• Title/Summary/Keyword: Access node

Search Result 670, Processing Time 0.03 seconds

Distance-Based Channel Assignment with Channel Grouping for Multi-Channel Wireless Mesh Networks (멀티채널 무선 메쉬 네트워크에서의 채널 그룹을 이용한 거리 기반 채널 할당)

  • Kim, Sok-Hyong;Suh, Young-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12B
    • /
    • pp.1050-1057
    • /
    • 2008
  • Wireless Mesh Networks (WMNs) have recently become a hot issue to support high link capacity in wireless access networks. The IEEE 802. I 1 standard which is mainly used for the network interface technology in WMNs supports up to 3 or 12 multiple channels according to the IEEE 802.11 specification. However, two important problems must be addressed when we design a channel assigmnent algorithm: channel dependency problem and channel scanning delay. The former occurs when the dynamic channel switching of an interface leads to the channel switching of other interfaces to maintain node connectivity. The latter happens per channel switching of the interface, and affects the network performance. Therefore, in this paper, we propose the Distance-Based Channel Assigmnent (DB-CA) scheme for multi-channel WMNs to solve such problems. In DB-CA, nodes just perform channel switching without channel scanning to communicate with neighboring nodes that operate on different channels. Furthermore, DB-CA minimizes the interference of channels being used by nodes near the gateway in WMNs. Our simulation results show that DB-CA achieves improved performance in WMNs.

Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks (센서 네트워크에서 mHEED를 이용한 에너지 효율적인 분산 침입탐지 구조)

  • Kim, Mi-Hui;Kim, Ji-Sun;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.151-164
    • /
    • 2009
  • The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.

Design and Implementation of Location Based Seamless Handover for IEEE 802.11s Wireless Mesh Networks (IEEE 802.11s 무선 메쉬 네트워크를 위한 위치 기반 핸드오버의 설계 및 구현)

  • Lee, Sung-Han;Yang, Seung-Chur;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2004-2010
    • /
    • 2009
  • The characteristic of the backbond for distribution service in WMNs(Wireless Mesh Networks) is that WMNs has multiple links connected to mesh points and dynamic routing protocol such as AODV to establish routing paths. When the terminal is communicating with the service through new AP, mobile nodes can resume communication by setting only the link between new AP and mobile node in the case of existing WLANs, but WMNs needs path establishment process in multihop networks. Our goal in this paper is to support the seamless communication service by eliminating path establishment delay in WMNs. We present the method that eliminates the handover latency by predicting the location of handover using GPS information and making the paths to their destination in advance. We implement mesh nodes using embedded board that contains proposed handover method and evaluate performance of handover latency. Our experiment shows that handover delay time is decreased from 2.47 to 0.05 seconds and data loss rate is decreased from 20~35% in the existing method to 0~10% level.

Privacy-Preserving Parallel Range Query Processing Algorithm Based on Data Filtering in Cloud Computing (클라우드 컴퓨팅에서 프라이버시 보호를 지원하는 데이터 필터링 기반 병렬 영역 질의 처리 알고리즘)

  • Kim, Hyeong Jin;Chang, Jae-Woo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.9
    • /
    • pp.243-250
    • /
    • 2021
  • Recently, with the development of cloud computing, interest in database outsourcing is increasing. However, when the database is outsourced, there is a problem in that the information of the data owner is exposed to internal and external attackers. Therefore, in this paper, we propose a parallel range query processing algorithm that supports privacy protection. The proposed algorithm uses the Paillier encryption system to support data protection, query protection, and access pattern protection. To reduce the operation cost of a checking protocol (SRO) for overlapping regions in the existing algorithm, the efficiency of the SRO protocol is improved through a garbled circuit. The proposed parallel range query processing algorithm is largely composed of two steps. It consists of a parallel kd-tree search step that searches the kd-tree in parallel and safely extracts the data of the leaf node including the query, and a parallel data search step through multiple threads for retrieving the data included in the query area. On the other hand, the proposed algorithm provides high query processing performance through parallelization of secure protocols and index search. We show that the performance of the proposed parallel range query processing algorithm increases in proportion to the number of threads and the proposed algorithm shows performance improvement by about 5 times compared with the existing algorithm.

A Study on the Authenticity Verification of UxNB Assisting Terrestrial Base Stations

  • Kim, Keewon;Park, Kyungmin;Kim, Jonghyun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.131-139
    • /
    • 2022
  • In this paper, to verify the authenticity of UxNB that assists terrestrial base stations, the solutions for SI (System Information) security presented in 3GPP TR 33.809 are analyzed from the perspective of UxNB. According to the definition of 3GPP (Third Generation Partnership Project), UxNB is a base station mounted on a UAV (Unmanned Aerial Vehicle), is carried in the air by the UAV, and is a radio access node that provides a connection to the UE (User Equipment). Such solutions for SI security can be classified into hash based, MAC (Message Authentication Codes) based, and digital signature based, and a representative solution for each category is introduced one by one. From the perspective of verifying the authenticity of UxNB for each solution, we compare and analyze the solutions in terms of provisioning information and update, security information leakage of UxNB, and additionally required amount of computation and transmission. As a result of the analysis, the solution for verifying the authenticity of the UxNB should minimize the secret information to be stored in the UxNB, be stored in a secure place, and apply encryption when it is updated over the air. In addition, due to the properties of the low computing power of UxNB and the lack of power, it is necessary to minimize the amount of computation and transmission.

An Analysis of Big Video Data with Cloud Computing in Ubiquitous City (클라우드 컴퓨팅을 이용한 유시티 비디오 빅데이터 분석)

  • Lee, Hak Geon;Yun, Chang Ho;Park, Jong Won;Lee, Yong Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.45-52
    • /
    • 2014
  • The Ubiquitous-City (U-City) is a smart or intelligent city to satisfy human beings' desire to enjoy IT services with any device, anytime, anywhere. It is a future city model based on Internet of everything or things (IoE or IoT). It includes a lot of video cameras which are networked together. The networked video cameras support a lot of U-City services as one of the main input data together with sensors. They generate huge amount of video information, real big data for the U-City all the time. It is usually required that the U-City manipulates the big data in real-time. And it is not easy at all. Also, many times, it is required that the accumulated video data are analyzed to detect an event or find a figure among them. It requires a lot of computational power and usually takes a lot of time. Currently we can find researches which try to reduce the processing time of the big video data. Cloud computing can be a good solution to address this matter. There are many cloud computing methodologies which can be used to address the matter. MapReduce is an interesting and attractive methodology for it. It has many advantages and is getting popularity in many areas. Video cameras evolve day by day so that the resolution improves sharply. It leads to the exponential growth of the produced data by the networked video cameras. We are coping with real big data when we have to deal with video image data which are produced by the good quality video cameras. A video surveillance system was not useful until we find the cloud computing. But it is now being widely spread in U-Cities since we find some useful methodologies. Video data are unstructured data thus it is not easy to find a good research result of analyzing the data with MapReduce. This paper presents an analyzing system for the video surveillance system, which is a cloud-computing based video data management system. It is easy to deploy, flexible and reliable. It consists of the video manager, the video monitors, the storage for the video images, the storage client and streaming IN component. The "video monitor" for the video images consists of "video translater" and "protocol manager". The "storage" contains MapReduce analyzer. All components were designed according to the functional requirement of video surveillance system. The "streaming IN" component receives the video data from the networked video cameras and delivers them to the "storage client". It also manages the bottleneck of the network to smooth the data stream. The "storage client" receives the video data from the "streaming IN" component and stores them to the storage. It also helps other components to access the storage. The "video monitor" component transfers the video data by smoothly streaming and manages the protocol. The "video translator" sub-component enables users to manage the resolution, the codec and the frame rate of the video image. The "protocol" sub-component manages the Real Time Streaming Protocol (RTSP) and Real Time Messaging Protocol (RTMP). We use Hadoop Distributed File System(HDFS) for the storage of cloud computing. Hadoop stores the data in HDFS and provides the platform that can process data with simple MapReduce programming model. We suggest our own methodology to analyze the video images using MapReduce in this paper. That is, the workflow of video analysis is presented and detailed explanation is given in this paper. The performance evaluation was experiment and we found that our proposed system worked well. The performance evaluation results are presented in this paper with analysis. With our cluster system, we used compressed $1920{\times}1080(FHD)$ resolution video data, H.264 codec and HDFS as video storage. We measured the processing time according to the number of frame per mapper. Tracing the optimal splitting size of input data and the processing time according to the number of node, we found the linearity of the system performance.

Photoimmunology -Past, Present and Future-

  • Daynes, Raymond A.;Chung, Hun-Taeg;Roberts, Lee K.
    • The Journal of the Korean Society for Microbiology
    • /
    • v.21 no.3
    • /
    • pp.311-329
    • /
    • 1986
  • The experimental exposure of animals to sources of ultraviolet radiation (UVR) which emit their energy primarily in the UVB region (280-320nm) is known to result in a number of well-described changes in the recipient's immune competence. Two such changes include a depressed capacity to effectively respond immunologically to transplants of syngeneic UVR tumors and a markedly reduced responsiveness to known inducers of delayedtype (DTH) and contact hypersensitivity (CH) reactions. The results of experiments that were designed to elucidate the mechanisms responsible for UVR-induced immunomodulation have implicated: 1) an altered pattern of lymphocyte recirculation, 2) suppressor T cells(Ts), 3) deviations in systemic antigen presenting cell (APC) potential. 4) changes in the production of interleukin-1-like molecules, and 5) the functional inactivation of epidermal Langerhans cells in this process. The exposure of skin to UVR, therefore, causes a number of both local and systemic alterations to the normal host immune system. In spite of this seeming complexity and diversity of responses, our recent studies have established that each of the UVR-mediated changes is probably of equal importance to creating the UVR-induced immunocompromised state. Normal animals were exposed to low dose UVR radiation on their dorsal surfaces under conditions where a $3.0\;cm^2$ area of skin was physically protected from the light energy. Contact sensitization of these animals with DNFB, to either the irradiated or protected back skin, resulted in markedly reduced CH responses. This was observed in spite of a normal responsiveness following the skin sensitization to ventral surfaces of the UVR-exposed animals. Systemic treatment of the low dose UVR recipients with the drug indomethacin (1-3 micrograms/day) during the UVR exposures resulted in a complete reversal of the depressions observed following DNFB sensitization to "protected" dorsal skin while the altered responsiveness found in the group exposed to the skin reactive chemical through directly UVR-exposed sites was maintained. These studies implicate the importance of EC as effective APC in the skin and also suggest that some of the systemic influences caused by UVR exposure involve the production of prostaglandins. This concept was further supported by finding that indomethacin treatment was also capable of totally reversing the systemic depressions in CH responsiveness caused by high dose UVR exposure (30K joules/$m^2$) of mice. Attempts to analyze the cellular mechanisms responsible established that the spleens of all animals which demonstrated altered CH responses, regardless of whether sensitization was through a normal or an irradiated skin site, contained suppressor cells. Interestingly, we also found normal levels of T effector cells in the peripheral lymph nodes of the UVR-exposed mice that were contact sensitized through normal skin. No effector cells were found when skin sensitization took place through irradiated skin sites. In spite of such an apparent paradox, insight into the probable mechanisms responsible for these observations was provided by establishing that UVR exposure of skin results in a striking and dose-dependent blockade of the efferent lymphatic vessels in all peripheral lymph nodes. Therefore, the afferent phases of immune responses can apparently take place normally in UVR exposed animals when antigen is applied to normal skin. The final effector responses, however, appear to be inhibited in the UVR-exposed animals by an apparent block of effector cell mobility. This contrasts with findings in the normal animals. Following contact sensitization, normal animals were also found to simultaneously contain both antigen specific suppressor T cells and lymph node effector cells. However, these normal animals were fully capable of mobilizing their effector cells into the systemic circulation, thereby allowing a localization of these cells to peripheral sites of antigen challenge. Our results suggest that UVR is probably not a significant inducer of suppressor T-cell activity to topically applied antigens. Rather, UVR exposure appears to modify the normal relationship which exists between effector and regulatory immune responses in vivo. It does so by either causing a direct reduction in the skin's APC function, a situation which results in an absence of effector cell generation to antigens applied to UVR-exposed skin sites, inhibiting the capacity of effector cells to gain access to skin sites of antigen challenge or by sequestering the lymphocytes with effector cell potential into the draining peripheral lymph nodes. Each of these situations result in a similar effect on the UVR-exposed host, that being a reduced capacity to elicit a CH response. We hypothesize that altered DTH responses, altered alloresponses, and altered graft-versus-host responses, all of which have been observed in UVR exposed animals, may result from similar mechanisms.

  • PDF

Clinical Studies on Locally Invasive Thyroid Cancer (국소침범한 갑상선암의 임상적 고찰)

  • Kim Young-Min;Lee Chang-Yun;Yang Kyung-Hun;Rho Young-Soo;Park Young-Min;Lim Hyun-Jun
    • Korean Journal of Head & Neck Oncology
    • /
    • v.14 no.2
    • /
    • pp.236-243
    • /
    • 1998
  • Objectives: Local invasion of the thyroid cancer that is invasion of the upper aerodigestive tract, neurovascular structures of the neck and superior mediastinum, is infrequent and comprises of 1-16% of well-differentiated thyroid cancer. However the proximity of the thyroid gland to these structures provides the means for an invasive cancer to gain ready access into theses structures and when invasion occurs, it is the source of significant morbidity and mortality. So locally invasive thyroid cancer should be removed as much as possible, but still much debates have been exist whether the surgical method should be radical or conservative. This study was desinged to evaluate the clinical characteristics and the surgical treatment of the locally invasive thyroid cancer. Material and Methods: At the department of otorhinolaryngology of Hallym university, 10 patients diagnosed as locally invasive thyroid cancer among the 81 patients treated for thyroid cancer between 1991 to 1997 were retrospectively evaluated. Results: Of the 10 patients, 3 patients had histories of previous surgical treatment with or without radiation or radioactive iodine therapy. The site of invasion of thyroid cancer were trachea(7 cases), recurrent laryngeal nerve(5 cases), mediastinal node(5 cases), esophagus(3cases), larynx(3cases), carotid artery(3 cases), pharynx(l case), and other sites(4 cases). The operation techniques included 1 partial laryngectomy and 1 partial cricoid resection, 2 shavings and 3 window resections of the trachea, 1 sleeve resection of the trachea with end-to-end anastomosis and 1 cricotracheoplasty for tracheal invasion, 2 shavings and 1 partial esophagectomies for esophageal invasion, and 1 wall shaving and 2 partial resections with $Gortex^{\circledR}$ tube reconstruction for carotid artery invasion, and so on. Conclusions: These data and review of literature suggest that the surgical method should be perfomed on the basis of individual condition and complete removal of all gross tumor with preservation of vital structures whenever possible will offer a good result.

  • PDF

Analysis of Research Trends of 'Word of Mouth (WoM)' through Main Path and Word Co-occurrence Network (주경로 분석과 연관어 네트워크 분석을 통한 '구전(WoM)' 관련 연구동향 분석)

  • Shin, Hyunbo;Kim, Hea-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.179-200
    • /
    • 2019
  • Word-of-mouth (WoM) is defined by consumer activities that share information concerning consumption. WoM activities have long been recognized as important in corporate marketing processes and have received much attention, especially in the marketing field. Recently, according to the development of the Internet, the way in which people exchange information in online news and online communities has been expanded, and WoM is diversified in terms of word of mouth, score, rating, and liking. Social media makes online users easy access to information and online WoM is considered a key source of information. Although various studies on WoM have been preceded by this phenomenon, there is no meta-analysis study that comprehensively analyzes them. This study proposed a method to extract major researches by applying text mining techniques and to grasp the main issues of researches in order to find the trend of WoM research using scholarly big data. To this end, a total of 4389 documents were collected by the keyword 'Word-of-mouth' from 1941 to 2018 in Scopus (www.scopus.com), a citation database, and the data were refined through preprocessing such as English morphological analysis, stopwords removal, and noun extraction. To carry out this study, we adopted main path analysis (MPA) and word co-occurrence network analysis. MPA detects key researches and is used to track the development trajectory of academic field, and presents the research trend from a macro perspective. For this, we constructed a citation network based on the collected data. The node means a document and the link means a citation relation in citation network. We then detected the key-route main path by applying SPC (Search Path Count) weights. As a result, the main path composed of 30 documents extracted from a citation network. The main path was able to confirm the change of the academic area which was developing along with the change of the times reflecting the industrial change such as various industrial groups. The results of MPA revealed that WoM research was distinguished by five periods: (1) establishment of aspects and critical elements of WoM, (2) relationship analysis between WoM variables, (3) beginning of researches of online WoM, (4) relationship analysis between WoM and purchase, and (5) broadening of topics. It was found that changes within the industry was reflected in the results such as online development and social media. Very recent studies showed that the topics and approaches related WoM were being diversified to circumstantial changes. However, the results showed that even though WoM was used in diverse fields, the main stream of the researches of WoM from the start to the end, was related to marketing and figuring out the influential factors that proliferate WoM. By applying word co-occurrence network analysis, the research trend is presented from a microscopic point of view. Word co-occurrence network was constructed to analyze the relationship between keywords and social network analysis (SNA) was utilized. We divided the data into three periods to investigate the periodic changes and trends in discussion of WoM. SNA showed that Period 1 (1941~2008) consisted of clusters regarding relationship, source, and consumers. Period 2 (2009~2013) contained clusters of satisfaction, community, social networks, review, and internet. Clusters of period 3 (2014~2018) involved satisfaction, medium, review, and interview. The periodic changes of clusters showed transition from offline to online WoM. Media of WoM have become an important factor in spreading the words. This study conducted a quantitative meta-analysis based on scholarly big data regarding WoM. The main contribution of this study is that it provides a micro perspective on the research trend of WoM as well as the macro perspective. The limitation of this study is that the citation network constructed in this study is a network based on the direct citation relation of the collected documents for MPA.

Digital Humanities, and Applications of the "Successful Exam Passers List" (과거 합격자 시맨틱 데이터베이스를 활용한 디지털 인문학 연구)

  • LEE, JAE OK
    • (The)Study of the Eastern Classic
    • /
    • no.70
    • /
    • pp.303-345
    • /
    • 2018
  • In this article, how the Bangmok(榜目) documents, which are essentially lists of successful passers for the civil competitive examination system of the $Chos{\breve{o}}n$ dynasty, when rendered into digitalized formats, could serve as source of information, which would not only lets us know the $Chos{\breve{o}}n$ individuals' social backgrounds and bloodlines but also enables us to understand the intricate nature that the Yangban network had, will be discussed. In digitalized humanity studies, the Bangmok materials, literally a list of leading elites of the $Chos{\breve{o}}n$ period, constitute a very interesting and important source of information. Based upon these materials, we can see how the society -as well as the Yangban community- was like. Currently, all data inside these Bangmok lists are rendered in XML(eXtensible Makrup Language) format and are being served through DBMS(Database Management System), so anyone who would want to examine the statistics could freely do so. Also, by connecting the data in these Bangmok materials with data from genealogy records, we could identify an individual's marital relationship, home town, and political affiliation, and therefore create a complex narrative that would be effective in describing that individual's life in particular. This is a graphic database, which shows-when Bangmok data is punched in-successful passers as individual nodes, and displays blood and marital relations in a very visible way. Clicking upon the nodes would provide you with access to all kinds of relationships formed among more than 90 thousand successful passers, and even the overall marital network, once the genealogical data is input. In Korea, since 2005 and through now, the task of digitalizing data from the Civil exam Bangmok(Mun-gwa Bangmok), Military exam Bangmok (Mu-gwa Bangmok), the "Sa-ma" Bangmok and "Jab-gwa" Bangmok materials, has been completed. They can be accessed through a website(http://people.aks.ac.kr/index.aks) which has information on numerous famous past Korean individuals. With this kind of source of information, we are now able to extract professional Jung-in figures from these lists. However, meaningful and practical studies using this data are yet to be announced. This article would like to remind everyone that this information should be used as a window through which we could see not only the lives of individuals, but also the society.