• Title/Summary/Keyword: network value

Search Result 3,103, Processing Time 0.028 seconds

The Prediction of Geometrical Configuration and Ductile Fracture Using the Artificial Neural network for a Cold Forged Product (신경망을 이용한 냉간 단조품의 기하학적 형상 및 연성파괴 예측)

  • Kim, D.J.;Ko, D.C.;Park, J.C.
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.13 no.10
    • /
    • pp.105-111
    • /
    • 1996
  • This paper suggests the scheme to simultaneously accomplish prediction of fracture initiation and geomeytical configuration of deformation in metal forming processes using the artificial neural network. A three-layer neural network is used and a back propagation algorithm is adapted to train the network. The Cookcroft-Lathjam criterion is used to estimate whether fracture occurs during the deformation process. The geometrical configuration and the value of ductile fracture are measured by finite element method. The predictions of neural network and numerical results of simple upsetting are compared. The proposed scheme has successfully predicted the geometrical configuration and fracture initiation.

  • PDF

Training an Artificial Neural Network for Estimating the Power Flow State

  • Sedaghati, Alireza
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.275-280
    • /
    • 2005
  • The principal context of this research is the approach to an artificial neural network algorithm which solves multivariable nonlinear equation systems by estimating the state of line power flow. First a dynamical neural network with feedback is used to find the minimum value of the objective function at each iteration of the state estimator algorithm. In second step a two-layer neural network structures is derived to implement all of the different matrix-vector products that arise in neural network state estimator analysis. For hardware requirements, as they relate to the total number of internal connections, the architecture developed here preserves in its structure the pronounced sparsity of power networks for which state the estimator analysis is to be carried out. A principal feature of the architecture is that the computing time overheads in solution are independent of the dimensions or structure of the equation system. It is here where the ultrahigh-speed of massively parallel computing in neural networks can offer major practical benefit.

  • PDF

Congestion Control of TCP Network Using a Self-Recurrent Wavelet Neural Network (자기회귀 웨이블릿 신경 회로망을 이용한 TCP 네트워크 혼잡제어)

  • Kim, Jae-Man;Park, Jin-Bae;Choi, Yoon-Ha
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.325-327
    • /
    • 2005
  • In this paper, we propose the design of active queue management (AQM) control system using the self-recurrent wavelet neural network (SRWNN). By regulating the queue length close to reference value, AQM can control the congestions in TCP network. The SRWNN is designed to perform as a feedback controller for TCP dynamics. The parameters of network are tunes to minimize the difference between the queue length of TCP dynamic model and the output of SRWNN using gradient-descent method. We evaluate the performances of the proposed AQM approach through computer simulations.

  • PDF

Deep Neural Network-based Jellyfish Distribution Recognition System Using a UAV (무인기를 이용한 심층 신경망 기반 해파리 분포 인식 시스템)

  • Koo, Jungmo;Myung, Hyun
    • The Journal of Korea Robotics Society
    • /
    • v.12 no.4
    • /
    • pp.432-440
    • /
    • 2017
  • In this paper, we propose a jellyfish distribution recognition and monitoring system using a UAV (unmanned aerial vehicle). The UAV was designed to satisfy the requirements for flight in ocean environment. The target jellyfish, Aurelia aurita, is recognized through convolutional neural network and its distribution is calculated. The modified deep neural network architecture has been developed to have reliable recognition accuracy and fast operation speed. Recognition speed is about 400 times faster than GoogLeNet by using a lightweight network architecture. We also introduce the method for selecting candidates to be used as inputs to the proposed network. The recognition accuracy of the jellyfish is improved by removing the probability value of the meaningless class among the probability vectors of the evaluated input image and re-evaluating it by normalization. The jellyfish distribution is calculated based on the unit jellyfish image recognized. The distribution level is defined by using the novelty concept of the distribution map buffer.

A GTS-based Sensor Data Gathering under a Powerful Beam Structure (파워 빔 구조에서 GTS 기반 센서 데이터 수집 방안)

  • Lee, Kil Hung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.39-45
    • /
    • 2014
  • This paper proposes an architecture of a sensor network for gathering data under a powerful beam cluster tree architecture. This architecture is used when there is a need to gather data from sensor node where there is no sink node connected to an existing network, or it is required to get a series of data specific to an event or time. The transmit distance of the beam signal is longer than that of the usual sensor node. The nodes of the network make a tree network when receiving a beam message transmitting from the powerful root node. All sensor nodes in a sink tree network synchronize to the superframe and know exactly the sequence value of the current superframe. When there is data to send to the sink node, the sensor node sends data at the corresponding allocated channel. Data sending schemes under the guaranteed time slot are tested and the delay and jitter performance is explained.

A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET (MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.87-93
    • /
    • 2013
  • MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.

Improvement of Network Traffic Monitoring Performance by Extending SNMP Function

  • Youn Chun-Kyun
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.171-175
    • /
    • 2004
  • Network management for detail analysis can cause speed decline of application in case of lack band width by traffic increase of the explosive Internet. Because a manager requests MIB value for the desired objects to an agent by management policy, and then the agent responds to the manager. Such processes are repeated, so it can cause increase of network traffic. Specially, repetitious occurrence of sending-receiving information is very inefficient for a same object when a trend analysis of traffic is performed. In this paper, an efficient SNMP is proposed to add new PDUs into the existing SNMP in order to accept time function. Utilizing this PDU, it minimizes unnecessary sending-receiving message and collects information for trend management of network efficiently. This proposed SNMP is tested for compatibility with the existing SNMP and decreases amount of network traffic largely

  • PDF

A Computing Method of a Process Coefficient in Prediction Model of Plate Temperature using Neural Network (신경망을 이용한 판온예측모델내 공정상수 설정 방법)

  • Kim, Tae-Eun;Lee, Haiyoung
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.11
    • /
    • pp.51-57
    • /
    • 2014
  • This paper presents an algorithmic type computing technique of process coefficient in predicting model of temperature for reheating furnace and also suggests a design method of neural network model to find an adequate value of process coefficient for arbitrary operating conditions including test conditons. The proposed neural network use furnace temperature, line speed and slab information as input variables, and process coefficient is output variable. Reasonable process coefficients can be obtained by an algorithmic procedure proposed in this paper using process data gathered at test conditons. Also, neural network model output equal process coefficient under same input conditions. This means that adquate process coefficients can be found by only computing neural network model without additive test even if operating conditions vary.

A Study about weight grant of Authentication level in USN environment

  • Choi, Bae-Young;Ahn, Byung-Ryul;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.165-168
    • /
    • 2005
  • The objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation facilities and are generally called artifacts. I later realized that this was not so the real problem is actually authentication. Recent results indicate scalability problems for flat ad hoc networks. Sensor network achieves function that handle surrounding information perception through sensor and sensed information to network that is consisted of sensor nodes of large number. Research about new access control techniques and height administration techniques need authentication information persons' certification assurance level classification in sensor network environment which become necessary different view base with authentication information at node for application of AAA technology in USN environment that must do authentication process using information that is collected from various sensor mountings. So, get base authentication information in sensor type and present weight grant model by security strength about authentication information through information who draw. In this paper collected information of sensor nodes model who give weight drawing security reinforcement as authentication information by purpose present be going to. and Must be able to can grasp special quality of each sensor appliances in various side and use this and decide authentication assurance level for value estimation as authentication information elements. Therefore, do to define item that can evaluate Authentication information elements thus and give simple authentication assurance level value accordingly because applying weight. Present model who give authentication assurance level value and weight for quotation according to security strength.

  • PDF

Customer Model Analysis for UCC Knowledge Sharing Service : A Case (UCC 지식 동영상 공유 서비스의 고객 모델 분석 사례)

  • Yoon, Eun-Jung;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.1
    • /
    • pp.15-30
    • /
    • 2009
  • As knowledge is now being distributed and shared through the Internet not only in the form of text but also in that of video, UCC (User Created Content) knowledge video sharing services have emerged on the Internet such as Instructables.com. This paper deals with a UCC knowledge video service in real world and reports the case of analyzing its customer model. The knowledge video sharing service can be considered as both a kind of discontinuous innovation, which requires knowledge provider's technical ability of creating and editing UCC video, and a value network, which matches UCC providers and consumers therefore brings network effect, we first adopt the Chasm theory as the base of the customer model and refine the customer model referencing the Technographics, which is also an Internet-refinement of the Chasm model. Finally, non-customer analysis of Blue Ocean strategy is applied for exploring potential customers of the service.

  • PDF