• Title/Summary/Keyword: Network Log

Search Result 370, Processing Time 0.024 seconds

A SENSOR DATA PROCESSING SYSTEM FOR LARGE SCALE CONTEXT AWARENESS

  • Choi Byung Kab;Jung Young Jin;Lee Yang Koo;Park Mi;Ryu Keun Ho;Kim Kyung Ok
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.333-336
    • /
    • 2005
  • The advance of wireless telecommunication and observation technologies leads developing sensor and sensor network for serving the context information continuously. Besides, in order to understand and cope with the context awareness based on the sensor network, it is becoming important issue to deal with plentiful data transmitted from various sensors. Therefore, we propose a context awareness system to deal with the plentiful sensor data in a vast area such as the prevention of a forest fire, the warning system for detecting environmental pollution, and the analysis of the traffic information, etc. The proposed system consists of the context acquisition to collect and store various sensor data, the knowledge base to keep context information and context log, the rule manager to process context information depending on user defined rules, and the situation information manager to analysis and recognize the context, etc. The proposed system is implemented for managing renewable energy data management transmitted from a large scale area.

  • PDF

The Network Utility Maximization Problem with Multiclass Traffic

  • Vo, Phuong Luu;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.219-221
    • /
    • 2012
  • The concave utility in the Network Utility Maximization (NUM) problem is only suitable for elastic flows. In networks with multiclass traffic, the utility can be concave, linear, step or sigmoidal. Hence, the basic NUM becomes a nonconvex optimization problem. The current approach utilizes the standard dual-based decomposition method. It does not converge in case of scarce resource. In this paper, we propose an algorithm that always converges to a local optimal solution to the nonconvex NUM after solving a series of convex approximation problems. Our techniques can be applied to any log-concave utilities.

Design and Implementation of Contact Control Smart Phone Application

  • Ko, Yong Min;Lim, Dong Kyun;Min, Byong Seok
    • International journal of advanced smart convergence
    • /
    • v.2 no.1
    • /
    • pp.30-31
    • /
    • 2013
  • In the recent years, as smart phones popularized, the number of people who use IMS (instant messaging service) and SNS (social network service) rapidly has increased as the usage of SMS (short message service) relatively decreased. That is why this thesis suggests a contact control service based on Android. It contains an inducing function that calls acquaintances, which were given a score based on the level of familiarity from saved contacts and call logs. And it provides an overall ranking of call log in order to grasp frequently called people. This developed system was tested on Samsung Galaxy S2 and LG Optimus LTE / Android 2.2 which were the main smart phone models.

Efficient face detection based on Neural Network (신경망 기반의 효율적인 얼굴 검출)

  • Kang, Chang-Ho;Choi, Jong-Moo;Kim, Moon-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10a
    • /
    • pp.243-246
    • /
    • 2000
  • 얼굴 영역 검출은 주어진 영상에서 얼굴의 유.무, 개수 및 위치를 검출하는 것으로 본 논문은 영상에서 얼굴을 검출하는 방법으로 신경망(Neural Network)을 적용하였다. 검출률의 향상 및 오검출률의 감소, 계산량을 최대한 줄이기 위해 후보 영역의 최적화와 얼굴의 대칭성(symmetry of face)을 이용한 좌우 평균 명암도 비교방법, 평균 얼굴 (average face)을 이용한 템플릿 매칭을 사용하였고, 실험을 통해서 제안한 방법이 효과적으로 수행됨을 보였다.

  • PDF

The Application of BP and RBF Neural Network Methods on Vehicle Detection in Aerial Imagery

  • Choi, Jae-Young;Jang, Hyoung-Jong;Yang, Young-Kyu
    • Korean Journal of Remote Sensing
    • /
    • v.24 no.5
    • /
    • pp.473-481
    • /
    • 2008
  • This paper presents an approach to Back-propagation and Radial Basis Function neural network method with various training set for automatic vehicle detection from aerial images. The initial extraction of candidate object is based on Mean-shift algorithm with symmetric property of a vehicle structure. By fusing the density and the symmetry, the method can remove the ambiguous objects and reduce the cost of processing in the next stage. To extract features from the detected object, we describe the object as a log-polar shape histogram using edge strengths of object and represent the orientation and distance from its center. The spatial histogram is used for calculating the momentum of object and compensating the direction of object. BPNN and RBFNN are applied to verify the object as a vehicle using a variety of non-car training sets. The proposed algorithm shows the results which are according to the training data. By comparing the training sets, advantages and disadvantages of them have been discussed.

Deep learning classifier for the number of layers in the subsurface structure

  • Kim, Ho-Chan;Kang, Min-Jae
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.51-58
    • /
    • 2021
  • In this paper, we propose a deep learning classifier for estimating the number of layers in the Earth's structure. When installing a grounding system, knowledge of the subsurface in the area is absolutely necessary. The subsurface structure can be modeled by the earth parameters. Knowing the exact number of layers can significantly reduce the amount of computation to estimate these parameters. The classifier consists of a feedforward neural network. Apparent resistivity curves were used to train the deep learning classifier. The apparent resistivity at 20 equally spaced log points in each curve are used as the features for the input of the deep learning classifier. Apparent resistivity curve data sets are collected either by theoretical calculations or by Wenner's measurement method. Deep learning classifiers are coded by Keras, an open source neural network library written in Python. This model has been shown to converge with close to 100% accuracy.

THE USE OF MOBILE COMPUTERS FOR CONSTRUCTION PROJECTS

  • Chul S. Kim
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.956-961
    • /
    • 2009
  • When construction engineers perform their work in the jobsite, they have to record as-built conditions in the project log (Data Collection). On the other hand, the engineers often have to refer to the construction documents when necessary at the job faces (Data Access). The practice of Data Collection and Data Access in the jobsite can be greatly enhanced by utilizing mobile computing with wireless communications. In this paper, two cases of mobile computing applications for construction field management are presented; Mobile Specifications System and Mobile Data Collection System. The demonstration of the process for developing two mobile applications is the primary purpose of the paper. The problems and issues involved with adopting mobile computing for construction field are also presented. The simple information framework for mobile computing has been also proposed as an outcome of the research. As for development tools, readily available relational database and wireless network have been used. The use of commercial mobile broadband was examined for data communication where local area network is not available.

  • PDF

Generation of Pseudo Porosity Logs from Seismic Data Using a Polynomial Neural Network Method (다항식 신경망 기법을 이용한 탄성파 탐사 자료로부터의 유사공극률 검층자료 생성)

  • Choi, Jae-Won;Byun, Joong-Moo;Seol, Soon-Jee
    • Journal of the Korean earth science society
    • /
    • v.32 no.6
    • /
    • pp.665-673
    • /
    • 2011
  • In order to estimate the hydrocarbon reserves, the porosity of the reservoir must be determined. The porosity of the area without a well is generally calculated by extrapolating the porosity logs measured at wells. However, if not only well logs but also seismic data exist on the same site, the more accurate pseudo porosity log can be obtained through artificial neural network technique by extracting the relations between the seismic data and well logs at the site. In this study, we have developed a module which creates pseudo porosity logs by using the polynomial neural network method. In order to obtain more accurate pseudo porosity logs, we selected the seismic attributes which have high correlation values in the correlation analysis between the seismic attributes and the porosity logs. Through the training procedure between selected seismic attributes and well logs, our module produces the correlation weights which can be used to generate the pseudo porosity log in the well free area. To verify the reliability and the applicability of the developed module, we have applied the module to the field data acquired from F3 Block in the North Sea and compared the results to those from the probabilistic neural network method in a commercial program. We could confirm the reliability of our module because both results showed similar trend. Moreover, since the pseudo porosity logs from polynomial neural network method are closer to the true porosity logs at the wells than those from probabilistic method, we concluded that the polynomial neural network method is effective for the data sets with insufficient wells such as F3 Block in the North Sea.

A Study on the Abnormal Behavior Detection Model through Data Transfer Data Analysis (자료 전송 데이터 분석을 통한 이상 행위 탐지 모델의 관한 연구)

  • Son, In Jae;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.647-656
    • /
    • 2020
  • Recently, there has been an increasing number of cases in which important data (personal information, technology, etc.) of national and public institutions are leaked to the outside world. Surveys show that the largest cause of such leakage accidents is "insiders." Insiders of organization with the most authority can cause more damage than technology leaks caused by external attacks due to the organization. This is due to the characteristics of insiders who have relatively easy access to the organization's major assets. This study aims to present an optimized property selection model for detecting such abnormalities through supervised learning algorithms among machine learning techniques using actual data such as CrossNet data transfer system transmission log, e-mail transmission log, and personnel information, which safely transmits data between separate areas (security area and non-security area) of the business network and the Internet network.

Performance Evaluation and Optimization of NoSQL Databases with High-Performance Flash SSDs (고성능 플래시 SSD 환경에서 NoSQL 데이터베이스의 성능 평가 및 최적화)

  • Han, Hyuck
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.93-100
    • /
    • 2017
  • Recently, demands for high-performance flash-based storage devices (i.e., flash SSD) have rapidly grown in social network services, cloud computing, super-computing, and enterprise storage systems. The industry and academic communities made the NVMe specification for high-performance storage devices, and NVMe-based flash SSDs can be now obtained in the market. In this article, we evaluate performance of NoSQL databases that social network services and cloud computing services heavily adopt by using NVMe-based flash SSDs. To this end, we use NVMe SSD that Samsung Electronics recently developed, and the SSD used in this study has performance up to 3.5GB/s for sequential read/write operations. We use WiredTiger for NoSQL databases, and it is a default storage engine for MongoDB. Our experimental results show that log processing in NoSQL databases is a major overhead when high-performance NVMe-based flash SSDs are used. Furthermore, we optimize components of log processing and optimized WiredTiger show up to 15 times better performance than original WiredTiger.