• Title/Summary/Keyword: Hybrid Network System

Search Result 603, Processing Time 0.03 seconds

SymCSN : a Neuro-Symbolic Model for Flexible Knowledge Representation and Inference (SymCSN : 유연한 지식 표현 및 추론을 위한 기호-연결주의 모델)

  • 노희섭;안홍섭;김명원
    • Korean Journal of Cognitive Science
    • /
    • v.10 no.4
    • /
    • pp.71-83
    • /
    • 1999
  • Conventional symbolic inference systems lack flexibility because they do not well reflect flexible semantic structure of knowledge and use symbolic logic for their basic inference mechanism. For solving this problem. we have recently proposed the 'Connectionist Semantic Network(CSN)' as a model for flexible knowledge representation and inference based on neural networks. The CSN is capable of carrying out both approximate reasoning and commonsense reasoning based on similarity and association. However. we have difficulties in representing general and structured high-level knowledge and variable binding using the connectionist framework of the CSN. In this paper. we propose a hybrid system called SymCSN(Symbolic CSN) that combines a symbolic module for representing general and structured high-level knowledge and a connectionist module for representing and learning low-level semantic structure Simulation results show that the SymCSN is a plausible model for human-like flexible knowledge representation and inference.

  • PDF

E-Business and Simulation

  • Park, Sung-Joo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2001.10a
    • /
    • pp.9-10
    • /
    • 2001
  • Simulation has been evolved with the advance of computer and technique of modeling application systems. Early simulations were numerical analysis of engineering models known as continuous simulation, analysis of random events using various random number generators thus named as Monte Carlo simulation, iud analysis o(\\\\`queues which are prevalent in many real world systems including manufacturing, transportation, telecommunication. Discrete-event simulation has been used far modeling and analyzing the systems with waiting lines and inefficient delays. These simulations, either discrete-event, continuous, or hybrid, have played a key role in industrial age by helping to design and implement the efficient real world systems. In the information age which has been brought up by the advent of Internet, e-business has emerged. E-business, any business using Internet, can be characterized by the network of extended enterprises---extended supply and demand chains. The extension of value chains spans far reaching scope in business functions and space globally. It also extends to the individual customer, customer preferences and behaviors, to find the best service and product fit for each individual---mass customization. Simulation should also play a key role in analyzing and evaluating the various phenomena of e-business where the phenomena can be characterized by dynamics, uncertainty, and complexity. In this tutorial, applications of simulation to e-business phenomena will be explained and illustrated. Examples are the dynamics of new economy, analysis of e-business processes, virtual manufacturing system, digital divide phenomena, etc. Partly influenced by e-business, a new trend of simulation has emerged called agent-based simulation, Agent-based simulation is a technique of simulation using software agent that have autonomy and proactivity which are useful in analyzing and integrating numerous individual customer's behavior. One particular form of agent-based simulation is swarm. This tutorial concludes with the illustration of swarm or swarm Intelligence applied to various e-business applications, and future directions and implications of this new trend of simulation.

  • PDF

A Hybrid Vulnerability of NFC Technology in Smart Phone (스마트폰에서 NFC를 이용한 융.복합 하이브리드 취약점)

  • Park, Chang Min;Park, Neo;Park, Won Hyung
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.3-8
    • /
    • 2012
  • Smartphones have all the recent technology integration and NFC (Near Field Communication) Technology is one of them and become an essential these days. Despite using smartphones with NFC technology widely, not many security vulnerabilities have been discovered. This paper attempts to identify characteristics and various services in NFC technology, and to present a wide range of security vulnerabilities, prevention, and policies especially in NFC Contactless technology. We describe a security vulnerability and an possible threat based on human vulnerability and traditional malware distribution technic using Peer-to-Peer network on NFC-Enabled smartphones. The vulnerability is as follows: An attacker creates a NFC tag for distributing his or her malicious code to unspecified individuals and apply to hidden spot near by NFC reader in public transport like subway system. The tag will direct smartphone users to a certain website and automatically downloads malicious codes into their smartphones. The infected devices actually help to spread malicious code using P2P mode and finally as traditional DDoS attack, a certain target will be attacked by them at scheduled time.

Health monitoring sensor placement optimization for Canton Tower using virus monkey algorithm

  • Yi, Ting-Hua;Li, Hong-Nan;Zhang, Xu-Dong
    • Smart Structures and Systems
    • /
    • v.15 no.5
    • /
    • pp.1373-1392
    • /
    • 2015
  • Placing sensors at appropriate locations is an important task in the design of an efficient structural health monitoring (SHM) system for a large-scale civil structure. In this paper, a hybrid optimization algorithm called virus monkey algorithm (VMA) based on the virus theory of evolution is proposed to seek the optimal placement of sensors. Firstly, the dual-structure coding method is adopted instead of binary coding method to code the solution. Then, the VMA is designed to incorporate two populations, a monkey population and a virus population, enabling the horizontal propagation between the monkey and virus individuals and the vertical inheritance of monkey's position information from the previous to following position. Correspondingly, the monkey population in this paper is divided into the superior and inferior monkey populations, and the virus population is divided into the serious and slight virus populations. The serious virus is used to infect the inferior monkey to make it escape from the local optima, while the slight virus is adopted to infect the superior monkey to let it find a better result in the nearby area. This kind of novel virus infection operator enables the coevolution of monkey and virus populations. Finally, the effectiveness of the proposed VMA is demonstrated by designing the sensor network of the Canton Tower, the tallest TV Tower in China. Results show that innovations in the VMA proposed in this paper can improve the convergence of algorithm compared with the original monkey algorithm (MA).

Analysis of Adjacent Channel Interference for WCDMA ATC Service Frequency Allocation Operating in MSS Band (MSS 대역 WCDMA ATC 서비스 주파수 할당을 위한 인접 채널 간섭 분석)

  • Kang, Young-Heung;Jeong, Nam-Ho;Oh, Dae-Sub
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.11
    • /
    • pp.1288-1296
    • /
    • 2012
  • A candidate hybrid satellite and terrestrial network architecture, MSS/ATC(Mobile Satellite Service/Ancillary Terrestrial Component), is proposed for utilizing efficiently the exist MSS bands. Studies on the adjacent channel interference from the existing terrestrial mobile services and MSS/ATC itself are important to allocate a new ATC service frequency in MSS band. In this paper, we have analyzed the minimum permission power of terrestrial base station and the capacity loss with parameters of ACIR, number of MS(mobile Station) and MES(Mobile Earth Station) in uplink, and also, the capacity performance based on 1 beam and 1 cell assumption for MSS/ATC in downlink. The ACIR requirements are estimated in two MSS/ATC frequency allocation scenarios for 5 MHz and 10 MHz guard band to share spectrum with adjacent systems, and according to these ACIR requirements the service coverage and the receiver filter for ATC system should be designed in near future.

Customer Churn Prediction of Automobile Insurance by Multiple Models (다중모델을 이용한 자동차 보험 고객의 이탈예측)

  • LeeS Jae-Sik;Lee Jin-Chun
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.2
    • /
    • pp.167-183
    • /
    • 2006
  • Since data mining attempts to find unknown facts or rules by dealing with also vaguely-known data sets, it always suffers from high error rate. In order to reduce the error rate, many researchers have employed multiple models in solving a problem. In this research, we present a new type of multiple models, called DyMoS, whose unique feature is that it classifies the input data and applies the different model developed appropriately for each class of data. In order to evaluate the performance of DyMoS, we applied it to a real customer churn problem of an automobile insurance company, The result shows that the DyMoS outperformed any model which employed only one data mining technique such as artificial neural network, decision tree and case-based reasoning.

  • PDF

Design of MAC Chip for AWG Based WDM-PON - I : Input/Output Nodule (AWG 기반 WDM-PON을 위한 MAC 칩 설계- I: 입출력 모듈)

  • Yang, Won-Hyuk;Han, Kyeong-Eun;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.6B
    • /
    • pp.456-468
    • /
    • 2008
  • In this paper, we design Input/Output modules as a preference work for implementation of hybrid two stage AWG based WDM-PON and verify operations of each function modules through the logic simulation. This WDM-PON system provides service to 128 ONUs through 32 wavelength and one wavelength is shared for upstream transmission with four ONU while each wavelength is allocated to each ONU for downstream transmission. The designed WDM-PON MAC chip is based on sub-MAC which consists of one control unit and reception unit and four transmission unit. To design the reception and transmission unit of sub-MAC, we define the functions of the sub-MAC, pins of the modules, control signal and timing of each signal. We intend to design MAC chip with 1Gbps transmission rate. Thus the designed MAC chip is worked on 125MHz clock rate. We define FSM and design Input/Output modules with VHDL. The logic simulation of the modules is executed by the ModelSIM simulator.

Nonhermetic Plastic Packaged Optical Modules of Passive Optical Fiber Alignment Method (수동 광섬유정렬을 이용한 Nohermetic 플라스틱 패키지 광모듈)

  • Lim, Dong-Cheol;Lee, Won-Jong;Kang, Suk-Youb;Park, Hyo-Dal
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1053-1058
    • /
    • 2006
  • In this paper, We proposed a efficient OSA(Optical Sub-Assembly) packaging method in use 1.31/1.49um bi-directional hybrid-integrated PLC chip for low-cost OSA in optical access network system applications as GE-PON in FTTH. Fabricated OSA with passive optical fiber alignment and nonhermetic plastic package method and measured optical coupling efficiency and electric-optical characteristics. Its performance is feasible to satisfy the GE-PON ONU specifications with the results as less than 0.5dB coupling losses within 40um alignment of z-axis and less than -24dBm sensitivity. It also has good temperature characteristics to sustain optical output power more than 1.5mW and 10dB extinction ratio, less than 0.3dB tracking error.

An Adaptive Transmission Power Control Algorithm for Wearable Healthcare Systems Based on Variations in the Body Conditions

  • Lee, Woosik;Kim, Namgi;Lee, Byoung-Dai
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.593-603
    • /
    • 2019
  • In wearable healthcare systems, sensor devices can be deployed in places around the human body such as the stomach, back, arms, and legs. The sensors use tiny batteries, which have limited resources, and old sensor batteries must be replaced with new batteries. It is difficult to deploy sensor devices directly into the human body. Therefore, instead of replacing sensor batteries, increasing the lifetime of sensor devices is more efficient. A transmission power control (TPC) algorithm is a representative technique to increase the lifetime of sensor devices. Sensor devices using a TPC algorithm control their transmission power level (TPL) to reduce battery energy consumption. The TPC algorithm operates on a closed-loop mechanism that consists of two parts, such as sensor and sink devices. Most previous research considered only the sink part of devices in the closed-loop. If we consider both the sensor and sink parts of a closed-loop mechanism, sensor devices reduce energy consumption more than previous systems that only consider the sensor part. In this paper, we propose a new approach to consider both the sensor and sink as part of a closed-loop mechanism for efficient energy management of sensor devices. Our proposed approach judges the current channel condition based on the values of various body sensors. If the current channel is not optimal, sensor devices maintain their current TPL without communication to save the sensor's batteries. Otherwise, they find an optimal TPL. To compare performance with other TPC algorithms, we implemented a TPC algorithm and embedded it into sensor devices. Our experimental results show that our new algorithm is better than other TPC algorithms, such as linear, binary, hybrid, and ATPC.

Question Similarity Measurement of Chinese Crop Diseases and Insect Pests Based on Mixed Information Extraction

  • Zhou, Han;Guo, Xuchao;Liu, Chengqi;Tang, Zhan;Lu, Shuhan;Li, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.3991-4010
    • /
    • 2021
  • The Question Similarity Measurement of Chinese Crop Diseases and Insect Pests (QSM-CCD&IP) aims to judge the user's tendency to ask questions regarding input problems. The measurement is the basis of the Agricultural Knowledge Question and Answering (Q & A) system, information retrieval, and other tasks. However, the corpus and measurement methods available in this field have some deficiencies. In addition, error propagation may occur when the word boundary features and local context information are ignored when the general method embeds sentences. Hence, these factors make the task challenging. To solve the above problems and tackle the Question Similarity Measurement task in this work, a corpus on Chinese crop diseases and insect pests(CCDIP), which contains 13 categories, was established. Then, taking the CCDIP as the research object, this study proposes a Chinese agricultural text similarity matching model, namely, the AgrCQS. This model is based on mixed information extraction. Specifically, the hybrid embedding layer can enrich character information and improve the recognition ability of the model on the word boundary. The multi-scale local information can be extracted by multi-core convolutional neural network based on multi-weight (MM-CNN). The self-attention mechanism can enhance the fusion ability of the model on global information. In this research, the performance of the AgrCQS on the CCDIP is verified, and three benchmark datasets, namely, AFQMC, LCQMC, and BQ, are used. The accuracy rates are 93.92%, 74.42%, 86.35%, and 83.05%, respectively, which are higher than that of baseline systems without using any external knowledge. Additionally, the proposed method module can be extracted separately and applied to other models, thus providing reference for related research.