• Title/Summary/Keyword: Language Network Method

Search Result 292, Processing Time 0.027 seconds

Formal Modeling and Verification of an Enhanced Variant of the IEEE 802.11 CSMA/CA Protocol

  • Hammal, Youcef;Ben-Othman, Jalel;Mokdad, Lynda;Abdelli, Abdelkrim
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.385-396
    • /
    • 2014
  • In this paper, we present a formal method for modeling and checking an enhanced version of the carrier sense multiple access with collision avoidance protocol related to the IEEE 802.11 MAC layer, which has been proposed as the standard protocol for wireless local area networks. We deal mainly with the distributed coordination function (DCF) procedure of this protocol throughout a sequence of transformation steps. First, we use the unified modeling language state machines to thoroughly capture the behavior of wireless stations implementing a DCF, and then translate them into the input language of the UPPAAL model checking tool, which is a network of communicating timed automata. Finally, we proceed by checking of some of the safety and liveness properties, such as deadlock-freedom, using this tool.

A Study on Feedback Control and Development of chaotic Analysis Simulator for Chaotic Nonlinear Dynamic Systems (Chaotic 비선형 동역학 시스템의 Chaotic 현상 분석 시뮬레이터의 개발과 궤환제어에 관한 연구)

  • Kim, Jeong-D.;Jung, Do-Young
    • Proceedings of the KIEE Conference
    • /
    • 1996.11a
    • /
    • pp.407-410
    • /
    • 1996
  • In this Paper, we propose the feedback method having neural network to control the chaotic signals to periodic signals. This controller has very simple structure, it is immune to small parameter variations, the precise access to system parameters is not required and it is possible to follow ones of its inherent periodic orbits or the desired orbits without error, The controller consist of linear feedback gain and neural network. The learning of neural network is achieved by error-backpropagation algorithm. To prove and analyze the proposed method, we construct a software tool using c-language.

  • PDF

Implementation of Wireless Network simulator considering a User's Call Characteristics (사용자 통화 특성을 고려한 무선 네트워크 시뮬레이터 구현)

  • Yoon, Young Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.107-115
    • /
    • 2009
  • Traditionally, simulation method is used to test and evaluate the performance of communication protocol or functional elements for mobile communication service. In this paper, wireless network simulator is implemented using the C++ object-oriented programming language. This simulator can simulate wireless data services, like as ad-hoc networks, by considering the user's mobility. In this paper, the simulator includes network traffic model to reflect wireless data service and traffic source model to represent a user's mobility similar to real service environment and traffic characteristics can be reflected on the simulation, and also more accurate simulation results can be got through that. In addition, by using object-oriented techniques, new service feature or environment can be easily added or changed so that the developed mobile communication simulator can reflect the real service environment all the time. This simulator can be used in adjusting the characteristics of wireless data hosts following the mobility of the user, and also can be used in building new wireless ad-hoc network routing protocols.

A Study on the Development of Embedded System Software for Ubiquitous Sensor Network (UML을 이용한 유비쿼터스 센서 네트워크용 임베디드 시스템 소프트웨어 개발에 관한 연구)

  • Cho, Jong-Won;Lim, Dong-Jin
    • Proceedings of the KIEE Conference
    • /
    • 2008.04a
    • /
    • pp.47-48
    • /
    • 2008
  • UML(Unified Modeling Language) is the most frequently used modeling language in the process of analysis, design, implementation and etc. The main reason of using UML is not only to help users to work visually but also to draw better communication among developers. In addition, UML is one of the global standards and supports MDA. In this paper embedded software development method for USN using UML is discussed To show how the development method is used, IEEE 802.15.4 radio module are programmed using UML software tool.

  • PDF

Predicate Recognition Method using BiLSTM Model and Morpheme Features (BiLSTM 모델과 형태소 자질을 이용한 서술어 인식 방법)

  • Nam, Chung-Hyeon;Jang, Kyung-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.24-29
    • /
    • 2022
  • Semantic role labeling task used in various natural language processing fields, such as information extraction and question answering systems, is the task of identifying the arugments for a given sentence and predicate. Predicate used as semantic role labeling input are extracted using lexical analysis results such as POS-tagging, but the problem is that predicate can't extract all linguistic patterns because predicate in korean language has various patterns, depending on the meaning of sentence. In this paper, we propose a korean predicate recognition method using neural network model with pre-trained embedding models and lexical features. The experiments compare the performance on the hyper parameters of models and with or without the use of embedding models and lexical features. As a result, we confirm that the performance of the proposed neural network model was 92.63%.

Extension of legacy gear design systems using XML and XSLT (XML과 XSLT를 이용한 레거시 기어 설계 시스템의 확장에 관한 연구)

  • 정태형;박승현
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2001.10a
    • /
    • pp.257-262
    • /
    • 2001
  • As computer-related technologies have been developed, legacy design systems have not been appropriate for new computing environment. Therefore, it is necessary that most of them are either modified or newly developed. However, this requires quite much amount of cost and time. This paper presents a method of extending legacy design system without modification using XML and XSLT. In order to apply the developed method, a good example of legacy design systems, AGMA gear rating system has been extended so as to be suitable for the distributed computing environment. An XML document for AGMA gear rating process is defined. It is transformed to the form of the input document of AGMA gear rating system by XSLT processor according to the transformation rules defined in the AGMA gear rating XSLT document. After that, AGMA gear rating system reads this input document and generates an output document in the server. These operations are automatically executed by the external legacy system controller without user interactions. Using these operations, AGMA gear rating web service has been developed based on SOAP and WSDL to provide the functions of legacy AGMA gear rating system through the distributed network. Any system or user can implement AGMA gear rating process independently to the platform type, without making it for oneself, by simply referring the AGMA gear rating web service via Internet.

  • PDF

Classification of HTTP Automated Software Communication Behavior Using a NoSQL Database

  • Tran, Manh Cong;Nakamura, Yasuhiro
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.2
    • /
    • pp.94-99
    • /
    • 2016
  • Application layer attacks have for years posed an ever-serious threat to network security, since they always come after a technically legitimate connection has been established. In recent years, cyber criminals have turned to fully exploiting the web as a medium of communication to launch a variety of forbidden or illicit activities by spreading malicious automated software (auto-ware) such as adware, spyware, or bots. When this malicious auto-ware infects a network, it will act like a robot, mimic normal behavior of web access, and bypass the network firewall or intrusion detection system. Besides that, in a private and large network, with huge Hypertext Transfer Protocol (HTTP) traffic generated each day, communication behavior identification and classification of auto-ware is a challenge. In this paper, based on a previous study, analysis of auto-ware communication behavior, and with the addition of new features, a method for classification of HTTP auto-ware communication is proposed. For that, a Not Only Structured Query Language (NoSQL) database is applied to handle large volumes of unstructured HTTP requests captured every day. The method is tested with real HTTP traffic data collected through a proxy server of a private network, providing good results in the classification and detection of suspicious auto-ware web access.

Emotion Recognition and Expression Method using Bi-Modal Sensor Fusion Algorithm (다중 센서 융합 알고리즘을 이용한 감정인식 및 표현기법)

  • Joo, Jong-Tae;Jang, In-Hun;Yang, Hyun-Chang;Sim, Kwee-Bo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.8
    • /
    • pp.754-759
    • /
    • 2007
  • In this paper, we proposed the Bi-Modal Sensor Fusion Algorithm which is the emotional recognition method that be able to classify 4 emotions (Happy, Sad, Angry, Surprise) by using facial image and speech signal together. We extract the feature vectors from speech signal using acoustic feature without language feature and classify emotional pattern using Neural-Network. We also make the feature selection of mouth, eyes and eyebrows from facial image. and extracted feature vectors that apply to Principal Component Analysis(PCA) remakes low dimension feature vector. So we proposed method to fused into result value of emotion recognition by using facial image and speech.

Evaluation of Similarity Analysis of Newspaper Article Using Natural Language Processing

  • Ayako Ohshiro;Takeo Okazaki;Takashi Kano;Shinichiro Ueda
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.1-7
    • /
    • 2024
  • Comparing text features involves evaluating the "similarity" between texts. It is crucial to use appropriate similarity measures when comparing similarities. This study utilized various techniques to assess the similarities between newspaper articles, including deep learning and a previously proposed method: a combination of Pointwise Mutual Information (PMI) and Word Pair Matching (WPM), denoted as PMI+WPM. For performance comparison, law data from medical research in Japan were utilized as validation data in evaluating the PMI+WPM method. The distribution of similarities in text data varies depending on the evaluation technique and genre, as revealed by the comparative analysis. For newspaper data, non-deep learning methods demonstrated better similarity evaluation accuracy than deep learning methods. Additionally, evaluating similarities in law data is more challenging than in newspaper articles. Despite deep learning being the prevalent method for evaluating textual similarities, this study demonstrates that non-deep learning methods can be effective regarding Japanese-based texts.

CNN-based Skip-Gram Method for Improving Classification Accuracy of Chinese Text

  • Xu, Wenhua;Huang, Hao;Zhang, Jie;Gu, Hao;Yang, Jie;Gui, Guan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6080-6096
    • /
    • 2019
  • Text classification is one of the fundamental techniques in natural language processing. Numerous studies are based on text classification, such as news subject classification, question answering system classification, and movie review classification. Traditional text classification methods are used to extract features and then classify them. However, traditional methods are too complex to operate, and their accuracy is not sufficiently high. Recently, convolutional neural network (CNN) based one-hot method has been proposed in text classification to solve this problem. In this paper, we propose an improved method using CNN based skip-gram method for Chinese text classification and it conducts in Sogou news corpus. Experimental results indicate that CNN with the skip-gram model performs more efficiently than CNN-based one-hot method.