• Title/Summary/Keyword: Network Convergence

Search Result 4,073, Processing Time 0.029 seconds

3D Object Generation and Renderer System based on VAE ResNet-GAN

  • Min-Su Yu;Tae-Won Jung;GyoungHyun Kim;Soonchul Kwon;Kye-Dong Jung
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.142-146
    • /
    • 2023
  • We present a method for generating 3D structures and rendering objects by combining VAE (Variational Autoencoder) and GAN (Generative Adversarial Network). This approach focuses on generating and rendering 3D models with improved quality using residual learning as the learning method for the encoder. We deep stack the encoder layers to accurately reflect the features of the image and apply residual blocks to solve the problems of deep layers to improve the encoder performance. This solves the problems of gradient vanishing and exploding, which are problems when constructing a deep neural network, and creates a 3D model of improved quality. To accurately extract image features, we construct deep layers of the encoder model and apply the residual function to learning to model with more detailed information. The generated model has more detailed voxels for more accurate representation, is rendered by adding materials and lighting, and is finally converted into a mesh model. 3D models have excellent visual quality and accuracy, making them useful in various fields such as virtual reality, game development, and metaverse.

A study on nonlinear channel equalization using RBF network (RBF 네트워크를 이용한 비선형 채널 등화에 관한 연구)

  • 전선도;위진우;강철호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.1
    • /
    • pp.64-71
    • /
    • 1997
  • Digital communication channels are imparied by linear effects such as dispersion, ISI(intersymbol Interference), fading phenomenon etc. But, the practical channel equalization system is required to design for compensating the nonlinear distortion caused by harmonic distortion etc. This paper is a study on the performance of nonlinear channel equalization using RBF(Radial Basis Funclion) network, which has the equivalent structure to the optimal Basian filter. Expecially, the variance of RBF network is modifiedby nonlinear polynomial filters to compare the convergence characteristic of nonlinear channel equalization. Experimental results show that the modified RBF network achieves the faster convergence property than conventional RBF network. Moreover, the RBF network ofhigher order variance modified represents the better performance than that of lower order variance in the bandpass channels and second/third order polynomial channels.

  • PDF

A Study on Development for Multiplexing of CAR Network with Controller Area Network (CAN) Communication Protocol (Controller Area Network (CAN) 통신 프로토콜을 사용한 자동차 Network의 다중화 기법의 개발에 관한 연구)

  • 정차근
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2001.06a
    • /
    • pp.29-32
    • /
    • 2001
  • This paper describes a development of the integrated controller system for car electrical signal control with CAN communication protocol. The CAN protocol is a robust serial bus system for the control of distributed module in the multiplexed network. After a brief of the main features of the CAN will be addressed, this paper presents the result of the development of the integrated hardware system overall control program.

  • PDF

A Study on Development of Long-Term Runoff Model for Water Resources Planning and Management (수자원의 이용계획을 위한 장기유출모형의 개발에 관한 연구)

  • Cho, Hyeon-Kyeong
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.16 no.3
    • /
    • pp.61-68
    • /
    • 2013
  • Long-term runoff model can be used to establish the effective plan of water reources allocation and the determination of the storage capacity of reservoir. So this study aims at the development of monthly runoff model using artificial neural network technique. For this, it was selected multi-layer neural network(MLN) and radial basis function neural network(RFN) model. In this study, it was applied model to analysis monthly runoff process at the Wi stream basin in Nakdong river which is representative experimental river basin of IHP. For this, multi-layer neural network model tried to construct input 3, hidden 7, and output 1 for each number of layer. As the result of analysis of monthly runoff process using models connected with artificial neural network technique, it showed that these models were effective in the simulation of monthly runoff.

Max Flow Algorithm for the Network Flow Optimization (물류 유통을 최적화하기 위한 네트워크-유통 알고리즘)

  • Rhee, Chung-Sei;Jin, Ming-He
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.65-71
    • /
    • 2008
  • Network Flow has been playing important role in the modern industrial society. No matter what people or company run the network, both of them can't avoid circulating goods among the many branches. But in practical situations, not only the price rising in network increase the transportation costs, but the huge traffic flow volumes increase the transportation costs. Given to such a network environment, how to flow goods in the network is very important. In this paper, the MAX-Flow algorithm will be applied to network flow in order to maximize the network flow volumes. As far as the functions of network are correctly provided, the optimized network system always can make the flow process efficiently.

  • PDF

A Network Performance Analysis System based on Network Monitoring for Analyzing Abnormal Traffic (비정상 트래픽 분석을 위한 네트워크 모니터링 기반의 네트워크 성능 분석 시스템)

  • Kim, So-Hung;Koo, Ja-Hwan;Kim, Sung Hae;Choi, Jang-Won;An, Sung-Jin
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.1-8
    • /
    • 2004
  • Large distributed systems such as computational and data grids require that a substantial amount of monitoring data be collected for various tasks such as fault detection, performance analysis, performance tuning, performance prediction, security analysis and scheduling. to cope with this problem, they are needed network monitoring architecture which can collect various network characteristic and analyze network security state. In this paper, we suggest network performance and security analysis system based on network monitoring. The System suggest that users can see distance network state with tuning network parameters.

  • PDF

A Study on the Network Access Control of a System in Real Time by Network Address Authentication Based on Policy in the VLAN Environments (VLAN 환경에서 네트워크 주소 인증을 통한 정책 기반 실시간 시스템 제어 기술 연구)

  • Choi, Won-Woo;Ahn, Seong-Jin;Chung, Jin-Wook
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.35-43
    • /
    • 2005
  • It is need to control network access that a user personally change own IP or network devices in managing network address. Also, When we use new network devices or assign network address, we do them by design, not arbitrarily. And then, we can immediately control network's problems. It could be used network management and security in low level. But most of managers do this works by hand not automatically. This paper propose the solutions that improve the security by network address authentication in VLAN environment, such as corporations and public offices.

  • PDF

Network Defense Mechanism Based on Isolated Networks (격리 네트워크를 활용한 네트워크 방어 기법)

  • Jung, Yongbum;Park, Minho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1103-1107
    • /
    • 2016
  • Network assets have been protected from malware infection by checking the integrity of mobile devices through network access control systems, vaccines, or mobile device management. However, most of existing systems apply a uniform security policy to all users, and allow even infected mobile devices to log into the network inside for completion of the integrity checking, which makes it possible that the infected devices behave maliciously inside the network. Therefore, this paper proposes a network defense mechanism based on isolated networks. In the proposed mechanism, every mobile device go through the integrity check system implemented in an isolated network, and can get the network access only if it has been validated successfully.

Analyses of requirements for Network Security Technology

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.1
    • /
    • pp.64-67
    • /
    • 2007
  • IT industry strategy trend and home network security technology is presented. First, we consider the development strategy to improve next generation IT industry. Second, we have analyzed the technique for implementing home network. Last, we have analyzed the technique to security home network field.

Global Convergence of the Hopfield Neural Networks (호프필드 신경회로망의 Global Convergence)

  • 강민제
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.05a
    • /
    • pp.87-91
    • /
    • 2001
  • This paper discusses the influence of input conductance on the convergece of the continuous Hopfield neural networks. The convergence has been analyzed for the input and output nodes of neurons. Also, the characteristics of equilibrium points has been analyzed depending on different values of the input conductance.

  • PDF