• Title/Summary/Keyword: Common number network

Search Result 210, Processing Time 0.028 seconds

Short-Term Load Prediction Using Artificial Neural Network Models (인공신경망을 이용한 건물의 단기 부하 예측 모델)

  • Jeon, Byung Ki;Kim, Eui-Jong
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.29 no.10
    • /
    • pp.497-503
    • /
    • 2017
  • In recent years, studies on the prediction of building load using Artificial Neural Network (ANN) models have been actively conducted in the field of building energy In general, building loads predicted by ANN models show a sharp deviation unless large data sets are used for learning. On the other hands, some of the input data are hard to be acquired by common measuring devices. In this work, we estimate daily building loads with a limited number of input data and fewer pastdatasets (3 to 10 days). The proposed model with fewer input data gave satisfactory results as regards to the ASHRAE Guide Line showing 21% in CVRMSE and -3.23% in MBE. However, the level of accuracy cannot be enhanced since data used for learning are insufficient and the typical ANN models cannot account for thermal capacity effects of the building. An attempt proposed in this work is that learning procersses are sequenced frequrently and past data are accumulated for performance improvement. As a result, the model met the guidelines provided by ASHRAE, DOE, and IPMVP with by 17%, -1.4% in CVRMSE and MBE, respectively.

Dynamic File Migration And Mathematical model in Distributed Computer Systems (분산 시스템에서 동적 파일 이전과 수학적 모델)

  • Moon, Won Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.35-40
    • /
    • 2014
  • Many researches have been conducted to achieve improvement in distributed system that connects multiple computer systems via communication lines. Among others, the load balancing and file migration are considered to have significant impact on the performance of distributed system. The dynamic file migration algorithm common in distributed processing system involved complex calculations of decision function necessary for file migration and required migration of control messages for the performance of decision function. However, the performance of this decision function puts significant computational strain on computer. As one single network is shared by all computers, more computers connected to network means migration of more control messages from file migration, causing the network to trigger bottleneck in distributed processing system. Therefore, it has become imperative to carry out the research that aims to reduce the number of control messages that will be migrated. In this study, the learning automata was used for file migration which would requires only the file reference-related information to determine whether file migration has been made or determine the time and site of file migration, depending on the file conditions, thus reflecting the status of current system well and eliminating the message transfer and additional calculation overhead for file migration. Moreover, mathematical model for file migration was described in order to verify the proposed model. The results from mathematical model and simulation model suggest that the proposed model is well-suited to the distributed system.

Transmission Power Minimization with Network Coding for Mobile Terminals in Cellular Relay Networks

  • Du, Guanyao;Xiong, Ke;Li, Dandan;Qiu, Zhengding
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2098-2117
    • /
    • 2012
  • This paper jointly investigates the bandwidth allocation, transmission strategy and relay positions for two-way transmission aware cellular networks with network coding (NC). Our goal is to minimize the transmission power of mobile terminals (MTs). Consider a cellular system, where multiple MTs exchange information with their common base station, firstly, we propose an efficient bandwidth allocation method and then give a transmission strategy for each MT to determine whether to use relay stations (RSs) for its two-way transmission with the BS or not. To further improve the system performance, the optimal positions of RSs are also jointly discussed. A GA-based algorithm is presented to obtain the optimum positions for RSs. Besides, the impacts of frequency reuse on MT's transmission power and system spectral efficiency (SE) under different number of relays are also discussed in our work. Numerical results show that the proposed NC aware scheme can extend MTs' battery life at least 6% more than traditional method.

Social curation as an advertising tool - Message strategy of fashion brand images on vertical SNS - (소셜큐레이션과 광고 - 버티컬 SNS에서 표현된 패션브랜드 이미지의 메시지 전략 -)

  • Shin, In Jun;Lee, Kyu-Hye
    • The Research Journal of the Costume Culture
    • /
    • v.23 no.3
    • /
    • pp.498-511
    • /
    • 2015
  • This paper examines advertising images of fashion brands in vertical social network site (SNS) from the viewpoints of message strategies. Vertical social network sites are types of social curation systems applied to social networking, where information is selected, organized, and maintained. Fashion brands communicate with consumers by presenting images on vertical SNSs, anticipating improvements in brand image, popularity, and loyalty. Those images portray content for particular brands and seasonal concepts, thus creating paths for product sales information. Marketing via SNSs corresponds to relationship marketing, which refers to long-term interrelationship and value augmentation between the company and consumer, and viral advertising, which relies on word of mouth distribution via social network platforms. Taylor's six-segment message strategy wheel, often used for analyzing viral ads, was applied to conduct a content analysis of the images. A total of 2,656 images of fashion brands advertised on Instagram were selected and analyzed. Results indicated that brand values were somewhat related to the number of followers. Follower rankings and comment rankings were also correlated. In general, fashion brands projected sensory messages most often. Acute need and rational messages were less common than other messages. Sports brands and luxury brands presented sensory messages, whereas fast fashion brands projected routine images most often. Fashion brands promoted on vertical SNSs should portray advertising images that combine message strategies

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication

  • Abdelkader, Ghazli;Naima, Hadj Said;Adda, Ali Pacha
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.152-173
    • /
    • 2017
  • Mobile phones are the most common communication devices in history. For this reason, the number of mobile subscribers will increase dramatically in the future. Therefore, the determining the location of a mobile station will become more and more difficult. The mobile station must be authenticated to inform the network of its current location even when the user switches it on or when its location is changed. The most basic weakness in the GSM authentication protocol is the unilateral authentication process where the customer is verified by the system, yet the system is not confirmed by the customer. This creates numerous security issues, including powerlessness against man-in-the-middle attacks, vast bandwidth consumption between VLR and HLR, storage space overhead in VLR, and computation costs in VLR and HLR. In this paper, we propose a secure authentication mechanism based new mobility management method to improve the location management in the GSM network, which suffers from a lot off drawbacks, such as transmission cost and database overload. Numerical analysis is done for both conventional and modified versions and compared together. The numerical results show that our protocol scheme is more secure and that it reduces mobility management costs the most in the GSM network.

XAI Research Trends Using Social Network Analysis and Topic Modeling (소셜 네트워크 분석과 토픽 모델링을 활용한 설명 가능 인공지능 연구 동향 분석)

  • Gun-doo Moon;Kyoung-jae Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.1
    • /
    • pp.53-70
    • /
    • 2023
  • Artificial intelligence has become familiar with modern society, not the distant future. As artificial intelligence and machine learning developed more highly and became more complicated, it became difficult for people to grasp its structure and the basis for decision-making. It is because machine learning only shows results, not the whole processes. As artificial intelligence developed and became more common, people wanted the explanation which could provide them the trust on artificial intelligence. This study recognized the necessity and importance of explainable artificial intelligence, XAI, and examined the trends of XAI research by analyzing social networks and analyzing topics with IEEE published from 2004, when the concept of artificial intelligence was defined, to 2022. Through social network analysis, the overall pattern of nodes can be found in a large number of documents and the connection between keywords shows the meaning of the relationship structure, and topic modeling can identify more objective topics by extracting keywords from unstructured data and setting topics. Both analysis methods are suitable for trend analysis. As a result of the analysis, it was found that XAI's application is gradually expanding in various fields as well as machine learning and deep learning.

Eco-symbolic Landscape Characteristics in Community Gardens and Common Spaces of Eco-Villages in Europe (유럽 생태마을의 커뮤니티 정원과 공유공간의 경관적 특징)

  • Kim, Keun-Ho;Cho, Tong-Buhm;Kim, Mi-Hyang
    • Journal of the Korean housing association
    • /
    • v.17 no.5
    • /
    • pp.117-126
    • /
    • 2006
  • Although we have seen recently increasing number of eco-villages, any eco-village is not registered in Global Eco-village Network. It is important to review the definition of eco-villages and to provide useful basic information for future eco-villages. The main research aim is to analyze landscape characteristics of community garden and common spaces and to identify ecological symbolism of landscape created by residents in eco-villages. Seven eco-villages in Germany, Denmark and UK were selected and the following aspects were investigated through field survey; the settlement background, social and economical aspect, architectural specifications, recycled energy, and landscape characteristics of external spaces in eco-villages. The result indicated that the landscape of eco-village did intend neither to return to primitive society nor to control nature by technology. It intended to coexistence with nature. Primitive nature is symbolically restored and people who have it in mind strongly intend to grow together this common sense. Landscape creation has important role in creating common relationship between human living and nature. When we regard it conceptually as the eco-symbolism in landscape design of community garden, it presented the meaningful relationship with landscape and human life. It is not expression of landscape materiality and designed form but sense of place and landscape image. Landscape design would be expected to reveal the life stage and cycle from designed physical form and materiality through as time goes by when it is part of environmental circulation process by means of human living as meaningful relationship.

Analyzing the Network of Academic Disciplines with Journal Contributions of Korean Researchers (연구자의 투고 학술지 현황에 근거한 국내 학문분야 네트워크 분석)

  • Lee, Jae-Yun
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.4
    • /
    • pp.327-345
    • /
    • 2008
  • The main purposes of this study are to construct a Korean science network from journal contributions data of Korean researchers, and to analyze the structure and characteristics of the network. First of all, the association matrix of 140 scholarly domains are calculated based on the number of contributions in common journals, and then the Pathfinder network algorithm is applied to those matrix. The resulting network has several hubs such as 'Biology', 'Korean Language & Linguistics', 'Physics', etc. The entropy formula and several centrality measures for the weighted networks are adopted to identify the centralities and interdisciplinarity of each scholarly domain. In particular, the date hubs, which have several weak links, are successively distinguished by local and global triangle betweenness centrality measures.

A Handoff Improvement Method for AP Choose Guarantee Network Performance of Mobile Node in Wireless LAN Systems (무선랜 시스템에서 모바일 노드의 네트워크 성능을 보장하는 AP 선택을 위한 핸드오프 개선기법)

  • Kim, Dong-Geun;Kim, Sang-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.3
    • /
    • pp.55-63
    • /
    • 2010
  • On Handoff, existing AP search has chosen one of various APs according to signal strength. However IEEE 802.11 uses Medium Access method with CSMA/CA(Carrier Sensing Multiple Access /Collision Avoidance) that competes to obtain a channel by sharing common medium. For that reason, network performance is heavily affected by the number of nodes and network congestion aside from signal strength. Consequently, in this paper we propose the method that choose one AP which ensures more improved network performance and set up a link, reflecting AP network information in Handoff area, on Handoff in the process of AP selection. We also demonstrate through simulation that it gets maximum performance even in the wireless network which many users concurrently access to, and it has considerable effects on aspects of resources and network management by distribution of users.

Improvement in efficiency on ID-based Delegation Network (ID 기반 위임 네트워크의 성능 개선방안)

  • Youn, Taek-Young;Jeong, Sang-Tae;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.17-25
    • /
    • 2007
  • Delegation of signing capability is a common practice in various applications. Mambo et al. proposed a proxy signatures as a solutions for delegation of signing capability. Proxy signatures allow a designated proxy signer to sign on behalf of an original signer. After the concept of proxy signature scheme is proposed, many variants are proposed to support more general delegation setting. To capture all possible delegation structures, the concept of delegation network was proposed by Aura. ID-based cryptography, which is suited for flexible environment, is desirable to construct a delegation network. Chow et al proposed an ID-based delegation network. In the computational point of view, their solution requires E pairing operations and N elliptic curve scalar multiplications where E and N are the number of edges and nodes in a delegation structure, respectively. In this paper, we proposed an efficient ID-based delegation network which requires only E pairing operations. Moreover, we can design a modified delegation network that requires only N pairing operations.