• Title/Summary/Keyword: Network Performance Evaluation

Search Result 1,884, Processing Time 0.029 seconds

Design of PCA-based pRBFNNs Pattern Classifier for Digit Recognition (숫자 인식을 위한 PCA 기반 pRBFNNs 패턴 분류기 설계)

  • Lee, Seung-Cheol;Oh, Sung-Kwun;Kim, Hyun-Ki
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.4
    • /
    • pp.355-360
    • /
    • 2015
  • In this paper, we propose the design of Radial Basis Function Neural Network based on PCA in order to recognize handwritten digits. The proposed pattern classifier consists of the preprocessing step of PCA and the pattern classification step of pRBFNNs. In the preprocessing step, Feature data is obtained through preprocessing step of PCA for minimizing the information loss of given data and then this data is used as input data to pRBFNNs. The hidden layer of the proposed classifier is built up by Fuzzy C-Means(FCM) clustering algorithm and the connection weights are defined as linear polynomial function. In the output layer, polynomial parameters are obtained by using Least Square Estimation (LSE). MNIST database known as one of the benchmark handwritten dataset is applied for the performance evaluation of the proposed classifier. The experimental results of the proposed system are compared with other existing classifiers.

Efficient Skyline Query Processing Scheme in Mobile P2P Networks (모바일 P2P 네트워크에서 효율적인 스카이라인 질의 처리 기법)

  • Bok, Kyoung-Soo;Park, Sun-Yong;Kim, Dae-Yeon;Lim, Jong-Tae;Shin, Jae-Ryong;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.7
    • /
    • pp.30-42
    • /
    • 2015
  • In this paper, we propose a new skyline query processing scheme to enhance accuracy of query processing and communication cost in mobile P2P environments. The proposed scheme consists of three stages such as the pre-skyline processing, the query transmission range extension policy, and the continuous skyline query processing. In the pre-skyline processing, a peer selects the candidate filtering objects who have the potential to be selected. By doing so, the proposed scheme reduces the filtering cost when processing the query. In the query transmission range extension policy, we have improved the accuracy by extending the query transmission range. In addition, it can handle continuous skyline query by performing the monitoring after the first skyline query processing. In order to show the superiority of the proposed method, we compare it with the existing schemes through performance evaluation. As a result, it was shown that the proposed scheme outperforms the existing schemes.

AVK based Cryptosystem and Recent Directions Towards Cryptanalysis

  • Prajapat, Shaligram;Sharma, Ashok;Thakur, Ramjeevan Singh
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.97-110
    • /
    • 2016
  • Cryptanalysis is very important step for auditing and checking strength of any cryptosystem. Some of these cryptosystem ensures confidentiality and security of large information exchange from source to destination using symmetric key cryptography. The cryptanalyst investigates the strengths and identifies weakness key as well as enciphering algorithm. With increase in key size the time and effort required to guess the correct key increases so trend is increase key size from 8, 16, 24, 32, 56, 64, 128 and 256 bits to strengthen the cryptosystem and thus algorithm continues without compromise on the cost of time and computation. Automatic Variable Key (AVK) approach is an alternative to the approach of fixing up key size and adding security level with key variability adds new dimension in the development of secure cryptosystem. Likewise, whenever any new cryptographic method is invented to replace per-existing vulnerable cryptographic method, its deep analysis from all perspectives (Hacker / Cryptanalyst as well as User) is desirable and proper study and evaluation of its performance is must. This work investigates AVK based cryptic techniques, in future to exploit benefits of advances in computational methods like ANN, GA, SI etc. These techniques for cryptanalysis are changing drastically to reduce cryptographic complexity. In this paper a detailed survey and direction of development work has been conducted. The work compares these new methods with state of art approaches and presents future scope and direction from the cryptic mining perspectives.

An Efficient Smoothing Algorithm Using the Change of Frame Sequence in GOP (GOP를 구성하는 프레임들의 순서 변경을 이용한 효율적인 스무딩 알고리즘)

  • Lee, Myoun-Jae
    • Journal of Korea Game Society
    • /
    • v.6 no.2
    • /
    • pp.51-60
    • /
    • 2006
  • Smoothing is a transmission plan where variable rate video data is converted to a constant bit rate stream. Among them are CBA, MCBA, MVBA, PCRTT and others. But, in these algorithm, a transmission plan is made in according to stored frame sequence in these algorithms. In case that the number of bytes in frames in GOP differs greatly each other, this may cause unnecessary transmission rate changes and may require high transmission rates abruptly when frame's byte is large. In result, it is difficult to use efficient network resource. In this paper, we proposed a smoothing algorithm that find the optimal frame sequence in short time by using backtracking method and smoothing's structure for the proposed smoothing algorithm. This algorithm decides the sequence of frames which requires the lowest variance of frame's bytes in GOP and make a transmission plan. In order to show the performance, we compared with MVBA algorithm by various evaluation factors such as the number of rate changes, peak rate, rate variability.

  • PDF

Design and Implementation of a Smart Home Cloud Control System Using Bridge based on IoT (IoT 기반의 브리지를 이용한 스마트 홈 클라우드 제어 시스템 설계 및 구현)

  • Hao, Xu;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.865-872
    • /
    • 2017
  • Recently, in response to the Internet age, the demand for hardware devices has been increasing, centering on the rapidly growing smart home field, due to the growth and management of sensor and control technology, mobile application, network traffic, big data management and cloud computing. In order to maintain the sustainable development of the hardware system, it is necessary to update the system, and the hardware device is absolutely necessary in real time processing of complex data (voice, image, etc.) as well as data collection. In this paper, we propose a method to simplify the control and communication method by integrating the hardware devices in two operating systems in a unified structure to solve the simultaneous control and communication method of hardware under different operating systems. The performance evaluation results of the proposed integrated hardware and the cloud control system connected to the cloud server are described and the main directions to be studied in the field of internet smart home are described.

Service Class Priority Controlled DBA Scheduling Method and Performance Evaluation in Ethernet PONs (Ethernet PONs에서 서비스 클래스별 전송 우선순위를 적용한 DBA 스케쥴링 방식 및 성능 분석)

  • Nam Yoon-Seok
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.679-686
    • /
    • 2005
  • Because EPON access network shares a medium and aggregates the traffic from EPON subscribers, scheduling media access control on EPON bandwidth allocation is very important. Furthermore DBA mechanism of EPON based on TDMA is out of specification and up to implementation. This paper deals with a DBA method to guarantee the QoS of the delay sensitive traffic on the base of best-effort service and delay priority queue management. The proposed method performs virtual scheduling algorithm for the integrated traffic. It uses the same MAC messages and tries to guarantee the QoS of higher priority traffic first with a simple DBA architecture. We evaluate the algorithm for traffic delay according to polling interval and traffic load of upstream and downstream. The results show that the proposed method can guarantee the QoS of the delay sensitive traffic with priority of the service classes.

CBT/Anycast Routing Strategy for The Distribution of MMORPG Traffic (MMORPG 트래픽의 분산을 위한 CBT/Anycast 라우팅 전략)

  • Jurng, Jin-Tae;Lee, Kwang-Jae
    • Journal of Korea Game Society
    • /
    • v.4 no.4
    • /
    • pp.3-9
    • /
    • 2004
  • Expansion of internet and construction of high speed network which require multimedia services like MMORPG are exceeding the infra-structure. In this work, CBT is analyzed by focusing on the multicast routing protoco and the algorithm which is transformable to Anycast scheme from CBT scheme is suggested to adapt game traffic. Anycast routing scheme is suitable to distribute high density traffic. Simulation model was set per a number of group and group member, which enabled to reflect real environments. Performance evaluation of routing based on the characteristics of end-to-end delay of CBT and Anycast was mainly focused, The result showed that Anycast method was improved up 8.7%, 25.5%, 34.0%, 38.6% and 51.8%, 56.6% comparing with PIM-DM and CBT routing when packet site was 128, 512 and 1K byte respectively. From the simulation, CBT/Anycast routing scheme can be presented as a flexible and solid solution for the MMORPG traffic to improve the delay characteristics of game packets.

  • PDF

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering Weighted Feature Values (가중 특징 값을 고려한 러프 집합 기반 비정상 행위 탐지방법의 설계 및 평가)

  • Bae, Ihn-Han;Lee, Hwa-Ju;Lee, Kyung-Sook
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.8
    • /
    • pp.1030-1036
    • /
    • 2006
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function considering weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the method that assigns different weighted values to feature attributes depending on importance.

  • PDF

Method for Message Processing According to Priority in MQTT Broker (MQTT Broker에서 우선순위에 따른 메시지 처리를 위한 방법에 관한 연구)

  • Kim, Sung-jin;Oh, Chang-heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1320-1326
    • /
    • 2017
  • Recently, IoT has been studying a lightweight protocol to satisfy device communication in a limited network environment. MQTT is a typical lightweight protocol. It supports small fixed headers to minimize overhead, and adopts publish/subscribe structure to guarantee real-time performance. However, MQTT does not support prioritization of important data and can not provide QoS in a specific IoT service. In this paper, we propose a message processing method to consider the priority of various IoT services in MQTT. In the proposed method, the priority flag is added to the fixed header of the MQTT in the node to transmit the message, and the broker confirms the priority of the corresponding message and processes it preferentially. Through experiment and evaluation, we confirmed the reduction of end-to-end delay between nodes according to priority.

Performance Evaluation of Scheduling Algorithms according to Communication Cost in the Grid System of Co-allocation Environment (Co-allocation 환경의 그리드 시스템에서 통신비용에 따른 스케줄링 알고리즘의 성능 분석)

  • Kang, Oh-Han;Kang, Sang-Seong;Kim, Jin-Suk
    • The KIPS Transactions:PartA
    • /
    • v.14A no.2
    • /
    • pp.99-106
    • /
    • 2007
  • Grid computing, a mechanism which uses heterogeneous systems that are geographically distributed, draws attention as a new paradigm for the next generation operation of parallel and distributed computing. The importance of grid computing concerning communication cost is very huge because grid computing furnishes uses with integrated virtual computing service, in which a number of computer systems are connected by a high-speed network. Therefore, to reduce the execution time, the scheduling algorithm in grid environment should take communication cost into consideration as well as computing ability of resources. However, most scheduling algorithms have not only ignored the communication cost by assuming that all tasks were dealt in one cluster, but also did not consider the overhead of communication cost when the tasks were processed in a number of clusters. In this paper, the functions of original scheduling algorithms are analyzed. More importantly, the functions of algorithms are compared and analyzed with consideration of communication cost within the co allocation environment, in which a task is performed separately in many clusters.