• 제목/요약/키워드: network computing

검색결과 3,181건 처리시간 0.029초

Training an Artificial Neural Network for Estimating the Power Flow State

  • Sedaghati, Alireza
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.275-280
    • /
    • 2005
  • The principal context of this research is the approach to an artificial neural network algorithm which solves multivariable nonlinear equation systems by estimating the state of line power flow. First a dynamical neural network with feedback is used to find the minimum value of the objective function at each iteration of the state estimator algorithm. In second step a two-layer neural network structures is derived to implement all of the different matrix-vector products that arise in neural network state estimator analysis. For hardware requirements, as they relate to the total number of internal connections, the architecture developed here preserves in its structure the pronounced sparsity of power networks for which state the estimator analysis is to be carried out. A principal feature of the architecture is that the computing time overheads in solution are independent of the dimensions or structure of the equation system. It is here where the ultrahigh-speed of massively parallel computing in neural networks can offer major practical benefit.

  • PDF

유비쿼터스 네트워크를 이용한 패션뷰티산업 전략에 관한 연구 (A study on the Strategy of Fashion and Beauty Industry Using Ubiquitous Network)

  • 이용일;이애순
    • 한국패션뷰티학회지
    • /
    • 제6권1호
    • /
    • pp.16-20
    • /
    • 2008
  • Ubiquitous computing which is called, the innovation of the 21st Century is a core technology of next generation. RFID technology is noticed, and physical distribution, home network, telematics, like industry automatization are developed by using various technique. Particulary, They use RFID technology for fashion and beauty industry, So, supplying network management, physical distribution management and warehouse management are investigated for the automatization. What we have investigated so far, a traceability system is made of ubiquitous sensor network for monitoring fashion and beauty industry environment. The proposed system using EPC network can provide information of industrial products traceability quickly and efficiently. Moreover, this system with RFID Technology gives intelligence of distribution and record. In this paper, We recommend the vision of Ubiquitous convergence of fashion and beauty industry.

  • PDF

규칙 기반의 네트워크 장애 자기 복구 시스템 (Rule-based network fault self-recovery system)

  • 이재욱;안성진;정진욱
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • 제10권1호
    • /
    • pp.83-93
    • /
    • 2006
  • 본 논문에서는 유비쿼터스 컴퓨팅 환경에서 규칙 기반의 네트워크 장애 복구 시스템을 제안한다. 이 시스템은 유비쿼터스 컴퓨팅 환경에서 네트워크에 장애가 발생하였을 때, 정해진 규칙을 기반으로 장애를 스스로 복구할 수 있는 장애 관리 시스템이다. 시스템에 적용되는 규칙들을 네트워크 장애의 원인으로 분류하여 제시하였다. 그리고 본 논문에서는 네트워크 장애 복구 시스템이 각 상황에 맞게 규칙이 적용됨을 시뮬레이션을 통해 증명하였다.

  • PDF

Penetration Testing and Network Auditing: Linux

  • Stiawan, Deris;Idris, Mohd. Yazid;Abdullah, Abdul Hanan
    • Journal of Information Processing Systems
    • /
    • 제11권1호
    • /
    • pp.104-115
    • /
    • 2015
  • Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks have been continuously increasing. Currently, the technical capability to attack has tended to decrease. On the contrary, performances of hacking tools are evolving, growing, simple, comprehensive, and accessible to the public. In this work, network penetration testing and auditing of the Redhat operating system (OS) are highlighted as one of the most popular OS for Internet applications. Some types of attacks are from a different side and new attack method have been attempted, such as: scanning for reconnaissance, guessing the password, gaining privileged access, and flooding the victim machine to decrease availability. Some analyses in network auditing and forensic from victim server are also presented in this paper. Our proposed system aims confirmed as hackable or not and we expect for it to be used as a reference for practitioners to protect their systems from cyber-attacks.

Avoiding Energy Holes Problem using Load Balancing Approach in Wireless Sensor Network

  • Bhagyalakshmi, Lakshminarayanan;Murugan, Krishanan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권5호
    • /
    • pp.1618-1637
    • /
    • 2014
  • Clustering wireless sensor network is an efficient way to reduce the energy consumption of individual nodes in a cluster. In clustering, multihop routing techniques increase the load of the Cluster head near the sink. This unbalanced load on the Cluster head increases its energy consumption, thereby Cluster heads die faster and create an energy hole problem. In this paper, we propose an Energy Balancing Cluster Head (EBCH) in wireless sensor network. At First, we balance the intra cluster load among the cluster heads, which results in nonuniform distribution of nodes over an unequal cluster size. The load received by the Cluster head in the cluster distributes their traffic towards direct and multihop transmission based on the load distribution ratio. Also, we balance the energy consumption among the cluster heads to design an optimum load distribution ratio. Simulation result shows that this approach guarantees to increase the network lifetime, thereby balancing cluster head energy.

소프트컴퓨팅 기법을 이용한 다음절 단어의 음성인식 (Speech Recognition of Multi-Syllable Words Using Soft Computing Techniques)

  • 이종수;윤지원
    • 정보저장시스템학회논문집
    • /
    • 제6권1호
    • /
    • pp.18-24
    • /
    • 2010
  • The performance of the speech recognition mainly depends on uncertain factors such as speaker's conditions and environmental effects. The present study deals with the speech recognition of a number of multi-syllable isolated Korean words using soft computing techniques such as back-propagation neural network, fuzzy inference system, and fuzzy neural network. Feature patterns for the speech recognition are analyzed with 12th order thirty frames that are normalized by the linear predictive coding and Cepstrums. Using four models of speech recognizer, actual experiments for both single-speakers and multiple-speakers are conducted. Through this study, the recognizers of combined fuzzy logic and back-propagation neural network and fuzzy neural network show the better performance in identifying the speech recognition.

MANET 네트워크에서의 JXTA 기반의 P2P 통신 (JXTA based P2P communication in MANET Networks)

  • 정왕부;서현곤;김기형;손영호
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2005년도 춘계학술대회 논문집
    • /
    • pp.139-143
    • /
    • 2005
  • The P2P is a network environment supporting data exchange which is directly connected peers without limit of existing server-client and intervening central server for resource or offered service with each peer. JXTA is a representative of P2P system. JXTA is a typical distributed computing model that proposed by Sun Microsystems. JXTA that doesn't require centralized services or resources is adaptable in extreme changes of network organization. MANET(Mobile Ad Hoc Network) is a representative wireless network that is composed of mobile nodes without infrastructure. So MANET establishes the path for the communication of each peers and maintains the newest routing information by exchanging routing information. In this paper, we propose a technique of JXTAMAUET which implements JXTA which is the P2P network system from the wireless network which is becoming the foundation of ubiquitous computing. For the performance evaluation of the JXTAMANET, we use simulation.

  • PDF

Low-Complexity Network Coding Algorithms for Energy Efficient Information Exchange

  • Wang, Yu;Henning, Ian D.
    • Journal of Communications and Networks
    • /
    • 제10권4호
    • /
    • pp.396-402
    • /
    • 2008
  • The use of network coding in wireless networks has been proposed in the literature for energy efficient broadcast. However, the decoding complexity of existing algorithms is too high for low-complexity devices. In this work we formalize the all-to-all information exchange problem and shows how to optimize the transmission scheme in terms of energy efficiency. Furthermore, we prove by construction that there exists O(1) -complexity network coding algorithms for grid networks which can achieve such optimality. We also present low-complexity heuristics for random. topology networks. Simulation results show that network coding algorithms outperforms forwarding algorithms in most cases.

Distributed Denial of Service Defense on Cloud Computing Based on Network Intrusion Detection System: Survey

  • Samkari, Esraa;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.67-74
    • /
    • 2022
  • One type of network security breach is the availability breach, which deprives legitimate users of their right to access services. The Denial of Service (DoS) attack is one way to have this breach, whereas using the Intrusion Detection System (IDS) is the trending way to detect a DoS attack. However, building IDS has two challenges: reducing the false alert and picking up the right dataset to train the IDS model. The survey concluded, in the end, that using a real dataset such as MAWILab or some tools like ID2T that give the researcher the ability to create a custom dataset may enhance the IDS model to handle the network threats, including DoS attacks. In addition to minimizing the rate of the false alert.

새로운 IT 서비스 모델, 클라우드 비즈니스 모델 : M-Pesa 사례 분석 (Emerging IT Services Model : Cloud Business Model, Focused on M-Pesa Case)

  • 함유근;윤영수;강한수;김진성
    • 한국IT서비스학회지
    • /
    • 제11권3호
    • /
    • pp.287-304
    • /
    • 2012
  • Cloud computing, which means a new way of deploying information technology(IT) in organizations as a service and charging per use, has a deep impact on organizations' IT accessibility, agility and efficiency of its usage. More than that, the emergence of cloud computing surpasses a mere technological innovation, making business model innovation possible. We call this innovation realized by could computing a cloud business model. This study develops a comprehensive framework of business model, first, and then defines and analyzes the cloud business model through this framework. This study also examines the case of M-Pesa mobile payment as a cloud business model in which a new value creation and profit realization schemes have been realized and industry value network has changed. Finally, this study discusses the business implications from this new business model.