• Title/Summary/Keyword: Modular networks

Search Result 84, Processing Time 0.023 seconds

The Congestion Control using Multiple Time Scale under Self-Similar Traffic of TCP (TCP의 자기 유사성 트래픽 조건하에서 다중 시간 간격을 이용한 혼잡 제어)

  • 김광준;윤찬호;김천석
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.310-323
    • /
    • 2004
  • In this paper, we extend the multiple time scale control framework to window-based congestion control, in particular, TCP This is performed by interfacing TCP with a large tine scale control nodule which adjusts the aggressiveness of bandwidth consumption behavior exhibited by TCP as a function of "large time scale" network state. i.e., conformation that exceeds the horizon of the feedback loop as determined by RTT Our contribution is threefold. First, we define a modular extension of TCP-a function call with a simple interface-that applies to various flavors of TCP-e.g., Tahoe, Reno, Vegas and show that it significantly improves performance. Second, we show that multiple time scale TCP endows the underlying feedback control with preactivity by bridging the uncertainty gap associated with reactive controls which is exacerbated by the high delay-bandwidth product in broadband wide area networks. Third, we investigate the influence of three traffic control dimensions-tracking ability, connection duration, and fairness-on performance. Performance evaluation of multiple time scale TCP is facilitated by a simulation bench-mark environment which is based on physical modeling of self-similar traffic.

Leak flow prediction during loss of coolant accidents using deep fuzzy neural networks

  • Park, Ji Hun;An, Ye Ji;Yoo, Kwae Hwan;Na, Man Gyun
    • Nuclear Engineering and Technology
    • /
    • v.53 no.8
    • /
    • pp.2547-2555
    • /
    • 2021
  • The frequency of reactor coolant leakage is expected to increase over the lifetime of a nuclear power plant owing to degradation mechanisms, such as flow-acceleration corrosion and stress corrosion cracking. When loss of coolant accidents (LOCAs) occur, several parameters change rapidly depending on the size and location of the cracks. In this study, leak flow during LOCAs is predicted using a deep fuzzy neural network (DFNN) model. The DFNN model is based on fuzzy neural network (FNN) modules and has a structure where the FNN modules are sequentially connected. Because the DFNN model is based on the FNN modules, the performance factors are the number of FNN modules and the parameters of the FNN module. These parameters are determined by a least-squares method combined with a genetic algorithm; the number of FNN modules is determined automatically by cross checking a fitness function using the verification dataset output to prevent an overfitting problem. To acquire the data of LOCAs, an optimized power reactor-1000 was simulated using a modular accident analysis program code. The predicted results of the DFNN model are found to be superior to those predicted in previous works. The leak flow prediction results obtained in this study will be useful to check the core integrity in nuclear power plant during LOCAs. This information is also expected to reduce the workload of the operators.

A Node Mobility-based Adaptive Route Optimization Scheme for Hierarchical Mobile IPv6 Networks (노드 이동성을 고려한 계층적 이동 IPv6 네트워크에서의 적응적 경로 최적화 방안)

  • 황승희;이보경;황종선;한연희
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.474-483
    • /
    • 2003
  • The secret sharing is the basic concept of the threshold cryptosystem and has an important position in the modern cryptography. At 1995, Jarecki proposed the proactive secret sharing to be a solution of existing the mobile adversary and also proposed the share renewal scheme for (k, n) threshold scheme. For n participants in the protocol, his method needs O($n^2$) modular exponentiation per one participant. It is very high computational cost and is not fit for the scalable cryptosystem. In this paper, we propose the efficient share renewal scheme that need only O(n) modular exponentiation per participant. And we prove our scheme is secure if less that ${\frac}\frac{1}{2}n-1$ adversaries exist and they static adversary.

A Study on the Architecture for Avionics System of Jet Fighters (제트 전투기의 항공전자 시스템 아키텍처에 관한 연구)

  • Gook, Kwon Byeong;Won, Son Il
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.1
    • /
    • pp.86-96
    • /
    • 2022
  • The development trend of jet fighter's avionics system architecture is the digitization of subsystem component functions, increased RF sensor sharing, fiber optic channel networks, and modularized integrated structures. The avionics system architecture of the fifth generation jet fighters (F-22, F-35) has evolved into an integrated modular avionics system based on computing function integration and RF integrated sensor systems. The integrated modular avionics system of jet fighters should provide improved combat power, fault tolerance, and ease of jet fighter control. To this aim, this paper presents the direction and requirements of the next-generation jet fighter's avionics system architecture through analysis of the fifth generation jet fighter's avionics system architecture. The core challenge of the integrated modularized avionic system architecture requirements for next-generation fighters is to build a platform that integrates major components and sensors into aircraft. In other words, the architecture of the next-generation fighters is standardization of systems, sensor integration of each subsystem through open interfaces, integration of functional elements, network integration, and integration of pilots and fighters to improve their ability to respond and control.

Analysis of Plants Social Network for Vegetation Conservation on Cheongwansan Provincial Park in Jeollanam-do (천관산도립공원 식생보전을 위한 식물사회네트워크 분석)

  • Ji-Woo Kang;Sang-Cheol Lee;Hyun-Mi Kang
    • Korean Journal of Environment and Ecology
    • /
    • v.37 no.5
    • /
    • pp.392-402
    • /
    • 2023
  • This study was conducted to understand the characteristics of the plant society in Cheongwansan Provincial Park, which lacks research on plants, and to establish basic data necessary for sustainable vegetation management and provincial park research. This study set up 126 quadrats were installed in Cheongwansan Provincial Park to investigate the species that emerged, and interspecies association analysis was conducted focusing on species excluding rare species. The results were written in a sociogram using the Gephi 0.10 program, modular analysis was conducted to distribute groups between adjacent nodes, and network centrality and structure analysis were conducted. As a result of the analysis, the Smilax china showed the highest frequency of appearance in the survey area. Next, it was found to be high in the order of Quercus serrata, Eurya japonica, Styrax japonicus, and Sasa borealis. Interspecies association analysis was conducted on 69 species excluding rare species, and plant social networks were visualized based on benign binding. The Plant Social Network consists of 69 nodes and 396 connecting lines, and one species formed interspecies bonds with an average of about 17.9 species, connecting each other in 2.3 steps. 69 species were divided into three groups through modular analysis, and the first group consisted mainly of evergreen broad-leaved and trees that appeared in warm-temperate region, and the second group consisted mainly of deciduous broad-leaved. The three groups were mainly divided into trees that grow well in sunny and dry sunlight.

Design and Implementation of a Reconfigurable Communication Terminal Platform (재구성 가능한 통신 단말 플랫폼의 설계 및 구현)

  • Lee, Kyoung-Hak;Ko, Hyung-Hwa
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.1
    • /
    • pp.66-73
    • /
    • 2007
  • SDR technology is a fundamental wireless access technology that combines and accommodates multiple wireless communication standards in one transceiver system through just modifying software using modular communication platforms without any hardware modifications for RF and IF signal processing on the basis of high performance DSP devices. Various communication systems that are designed under diverse and complex network environments require the communication platforms on the basis of SDR supporting reorganization to guarantee simple and fast communication interfaces among the respective wireless networks. This paper introduces a main idea on the implementation of platform on the basis of SDR and a communication platform is designed for experiments that is composed of a DSP board with TMS320C6713 CPU, a FPGA board processing IF signals, and a module with RF transceiver processing wireless LAN frequency bandwidth. Various modulation schemes(BPSK, QPSK, and 16QAM) used in communication systems are applied and tested on the designed platform and the test results shows that it is possible to design a reconfigurable communication terminal platform.

  • PDF

Congestion Control with Multiple Time Scale under Self-Similar Traffic (자기유사성 트래픽 조건에서 다중 시간 간격을 이용한 혼잡제어)

  • Park, Dong-Suk;Ra, Sang-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.65-75
    • /
    • 2005
  • Measurement of network traffic have shown that the self-similarity is a ubiquitous phenomenon spanning across diverse network environments. In previous work, we have explored the feasibility of exploiting the long-range correlation structure in a self-similar traffic for the congestion control. We have advanced the framework of the multiple time scale congestion control and showed its effectiveness at enhancing performance for the rate-based feedback control. Our contribution is threefold. First, we define a modular extension of the TCP-a function called with a simple interface-that applies to various flavours of the TCP-e.g., Tahoe, Reno, Vegas and show that it significantly improves performance. Second, we show that a multiple time scale TCP endows the underlying feedback control with proactivity by bridging the uncertainty gap associated with reactive controls which is exacerbated by the high delay-bandwidth product in broadband wide area networks. Third, we investigate the influence of the three traffic control dimensions-tracking ability, connection duration, and fairness-on performance.

Question Answering Optimization via Temporal Representation and Data Augmentation of Dynamic Memory Networks (동적 메모리 네트워크의 시간 표현과 데이터 확장을 통한 질의응답 최적화)

  • Han, Dong-Sig;Lee, Chung-Yeon;Zhang, Byoung-Tak
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.51-56
    • /
    • 2017
  • The research area for solving question answering (QA) problems using artificial intelligence models is in a methodological transition period, and one such architecture, the dynamic memory network (DMN), is drawing attention for two key attributes: its attention mechanism defined by neural network operations and its modular architecture imitating cognition processes during QA of human. In this paper, we increased accuracy of the inferred answers, by adapting an automatic data augmentation method for lacking amount of training data, and by improving the ability of time perception. The experimental results showed that in the 1K-bAbI tasks, the modified DMN achieves 89.21% accuracy and passes twelve tasks which is 13.58% higher with passing four more tasks, as compared with one implementation of DMN. Additionally, DMN's word embedding vectors form strong clusters after training. Moreover, the number of episodic passes and that of supporting facts shows direct correlation, which affects the performance significantly.

A Study on the Performance Improvements of Congestion Control of Multiple Time Scale Under in TCP-MT network (TCP-MT네트워크에서 다중 시간 간격을 이용한 혼잡제어 성능 개선에 관한 연구)

  • Cho, Hyun-Seob;Oh, Myoung-Kwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.1
    • /
    • pp.75-80
    • /
    • 2008
  • Measurement of network traffic have shown that the self-similarity is a ubiquitous phenomenon spanning across diverse network environments. In previous work, we have explored the feasibility of exploiting the long-range correlation structure in a self-similar traffic for the congestion control. We have advanced the framework of the multiple time scale congestion control and showed its effectiveness at enhancing performance for the rate-based feedback control. Our contribution is threefold. First, we define a modular extension of the TCP-a function called with a simple interface-that applies to various flavours of the TCP-e.g., Tahoe, Reno, Vegas and show that it significantly improves performance. Second, we show that a multiple time scale TCP endows the underlying feedback control with proactivity by bridging the uncertainty gap associated with reactive controls which is exacerbated by the high delay-bandwidth product in broadband wide area networks. Third, we investigate the influence of the three traffic control dimensions-tracking ability, connection duration, and fairness-on performance.

A Context-aware Messenger for Sharing User Contextual Information (사용자 컨텍스트 공유를 위한 상황인지 메신저)

  • Hong, Jin-Hyuk;Yang, Sung-Ihk;Cho, Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.9
    • /
    • pp.906-910
    • /
    • 2008
  • As the mobile environment becomes widely used, there is a growth on the concern about recognizing and sharing user context. Sharing context makes the interaction between human more plentiful as well as helps to keep a good social relationship. Recently, it has been applied to some messengers or mobile applications with sharing simple contexts, but it is still required to recognize and share more complex and diverse contexts. In this paper, we propose a context-aware messenger that collects various sensory information, recognizes representative user contexts such as emotion, stress, and activity by using dynamic Bayesian networks, and visualizes them. It includes a modular model that is effective to recognize various contexts and displays them in the form of icons. We have verified the proposed method with the scenario evaluation and usability test.