• 제목/요약/키워드: Computer Network Engineering

검색결과 6,663건 처리시간 0.034초

Queuing Analysis of Opportunistic in Network Selection for Secondary Users in Cognitive Radio Systems

  • Tuan, Le Ahn;Hong, Choong-Seon
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2012년도 한국컴퓨터종합학술대회논문집 Vol.39 No.1(D)
    • /
    • pp.265-267
    • /
    • 2012
  • This paper analyzes network selection issues of secondary users (SUs) in Cooperative Cognitive Radio Networks (CRNs) by utilizing Queuing Model. Coordinating with Handover Cost-Based Network selection, this paper also addresses an opportunity for the secondary users (SUs) to enhance QoS as well as economics efficiency. In this paper, network selection of SUs is the optimal association between Overall System Time Minimization Problem evaluation of Secondary Connection (SC) and Handover Cost-Based Network selection. This will be illustrated by simulation results.

Mobile IPv6 환경에서의 Mobile Network 지원에 관한 연구 (A Study on Supporting Mobile Network in Mobile IPv6 Environment)

  • 차정석;송주석
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2003년도 춘계학술발표논문집 (중)
    • /
    • pp.1305-1308
    • /
    • 2003
  • Mobile Network은 일정한 규모 이상의 이동성을 지원하는 네트워치를 말한다. Mobile IP는 표준 IP에 이동성을 지원하기 위한 기법이다. Mobile IPv4에서는 Mobile Network을 가상적인 하나의 Mobile Node처럼 취급하여 지원이 가능하다. 하지만, Mobile IPv6에서는 몇몇의 문제점으로 인하여 Mobile IPv4에서와 같은 접근이 어렵다. 이 논문에서는 Mobile IPv6환경에서 Mobile Network을 지원할 수 있는 기법을 제안하고 분석하였다.

  • PDF

Integrating Random Network Coding with On-Demand Multicast Routing Protocol

  • Park, Joon-Sang;Baek, Seung Jun
    • ETRI Journal
    • /
    • 제34권5호
    • /
    • pp.775-778
    • /
    • 2012
  • We propose integrating random network coding with the Enhanced On-Demand Multicast Routing Protocol (E-ODMRP). With the Network Coded E-ODMRP (NCE-ODMRP), we present a framework that enables a seamless integration of random linear network coding with conventional ad hoc multicast protocols for enhanced reliability. Simulation results show that the NCE-ODMRP achieves a nearly perfect packet delivery ratio while keeping the route maintenance overhead low to a degree similar to that of the E-ODMRP.

Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack

  • Nugraha, Muhammad;Paramita, Isyana;Musa, Ardiansyah;Choi, Deokjai;Cho, Buseung
    • 한국멀티미디어학회논문지
    • /
    • 제17권8호
    • /
    • pp.988-994
    • /
    • 2014
  • Software Defined Network (SDN) is a new technology in computer network area which enables user to centralize control plane. The security issue is important in computer network to protect system from attackers. SYN flooding attack is one of Distributed Denial of Service attack methods which are popular to degrade availability of targeted service on Internet. There are many methods to protect system from attackers, i.e. firewall and IDS. Even though firewall is designed to protect network system, but it cannot mitigate DDoS attack well because it is not designed to do so. To improve performance of DDOS mitigation we utilize another mechanism by using SDN technology such as OpenFlow and sFlow. The methodology of sFlow to detect attacker is by capturing and sum cumulative traffic from each agent to send to sFlow collector to analyze. When sFlow collector detect some traffics as attacker, OpenFlow controller will modify the rule in OpenFlow table to mitigate attacks by blocking attack traffic. Hence, by combining sum cumulative traffic use sFlow and blocking traffic use OpenFlow we can detect and mitigate SYN flooding attack quickly and cheaply.

Energy efficient watchman based flooding algorithm for IoT-enabled underwater wireless sensor and actor networks

  • Draz, Umar;Ali, Tariq;Zafar, Nazir Ahmad;Alwadie, Abdullah Saeed;Irfan, Muhammad;Yasin, Sana;Ali, Amjad;Khattak, Muazzam A. Khan
    • ETRI Journal
    • /
    • 제43권3호
    • /
    • pp.414-426
    • /
    • 2021
  • In the task of data routing in Internet of Things enabled volatile underwater environments, providing better transmission and maximizing network communication performance are always challenging. Many network issues such as void holes and network isolation occur because of long routing distances between nodes. Void holes usually occur around the sink because nodes die early due to the high energy consumed to forward packets sent and received from other nodes. These void holes are a major challenge for I-UWSANs and cause high end-to-end delay, data packet loss, and energy consumption. They also affect the data delivery ratio. Hence, this paper presents an energy efficient watchman based flooding algorithm to address void holes. First, the proposed technique is formally verified by the Z-Eves toolbox to ensure its validity and correctness. Second, simulation is used to evaluate the energy consumption, packet loss, packet delivery ratio, and throughput of the network. The results are compared with well-known algorithms like energy-aware scalable reliable and void-hole mitigation routing and angle based flooding. The extensive results show that the proposed algorithm performs better than the benchmark techniques.

Implementation of ML Algorithm for Mung Bean Classification using Smart Phone

  • Almutairi, Mubarak;Mutiullah, Mutiullah;Munir, Kashif;Hashmi, Shadab Alam
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.89-96
    • /
    • 2021
  • This work is an extension of my work presented a robust and economically efficient method for the Discrimination of four Mung-Beans [1] varieties based on quantitative parameters. Due to the advancement of technology, users try to find the solutions to their daily life problems using smartphones but still for computing power and memory. Hence, there is a need to find the best classifier to classify the Mung-Beans using already suggested features in previous work with minimum memory requirements and computational power. To achieve this study's goal, we take the experiments on various supervised classifiers with simple architecture and calculations and give the robust performance on the most relevant 10 suggested features selected by Fisher Co-efficient, Probability of Error, Mutual Information, and wavelet features. After the analysis, we replace the Artificial Neural Network and Deep learning with a classifier that gives approximately the same classification results as the above classifier but is efficient in terms of resources and time complexity. This classifier is easily implemented in the smartphone environment.

Develop an Effective Security Model to Protect Wireless Network

  • Ataelmanan, Somya Khidir Mohmmed;Ali, Mostafa Ahmed Hassan
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.48-54
    • /
    • 2021
  • Security is an important issue for wireless communications and poses many challenges. Most security schemes have been applied to the upper layers of communications networks. Since in a typical wireless communication, transmission of data is over the air, third party receiver(s) may have easy access to the transmitted data. This work examines a new security technique at the physical layer for the sake of enhancing the protection of wireless communications against eavesdroppers. We examine the issue of secret communication through Rayleigh fading channel in the presence of an eavesdropper in which the transmitter knows the channel state information of both the main and eavesdropper channel. Then, we analyze the capacity of the main channel and eavesdropper channel we also analyze for the symbol error rate of the main channel, and the outage probability is obtained for the main transmission. This work elucidate that the proposed security technique can safely complement other Security approaches implemented in the upper layers of the communication network. Lastly, we implement the results in Mat lab

컴퓨터 분야 논문지에서 저자의 관심분야에 대한 소셜 네트워크 분석 (Social Network Analysis of author's interest area in Journals about Computer)

  • 이주연;박유현
    • 한국정보통신학회논문지
    • /
    • 제20권1호
    • /
    • pp.193-199
    • /
    • 2016
  • 최근 다양한 분야에서 소셜 네트워크 분석 기법을 통해 개체들간의 상호작용을 분석하는 연구들이 진행되고 있다. 본 논문에서는 한국정보통신학회 논문지의 저자약력에 기술되는 저자의 관심분야를 소셜 네트워크 분석기법을 통해 다양한 측면에서 분석하고자 한다. 분석결과 많은 저자들이 임베디드, 보안, 영상처리, 무선통신, 빅데이터, USN, 네트워크, RFID 등의 관심분야를 중심으로 연구하고 있음을 알 수 있다.

다양한 활성 함수를 사용하는 신경회로망의 구성 (Neural Networks with Mixed Activation Functions)

  • 이충열;박철훈
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2008년도 하계종합학술대회
    • /
    • pp.679-680
    • /
    • 2008
  • When we apply the neural networks to applications, we need to select proper architecture of the network and the activation function of the network is one of most important characteristics. In this research, we propose a method to make a network using multiple activation functions. The performance of the proposed method is investigated through the computer simulations on various regression problems.

  • PDF

Enhanced Fuzzy Multi-Layer Perceptron

  • Kim, Kwang-Baek;Park, Choong-Sik;Abhjit Pandya
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2004년도 SMICS 2004 International Symposium on Maritime and Communication Sciences
    • /
    • pp.1-5
    • /
    • 2004
  • In this paper, we propose a novel approach for evolving the architecture of a multi-layer neural network. Our method uses combined ART1 algorithm and Max-Min neural network to self-generate nodes in the hidden layer. We have applied the. proposed method to the problem of recognizing ID number in student identity cards. Experimental results with a real database show that the proposed method has better performance than a conventional neural network.

  • PDF