• Title/Summary/Keyword: 설계규칙

Search Result 1,284, Processing Time 0.035 seconds

Design of the Call Admission Control System of the ATM Networks Using the Fuzzy Neural Networks (퍼지 신경망을 이용한 ATM망의 호 수락 제어 시스템의 설계)

  • Yoo, Jae-Taek;Kim, Choon-Seop;Kim, Yong-Woo;Kim, Young-Han;Lee, Kwang-Hyung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.8
    • /
    • pp.2070-2079
    • /
    • 1997
  • In this paper, we proposed the FNCAC (fuzzy neural call admission control) scheme of the ATM networks which used the benefits of fuzzy logic controller and the learning abilities of the neural network to solve the call admission control problems. The new call in ATM networks is connected if QoS(quality of service) of the current calls is not affected due to the connection of a new call. The neural network CAC(call admission control) system is predictable system because the neural network is able to learn by the input/output pattern. We applied the fuzzy inference on the learning rate and momentum constant for improving the learning speed of the fuzzy neural network. The excellence of the proposed algorithm was verified using measurement of learning numbers in the traditional neural network method and fuzzy neural network method by simulation. We found that the learning speed of the FNCAC based on the fuzzy learning rules is 5 times faster than that of the CAC method based on the traditional neural network theory.

  • PDF

A Design of Fuzzy Control System for Moving Object Tracking (이동물체 추적을 위한 퍼지제어 시스템 설계)

  • 강석범;김재기;양태규
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.4
    • /
    • pp.738-745
    • /
    • 2001
  • In this paper, when the moving object move to the three-dimentional space, the tracking system track the moving object using the fuzzy reasoning. The joint angle el of the manipulator rotate from $0^{\circ}\; to\; 360^{\circ}$ , and the joint angle $\theta_2$rotate from$0^{\circ}\; to\; 360^{\circ}$. The fuzzy singleton is used for fuzzification and the control rule is twenty five and the fuzzy inference method is simplified Mamdani's reasoning and the defuzzification is the SCOG(Simplified Center Of Gravity) of the fuzzy controller To measure of the performance of the designed system, the fuzzy controller is compared with the CTM(Computed Torque Method) controller at the same condition. when the disturbance torque is ON, the both of CTM and fuzzy controller tracked object without error, However, the disturbance torque changed 0.4N, the CTM controller is 10 times greater than fuzzy controller at the sum of absolute error difference. The designed system is showed it's robustness against with disturbance.

  • PDF

An Automatic code generation through UML Meta modelling and transformation of Model for electronic government framework (UML 메타모델링과 모델의 변환을 통한 전자정부 표준 프레임워크 기반의 코드 생성 자동화)

  • Lee, Seung-Han;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3407-3411
    • /
    • 2015
  • In the process of extending the UML model for a various domain, comply with the UML metamodel and it is possible to obtain a number of advantages. However, the UML metamodel is necessary to redefine the diagram must be defined via the Profile in order to expand and transformation the UML metamodel from a variety of sources using the UML metamodel is becoming increase massive scale. it is necessary to use only those extracts the element relative to the target to be used to extend a UML metamodel. Used to re-define the extension of the UML Metamodel and Profile based UML modeling tools and metadata repositories by analysis tools, can develop more quickly and easily, by utilizing these tools can improve the quality of development in the SW industry. In this paper, we present an algorithm that of the profile through the expansion of the UML metamodel and shows the results in actually applying e-government standards framework.

Ontology-based Monitoring Approach for Efficient Power Management in Datacenters (데이터센터 내 효율적인 전력관리를 위한 온톨로지 기반 모니터링 기법)

  • Lee, Jungmin;Lee, Jin;Kim, Jungsun
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.580-590
    • /
    • 2015
  • Recently, the issue of efficient power management in datacenters as a part of green computing has gained prominence. For realizing efficient power management, effective power monitoring and analysis must be conducted for servers in a datacenter. However, an administrator should know the exact structure of the datacenter and its associated databases, and is required to analyze relationships among the observed data. This is because according to previous monitoring approaches, servers are usually managed using only databases. In addition, it is not possible to monitor data that are not indicated in databases. To overcome these drawbacks, we proposed an ontology-based monitoring approach. We constructed domain ontology for management servers at a datacenter, and mapped observed data onto the constructed domain ontology by using semantic annotation. Moreover, we defined query creation rules and server state rules. To demonstrate the proposed approach, we designed an ontology based monitoring system architecture, and constructed a knowledge system. Subsequently, we implemented the pilot system to verify its effectiveness.

An Active Functionality Component to Support Timely Collaboration among Businesses in B2B EC Environment (B2B 전자 상거래 환경에서 기업 사이의 적기 협력 지원을 위한 능동 기능 컴포넌트)

  • Lee Dong Woo;Lee Seong Hoon;Hwang Chong Sun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.2
    • /
    • pp.165-179
    • /
    • 2005
  • Close collaboration among businesses is required in B2B EC environment. Furthermore, emergency requests or critical information among businesses should be processed in an immediate mode. Most current systems, however, due to firewalls for the systems' security and autonomy, can not handle these requirements appropriately, but handle them in an ad hoc manner In this paper a method of timely collaboration among businesses and an active functionality component to support it in B2B EC environment are proposed. Since the active functionality component supports high level ECA rule patterns and event-based immediate processing, system administrators and programmers can easily program and maintain the timely collaboration independently to the application logic. The proposed active functionality component uses HTTP protocol to be applied through firewalls and is designed using a commercial DBMS for practical purpose.

Traffic Control using Q-Learning Algorithm (Q 학습을 이용한 교통 제어 시스템)

  • Zheng, Zhang;Seung, Ji-Hoon;Kim, Tae-Yeong;Chong, Kil-To
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.11
    • /
    • pp.5135-5142
    • /
    • 2011
  • A flexible mechanism is proposed in this paper to improve the dynamic response performance of a traffic flow control system in an urban area. The roads, vehicles, and traffic control systems are all modeled as intelligent systems, wherein a wireless communication network is used as the medium of communication between the vehicles and the roads. The necessary sensor networks are installed in the roads and on the roadside upon which reinforcement learning is adopted as the core algorithm for this mechanism. A traffic policy can be planned online according to the updated situations on the roads, based on all the information from the vehicles and the roads. This improves the flexibility of traffic flow and offers a much more efficient use of the roads over a traditional traffic control system. The optimum intersection signals can be learned automatically online. An intersection control system is studied as an example of the mechanism using Q-learning based algorithm, and simulation results showed that the proposed mechanism can improve the traffic efficiency and the waiting time at the signal light by more than 30% in various conditions compare to the traditional signaling system.

SNP: A New On-Chip Communication Protocol for SoC (SNP : 시스템 온 칩을 위한 새로운 통신 프로토콜)

  • Lee Jaesung;Lee Hyuk-Jae;Lee Chanho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.9
    • /
    • pp.465-474
    • /
    • 2005
  • For high density SoC design, on-chip communication based on bus interconnection encounters bandwidth limitation while an NoC(Network-on-Chip) approach suffers from unacceptable complexity in its Implementation. This paper introduces a new on-chip communication protocol, SNP (SoC Network Protocol) to overcome these problems. In SNP, conventional on-chip bus signals are categorized into three groups, control, address, and data and only one set of wires is used to transmit all three groups of signals, resulting in the dramatic decrease of the number of wires. SNP efficiently supports master-master communication as well as master-slave communication with symmetric channels. A sequencing rule of signal groups is defined as a part of SNP specification and a phase-restoration feature is proposed to avoid redundant signals transmitted repeatedly over back-to-back transactions. Simulation results show that SNP provides about the same bandwidth with only $54\%$ of wires when compared with AMBA AHB.

Policy Definition Language for Service Management in Mobile Environment (모바일 서비스관리를 위한 정책정의언어)

  • Ahn, Sung-Wook;Rhew, Yul-Sung
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.561-570
    • /
    • 2009
  • In order to manage repair and maintenance efficiently in the mobile environment, the system structure to manage service as a policy and the policy description language are needed. This research defined the structure of PEP, which is the executioner of policy in the IETF policy framework, and proposed the policy description language which can be carried out under the PEP structure. The proposed policy description language derived demand matters based on documentary data and the characteristics of mobile and the policy information model was designed with the three stage approaches and was defined as policy description language. The three stage approaches are made up of the policy domain that decides the scope to which the policy applies, the policy rules which distinguish the kinds of policy application and control, and policy grammar which contextualizes the policy structure. In order to verify the efficiency of the policy description language, scenarios are defined with the policy description language and verified it by using policy tool and proved the expansive nature by comparing and analyzing other policy description language.

The Unsupervised Learning-based Language Modeling of Word Comprehension in Korean

  • Kim, Euhee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.41-49
    • /
    • 2019
  • We are to build an unsupervised machine learning-based language model which can estimate the amount of information that are in need to process words consisting of subword-level morphemes and syllables. We are then to investigate whether the reading times of words reflecting their morphemic and syllabic structures are predicted by an information-theoretic measure such as surprisal. Specifically, the proposed Morfessor-based unsupervised machine learning model is first to be trained on the large dataset of sentences on Sejong Corpus and is then to be applied to estimate the information-theoretic measure on each word in the test data of Korean words. The reading times of the words in the test data are to be recruited from Korean Lexicon Project (KLP) Database. A comparison between the information-theoretic measures of the words in point and the corresponding reading times by using a linear mixed effect model reveals a reliable correlation between surprisal and reading time. We conclude that surprisal is positively related to the processing effort (i.e. reading time), confirming the surprisal hypothesis.

Adaptive Anomaly Movement Detection Approach Based On Access Log Analysis (접근 기록 분석 기반 적응형 이상 이동 탐지 방법론)

  • Kim, Nam-eui;Shin, Dong-cheon
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.45-51
    • /
    • 2018
  • As data utilization and importance becomes important, data-related accidents and damages are gradually increasing. Especially, insider threats are the most harmful threats. And these insider threats are difficult to detect by traditional security systems, so rule-based abnormal behavior detection method has been widely used. However, it has a lack of adapting flexibly to changes in new attacks and new environments. Therefore, in this paper, we propose an adaptive anomaly movement detection framework based on a statistical Markov model to detect insider threats in advance. This is designed to minimize false positive rate and false negative rate by adopting environment factors that directly influence the behavior, and learning data based on statistical Markov model. In the experimentation, the framework shows good performance with a high F2-score of 0.92 and suspicious behavior detection, which seen as a normal behavior usually. It is also extendable to detect various types of suspicious activities by applying multiple modeling algorithms based on statistical learning and environment factors.

  • PDF