• Title/Summary/Keyword: 네트워크 접근제어

Search Result 488, Processing Time 0.024 seconds

A New Approach of Self-Organizing Fuzzy Polynomial Neural Networks Based on Information Granulation and Genetic Algorithms (정보 입자화와 유전자 알고리즘에 기반한 자기구성 퍼지 다항식 뉴럴네트워크의 새로운 접근)

  • Park Ho-Sung;Oh Sung-Kwun;Kim Hvun-Ki
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.2
    • /
    • pp.45-51
    • /
    • 2006
  • In this paper, we propose a new architecture of Information Granulation based genetically optimized Self-Organizing Fuzzy Polynomial Neural Networks (IG_gSOFPNN) that is based on a genetically optimized multilayer perceptron with fuzzy polynomial neurons (FPNs) and discuss its comprehensive design methodology involving mechanisms of genetic optimization, especially information granulation and genetic algorithms. The proposed IG_gSOFPNN gives rise to a structurally optimized structure and comes with a substantial level of flexibility in comparison to the one we encounter in conventional SOFPNNs. The design procedure applied in the construction of each layer of a SOFPNN deals with its structural optimization involving the selection of preferred nodes (or FPNs) with specific local characteristics (such as the number of input variables, the order of the polynomial of the consequent part of fuzzy rules, and a collection of the specific subset of input variables) and addresses specific aspects of parametric optimization. In addition, the fuzzy rules used in the networks exploit the notion of information granules defined over system's variables and formed through the process of information granulation. That is, we determine the initial location (apexes) of membership functions and initial values of polynomial function being used in the premised and consequence part of the fuzzy rules respectively. This granulation is realized with the aid of the hard c-menas clustering method (HCM). To evaluate the performance of the IG_gSOFPNN, the model is experimented with using two time series data(gas furnace process and NOx process data).

A Study of Security Certification and Accreditation for DNP3 linkage section in EMS/SCADA (EMS/SCADA의 DNP3 연계구간 보안성 평가·인증 기술 연구)

  • Kim, Jongwan;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.703-713
    • /
    • 2015
  • The linking system between the control system and the field devices in the existing EMS/SCADA, in order to increase the reliability of the data, and access control through the separation of external network. Currently, There is a tendency that the need for connection to an external network that takes into account the economic aspect, systematic management and efficiency of operations is increasing. Such is evolved linkage section, is to have more security vulnerabilities than in the past, Eventually communication EMS/SCADA linkage section requires special management method. In this paper, taking into account the domestic environment, were presented the security Certification and Accreditation technology that was applied to serial DNP3 and TCP/IP based DNP3 that are mainly used in EMS/SCADA linkage section. Presented to security of Certification and Accreditation technology, divided into Resource Robustness Test and Malicious Packet Test for evaluate the safety. Each of the security requirements and evaluation method in proposed technology, is an attempt to present the differentiation of the existing Certification and Accreditation technology.

Triangulation Algorithm for Multi-user Spatial Multiplexing in MIMO Downlink Channels (MIMO 다운링크 채널에서 다중사용자 공간다중화를 위한 알고리즘)

  • Lee, Heun-Chul;Paulraj, Aroyaswami;Lee, In-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1C
    • /
    • pp.45-54
    • /
    • 2010
  • This paper studies the design of a multiuser multiple-input multiple-output (MIMO) system, where a base station (BS) transmits independent messages to multiple users. The remarkable "dirty paper coding (DPC)" result was first presented by Costa that the capacity does not change if the Gaussian interference is known at the transmitter noncausally. While several implementable DPC schemes have been proposed recently for single-user dirty-paper channels, DPC is still difficult to implement directly in practical multiuser MIMO channels. In this paper, we propose a network channel matrix triangulation (NMT) algorithm for utilizing interference known at the transmitter. The NMT algorithm decomposes a multiuser MIMO channel into a set of parallel, single-input single-output dirty-paper subchannels and then successively employs the DPC to each subchannel. This approach allows us to extend practical single-user DPC techniques to multiuser MIMO downlink cases. We present the sum rate analysis for the proposed scheme. Simulation results show that the proposed schemes approach the sum rate capacity of the multiuser MIMO downlink at moderate signal-to-noise ratio (SNR) values.

A Study of Mobile Ad-hoc Network Protocols for Ultra Narrowband Video Streaming over Tactical Combat Radio Networks (초협대역 영상전송 전투무선망을 위한 Mobile Ad-hoc Network 프로토콜 연구)

  • Seo, Myunghwan;Kim, Kihun;Ko, Yun-Soo;Kim, Kyungwoo;Kim, Donghyun;Choi, Jeung Won
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.4
    • /
    • pp.371-380
    • /
    • 2020
  • Video is principal information that facilitates commander's immediate command decision. Due to fading characteristics of radio link, however, it is difficult to stably transmit video in a multi-hop wireless environment. In this paper, we propose a MANET structure composed of a link adaptive routing protocol and a TDMA MAC protocol to stably transmit video traffic in a ultra-narrowband video streaming network. The routing protocol can adapt to link state change and select a stable route. The TDMA protocol enables collision-free video transmission to a destination using multi-hop dynamic resource allocation. As a result of simulation, the proposed MANET structure shows better video transmission performance than proposed MANET structure without link quality adaption, AODV with CSMA/CA, and OLSR with CSMA/CA structures.

A Development of Web-based Integrated Security Management System for Firewalls (웹 기반의 방화벽 통합 보안 관리 시스템 개발)

  • Lee, Dong-Young;Kim, Dong-Soo;Hong, Seung-Sun;Chung, Tai-Myoung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3171-3181
    • /
    • 2000
  • With a remarkable growth and expansionof Internet, the security issues emerged from intrusions and attacks such as computer viruses, dental of servives and backings to destroy intormation have been considered as serious threats for Internet and the provate networks. To protect networks from those attacks, many nendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However managing those systems individually requres too much work and high cost. Thus, integrated security managemanet and eatabliashment of consistent security policy for various security products has become more important. In this paper, we propose integrated security manabement system called WISMSF(Web based Integrated Security Management System for Fireswalls) to monitor and contro various kinds of firewalls WISMSF consists of three components-clients, integrated engine, and agents. It supports the transparent management functions of security products, easy ways of defining security policies, and simple expansion of managed ranges.

  • PDF

A Development of Proactive Application Service Engine Based on the Distributed Object Group Framework (분산객체그룹프레임워크 기반의 프로액티브 응용서비스엔진 개발)

  • Shin, Chang-Sun;Seo, Jong-Seong
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.153-165
    • /
    • 2010
  • In this paper, we proposed a Proactive Application Service Engine (PASE) supporting tailor-made distributed application services based on the Distributed Object Group Framework (DOGF) efficiently managing distributed objects, in the viewpoint of distributed application, composed application on network. The PASE consists of 3 layers which are the physical layer, the middleware layer, and the application layer. With the supporting services of the PASE, the grouping service manages the data gathered from H/W devices and the object's properties for application by user's request as a group. And the security service manages the access of gathered data and the object according to user's right. The data filtering service executes the filtering function to provide application with gathered data. The statistics service analysis past data. The diagnostic service diagnoses a present condition by using the gathered data. And the prediction service predicts a future's status based on the statistics service and the diagnostic service. For verifying the executability of the PASE's services, we applied to a greenhouse automatic control application in ubiquitous agriculture field.

Implementation of an Intelligent Visual Surveillance System Based on Embedded System (임베디드 시스템 기반 지능형 영상 감시 시스템 구현)

  • Song, Jae-Min;Kim, Dong-Jin;Jung, Yong-Bae;Park, Young-Seak;Kim, Tae-Hyo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.13 no.2
    • /
    • pp.83-90
    • /
    • 2012
  • In this paper, an intelligent visual surveillance system based on a NIOS II embedded platform is implemented. By this time, embedded based visual surveillance systems were restricted for a special purpose because of high dependence upon hardware. In order to improve the restriction, we implement a flexible embedded platform, which is available for various purpose of applications. For high speed processing of software based programming, we improved performance of the system which is integrated the SOPC type of NIOS II embedded processor and image processing algorithms by using software programming and C2H(The Altera NIOS II C-To-Hardware(C2H) Acceleration Compiler) compiler in the core of the hardware platform. Then, we constructed a server system which globally manage some devices by the NIOS II embedded processor platform, and included the control function on networks to increase efficiency for user. We tested and evaluated our system at the designated region for visual surveillance.

A Study on the Characteristics of Colour Perception According to Light and Dark Mode in the Digital Media Environment (디지털 미디어 환경에서 사용자 환경 모드에 따른 색채 인지 특성 연구)

  • Ji-Young Hong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.65-70
    • /
    • 2023
  • In recent years, the digital media environment has begun to diversify, with a greater focus being placed on user-centric design. With the development of digital technology, the digital media environment has formed a vast network of information, which supports interactive communication between people, creating a need for user-centric research. Mobile displays, as a representation of the digital media environment, have the advantage of mobility through the use of thin screen displays and low-performance image sensors, which allow for miniaturization and power saving. However, this results in reduced colour accuracy compared to large displays. This study investigates users' colour perception when using dark and light mode mobile displays. Colour perception was measured using a psycho-physical experiment, which controls each colour attribute based on the 12 colours of KS. The results were analysed to determine whether there is a difference in colour perception between dark mode and light mode, and if the difference was statistically significant. Future research directions based on the results are then discussed.

Efficient Video Service Providing Methods for Mobile of Indoor AP Terminals (실내 AP간 단말 이동에 따른 효율적인 동영상 서비스 제공 방안)

  • Hong, Sung-Hwa;Kim, Byoung-Kug
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.585-587
    • /
    • 2022
  • The visual motivation between AP devices is NTP-based visual motivation through the access of the Internet through the internal wired LAN, but this has several seconds of visual difference in hundreds of milliseconds (msec) depending on the network. The frame for the output of the video will vary depending on the application, but usually 24 (image) frames are output to the screen in one second. Therefore, the visual synchronization between peripheral devices can be performed through the adjacent moving camera device, not the wired method. The programming method of generating API for synchronization command when creating an application for visual synchronization and delivering it to AP through MAC may differ from the time in synchronization command according to the environment of the operating system at the transmission side and the situation of the buffer queue of the MAC. Therefore, as a method to solve this problem, the renewal of visual information in the device driver terminal controlling MAC can be much more effective.

  • PDF

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.