Search : [ author: 김종권 ] (12)

Deep Reinforcement Learning based MCS Decision Model

A-Hyun Lee, Hyeongho Bae, Young-Ky Kim, Chong-kwon Kim

http://doi.org/10.5626/JOK.2022.49.8.663

In wireless mobile communication systems, link adaptation techniques are used to increase channel throughput and frequency efficiency to adaptively adjust transmission parameters according to the changes in the channel state. Adaptive modulation and coding is a link adaptation technique that determines predefined modulation and coding scheme depending on the channel condition and performed based on the reported CQI from UE and HARQ feedback on packet transmission. In this paper, we propose an MCS decision model that applies deep reinforcement learning to adaptive modulation and coding. The proposed model adaptively determines the MCS level in a dynamically changing network, thereby increasing the transmission efficiency of UEs. We evaluated our proposed model through UE log-based simulations and demonstrated that our model performs much better than the existing outer loop rate control method.

Study and Application of RSSI-based Wi-Fi Channel Detection Using CNN and Frequency Band Characteristics

Junhyun Park, Hyungho Byun, Chong-Kwon Kim

http://doi.org/10.5626/JOK.2020.47.3.335

For mobile devices, Wi-Fi channel scanning is essential to initiating an internet connection, which enables access to a variety of services, and maintaining a stable link quality by periodic monitoring. However, inefficient Wi-Fi operation, where all channels are scanned regardless of whether or not an access point (AP) exists, wastes resources and leads to performance degradation. In this paper, we present a fast and accurate Wi-Fi channel detection method that learns the dynamic frequency band characteristics of signal strengths collected via a low power antenna using a convolution neural network (CNN). Experiments were conducted to demonstrate the channel detection accuracy for different AP combination scenarios. Furthermore, we analyzed the expected performance gain if the suggested method were to assist the scanning operation of the legacy Wi-Fi.

Opinion Classification in Professional Sports Fan Sites using Topic Keyword-Based Sentiment Analysis

Hyungho Byun, Sihyun Jeong, Chong-kwon Kim

http://doi.org/10.5626/JOK.2018.45.4.390

In this study, we propose the classification method using topic keyword-based sentiment analysis through the posts of professional sports fan sites in Korea. We studied ways to take into account the use of special communication methods or vocabulary in the community and defined keywords based on the characteristics of the topic or frequency of the community"s words. In addition, we presented a new sentiment analysis approach that utilizes the use of keyword pools and the proximity relation to keywords. Through three years of actual community dataset, sentiment analysis based on the topic keyword is more effective than the existing method and reflects the community environment.

Social Network Spam Detection using Recursive Structure Features

Boyeon Jang, Sihyun Jeong, Chongkwon Kim

http://doi.org/10.5626/JOK.2017.44.11.1231

Given the network structure in online social network, it is important to determine a way to distinguish spam accounts from the network features. In online social network, the service provider attempts to detect social spamming to maintain their service quality. However the spammer group changes their strategies to avoid being detected. Even though the spammer attempts to act as legitimate users, certain distinguishable structural features are not easily changed. In this paper, we investigate a way to generate meaningful network structure features, and suggest spammer detection method using recursive structural features. From a result of real-world dataset experiment, we found that the proposed algorithm could improve the classification performance by about 8%.

Impact of Diverse Document-evaluation Measure-based Searching Methods in Big Data Search Accuracy

Ji young Kim, DaHyeon Han, Jongkwon Kim

http://doi.org/

With the rapid growth of Big Data, research on extracting meaningful information is being pursued by both academia and industry. Especially, data characteristics derived from analysis, and researcher intention are key factors for search algorithms to obtain accurate output. Therefore, reflecting both data characteristics and researcher intention properly is the final goal of data analysis research. The data analyzed properly can help users to increase loyalty to the service provided by company, and to utilize information more effectively and efficiently. In this paper, we explore various methods of document-evaluation, so that we can improve the accuracy of searching article one of the most frequently searches used in real life. We also analyze the experiment result, and suggest the proper manners to use various methods.

Rank Correlation Coefficient of Energy Data for Identification of Abnormal Sensors in Buildings

Naeon Kim, Sihyun Jeong, Boyeon Jang, Chong-Kwon Kim

http://doi.org/

Anomaly detection is the identification of data that do not conform to a normal pattern or behavior model in a dataset. It can be utilized for detecting errors among data generated by devices or user behavior change in a social network data set. In this study, we proposed a new approach using rank correlation coefficient to efficiently detect abnormal data in devices of a building. With the increased push for energy conservation, many energy efficiency solutions have been proposed over the years. HVAC (Heating, Ventilating and Air Conditioning) system monitors and manages thousands of sensors such as thermostats, air conditioners, and lighting in large buildings. Currently, operators use the building’s HVAC system for controlling efficient energy consumption. By using the proposed approach, it is possible to observe changes of ranking relationship between the devices in HVAC system and identify abnormal behavior in social network.

Performance Evaluation of Review Spam Detection for a Domestic Shopping Site Application

Jihyun Park, Chong-kwon Kim

http://doi.org/

As the number of customers who write fake reviews is increasing, online shopping sites have difficulty in providing reliable reviews. Fake reviews are called review spam, and they are written to promote or defame the product. They directly affect sales volume of the product; therefore, it is important to detect review spam. Review spam detection methods suggested in prior researches were only based on an international site even though review spam is a widespread problem in domestic shopping sites. In this paper, we have presented new review features of the domestic shopping site NAVER, and we have applied the formerly introduced method to this site for performing an evaluation.

Message Delivery Techniques using Group Intimacy Information among Nodes in Opportunistic Networks

Seohyang Kim, Hayoung Oh, Chongkwon Kim

http://doi.org/

In opportunistic networks, each message is delivered to the destination by repeating, storing, carrying, and forwarding the message. Recently, with the vitalization of social networks, a large number of existing articles have shown performance improvement when delivering the message and considering its social relational networks. However, these works only deliver messages when they find nodes, assuming that every node cooperates with each other unconditionally. Moreover, they only consider the number of short-term contacts and local social relations, but have not considered each node’s average relation with the destination node. In this paper, we propose novel message sending techniques for opportunistic networks using nodes’ social network characteristics. In this scheme, each message is delivered to the destination node with fewer copies by delivering it mostly through nodes that have high intimacy with the destination node. We are showing that our proposed scheme presents a 20% performance increase compared to existing schemes.

A Re-configuration Scheme for Social Network Based Large-scale SMS Spam

Sihyun Jeong, Giseop Noh, Hayoung Oh, Chong-Kwon Kim

http://doi.org/

The Short Message Service (SMS) is one of the most popular communication tools in the world. As the cost of SMS decreases, SMS spam has been growing largely. Even though there are many existing studies on SMS spam detection, researchers commonly have limitation collecting users" private SMS contents. They need to gather the information related to social network as well as personal SMS due to the intelligent spammers being aware of the social networks. Therefore, this paper proposes the Social network Building Scheme for SMS spam detection (SBSS) algorithm that builds synthetic social network dataset realistically, without the collection of private information. Also, we analyze and categorize the attack types of SMS spam to build more complete and realistic social network dataset including SMS spam.

Similarity Analysis and API Mapping with HLA and DDS for L-V-C Realization

Kunryun Cho, Giseop No, Chongkwon Kim

http://doi.org/

The rapid growth of network technology makes the high-tech weapon. Thus, in the modern war, the ability to immediately use of the high-tech weapon is important. To realize this ability, continuous trainning is necessary but, this trainning spends many money. To improve the budget efficiency, Modeling and Simulation(M&S) are used. However, they seriously decrease the reality. Recently, the system which can support the combination of Live with Virtual simulation is on the rise. The typical example is L-V-C Environment and many kind of middleware which can support the L-V-C Envrionment are already proposed. Previous middleware can support the interoperability between different simulations but, it cannot completely interoperate three(Live, Virtual, Constructive) simulation environments. In this paper, to solve this problem, we propose the scheme which is combination between different middlewares. And we conduct the API mapping between HLA and DDS which are typical middleware and verify the scheme.


Search




Journal of KIISE

  • ISSN : 2383-630X(Print)
  • ISSN : 2383-6296(Electronic)
  • KCI Accredited Journal

Editorial Office

  • Tel. +82-2-588-9240
  • Fax. +82-2-521-1352
  • E-mail. chwoo@kiise.or.kr