• Title/Summary/Keyword: Computer Networks

Search Result 5,223, Processing Time 0.031 seconds

An Emphirical Closed Loop Modeling of a Suspension System using a Neural Networks (신경회로망을 이용한 폐회로 현가장치의 시스템 모델링)

  • 김일영;정길도;노태수;홍동표
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1996.11a
    • /
    • pp.384-388
    • /
    • 1996
  • The closed-loop system modeling of an Active/semiactive suspension system has been accomplished through an artificial neural Networks. The 7DOF full model as the system equation of motion has been derived and the output feedback linear quadratic regulator has been designed for the control purpose. For the neural networks training set of a sample data has been obtained through the computer simulation. A 7DOF full model with LQR controller simulated under the several road conditions such as sinusoidal bumps and the rectangular bumps. A general multilayer perceptron neural network is used for the dynamic modeling and the target outputs are feedback to the input layer. The Backpropagation method is used as the training algorithm. The modeling of system and the model validation have been shown through computer simulations.

  • PDF

Efficient Cluster Radius and Transmission Ranges in Corona-based Wireless Sensor Networks

  • Lai, Wei Kuang;Fan, Chung-Shuo;Shieh, Chin-Shiuh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1237-1255
    • /
    • 2014
  • In wireless sensor networks (WSNs), hierarchical clustering is an efficient approach for lower energy consumption and extended network lifetime. In cluster-based multi-hop communications, a cluster head (CH) closer to the sink is loaded heavier than those CHs farther away from the sink. In order to balance the energy consumption among CHs, we development a novel cluster-based routing protocol for corona-structured wireless sensor networks. Based on the relaying traffic of each CH conveys, adequate radius for each corona can be determined through nearly balanced energy depletion analysis, which leads to balanced energy consumption among CHs. Simulation results demonstrate that our clustering approach effectively improves the network lifetime, residual energy and reduces the number of CH rotations in comparison with the MLCRA protocols.

Datacenter-Oriented Elastic Optical Networks: Architecture, Operation, and Solutions

  • Peng, Limei;Sun, Yantao;Chen, Min;Park, Kiejin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3955-3966
    • /
    • 2014
  • With the exponentially increasing Internet traffic and emergence of more versatile and heterogeneous applications, the design of datacenter networks (DCNs) is subject to unprecedented requirements for larger capacity and more flexible switching granularities. Envisioning Optical-Orthogonal Frequency Division Multiplexing (O-OFDM) as a promising candidate for such a scenario, we motivate the use of O-OFDM as the underlying switching technology in order to provide sufficient switching capacity and elastic bandwidth allocation. For this purpose, this article reviews the recent progresses of DCN deployment and assesses the scenario where the O-OFDM transmission and switching technology is employed in the underlying transport plane. We discuss the key issues of the datacenter-oriented O-OFDM optical networks, and in particular, elaborate on a number of open issues and solutions including system interconnection architecture, routing and resource assignment, survivability, and energy-efficiency.

Distributed CMIP Design and Performance Analysis in ATM Networks (ATM의 분산 CMIP 설계와 성능 분석)

  • 이정재;정재영
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.4
    • /
    • pp.193-198
    • /
    • 1999
  • According to the spread of Asynchronous Tranfer Mode(ATM) Networks Telecommunication Management Network(TMN) over ATM Networks becomes an important issue. This paper presents with an Performance Analysis and the designs for comparing TCP/IP-Based Internet SNMP(Simple Network Management Protocol) and ITU-T's Distributed CMIP configuration. The experimental results shows that propose method is expected to be effectively used in Distributed Environments such as Internet, ATM. and mobile networks where interoperability and scalability are required.

  • PDF

The TOR Data Communication System

  • Haraty, Ramzi A.;Zantout, Bassam
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.415-420
    • /
    • 2014
  • Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful - one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity - the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.

Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks

  • Kim, Hyo-Jin;Chitti, Ramachandra Bhargav;Song, Joo-Seok
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.137-150
    • /
    • 2011
  • Mobile ad hoc networks are expected to be widely used in the near future. However, they are susceptible to various security threats because of their inherent characteristics. Malicious flooding attacks are one of the fatal attacks on mobile ad hoc networks. These attacks can severely clog an entire network, as a result of clogging the victim node. If collaborative multiple attacks are conducted, it becomes more difficult to prevent. To defend against these attacks, we propose a novel defense mechanism in mobile ad hoc networks. The proposed scheme enhances the amount of legitimate packet processing at each node. The simulation results show that the proposed scheme also improves the end-to-end packet delivery ratio.

Mention Detection Using Pointer Networks for Coreference Resolution

  • Park, Cheoneum;Lee, Changki;Lim, Soojong
    • ETRI Journal
    • /
    • v.39 no.5
    • /
    • pp.652-661
    • /
    • 2017
  • A mention has a noun or noun phrase as its head and constructs a chunk that defines any meaning, including a modifier. Mention detection refers to the extraction of mentions from a document. In mentions, coreference resolution refers to determining any mentions that have the same meaning. Pointer networks, which are models based on a recurrent neural network encoder-decoder, outputs a list of elements corresponding to an input sequence. In this paper, we propose mention detection using pointer networks. This approach can solve the problem of overlapped mention detection, which cannot be solved by a sequence labeling approach. The experimental results show that the performance of the proposed mention detection approach is F1 of 80.75%, which is 8% higher than rule-based mention detection, and the performance of the coreference resolution has a CoNLL F1 of 56.67% (mention boundary), which is 7.68% higher than coreference resolution using rule-based mention detection.

Design and Implementation of a Component-based Simulator for the Virtual Laboratory of Computer Networks (컴퓨터 네트워크 가상 실습을 위한 컴포넌트 기반의 시뮬레이터 설계 및 구현)

  • 임명식;김기형
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.1
    • /
    • pp.1-10
    • /
    • 2003
  • Recently, various network protocols have been developed to keep step with the rapid growth of Internet users. For the education of students in the computer networks classes, there have been many attempts to allow students experiment routers setting, operations and management of networks by themselves, in addition to the classroom lectures based on textbooks. One of the attempts is to install expensive real router experiment sets in laboratories for students, and one another is using router and network simulators for virtual experiments. This paper presents the design and implementation of NetSim, a scalable, component-based simulator environment for the network experimentation. NetSim expands the existing component-based JavaSim simulation tool for the education purpose, and it allows the design and experiment of various networks and protocols. For the evaluation of NetSim, it is shown that the network design and RIP-based router setting process is possible in NetSim.

  • PDF

Design and Evaluation of a Fuzzy Hierarchical Location Service for Mobile Ad Hoc Networks

  • Bae, Ihn-Han;Kim, Yoon-Jeong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.3
    • /
    • pp.757-766
    • /
    • 2007
  • Location services are used in mobile ad hoc and hybrid networks to locate either the geographic position of a given node in the network or a data item. One of the main usages of position location services is presented in location based routing algorithms. In particular, geographic routing protocols can route messages more efficiently to their destinations based on the destination node's geographic position, which is provided by a location service. In this paper, we propose an adaptive location service on the basis of fuzzy logic called FHLS (Fuzzy Hierarchical Location Service) for mobile ad hoc networks. The adaptive location update scheme using the fuzzy logic on the basis of the mobility and the call preference of mobile nodes is used by the FHLS. The performance of the FHLS is to be evaluated by a simulation, and compared with that of existing HLS scheme.

  • PDF

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

  • Yoo, Dae-Suk;Choi, Seung-Sik
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.501-510
    • /
    • 2010
  • Wireless sensor networks consist of sensor nodes which are expected to be battery-powered and are hard to replace or recharge. Thus, reducing the energy consumption of sensor nodes is an important design consideration in wireless sensor networks. For the implementation of an energy-efficient MAC protocol, a Sensor-MAC based on the IEEE 802.11 protocol, which has energy efficient scheduling, has been proposed. In this paper, we propose a Dynamic S-MAC that adapts dynamically to the network-traffic state. The dynamic S-MAC protocol improves the energy consumption of the S-MAC by changing the frame length according to the network-traffic state. Using an NS-2 Simulator, we compare the performance of the Dynamic S-MAC with that of the S-MAC protocol.