• Title/Summary/Keyword: Network Environment

Search Result 7,824, Processing Time 0.037 seconds

Multiple Reward Reinforcement learning control of a mobile robot in home network environment

  • Kang, Dong-Oh;Lee, Jeun-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1300-1304
    • /
    • 2003
  • The following paper deals with a control problem of a mobile robot in home network environment. The home network causes the mobile robot to communicate with sensors to get the sensor measurements and to be adapted to the environment changes. To get the improved performance of control of a mobile robot in spite of the change in home network environment, we use the fuzzy inference system with multiple reward reinforcement learning. The multiple reward reinforcement learning enables the mobile robot to consider the multiple control objectives and adapt itself to the change in home network environment. Multiple reward fuzzy Q-learning method is proposed for the multiple reward reinforcement learning. Multiple Q-values are considered and max-min optimization is applied to get the improved fuzzy rule. To show the effectiveness of the proposed method, some simulation results are given, which are performed in home network environment, i.e., LAN, wireless LAN, etc.

  • PDF

A Study of Virtual Home Environment Implementation Scenario for Subscriber Privacy (가입자 정보보호를 위한 Virtual Home Environment 시나리오 보안 취약점 분석)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of Industrial Technology
    • /
    • v.21 no.A
    • /
    • pp.117-122
    • /
    • 2001
  • Currently, the VHE (suggested for global roaming user to provide personal service environment) implementation scenario is being proposed to realize 3G network requirements. However, developing VHE scenarios are focused on signal flow between node and network, and network and network. this case may result in weakness to protect subscriber's privacy in 3G network which commonly uses visited network. In this paper, we reanalyze a several VHE implementation scenarios for user profile protection, indicate a problem concerning user privacy, and finally, design a procedure to cope with vulnerability in VHE implementation scenario.

  • PDF

Common Resource Management and Network Simulator in Heterogeneous Network Environment (다중 네트워크 환경 하에서의 공통 자원 관리 기법 및 네트워크 시뮬레이터 응용)

  • Kim, Jae-Hoon
    • Korean Management Science Review
    • /
    • v.26 no.1
    • /
    • pp.113-126
    • /
    • 2009
  • By the newly emerging network access technology, we face the new heterogeneous network environment. Focusing on the co-existence of multiple access network technology and the complex service needs of users, the wireless service operators should present the stable service quality for every user. For this, the service operators should build the new operation framework which combine the pre-established network and newly adopted one. Our problem is finding the optimal heterogeneous network operation framework. We suggest market-based marginal cost function for evaluating the relative value of resource of each network and develop the whole new heterogeneous network operation framework. To test the applicability of developed operation framework, we build large-scale JAVA simulator. By this development, we can easily test the new network environment in practical engineering field.

An Active Network Execution Environment for on Demand Customization of Communication Protocols and Services (맞춤형 통신 프로토콜과 서비스를 위한 액티브 네트워크 실행환경)

  • Lee Hwa Young;Kang Bo-young;Lim Kyungshik
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.937-950
    • /
    • 2004
  • In this paper, we present the design and implementation of new execution environment named Customizable Architecture for Flexible Execution Environment(CAFEs) that supports the mechanism of protocol customization and service referencing. We introduce a new concept as micro protocols and active services to enhance software reusability. Micro protocol represents a specific algorithm or functionality of existing network protocol and the active service is in charge of binding legacy application and releasing the active network oriented services. The pro-posed active network execution environment is made up of three parts, virtual network system, protocol and service manager, event engine. First, the virtual network system is used to connect each active nodes using virtual network channels which are based on multiple existing protocol layers. Second, the protocol and service manager is responsible for composing micro protocols and active services to develop new network proto-col and service easily. Finally, the event engine is used to detect the automatic transition of system components using event delegation model. To verify the CAFTs, we have an experiment about the delivery of web contents which are suitable for the user's terminals in the wireless Internet environment. As a result. we are able to obtain the availability of developed execution environment.

Network-based Feature Modeling in Distributed Design Environment (네트워크 기반 특징형상 모델링)

  • Lee, J.Y.;Kim, H.;Han, S.B.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.5 no.1
    • /
    • pp.12-22
    • /
    • 2000
  • Network and Internet technology opens up another domain for building future CAD/CAM environment. The environment will be global, network-centric, and spatially distributed. In this paper, we present an approach for network-centric feature-based modeling in a distributed design environment. The presented approach combines the current feature-based modeling technique with distributed computing and communication technology for supporting product modeling and collaborative design activities over the network. The approach is implemented in a client/server architecture, in which Web-enabled feature modeling clients, neutral feature model server, and other applications communicate with one another via a standard communication protocol. The paper discusses how the neutral feature model supports multiple views and maintains naming consistency between geometric entities of the server and clients. Moreover, it explains how to minimize the network delay between the server and client according to incremental feature modeling operations.

  • PDF

A Study on the Flow Analysis on the Software-Defined Networks through Simulation Environment Establishment (시뮬레이션 환경 구축을 통한 소프트웨어-정의 네트워크에서 흐름 분석에 관한 연구)

  • Lee, Dong-Yoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.88-93
    • /
    • 2020
  • Recently, SDN technology is applied to real communication business, users are getting bigger, and as the amount of data flowing in the network increases, interest in network data flow management is increasing. During this process, it must be ensured that the confidentiality, integrity, availability, and traceability of the data on the network being transmitted. In addition, it is necessary to develop an environment for observing the flow of data in real time on a network required in various fields and visually confirming the control. In this paper, first, Mininet is applied to construct a network topology and various environment attributes. Second, we added OpenDayLight in Mininet environment to develop a simulation environment to visually check and control network traffic flow in network topology.

A Simulation Analysis of Abnormal Traffic-Flooding Attack under the NGSS environment

  • Kim, Hwan-Kuk;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1568-1570
    • /
    • 2005
  • The internet is already a part of life. It is very convenient and people can do almost everything with internet that should be done in real life. Along with the increase of the number of internet user, various network attacks through the internet have been increased as well. Also, Large-scale network attacks are a cause great concern for the computer security communication. These network attack becomes biggest threat could be down utility of network availability. Most of the techniques to detect and analyze abnormal traffic are statistic technique using mathematical modeling. It is difficult accurately to analyze abnormal traffic attack using mathematical modeling, but network simulation technique is possible to analyze and simulate under various network simulation environment with attack scenarios. This paper performs modeling and simulation under virtual network environment including $NGSS^{1}$ system to analyze abnormal traffic-flooding attack.

  • PDF

A Study of CR-DuNN based on the LSTM and Du-CNN to Predict Infrared Target Feature and Classify Targets from the Clutters (LSTM 신경망과 Du-CNN을 융합한 적외선 방사특성 예측 및 표적과 클러터 구분을 위한 CR-DuNN 알고리듬 연구)

  • Lee, Ju-Young
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.68 no.1
    • /
    • pp.153-158
    • /
    • 2019
  • In this paper, we analyze the infrared feature for the small coast targets according to the surrounding environment for autonomous flight device equipped with an infrared imaging sensor and we propose Cross Duality of Neural Network (CR-DuNN) method which can classify the target and clutter in coastal environment. In coastal environment, there are various property according to diverse change of air temperature, sea temperature, deferent seasons. And small coast target have various infrared feature according to diverse change of environment. In this various environment, it is very important thing that we analyze and classify targets from the clutters to improve target detection accuracy. Thus, we propose infrared feature learning algorithm through LSTM neural network and also propose CR-DuNN algorithm that integrate LSTM prediction network with Du-CNN classification network to classify targets from the clutters.

Experimental Studies on Neural Network Force Tracking Control Technique for Robot under Unknown Environment (미정보 환경 하에서 신경회로망 힘추종 로봇 제어 기술의 실험적 연구)

  • Jeong, Seul;Yim, Sun-Bin
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.4
    • /
    • pp.338-344
    • /
    • 2002
  • In this paper, neural network force tracking control is proposed. The conventional impedance function is reformulated to have direct farce tracking capability. Neural network is used to compensate for all the uncertainties such as unknown robot dynamics, unknown environment stiffness, and unknown environment position. On line training signal of farce error for neural network is formulated. A large x-y table is built as a test-bed and neural network loaming algorithm is implemented on a DSP board mounted in a PC. Experimental studies of farce tracking on unknown environment for x-y table robot are presented to confirm the performance of the proposed technique.

An Efficient Routing Algorithm for extreme networking environments (극단적인 네트워크 환경을 위한 효율적인 라우팅 알고리즘)

  • Wang, Jong Soo;Seo, Doo Ok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.47-53
    • /
    • 2012
  • Sensor networks and car networks that have different structure from that of conventional TCP/IP network require extreme network environment due to frequent change of connectivity. Because such extreme network environment has characteristics like unreliable link connectivity, long delay time, asymmetrical data transfer rate, and high error rate, etc., it is difficult to perform normally with the conventional TCP/P-based routing. DTNs (delay and disruption tolerant network) was designed to support data transfer in extreme network environment with long delay time and no guarantee for continuous connectivity between terminals. This study suggests an algorithm that limits the maximum number of copying transferred message to L by improving the spray and wait routing protocol, which is one of the conventional DTNs routing protocols, and using the azimuth and density data of the mobile nods. The suggested algorithm was examined by using ONE, a DTNs simulator. As a result, it could reduce the delay time and overhead of unnecessary packets compared to the conventional spray and wait routing protocol.