• 제목/요약/키워드: Digital Network

검색결과 3,829건 처리시간 0.033초

CPU 기반의 딥러닝 컨볼루션 신경망을 이용한 이륜 차량 번호판 인식 알고리즘 (Twowheeled Motor Vehicle License Plate Recognition Algorithm using CPU based Deep Learning Convolutional Neural Network)

  • 김진호
    • 디지털산업정보학회논문지
    • /
    • 제19권4호
    • /
    • pp.127-136
    • /
    • 2023
  • Many research results on the traffic enforcement of illegal driving of twowheeled motor vehicles using license plate recognition are introduced. Deep learning convolutional neural networks can be used for character and word recognition of license plates because of better generalization capability compared to traditional Backpropagation neural networks. In the plates of twowheeled motor vehicles, the interdependent government and city words are included. If we implement the mutually independent word recognizers using error correction rules for two word recognition results, efficient license plate recognition results can be derived. The CPU based convolutional neural network without library under real time processing has an advantage of low cost real application compared to GPU based convolutional neural network with library. In this paper twowheeled motor vehicle license plate recognition algorithm is introduced using CPU based deep-learning convolutional neural network. The experimental results show that the proposed plate recognizer has 96.2% success rate for outdoor twowheeled motor vehicle images in real time.

IP 네트워크에서 트래픽 레코드를 이용한 최단 거리 결정 기법 (Determining the shortest paths by using the history of IP network traffic records)

  • 홍성혁
    • 디지털융복합연구
    • /
    • 제10권4호
    • /
    • pp.223-228
    • /
    • 2012
  • 본 연구는 정적 라우팅과 동적 라우팅의 장점을 활용하여 최단 거리를 산정하는 하이브리드 방식의 라우팅 기법이다. 네트워킹은 휴먼 펙터에 의해 결정이 되기 때문에, 네트워크 트래픽은 항상 특정 시간에 몰리게 되고 네트워크 트레픽 레코드를 분석하면 각 시간대별로 네트워크 트레픽 추측이 가능하다. 따라서 RIP의 잦은 정보 교환으로 인해 발생되는 부하를 줄여 IP 네트워크에서 최단 경로를 산정하는 것이 이 논문이 목적이다.

의사결정트리와 인공 신경망 기법을 이용한 침입탐지 효율성 비교 연구 (A Comparative Study on the Performance of Intrusion Detection using Decision Tree and Artificial Neural Network Models)

  • 조성래;성행남;안병혁
    • 디지털산업정보학회논문지
    • /
    • 제11권4호
    • /
    • pp.33-45
    • /
    • 2015
  • Currently, Internet is used an essential tool in the business area. Despite this importance, there is a risk of network attacks attempting collection of fraudulence, private information, and cyber terrorism. Firewalls and IDS(Intrusion Detection System) are tools against those attacks. IDS is used to determine whether a network data is a network attack. IDS analyzes the network data using various techniques including expert system, data mining, and state transition analysis. This paper tries to compare the performance of two data mining models in detecting network attacks. They are decision tree (C4.5), and neural network (FANN model). I trained and tested these models with data and measured the effectiveness in terms of detection accuracy, detection rate, and false alarm rate. This paper tries to find out which model is effective in intrusion detection. In the analysis, I used KDD Cup 99 data which is a benchmark data in intrusion detection research. I used an open source Weka software for C4.5 model, and C++ code available for FANN model.

한국형 네트워크 보안 시스템 성능 평가 방법론 실계 (A Designing Method of Performance Evaluation for Network Security Equipment of Korean Style)

  • 주승환;서희석;김상연
    • 디지털산업정보학회논문지
    • /
    • 제7권3호
    • /
    • pp.97-105
    • /
    • 2011
  • With the advancement of network, privacy information as well as confidential information that belongs to government and company are exposed to security incident like spreading viruses or DDoS attack. To prevent these security incident and protect information that belongs to government and company, Security system has developed such as antivirus, firewall, IPS, VPN, and other network security system. Network security systems should be selected based on purpose, usage and cost. Verification for network security product's basic features performed in a variety of ways at home and abroad, but consumers who buy these network security product, just rely on the information presented at companies. Therefore, common user doing self performance evaluation for perform Verification before buying network security product but these verification depends on inaccurate data which based on some user's criteria. On this paper, we designing methodology of network security system performance evaluation focused on Korean using other cases of performance evaluation.

이동환경에서 홈 네트워크와 원격으로 연결하는 기법 (Method for Remotely Accessing the Home Network in the Mobile Environment)

  • 박용석;김현식;이연성
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 춘계학술대회
    • /
    • pp.649-651
    • /
    • 2014
  • DLNA(Digital Living Network Alliance) 표준은 홈 네트워크 내에서 멀티미디어 콘텐츠의 공유를 용이하게 한다. 하지만 스마트폰, 태블릿 PC와 같은 이동 컴퓨팅 기기의 사용이 빠르게 확산되면서 콘텐츠 공유는 홈 네트워크의 영역에서 확장될 필요성이 생겼다. 본 논문에서는 이동 환경에서도 사용자가 DLNA 기반 홈 네트워크와 연결하여 원하는 멀티미디어 콘텐츠의 공유를 가능하게 하는 방법을 제시한다. 제안되는 방법은 모바일 VPN(Virtual Private Network)의 사용을 기반으로 하며, 무선 환경에서 홈 네트워크의 자원에 쉽게 접근할 수 있는 방법을 제시한다.

  • PDF

Features of Legal Relations in the Field of Digital Services: Legal Realities and Prospects for the Future

  • Pohrebniak, Stanislav;Panova, Liydmyla;Gramatskyy, Ernest;Radchenko, Liliya;Kryvosheyina, Inha
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.300-304
    • /
    • 2022
  • The central feature of a digital society is the presence of a significant volume of digital services. The main research-analytical goal of the work is to identify the characteristic features of digital services, to classify and compare various types of digital services, to study the main levers for the development of digital services, the principal determinants of the observance and implementation of digital rights, to identify the dominant threats regarding the violation of digital rights, to analyze the features of legal relations that arise between the supplier and the consumer of digital technologies, consider the available taxation options for the digital economy. The work uses the following methods and research methods: hermeneutic, forecasting, in particular, extrapolation, analysis and synthesis, comparative. Research results: the definition of the concept of "digital service" is given, its main characteristics and types, according to the level of digitalization, the states-leaders are identified, slowing down, promising and problematic, the main triggers of slowing digitalization in some EU countries are investigated, by analyzing the regulatory legal acts of the European Commission on digitalization the strategy of the EU's actions to increase the degree of digitalization was determined, the positive and negative effects of digital services concerning the observance of human rights and freedoms were highlighted, the issue of levying taxes from digital companies was investigated.

TDX-1스윗칭 네트워크의 통화량

  • 오돈성;박권철
    • 한국통신학회:학술대회논문집
    • /
    • 한국통신학회 1986년도 춘계학술발표회 논문집
    • /
    • pp.142-145
    • /
    • 1986
  • The traffic characteristics of digital switch network depend on the structure, blocking probability, path searching method and etc. This paper presents the study of TDX-1 switch network traffic capacity by considering some decisive factors such as call processing software, switch network structure and control scheme. Conclusively the study shows that the switch network of TDX-1 can handle approximatly up to 1650 Erlang.

  • PDF

버퍼 기반 네트워크 매칭을 이용한 도로 데이터 갱신기법 연구 (A Study on Updating Methodology of Road Network data using Buffer-based Network Matching)

  • 박우진
    • 지적과 국토정보
    • /
    • 제44권1호
    • /
    • pp.127-138
    • /
    • 2014
  • 수치지도의 도로 데이터를 효율적으로 갱신하기 위해서는 최신 갱신된 지도자료로부터 갱신된 정보만을 추출하여 반영하는 것이 효율적이다. 본 연구에서는 갱신 대상이 되는 네트워크 데이터와 갱신 참조 데이터를 중첩한 후 네트워크 매칭기법을 적용하여 갱신 대상 객체를 탐색한 후, 해당 대상 객체의 갱신 케이스를 분류하고 케이스에 따라 갱신하는 일련의 프로세스를 개발, 적용하고자 하였다. 이를 위해 수치지형도 도로중심선 데이터를 갱신 대상으로 하고 도로중심선 전자지도의 도로구간 데이터를 갱신 참조 데이터로 하여 버퍼 기반 네트워크 매칭 기법을 적용한 후, 각 객체의 중첩길이비를 계산하여 매칭 및 갱신 케이스에 따라 객체그룹을 분류하였으며 분류된 객체그룹에 갱신 프로세스를 적용하여 갱신된 수치지형도 도로중심선 데이터를 도출하였다. 적용 결과, 이종의 데이터로부터 갱신정보를 추출하여 도로 네트워크 데이터의 갱신과정에 이를 활용할 수 있을 것으로 판단된다.

드론 네트워크 보안을 위한 해시표 대체 방식의 능동 방어 기법 (MTD (Moving Target Detection) with Preposition Hash Table for Security of Drone Network)

  • 임성민;이민우;임재성
    • 한국정보통신학회논문지
    • /
    • 제23권4호
    • /
    • pp.477-485
    • /
    • 2019
  • 드론 산업의 발달로 인해 드론 네트워크의 보안이 중요해졌다. 특히, 드론 네트워크의 무선통신 감청과 이로 인한 불법 드론 공격, 서비스 거부 공격에 대한 방어가 필요하다. 본 논문에서는 드론 네트워크의 보안성 향상을 위해 능동 방어를 위한 네트워크 MTD (Moving Target Defense) 기법을 적용하는 방안을 제안한다. 기존의 네트워크 MTD 기법을 드론 네트워크에 적용하게 되면, 드론 식별을 위한 해시값이 무선통신 중 노출될 위험이 있고, 일대다 군집형 드론 네트워크로의 적용이 제한된다. 본 논문에서는 해시값 노출에 따른 보안 위험을 감소하기 위해 해시표 사전 배치(PHT, Preposition Hash Table) 방식을 사용하고, 해시값을 별도의 카운터로 대체한다. 드론 네트워크 상에 해시값을 직접 전송하지 않기 때문에 해시값 생성시 사용된 키 값의 노출 위험이 감소되고, 결과적으로 동일한 키의 사용 시간을 연장하게 됨으로써 드론 네트워크의 보안성 향상에 기여할 수 있다. 또한, 비행 중 드론의 키 교환을 하지 않기 때문에 일대다 군집형 드론 네트워크로의 적용이 가능하다. 모의실험을 통해 드론 네트워크 공격시 키 사용량과 패킷 전송 성공률을 확인하여 제안방식이 드론 네트워크의 보안성 향상에 기여할 수 있음을 확인하였다.

Consumer Associative Network Analysis on Device and Service Convergence

  • Han, Sangman;Lee, Janghyuk;Park, Sun-Young;Jo, Woonghyeon
    • Asia Marketing Journal
    • /
    • 제15권3호
    • /
    • pp.1-14
    • /
    • 2013
  • Our research brings managerial insights for developing new digital convergence of devices and services. To explain the phenomenon of device and service convergence, we combine two different approaches from separate research fields: a perceptual mapping technique generally used for segmentation in marketing and associative network analysis mobilized to understanding network structure of core and peripheral as well as the information mediating role of nodes in network science. By combining these two approaches, we provide an in-depth analysis of the associations among devices and services by assessing the centrality of device and service nodes in an associative network. This is done by examining the connections between these services and devices as well as investigating the role of mediation in the combined device-service associative network. Our results based on bi-partite network analysis of survey responses from 250 Internet Protocol (IP) television viewers show which device and which service will play the major role in future device and service convergence as well as which characteristics and functionalities have to be incorporated into future convergence. Among the devices, the mobile handset with the betweenness centrality of 0.26 appears to be the device that would lead future device convergence. Among the services, wireless broadband with the betweenness centrality of 0.276 appears to be the service on which future service convergence needs to be developed. This result is quite unexpected, since wireless broadband has a lower penetration rate than other services, such as fixed broadband and cable TV. In addition, we indicate the possibility of converging devices, such as personal digital assistant (PDA) and mobile handset, and services, such as IPTV and mobile Internet, into wireless broadband services in the future.

  • PDF