• Title/Summary/Keyword: network algorithms

Search Result 2,993, Processing Time 0.027 seconds

The Comparison of Neural Network Learning Paradigms: Backpropagation, Simulated Annealing, Genetic Algorithm, and Tabu Search

  • Chen Ming-Kuen
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 1998.11a
    • /
    • pp.696-704
    • /
    • 1998
  • Artificial neural networks (ANN) have successfully applied into various areas. But, How to effectively established network is the one of the critical problem. This study will focus on this problem and try to extensively study. Firstly, four different learning algorithms ANNs were constructed. The learning algorithms include backpropagation, simulated annealing, genetic algorithm, and tabu search. The experimental results of the above four different learning algorithms were tested by statistical analysis. The training RMS, training time, and testing RMS were used as the comparison criteria.

  • PDF

Performance Comparison of Neural Network Algorithm for Shape Recognition of Welding Flaws (초음파 검사 기반의 용접결함 분류성능 개선에 관한 연구)

  • 김재열;윤성운;김창현;송경석;양동조
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2004.04a
    • /
    • pp.287-292
    • /
    • 2004
  • In this study, we made a comparative study of backpropagation neural network and probabilistic neural network and bayesian classifier and perceptron as shape recognition algorithm of welding flaws. For this purpose, variables are applied the same to four algorithms. Here, feature variable is composed of time domain signal itself and frequency domain signal itself, Through this process, we confirmed advantages/disadvantages of four algorithms and identified application methods of few algorithms.

  • PDF

Channel Selection Technique Considering Energy Efficiency in Routing Algorithms of the Sensor Network (센서네트워크의 라우팅 프로토콜에서 에너지 효율을 고려한 채널 선택 기법)

  • Subedi, Sagun;Lee, Sang-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.5
    • /
    • pp.662-665
    • /
    • 2020
  • Energy Efficiency in any WSN (Wireless Sensor Network) is a critical issue to elongate the life of the batteries equipped in sensors. LEACH(Low Energy Adaptive Clustering Hierarchy) is one of the mostly used routing algorithms which reduce the amount of transmitted data and save the energy in the network. In this paper, a new technique to select channels in routing algorithms is suggested and compared with the LEACH, ALEACH and PEGASIS. This technique forms clusters depending upon the node density as the deployement of the nodes is random. As a result, the proposed algorithm presents the better performance of the energy efficiency than those of the current algorithms.

Efficient Greedy Algorithms for Influence Maximization in Social Networks

  • Lv, Jiaguo;Guo, Jingfeng;Ren, Huixiao
    • Journal of Information Processing Systems
    • /
    • v.10 no.3
    • /
    • pp.471-482
    • /
    • 2014
  • Influence maximization is an important problem of finding a small subset of nodes in a social network, such that by targeting this set, one will maximize the expected spread of influence in the network. To improve the efficiency of algorithm KK_Greedy proposed by Kempe et al., we propose two improved algorithms, Lv_NewGreedy and Lv_CELF. By combining all of advantages of these two algorithms, we propose a mixed algorithm Lv_MixedGreedy. We conducted experiments on two synthetically datasets and show that our improved algorithms have a matching influence with their benchmark algorithms, while being faster than them.

Review Of Some Cryptographic Algorithms In Cloud Computing

  • Alharbi, Mawaddah Fouad;Aldosari, Fahd;Alharbi, Nawaf Fouad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.41-50
    • /
    • 2021
  • Cloud computing is one of the most expanding technologies nowadays; it offers many benefits that make it more cost-effective and more reliable in the business. This paper highlights the various benefits of cloud computing and discusses different cryptography algorithms being used to secure communications in cloud computing environments. Moreover, this thesis aims to propose some improvements to enhance the security and safety of cloud computing technologies.

Generating Mechanisms of Initial and Candidate Solutions in Simulated Annealing for Packet Communication Network Design Problems (패킷 통신 네트워크 설계를 위한 시뮬레이티드 애닐링 방법에서 초기해와 후보해 생성방법)

  • Yim Dong-Soon;Woo Hoon-Shik
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.29 no.3
    • /
    • pp.145-155
    • /
    • 2004
  • The design of a communication network has long been a challenging optimization problem. Since the optimal design of a network topology is a well known as a NP-complete problem, many researches have been conducted to obtain near optimal solutions in polynomial time instead of exact optimal solutions. All of these researches suggested diverse heuristic algorithms that can be applied to network design problems. Among these algorithms, a simulated annealing algorithm has been proved to guarantee a good solution for many NP-complete problems. in applying the simulated annealing algorithms to network design problems, generating mechanisms for initial solutions and candidate solutions play an important role in terms of goodness of a solution and efficiency. This study aims at analyzing these mechanisms through experiments, and then suggesting reliable mechanisms.

Enhancement OLSR Routing Protocol using Particle Swarm Optimization (PSO) and Genrtic Algorithm (GA) in MANETS

  • Addanki, Udaya Kumar;Kumar, B. Hemantha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.131-138
    • /
    • 2022
  • A Mobile Ad-hoc Network (MANET) is a collection of moving nodes that communicate and collaborate without relying on a pre-existing infrastructure. In this type of network, nodes can freely move in any direction. Routing in this sort of network has always been problematic because of the mobility of nodes. Most existing protocols use simple routing algorithms and criteria, while another important criterion is path selection. The existing protocols should be optimized to resolve these deficiencies. 'Particle Swarm Optimization (PSO)' is an influenced method as it resembles the social behavior of a flock of birds. Genetic algorithms (GA) are search algorithms that use natural selection and genetic principles. This paper applies these optimization models to the OLSR routing protocol and compares their performances across different metrics and varying node sizes. The experimental analysis shows that the Genetic Algorithm is better compared to PSO. The comparison was carried out with the help of the simulation tool NS2, NAM (Network Animator), and xgraph, which was used to create the graphs from the trace files.

Beamforming Optimization for Multiuser Two-Tier Networks

  • Jeong, Young-Min;Quek, Tony Q.S.;Shin, Hyun-Dong
    • Journal of Communications and Networks
    • /
    • v.13 no.4
    • /
    • pp.327-338
    • /
    • 2011
  • With the incitation to reduce power consumption and the aggressive reuse of spectral resources, there is an inevitable trend towards the deployment of small-cell networks by decomposing a traditional single-tier network into a multi-tier network with very high throughput per network area. However, this cell size reduction increases the complexity of network operation and the severity of cross-tier interference. In this paper, we consider a downlink two-tier network comprising of a multiple-antenna macrocell base station and a single femtocell access point, each serving multiples users with a single antenna. In this scenario, we treat the following beamforming optimization problems: i) Total transmit power minimization problem; ii) mean-square error balancing problem; and iii) interference power minimization problem. In the presence of perfect channel state information (CSI), we formulate the optimization algorithms in a centralized manner and determine the optimal beamformers using standard convex optimization techniques. In addition, we propose semi-decentralized algorithms to overcome the drawback of centralized design by introducing the signal-to-leakage plus noise ratio criteria. Taking into account imperfect CSI for both centralized and semi-decentralized approaches, we also propose robust algorithms tailored by the worst-case design to mitigate the effect of channel uncertainty. Finally, numerical results are presented to validate our proposed algorithms.

Algorithms for Maximum Integer Multiflow and Multicut in a Ring Network (링 네트워크에서의 최대 다품종정수흐름문제와 최소 다중절단면문제에 대한 해법)

  • Myung, Young-Soo
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.2
    • /
    • pp.89-97
    • /
    • 2007
  • We study the maximum integer multiflow problem and the minimum multicut problem in a ring network. Both problems in a general network are known to be NP-hard. In this paper, we develop polynomial time algorithms to solve the problems. We also prove that even In a ring network, maximum multiflow is not always integral, which implies that the amount of maximum integer flow does not always reach the minimum capacity of multicut.

Analysis for ER switch Algorithms on various scale ATM Networks (다양한 Scale의 ATM 망에서의 ER 스위치 알고리즘의 성능 분석)

  • 김탁근;이광재;최삼길;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.144-147
    • /
    • 2001
  • In ATM Network, many algorithms have been proposed for rate-based ABR flow control. The object of these algorithms is to turn around from cell loss and to use the unused bandwidth by ABR Traffic. These Algorithms are applied to control ABR Traffic by EFCI and ER switches. In this paper, we apply these algorithms to the various stale networks and analysis the characteristics of the algorithms and then attempt to show the loss rate of each algorithms. As the result we compare and analysis the efficiency of them.

  • PDF