• Title/Summary/Keyword: Computer Network Engineering

Search Result 6,605, Processing Time 0.038 seconds

An Embedded Network-Engine for Video On Demand Service (VOD(Video On Demand) 서비스를 위한 임베디드 네트워크 엔진)

  • Md, Amiruzzaman;Son, Sung-Ok;No, Jae-Chun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06a
    • /
    • pp.145-148
    • /
    • 2007
  • Although the embedded network-engine is a demand of time, it is observed that up to this time the network-engines are not sufficient to control the input and output device for Video On Demand (VOD). In this paper we have proposed the wireless network-engine with the capability of controlling the input and output device.

  • PDF

A Study on the Cacti-based Network Traffic Monitoring System Using Libpcap (Libpcap를 이용한 Cacti기반 네트워크 트래픽 모니터링 시스템)

  • Huang, Xiao;Ban, Tae-Hak;Ham, Jong-Wan;Jeong, Sun-Chul;Jung, Heo-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.643-645
    • /
    • 2011
  • For network is growing at a rapid rate, network environment is more complex. The technology of using network traffic to monitor our network in real-time is developed. Cacti is a representative monitoring tool which based on RRDTool(Round Robin Database tool), SNMP(Simple Network Management Protocol). In this paper, it show you how to develop a system which based on Cacti and Libpcap to monitor our monitored objects. At this system, using Libpcap to capture network traffic packets, analyze these packets and then turn out in Cacti in graphical form. So as to achieve monitoring system. This system's execution is efficient and the management is easy and the results are accurate, so it can be widely utilized in the future.

  • PDF

Customer Requirements Elicitation based on Social Network Service

  • Lee, Yoon-Kyu;Kim, Neung-Hoe;Kim, Do-Hoon;Lee, Dong-Hyun;In, Hoh Peter
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1733-1750
    • /
    • 2011
  • In the early stages of a software project, it is critical to understand the needs of the customers and elicit their customer requirements. Various requirements elicitation methods have been proposed. However, existing methods still have the limitations such as a limited number of target customers, limited expression of customers' opinions, and difficulty in collecting the customers' opinions continuously. A novel method for eliciting customer requirements is proposed by utilizing a social network service (SNS), which is a shared source of raw information of the customers' needs and opinions. The proposed method is validated to show its effectiveness in overcoming the limitations of existing methods.

PPNC: Privacy Preserving Scheme for Random Linear Network Coding in Smart Grid

  • He, Shiming;Zeng, Weini;Xie, Kun;Yang, Hongming;Lai, Mingyong;Su, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1510-1532
    • /
    • 2017
  • In smart grid, privacy implications to individuals and their families are an important issue because of the fine-grained usage data collection. Wireless communications are utilized by many utility companies to obtain information. Network coding is exploited in smart grids, to enhance network performance in terms of throughput, delay, robustness, and energy consumption. However, random linear network coding introduces a new challenge for privacy preserving due to the encoding of data and updating of coefficients in forwarder nodes. We propose a distributed privacy preserving scheme for random linear network coding in smart grid that considers the converged flows character of the smart grid and exploits a homomorphic encryption function to decrease the complexities in the forwarder node. It offers a data confidentiality privacy preserving feature, which can efficiently thwart traffic analysis. The data of the packet is encrypted and the tag of the packet is encrypted by a homomorphic encryption function. The forwarder node random linearly codes the encrypted data and directly processes the cryptotext tags based on the homomorphism feature. Extensive security analysis and performance evaluations demonstrate the validity and efficiency of the proposed scheme.

Availability Analysis of Computer Network using Petri-Nets

  • Ro, Cheul Woo;Pak, Artem
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.699-705
    • /
    • 2009
  • This paper reviews methods used to perform reliability and availability analysis of the network system composed by nodes and links. The combination of nodes and links forms virtual connections (VC). The failure of several VCs cause failure of whole network system. Petri Net models are used to analyze the reliability and availability. Stochastic reward nets (SRN) is an extension of stochastic Petri nets provides modelling facilities for network system analysis.

  • PDF

Wild Image Object Detection using a Pretrained Convolutional Neural Network

  • Park, Sejin;Moon, Young Shik
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.6
    • /
    • pp.366-371
    • /
    • 2014
  • This paper reports a machine learning approach for image object detection. Object detection and localization in a wild image, such as a STL-10 image dataset, is very difficult to implement using the traditional computer vision method. A convolutional neural network is a good approach for such wild image object detection. This paper presents an object detection application using a convolutional neural network with pretrained feature vector. This is a very simple and well organized hierarchical object abstraction model.

Small Sample Face Recognition Algorithm Based on Novel Siamese Network

  • Zhang, Jianming;Jin, Xiaokang;Liu, Yukai;Sangaiah, Arun Kumar;Wang, Jin
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1464-1479
    • /
    • 2018
  • In face recognition, sometimes the number of available training samples for single category is insufficient. Therefore, the performances of models trained by convolutional neural network are not ideal. The small sample face recognition algorithm based on novel Siamese network is proposed in this paper, which doesn't need rich samples for training. The algorithm designs and realizes a new Siamese network model, SiameseFacel, which uses pairs of face images as inputs and maps them to target space so that the $L_2$ norm distance in target space can represent the semantic distance in input space. The mapping is represented by the neural network in supervised learning. Moreover, a more lightweight Siamese network model, SiameseFace2, is designed to reduce the network parameters without losing accuracy. We also present a new method to generate training data and expand the number of training samples for single category in AR and labeled faces in the wild (LFW) datasets, which improves the recognition accuracy of the models. Four loss functions are adopted to carry out experiments on AR and LFW datasets. The results show that the contrastive loss function combined with new Siamese network model in this paper can effectively improve the accuracy of face recognition.

Adaptive analysis of characteristic nodes using prediction method in DTN (DTN에서 예측 기반한 적응적 노드 속성 분석)

  • Dho, Yoon-Hyung;Jeon, Il-Kyu;Oh, Young-Jun;Lee, Kang-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2771-2778
    • /
    • 2014
  • In this paper, we propose an algorithm that select efficient relay nodes using information of network environment and nodes. The proposed algorithm can be used changeable weight factors as following network environment in node density. The routing protocols adopting store-carry-forward method are used for solving network problems occurred by unstable end-to-end connection in Delay Tolerant Networks(DTNs). Exiting DTN routing algorithms have problems that large latency and overhead because of deficiency of network informations. The proposed algorithm could be provide a solution this problems using changeable weight factor and prediction of network environment. Thus, selected relay nodes work efficiently in unstable and stressed network environment. Simulation results show that enhancement performance as overhead, delivery ratio, average latency compared to exiting DTN routing algorithm.

Korean Restaurant Reservation System Model Using Hybrid Code Network (Hybrid Code Network를 이용한 한국어 식당 예약 시스템 모델)

  • Lee, Dong-Yub;Hur, Yun-A;Lim, Heui-Seok
    • Proceedings of The KACE
    • /
    • 2017.08a
    • /
    • pp.57-59
    • /
    • 2017
  • 대화 시스템(dialogue system)은 텍스트나 음성을 통해 다양한 분야에서 특정한 목적을 수행할 수 있는 시스템이다. 대화 시스템을 구현하기 위한 방법으로 인공 신경망(neural network)을 기반으로한 end-to-end learning 방식이 제안되었다. End-to-end learning 방식을 이용한 식당 예약 시스템 모델의 학습을 위해 페이스북은 영어로 이루어진 식당 예약에 관련된 학습 대화 데이터셋(The 6 dialog bAbI tasks)을 구축하였다. 하지만 end-to-end learning 방식의 학습은 많은 학습 데이터가 필요하다는 단점이 존재하는데, 액션 템플릿(action template)의 정의를 통해 도메인 지식을 표현함으로써 일반적인 end-to-end learning 방식보다 적은 학습량으로 좋은 성능의 모델을 학습할 수 있는 Hybrid Code Network 구조를 제안한 연구가 있다. 본 논문에서는 Hybrid Code Network 구조를 이용하여 한국어 식당 예약 시스템을 구축할 수 있는 방법을 제안하고, 한국어로 이루어진 식당 예약에 관련한 학습 대화 데이터를 구축하는 방법을 제안한다.

  • PDF