• 제목/요약/키워드: Approach of Network

검색결과 4,556건 처리시간 0.037초

Wild Image Object Detection using a Pretrained Convolutional Neural Network

  • Park, Sejin;Moon, Young Shik
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제3권6호
    • /
    • pp.366-371
    • /
    • 2014
  • This paper reports a machine learning approach for image object detection. Object detection and localization in a wild image, such as a STL-10 image dataset, is very difficult to implement using the traditional computer vision method. A convolutional neural network is a good approach for such wild image object detection. This paper presents an object detection application using a convolutional neural network with pretrained feature vector. This is a very simple and well organized hierarchical object abstraction model.

Supply Chain Network Design Considering Environmental Factor and Transportation Types

  • Yun, YoungSu
    • 한국산업정보학회논문지
    • /
    • 제23권5호
    • /
    • pp.33-41
    • /
    • 2018
  • Most important thing when designing and implementing a supply chain network is to consider various problems which may occur in real world situation. In this paper, we propose a supply chain network considering two problems (environmental factor and transportation types) under real world situation. CO2 emission amount as environmental factor is considered since it is usually generated from production and transportation processes. Normal delivery, direct delivery and direct shipment as transportation types are also considered since many customers ask various transportation types for delivery or shipment of their products under on-line or off-line purchase environment. The proposed supply chain network considering environmental factor and transportation types is represented in a mathematical formulation and implemented using hybrid genetic algorithm (HGA) approach. In numerical experiments, several scales of supply chain networks are presented and implemented using HGA approach. The performance of the HGA approach is compared with those of some conventional approaches under various measures of performance. Finally, it is proved that the performance of the HGA approach is superior to those of the others.

Traffic Forecast Assisted Adaptive VNF Dynamic Scaling

  • Qiu, Hang;Tang, Hongbo;Zhao, Yu;You, Wei;Ji, Xinsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권11호
    • /
    • pp.3584-3602
    • /
    • 2022
  • NFV realizes flexible and rapid software deployment and management of network functions in the cloud network, and provides network services in the form of chained virtual network functions (VNFs). However, using VNFs to provide quality guaranteed services is still a challenge because of the inherent difficulty in intelligently scaling VNFs to handle traffic fluctuations. Most existing works scale VNFs with fixed-capacity instances, that is they take instances of the same size and determine a suitable deployment location without considering the cloud network resource distribution. This paper proposes a traffic forecasted assisted proactive VNF scaling approach, and it adopts the instance capacity adaptive to the node resource. We first model the VNF scaling as integer quadratic programming and then propose a proactive adaptive VNF scaling (PAVS) approach. The approach employs an efficient traffic forecasting method based on LSTM to predict the upcoming traffic demands. With the obtained traffic demands, we design a resource-aware new VNF instance deployment algorithm to scale out under-provisioning VNFs and a redundant VNF instance management mechanism to scale in over-provisioning VNFs. Trace-driven simulation demonstrates that our proposed approach can respond to traffic fluctuation in advance and reduce the total cost significantly.

엣지 컴퓨팅 환경에서 적용 가능한 딥러닝 기반 라벨 검사 시스템 구현 (Implementation of Deep Learning-based Label Inspection System Applicable to Edge Computing Environments)

  • 배주원;한병길
    • 대한임베디드공학회논문지
    • /
    • 제17권2호
    • /
    • pp.77-83
    • /
    • 2022
  • In this paper, the two-stage object detection approach is proposed to implement a deep learning-based label inspection system on edge computing environments. Since the label printed on the products during the production process contains important information related to the product, it is significantly to check the label information is correct. The proposed system uses the lightweight deep learning model that able to employ in the low-performance edge computing devices, and the two-stage object detection approach is applied to compensate for the low accuracy relatively. The proposed Two-Stage object detection approach consists of two object detection networks, Label Area Detection Network and Character Detection Network. Label Area Detection Network finds the label area in the product image, and Character Detection Network detects the words in the label area. Using this approach, we can detect characters precise even with a lightweight deep learning models. The SF-YOLO model applied in the proposed system is the YOLO-based lightweight object detection network designed for edge computing devices. This model showed up to 2 times faster processing time and a considerable improvement in accuracy, compared to other YOLO-based lightweight models such as YOLOv3-tiny and YOLOv4-tiny. Also since the amount of computation is low, it can be easily applied in edge computing environments.

A Moving Window Principal Components Analysis Based Anomaly Detection and Mitigation Approach in SDN Network

  • Wang, Mingxin;Zhou, Huachun;Chen, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권8호
    • /
    • pp.3946-3965
    • /
    • 2018
  • Network anomaly detection in Software Defined Networking, especially the detection of DDoS attack, has been given great attention in recent years. It is convenient to build the Traffic Matrix from a global view in SDN. However, the monitoring and management of high-volume feature-rich traffic in large networks brings significant challenges. In this paper, we propose a moving window Principal Components Analysis based anomaly detection and mitigation approach to map data onto a low-dimensional subspace and keep monitoring the network state in real-time. Once the anomaly is detected, the controller will install the defense flow table rules onto the corresponding data plane switches to mitigate the attack. Furthermore, we evaluate our approach with experiments. The Receiver Operating Characteristic curves show that our approach performs well in both detection probability and false alarm probability compared with the entropy-based approach. In addition, the mitigation effect is impressive that our approach can prevent most of the attacking traffic. At last, we evaluate the overhead of the system, including the detection delay and utilization of CPU, which is not excessive. Our anomaly detection approach is lightweight and effective.

FENC: Fast and Efficient Opportunistic Network Coding in wireless networks

  • Pahlavani, Peyman;Derhami, Vali;Bidoki, Ali Mohammad Zareh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권1호
    • /
    • pp.52-67
    • /
    • 2011
  • Network coding is a newly developed technology that can cause considerable improvements in network throughput. COPE is the first network coding approach for wireless mesh networks and it is based on opportunistic Wireless Network Coding (WNC). It significantly improves throughput of multi-hop wireless networks utilizing network coding and broadcast features of wireless medium. In this paper we propose a new method, called FENC, for opportunistic WNC that improves the network throughput. In addition, its complexity is lower than other opportunistic WNC approaches. FENC utilizes division and conquer method to find an optimal network coding. The numerical results show that the proposed opportunistic algorithm improves the overall throughput as well as network coding approach.

The Neural-Network Approach to Recognize Defect Pattern in LED Manufacturing

  • Chen, Wen-Chin;Tsai, Chih-Hung;Hsu, Shou-Wen
    • International Journal of Quality Innovation
    • /
    • 제7권3호
    • /
    • pp.58-69
    • /
    • 2006
  • This paper presents neural network-based recognition system for automatic light emitting diode (LED) inspection. The back-propagation neural network (BPNN) is proposed and tested. The current-voltage (I-V) characteristic data of LED from the inspection process is used for the network training and testing. This study selects 300 random samples as network training and employs 100 samples as network testing. The experimental results show that if the classification work is done well, the accuracy of recognition is 100%, and the testing speed of the proposed recognition system is almost one half faster than the traditional inspection system does. The proposed neural-network approach is successfully demonstrated by real data sets and can be effectively developed as a recognition system for a practical application purpose.

Network 분석과 신경망을 이용한 Cellular 생산시스템 설계 (Network Analysis and Neural Network Approach for the Cellular Manufacturing System Design)

  • 이홍철
    • 대한산업공학회지
    • /
    • 제24권1호
    • /
    • pp.23-35
    • /
    • 1998
  • This article presents a network flow analysis to form flexible machine cells with minimum intercellular part moves and a neural network model to form part families. The operational sequences and production quantity of the part, and the number of cells and the cell size are taken into considerations for a 0-1 quadratic programming formulation and a network flow based solution procedure is developed. After designing the machine cells, a neural network approach for the integration of part families and the automatic assignment of new parts to the existing cells is proposed. A multi-layer backpropagation network with one hidden layer is used. Experimental results with varying number of neurons in hidden layer to evaluate the role of hidden neurons in the network learning performance are also presented. The comprehensive methodology developed in this article is appropriate for solving large-scale industrial applications without building the knowledge-based expert rule for the cellular manufacturing environment.

  • PDF

Trend Analysis of Data Mining Research Using Topic Network Analysis

  • Kim, Hyon Hee;Rhee, Hey Young
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권5호
    • /
    • pp.141-148
    • /
    • 2016
  • In this paper, we propose a topic network analysis approach which integrates topic modeling and social network analysis. We collected 2,039 scientific papers from five top journals in the field of data mining published from 1996 to 2015, and analyzed them with the proposed approach. To identify topic trends, time-series analysis of topic network is performed based on 4 intervals. Our experimental results show centralization of the topic network has the highest score from 1996 to 2000, and decreases for next 5 years and increases again. For last 5 years, centralization of the degree centrality increases, while centralization of the betweenness centrality and closeness centrality decreases again. Also, clustering is identified as the most interrelated topic among other topics. Topics with the highest degree centrality evolves clustering, web applications, clustering and dimensionality reduction according to time. Our approach extracts the interrelationships of topics, which cannot be detected with conventional topic modeling approaches, and provides topical trends of data mining research fields.

An Efficient Overlay for Unstructured P2P File Sharing over MANET using Underlying Cluster-based Routing

  • Shah, Nadir;Qian, Depei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권5호
    • /
    • pp.799-818
    • /
    • 2010
  • In traditional unstructured P2P file sharing network, each peer establishes connections with a certain number of randomly chosen other peers. This would lead to redundant traffic and P2P network partition in mobile ad hoc network (MANET). We propose an approach to construct an efficient unstructured P2P overlay over MANET using underlying cluster-based routing (CBRP). One of the peers in the P2P network is used as a root-peer to connect all peers. Each peer maintains connection with physically closer peers such that it can reach the root-peer. The peer constructs a minimum-spanning tree consisting of itself, its directly connected neighbor peers and 2-hop away neighbor peers to remove far away redundant links and to build an overlay closer to the physical network. Due to on-demand nature of inter-cluster routing of CBRP, the positioning algorithm for MANET is used to retrieve the file by a peer from the source peer via shorter path in the physical network. We can show by simulation that our approach performs better in comparison with the existing approach.