• 제목/요약/키워드: Networks Log

검색결과 143건 처리시간 0.025초

Text-Independent Speaker Identification System Based On Vowel And Incremental Learning Neural Networks

  • Heo, Kwang-Seung;Lee, Dong-Wook;Sim, Kwee-Bo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.1042-1045
    • /
    • 2003
  • In this paper, we propose the speaker identification system that uses vowel that has speaker's characteristic. System is divided to speech feature extraction part and speaker identification part. Speech feature extraction part extracts speaker's feature. Voiced speech has the characteristic that divides speakers. For vowel extraction, formants are used in voiced speech through frequency analysis. Vowel-a that different formants is extracted in text. Pitch, formant, intensity, log area ratio, LP coefficients, cepstral coefficients are used by method to draw characteristic. The cpestral coefficients that show the best performance in speaker identification among several methods are used. Speaker identification part distinguishes speaker using Neural Network. 12 order cepstral coefficients are used learning input data. Neural Network's structure is MLP and learning algorithm is BP (Backpropagation). Hidden nodes and output nodes are incremented. The nodes in the incremental learning neural network are interconnected via weighted links and each node in a layer is generally connected to each node in the succeeding layer leaving the output node to provide output for the network. Though the vowel extract and incremental learning, the proposed system uses low learning data and reduces learning time and improves identification rate.

  • PDF

Performance of Convolutionally-Coded MIMO Systems with Antenna Selection

  • Hamouda Walaa;Ghrayeb Ali
    • Journal of Communications and Networks
    • /
    • 제7권3호
    • /
    • pp.307-312
    • /
    • 2005
  • In this work, we study the performance of a serial concatenated scheme comprising a convolutional code (CC) and an orthogonal space-time block code (STBC) separated by an inter-leaver. Specifically, we derive performance bounds for this concatenated scheme, clearly quantify the impact of using a CC in conjunction with a STBC, and compare that to using a STBC code only. Furthermore, we examine the impact of performing antenna selection at the receiver on the diversity order and coding gain of the system. In performing antenna selection, we adopt a selection criterion that is based on maximizing the instantaneous signal-to­noise ratio (SNR) at the receiver. That is, we select a subset of the available receive antennas that maximizes the received SNR. Two channel models are considered in this study: Fast fading and quasi-static fading. For both cases, our analyses show that substantial coding gains can be achieved, which is confirmed through Monte-Carlo simulations. We demonstrate that the spatial diversity is maintained for all cases, whereas the coding gain deteriorates by no more than $10\;log_{10}$ (M / L) dB, all relative to the full complexity multiple-input multiple-output (MIMO) system.

Bioinformatics Analysis Reveals Significant Genes and Pathways to Targetfor Oral Squamous Cell Carcinoma

  • Jiang, Qian;Yu, You-Cheng;Ding, Xiao-Jun;Luo, Yin;Ruan, Hong
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제15권5호
    • /
    • pp.2273-2278
    • /
    • 2014
  • Purpose: The purpose of our study was to explore the molecular mechanisms in the process of oral squamous cells carcinoma (OSCC) development. Method: We downloaded the affymetrix microarray data GSE31853 and identified differentially expressed genes (DEGs) between OSCC and normal tissues. Then Gene Ontology (GO) and Protein-Protein interaction (PPI) networks analysis was conducted to investigate the DEGs at the function level. Results: A total 372 DEGs with logFCI >1 and P value < 0.05 were obtained, including NNMT, BAX, MMP9 and VEGF. The enriched GO terms mainly were associated with the nucleoplasm, response to DNA damage stimuli and DNA repair. PPI network analysis indicated that GMNN and TSPO were significant hub proteins and steroid biosynthesis and synthesis and degradation of ketone bodies were significantly dysregulated pathways. Conclusion: It is concluded that the genes and pathways identified in our work may play critical roles in OSCC development. Our data provides a comprehensive perspective to understand mechanisms underlying OSCC and the significant genes (proteins) and pathways may be targets for therapy in the future.

Design of a set of One-to-Many Node-Disjoint and Nearly Shortest Paths on Recursive Circulant Networks

  • Chung, Ilyong
    • 한국멀티미디어학회논문지
    • /
    • 제16권7호
    • /
    • pp.897-904
    • /
    • 2013
  • The recursive circulant network G(N,d) can be widely used in the design and implementation of parallel processing architectures. It consists of N identical nodes, each node is connected through bidirectional, point-to-point communication channels to different neighbors by jumping $d^i$, where $0{\leq}i{\leq}{\lceil}{\log}_dN{\rceil}$ - 1. In this paper, we investigate the routing of a message on $G(2^m,4)$, a special kind of RCN, that is key to the performance of this network. On $G(2^m,4)$ we would like to transmit k packets from a source node to k destination nodes simultaneously along paths on this network, the $i^{th}$ packet will be transmitted along the $i^{th}$ path, where $1{\leq}k{\leq}m-1$, $0{{\leq}}i{{\leq}}m-1$. In order for all packets to arrive at a destination node quickly and securely, we present an $O(m^4)$ routing algorithm on $G(2^m,4)$ for generating a set of one-to-many node-disjoint and nearly shortest paths, where each path is either shortest or nearly shortest and the total length of these paths is nearly minimum since the path is mainly determined by employing the Hungarian method.

고가용성 유비쿼터스 컴퓨팅 시스템을 위한 오토노믹 자가 관리 메커니즘 (An Autonomic Self-management Mechanism for High-available Ubiquitous Computing System)

  • 최창열;김성수
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제32권11_12호
    • /
    • pp.566-577
    • /
    • 2005
  • 유비쿼터스 컴퓨팅은 네트워크로 상호연결된 프로세서로 구성되며, 하나 이상의 컴퓨터로 이루어진다. 따라서 한 시스템의 단일 컴포넌트 뿐만 아니라 전체 시스템의 가용도를 유지할 수 있어야만 한다. 본 연구에서는 사람의 간섭을 최소화하면서 예기치 못한 결함이 발생하여도 서비스를 지속적으로 제공할 수 있는 능력을 시스템에 부여하기 위한 오토노믹 자가 관리 기법을 제안하고 설계한다. 또한 시스템 로그 분석 결과를 통한 서비스 부하 모델을 근간으로 제안한 메커니즘의 효율성을 검증한다.

Mobile Device-to-Device (D2D) Content Delivery Networking: A Design and Optimization Framework

  • Kang, Hye Joong;Kang, Chung Gu
    • Journal of Communications and Networks
    • /
    • 제16권5호
    • /
    • pp.568-577
    • /
    • 2014
  • We consider a mobile content delivery network (mCDN) in which special mobile devices designated as caching servers (caching-server device: CSD) can provide mobile stations with popular contents on demand via device-to-device (D2D) communication links. On the assumption that mobile CSD's are randomly distributed by a Poisson point process (PPP), an optimization problem is formulated to determine the probability of storing the individual content in each server in a manner that minimizes the average caching failure rate. Further, we present a low-complexity search algorithm, optimum dual-solution searching algorithm (ODSA), for solving this optimization problem. We demonstrate that the proposed ODSA takes fewer iterations, on the order of O(log N) searches, for caching N contents in the system to find the optimal solution, as compared to the number of iterations in the conventional subgradient method, with an acceptable accuracy in practice. Furthermore, we identify the important characteristics of the optimal caching policies in the mobile environment that would serve as a useful aid in designing the mCDN.

Multi-Stage Turbo Equalization for MIMO Systems with Hybrid ARQ

  • Park, Sangjoon;Choi, Sooyong
    • Journal of Communications and Networks
    • /
    • 제18권3호
    • /
    • pp.333-339
    • /
    • 2016
  • A multi-stage turbo equalization scheme based on the bit-level combining (BLC) is proposed for multiple-input multiple-output (MIMO) systems with hybrid automatic repeat request (HARQ). In the proposed multi-stage turbo equalization scheme, the minimum mean-square-error equalizer at each iteration calculates the extrinsic log-likelihood ratios for the transmitted bits in a subpacket and the subpackets are sequentially replaced at each iteration according to the HARQ rounds of received subpackets. Therefore, a number of iterations are executed for different subpackets received at several HARQ rounds, and the transmitted bits received at the previous HARQ rounds as well as the current HARQ round can be estimated from the combined information up to the current HARQ round. In addition, the proposed multi-stage turbo equalization scheme has the same computational complexity as the conventional bit-level combining based turbo equalization scheme. Simulation results show that the proposed multi-stage turbo equalization scheme outperforms the conventional BLC based turbo equalization scheme for MIMO systems with HARQ.

VLBI NETWORK SIMULATOR: AN INTEGRATED SIMULATION TOOL FOR RADIO ASTRONOMERS

  • Zhao, Zhen;An, Tao;Lao, Baoqiang
    • 천문학회지
    • /
    • 제52권5호
    • /
    • pp.207-216
    • /
    • 2019
  • In this paper we introduce a software package, the Very long baseline interferometry Network SIMulator (VNSIM), which provides an integrated platform assisting radio astronomers to design Very Long Baseline Interferometry (VLBI) experiments and evaluate the network performance, with a user-friendly interface. Though VNSIM is primarily motivated by the East Asia VLBI Network, it can also be used for other VLBI networks and generic interferometers. The software package not only integrates the functionality of plotting (u, v) coverage, scheduling the observation, and displaying the dirty and CLEAN images, but also adds new features including sensitivity calculations for a given VLBI network. VNSIM provides flexible interactions on both command line and graphical user interface and offers friendly support for log reports and database management. Multi-processing acceleration is also supported, enabling users to handle large survey data. To facilitate future developments and updates, all simulation functions are encapsulated in separate Python modules, allowing independent invoking and testing. In order to verify the performance of VNSIM, we performed simulations and compared the results with other simulation tools, showing good agreement.

Host-Based Malware Variants Detection Method Using Logs

  • Joe, Woo-Jin;Kim, Hyong-Shik
    • Journal of Information Processing Systems
    • /
    • 제17권4호
    • /
    • pp.851-865
    • /
    • 2021
  • Enterprise networks in the PyeongChang Winter Olympics were hacked in February 2018. According to a domestic security company's analysis report, attackers destroyed approximately 300 hosts with the aim of interfering with the Olympics. Enterprise have no choice but to rely on digital vaccines since it is overwhelming to analyze all programs executed in the host used by ordinary users. However, traditional vaccines cannot protect the host against variant or new malware because they cannot detect intrusions without signatures for malwares. To overcome this limitation of signature-based detection, there has been much research conducted on the behavior analysis of malwares. However, since most of them rely on a sandbox where only analysis target program is running, we cannot detect malwares intruding the host where many normal programs are running. Therefore, this study proposes a method to detect malware variants in the host through logs rather than the sandbox. The proposed method extracts common behaviors from variants group and finds characteristic behaviors optimized for querying. Through experimentation on 1,584,363 logs, generated by executing 6,430 malware samples, we prove that there exist the common behaviors that variants share and we demonstrate that these behaviors can be used to detect variants.

다중 에이전트를 이용한 역추적 시스템 설계 및 구현 (Design and Implementation of a Traceback System based on Multi-Agents)

  • 정종민;이지율;이구연
    • 정보보호학회논문지
    • /
    • 제13권4호
    • /
    • pp.3-11
    • /
    • 2003
  • 네트워크 및 호스트의 자원을 낭비하는 DOS(Denial of Service) 및 여러 형태의 연결형/비연결형 공격은 전체 네트워크의 성능을 감소시키므로 공격 호스트를 검출하여 제거하는 일은 매우 중요한 요소이다. 공격 호스트를 검출하기 위한 효율적인 방법 중의 하나가 역추적시스템이나, 지금까지 구현된 역추적 시스템은 라우터의 동작 또는 로그 데이터 저장 및 분석에 따라 오버헤드를 야기 시키는 단점이 있다. 그러므로 본 논문에서는 라우터 및 관리자의 동작을 요구하지 않으며, 많은 양의 로그 데이터를 필요로 하지 않는 역추적 시스템을 제안하고 구현하였다. 구현된 시스템은 역추적 서버와 역추적 에이전트로 구성된다. 서버에서 스니핑과 스푸핑 기법을 이용하여 특정 패킷을 전송하면 각 네트워크에 존재하는 에이전트에서 그 패킷을 검출함으로서 근원지 호스트까지의 연결 경로 정보를 획득하여 역추적 서버로 하여금 공격 호스트를 검출할 수 있도록 한다.