• Title/Summary/Keyword: Network Graph

Search Result 705, Processing Time 0.026 seconds

Modulation Recognition of BPSK/QPSK Signals based on Features in the Graph Domain

  • Yang, Li;Hu, Guobing;Xu, Xiaoyang;Zhao, Pinjiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3761-3779
    • /
    • 2022
  • The performance of existing recognition algorithms for binary phase shift keying (BPSK) and quadrature phase shift keying (QPSK) signals degrade under conditions of low signal-to-noise ratios (SNR). Hence, a novel recognition algorithm based on features in the graph domain is proposed in this study. First, the power spectrum of the squared candidate signal is truncated by a rectangular window. Thereafter, the graph representation of the truncated spectrum is obtained via normalization, quantization, and edge construction. Based on the analysis of the connectivity difference of the graphs under different hypotheses, the sum of degree (SD) of the graphs is utilized as a discriminate feature to classify BPSK and QPSK signals. Moreover, we prove that the SD is a Schur-concave function with respect to the probability vector of the vertices (PVV). Extensive simulations confirm the effectiveness of the proposed algorithm, and its superiority to the listed model-driven-based (MDB) algorithms in terms of recognition performance under low SNRs and computational complexity. As it is confirmed that the proposed method reduces the computational complexity of existing graph-based algorithms, it can be applied in modulation recognition of radar or communication signals in real-time processing, and does not require any prior knowledge about the training sets, channel coefficients, or noise power.

Graph Neural Network and Reinforcement Learning based Optimal VNE Method in 5G and B5G Networks (5G 및 B5G 네트워크에서 그래프 신경망 및 강화학습 기반 최적의 VNE 기법)

  • Seok-Woo Park;Kang-Hyun Moon;Kyung-Taek Chung;In-Ho Ra
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.113-124
    • /
    • 2023
  • With the advent of 5G and B5G (Beyond 5G) networks, network virtualization technology that can overcome the limitations of existing networks is attracting attention. The purpose of network virtualization is to provide solutions for efficient network resource utilization and various services. Existing heuristic-based VNE (Virtual Network Embedding) techniques have been studied, but the flexibility is limited. Therefore, in this paper, we propose a GNN-based network slicing classification scheme to meet various service requirements and a RL-based VNE scheme for optimal resource allocation. The proposed method performs optimal VNE using an Actor-Critic network. Finally, to evaluate the performance of the proposed technique, we compare it with Node Rank, MCST-VNE, and GCN-VNE techniques. Through performance analysis, it was shown that the GNN and RL-based VNE techniques are better than the existing techniques in terms of acceptance rate and resource efficiency.

Topological Analysis of DC Motor Driving by John's Chopper Circuit

  • Won, Chung-Yun;Hwang, Hee-Yeong
    • Proceedings of the KIEE Conference
    • /
    • 1979.08a
    • /
    • pp.138-141
    • /
    • 1979
  • The purpose of this paper is to develop an efficient model for the analysis of a John's Chopper Circuit. In the John's Chopper Circuit analysis, the open branches are removed from the associated graph to formulate the modified incidence matrix. An algorithm for the generation of a modified proper tree and fundamental cut set matrix from a network graph is developed, which utilizes much less computer storage space and computation time compared to the classical methods.

  • PDF

Generalized characteristic polynomials of semi-zigzag product of a graph and circulant graphs

  • Lee, Jae-Un;Kim, Dong-Seok
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.4
    • /
    • pp.1289-1295
    • /
    • 2008
  • We find the generalized characteristic polynomial of graphs G($F_{1},F_{2},{\cdots},F_{v}$) the semi-zigzag product of G and ${\{F_{i}\}^{v}_{i=1}$ obtained from G by replacing vertices by circulant graphs of vertices and joining $F_{i}$'s along the edges of G. These graphs contain discrete tori and are key examples in the study of network model.

  • PDF

An Embedding of Multiple Edge-Disjoint Hamiltonian Cycles on Enhanced Pyramid Graphs

  • Chang, Jung-Hwan
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.75-84
    • /
    • 2011
  • The enhanced pyramid graph was recently proposed as an interconnection network model in parallel processing for maximizing regularity in pyramid networks. We prove that there are two edge-disjoint Hamiltonian cycles in the enhanced pyramid networks. This investigation demonstrates its superior property in edge fault tolerance. This result is optimal in the sense that the minimum degree of the graph is only four.

A STUDY ON THE OPTIMAZATION OF CONSTRUCTION MANAGEMENT BY USING A DESIGN STRUCTURE MATRIX

  • Nobuyuki Suzuki;Aketo Suzuki
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.383-388
    • /
    • 2005
  • In the construction industry, complex works are carried out with significant resources under non-linear circumstances where clear concepts of project management could be of benefit to all parties and personnel involved. In this paper, we define the optimum project management configuration for construction management by using DSM (Design Structure Matrix). Furthermore DSM can be visualized as a network model, and then Graph Theory provides us the numerical results.

  • PDF

Graph Convolutional Networks for Collective Entity Linking (Graph Convolutional Network 기반 집합적 개체 연결)

  • Lee, Young-Hoon;Na, Seung-Hoon
    • Annual Conference on Human and Language Technology
    • /
    • 2019.10a
    • /
    • pp.170-172
    • /
    • 2019
  • 개체명 연결이란 주어진 문장에 출현한 단어를 위키피디아와 같은 지식 기반 상의 하나의 개체에 연결하는 것을 의미한다. 문장에 나타나는 개체들은 주로 동일한 주제를 가지게 되는데 본 논문에서는 이러한 특징을 활용하기 위해서 개체들을 그래프상의 노드로 표현하고, 그래프 신경망을 이용하여 주변 노드의 정보를 통해 노드 표상을 업데이트한다. 한국어 위키피디아 링크 데이터를 사용하여 실험을 진행한 결과 개발 셋에서 82.09%, 평가 셋에서 81.87%의 성능을 보였다.

  • PDF

A Semantic Social Network System in Korea Institute of Oriental Medicine (한국한의학연구원 시맨틱 소셜 네트워크 시스템 구축)

  • Kim, Sang-Kyun;Jang, Hyun-Chul;Kim, Chul;Yea, Sang-Jun;Kim, Jin-Hyun;Song, Mi-Young
    • Korean Journal of Oriental Medicine
    • /
    • v.16 no.2
    • /
    • pp.91-99
    • /
    • 2010
  • In this paper, we designed and implemented a semantic social network system in Korea Institute of Oriental Medicine (abbreviated as KIOM). Our social network system provides the capabilities such as tracking search, ontology reasoning, ontology graph view, and personal information input, update and management. Tracking search provides the search results by the research information of relevant researchers using ontology, in addition to those by keywords. Ontology reasoning provides the reasoning for experts, mentors, and personal contacts. Users can easily browse the personal connections among researchers by traversing the ontology by graph viewer. These allows KIOM researchers to search other researchers who could aid the researches and to easily share their research information.

A Study on the Reliability Evaluation of Communication Networks by Matrix Transformation (행열변현에 의한 통신망의 신뢰도 계정에 관한 연구)

  • 김영근;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.13 no.5
    • /
    • pp.379-389
    • /
    • 1988
  • In this paper, an algorithm for obtaining 2-state switching failure function and a terminal pair reliability evaluation method in a communication network are proposed. The communication network is modeled by a graph. By using the sequence of matrix transformations for the graph, minimal cut-set matrix representing all minimal cut-sets which completely interrupt the communication path is determined and 2-state switching failure function is then obtained from the minimal cut-set matrix. The terminal pari reliability of the communication network is evaluated by corresponding the random variables to 2-state switching failure function. Illustrative examples are provided to demonstrate the algorithm. A computer program evaluating the terminal pair reliability in a complex and large network has also been developed.

  • PDF

A System for Improving Data Leakage Detection based on Association Relationship between Data Leakage Patterns

  • Seo, Min-Ji;Kim, Myung-Ho
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.520-537
    • /
    • 2019
  • This paper proposes a system that can detect the data leakage pattern using a convolutional neural network based on defining the behaviors of leaking data. In this case, the leakage detection scenario of data leakage is composed of the patterns of occurrence of security logs by administration and related patterns between the security logs that are analyzed by association relationship analysis. This proposed system then detects whether the data is leaked through the convolutional neural network using an insider malicious behavior graph. Since each graph is drawn according to the leakage detection scenario of a data leakage, the system can identify the criminal insider along with the source of malicious behavior according to the results of the convolutional neural network. The results of the performance experiment using a virtual scenario show that even if a new malicious pattern that has not been previously defined is inputted into the data leakage detection system, it is possible to determine whether the data has been leaked. In addition, as compared with other data leakage detection systems, it can be seen that the proposed system is able to detect data leakage more flexibly.