• Title/Summary/Keyword: intelligent connection

Search Result 255, Processing Time 0.024 seconds

Analysis of the Transport Characteristics of Bulk Cargo in Freight Stations Located Behind Trade Ports (무역항 배후 화물철도역의 벌크화물 운송특성 분석)

  • Choi, Chang-Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.6
    • /
    • pp.47-61
    • /
    • 2016
  • The present study analyzed the railway transport characteristics of bulk cargo flowing in and out of trade ports in South Korea. Bulk cargo transport in freight stations located behind trade ports was examined using actual flow data, and new implications were drawn accordingly. The results showed that bulk cargo volume in freight stations located behind trade ports is gradually decreasing, and it is also failing to secure a competitive edge against road transport. This downfall can be mainly attributed to the decrease in competitiveness of railway transport as well as the emergence of new trade ports that do not have lead-in track for port. Therefore, greater effort is required to strengthen the connection between new trade ports and railway freight stations.

A RTSD Mechanism for Detection of DoS Attack on TCP Network (TCP 네트워크에서 서비스거부공격의 탐지를 위한 RTSD 메커니즘)

  • 이세열;김용수
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2002.05a
    • /
    • pp.252-255
    • /
    • 2002
  • As more critical services are provided in the internet, the risk to these services from malicious users increases. Several networks have experienced problems like Denial of Service(DoS) attacks recently. We analyse a network-based denial of service attack, which is called SYM flooding, to TCP-based networks. It occurs by an attacker who sends TCP connection requests with spoofed source address to a target system. Each request causes the targeted system to send instantly data packets out of a limited pool of resources. Then the target system's resources are exhausted and incoming TCP port connections can not be established. The paper is concerned with a detailed analysis of TCP SYN flooding denial of service attack. In this paper, we propose a Real Time Scan Detector(RTSD) mechanism and evaluate it\`s Performance.

  • PDF

Design and Implementation of Multi Platform Wire.Wireless Messaging System Using J2ME (J2ME를 이용한 멀티 플랫폼 유.무선 메시징 시스템 설계 및 구현)

  • 김응곤;문유미;최완규;이성주
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.6
    • /
    • pp.543-548
    • /
    • 2001
  • In the case of mobile internet service using WAP it was connected to http protocol using WAP Gateway, So users take increased cost of mobile internet service. And it was generated inner security problem because it watched user information in the WAP Gateway. To solve this problem we use java language Which is independant of platform and low cost and intensely security an downloadable application. Additional , Using socket connection. Wire.Wireless Messaging system(WWMS) will connect real time between PC-Client and Mobile-Client, Mobile-Client and Mobile-Client, and so on. In this paper, as design and implementation of multi-platform wire.wireless messaging use J2Me. It will be foundation do develop various mobile application in the future.

  • PDF

Evolutionary Learning Algorithm fo r Projection Neural NEtworks (투영신경회로망의 훈련을 위한 진화학습기법)

  • 황민웅;최진영
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.7 no.4
    • /
    • pp.74-81
    • /
    • 1997
  • This paper proposes an evolutionary learning algorithm to discipline the projection neural nctworks (PNNs) with special type of hidden nodes which can activate radial basis functions as well as sigmoid functions. The proposed algorithm not only trains the parameters and the connection weights hut also c~ptimizes the network structure. Through the structure optimization, the number of hidden node:; necessary to represent a given target function is determined and the role of each hidden node is decided whether it activates a radial basis function or a sigmoid function. To apply the algorithm, PNN is realized by a self-organizing genotype representation with a linked list data structure. Simulations show that the algorithm can build the PNN with less hidden nodes than thc existing learning algorithm using error hack propagation(EE3P) and network growing strategy.

  • PDF

Robotic Agent Design and Application in the Ubiquitous Intelligent Space (유비쿼터스 지능형 공간에서의 로봇 에이전트 설계 및 응용)

  • Yoon Han-Ul;Hwang Se-Hee;Kim Dae-Wook;Lee Doong-Hoon;Sim Kwee-Bo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.12
    • /
    • pp.1039-1044
    • /
    • 2005
  • This paper presents a robotic agent design and application in the ubiquitous intelligent space. We set up an experimental environment with Bluetooth host, Bluetooth client, furniture and home appliance, and robotic agents. First, the agents basically performed patrol guard to detect unexpected penetration, and to keep home safely from gas-leakage, electric leakage, and so on. They were out to patrol fur a robbery while navigating in a living room and a private room. In this task, we used an area-based action making and a hexagon-based Q-learning to control the agents. Second, the agents communicate with Bluetooth host device to access and control a home appliance. The Bluetooth host offers a manual control to person by inquiring a client robot when one would like to check some place especially. In this exercise, we organize asynchronous connection less (ACL) between the host and the client robots and control the robot maneuver by Bluetooth host controller interface (HCI).

Implementation of Automated Transfer Crane System using CAN Network (CAN 네트워크를 이용한 자동화 크레인 시스템의 구현)

  • Kim Man-Ho;Ha Kyoung-Nam;Lee Kyung-Chang;Hong Keum-Shik;Lee Suk
    • Journal of Navigation and Port Research
    • /
    • v.29 no.6 s.102
    • /
    • pp.555-560
    • /
    • 2005
  • Recently, many control systems are replaced with digital control systems in an effort to optimize the overall performance. In order to operate these systems efficiently, the conventional point-to-point connection method must be changed to the signal exchange via a communication network. This paper investigates the technical feasibility of the crane system using CAN protocol which is a part NMEA 2000 by implementing a network-based control system emulating the crane control system.

Analysis of Dynamical State Transition and Effects of Chaotic Signal in Continuous-Time Cyclic Neural Network (리미트사이클을 발생하는 연속시간 모델 순환결합형 신경회로망에서 카오스 신호의 영향)

  • Park Cheol-Young
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.4
    • /
    • pp.396-401
    • /
    • 2006
  • It is well-known that a neural network with cyclic connections generates plural limit cycles, thus, being used as a memory system for storing large number of dynamic information. In this paper, a continuous-time cyclic connection neural network was built so that each neuron is connected only to its nearest neurons with binary synaptic weights of ${\pm}1$. The type and the number of limit cycles generated by such network has also been demonstrated through simulation. In particular, the effect of chaos signal for transition between limit cycles has been tested. Furthermore, it is evaluated whether the chaotic noise is more effective than random noise in the process of the dynamical neural networks.

Extended Loop Antenna for the Mobile Handset (휴대 단말기용 연장 루프안테나)

  • Son, Taeho;Ryu, Hwang
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.2
    • /
    • pp.30-37
    • /
    • 2013
  • An extended loop antenna, to be continued BLA(Branch Loop Antenna) in the previous volume, for the mobile handset is designed in this paper. It's introduced an ELA(Extended Loop Antenna) that is added extended loops to rectangular loop, and verified antenna performances for applying to mobile handset. Extended loops are located upside, left and right side of rectangular loop, and low resonance is obtained by the length of line. Multiple resonances are established by the extended loops, and obtained the desired service bands by the connection points and lengths. By the implementation and measurement for the multiband ELA, it's showed -3.0~-1.46dBi average gains with 50.15~71.41% efficiencies at CDMA/GSM frequency band, and -8.28~-1.7dBi average gains with 14.87~67.68% efficiencies at DCS/USPCS/WCDMA frequency band.

An Intelligent Handover Scheme for the Next Generation Personal Communication Systems

  • Ming-Hui;Kuang, Eric-Hsiao;Chao-Hsu
    • Journal of Communications and Networks
    • /
    • v.6 no.3
    • /
    • pp.245-257
    • /
    • 2004
  • Driven by the growing number of the mobile subscribers, efficient channel resource management plays a key role for provisioning multimedia service in the next generation personal communication systems. To reuse limited channel resources, diminishing the coverage areas of cells seems to be the ultimate solution. Thus, however, causes more handover events. To provide seamless connection environment for mobile terminals and applications, this article presents a novel handover scheme called the intelligent channel reservation (ICR) scheme, which exploits the location prediction technologies to accurately reserve channel resources for handover connections. Considering the fact that each mobile terminal has its individual mobility characteristic, the ICR scheme utilizes a channel reserving notification procedure (CRNP) to collect adequate parameters for predicting the future location of individual mobile terminals. These parameters will be utilized by the handover prediction function to estimate the expected handover blocking rate and the expected number of idle channels. Based on the handover prediction estimations, a cost function for calculating the damages from blocking the handover connections and idling channel resources, and a corresponding algorithm for minimizing the cost function are proposed. In addition, a guard channel decision maker (GCDM) determines the appropriate number of guard channels. The experimental results show that the ICR scheme does reduce the handover-blocking rate while keeping the number of idle channels small.

Decomposition of fuzzy ideal continuity via fuzzy idealization

  • Zahran, Ahmed M.;El-Baki, S. Ahmed Abd;Saber, Yaser Mohammed
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.9 no.2
    • /
    • pp.83-93
    • /
    • 2009
  • Recently, El-Naschie has shown that the notion of fuzzy topology may be relevant to quantum paretical physics in connection with string theory and E-infinity space time theory. In this paper, we study the concepts of r-fuzzy semi-I-open, r-fuzzy pre-I-open, r-fuzzy $\alpha$-I-open and r-fuzzy $\beta$-I-open sets, which is properly placed between r-fuzzy openness and r-fuzzy $\alpha$-I-openness (r-fuzzy pre-I-openness) sets regardless the fuzzy ideal topological space in Sostak sense. Moreover, we give a decomposition of fuzzy continuity, fuzzy ideal continuity and fuzzy ideal $\alpha$-continuity, and obtain several characterization and some properties of these functions. Also, we investigate their relationship with other types of function.