• 제목/요약/키워드: Dynamically generated networks

검색결과 8건 처리시간 0.03초

입자군집 최적화를 이용한 SVM 기반 다항식 뉴럴 네트워크 분류기 설계 (Design of SVM-Based Polynomial Neural Networks Classifier Using Particle Swarm Optimization)

  • 노석범;오성권
    • 전기학회논문지
    • /
    • 제67권8호
    • /
    • pp.1071-1079
    • /
    • 2018
  • In this study, the design methodology as well as network architecture of Support Vector Machine based Polynomial Neural Network, which is a kind of the dynamically generated neural networks, is introduced. The Support Vector Machine based polynomial neural networks is given as a novel network architecture redesigned with the aid of polynomial neural networks and Support Vector Machine. The generic polynomial neural networks, whose nodes are made of polynomials, are dynamically generated in each layer-wise. The individual nodes of the support vector machine based polynomial neural networks is constructed as a support vector machine, and the nodes as well as layers of the support vector machine based polynomial neural networks are dynamically generated as like the generation process of the generic polynomial neural networks. Support vector machine is well known as a sort of robust pattern classifiers. In addition, in order to enhance the structural flexibility as well as the classification performance of the proposed classifier, multi-objective particle swarm optimization is used. In other words, the optimization algorithm leads to sequentially successive generation of each layer of support vector based polynomial neural networks. The bench mark data sets are used to demonstrate the pattern classification performance of the proposed classifiers through the comparison of the generalization ability of the proposed classifier with some already studied classifiers.

Streaming Media and Multimedia Conferencing Traffic Analysis Using Payload Examination

  • Kang, Hun-Jeong;Kim, Myung-Sup;Hong, James W.
    • ETRI Journal
    • /
    • 제26권3호
    • /
    • pp.203-217
    • /
    • 2004
  • This paper presents a method and architecture to analyze streaming media and multimedia conferencing traffic. Our method is based on detecting the transport protocol and port numbers that are dynamically assigned during the setup between communicating parties. We then apply such information to analyze traffic generated by the most popular streaming media and multimedia conferencing applications, namely, Windows Media, Real Networks, QuickTime, SIP and H.323. We also describe a prototype implementation of a traffic monitoring and analysis system that uses our method and architecture.

  • PDF

WSN에서 프리앰블 다이나믹을 이용한 비동기 MAC 프로토콜 연구 (A Study on Asynchronous MAC Protocol with Dynamic Preamble Length in Wireless Sensor Networks)

  • 한현호;홍영표;이상훈
    • 한국산학기술학회논문지
    • /
    • 제11권9호
    • /
    • pp.3563-3570
    • /
    • 2010
  • 무선 센서 네트워크에서 에너지 소비를 줄이기 위한 MAC 프로토콜의 연구가 진행되어 왔다. 비동기 MAC Protocol에서 Preamble의 Overhearing과 Idle listening으로 인해 불필요한 에너지가 소모 된다. 본 논문에서는 Preamble 구조에서 목적지 주소와 Preamble의 종료 시간, 전송될 데이터 길이 정보를 포함하여 Preamble Overhearing과 Data Overhearing을 감소시키고 Data의 발생 유무에 따라 Dynamic 값을 변경하여 Check Interval의 길이를 조절하는 DPL(Dynamic Preamble Length)-MAC 프로토콜을 제안하였다. 그리고 기존의 비동기 방식의 무선 센서 네트워크 MAC 프로토콜들과 본 논문에서 제안한 DPL-MAC 프로토콜을 시뮬레이션 하여 에너지 소모를 비교 분석하였다.

ATM망에서 트래픽 제어용 동적 지연기를 적용한 개선된 UPC 알고리즘 (Improved UPC Algorithm Adopting a Dynamic Spacer for Traffic Control in ATM Networks)

  • 김우완
    • 한국멀티미디어학회논문지
    • /
    • 제8권2호
    • /
    • pp.192-200
    • /
    • 2005
  • ATM망에서 트래픽을 동적으로 제어하기 위한 개선된 사용자 파라미터 제어 알고리즘을 본 논문에서 제안한다. 기존의 알고리즘은 Cell Buffer, Red Token Pool, Green Token Pool, Spacer와 같은 지연요소로 구성되어 있다. 이는, 일정 기간이 지나면 토큰이 발생되고, 셀이 도착하면 Token Pool에서 토큰을 하나씩 소모시키며, Spacer라는 지연요소가 비어 있는지 확인하여 비어있으면 셀이 네트워크로 유입되고, 비어 있지 않으면 유입이 될 수 가 없다. 그리고 Token Pool에 토큰이 없는 경우에는 해당 셀을 폐기하게 된다. 본 논문에서 사용하는 Token은 기존의 중재기능은 삭제하고 네트워크의 트래픽 제어를 위한 용도로 사용된다. 또한 본 논문에서는 셀이 Spacer에 의해 일정시간 지연 이후에 네트워크에 유입되는 기존의 정적인 Spacer를 적용한 방법과 달리, 트래픽 상태에 따라 동적으로 지연요소인 Spacer를 적용함으로써 셀 지연율과 셀 손실율이 개선된 진화한 UPC 알고리즘을 제안한다.

  • PDF

무선센서네트워크에서 에너지 효율적인 그리드 기반의 홀 우회 방식 (Energy-Efficient Grid-based Hole-Detouring Scheme in Wireless Sensor Networks)

  • 김성휘;박호성;이정철;김상하
    • 한국통신학회논문지
    • /
    • 제37권4B호
    • /
    • pp.227-235
    • /
    • 2012
  • 무선센서네트워크에서 예기치 못한 지형과 자연현상 또는 노드 파손, 불균형적인 에너지 손실로 홀(hole)이 발생하는 것은 필수불가결하다. 이런 문제를 다루는 대부분의 현존 방식은 홀을 피하기 위해 정적인 우회 경로를 구성한다. 정적인 우회 경로는 홀 주변부에 있는 노드들의 과도한 에너지 손실을 유발한다. 그래서 데이터 패킷이 홀 주변 노드에 몰리고 노드들의 에너지는 급속하게 고갈되며 홀의 영역이 확대되는 효과가 나타난다. 이러한 문제점을 해결하기 위하여 가상 그리드 상에서 위치기반 라우팅 방식과 동적인 그리드 앵커포인터 설정을 통한 효율적인 홀 우회 방식을 제안한다. 제안된 홀 우회 방식은 홀이 있는 불규칙한 무선센서네트워크에서도 에너지 효율적이며 데이터 신뢰성을 제공하는 홀 우회 전송방식이다. 시뮬레이션 결과는 이러한 주장의 타당성을 제공한다.

미래 네트워크 제공을 위한 기계 학습 기반 스마트 서비스 추상화 계층 설계 (Design of Machine Learning based Smart Service Abstraction Layer for Future Network Provisioning)

  • ;;김경백;최덕재
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2016년도 추계학술발표대회
    • /
    • pp.114-116
    • /
    • 2016
  • Recently, SDN and NFV technology have been developed actively and provide enormous flexibility of network provisioning. The future network services would generally involve many different types of services such as hologram games, social network live streaming videos and cloud-computing services, which have dynamic service requirements. To provision networks for future services dynamically and efficiently, SDN/NFV orchestrators must clearly understand the service requirements. Currently, network provisioning relies heavily on QoS parameters such as bandwidth, delay, jitter and throughput, and those parameters are necessary to describe the network requirements of a service. However it is often difficult for users to understand and use them proficiently. Therefore, in order to maintain interoperability and homogeneity, it is required to have a service abstraction layer between users and orchestrators. The service abstraction layer analyzes ambiguous user's requirements for the desired services, and this layer generates corresponding refined services requirements. In this paper, we present our initial effort to design a Smart Service Abstraction Layer (SmSAL) for future network architecture, which takes advantage of machine learning method to analyze ambiguous and abstracted user-friendly input parameters and generate corresponding network parameters of the desired service for better network provisioning. As an initial proof-of-concept implementation for providing viability of the proposed idea, we implemented SmSAL with a decision tree model created by learning process with previous service requests in order to generate network parameters related to various audio and video services, and showed that the parameters are generated successfully.

개인화 서비스를 위한 모바일 콘텐츠 변환 시스템 연구 (Mobile Contents Transformation System Research for Personalization Service)

  • 배종환;조영희;이정재;김남진
    • 지능정보연구
    • /
    • 제17권2호
    • /
    • pp.119-128
    • /
    • 2011
  • 최근 사용자 정보와 주변 환경의 정보를 수집할 수 있는 센서의 기술과 휴대 디바이스의 성능이 매우 발달되어 왔다. 이러한 기술 발달로 인해 사용자는 매우 다양한 콘텐츠를 이용할 수 있게 되었다. 그러나 사용자가 휴대한 디바이스의 특성에 따라 이용할 수 있는 콘텐츠가 제한적이다. 이것을 해결하기 위해 하나의 콘텐츠를 여러 디바이스에서 사용하기 위한 연구가 활발히 진행 중이다. 본 연구에서는 사용자 주변의 센서를 통한 다양한 정보를 수집하여 사용자의 상황에 맞는 특정 콘텐츠를 선정하고, 선정된 콘텐츠를 사용자가 휴대한 디바이스 특성에 맞게 변환하여 서비스를 제공하는 시스템을 제안한다.

U-마켓에서의 사용자 정보보호를 위한 매장 추천방법 (A Store Recommendation Procedure in Ubiquitous Market for User Privacy)

  • 김재경;채경희;구자철
    • Asia pacific journal of information systems
    • /
    • 제18권3호
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.