• Title/Summary/Keyword: 설계 진화

Search Result 640, Processing Time 0.034 seconds

Design and Implementation of a Visualization Tool for a Simulator of a Bio-Intrusion Detection System (Bio-IDS 시뮬레이터를 위한 Visualization Tool 의 설계 및 구현)

  • Moon, Joo-Sun;Bae, Jang-Ho;Nang, Jong-Ho
    • Annual Conference of KIPS
    • /
    • 2007.11a
    • /
    • pp.149-152
    • /
    • 2007
  • 본 논문에서는 대규모 네트워크 상에서 발생되는 시뮬레이션 결과를 효과적으로 보여주기 위한 Visualization Tool 을 제안한다. 복잡하고 다양한 시뮬레이션 결과를 얻기 위해, 생태계 모방형 플랫폼을 이용한 Bio-IDS (Intrusion Detection System) 시뮬레이터의 실험 데이터를 이용하였다. 대규모 네트워크를 모두 보이기에는 화면이 너무 작기 때문에, Visualization Tool 은 화면의 확대 및 축소를 위한 Zoom In/Out 기능, 화면의 Panning 을 위한 Scroll Bar 및 현재 영역의 위치를 알려주는 Mini Map 이 필요하였다. 또한, 사용자가 쉽게 시뮬레이션의 속도를 조절할 수 있도록 Simulation Speed Control 기능을 구현하였으며, 각 노드의 효과적인 정상 및 침입 상태 표시를 위한 Icon, 각 노드의 진화 정도와 침입 탐지 정확도를 알려주는 Evolution Number와 Accuracy Gauge, 해당 시뮬레이션의 결과를 도시하기 위한 Simulation Graph 도 추가하였다. 네트워크 Off-line 환경도 대비하여, DB 로부터의 데이터 입력뿐만 아니라 Log File 을 통한 데이터 입력도 가능하게 하였다. 끝으로, 전체 Node 들의 다양한 상태변화를 확인할 수 있는 Topology Window 와 Simulation Demo Window 간의 Synchronization 을 위한 Socket 통신 등 다양한 기능들이 통합된 Visualization Tool 을 개발함으로써, 대규모 네트워크 시뮬레이션의 효과적인 시뮬레이션이 가능하게 되었다. 이로 인해 대규모 네트워크 상의 복잡한 시뮬레이션 결과도 사용자가 매우 쉽게 파악할 수 있 매우 효과적으로 사용자가 파악할 수 있게 되었다.

A Priority Analysis on E-Commerce Security Factors - Focused on Researchers and Practitioners (전자상거래를 위한 보안 항목 우선순위 분석: 연구자그룹과 실무자그룹을 중심으로)

  • Kim, Hyun-Woo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.5
    • /
    • pp.163-171
    • /
    • 2011
  • In e-commerce environment, security should be considered as an essential factor for success. In this paper, we analyze security requirements for e-commerce system, and it is focused on the practical usage, not theoretical contribution, in the field of e-commerce security. To identify the security requirements being specific to e-commerce environment, the researches related to e-commerce security are surveyed and a phase of Delphi method and Analytic Hierarchy Process(AHP) are used to determine the relative importance of e-commerce security factors. Since researchers and practitioners can have significantly different views because of each different work environment, we divide the professionals into two respondents' group. This survey result can be useful security guidelines in the development of e-commerce service system from the initial system development step to the completion.

XML-based Portable Self-containing Representation of Strongly-typed Genetic Program (XML 기반 강건 타입형 유전자 프로그램의 이식${\cdot}$독립적 표현)

  • Lee Seung-Ik;Tanev Ivan;Shimohara Katsunori
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.4
    • /
    • pp.277-289
    • /
    • 2005
  • To overcome the long design time/high computational effort/low computational performance of phylogenetic learning featuring selection and reproduction, this paper proposes a genetic representation based on XML. Since genetic programs (GP) and genetic operations of this representation are maintained by the invocation of the built-in off-the-shelf XML parser's API, the proposed approach features significant reduced time consumption of GP design process. Handling only semantically correct GPs with standard XML schema can reduce search space and computational effort. Furthermore, computational performance can be improved by the parallelism of GP caused by the utilization of XML, which is a feasible system and wire format for migration of genetic programs in heterogeneous distributed computer environments. To verify the proposed approach, it is applied to the evolution of social behaviors of multiple agents modeling the predator-prey pursuit problem. The results show that the approach can be applied for fast development and time efficiency of GPs.

Management, Orchestration and Security in Network Function Virtualization (네트워크 기능 가상화 관리 및 오케스트레이션 기능과 보안)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.16 no.2
    • /
    • pp.19-23
    • /
    • 2016
  • The design, management, and operation of network infrastructure have evolved during the last few years, leveraging on innovative technologies and architectures. With such a huge trend, due to the flexibility and significant economic potential of these technologies, software defined networking (SDN) and network functions virtualization (NFV) are emerging as the most critical key enablers. SDN/NFV enhancing the infrastructure agility, thus network operators and service providers are able to program their own network functions (e.g., gateways, routers, load balancers) on vendor independent hardware substrate. They facilitating the design, delivery and operation of network services in a dynamic and scalable manner. In NFV, the management and orchestration (MANO) orchestrates other specific managers such as the virtual infrastructure manager (VIM) and the VNF Manager (VNFM). In this paper, we examine the contents of these NFV MANO systematically and proposes a security system in a virtualized environment.

Material Optimization of BIW for Minimizing Weight (경량화를 위한 BIW 소재 최적설계)

  • Jin, Sungwan;Park, Dohyun;Lee, Gabseong;Kim, Chang Won;Yang, Heui Won;Kim, Dae Seung;Choi, Dong-Hoon
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.21 no.4
    • /
    • pp.16-22
    • /
    • 2013
  • In this study, we propose the method of optimally changing material of BIW for minimizing weight while satisfying vehicle requirements on static stiffness. First, we formulate a material selection optimization problem. Next, we establish the CAE procedure of evaluating static stiffness. Then, to enhance the efficiency of design work, we integrate and automate the established CAE procedure using a commercial process integration and design optimization (PIDO) tool, PIAnO. For effective optimization, we adopt the approach of metamodel based approximate optimization. As a sampling method, an orthogonal array (OA) is used for selecting sampling points. The response values are evaluated at the sampling points and then these response values are used to generate a metamodel of each response using the linear polynomial regression (PR) model. Using the linear PR model, optimization is carried out an evolutionary algorithm (EA) that can handle discrete design variables. Material optimization result reveals that the weight is reduced by 44.8% while satisfying all the design constraints.

A Multimedia Replicated Architecture for Transportation Safety Service (운송 안전 서비스를 위한 멀티미디어 복제 형 구조)

  • Ko, Eung-Nam
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.2
    • /
    • pp.226-231
    • /
    • 2014
  • Because of development of information communication and multimedia technology, the focus of M2M(Machine to Machine) intelligent network, multimedia collaboration environment, and transportation safety service is increased. This paper describes a multimedia replicated architecture based on Shepherd environment for transportation safety service. The relationship of information collection and utility is relationship of man to man, but is developed object to object by information communication and control system. This paper suggests a design of multimedia cyber collaboration environment based on M2M. This structure can make multimedia collaboration environment and fault tolerance, so on easily. Because M2M system does not affected to all system in spite of occurring to fault to a node or resource, it has a good condition for design of transportation safety service running on M2M.

Topology Optimization of Offshore Wind-Power Turbine Substructure Using 3D Solid-Element Model (3 차원 고체요소모델을 활용한 해상풍력터빈 하부구조의 위상최적화)

  • Kim, Won Cheol;Chung, Tae Jin
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.3
    • /
    • pp.309-314
    • /
    • 2014
  • The structural layout of mechanical and civil structures is commonly obtained using conventional methods. For example, the shape of structures such as electric transmission towers and offshore substructures can be generated systematically. However, with rapid advancements in computer graphic technology, advanced structural analyses and optimum design technologies have been implemented. In this study, the structural shape of a jacket substructure for an offshore wind turbine is investigated using a topology optimization technique. The structure is subjected to multiple loads that are intended to simulate the loading conditions during actual operation. The optimization objective function is defined as one that ensures compliance of the structure under the given boundary conditions. Optimization is carried out with constraints on the natural frequency in addition to the volume constraint. The result of a first step model provides quick insights into the optimum layout for the second step structure. Subsequently, a 3D model in the form of the frustum of a quadrilateral pyramid is developed through topology optimization.

Design and Implementation of NNI Call Procedure for OBP Satellite B-ISDN (OBP 탑재 위성 B-ISDN 중계망 호 처리 절차의 설계 및 구현)

  • Lee, Jun-Ho;Kim, Seong-Ju;Park, Seok-Cheon;Kim, Nae-Su;Kim, Tae-Hui
    • The KIPS Transactions:PartC
    • /
    • v.8C no.4
    • /
    • pp.421-428
    • /
    • 2001
  • 위성통신 시스템은 기존의 지상망이나 광 케이블 기술에 비해 통신 대역폭의 유연성과 다중 접속 능력, 이동 통신, 광역성, 멀티포인트 및 브로드캐스팅 등의 고유의 특징으로 인해 초 고속 정보 통신망 구축에 중요한 역할을 할 것이다. 또한 위성통신은 앞으로 도래할 브로드 캐스팅 및 멀티미디어 서비스 등의 통신환경을 지원하며, 지상중계망의 장애 및 트래픽 폭 주시에 대체경로를 제공함으로써 지상망 중심으로 진화·발전되어 온 B-ISDN망과 상호 보 완적인 보완망으로서의 역할을 수행할 것이다. 따라서 지상 B-ISDN과 위성망의 통합은 지 상망의 효율성고 안정성을 향상시킬 수 있을 뿐만 아니라 국가의 모든 통신망을 하나의 정 보 통신망으로 구성하여 국가의 정보를 효율적으로 이용, 관리 및 운용할 수 있기 때문에 위성망과 B-ISDN간의 연동에 대한 연구는 필수적이다. 본 논문에서는 OBP(On-Board Processing) 탑재 위성 B-ISDN 중계망의 호 처리 절차 연구를 수행하는 것으로서, 위성 B-ISDN 구조와 각 지구국별 신호 기능 및 B-ISDN 신호 시스템인 DSS2(Digital Subscriber Signalling No.2) 계층 3 신호 프로토콜, B-ISUP(B-ISDN User Part) 프로토콜, S-BISUP(Satellite BISUP) 프로토콜의 구조를 분석하였다. 또한 점-대-다지점 연결을 위한 B-ISDN의 연결과 소유권 및 각각의 프로토콜에 대한 메시지와 프리미티브를 정의하여, 이 를 토대로 OBP 탑재 위성 B-ISDN 중계망 연동을 위한 기본 호 처리 절차를 설계 및 검증 하고, 이를 구현하였다.

  • PDF

Design of Optimized pRBFNNs-based Night Vision Face Recognition System Using PCA Algorithm (PCA알고리즘을 이용한 최적 pRBFNNs 기반 나이트비전 얼굴인식 시스템 설계)

  • Oh, Sung-Kwun;Jang, Byoung-Hee
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.225-231
    • /
    • 2013
  • In this study, we propose the design of optimized pRBFNNs-based night vision face recognition system using PCA algorithm. It is difficalt to obtain images using CCD camera due to low brightness under surround condition without lighting. The quality of the images distorted by low illuminance is improved by using night vision camera and histogram equalization. Ada-Boost algorithm also is used for the detection of face image between face and non-face image area. The dimension of the obtained image data is reduced to low dimension using PCA method. Also we introduce the pRBFNNs as recognition module. The proposed pRBFNNs consists of three functional modules such as the condition part, the conclusion part, and the inference part. In the condition part of fuzzy rules, input space is partitioned by using Fuzzy C-Means clustering. In the conclusion part of rules, the connection weights of pRBFNNs is represented as three kinds of polynomials such as linear, quadratic, and modified quadratic. The essential design parameters of the networks are optimized by means of Differential Evolution.

An Exploratory Study on the Uniqueness of Crowds and its Implications for Public Data Platform Design from the Information Processing View (정보처리관점에서 본 대중의 특성과 공공데이터 플랫폼 설계 시사점에 관한 탐색 연구)

  • Kim, Sang Wook;Lee, Jae Sook
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.373-381
    • /
    • 2017
  • As the viewpoint of data evolves from business resources to value resources, the focus on the data processing is rapidly shifting from the cartesian (alphanumeric) to the contextual. In response to this trend, the government is actively promoting the utilization of public data by the private sectors. With a focus on the fact that the mainstream of public data users is the crowds, this study, therefore, seeks to identify differences between the members and the crowds from information processing view, followed by presenting directions and main points for the design of data platform. This study is perhaps to be a starting point for finding practical alternatives for creating 'collective intelligence ecosystem' and to be a basis for building a big data base in response to the opening of public data.