• Title/Summary/Keyword: Convergence Network

Search Result 4,013, Processing Time 0.034 seconds

Design of neural network based ALE for QRS enhancement (QRS 파의 증대를 위한 신경망 ALE 설계)

  • 원상철;박종철;최한고
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2000.08a
    • /
    • pp.217-220
    • /
    • 2000
  • This paper describes the application of a neural network based adaptive line enhancer (ALE) for enhancement of the weak QRS complex corrupted with background noise. Modified fully-connected recurrent neural network is used as a nonlinear adaptive filter in the ALE. The connecting weights between network nodes as well as the parameters of the node activation function are updated at each iteration using the gradient descent algorithm. The real ECG signal buried with moderate and severe background noise is applied to the ALE. Simulation results show that the neural network based ALE performs well the enhancement of the QRS complex from noisy ECG signals.

  • PDF

Enhancement of Internal Network Security in Small Networks Using UTM and ELK Stack (UTM과 ELK Stack을 활용한 소규모 네트워크의 내부망 보안 강화방안)

  • Song Ha Min;DongHwi Lee
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.3-9
    • /
    • 2024
  • Currently, cyberattacks and security threats are constantly evolving, and organizations need quick and efficient security response methods. This paper proposes ways to strengthen internal network security by utilizing Unified Threat Management (UTM) equipment to improve network security and effectively manage and analyze the log data of the internal network collected through these equipment using Elastic Stack (Elasticsearch, Logstash, Kibana, hereinafter referred to as ELK Stack).

Network function virtualization (NFV) resource allocation (RA) scheme and research trend (네트워크기능 가상화 (NFV) 자원할당 (RA) 방식과 연구동향)

  • Kim, Hyuncheol;Yoon, Seunghyun;Jeon, Hongseok;Lee, Wonhyuk
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.159-165
    • /
    • 2016
  • Through the NFV (Network Function Virtualization), companies such as network service providers and carriers have sought to dramatically reduce CAPEX / OPEX by improving the speed of new service provisioning and flexibility of network construction through the S/W-based devices provided by NFV. One of the most important considerations for establishing an NFV network to provide dynamic services is to determine how to dynamically allocate resources (VNFs), the basic building blocks of network services, in the right place. In this paper, we analyzed the latest research trends on VNF node, link allocation, and scheduling in nodes that are required to provide arbitrary NS in NFV framework. In this paper, we also propose VNF scheduling problems that should be studied further in RA (Resource Allocation).

Understanding the Relationship between Value Co-Creation Mechanism and Firm's Performance based on the Service-Dominant Logic (서비스지배논리하에서 가치공동창출 매커니즘과 기업성과간의 관계에 대한 연구)

  • Nam, Ki-Chan;Kim, Yong-Jin;Yim, Myung-Seong;Lee, Nam-Hee;Jo, Ah-Rha
    • Asia pacific journal of information systems
    • /
    • v.19 no.4
    • /
    • pp.177-200
    • /
    • 2009
  • AIn the advanced - economy, the services industry hasbecome a dominant sector. Evidently, the services sector has grown at a much faster rate than any other. For instance, in such developed countries as the U.S., the proportion of the services sector in its GDP is greater than 75%. Even in the developing countries including India and China, the magnitude of the services sector in their GDPs is rapidly growing. The increasing dependence on service gives rise to new initiatives including service science and service-dominant logic. These new initiatives propose a new theoretical prism to promote the better understanding of the changing economic structure. From the new perspectives, service is no longer regarded as a transaction or exchange, but rather co-creation of value through the interaction among service users, providers, and other stakeholders including partners, external environments, and customer communities. The purpose of this study is the following. First, we review previous literature on service, service innovation, and service systems and integrate the studies based on service dominant logic. Second, we categorize the ten propositions of service dominant logic into conceptual propositions and the ones that are directly related to service provision. Conceptual propositions are left out to form the research model. With the selected propositions, we define the research constructs for this study. Third, we develop measurement items for the new service concepts including service provider network, customer network, value co-creation, and convergence of service with product. We then propose a research model to explain the relationship among the factors that affect the value creation mechanism. Finally, we empirically investigate the effects of the factors on firm performance. Through the process of this research study, we want to show the value creation mechanism of service systems in which various participants in service provision interact with related parties in a joint effort to create values. To test the proposed hypotheses, we developed measurement items and distributed survey questionnaires to domestic companies. 500 survey questionnaires were distributed and 180 were returned among which 171 were usable. The results of the empirical test can be summarized as the following. First, service providers' network which is to help offer required services to customers is found to affect customer network, while it does not have a significant effect on value co-creation and product-service convergence. Second, customer network, on the other hand, appears to influence both value co-creation and product-service convergence. Third, value co-creation accomplished through the collaboration of service providers and customers is found to have a significant effect on both product-service convergence and firm performance. Finally, product-service convergence appears to affect firm performance. To interpret the results from the value creation mechanism perspective, service provider network well established to support customer network is found to have significant effect on customer network which in turn facilitates value co-creation in service provision and product-service convergence to lead to greater firm performance. The results have some enlightening implications for practitioners. If companies want to transform themselves into service-centered business enterprises, they have to consider the four factors suggested in this study: service provider network, customer network, value co-creation, and product-service convergence. That is, companies becoming a service-oriented organization need to understand what the four factors are and how the factors interact with one another in their business context. They then may want to devise a better tool to analyze the value creation mechanism and apply the four factors to their own environment. This research study contributes to the literature in following ways. First, this study is one of the very first empirical studies on the service dominant logic as it has categorized the fundamental propositions into conceptual and empirically testable ones and tested the proposed hypotheses against the data collected through the survey method. Most of the propositions are found to work as Vargo and Lusch have suggested. Second, by providing a testable set of relationships among the research variables, this study may provide policy makers and decision makers with some theoretical grounds for their decision making on what to do with service innovation and management. Finally, this study incorporates the concepts of value co-creation through the interaction between customers and service providers into the proposed research model and empirically tests the validity of the concepts. The results of this study will help establish a value creation mechanism in the service-based economy, which can be used to develop and implement new service provision.

Design and Implementation of Architecture for Convergence of Home Network Services and Data Broadcasting Services (홈네트워크 서비스와 데이터방송 서비스의 컨버전스를 위한 구조 설계 및 구현)

  • Bae, Yu-Seok;Oh, Bong-Jin;Moon, Kyeong-Deok;Kim, Sang-Wook
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.717-724
    • /
    • 2006
  • This paper describes the design and implementation of architecture for convergence of home network services and data broadcasting services based on UMB and ACAP middleware; the one is used for interoperability of home networked devices, and the other for data broadcasting services. The proposed architecture provides TV-centric user interface capable of managing home network services and data broadcasting services together using a remote controller and TV sets TV applying Java TV Xlet interface and HAVi user interface for home network services like data broadcasting services. Besides, we define the service proxy for accessing home network services in a set-top box and the service broker for providing data related to home network services in a home server. Finally, the application manager in ACAP middleware manages the lifecycle of home network services through service events from the service proxy to the application manager.

MTD (Moving Target Detection) with Preposition Hash Table for Security of Drone Network (드론 네트워크 보안을 위한 해시표 대체 방식의 능동 방어 기법)

  • Leem, Sungmin;Lee, Minwoo;Lim, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.477-485
    • /
    • 2019
  • As the drones industry evolved, the security of the drone network has been important. In this paper, MTD (Moving Target Detection) technique is applied to the drone network for improving security. The existing MTD scheme has a risk that the hash value is exposed during the wireless communication process, and it is restricted to apply the one-to-many network. Therefore, we proposed PHT (Preposition Hash Table) scheme to prevent exposure of hash values during wireless communication. By reducing the risk of cryptographic key exposure, the use time of the cryptographic key can be extended and the security of the drone network will be improved. In addition, the cryptographic key exchange is not performed during flight, it is advantageous to apply PHT for a swarm drone network. Through simulation, we confirmed that the proposed scheme can contribute to the security of the drone network.

A Study on the Improvement of the Defense-related International Patent Classification using Patent Mining (특허 마이닝을 이용한 국방관련 국제특허분류 개선 방안 연구)

  • Kim, Kyung-Soo;Cho, Nam-Wook
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.1
    • /
    • pp.21-33
    • /
    • 2022
  • Purpose: As most defense technologies are classified as confidential, the corresponding International Patent Classifications (IPCs) require special attention. Consequently, the list of defense-related IPCs has been managed by the government. This paper aims to evaluate the defense-related IPCs and propose a methodology to revalidate and improve the IPC classification scheme. Methods: The patents in military technology and their corresponding IPCs during 2009~2020 were utilized in this paper. Prior to the analysis, patents are divided into private and public sectors. Social network analysis was used to analyze the convergence structure and central defense technology, and association rule mining analysis was used to analyze the convergence pattern. Results: While the public sector was highly cohesive, the private sector was characterized by easy convergence between technologies. In addition, narrow convergence was observed in the public sector, and wide convergence was observed in the private sector. As a result of analyzing the core technologies of defense technology, defense-related IPC candidates were identified. Conclusion: This paper presents a comprehensive perspective on the structure of convergence of defense technology and the pattern of convergence. It is also significant because it proposed a method for revising defense-related IPCs. The results of this study are expected to be used as guidelines for preparing amendments to the government's defense-related IPC.

A Case study on the Utilization of Emulation Based Network Testbeds (에뮬레이션 기반 테스트베드 활용 사례 연구)

  • Lee, Minsun;Yoo, Kwan-Jong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.61-67
    • /
    • 2018
  • Emulab software was developed by the team of University of Utah and it has been replicated at dozens of other sites in the world. Although KREONET Emulab, which established by the Korea Institute of Science and Technology Information, has only a modest number of compute nodes it has been provided an ideal playground to conduct various research for network protocols, cyber security and convergence research. A testbed is a critical enabler of experimental research and researchers only carry out the experiments that are supported by the testbed. This paper outlines the Utah Emulab's status and use types among the last 10 years of operation results and compares them with the ones with the KREONET Emulab. In addition, Testbed-as-a-Service(TaaS) is discussed to upgrade the testbed for the convergence research community services.

A Study of HFC Network quality as BcN(Broadband convergence Network) access network. (광대역통합망 구축을 위한 HFC망의 활용 가능성 연구)

  • Kim, Tae-Woong;Chung, Moo-Il;Kim, Hong-Iq;Im, Joon-Soon;Park, Sung-Kwon
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.167-170
    • /
    • 2005
  • We performed field test and analyzed results of field test in variable HFC(Hybrid Fiber Coaxial) network environments. And we investigated whether the test results is satisfied in DOCSIS(Data-over-Cable Service Interface Specification) 2.0 and OpenCable standard. Also, we propose HFC improvement problem for HFC Network quality as BcN(Broadband convergence Network) access network. We tested three sample areas. The sample areas represent various type of SO(System Operator) in korea. The field test was to measure signal level about digital channels. In results of multiple digital channels, in case of "Equalizer ON", we could be obtained very good test results. The results of field test were shown in satisfying recommended values in DOCSIS 2.0 and OpenCable. So, we could have confidence through field test that BcN will be possible to be adapted to environment of korea HFC network.

  • PDF

An Investigation on Security Management Architecture of Home Gateway (홈 게이트웨이 보안 관리 방식에 관한 연구)

  • Kim, Hyun Cheol;An, Seong Jin;Jung, Jin Wook;Kim, Seung Hae;Ryu, Yoon Sik;Jun, Young Il
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.67-74
    • /
    • 2003
  • Home network technologies which interconnect various wire and wireless home appliances, access network technologies and service offer technologies are continuing growth. To provide secure services in the home, home network environment, access network environment, and various service and contents offer technologies are consist organically. Thesis of administration method of systematic and effective groove network is most urgent and important urea to offer safety and authoritativeness of home networking service in home network that strong certification and security function are required among these technologies. In this paper, we propose home gateway security management architecture and the way to use SNMPv3. Also, we propose structure and function of home network management system to support various home networking security scenarios.

  • PDF