• Title/Summary/Keyword: Integrated Networks

Search Result 927, Processing Time 0.057 seconds

Variations of AlexNet and GoogLeNet to Improve Korean Character Recognition Performance

  • Lee, Sang-Geol;Sung, Yunsick;Kim, Yeon-Gyu;Cha, Eui-Young
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.205-217
    • /
    • 2018
  • Deep learning using convolutional neural networks (CNNs) is being studied in various fields of image recognition and these studies show excellent performance. In this paper, we compare the performance of CNN architectures, KCR-AlexNet and KCR-GoogLeNet. The experimental data used in this paper is obtained from PHD08, a large-scale Korean character database. It has 2,187 samples of each Korean character with 2,350 Korean character classes for a total of 5,139,450 data samples. In the training results, KCR-AlexNet showed an accuracy of over 98% for the top-1 test and KCR-GoogLeNet showed an accuracy of over 99% for the top-1 test after the final training iteration. We made an additional Korean character dataset with fonts that were not in PHD08 to compare the classification success rate with commercial optical character recognition (OCR) programs and ensure the objectivity of the experiment. While the commercial OCR programs showed 66.95% to 83.16% classification success rates, KCR-AlexNet and KCR-GoogLeNet showed average classification success rates of 90.12% and 89.14%, respectively, which are higher than the commercial OCR programs' rates. Considering the time factor, KCR-AlexNet was faster than KCR-GoogLeNet when they were trained using PHD08; otherwise, KCR-GoogLeNet had a faster classification speed.

MODE : Managed Objects(MOs) Development Environment for TMN-based ATM Network Management (MODE :TMN 체계의 ATM 망 관리를 위한 관리 객체 개발 환경)

  • Gang, Won-Seok;Kim, Gi-Hyeong;Kim, Yeong-Tak
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.2
    • /
    • pp.415-424
    • /
    • 1999
  • Systematic telecommunication network management is essential for operating large-scale integrated networks which consist of various network components manufactured by different vendors. ISO and ITU-T recommend the CMIP-based TMN architecture for this purpose. TMN uses GDMO for the definition of managed objects, and various GDMO compilers have been developed. However, the development of management objects by using these compilers is still a difficult task. In this paper, we present a GUI-based managed objects development environment, MODE. MODE divides managed object codes by system independent code(SIC) and system dependent cede(SDC). By providing development environments for SIC and SDC, MODE can ease the development of managed objects. To show the efficiency of MODE, we develop the managed objects of an ATM switch in MODE.

  • PDF

Solar Energy Harvesting Wireless Sensor Network Simulator (태양 에너지 기반 무선 센서 네트워크 시뮬레이터)

  • Yi, Jun Min;Kang, Min Jae;Noh, Dong Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.477-485
    • /
    • 2015
  • Most existing simulators for wireless sensor networks(WSNs) are modeling battery-based sensors and providing MAC and routing protocols designed for battery-based WSNs. However, recently, as energy harvesting sensor systems have been studied more extensively, there is an increasing need for appropriate simulators, but few related studies have employed such simulators. Unlike existing simulators, simulators for energy harvesting WSNs require a new energy model that is integrated with the energy-harvesting model, rechargeable battery model, and energy-consuming model. Additionally, it should enable the applications of the well-known MAC and routing protocols designed for energy-harvesting WSNs, as well as a user-friendly interface for convenience. In this work, we design and implement a user-friendly simulator for solar energy-harvesting WSNs.

Finding the Time Dependent K Least Time Paths in Intermodal Transportation Networks (복합교통망에서의 동적K최소시간경로탐색)

  • Jo, Jong-Seok;Sin, Seong-Il;Im, Gang-Won;Mun, Byeong-Seop
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.5 s.91
    • /
    • pp.77-88
    • /
    • 2006
  • The purpose of this study is to Propose the time dependent K-least time path algorithm applicable to a real-time based operation strategy in multi-modal transportation network. For this purpose, we developed the extended method based on entire path deletion method which was used in the static K-least time path algorithm. This method was applied to time dependent K-least time path algorithm to find k least time paths in order based on both time dependant mode-link travel time and transfer cost In particular, this algorithm find the optimal solution, easily describing transfer behavior, such as walking and waiting for transfer by applying a link-based time dependent label. Finally, we examined the verification and application of the Proposed algorithm through case study.

Design of Link Cost Metric for IEEE 802.11-based Mesh Routing (IEEE 802.11 MAC 특성을 고려한 무선 메쉬 네트워크용 링크 품질 인자 개발)

  • Lee, Ok-Hwan;Kim, Seong-Kwan;Choi, Sung-Hyun;Lee, Sung-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.456-469
    • /
    • 2009
  • We develop a new wireless link quality metric, ECOT(Estimated Channel Occupancy Time) that enables a high throughput route setup in wireless mesh networks. The key feature of ECOT is to be applicable to diverse mesh network environments where IEEE 802.11 MAC (Medium Access Control) variants are used. We take into account the exact operational features of 802.11 MAC protocols, such as 802.11 DCF(Distributed Coordination Function), 802.11e EDCA(Enhanced Distributed Channel Access) with BACK (Block Acknowledgement), and 802.11n A-MPDU(Aggregate MAC Protocol Data Unit), and derive the integrated link metric based on which a high throughput end-to-end path is established. Through extensive simulation in random-topology settings, we evaluate the performance of proposed link metric and present that ECOT shows 8.5 to 354.4% throughput gain over existing link metrics.

Implementation of an Intelligent Visual Surveillance System Based on Embedded System (임베디드 시스템 기반 지능형 영상 감시 시스템 구현)

  • Song, Jae-Min;Kim, Dong-Jin;Jung, Yong-Bae;Park, Young-Seak;Kim, Tae-Hyo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.13 no.2
    • /
    • pp.83-90
    • /
    • 2012
  • In this paper, an intelligent visual surveillance system based on a NIOS II embedded platform is implemented. By this time, embedded based visual surveillance systems were restricted for a special purpose because of high dependence upon hardware. In order to improve the restriction, we implement a flexible embedded platform, which is available for various purpose of applications. For high speed processing of software based programming, we improved performance of the system which is integrated the SOPC type of NIOS II embedded processor and image processing algorithms by using software programming and C2H(The Altera NIOS II C-To-Hardware(C2H) Acceleration Compiler) compiler in the core of the hardware platform. Then, we constructed a server system which globally manage some devices by the NIOS II embedded processor platform, and included the control function on networks to increase efficiency for user. We tested and evaluated our system at the designated region for visual surveillance.

Dragon-MAC: Securing Wireless Sensor Network with Authenticated Encryption (Dragon-MAC: 인증 암호를 이용한 효율적인 무선센서네크워크 보안)

  • Lim, Shu-Yun;Pu, Chuan-Chin;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1519-1527
    • /
    • 2007
  • In order to combat the security threats that sensor networks are exposed to, a cryptography protocol is implemented at sensor nodes for point-to-point encryption between nodes. Given that nodes have limited resources, symmetric cryptography that is proven to be efficient for low power devices is implemented. Data protection is integrated into a sensor's packet by the means of symmetric encryption with the Dragon stream cipher and incorporating the newly designed Dragon-MAC Message Authentication Code. The proposed algorithm was designed to employ some of the data already computed by the underlying Dragon stream cipher for the purpose of minimizing the computational cost of the operations required by the MAC algorithm. In view that Dragon is a word based stream cipher with a fast key stream generation, it is very suitable for a constrained environment. Our protocol regarded the entity authentication and message authentication through the implementation of authenticated encryption scheme in wireless sensor nodes.

A Study of the Priority of the Local-Logistics Policy in the Incheon Metropolitan City (인천광역시 지역물류정책의 우선순위에 관한 연구)

  • Roh, Kyoung-Joon;Song, Sang Hwa
    • Journal of Korea Port Economic Association
    • /
    • v.32 no.1
    • /
    • pp.59-77
    • /
    • 2016
  • This paper reviews the current local logistics policy of the Incheon Metropolitan City and prioritizes policy agenda based on fuzzy AHP and IPA (Importance Performance Analysis). The analysis recommends that the city needs to keep up the current good works at the policy agenda such as early expansion of the international logistics hub and improvement of the provincial highway network.The policy agenda including the logistics parks, the transport networks and the hinterland activities are evaluated as overkilled agenda. Revitalization of the logistics database, establishment of an integrated business support center, modal shift, and public logistics support were classified as low-priority policy agenda. The policy agenda of urgent concentration includes development of new logistics business and air cargo industry.

Tactical Service Mesh for Intelligent Traffic QoS Coordination over Future Tactical Network (미래 전술망의 지능적 트래픽 QoS 조율을 위한 전술 서비스 메쉬)

  • Kang, Moonjoong;Shin, Jun-Sik;Park, Juman;Park, Chan Yi;Kim, JongWon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.369-381
    • /
    • 2019
  • As tactical networks are gradually shifting toward IP-based flexible operation for diversified battlefield services, QoS(Quality-of-Service) coordination for service differentiation becomes essential to overcome the heterogeneous and scarce networking resources limitations. QoS coordination for tactical network traffic should be able to monitor and react the dynamic changes in underlying network topology and service priorities. In this paper, by adopting the emerging cloud-native service mesh concept into tactical network context, we study the feasibility of intelligent QoS coordination by employing tactical service mesh(TSM) as an additional layer to support enhanced traffic quality monitoring and control. The additional TSM layer can leverage distributed service-mesh proxies at tactical mesh WAN(Wide Area Network) nodes so that service-aware differentiated QoS coordination can be effectively designed and integrated with TSM-assisted traffic monitoring and control. Also, by validating the feasibility of TSM layer for QoS coordination with miniaturized experimental setup, we show the potential of the proposed approach with several approximated battlefield traffics over a simulated TSM-enabled tactical network.

IoT and Wireless Sensor Network Monitoring for Campus Security (캠퍼스 보안을 위한 IoT 및 무선 센서 네트워크 모니터링)

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Usman, Muhammad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.33-41
    • /
    • 2018
  • The idea of the Internet of Things as a platform on the Smart Campus has become increasingly popular. It requires an infrastructure consisting of communication networks, sensor nodes and gateways to connect to the Internet. Each sensor node is responsible for gathering data from the environment. This document outlines a network of wireless sensors on the Internet for the application of Smart Campus monitoring. Wireless sensor network Monitoring have become a complete solution to using a low power implementation and integrated systems. The numerous restrictions however result from the low communication range, the limited computing power, the lack of availability of the network protocol, the lack of programming security and the security failures in the areas of confidentiality, integrity and availability. A new security technique and its functionality for WSNM nodes developed. Development in the research of a secure network and suggestions for avoiding denial of service (DOS) and complexity attacks. These systems if properly implemented can provide an energy efficiency mechanism through pre-allocation and a new key from key management models with a secure routine algorithm.