• Title/Summary/Keyword: Cluster 구조

Search Result 1,035, Processing Time 0.037 seconds

A Reliable Cluster based Dynamic Authentication Mechanism in MANET (이동 애드혹 네트워크에서 신뢰성 있는 클러스터 기반 동적 인증 기법)

  • Hwang, Yoon-Cheol;Kim, Jin-Il
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.5
    • /
    • pp.661-672
    • /
    • 2008
  • Mobile Ad-hoc NETwork is a kind of self-controlled network composed only of mobile hosts. Since its range of use is gradually expanding into various sections applicable to practical lives, active researches are being conducted on it. However, as it depends on cooperation of nodes composing the entire network, due to weakness of wireless link and lack of its central infrastructure, so it is exposed to more serious risk than general network in security. Therefore, this paper proposes Cluster-Based Dynamic Authentication that enables only reliable nodes to participate in communication, by solving lack of centralized infrastructure, using hierarchical Mobile Ad hoc NETwork structure based on cluster, and by complementing security weakness through mutual authentication between hierarchical nodes. Simulation shows that the proposed scheme can complement security weakness of Mobile Ad hoc NETwork and that it is more adequate in reliability and expandability than the existing schemes.

  • PDF

Security and Privacy Mechanism using TCG/TPM to various WSN (다양한 무선네트워크 하에서 TCG/TPM을 이용한 정보보호 및 프라이버시 매커니즘)

  • Lee, Ki-Man;Cho, Nae-Hyun;Kwon, Hwan-Woo;Seo, Chang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.195-202
    • /
    • 2008
  • In this paper, To improve the effectiveness of security enforcement, the first contribution in this work is that we present a clustered heterogeneous WSN(Wareless Sensor Network) architecture, composed of not only resource constrained sensor nodes, but also a number of more powerful high-end devices acting as cluster heads. Compared to sensor nodes, a high-end cluster head has higher computation capability, larger storage, longer power supply, and longer radio transmission range, and it thus does not suffer from the resource scarceness problem as much as a sensor node does. A distinct feature of our heterogeneous architecture is that cluster heads are equipped with TC(trusted computing) technology, and in particular a TCG(Trusted Computing Group) compliant TPM (Trusted Platform Module) is embedded into each cluster head. According the TCG specifications, TPM is a tamper-resistant, self-contained secure coprocessor, capable of performing cryptographic functions. A TPM attached to a host establishes a trusted computing platform that provides sealed storage, and measures and reports the integrity state of the platform.

  • PDF

iBASE/Cluster: Extending the BADA-IV for a Cluster environment (iBASE/Cluster: 클러스터 환경을 위한 바다-IV의 확장)

  • Kim, Hong-Yeon;Jin, Ki-Sung;Kim, June;Kim, Myoung-Joon
    • Annual Conference of KIPS
    • /
    • 2002.11c
    • /
    • pp.1769-1772
    • /
    • 2002
  • iBASE/Cluster는 한국전자통신연구원에서 개발한 객체 지향 멀티미디어 DBMS인 바다-IV를 기반으로 공유 디스크 기반의 클러스터 환경에서 무정지 DBMS 서비스를 지원하기 위하여 확장된 DBMS 이다. 본 논문에서는 이를 위하여 수행된 바다-IV 의 확장에 대해 기술한다. 기술된 내용은 공유 디스크 자원 접근을 동기화 하기 위한 동시성 제어 기법 및 버퍼 관리 기법, 그리고 특정 노드에 고장 발생 시 회복 기법 등에 대한 확장을 포함한다. 또한 확장된 DBMS가 LVS(Linux Virtual Server) 기반의 클러스터에서 자동적인 고장의 감지 및 이전(fail-over)을 수행하기 위한 연동 구조를 다루고 동작 시나리오를 통하여 구현된 시스템의 흐름을 보인다.

  • PDF

A Comparison of cluster analysis based on profile of LPGA player profile in 2009 (2009년 여자프로골프선수 프로파일을 이용한 군집방법비교)

  • Min, Dae-Kee
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.3
    • /
    • pp.471-480
    • /
    • 2010
  • Cluster analysis is one of the useful methods to find out number of groups and member’s belongings. With the rapid development of computer application in statistics, variety of new methods in clustering analysis were studied such as EM algorism and Self organization maps. The goals of cluster analysis is finding the number of groupings that are meaningful to me. If data are analyzed perfectly with cluster analysis, we can get the same results from discernment analysis.

CNDO/2 MO Calculations for Catalytic Acidity of V-silicalite (실리카에 담지된 바나듐 촉매의 산성도에 대한 CNDO/2 분자궤도론적 계산)

  • Kim, Myung-Chul
    • Applied Chemistry for Engineering
    • /
    • v.5 no.2
    • /
    • pp.357-360
    • /
    • 1994
  • The CNDO/2 calculations have been applied on cluster models for the representative active sites in V-silicalite to get Wiberg bond orders, LUMO energies and total energies. The B acidities of suggested models were investigated in terms of O-H bond orders. And the calculated LUMO energies showed the L acidities of the active sites. The structural stabilities of cluster models were also explained in terms of total energies.

  • PDF

An Implementation Methodology of the Cluster Aware Application Program (클러스터 인식 응용 프로그램의 구현 기법)

  • 김영수;조익성;임재홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.252-259
    • /
    • 1999
  • This paper describes the development of cluster-aware application that provides advanced services such as automatic failover, faster error recovery, easy administration and scalability in clustering environment. For These, total system architecture and algorithm are proposed. For the verification this paper, socket application and cluster resource DLL, administration DLL for the application are implemented and tested. Using the microsoft cluster server, The individual failed services was relocated from one server to another. The result shows that allows applications on the original server to continue running, unaffected tv the failed service.

  • PDF

LECEEP : LEACH based Chaining Energy Efficient Protocol (에너지 효율적인 LEACH 기반 체이닝 프로토콜 연구)

  • Yoo, Wan-Ki;Kwon, Tae-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.801-808
    • /
    • 2010
  • LEACH, one of hierarchical based routing protocols, was proposed for energy efficiency which is the most important requirement of Wireless Sensor Network(WSN). LEACH protocol is composed of a cluster of certain large number of clusters, which have a cluster head and member nodes. Member nodes send sensing data to their cluster heads, and the cluster heads aggregate the sensing data and transmit it to BS. The challenges of LEACH protocol are that cluster heads are not evenly distributed, and energy consumption to transmit aggregated data from Cluster heads directly to BS is excessive. This study, to improve LEACH protocol, suggests LECEEP that transmit data to contiguity cluster head that is the nearest and not far away BS forming chain between cluster head, and then the nearest cluster head from BS transmit aggregated data finally to BS. According to simulation, LECEEP consumes less energy and retains more number of survival node than LEACH protocol.

A Design of TNA(Traceback against Network Attacks) Based on Multihop Clustering using the depth of Tree structure on Ad-hoc Networks (애드혹 네트워크 상에 트리구조 깊이를 이용한 다중홉 클러스터링 기반 TNA(Traceback against Network Attacks) 설계)

  • Kim, Ju-Yung;Lee, Byung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.9
    • /
    • pp.772-779
    • /
    • 2012
  • In the current MANET, DOS or DDOS attacks are increasing, but as MANET has limited bandwidth, computational resources and battery power, the existing traceback mechanisms can not be applied to it. Therefore, in case of traceback techniques being applied to MANET, the resource of each node must be used efficiently. However, in the traceback techniques applied to an existing ad hoc network, as a cluster head which represents all nodes in the cluster area manages the traceback, the overhead of the cluster head shortens each node's life. In addition, in case of multi-hop clustering, as one Cluster head manages more node than one, its problem is getting even worse. This paper proposes TNA(Traceback against Network Attacks) based on multihop clustering using the depth of tree structure in order to reduce the overhead of distributed information management.

Pattern Analysis of Volume of Basal Ganglia Structures in Patients with First-Episode Psychosis (초발 정신병 환자에서 기저핵 구조물 부피의 패턴분석)

  • Min, Sally;Lee, Tae Young;Kwak, Yoobin;Kwon, Jun Soo
    • Korean Journal of Biological Psychiatry
    • /
    • v.25 no.2
    • /
    • pp.38-43
    • /
    • 2018
  • Objectives Dopamine dysregulation has been regarded as one of the core pathologies in patients with schizophrenia. Since dopamine synthesis capacity has found to be inconsistent in patients with schizophrenia, current classification of patients based on clinical symptoms cannot reflect the neurochemical heterogeneity of the disease. Here we performed new subtyping of patients with first-episode psychosis (FEP) through biotype-based cluster analysis. We specifically suggested basal ganglia structural changes as a biotype, which deeply involves in the dopaminergic circuit. Methods Forty FEP and 40 demographically matched healthy participants underwent 3T T1 MRI. Whole brain parcellation was conducted, and volumes of total 6 regions of basal ganglia have been extracted as features for cluster analysis. We used K-means clustering, and external validation was conducted with Positive and Negative Syndrome Scale (PANSS). Results K-means clustering divided 40 FEP subjects into 2 clusters. Cluster 1 (n = 25) showed substantial volume decrease in 4 regions of basal ganglia compared to Cluster 2 (n = 15). Cluster 1 showed higher positive scales of PANSS compared with Cluster 2 (F = 2.333, p = 0.025). Compared to healthy controls, Cluster 1 showed smaller volumes in 4 regions, whereas Cluster 2 showed larger volumes in 3 regions. Conclusions Two subgroups have been found by cluster analysis, which showed a distinct difference in volume patterns of basal ganglia structures and positive symptom severity. The result possibly reflects the neurobiological heterogeneity of schizophrenia. Thus, the current study supports the importance of paradigm shift toward biotype-based diagnosis, instead of phenotype, for future precision psychiatry.

  • PDF