• Title/Summary/Keyword: ART-1 algorithm

검색결과 155건 처리시간 0.023초

멀티 액세스 엣지 컴퓨팅을 위한 Mobility-Aware Service Migration (MASM) 알고리즘 (Mobility-Aware Service Migration (MASM) Algorithms for Multi-Access Edge Computing)

  • 하지크;리 덕 타이;김문성;추현승
    • 인터넷정보학회논문지
    • /
    • 제21권4호
    • /
    • pp.1-8
    • /
    • 2020
  • 5G 목표 중 하나인 초신뢰성 저지연 통신에 도달하기 위해 멀티액세스 엣지 컴퓨팅 패러다임이 탄생했다. 이 패러다임은 클라우드 컴퓨팅 기술을 네트워크 엣지에 더 가깝게 하며 서비스 지연 시간을 줄이기 위해서는 네트워크 엣지에 있는 여러 Edge Cloud에서 서비스 호스팅된다. 모바일 사용자의 경우 서비스 품질 유지를 위해 서비스를 가장 적합한 Edge Cloud로 마이그레이션하는 것은 중요하고 고이동성 시나리오에서는 서비스 마이그레이션 문제가 더욱 복잡해진다. 고정 이동 경로에서 사용자 이동성과 Edge Cloud 선택에 대한 어떤 영향을 미치는 건지 관찰하는 것이 이 연구의 목표다. Mobility-Aware Service Migration (MASM)은 고이동성 시나리오 동안 라우팅 비용과 서비스 마이그레이션 비용이라는 두 가지 주요 매개변수를 기반으로 서비스 마이그레이션을 최적화하기 위해 제안된다. 제안된 알고리즘을 기존의 그리디 알고리즘과 비교하여 평가한다.

Effective Dimensionality Reduction of Payload-Based Anomaly Detection in TMAD Model for HTTP Payload

  • Kakavand, Mohsen;Mustapha, Norwati;Mustapha, Aida;Abdullah, Mohd Taufik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권8호
    • /
    • pp.3884-3910
    • /
    • 2016
  • Intrusion Detection System (IDS) in general considers a big amount of data that are highly redundant and irrelevant. This trait causes slow instruction, assessment procedures, high resource consumption and poor detection rate. Due to their expensive computational requirements during both training and detection, IDSs are mostly ineffective for real-time anomaly detection. This paper proposes a dimensionality reduction technique that is able to enhance the performance of IDSs up to constant time O(1) based on the Principle Component Analysis (PCA). Furthermore, the present study offers a feature selection approach for identifying major components in real time. The PCA algorithm transforms high-dimensional feature vectors into a low-dimensional feature space, which is used to determine the optimum volume of factors. The proposed approach was assessed using HTTP packet payload of ISCX 2012 IDS and DARPA 1999 dataset. The experimental outcome demonstrated that our proposed anomaly detection achieved promising results with 97% detection rate with 1.2% false positive rate for ISCX 2012 dataset and 100% detection rate with 0.06% false positive rate for DARPA 1999 dataset. Our proposed anomaly detection also achieved comparable performance in terms of computational complexity when compared to three state-of-the-art anomaly detection systems.

Predicting the buckling load of smart multilayer columns using soft computing tools

  • Shahbazi, Yaser;Delavari, Ehsan;Chenaghlou, Mohammad Reza
    • Smart Structures and Systems
    • /
    • 제13권1호
    • /
    • pp.81-98
    • /
    • 2014
  • This paper presents the elastic buckling of smart lightweight column structures integrated with a pair of surface piezoelectric layers using artificial intelligence. The finite element modeling of Smart lightweight columns is found using $ANSYS^{(R)}$ software. Then, the first buckling load of the structure is calculated using eigenvalue buckling analysis. To determine the accuracy of the present finite element analysis, a compression study is carried out with literature. Later, parametric studies for length variations, width, and thickness of the elastic core and of the piezoelectric outer layers are performed and the associated buckling load data sets for artificial intelligence are gathered. Finally, the application of soft computing-based methods including artificial neural network (ANN), fuzzy inference system (FIS), and adaptive neuro fuzzy inference system (ANFIS) were carried out. A comparative study is then made between the mentioned soft computing methods and the performance of the models is evaluated using statistic measurements. The comparison of the results reveal that, the ANFIS model with Gaussian membership function provides high accuracy on the prediction of the buckling load in smart lightweight columns, providing better predictions compared to other methods. However, the results obtained from the ANN model using the feed-forward algorithm are also accurate and reliable.

Development of Submarine Acoustic Information Management System

  • Na Young-Nam;Kim Young-Gyu;Kim Seongil;Cho Chang Bong;Kim Hyung-Soo;Lee Yonggon;Lee Sung Ho
    • The Journal of the Acoustical Society of Korea
    • /
    • 제24권2E호
    • /
    • pp.46-53
    • /
    • 2005
  • Agency for Defense Development (ADD) developed the Submarine Acoustic Information Management System (SAIMS Version 1.0) capable of interfacing some submarine sensors in operation and predicting detection environments for sonars. The major design concepts are as follows: 1) A proper acoustic model is examined and optimized to cover wide spectra of frequency ranges for both active and passive sonars. 2) Interfacing the submarine sensors to an electric navigation chart, the system attempts to maximize the applicability of the information produced. 3) The state-of-the-art database in large area is built and managed on the system. 4) An algorithm, which is able to estimate a full sound speed profile from the limited oceanographic data, is developed and employed on the system. This paper briefly describes design concepts and algorithms embedded in the SAIMS. The applicability of the SAIMS was verified through three sea experiments in October 2003-February 2004.

다단계제조공정의 품질개선을 위한 종속대안선택 근사해법 (Heuristic Algorithm for Selecting Mutually Dependent Qualify Improvement Alternatives of Multi-Stage Manufacturing Process)

  • 조남호
    • 산업경영시스템학회지
    • /
    • 제11권18호
    • /
    • pp.7-15
    • /
    • 1988
  • This study is concerned with selecting mutually dependent quality improvement alternatives with resource constraints. These qualify improvement alternatives art different fro the tradition at alternatives which are independent from each other. In other words, selection of any improvement alternative requires other related specific improvement. Also the overall product quality in a multi stage manufacturing process is characterized by a complex multiplication method rather than a simple addition method which dose not allow to solve a linear knapsack problem despite its popularity in the traditional study. This study suggests a non-linear integer programming model for selecting mutually dependent quality improvement alternatives in multi-stage manufacturing process. In order to apply the model to selecting alternatives. This study also suggests a heuristic mode1 based on a dynamic programming model which is more practical than the non-linear integer programming model. The logic of the heuristic model enables 1) to estimate improvement effectiveness values on all improvement alternatives specifically defined for this study. 2) to arrange the effectiveness values in a descending order, and 3) to select the best one among the alternatives based on their forward and backward linkage relationships. This process repeats to selects other best alternatives within the resource constraints. This process is presented in a Computer programming in Appendix A. Alsc a numerical example of model application is presented in Chapter 4.

  • PDF

UN-Substituted Video Steganography

  • Maria, Khulood Abu;Alia, Mohammad A.;Alsarayreh, Maher A.;Maria, Eman Abu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.382-403
    • /
    • 2020
  • Steganography is the art of concealing the existence of a secret data in a non-secret digital carrier called cover media. While the image of steganography methods is extensively researched, studies on other cover files remain limited. Videos are promising research items for steganography primitives. This study presents an improved approach to video steganography. The improvement is achieved by allowing senders and receivers exchanging secret data without embedding the hidden data in the cover file as in traditional steganography methods. The method is based mainly on searching for exact matches between the secret text and the video frames RGB channel pixel values. Accordingly, a random key-dependent data is generated, and Elliptic Curve Public Key Cryptography is used. The proposed method has an unlimited embedding capacity. The results show that the improved method is secure against traditional steganography attacks since the cover file has no embedded data. Compared to other existing Steganography video systems, the proposed system shows that the method proposed is unlimited in its embedding capacity, system invisibility, and robustness. The system achieves high precision for data recovery in the receiver. The performance of the proposed method is found to be acceptable across different sizes of video files.

A Study of Built-In-Test Diagnosis Mistakes as a False Alarm Filter Useful Redundant Techniques for Built-in-Test Related System

  • Oh, Hyun Seung;Yoo, Wang Jin
    • 품질경영학회지
    • /
    • 제21권2호
    • /
    • pp.1-16
    • /
    • 1993
  • Early generations of products had little to no inherent capability to test themselves. The technologies involved often required only visual inspection and limited probing to troubleshoot the system once it was turned over to maintenance personnel. However, as the complexity of military and commercial systems grew, symptoms of failure became less noticeable to the operator. Therefore, the procedure to access, inspect, repair and replace a component became complicated, the requirements for personnel skill and testing equipment increased. and it took too long of a time to maintain a system. Meanwhile, the need for availability became more mission-critical and maintenance become very expensive. The obvious solution was to design in-system circuits or devices to self-test the primary system, the Built-In-Test(BIT) was born. This approach has continued right on up through present systems and is an integral part of systems now being designed. The object of this paper is to present a state-of-the-art research for filtering out the BIT diagnosis mistakes using Bayesian analysis and develop the algorithm for Redundant systems with BIT to improve BIT diagnosis.

  • PDF

Object Classification based on Weakly Supervised E2LSH and Saliency map Weighting

  • Zhao, Yongwei;Li, Bicheng;Liu, Xin;Ke, Shengcai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권1호
    • /
    • pp.364-380
    • /
    • 2016
  • The most popular approach in object classification is based on the bag of visual-words model, which has several fundamental problems that restricting the performance of this method, such as low time efficiency, the synonym and polysemy of visual words, and the lack of spatial information between visual words. In view of this, an object classification based on weakly supervised E2LSH and saliency map weighting is proposed. Firstly, E2LSH (Exact Euclidean Locality Sensitive Hashing) is employed to generate a group of weakly randomized visual dictionary by clustering SIFT features of the training dataset, and the selecting process of hash functions is effectively supervised inspired by the random forest ideas to reduce the randomcity of E2LSH. Secondly, graph-based visual saliency (GBVS) algorithm is applied to detect the saliency map of different images and weight the visual words according to the saliency prior. Finally, saliency map weighted visual language model is carried out to accomplish object classification. Experimental results datasets of Pascal 2007 and Caltech-256 indicate that the distinguishability of objects is effectively improved and our method is superior to the state-of-the-art object classification methods.

Efficient Object-based Image Retrieval Method using Color Features from Salient Regions

  • An, Jaehyun;Lee, Sang Hwa;Cho, Nam Ik
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제6권4호
    • /
    • pp.229-236
    • /
    • 2017
  • This paper presents an efficient object-based color image-retrieval algorithm that is suitable for the classification and retrieval of images from small to mid-scale datasets, such as images in PCs, tablets, phones, and cameras. The proposed method first finds salient regions by using regional feature vectors, and also finds several dominant colors in each region. Then, each salient region is partitioned into small sub-blocks, which are assigned 1 or 0 with respect to the number of pixels corresponding to a dominant color in the sub-block. This gives a binary map for the dominant color, and this process is repeated for the predefined number of dominant colors. Finally, we have several binary maps, each of which corresponds to a dominant color in a salient region. Hence, the binary maps represent the spatial distribution of the dominant colors in the salient region, and the union (OR operation) of the maps can describe the approximate shapes of salient objects. Also proposed in this paper is a matching method that uses these binary maps and which needs very few computations, because most operations are binary. Experiments on widely used color image databases show that the proposed method performs better than state-of-the-art and previous color-based methods.

International Congress on Electron Tomography에 대한 간략한 이해와 현황 (A Glance of Electron Tomography through 4th International Congress on Electron Tomography)

  • 유임주;박승남
    • Applied Microscopy
    • /
    • 제38권3호
    • /
    • pp.275-278
    • /
    • 2008
  • Electron tomography (ET) is an electron microscopic technique for obtaining a 3-D image from any electron microscopy specimen and its application in biomedical science has been increased thanks to development of electron microscopy and related technologies during the last decade. There are few researches on ET in Korea during this period. Although the importance of ET has been recognized recently by many researchers, initial approach to electron tomographic research is not easy for beginners. The 4th International Congress on Electron Tomography (4 ICET) was held on Nov $5{\sim}8$, 2006, at San Diego. The program dealt instrumentation, reconstruction algorithm, visualization/quantitative analysis and electron tomographic presentation of biological specimen and nano particles. 1 have summarized oral presentations and analyzed the posters presented on the meeting. Cryo-electron microscopic system was popular system for ET and followed conventional transmission electron microscopic system. Cultured cell line and tissue were most popular specimens analyzed and microorganisms including bacteria and virus also constituted important specimens. This analysis provides a current state of art in ET research and a guide line for practical application of ET and further research strategies.