• Title/Summary/Keyword: Historical Graph

Search Result 22, Processing Time 0.027 seconds

Machine Learning Based Neighbor Path Selection Model in a Communication Network

  • Lee, Yong-Jin
    • International journal of advanced smart convergence
    • /
    • v.10 no.1
    • /
    • pp.56-61
    • /
    • 2021
  • Neighbor path selection is to pre-select alternate routes in case geographically correlated failures occur simultaneously on the communication network. Conventional heuristic-based algorithms no longer improve solutions because they cannot sufficiently utilize historical failure information. We present a novel solution model for neighbor path selection by using machine learning technique. Our proposed machine learning neighbor path selection (ML-NPS) model is composed of five modules- random graph generation, data set creation, machine learning modeling, neighbor path prediction, and path information acquisition. It is implemented by Python with Keras on Tensorflow and executed on the tiny computer, Raspberry PI 4B. Performance evaluations via numerical simulation show that the neighbor path communication success probability of our model is better than that of the conventional heuristic by 26% on the average.

Locally weighted linear regression prefetching method for hybrid memory system (하이브리드 메모리 시스템의 지역 가중 선형회귀 프리페치 방법)

  • Tang, Qian;Kim, Jeong-Geun;Kim, Shin-Dug
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.12-15
    • /
    • 2020
  • Data access characteristics can directly affect the efficiency of the system execution. This research is to design an accurate predictor by using historical memory access information, where highly accessible data can be migrated from low-speed storage (SSD/HHD) to high-speed memory (Memory/CPU Cache) in advance, thereby reducing data access latency and further improving overall performance. For this goal, we design a locally weighted linear regression prefetch scheme to cope with irregular access patterns in large graph processing applications for a DARM-PCM hybrid memory structure. By analyzing the testing result, the appropriate structural parameters can be selected, which greatly improves the cache prefetching performance, resulting in overall performance improvement.

Web based Body Change Monitoring System (웹 기반 신체 변화 모니터링 시스템)

  • Lee, Jong-Won;Go, Gyoung-Mo;Kang, Hee-Beom;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.615-620
    • /
    • 2016
  • Improved quality of life has increased in a population with a high BMI (Body Mass Index). Accordingly, the development of a system for prevention of obesity management is required. Because a requirement for the prevention of obesity management system. This system has been developed to solve this problem and it is done by measuring the user information of the individual's body. The purpose of this paper is to understand the changes in your own BMI over the course of usage of this application and store the BMI in the database. This BMI data is expressed as a graph to the user and based on the BMI graph, the user is suggested to the type of exercise required by his body. The most appropriate exercise equipment's are shown to the user based on the BMI and also recommendations based on the historical data of other users with similar BMI. This system also recommends chronic diseases depending on blood sugar, blood pressure.

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining

  • Liu, Weixin;Zheng, Kangfeng;Wu, Bin;Wu, Chunhua;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2781-2800
    • /
    • 2016
  • Emerging attacks aim to access proprietary assets and steal data for business or political motives, such as Operation Aurora and Operation Shady RAT. Skilled Intruders would likely remove their traces on targeted hosts, but their network movements, which are continuously recorded by network devices, cannot be easily eliminated by themselves. However, without complete knowledge about both inbound/outbound and internal traffic, it is difficult for security team to unveil hidden traces of intruders. In this paper, we propose an autonomous anomaly detection system based on behavior profiling and relation mining. The single-hop access profiling model employ a novel linear grouping algorithm PSOLGA to create behavior profiles for each individual server application discovered automatically in historical flow analysis. Besides that, the double-hop access relation model utilizes in-memory graph to mine time-sequenced access relations between different server applications. Using the behavior profiles and relation rules, this approach is able to detect possible anomalies and violations in real-time detection. Finally, the experimental results demonstrate that the designed models are promising in terms of accuracy and computational efficiency.

A Comparative Analysis about Various Editions of Donguibogam (판본별 교감을 통한 『동의보감』의 정본화)

  • Lee, Jeong-Hyeon;Oh, Junho
    • The Journal of Korean Medical History
    • /
    • v.31 no.1
    • /
    • pp.57-70
    • /
    • 2018
  • Much research has already been done on Donguibogam. However, comparison of specific characters was not done because researchers found it difficult to compare different editions of the text in one place. Recently, important editions have been published on the Internet, making comparison possible. In this paper, researchers compare eight editions Donguibogam, including the original edition published in 1613 and seven other editions corrected by the Naeuiwon (Joseon Dynasty National Medical Center). The comparison results were summarized and tabulated. The results of the comparison are analyzed and presented in this article as a chart. The result of comparing the characters and the analyzed graph were in agreement. The authors propose that all written and electronic publications of Donguibogam should refer to other editions implied, quoted or referenced within the text and including with proper citations, and reference the original and first edition. Inadequate referencing will pollute future knowledge of this foundational text of Traditional Korean Medicine and may result in perpetration of mis-information. Based on accumulated knowledge and study of historical Korean Medicine texts, the Namsan edition made a mistake in the editing process. The year of publication of Gabsul-yoengyoeng-gegan Edition needs to be studied again and corrections made where appropriate.

Routing optimization algorithm for logistics virtual monitoring based on VNF dynamic deployment

  • Qiao, Qiujuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1708-1734
    • /
    • 2022
  • In the development of logistics system, the breakthrough of important technologies such as technology platform for logistics information management and control is the key content of the study. Based on Javascript and JQuery, the logistics system realizes real-time monitoring, collection of historical status data, statistical analysis and display, intelligent recommendation and other functions. In order to strengthen the cooperation of warehouse storage, enhance the utilization rate of resources, and achieve the purpose of real-time and visual supervision of transportation equipment and cargo tracking, this paper studies the VNF dynamic deployment and SFC routing problem in the network load change scenario based on the logistics system. The BIP model is used to model the VNF dynamic deployment and routing problem. The optimization objective is to minimize the total cost overhead generated by each SFCR. Furthermore, the application of the SFC mapping algorithm in the routing topology solving problem is proposed. Based on the concept of relative cost and the idea of topology transformation, the SFC-map algorithm can efficiently complete the dynamic deployment of VNF and the routing calculation of SFC by using multi-layer graph. In the simulation platform based on the logistics system, the proposed algorithm is compared with VNF-DRA algorithm and Provision Traffic algorithm in the network receiving rate, throughput, path end-to-end delay, deployment number, running time and utilization rate. According to the test results, it is verified that the test results of the optimization algorithm in this paper are obviously improved compared with the comparison method, and it has higher practical application and promotion value.

The Hazardous Expressway Sections for Drowsy Driving Using Digital Tachograph in Truck (화물차 DTG 데이터를 활용한 고속도로 졸음운전 위험구간 분석)

  • CHO, Jongseok;LEE, Hyunsuk;LEE, Jaeyoung;KIM, Ducknyung
    • Journal of Korean Society of Transportation
    • /
    • v.35 no.2
    • /
    • pp.160-168
    • /
    • 2017
  • In the past 10 years, the accidents caused by drowsy driving have occupied about 23% of all traffic accidents in Korea expressway network and this rate is the highest one among all accident causes. Unlike other types of accidents caused by speeding and distraction to the road, the accidents by drowsy driving should be managed differently because the drowsiness might not be controlled by human's will. To reduce the number of accidents caused by drowsy driving, researchers previously focused on the spot based analysis. However, what we actually need is a segment (link) and occurring time based analysis, rather than spot based analysis. Hence, this research performs initial effort by adapting link concept in terms of drowsy driving on highway. First of all, we analyze the accidents caused by drowsy in historical accident data along with their road environments. Then, links associate with driving time are analyzed using digital tachograph (DTG) data. To carry this out, negative binomial regression models, which are broadly used in the field, including highway safety manual, are used to define the relationship between the number of traffic accidents on expressway and drivers' behavior derived from DTG. From the results, empirical Bayes (EB) and potential for safety improvement (PSI) analysis are performed for potential risk segments of accident caused by drowsy driving on the future. As the result of traffic accidents caused by drowsy driving, the number of the traffic accidents increases with increase in annual average daily traffic (AADT), the proportion of trucks, the amount of DTG data, the average proportion of speeding over 20km/h, the average proportion of deceleration, and the average proportion of sudden lane-changing.

Scenic Image Research Based on Big Data Analysis - Take China's Four Ancient Cities as an Example

  • Liang, Rui;Guo, Hanwen;Liu, Jiayu;Liu, Ziyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2769-2784
    • /
    • 2020
  • This paper aims to compare the scenic images of four ancient Chinese cities including Lijiang, Pingyao, Huizhou and Langzhong, so as to provide specific development strategies for the ancient cities. In this paper, the ancient cities' scenic images are divided into three sub-indexes and eight evaluation dimensions. Based on this, the study first uses Python software to collect tourists' online comments on the four ancient cities. Then, the social network analysis method is used to build a high-frequency keywords matrix of tourist comments and the R language is used to generate a visual network graph. After this, the entropy weight method is used to determine the weights and values of eight evaluation dimensions. Finally, the tourists' overall satisfaction indexes of the four ancient cities are calculated accordingly. The results show that (1) the overall satisfaction of Lijiang is the highest, while that of Huizhou is the lowest; (2) from the weight of each evaluation dimension, it can be seen that tourists care more about the national culture and historical culture; (3) from tourists' satisfaction index on each evaluation dimension of the four ancient cities, we can find that the four ancient cities has their own advantages and disadvantages in tourism development. (4) local tourism-related institutions should strengthen their advantages and improve their deficiencies so as to enhance tourists' overall image of the ancient city.

Comparative Study on Path Design of Traditional Garden and Modernistic Park

  • Ha Jung-A;Toshitaro Minomo
    • Journal of the Korean Institute of Landscape Architecture International Edition
    • /
    • no.2
    • /
    • pp.114-119
    • /
    • 2004
  • By Article two of a Japanese urban park low, it prescribes park facilities strictly, and one of the classifications includes 'path and plaza'. In addition, it is assumed that we divide several kinds different paths of width by size of the park in a path design of a park with a textbook of park design in a trunk line path, the main path, a vice-path or a branch path and design it. From such a thing, in the path of an urban park, a line consists straight of fixed width, and it is most that one pattern is considered to be. Therefore, in modem urban park, a path and division of a plaza are lucid explanation. It is rare that the historical parks which generally former daimyo gardens are shown later, and is used as a kind of an urban park width of the path where was particularly posted in a strolling garden in that is fixed, and width waits straight for even a line and waits, and, for this, there is. As a result, it is a path and the situation that are hard to be distinguished of a plaza. Although there are a difference of design and a difference of pavement materials in modem landscape space when We watch road surface constitution of the path that We did that will let you wait, in gross We are uniform, and it is it with a result to be poor in change nature. From such an observation, this consideration compared traditional landscape space and modem landscape space with path width about two points of road surface constitution through the trial that a graph analyzed the actual place data which measured into and lectured on an ideal method of a park path from this.

  • PDF

Examining the Urban Inclusivity of Xita Koreatown in Shenyang: With a Focus of the Actor-Network Theory (심양 서탑 코리아타운의 도시 포용성 연구: 행위자-연결망 이론을 중심으로)

  • Li, Shenhong;Kim, Minhyoung
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.10
    • /
    • pp.177-189
    • /
    • 2020
  • To newly discover the placeness of Xita Koreatown in Shenyang, this study establishes the conceptual structure of urban inclusivity based on the actor-network theory and the main discourse of inclusive cities. It then applies a framework to the relevant space for analysis. We conduct the case study by first identifying a historical timeline by dividing the age from the founding of New China to the present into sprouting and developing stages of Xita Koreatown, extracting major actors out of time, and finally creating a network graph for each of the six periods representing changes in the region. Throughout this process, we not only analyze the aspect of transition in the urban inclusivity of Xita Koreatown but also prospect the feasibility of an inclusive city for the area. The results of this study are as follows. First, the number and type of actors constituting Xita Koreatown have constantly increased significantly since the establishment of diplomatic relations between China and South Korea. The related actor-networks have also continued to expand in all indicators of urban inclusivity. Secondly, the agency of human actors such as Korean-Chinese, locals, and both South and North Koreans, representing the specificity of Xita Koreatown, has continuously improved. Lastly, due to the increase of cultural exchanges and related policy actors, the actor-network in this region has achieved an unprecedented leap forward. In conclusion, the urban inclusivity of Xita Koreatown in Shenyang shows significant growth in quality, with expectations of further improvement.