• Title/Summary/Keyword: CAN network

Search Result 19,492, Processing Time 0.039 seconds

Reliability-guaranteed multipath allocation algorithm in mobile network

  • Jaewook Lee;Haneul Ko
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.936-944
    • /
    • 2022
  • The mobile network allows redundant transmission via disjoint paths to support high-reliability communication (e.g., ultrareliable and low-latency communications [URLLC]). Although redundant transmission can improve communication reliability, it also increases network costs (e.g., traffic and control overhead). In this study, we propose a reliability-guaranteed multipath allocation algorithm (RG-MAA) that allocates appropriate paths by considering the path setup time and dynamicity of the reliability paths. We develop an optimization problem using a constrained Markov decision process (CMDP) to minimize network costs while ensuring the required communication reliability. The evaluation results show that RG-MAA can reduce network costs by up to 30% compared with the scheme that uses all possible paths while ensuring the required communication reliability.

FAFS: A Fuzzy Association Feature Selection Method for Network Malicious Traffic Detection

  • Feng, Yongxin;Kang, Yingyun;Zhang, Hao;Zhang, Wenbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.240-259
    • /
    • 2020
  • Analyzing network traffic is the basis of dealing with network security issues. Most of the network security systems depend on the feature selection of network traffic data and the detection ability of malicious traffic in network can be improved by the correct method of feature selection. An FAFS method, which is short for Fuzzy Association Feature Selection method, is proposed in this paper for network malicious traffic detection. Association rules, which can reflect the relationship among different characteristic attributes of network traffic data, are mined by association analysis. The membership value of association rules are obtained by the calculation of fuzzy reasoning. The data features with the highest correlation intensity in network data sets are calculated by comparing the membership values in association rules. The dimension of data features are reduced and the detection ability of malicious traffic detection algorithm in network is improved by FAFS method. To verify the effect of malicious traffic feature selection by FAFS method, FAFS method is used to select data features of different dataset in this paper. Then, K-Nearest Neighbor algorithm, C4.5 Decision Tree algorithm and Naïve Bayes algorithm are used to test on the dataset above. Moreover, FAFS method is also compared with classical feature selection methods. The analysis of experimental results show that the precision and recall rate of malicious traffic detection in the network can be significantly improved by FAFS method, which provides a valuable reference for the establishment of network security system.

SNMP-based Management for Mobile Network Devices (SNMP 기반의 이동형 네트워크 장비 관리 기법)

  • Kwak, Deuk-Whee;Lee, Hyun-Yong;Kim, Jong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7B
    • /
    • pp.557-566
    • /
    • 2008
  • Some types of network nodes such as mobile network node, mobile access point, and ad-hoc network node can be relocated frequently and, by the nature of its usage, are deployed over broad area. In this environment, the network topology is changed constantly since even the manager node as well as the managed nodes can leave or join the management network frequently. The many of existing network management technologies are mostly for small sized and homogeneous networks with static topologies and not proper for the mobile network devices. In this paper, employing peer-to-peer (P2P), the secure group communication techniques, and simple network management protocol (SNMP), we propose a highly secure and available management technique that can be used to manage the mobile network nodes through insecure management network such as the Internet. The proposed technique is implemented to show that it is practically usable.

The Effect of Patent Citation Relationship on Business Performance : A Social Network Analysis Perspective (특허 인용 관계가 기업 성과에 미치는 영향 : 소셜네트워크분석 관점)

  • Park, Jun Hyung;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.127-139
    • /
    • 2013
  • With an advent of recent knowledge-based society, the interest in intellectual property has increased. Firms have tired to result in productive outcomes through continuous innovative activity. Especially, ICT firms which lead high-tech industry have tried to manage intellectual property more systematically. Firm's interest in the patent has increased in order to manage the innovative activity and Knowledge property. The patent involves not only simple information but also important values as information of technology, management and right. Moreover, as the patent has the detailed contents regarding technology development activity, it is regarded as valuable data. The patent which reflects technology spread and research outcomes and business performances are closely interrelated as the patent is considered as a significant the level of firm's innovation. As the patent information which represents companies' intellectual capital is accumulated continuously, it has become possible to do quantitative analysis. The advantages of patent in the related industry information and it's standardize information can be easily obtained. Through the patent, the flow of knowledge can be determined. The patent information can analyze in various levels from patent to nation. The patent information is used to analyze technical status and the effects on performance. The patent which has a high frequency of citation refers to having high technological values. Analyzing the patent information contains both citation index analysis using the number of citation and network analysis using citation relationship. Network analysis can provide the information on the flows of knowledge and technological changes, and it can show future research direction. Studies using the patent citation analysis vary academically and practically. For the citation index research, studies to analyze influential big patent has been conducted, and for the network analysis research, studies to find out the flows of technology in a certain industry has been conducted. Social network analysis is applied not only in the sociology, but also in a field of management consulting and company's knowledge management. Research of how the company's network position has an impact on business performances has been conducted from various aspects in a field of network analysis. Social network analysis can be based on the visual forms. Network indicators are available through the quantitative analysis. Social network analysis is used when analyzing outcomes in terms of the position of network. Social network analysis focuses largely on centrality and structural holes. Centrality indicates that actors having central positions among other actors have an advantage to exert stronger influence for exchange relationship. Degree centrality, betweenness centrality and closeness centrality are used for centrality analysis. Structural holes refer to an empty place in social structure and are defined as efficiency and constraints. This study stresses and analyzes firms' network in terms of the patent and how network characteristics have an influence on business performances. For the purpose of doing this, seventy-four ICT companies listed in S&P500 are chosen for the sample. UCINET6 is used to analyze the network structural characteristics such as outdegree centrality, betweenness centrality and efficiency. Then, regression analysis test is conducted to find out how these network characteristics are related to business performance. It is found that each network index has significant impacts on net income, i.e. business performance. However, it is found that efficiency is negatively associated with business performance. As the efficiency increases, net income decreases and it has a negative impact on business performances. Furthermore, it is shown that betweenness centrality solely has statistically significance for the multiple regression analysis with three network indexes. The patent citation network analysis shows the flows of knowledge between firms, and it can be expected to contribute to company's management strategies by analyzing company's network structural positions.

A Study on Word Sense Disambiguation Using Bidirectional Recurrent Neural Network for Korean Language

  • Min, Jihong;Jeon, Joon-Woo;Song, Kwang-Ho;Kim, Yoo-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.4
    • /
    • pp.41-49
    • /
    • 2017
  • Word sense disambiguation(WSD) that determines the exact meaning of homonym which can be used in different meanings even in one form is very important to understand the semantical meaning of text document. Many recent researches on WSD have widely used NNLM(Neural Network Language Model) in which neural network is used to represent a document into vectors and to analyze its semantics. Among the previous WSD researches using NNLM, RNN(Recurrent Neural Network) model has better performance than other models because RNN model can reflect the occurrence order of words in addition to the word appearance information in a document. However, since RNN model uses only the forward order of word occurrences in a document, it is not able to reflect natural language's characteristics that later words can affect the meanings of the preceding words. In this paper, we propose a WSD scheme using Bidirectional RNN that can reflect not only the forward order but also the backward order of word occurrences in a document. From the experiments, the accuracy of the proposed model is higher than that of previous method using RNN. Hence, it is confirmed that bidirectional order information of word occurrences is useful for WSD in Korean language.

Routing Protocol for Hybrid Ad Hoc Network using Energy Prediction Model (하이브리드 애드 혹 네트워크에서의 에너지 예측모델을 이용한 라우팅 알고리즘)

  • Kim, Tae-Kyung
    • Journal of Internet Computing and Services
    • /
    • v.9 no.5
    • /
    • pp.165-173
    • /
    • 2008
  • Hybrid ad hoc networks are integrated networks referred to Home Networks, Telematics and Sensor networks can offer various services. Specially, in ad hoc network where each node is responsible for forwarding neighbor nodes' data packets, it should net only reduce the overall energy consumption but also balance individual battery power. Unbalanced energy usage will result in earlier node failure in overloaded nodes. it leads to network partitioning and reduces network lifetime. Therefore, this paper studied the routing protocol considering efficiency of energy. The suggested algorithm can predict the status of energy in each node using the energy prediction model. This can reduce the overload of establishing route path and balance individual battery power. The suggested algorithm can reduce power consumption as well as increase network lifetime.

  • PDF

An Improved Detection System for the Network Vulnerability Scan Attacks (네트워크 취약점 검색공격에 대한 개선된 탐지시스템)

  • You, Il-Sun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.543-550
    • /
    • 2001
  • In this paper, an improved detection system for the network vulnerability scan attacks is proposed. The proposed system improves the methodology for detecting the network vulnerability scan attacks and provides a global detection and response capability that can counter attacks occurring across an entire network enterprize. Through the simulation, we show that the proposed system can detect vulnerable port attacks, coordinated attacks, slow scans and slow coordinated attacks. We also show our system can achieve more global and hierarchical response to attacks through the correlation between server and agents than a stand-alone system can make.

  • PDF

Mobile u-healthcare system in IEEE 802.15.4 WSN and CDMA network environments

  • Toh, Sing-Hui;Lee, Seung-Chul;Lee, Hoon-Jae;Do, Kyeong-Hoon;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.18 no.5
    • /
    • pp.337-342
    • /
    • 2009
  • This paper describes a robust mobile u-healthcare system with multiple physiological signs measurement capability in real time with integration of WSN(wireless sensor network) technology and CDMA(code division multiple access) network. A cellular phone receives health data in WSN and performs local physiological signs analysis at a phone processor, and then transmits abnormal data to server for further detail or precise health signal evaluation by a medical doctor over a CDMA network. Physiological signs of the patients are continuously monitored, processed and analyzed locally at cellular phone process to produce useful medical information for diagnosis and tracking purposes. By local simple analysis in cellular phone processor we can save the data transmission cost in CDMA network. By using the developed integrate ubiquitous healthcare service architecture, patients can realize self-health checking so that the prevention actions can be taken earlier. Appropriate self-monitoring and self-management can cure disease and relieve pain especially for patients who suffer from chronic diseases that need long term observation.

High Representation based GAN defense for Adversarial Attack

  • Sutanto, Richard Evan;Lee, Suk Ho
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.141-146
    • /
    • 2019
  • These days, there are many applications using neural networks as parts of their system. On the other hand, adversarial examples have become an important issue concerining the security of neural networks. A classifier in neural networks can be fooled and make it miss-classified by adversarial examples. There are many research to encounter adversarial examples by using denoising methods. Some of them using GAN (Generative Adversarial Network) in order to remove adversarial noise from input images. By producing an image from generator network that is close enough to the original clean image, the adversarial examples effects can be reduced. However, there is a chance when adversarial noise can survive the approximation process because it is not like a normal noise. In this chance, we propose a research that utilizes high-level representation in the classifier by combining GAN network with a trained U-Net network. This approach focuses on minimizing the loss function on high representation terms, in order to minimize the difference between the high representation level of the clean data and the approximated output of the noisy data in the training dataset. Furthermore, the generated output is checked whether it shows minimum error compared to true label or not. U-Net network is trained with true label to make sure the generated output gives minimum error in the end. At last, the remaining adversarial noise that still exist after low-level approximation can be removed with the U-Net, because of the minimization on high representation terms.