• 제목/요약/키워드: Internet Generation

검색결과 1,394건 처리시간 0.022초

Energy Forecasting Information System of Optimal Electricity Generation using Fuzzy-based RERNN with GPC

  • Elumalaivasan Poongavanam;Padmanathan Kasinathan;Karunanithi Kandasamy;S. P. Raja
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권10호
    • /
    • pp.2701-2717
    • /
    • 2023
  • In this paper, a hybrid fuzzy-based method is suggested for determining India's best system for power generation. This suggested approach was created using a fuzzy-based combination of the Giza Pyramids Construction (GPC) and Recalling-Enhanced Recurrent Neural Network (RERNN). GPC is a meta-heuristic algorithm that deals with solutions for many groups of problems, whereas RERNN has selective memory properties. The evaluation of the current load requirements and production profile information system is the main objective of the suggested method. The Central Electricity Authority database, the Indian National Load Dispatch Centre, regional load dispatching centers, and annual reports of India were some of the sources used to compile the data regarding profiles of electricity loads, capacity factors, power plant generation, and transmission limits. The RERNN approach makes advantage of the ability to analyze the ideal power generation from energy data, however the optimization of RERNN factor necessitates the employment of a GPC technique. The proposed method was tested using MATLAB, and the findings indicate that it is effective in terms of accuracy, feasibility, and computing efficiency. The suggested hybrid system outperformed conventional models, achieving the top result of 93% accuracy with a shorter computation time of 6814 seconds.

An Investigation into the Relationship between Metaverse Usage Patterns and Cultural Tastes: A Study of Avatar Formation among Generation Z

  • Hyun Ah Park;Kyung Han You
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권6호
    • /
    • pp.1675-1691
    • /
    • 2024
  • The metaverse is an emerging interactive domain that enables people to participate in an array of activities utilizing cutting-edge technologies. Generation Z perceives no substantial distinction between their virtual and actual identities, regarding the virtual world as an extension of reality. As an attempt to apply Bourdieu's theory of cultural taste and cultural capital to the area of the metaverse avatar, investigates the impact of users' cultural tastes on the avatars they create and experience in the metaverse. The research employed both focus group interviews and individual in-depth interviews with users of Generation Z. The study demonstrated that Generation Z users exhibit unrestricted engagement in the metaverse, although their behavior is significantly affected by their economic situation. One's cultural tastes, influenced by diverse interactions with their parents, greatly impact how they engage in cultural activities in the metaverse. Three categories were identified from the perception of avatars: Idealized Self-Representation Avatars, Atypical Self-Representation Avatars, and Integrated Self-Representation Avatars. Perceiving avatars as an extension of the self was associated with higher cultural capital. Participants held divergent perspectives on the metaverse, with certain individuals regarding it as a realm of imagination or a limitless arena for activities.

인터넷 웹 기반의 PMSM 원격 제어시스템 (Internet Web-Based Remote Control System for Permanent Magnet Synchronous Motor Drives)

  • 김대현;최양광;김영석;이을재
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 추계학술대회 논문집 전기기기 및 에너지변환시스템부문
    • /
    • pp.42-44
    • /
    • 2003
  • As the industry is developed, uses of various electric motor are increasing from general home to various fields of industry, and the kind becomes various daily. For these reasons, it is required to study the remote control and a package management about change of a speed drive system, the supervision of administration appliance by real time, and the collection and process data together using internet prevailed on industry whole. This paper deals with the development of a Web-Based remote control system for permanent magnet synchronous motor drives. The client/server system using TCP/IP protocols and DSP controller for remote control through internet and the Web interface that users can confirm data and state of PMSM(Permanent Magnet Synchronous Motor) is developed. This system is available for driving, braking, variable speed control and monitoring for PMSM in real time through administration program of Web-Based.

  • PDF

전자상거래를 위한 128비트 블록 암호 알고리즘의 구현 (An Implementation of 128bit Block Cipher Algorithm for Electronic Commerce)

  • 서장원;전문석
    • 한국전자거래학회지
    • /
    • 제5권1호
    • /
    • pp.55-73
    • /
    • 2000
  • Recently; EC(Electronic Commerce) is increasing with high speed based on the expansion of Internet. EC which is done on the cyber space through Internet has strong point like independence from time and space. On the contrary, it also has weak point like security problem because anybody can access easily to the system due to open network attribute of Internet. Therefore, we need the solutions that protect the security problem for safe and useful EC activity. One of these solutions is the implementation of strong cipher algorithm. NC(Nonpolynomial Complete) cipher algorithm proposed in this paper is good for the security and it overcome the limit of current 64bits cipher algorithm using 128bits key length for input, output and encryption key, Moreover, it is designed for the increase of calculation complexity and probability calculation by adapting more complex design for subkey generation regarded as one of important element effected to encryption. The result of simulation by the comparison with other cipher algorithm for capacity evaluation of proposed NC cipher algorithm is that the speed of encryption and decryption is 7.63 Mbps per block and the speed of subkey generation is 2,42 μ sec per block. So, prosed NC cipher algorithm is regarded as proper level for encryption. Furthermore, speed of subkey generation shows that NC cipher algorithm has the probability used to MAC(Message Authentication Code) and block implementation of Hash function.

  • PDF

A study on Unifying Hanja Variant Groups of Korea and China for LGR (Label Generation Rule) of Internet Top-Level Hangeul Hanja Domain

  • Kim, Kyongsok
    • International journal of advanced smart convergence
    • /
    • 제7권2호
    • /
    • pp.7-21
    • /
    • 2018
  • The author studied the process of unifying Hanja variant groups of Korea and China for LGR (Label Generation Rule) of Internet Top-Level Hangeul Hanja Domain and possible confusion between Hangeul syllable and Hanja character. Among 3518 Chinese variant groups, Korea and China need not review variant groups which include no or just one Korean Hanja character. Korea and China reviewed 304 Chinese variant groups (9% of the 3518 Chinese variant groups) which include two or more Korean Hanja characters. By doing so, Korea and China succeeded in efficiently unifying variant groups. Unification process of variant groups which is the main core of Korea-China coordination and almost final unification result is summarized in this paper. In addition, the author analyzed systematically whether some Hanja character could be confused with a Hangeul syllable and obtained a good result which was not expected at the beginning. Probably this kind of systematic analysis has not been performed in the past and seems the first attempt, which is one of the contributions of this paper. The author also reviewed how to express K-LGR in XML for submission to ICANN.

Advanced Path-Migration Mechanism for Enhancing Signaling Efficiency in IP Multimedia Subsystem

  • Chang, Kai-Di;Chen, Chi-Yuan;Hsu, Shih-Wen;Chao, Han-Chieh;Chen, Jiann-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권1호
    • /
    • pp.305-321
    • /
    • 2012
  • Since Internet Protocol (IP) is the most important protocol in Next Generation Networks (NGNs), 3rd Generation Partnership Project (3GPP) utilizes Session Initial Protocol (SIP) based on IP as the base protocol for negotiating sessions in IP Multimedia Subsystem (IMS). Different from traditional circuit-switched network, in IMS, the media traffic and signaling are delivered through IP transport. The media traffic may affect the signaling efficiency in core network, due to traffic collisions and best effort packets delivery. This paper proposes a novel path-migration mechanism for enhancing the traffic efficiency in integrated NGN-IMS. The simulation results show that the interference and traffic collision can be reduce by applying proposed path-migration mechanism and the signaling efficiency in core network can be improved with higher system capability and voice quality.

Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet Applications

  • Shim, Kyu-Seok;Goo, Young-Hoon;Lee, Dongcheul;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1284-1297
    • /
    • 2019
  • The network environment is presently becoming very increased. Accordingly, the study of traffic classification for network management is becoming difficult. Automatic signature extraction system is a hot topic in the field of traffic classification research. However, existing automatic payload signature generation systems suffer problems such as semi-automatic system, generating of disposable signatures, generating of false-positive signatures and signatures are not kept up to date. Therefore, we provide a fully automatic signature update system that automatically performs all the processes, such as traffic collection, signature generation, signature management and signature verification. The step of traffic collection automatically collects ground-truth traffic through the traffic measurement agent (TMA) and traffic management server (TMS). The step of signature management removes unnecessary signatures. The step of signature generation generates new signatures. Finally, the step of signature verification removes the false-positive signatures. The proposed system can solve the problems of existing systems. The result of this system to a campus network showed that, in the case of four applications, high recall values and low false-positive rates can be maintained.

An Efficient Service Function Chains Orchestration Algorithm for Mobile Edge Computing

  • Wang, Xiulei;Xu, Bo;Jin, Fenglin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권12호
    • /
    • pp.4364-4384
    • /
    • 2021
  • The dynamic network state and the mobility of the terminals make the service function chain (SFC) orchestration mechanisms based on static and deterministic assumptions hard to be applied in SDN/NFV mobile edge computing networks. Designing dynamic and online SFC orchestration mechanism can greatly improve the execution efficiency of compute-intensive and resource-hungry applications in mobile edge computing networks. In order to increase the overall profit of service provider and reduce the resource cost, the system running time is divided into a sequence of time slots and a dynamic orchestration scheme based on an improved column generation algorithm is proposed in each slot. Firstly, the SFC dynamic orchestration problem is formulated as an integer linear programming (ILP) model based on layered graph. Then, in order to reduce the computation costs, a column generation model is used to simplify the ILP model. Finally, a two-stage heuristic algorithm based on greedy strategy is proposed. Four metrics are defined and the performance of the proposed algorithm is evaluated based on simulation. The results show that our proposal significantly provides more than 30% reduction of run time and about 12% improvement in service deployment success ratio compared to the Viterbi algorithm based mechanism.

Securing Internet-based SCADA Wireless Component Communication

  • Robles, Rosslin John;Kim, Tai-hoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제4권1호
    • /
    • pp.3-7
    • /
    • 2012
  • Traditionally SCADA is connected only in a limited private network. With new technology and facilities, there are also demands of connecting SCADA though the internet. The internet SCADA facility has brought a lot of advantages in terms of control, data viewing and generation. Aside from connecting SCADA to the internet, there are also operators who want to connect their system wirelessly. This can save budget for communication lines. Along with the advantages it brings, are security issues regarding wireless internet SCADA. In this paper, we discuss internet SCADA, its connection through wireless communication and the security issues surrounding it. To answer the security issues, a symmetric-key encryption for internet SCADA is proposed.

차세대 광 인터넷 백본망에서 망생존성을 위한 Fault/Attack Management 프레임워크 (Fault/Attack Management Framework for Network Survivability in Next Generation Optical Internet Backbone)

  • 김성운;이준원
    • 대한전자공학회논문지TC
    • /
    • 제40권10호
    • /
    • pp.67-78
    • /
    • 2003
  • 인터넷 트래픽의 폭발적인 증가로 인한 높은 대역폭의 요구와 광 네트워크 기술이 발전되면서 DWDM 네트워크가 국가적 혹은 범세계적인 차세대 광 인터넷(NGOI) 백본망의 대안으로 인식되고 있다. 이러한 DWDM 네트워크 기반의 NGOI에서는 RWA(Routing and Wavelength Assignment) 문제와 생존성이 중요한 이슈가 되고 있다. 특히 높은 데이터 전송율을 가지는 DWDM 네트워크에서 일어나는 짧은 서비스 파괴는 막대한 트래픽 손실을 야기하므로, AOTN에서의 fault/attack 검출, 지역화, 그리고 회복시킴은 가장 중요한 이슈 중 하나가 된다. 본 논문에서는 다양한 광 백본망 소자들의 fault/attack 취약성 분석을 통한 fault/attack 관리 모델을 제안하고, IP/GMPLS over DWDM 내의 제어프로토콜인 Extended-LMP (Link Management Protocol)와 RSVP-TE+(Resource Reservation Protocol-Traffic Engineering)를 이용하여 fault/attack 회복 절차를 제시한다.