• 제목/요약/키워드: Complex networks

검색결과 941건 처리시간 0.023초

고등학교 과학 및 생물교과서 과학용어 네트워크 분석 (Analysis of Scientific Item Networks from Science and Biology Textbooks)

  • 박별나;이윤경;구자을;홍영수;김학용
    • 한국콘텐츠학회논문지
    • /
    • 제10권5호
    • /
    • pp.427-435
    • /
    • 2010
  • 교과서에 쓰인 과학 용어 네트워크를 구축하여, 네트워크의 구조, 관련 정보 및 연관 관계를 분석하기 위하여 핵심용어를 도출하였다. 본 연구에서는 과학, 생물1 및 생물2 교과서 각 과목별로 출판사 세 곳을 선정하고 각각의 교과서에서 추출한 용어들을 노드로, 한 문장 안에 있는 과학 용어를 링크로 연결하여 네트워크를 구축하였다. 모든 교과서의 과학 용어 네트워크는 척도 없는(scale-free) 네트워크의 특성을 보여주었다. 복잡한 (complex) 네트워크에서 가중치가 낮은 것부터 제거하는 방법인 k-core 알고리즘을 적용하여 핵심 (core) 네트워크를 구축하였는데, 몇 개의 모듈이 연결되는 형태를 보여주었다. 과학교과서의 경우에는 물리, 화학, 생물, 지구과학 분야별로 크게 네 개의 모듈을 형성하였고, 생물1과 생물2 교과서는 각단원별로 용어들이 모여 있는 특성을 지닌 네트워크를 나타냈다. 본 연구에서 복잡한 네트워크에서 핵심네트워크를 구축하여 유용한 정보를 도출할 수 있는 가능성을 제시하였다.

Big Data Meets Telcos: A Proactive Caching Perspective

  • Bastug, Ejder;Bennis, Mehdi;Zeydan, Engin;Kader, Manhal Abdel;Karatepe, Ilyas Alper;Er, Ahmet Salih;Debbah, Merouane
    • Journal of Communications and Networks
    • /
    • 제17권6호
    • /
    • pp.549-557
    • /
    • 2015
  • Mobile cellular networks are becoming increasingly complex to manage while classical deployment/optimization techniques and current solutions (i.e., cell densification, acquiring more spectrum, etc.) are cost-ineffective and thus seen as stopgaps. This calls for development of novel approaches that leverage recent advances in storage/memory, context-awareness, edge/cloud computing, and falls into framework of big data. However, the big data by itself is yet another complex phenomena to handle and comes with its notorious 4V: Velocity, voracity, volume, and variety. In this work, we address these issues in optimization of 5G wireless networks via the notion of proactive caching at the base stations. In particular, we investigate the gains of proactive caching in terms of backhaul offloadings and request satisfactions, while tackling the large-amount of available data for content popularity estimation. In order to estimate the content popularity, we first collect users' mobile traffic data from a Turkish telecom operator from several base stations in hours of time interval. Then, an analysis is carried out locally on a big data platformand the gains of proactive caching at the base stations are investigated via numerical simulations. It turns out that several gains are possible depending on the level of available information and storage size. For instance, with 10% of content ratings and 15.4Gbyte of storage size (87%of total catalog size), proactive caching achieves 100% of request satisfaction and offloads 98% of the backhaul when considering 16 base stations.

Optimization of Incinerator Controllers using Artificial Neural Networks

  • Mackin, Kenneth J.;Fukushima, Ryutaro;Fujiyoshi, Makoto
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2003년도 ISIS 2003
    • /
    • pp.334-337
    • /
    • 2003
  • The emission of dioxins from waste incinerators is one of the most important environmental problems today, It is known that optimization of waste incinerator controllers is a very difficult problem due to the complex nature of the dynamic environment within the incinerator. In this paper, we propose applying artificial neural networks to waste incinerator controllers. We show that artificial neural networks can project the emission of dioxins with a fair degree of accuracy.

  • PDF

완전궤환 신경망을 이용한 무제약 서체 숫자 인식 (Recognition of Unconstrained Handwritten Numerals using Fully-connected RNN)

  • 원상철;배수정;최한고
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1999년도 추계종합학술대회 논문집
    • /
    • pp.1007-1010
    • /
    • 1999
  • This paper describes the recognition of totally unconstrained handwritten numerals using neural networks. Neural networks with multiple output nodes have been successfully used to classify complex handwritten numerals. The recognition system consists of the preprocessing stage to extract features using Kirsch mask and the classification stage to recognize the numerals using the fully-connected recurrent neural networks (RNN). Simulation results with the numeral database of Concordia university, Montreal, Canada, are presented. The recognition system proposed in this paper outperforms other recognition systems reported on the same database.

  • PDF

지역통신망 실시간 성능관리에 관한 연구 (A study on the near real-time performance management in telecommunication networks)

  • 김영명;유재형;송중구;조영현
    • 한국통신학회:학술대회논문집
    • /
    • 한국통신학회 1991년도 추계종합학술발표회논문집
    • /
    • pp.150-154
    • /
    • 1991
  • As subsriber's requirements for high quality of telecom service are increased, a telecommunication network becomes complex and huge, and its management becomes an essential and an important factor in the evolution of telecommunication networks. In this paper, we focus on the network performance management and discuss the strategy of near real-time performance evaluation and control in Korea Telecome (KT) networks.

Multilayer Embedding Networks Using Immittance Converters, and Its Applications, ITC-CSCC'2000

  • Seiki, Yasukazu;Suzuki, Shoji;Ueno, Fumio;Adachi, Yoshinori
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 ITC-CSCC -2
    • /
    • pp.575-578
    • /
    • 2000
  • The method for immittance conversion and its mathematical properties are discussed. Some design methods for complex multilayer embeddeding networks are proposed. Furthermore, as an application of multilayer embedding networks, the equivalent circuit model of a blood vessel is shown with its simulation results.

  • PDF

Design and Implementation of HomeTDMA: a TDMA Protocol for Home Networks

  • Casaquite, Reizel;Hwang, Won-Joo
    • 한국멀티미디어학회논문지
    • /
    • 제10권12호
    • /
    • pp.1612-1621
    • /
    • 2007
  • In this paper, we introduced our designed TDMA (Time Division Multiple Access) based MAC (Medium Access Control) protocol for Home Networks called HomeTDMA. We have implemented and tested it in a test bed using crossbow motes and TinyOS. We also have compared HomeTDMA and CSMA (Carrier Sense Multiple Access) in terms of space and time complexity, channel access time, delivery success ratio, and throughput. Based on our results, HomeTDMA has an advantage over CSMA on channel access time, throughput and delivery success ratioIn the case of complexity, HomeTDMA is more complex compared to CSMA. Thus, CSMA is more appropriate in wireless sensor networks (WSNs) where memory, energy, and throughput are important parameters to be considered. However, HomeTDMA has a natural advantage of collision free medium access and is very promising for home networks where a reliable transmission or data transfer and congestion control is highly preferred.

  • PDF

퍼지 결합 다항식 뉴럴 네트워크 (Fuzzy Combined Polynomial Neural Networks)

  • 노석범;오성권;안태천
    • 전기학회논문지
    • /
    • 제56권7호
    • /
    • pp.1315-1320
    • /
    • 2007
  • In this paper, we introduce a new fuzzy model called fuzzy combined polynomial neural networks, which are based on the representative fuzzy model named polynomial fuzzy model. In the design procedure of the proposed fuzzy model, the coefficients on consequent parts are estimated by using not general least square estimation algorithm that is a sort of global learning algorithm but weighted least square estimation algorithm, a sort of local learning algorithm. We are able to adopt various type of structures as the consequent part of fuzzy model when using a local learning algorithm. Among various structures, we select Polynomial Neural Networks which have nonlinear characteristic and the final result of which is a complex mathematical polynomial. The approximation ability of the proposed model can be improved using Polynomial Neural Networks as the consequent part.

A SURVEY ON INTRUSION DETECTION SYSTEMS IN COMPUTER NETWORKS

  • Zarringhalami, Zohreh;Rafsanjani, Marjan Kuchaki
    • Journal of applied mathematics & informatics
    • /
    • 제30권5_6호
    • /
    • pp.847-864
    • /
    • 2012
  • In recent years, using computer networks (wired and wireless networks) has been widespread in many applications. As computer networks become increasingly complex, the accompanied potential threats also grow to be more sophisticated and as such security has become one of the major concerns in them. Prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an attacker can breach the system. Intrusion Detection Systems (IDSs) have become a key component in ensuring systems and networks security. An IDS monitors network activities in order to detect malicious actions performed by intruders and then initiate the appropriate countermeasures. In this paper, we present a survey and taxonomy of intrusion detection systems and then evaluate and compare them.