• Title/Summary/Keyword: Dynamic Network

Search Result 3,195, Processing Time 0.031 seconds

Tempo-oriented music recommendation system based on human activity recognition using accelerometer and gyroscope data (가속도계와 자이로스코프 데이터를 사용한 인간 행동 인식 기반의 템포 지향 음악 추천 시스템)

  • Shin, Seung-Su;Lee, Gi Yong;Kim, Hyoung-Gook
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.4
    • /
    • pp.286-291
    • /
    • 2020
  • In this paper, we propose a system that recommends music through tempo-oriented music classification and sensor-based human activity recognition. The proposed method indexes music files using tempo-oriented music classification and recommends suitable music according to the recognized user's activity. For accurate music classification, a dynamic classification based on a modulation spectrum and a sequence classification based on a Mel-spectrogram are used in combination. In addition, simple accelerometer and gyroscope sensor data of the smartphone are applied to deep spiking neural networks to improve activity recognition performance. Finally, music recommendation is performed through a mapping table considering the relationship between the recognized activity and the indexed music file. The experimental results show that the proposed system is suitable for use in any practical mobile device with a music player.

A study on the safety about Contact wire uplift of a metro-railroad bridge section (도시철도 교량구간의 전차선 압상량에 대한 안전성 연구)

  • Jang, Woo-Jean;Cho, Yong-Hyeon;Lee, Ki-Won;So, Sun-Young;Park, Jong-Hak;Lee, Bong-Jae
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.821-831
    • /
    • 2006
  • There are 5 railway bridges in a Seoul metro network; Jamsil, Dangsan(line 2), Dongho(line 3), Dongjak(line 4) and Chungdam(line 7). Because there are strong wind and vibration in the bridges, uplift of a contact wire caused by pantographs in the bridge section is higher than in a normal section. If the uplift at the support point exceed 10 cm, an interference between pantographs and catenary system happens. Estimated maximum uplift is obtained by applying safety factor 2 to the simulation results. The application of the safety factor is needed for taking into account of the effect of the wind, etc. Previously, we can not check whether or not the safety factor is proper. Recently, we can measure the uplift during the train operation, as a telemetry system which can measure dynamic behavior of the contact wire has been developed. The aim of this research is to review how proper the safety factor related to the uplift is, based on the measurement. We performed simulations and experiments for the uplift at the Jamsil railway bridge. The simulations were performed for the every kind of the train passing the Jamsil bridge. In order to compare the analysis results with the measurement results, we measured the uplifts at the support when the trains passed the measuring point. Finally, we proposed adequate safety factor with the uplift for the bridge section.

  • PDF

A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing (모바일 클라우드 컴퓨팅 환경에서 ID-기반 키 암호화를 이용한 안전한 데이터 처리 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.3-8
    • /
    • 2015
  • Most mobile cloud computing system use public key cryptography to provide data security and mutual authentication. A variant of traditional public key technologies called Identity-Based Cryptography(IBC) has recently received considerable attention. The certificate-free approach of IBC may well match the dynamic qualities of cloud environment. But, there is a need for a lightweight secure framework that provides security with minimum processing overhead on mobile devices. In this paper, we propose to use hierarchical ID-Based Encryption in mobile cloud computing. It is suitable for a mobile network since it can reduce the workload of root Public Key Generators by delegating the privilege of user authentication and private key generation. The Identity-Based Encryption and Identity-Based Signature are also proposed and an ID-Based Authentication scheme is presented to secure data processing. The proposed scheme is designed by one-way hash functions and XOR operations, thus has low computation costs for mobile users.

A Study on the Emotional Evaluation Model of Color Pattern Based on Adaptive Fuzzy System (적응 퍼지 시스템을 이용한 칼라패턴 감성 평가 모델에 관한 연구)

  • 엄경배
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.9 no.5
    • /
    • pp.526-537
    • /
    • 1999
  • In the paper. we propose an evaluation model based the adaptive fuzzy systems, which can transform the physical features of a color pattern to the emotional features. The model is motivated by the Soen's psychological experiments, in which he found the physical features such as average hue, saturation, intensity and the dynamic components of the color patterns affects to the emotional features represented by a pair of adjective words having the opposite meanings. Our proposed model consists of two adaptive fuzzy rule-bases and the y-model, a l i r ~ r ys et operator, to fuze the evaluation values produced by them. The model shows con~parablep erformances to the neural network for the approximation of the nonlinear transforms, and it has the advantage to obtain the linbwistic interpretation from the trained results. We believe the evaluated results of a color pattern can be used to the emotion-based color image retrievals.

  • PDF

A Point-to-Multipoint Routing Path Selection Algorithm for Dynamic Routing Based ATM Network (동적 라우팅기반의 점대다중점 라우팅 경로 선택)

  • 신현순;이상호;이경호;박권철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8A
    • /
    • pp.581-590
    • /
    • 2003
  • This paper proposes the routing path selection mechanism for source routing-based PtMP (Point-to-Multipoint) call in ATM switching system. Especially, it suggests PtMP routing path selection method that can share the maximum resource prior to the optimal path selection, guarantee the reduction of path calculation time and cycle prevention. The searching for the nearest branch point from destination node to make the maximum share of resource is the purpose of this algorithm. Therefore among neighbor nodes from destination node by back-tracking, this algorithm fixes the node crossing first the node on existing path having the same Call ID as branch node, constructs the optimal PtMP routing path. The optimal node to be selected by back-tracking is selected by the use of Dijkstra algorithm. That is to say, PtMP routing path selection performs the step of cross node selection among neighboring nodes by back-tracking and the step of optimal node selection(optimal path calculation) among neighboring nodes by back-tracking. This technique reduces the process of search of routing information table for path selection and path calculation, also solves the cycle prevention easily during path establishment.

Self-Organizing Fuzzy Polynomial Neural Networks by Means of IG-based Consecutive Optimization : Design and Analysis (정보 입자기반 연속전인 최적화를 통한 자기구성 퍼지 다항식 뉴럴네트워크 : 설계와 해석)

  • Park, Ho-Sung;Oh, Sung-Kwun
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.6
    • /
    • pp.264-273
    • /
    • 2006
  • In this paper, we propose a new architecture of Self-Organizing Fuzzy Polynomial Neural Networks (SOFPNN) by means of consecutive optimization and also discuss its comprehensive design methodology involving mechanisms of genetic optimization. The network is based on a structurally as well as parametrically optimized fuzzy polynomial neurons (FPNs) conducted with the aid of information granulation and genetic algorithms. In structurally identification of FPN, the design procedure applied in the construction of each layer of a SOFPNN deals with its structural optimization involving the selection of preferred nodes (or FPNs) with specific local characteristics and addresses specific aspects of parametric optimization. In addition, the fuzzy rules used in the networks exploit the notion of information granules defined over system's variables and formed through the process of information granulation. That is, we determine the initial location (apexes) of membership functions and initial values of polynomial function being used in the premised and consequence part of the fuzzy rules respectively. This granulation is realized with the aid of the hard c-menas clustering method (HCM). For the parametric identification, we obtained the effective model that the axes of MFs are identified by GA to reflect characteristic of given data. Especially, the genetically dynamic search method is introduced in the identification of parameter. It helps lead to rapidly optimal convergence over a limited region or a boundary condition. To evaluate the performance of the proposed model, the model is experimented with using two time series data(gas furnace process, nonlinear system data, and NOx process data).

Positioning using ZigBee and Ultrasound

  • Park, Chan-Sik;Kim, Seung-Beom;Kang, Dong-Youn;Yun, Hee-Hak;Cha, En-Jong;Lee, Sang-Jeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.217-222
    • /
    • 2006
  • To find a location, GPS has been wildly used. But, it is hard to use in indoor because of very weak signal level. To meet indoor requirements, there have been many studies applying wireless communication networks such as WLAN, UWB and ZigBee. Among these, ZigBee is widely adopted in many WSN applications because it has an advantage of low-power and low-cost. In ZigBee, the RSSI is used as range measurement for ad-hoc network. The RSSI are converted to ranges using the signal attenuation model and these ranges become inputs of positioning methods. The obtained position with RSSI has large error because of its poor accuracy. To overcome this problem, ultrasonic sensors are added in many researches. By measuring the arrival time difference of ZigBee and ultrasound as a range measurement, the precise position can be found. However, there are still many problems: scheduling of beacons to transmit signals in a correct order, addition and synchronization of beacons and low-rate positioning rate. At this paper, an efficient method to solve these problems is proposed. In the proposed method, a node transmits ZigBee and ultrasound signal simultaneously. And beacons find the range with the received signals and send it back to a node with ZigBee. The position is computed in a node with the received ranges. In addition, a new positioning algorithm to solve the risk of the divergence in the linearization method and the singularity problem in the Savarese method is presented. Both static and dynamic experimental results show 0.02m RMS errors with high output rate.

  • PDF

Load Balancing in MPLS Networks (MPLS 네트워크에서의 부하 분산 방안)

  • Kim, Sae-Rin;Song, Jeong-Hwa;Lee, Mee-Jeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.893-902
    • /
    • 2002
  • MPLS enables efficient explicit routing, and thus provides great advantages in supporting traffic engineering. Exploiting this capability, we Propose a load balancing scheme which deploys a multipath routing. It is named LBM (Load Balancing in MPLS networks), and targets at efficient network utilization as well as performance enhancement. LBM establishes multiple LSP (Label Switched Path)s between a pair of ingress-egress routers, and distributes traffic over these LSPs at the new level. Its routing decision is based on both the length and the utilization of the paths. In order to enhance the efficiency of a link usage, a link is limited to be used by shorter paths as its utilization becomes higher Longer paths are considered to be candidate alternative paths as the utilization of shorter paths becomes higher. Simulation experiments are performed in order to compare the performance of LBM to that of static shortest path only scheme as well as the other representative dynamic multipath traffic distribution approaches. The simulation results show that LBM outperforms the compared approaches, and the performance gain is more significant when the traffic distribution among the ingress-egress pairs is non-uniform.

Design of Smart AP for DASH Service in Non-DASH Client (Non-DASH 클라이언트상에서 DASH 서비스 제공 가능한 Smart AP 설계)

  • Jeon, Seong Hee;Cho, Min Ju;Lee, Wong Jae;Hwang, Jun;Paik, Jong Ho
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.2
    • /
    • pp.47-53
    • /
    • 2012
  • In general, it is essential that contents are to be provided with proper bitrate according to network conditions in order to support higher quality of video streaming services over wired and wireless networks. Recently, DASH is adopted by the MPEG as the standard for HTTP based adaptive streaming technology and consists of the server and clients. The clients should parse XML files from the server and play contents after accessing the finely divided segments into various bitrates. In this paper, we designed a Smart AP(Access Point) which exists between DASH contents server and Non-DASH clients enables provide DASH services to Non-DASH clients. In addition, proposed Smart AP provides DASH service to various types of clients as maintaining the existing environment without additional development costs.

$^{15}$N NMR Relaxation Study of the Catalytic Residues in Y14F Mutant Ketosteroid Isomerase

  • Yoon, Ye-Jeong;Lee, Hyeong-Ju;Kim, Chul;Lee, Hee-Cheon
    • Journal of the Korean Magnetic Resonance Society
    • /
    • v.8 no.2
    • /
    • pp.77-85
    • /
    • 2004
  • $^1$H-detected $^{15}$N NMR was employed to investigated the effect of mutation (Y14F) on the dynamic properties of catalytic residues in ${\Delta}^5$-3- ketosteroid isomerase (KSI) from Conamonas testosteroni. In particular, the backbone dynamics of the catalytic residues have been studied in free enzyme and its complex with a steroid ligand, 19-nortestosterone hemisuccinate, by $^{15}$N relaxation measurements. The relaxation data were analyzed using the model-free formalism to extract the model-free parameters (S$^2$, ${\tau}_e$, and R$_{ex}$). The results show that the mutation causes a significant decrease in the order parameter (S$^2$) for the catalytic residues of free Y14F KSI, presumably due to breakdown of the hydrogen bond network by mutation. In addition, the order parameters of Phe-14 and Asp-99 increased slightly upon ligand binding, indicating a slight restriction of the high-frequency (pico- to nanosecond) internal motions of the residues in the complexed Y14F KSI, while the order parameter of Tyr-55 decreased significantly upon ligand binding.

  • PDF