• Title/Summary/Keyword: Connected Network

Search Result 1,957, Processing Time 0.026 seconds

Development of Spatio-Temporal Neural Network for Connected Korean Digits Recognition (한국어 연결 숫자음 인식을 위한 시공간 신경회로망의 개발)

  • 이종식
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1995.06a
    • /
    • pp.69-72
    • /
    • 1995
  • In this paper, a new approach for Korean connected digits recognition using the spatio-temporal neural network is reported. The data of seven digits phone numbers are used in the recognition of connected words, and in the initial experiment, digit recognition rate of 28% was achieved. In this paper, to increase recognition rate, two different approaches are analyzed. In the first system, to compensate the STNN's own defect and to emphasize the Korean word's phonic characters, the starting point of phone is pointed by comparing the average magnitude and zero-crossing rate and the ending point is pointed by comparing only zero-crossing rate. The digit recoginiton rate increased to 61%. Also, in the second system, to consider fact that same word's phone is varied severally, the number of STNN's of each word is increased from one to five, and then the varied same word's phones can be included to the increased STNN's. The digit recogniton rate of connected words increased to 89%.

  • PDF

Enhanced RBF Network by Using Auto- Turning Method of Learning Rate, Momentum and ART2

  • Kim, Kwang-baek;Moon, Jung-wook
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.84-87
    • /
    • 2003
  • This paper proposes the enhanced REF network, which arbitrates learning rate and momentum dynamically by using the fuzzy system, to arbitrate the connected weight effectively between the middle layer of REF network and the output layer of REF network. ART2 is applied to as the learning structure between the input layer and the middle layer and the proposed auto-turning method of arbitrating the learning rate as the method of arbitrating the connected weight between the middle layer and the output layer. The enhancement of proposed method in terms of learning speed and convergence is verified as a result of comparing it with the conventional delta-bar-delta algorithm and the REF network on the basis of the ART2 to evaluate the efficiency of learning of the proposed method.

  • PDF

Application of Controller Area Network to Humanoid Robot (휴머노이드 로봇에 대한 CAN(Controller Area Network) 적용)

  • Ku, Ja-Bong;Huh, Uk-Youl;Kim, Jin-Geol
    • Proceedings of the KIEE Conference
    • /
    • 2004.05a
    • /
    • pp.77-79
    • /
    • 2004
  • Because robot hardware architecture generally is consisted of a few sensors and motors connected to the central processing unit, this type of structure is led to time consuming and unreliable system. For analysis, one of the fundamental difficulties in real-time system is how to be bounded the time behavior of the system. When a distributed control network controls the robot, with a central computing hub that sets the goals for the robot, processes the sensor information and provides coordination targets for the joints. If the distributed system supposed to be connected to a control network, the joints have their own control processors that act in groups to maintain global stability, while also operating individually to provide local motor control. We try to analyze the architecture of network-based humanoid robot's leg part and deal with its application using the CAN(Controller Area Network) protocol.

  • PDF

Study of Multiple Interface Control and Dynamic Delivery Model for Seamless Mobile Transportation

  • Lee, Seon-Ung;Moon, Il-Young
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.399-404
    • /
    • 2010
  • We propose a seamless IPTV transport technology of mobile device. This technology uses multiple interfaces of wireless communication on mobile device. This proposal for transportation of mobile IPTV contents is more mobile and adaptable than other wireless technologies that are currently being used. Algorithm of proposed technology is as follow. When the signal strength of the connected wireless network interface of mobile device is getting lower than specified level, another wireless network interface is connected to continue downloading the IPTV contents in advance. Another connection is maintained until the signal strength of the first connected interface is stable or the interface is connected to another base station (or AP) that have good signal strength. For more seamless services, we consider classifying the packets of mobile IPTV and using dynamic content quality select techniques. Dynamic content quality selection is based on notifying transfer rate to the content delivery network (CDN) server. The proposed technology is expected to use efficiently with both mobile IPTV and the transportation of mobile P2P/P4P.

Analysis of IT security threats and countermeasures in a network-separated environment (망분리 환경에서의 IT 보안 위협 및 대응 방법 분석)

  • Kim, chang Seok;Kim, Jong-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.638-640
    • /
    • 2021
  • The network separation environment is a network security design system that separates the internal business network from the external Internet network. It separates the internal business network from the external Internet by separating it into a business network that is not connected to the network to which the Internet is connected. The network is separated, and it is a relatively secure network structure compared to Danilman in terms of security. However, there are frequent cases of infecting internal networks by using vulnerabilities in internal systems, network devices, and security devices. In this paper, we analyze the vulnerability of IT security threats in such a network isolation environment and provide technical measures for effective security monitoring.

  • PDF

Development of CAN network intrusion detection algorithm to prevent external hacking (외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발)

  • Kim, Hyun-Hee;Shin, Eun Hye;Lee, Kyung-Chang;Hwang, Yeong-Yeun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.2
    • /
    • pp.177-186
    • /
    • 2017
  • With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.

Modular Design of Analog Hopfield Network (아날로그 홉필드 신경망의 모듈형 설계)

  • Dong, Sung-Soo;Park, Seong-Beom;Lee, Chong-Ho
    • Proceedings of the KIEE Conference
    • /
    • 1991.11a
    • /
    • pp.189-192
    • /
    • 1991
  • This paper presents a modular structure design of analog Hopfield neural network. Each multiplier consists of four MOS transistors which are connected to an op-amp at the front end of a neuron. A pair of MOS transistor is used in order to maintain linear operation of the synapse and can produce positive or negative synaptic weight. This architecture can be expandable to any size neural network by forming tree structure. By altering the connections, other nework paradigms can also be implemented using this basic modules. The stength of this approach is the expandability and the general applicability. The layout design of a four-neuron fully connected feedback neural network is presented and is simulated using SPICE. The network shows correct retrival of distorted patterns.

  • PDF

Conceptual Design of a Remote Monitoring and Control System for Nuclear Power Plants

  • Lee Seung Jun;Kim Jong Hyun;Seong Poong Hyun
    • Nuclear Engineering and Technology
    • /
    • v.35 no.3
    • /
    • pp.243-250
    • /
    • 2003
  • Nuclear power plants (NPPs) will be highly connected network enabled systems in the future. Using the network and web enabled tools, NPPs will be remotely monitored by operators at any time from any place connected to the network via a general web browser. However, there will be two major issues associated with this implementation. The first is the security issue. Only the authorized persons need to be allowed to access the plant since NPP is a safety-critical system. However, the web technology is open to the public. The second is the network disturbance issue. If operators can not access the plant due to network disturbances, the plant will come into the out-of-control situation. Therefore, in this work, we performed a conceptual design of a web-based remote monitoring and control system (RMCS) considering these issues.

Factors Influencing Critical Clearing Time in Network Connected to Wind Generation System (풍력발전시스템이 연계된 계통의 임계 제거시간에 미치는 요인)

  • Kim, Se-Ho;Kim, Ho-Chan;Yang, Ik-June
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.10
    • /
    • pp.41-46
    • /
    • 2006
  • Generation of electricity using wind power has received considerable attention worldwide in recent years. In order to investigate the impacts of the integration of wind farm into utilities' network, various studies have been investigated. One such impact is related to the Critical Clearing Time (CCT) of wind power generation system. This paper reports investigation into the factors that influence the transient behavior of the wind power generation system following network fault conditions. It is shown that CCT can be affected by various factors contributed by the network. Such factors include capacity of wind power, power factor, the length of the interfacing line, etc. This investigation is conducted on a simulated grid-connected wind farm using Digsilent Power Factory.

Approach towards qualification of TCP/IP network components of PFBR

  • Aditya Gour;Tom Mathews;R.P. Behera
    • Nuclear Engineering and Technology
    • /
    • v.54 no.11
    • /
    • pp.3975-3984
    • /
    • 2022
  • Distributed control system architecture is adopted for I&C systems of Prototype Fast Breeder Reactor, where the geographically distributed control systems are connected to centralized servers & display stations via switched Ethernet networks. TCP/IP communication plays a significant role in the successful operations of this architecture. The communication tasks at control nodes are taken care by TCP/IP offload modules; local area switched network is realized using layer-2/3 switches, which are finally connected to network interfaces of centralized servers & display stations. Safety, security, reliability, and fault tolerance of control systems used for safety-related applications of nuclear power plants is ensured by indigenous design and qualification as per guidelines laid down by regulatory authorities. In the case of commercially available components, appropriate suitability analysis is required for getting the operation clearances from regulatory authorities. This paper details the proposed approach for the suitability analysis of TCP/IP communication nodes, including control systems at the field, network switches, and servers/display stations. Development of test platform using commercially available tools and diagnostics software engineered for control nodes/display stations are described. Each TCP link behavior with impaired packets and multiple traffic loads is described, followed by benchmarking of the network switch's routing characteristics and security features.