• Title/Summary/Keyword: Connected Network

Search Result 1,943, Processing Time 0.036 seconds

Implementation of Connected-Digit Recognition System Using Tree Structured Lexicon Model (트리 구조 어휘 사전을 이용한 연결 숫자음 인식 시스템의 구현)

  • Yun Young-Sun;Chae Yi-Geun
    • MALSORI
    • /
    • no.50
    • /
    • pp.123-137
    • /
    • 2004
  • In this paper, we consider the implementation of connected digit recognition system using tree structured lexicon model. To implement efficiently the fixed or variable length digit recognition system, finite state network (FSN) is required. We merge the word network algorithm that implements the FSN with lexical tree search algorithm that is used for general speech recognition system for fast search and large vocabulary systems. To find the efficient modeling of digit recognition system, we investigate some performance changes when the lexical tree search is applied.

  • PDF

Aircraft Detection on Panchromatic Imagery Based on Densely Connected Convolutional Network

  • Wiratama, Wahyu;Sim, Donggyu
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2018.06a
    • /
    • pp.185-187
    • /
    • 2018
  • This paper presents an aircraft detection on panchromatic image using densely connected convolutional network. This algorithm connects all preceding feature-maps to all subsequent layers. It is encouraged to reuse feature-maps and enhance feature-maps representation. This algorithm is driven to learn aircraft feature to detect aircraft objects on panchromatic imagery. Based on the experimental result, it can yield accuracy of 92%.

  • PDF

Disconnection of Wireless LAN Attack and Countermeasure (무선 LAN 연결 해제 공격과 보안)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.453-458
    • /
    • 2013
  • In a wireless LAN environment, security is the most important. Security of 802.11 standard has many vulnerabilities of the network attack. IEEE has created mechanisms to security for this vulnerability. But the vulnerabilities is characteristic of broadcast in the air in wireless LAN, it is more disclosure then other network environments. In a wireless LAN environment, it can be accessed to the wireless LAN after authentication. Authentication process is one of most important because of the first security step. However, in the authentication process is not mentioned in the method of reducing the disclosure maximum fundamental. Therefore, in this research, the vulnerability of 802.11 are presented and how to do de-authentication in 802.11.

Recurrent Neural Network with Backpropagation Through Time Learning Algorithm for Arabic Phoneme Recognition

  • Ismail, Saliza;Ahmad, Abdul Manan
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1033-1036
    • /
    • 2004
  • The study on speech recognition and understanding has been done for many years. In this paper, we propose a new type of recurrent neural network architecture for speech recognition, in which each output unit is connected to itself and is also fully connected to other output units and all hidden units [1]. Besides that, we also proposed the new architecture and the learning algorithm of recurrent neural network such as Backpropagation Through Time (BPTT, which well-suited. The aim of the study was to observe the difference of Arabic's alphabet like "alif" until "ya". The purpose of this research is to upgrade the people's knowledge and understanding on Arabic's alphabet or word by using Recurrent Neural Network (RNN) and Backpropagation Through Time (BPTT) learning algorithm. 4 speakers (a mixture of male and female) are trained in quiet environment. Neural network is well-known as a technique that has the ability to classified nonlinear problem. Today, lots of researches have been done in applying Neural Network towards the solution of speech recognition [2] such as Arabic. The Arabic language offers a number of challenges for speech recognition [3]. Even through positive results have been obtained from the continuous study, research on minimizing the error rate is still gaining lots attention. This research utilizes Recurrent Neural Network, one of Neural Network technique to observe the difference of alphabet "alif" until "ya".

  • PDF

Agile Management and Interoperability Testing of SDN/NFV-Enriched 5G Core Networks

  • Choi, Taesang;Kim, TaeYeon;Tavernier, Wouter;Korvala, Aki;Pajunpaa, Jussi
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.72-88
    • /
    • 2018
  • In the fifth generation (5G) era, the radio internet protocol capacity is expected to reach 20 Gb/s per sector, and ultralarge content traffic will travel across a faster wireless/wireline access network and packet core network. Moreover, the massive and mission-critical Internet of Things is the main differentiator of 5G services. These types of real-time and large-bandwidth-consuming services require a radio latency of less than 1 ms and an end-to-end latency of less than a few milliseconds. By distributing 5G core nodes closer to cell sites, the backhaul traffic volume and latency can be significantly reduced by having mobile devices download content immediately from a closer content server. In this paper, we propose a novel solution based on software-defined network and network function virtualization technologies in order to achieve agile management of 5G core network functionalities with a proof-of-concept implementation targeted for the PyeongChang Winter Olympics and describe the results of interoperability testing experiences between two core networks.

Directional texture information for connecting road segments in high spatial resolution satellite images

  • Lee, Jong-Yeol
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.245-245
    • /
    • 2005
  • This paper addresses the use of directional textural information for connecting road segments. In urban scene, some roads are occluded by buildings, casting shadow of buildings, trees, and cars on streets. Automatic extraction of road network from remotely sensed high resolution imagery is generally hindered by them. The results of automatic road network extraction will be incomplete. To overcome this problem, several perceptual grouping algorithms are often used based on similarity, proximity, continuation, and symmetry. Roads have directions and are connected to adjacent roads with certain angles. The directional information is used to guide road fragments connection based on roads directional inertia or characteristics of road junctions. In the primitive stage, roads are extracted with textural and direction information automatically with certain length of linearity. The primitive road fragments are connected based on the directional information to improve the road network. Experimental results show some contribution of this approach for completing road network, specifically in urban area.

  • PDF

A Searching Algorithm for Shortest Path in RCR Network (RCR 네트워크에서 최단경로를 위한 탐색 알고리즘)

  • Kim, Seong-Yeol
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.444-448
    • /
    • 2010
  • RCR network[1] is a topology for interconnection networks having many desirable properties for building scalable parallel machines. This had been analyzed by Hu and Cao[2] to deal with problems of disconnected graph, bisection width and diameter. We analyze some properties of RCR again and revise the condition for connected graph and network diameter. And we present an efficient algorithm for finding next node on a shortest path.

A Genetic Algorithm Approach for the Design of Minimum Cost Survivable Networks with Bounded Rings

  • B. Ombuki;M. Nakamura;Na, Z.kao;K.Onage
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.493-496
    • /
    • 2000
  • We study the problem of designing at minimum cost a two-connected network topology such that the shortest cycle to which each edge belongs does not exceed a given maximum number of hops. This problem is considered as part of network planning and arises in the design of backbone networks. We propose a genetic algorithm approach that uses a solution representation, in which the connectivity and ring constraints can be easily encoded. We also propose a crossover operator that ensures a generated solution is feasible. By doing so, the checking of constraints is avoided and no repair mechanism is required. We carry out experimental evaluations to investigate the solution representation issues and GA operators for the network design problem.

  • PDF

Development of Network Camera-based Instant Messenger (네트워크 카메라 기반 인스턴트 메신저의 개발에 대한 연구)

  • Lee, Kang-Seok;Yum, Chang-Sun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.33 no.2
    • /
    • pp.133-139
    • /
    • 2010
  • PC camera-based instant messenger have problems of video image break/delay and noise. The reason is caused by a composed problem that PC Camera is belong to the connected PC and operating in the PC. This research suggests an instant messenger that uses network camera connected to LAN instead of PC camera. Therefore, the instant messenger has a component that the camera is separated from PC. This research designs sequence diagram, video calls flow chart, and graphic user interface of the instant messenger. The instant messenger based on network camera provides high quality video calls service and makes it possible to call from a special remote site with real-time video image.

Vacuum Gauge Control System Using MSCC for PLS (MSCC를 이용한 가속기 진공장치 감시 시스템 개발)

  • Yoon, J.C.;Lee, T.Y.;Hang, J.Y.;Nam, S.Y.
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2169-2171
    • /
    • 2001
  • The vacuum gauge control system has been designed and implemented using multi-serial communication controllers (MSCC) for the 2.5 Gev storage ring at the Pohang Accelerator Laboratory (PAL). There are 20 Balzers vacuum gauges and 17 Granville-Phillips vacuum gauges at the storage ring. A MSCC have two RS485 (max speed 460.8Kbps) field network port, 8 channel serial communication ports (max speed 460.8Kbps) connected to gauge controller for serial communication control. 12 MSCCs are connected to a personal computer (PC) through the RS485 field network. The PC can automatically control the MSCCs by sending set of commands through the network. The commands specify the duration of the MODBUS protocol. Upon receiving a command from a PC running under Windows2000 through the network, the MSCC communicate through the serial output ports to gauge controller. In this paper, we describe control structure and scheme of the vacuum gauge control system.

  • PDF