomously. This paper proposes a new trafRc control scheme to improve the system stability, and analyzes the proposed scheme by modeling it as a discrete-time Markov process. The numerical results show that the maximum data rate of the proposed scheme is much higher than that of the conventional one. Moreover, the proposed scheme does not modify the standard physical channel structure, so it is compatible to the existing 1xEV-DO system.

Fuzzy Logic based Next Hop Node Selection Method for Energy Efficient PVFS in WSN (무선 센서 네트워크에서 확률적 투표 기반 여과 기법의 에너지 효율성을 위한 퍼지 로직 시스템 기반의 다음 이웃 노드 선택 기법)

  • Lee, Jae Kwan;Nam, Su Man;Cho, Tae Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.2
    • /
    • pp.65-72
    • /
    • 2014
  • Sensor nodes are easily compromised by attacker when which are divided in open environment. The attacker may inject false report and false vote attack through compromised sensor node. These attacks interrupt to transmission legitimate report or the energy of sensor node is exhausted. PVFS are proposed by Li and Wu for countermeasure in two attacks. The scheme use inefficiency to energy of sensor node as fixed report threshold and verification node. In this paper, our propose the next neighbor node selection scheme based on fuzzy logic system for energy improvement of PVFS. The parameter of fuzzy logic system are energy, hops, verification success count, CH select high the next neighbor node among neighbor nodes of two as deduction based on fuzzy logic system. In the experimental, our proposed scheme was improvement to energy of about 9% compare to PVFS.

An Efficient FTN Decoding Method using Separation of LDPC Decoding Symbol in Next Generation Satellite Broadcasting System (차세대 위성 방송 시스템에서 LDPC 복호 신호 분리를 통한 효율적인 FTN 복호 방법)

  • Sung, Hahyun;Jung, Jiwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.63-70
    • /
    • 2016
  • To increase throughput efficiency and improve performance, FTN(Faster Than Nyquist) method and LDPC(Low Density Parity Code) codes are employed in DVB-S3 system. In this paper, we proposed efficient turbo equalization model to minimize inter symbol interference induced by FTN transmission. This paper introduces two conventional scheme employing SIC(Successive Interference Cancellation) and BCJR equalizer. Then, we proposed new scheme to resolve problems in this two conventional scheme. To make performance improved in turbo equalization model, the outputs of LDPC and BCJR equalizer are iteratively exchange probabilistic information. In fed LDPC outputs as extrinsic informa tion of BCJR equalizer. we split LDPC output to separate bit probabilities. We compare performance of proposed scheme to that of conventional methods through using simulation in AWGN(Additive White Gaussian Noise) channel. We confirmed that performance was improved compared to conventional methods as increasing throughput parameters of FTN.

A Security Hole in Comparable Encryption (비교가능 암호화의 허점)

  • Kim, Sangjin;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.267-271
    • /
    • 2013
  • Comparable encryption allows a verifier to test whether given two ciphertexts from a probabilistic public key cryptosystem are encryption of the same message without decrypting them. Recently, Yang et al. proposed such scheme and Lee et al. and Tang independently modified Yang et al.'s system to restrict the entity who can perform the verification. However, the original Yang et al.'s scheme has a flaw that enables two ciphertexts which are not encryption of the same message to pass the test. In this paper, we concretely show the faults in all three schemes considered and analyze the effect of this flaw in the use of such schemes in applications.

Secure Key Management Protocol in the Wireless Sensor Network

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.48-51
    • /
    • 2006
  • To achieve security in wireless sensor networks (WSN), it is important to be able to encrypt messages sent among sensor nodes. We propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on the probabilistic key. The protocol can increase the efficiency to manage keys since, before distributing the keys by bootstrap, the use of public keys shared among nodes can eliminate the processes to send or to receive keys among the sensors. Also, to find any compromised nodes safely on the network, it solves safety problems by applying the functions of a lightweight attack-detection mechanism.