• Title/Summary/Keyword: Network

Search Result 58,760, Processing Time 0.063 seconds

Robust Extraction of Lean Tissue Contour From Beef Cut Surface Image

  • Heon Hwang;Lee, Y.K.;Y.r. Chen
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 1996.06c
    • /
    • pp.780-791
    • /
    • 1996
  • A hybrid image processing system which automatically distinguished lean tissues in the image of a complex beef cut surface and generated the lean tissue contour has been developed. Because of the in homegeneous distribution and fuzzy pattern of fat and lean tissue on the beef cut, conventional image segmentation and contour generation algorithm suffer from a heavy computing requirement, algorithm complexity and poor robustness. The proposed system utilizes an artificial neural network enhance the robustness of processing. The system is composed of pre-network , network and post-network processing stages. At the pre-network stage, gray level images of beef cuts were segmented and resized to be adequate to the network input. Features such as fat and bone were enhanced and the enhanced input image was converted tot he grid pattern image, whose grid was formed as 4 X4 pixel size. at the network stage, the normalized gray value of each grid image was taken as the network input. Th pre-trained network generated the grid image output of the isolated lean tissue. A training scheme of the network and the separating performance were presented and analyzed. The developed hybrid system showed the feasibility of the human like robust object segmentation and contour generation for the complex , fuzzy and irregular image.

  • PDF

Design and Verification of Interworking Protocol for CC and SIP in Next Generation Mobile Network (차세대 이동네트워크에서 CC와 SIP 연동 프로토콜의 설계 및 검증)

  • 지승한;박석천
    • Journal of Internet Computing and Services
    • /
    • v.3 no.3
    • /
    • pp.95-104
    • /
    • 2002
  • The interworking for voice service between next generation mobile network and traditional network can be deployed better flexible and expansible network conditions with providing efficiency and economy of network at the same time. So it is essential to develop the interworking strategies together with a evolved network and traditional network. This paper describes a design and verification of internetworking protocol for CC of next generation mobile network and SIP of IP network for applying interworking technology to next generation mobile network, which can harmoniously expropraise voice service from traditional network.

  • PDF

Utility Bounds of Joint Congestion and Medium Access Control for CSMA based Wireless Networks

  • Wang, Tao;Yao, Zheng;Zhang, Baoxian;Li, Cheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.193-214
    • /
    • 2017
  • In this paper, we study the problem of network utility maximization in a CSMA based multi-hop wireless network. Existing work in this aspect typically adopted continuous time Markov model for performance modelling, which fails to consider the channel conflict impact in actual CSMA networks. To maximize the utility of a CSMA based wireless network with channel conflict, in this paper, we first model its weighted network capacity (i.e., network capacity weighted by link queue length) and then propose a distributed link scheduling algorithm, called CSMA based Maximal-Weight Scheduling (C-MWS), to maximize the weighted network capacity. We derive the upper and lower bounds of network utility based on C-MWS. The derived bounds can help us to tune the C-MWS parameters for C-MWS to work in a distributed wireless network. Simulation results show that the joint optimization based on C-MWS can achieve near-optimal network utility when appropriate algorithm parameters are chosen and also show that the derived utility upper bound is very tight.

A Study on Hospital's Intention to Join Network with Private Health Insurance (의료기관의 민간보험사와의 네트워크 구축 의향)

  • Kwon, Young-Dae;Shim, Jae-Sun
    • Korea Journal of Hospital Management
    • /
    • v.11 no.4
    • /
    • pp.63-81
    • /
    • 2006
  • This study was conducted to evaluate needs and intention of hospitals and clinics to join network with private health insurance, and to discover obstacles of participation of the networks. We carried out the questionnaire survey of the network managers of 236 medical institutions between December 27th, 2005 and January 25th, 2006. The result showed that the participation intention of network were different to the type of hospitals. Primary care clinics answered that participation intention and possibility were low. Secondary care hospitals was relatively affirmative regarding a network participation. Tertiary hospitals responded that they need the network with private health insurance, but participation possibility was lower than needs. The reason is that they worried about the side effect of the network with private health insurance. Depending on the type of hospitals, expected benefits from networking with private health insurance were different. We found that hospitals which already had affiliation with other hospitals answered in the affirmative regarding the network with private health insurance. In conclusion, to increase the effectiveness of network systems between hospital and private health insurance, the network is expected to consider different needs of the each hospital.

  • PDF

Hierarchical Folded Hyper-Star Network(HFH): A New Interconnection Network Based on Folded Hyper-Star Network (계층적 Folded 하이퍼-스타 연결망(HFH): Folded 하이퍼-스타 연결망을 기반으로 하는 새로운 상호연결망)

  • Kim, Jong-Seok;Lee, Hyeong-Ok
    • The KIPS Transactions:PartA
    • /
    • v.15A no.2
    • /
    • pp.95-100
    • /
    • 2008
  • In this paper, we propose a new interconnection network topology, hierarchical folded hyper-star network HFH($C_n,\;C_n$), which is based on folded hyper-star network. Our results show that the proposed hierarchical folded hyper-star network performs very competitively in comparison to folded hyper-star network and hierarchical network HCN(m,m), HFN(m,m) have been previously proposed, when diameter ${\times}$ degree is used as a network cost measure. We also investigate various topological properties of HFH($C_n,\;C_n$) including connectivity, routing algorithm, diameter, broadcasting.

A Study on the Network Access Control of a System in Real Time by Network Address Authentication Based on Policy in the VLAN Environments (VLAN 환경에서 네트워크 주소 인증을 통한 정책 기반 실시간 시스템 제어 기술 연구)

  • Choi, Won-Woo;Ahn, Seong-Jin;Chung, Jin-Wook
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.35-43
    • /
    • 2005
  • It is need to control network access that a user personally change own IP or network devices in managing network address. Also, When we use new network devices or assign network address, we do them by design, not arbitrarily. And then, we can immediately control network's problems. It could be used network management and security in low level. But most of managers do this works by hand not automatically. This paper propose the solutions that improve the security by network address authentication in VLAN environment, such as corporations and public offices.

  • PDF

The Investigation of the Leased Line Modem Usability in the Wireless Internet Protocol Network (무선 IP 네트워크에서 전용선 모뎀 사용가능성 검증)

  • PARK, MINHO;Baek, Hae Hyeon;Kum, Dong Won;Choi, Hyungseok;Lee, Jong Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.423-431
    • /
    • 2015
  • A leased line modem usability was evaluated and investigated in the wireless internet protocol(IP) network. The signal of the modem in the circuit switching network was translated to IP packet by using several voice codecs (PCM, G.711A, $G.711{\mu}$, and etc.) and transmitted through the wireless IP network. The wireless IP network was simulated by the Tactical information and communication network Modeling and simulation Software(TMS). The performance and usability of the leased line modem are simulated using the system-in-the-loop(SITL) function of TMS with respect to packet delay, jitter, packet discard ratio, codecs, and wireless link BER.

Network Defense Mechanism Based on Isolated Networks (격리 네트워크를 활용한 네트워크 방어 기법)

  • Jung, Yongbum;Park, Minho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1103-1107
    • /
    • 2016
  • Network assets have been protected from malware infection by checking the integrity of mobile devices through network access control systems, vaccines, or mobile device management. However, most of existing systems apply a uniform security policy to all users, and allow even infected mobile devices to log into the network inside for completion of the integrity checking, which makes it possible that the infected devices behave maliciously inside the network. Therefore, this paper proposes a network defense mechanism based on isolated networks. In the proposed mechanism, every mobile device go through the integrity check system implemented in an isolated network, and can get the network access only if it has been validated successfully.

Comparison of Parallelized Network Coding Performance (네트워크 코딩의 병렬처리 성능비교)

  • Choi, Seong-Min;Park, Joon-Sang;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.19C no.4
    • /
    • pp.247-252
    • /
    • 2012
  • Network coding has been shown to improve various performance metrics in network systems. However, if network coding is implemented as software a huge time delay may be incurred at encoding/decoding stage so it is imperative for network coding to be parallelized to reduce time delay when encoding/decoding. In this paper, we compare the performance of parallelized decoders for random linear network coding (RLC) and pipeline network coding (PNC), a recent development in order to alleviate problems of RLC. We also compare multi-threaded algorithms on multi-core CPUs and massively parallelized algorithms on GPGPU for PNC/RLC.

Effective Feature Selection Model for Network Data Modeling (네트워크 데이터 모델링을 위한 효과적인 성분 선택)

  • Kim, Ho-In;Cho, Jae-Ik;Lee, In-Yong;Moon, Jong-Sub
    • Journal of Broadcast Engineering
    • /
    • v.13 no.1
    • /
    • pp.92-98
    • /
    • 2008
  • Network data modeling is a essential research for the evaluation for intrusion detection systems performance, network modeling and methods for analyzing network data. In network data modeling, real data from the network must be analyzed and the modeled data must be efficiently composed to reflect a sufficient amount of the original data. In this parer the useful elements of real network data were quantified from packets captured from a huge network. Futhermore, a statistical analysis method was used to find the most effective element for efficiently classifying the modeled data.