• Title/Summary/Keyword: Cloud Networks

Search Result 259, Processing Time 0.028 seconds

Video smoke detection with block DNCNN and visual change image

  • Liu, Tong;Cheng, Jianghua;Yuan, Zhimin;Hua, Honghu;Zhao, Kangcheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3712-3729
    • /
    • 2020
  • Smoke detection is helpful for early fire detection. With its large coverage area and low cost, vision-based smoke detection technology is the main research direction of outdoor smoke detection. We propose a two-stage smoke detection method combined with block Deep Normalization and Convolutional Neural Network (DNCNN) and visual change image. In the first stage, each suspected smoke region is detected from each frame of the images by using block DNCNN. According to the physical characteristics of smoke diffusion, a concept of visual change image is put forward in this paper, which is constructed by the video motion change state of the suspected smoke regions, and can describe the physical diffusion characteristics of smoke in the time and space domains. In the second stage, the Support Vector Machine (SVM) classifier is used to classify the Histogram of Oriented Gradients (HOG) features of visual change images of the suspected smoke regions, in this way to reduce the false alarm caused by the smoke-like objects such as cloud and fog. Simulation experiments are carried out on two public datasets of smoke. Results show that the accuracy and recall rate of smoke detection are high, and the false alarm rate is much lower than that of other comparison methods.

Technique for Estimating the Number of Active Flows in High-Speed Networks

  • Yi, Sung-Won;Deng, Xidong;Kesidis, George;Das, Chita R.
    • ETRI Journal
    • /
    • v.30 no.2
    • /
    • pp.194-204
    • /
    • 2008
  • The online collection of coarse-grained traffic information, such as the total number of flows, is gaining in importance due to a wide range of applications, such as congestion control and network security. In this paper, we focus on an active queue management scheme called SRED since it estimates the number of active flows and uses the quantity to indicate the level of congestion. However, SRED has several limitations, such as instability in estimating the number of active flows and underestimation of active flows in the presence of non-responsive traffic. We present a Markov model to examine the capability of SRED in estimating the number of flows. We show how the SRED cache hit rate can be used to quantify the number of active flows. We then propose a modified SRED scheme, called hash-based two-level caching (HaTCh), which uses hashing and a two-level caching mechanism to accurately estimate the number of active flows under various workloads. Simulation results indicate that the proposed scheme provides a more accurate estimation of the number of active flows than SRED, stabilizes the estimation with respect to workload fluctuations, and prevents performance degradation by efficiently isolating non-responsive flows.

  • PDF

An Analysis for the Night illuminance Affected on Light Environments and Weather Conditions (광환경과 기상조건에 따른 야간조도 영향 분석)

  • Lee, Jaewon;Park, Inchun;Choi, Cheolmin;Kim, Young-chul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.24 no.1
    • /
    • pp.25-32
    • /
    • 2016
  • This study deals with the light environments and weather conditions affecting to the night illuminance over the Korean peninsula. The experiment was executed to analyze the effects on the illuminance at separate sites(Gyeryong and Pilseung) considering the different light environments. The analysis was applied to illuminance measurement from the lightmeter, which was developed for the IYA(International Year of Astronomy) 2009, in order to observe the illuminance of areal networks. The weather observations, such as the cloud cover and visibility, were used to understand the quantitative influence of the illuminance to the selected sites. The results show that the illuminance measurements are significantly different from data of the operational illuminance prediction model which simply applies extinction effect for the illuminance. It shows that these differences are caused by the light environments and weather conditions for each site. Therefore, it can be confirmed that the night illuminance is the output of interaction with the characteristics of light for luminous sources.

A Prototype Virtual Network Embedding System using OpenStack

  • Fukushima, Yukinobu;Sato, Kohei;Goda, Itsuho;Ryu, Heung-Gyoon;Yokohira, Tokumi
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.1
    • /
    • pp.60-65
    • /
    • 2017
  • Network virtualization enables us to make efficient use of resources in a physical network by embedding multiple virtual networks in the physical network. In this paper, we develop a prototype of a virtual network embedding system. Our system consists of OpenStack, which is an open source cloud service platform, and shell scripts. Because OpenStack does not provide a quality of service control function, we realize bandwidth reservation for virtual links by making use of the ingress policing function of Open vSwitch, which is a virtual switch used in OpenStack. The shell scripts in our system automatically construct the required virtual network on the physical network using the OpenStack command-line interface, and they reserve bandwidth for virtual links using the Open vSwitch command. Experimental evaluation confirms that our system constructs the requested virtual network and appropriately allocates node and link resources to it.

IP Studio Infrastructure intended for Modern Production and TV broadcasting Facilities

  • Mfitumukiza, Joseph;Mariappan, Vinayagam;Lee, Minwoo;Lee, Seungyoun;Lee, Junghoon;Lee, Juyoung;Lim, Yunsik;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.61-65
    • /
    • 2016
  • In the TV broadcasting, movie production and business the transportation of video between creators (programmers, studios) and distributors (broadcast and cable networks, cable and satellites companies) is still a mix of File Transfer Protocol (FTP), physical delivery, and expensive multicast satellite. Cloud-based file sync-and-share providers like Dropbox and box are playing an increasing role, but the industry's unique demands for speed and multicasting have fueled the growth of IP Video transport. This paper gives a solid grasp of the major elements of IP video technology, including content preparation, system architecture alternatives and network performance management.

Precise Point Positioning using Atomium (아토미움을 이용한 정밀절대측위)

  • Yu, Dong-Hui
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.910-915
    • /
    • 2018
  • The precise time, which is an essential element of the Global Navigation Satellite System (GNSS), such as US GPS, GLONASS in Russia, Galileo in Europe, and Beidou in China, is an important foundation for various economic activities around the world. Communication systems, power grids, IoT, Cloud computing and financial networks operate based on the precise time not only for the operating principles, but also for the synchronization and operational efficiency between tasks. In this paper, we introduce the Atomium software for the first time in South Korea. Atomium was developed by ORB in Belgium to calculate the clock error(clock solution) with GNSS signal observation data based on PPP method. The observation data is provided by Korea Research Institute of Standards and Science(KRISS). The results of MJD57106 with Atomium software are presented.

Efficient Virtual Network Mapping Method (효율적인 가상 네트워크 대응 방안)

  • Woo, Miae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1793-1800
    • /
    • 2016
  • Network virtualization is considered as an enabling technology to accomodate recently introduced new services such as cloud services and data center networks on top of the existing network environment. In this paper, an efficient virtual network mapping method is proposed which takes account of the location and resource requirements of virtual nodes and the bandwidth requirements of virtual links. The proposed method sets bandwidth as the priority metric for network mapping, and searches for a set of substrate nodes and paths that houses the virtual nodes and virtual links. Through the simulation experiments, it is verified that the proposed method provides better cost to revenue ratio and fast experiment time without degrading success rate of virtual network mapping.

Unstructured Data Processing Using Keyword-Based Topic-Oriented Analysis (키워드 기반 주제중심 분석을 이용한 비정형데이터 처리)

  • Ko, Myung-Sook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.11
    • /
    • pp.521-526
    • /
    • 2017
  • Data format of Big data is diverse and vast, and its generation speed is very fast, requiring new management and analysis methods, not traditional data processing methods. Textual mining techniques can be used to extract useful information from unstructured text written in human language in online documents on social networks. Identifying trends in the message of politics, economy, and culture left behind in social media is a factor in understanding what topics they are interested in. In this study, text mining was performed on online news related to a given keyword using topic - oriented analysis technique. We use Latent Dirichiet Allocation (LDA) to extract information from web documents and analyze which subjects are interested in a given keyword, and which topics are related to which core values are related.

A Study a Secure Energy Trading Strategy based on a Blockchain (블록체인 기반 안전한 에너지 거래 전략 연구)

  • Kim, Hak Boo;Kim, Kijung;Bae, Kitae
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.18-24
    • /
    • 2020
  • Existing energy was a system produced by a specific company and sold to consumers, but it is expected that in the near future, producers will become consumers and consumers will become producers. Recently, the emergence of cloud systems, 5G network construction, and energy reuse, including solar energy, are changing the shape of the energy market. In order to share energy, there are various agent systems, energy networks, and structures that form markets. In this study, we defined the above three and proposed a strategy using the Secure Energy Model (SEM) by applying a blockchain for a safe and fair energy market. The analytical results showed that the trust between the energy producers and consumers participating in the energy trade was formed.

Evaluating C-RAN Fronthaul Functional Splits in Terms of Network Level Energy and Cost Savings

  • Checko, Aleksandra;Avramova, Andrijana P.;Berger, Michael S.;Christiansen, Henrik L.
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.162-172
    • /
    • 2016
  • The placement of the complete baseband processing in a centralized pool results in high data rate requirement and inflexibility of the fronthaul network, which challenges the energy and cost effectiveness of the cloud radio access network (C-RAN). Recently, redesign of the C-RAN through functional split in the baseband processing chain has been proposed to overcome these challenges. This paper evaluates, by mathematical and simulation methods, different splits with respect to network level energy and cost efficiency having in the mind the expected quality of service. The proposed mathematical model quantifies the multiplexing gains and the trade-offs between centralization and decentralization concerning the cost of the pool, fronthaul network capacity and resource utilization. The event-based simulation captures the influence of the traffic load dynamics and traffic type variation on designing an efficient fronthaul network. Based on the obtained results, we derive a principle for fronthaul dimensioning based on the traffic profile. This principle allows for efficient radio access network with respect to multiplexing gains while achieving the expected users' quality of service.