• Title/Summary/Keyword: Dynamic Environment Information

Search Result 1,217, Processing Time 0.029 seconds

DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments

  • Obaidat, Mohammad S.;Dhurandher, Sanjay K.;Gupta, Deepank;Gupta, Nidhi;Asthana, Anupriya
    • Journal of Information Processing Systems
    • /
    • v.6 no.3
    • /
    • pp.269-294
    • /
    • 2010
  • The interconnection of mobile devices in urban environments can open up a lot of vistas for collaboration and content-based services. This will require setting up of a network in an urban environment which not only provides the necessary services to the user but also ensures that the network is secure and energy efficient. In this paper, we propose a secure, energy efficient dynamic routing protocol for heterogeneous wireless sensor networks in urban environments. A decision is made by every node based on various parameters like longevity, distance, battery power which measure the node and link quality to decide the next hop in the route. This ensures that the total load is distributed evenly while conserving the energy of battery-constrained nodes. The protocol also maintains a trusted population for each node through Dynamic Trust Factor (DTF) which ensures secure communication in the environment by gradually isolating the malicious nodes. The results obtained show that the proposed protocol when compared with another energy efficient protocol (MMBCR) and a widely accepted protocol (DSR) gives far better results in terms of energy efficiency. Similarly, it also outdoes a secure protocol (QDV) when it comes to detecting malicious nodes in the network.

Study on Dynamic Trust-based Access Control in Online Social Network Environment (소셜 네트워크 환경에서 동적 신뢰 중심의 접근 제어 모델에 관한 연구)

  • Baek, Seungsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1025-1035
    • /
    • 2013
  • There has been an explosive increase in the population of OSN(online social network) for 10 years. OSN provides users with many opportunities to have communication among friends, families and goes so far as to make relationships among unknown people having similar belief or interest. However, OSN also produced adverse effects such as privacy breaches, leaking uncontrolled information or disseminating false information. Access control models such as MAC, DAC, RBAC are applied to the OSN to control those problems but those models in OSN are not fit in dynamic OSN environment because user's acts in OSN are unpredictable and static access control imposes burden on users to change access control rules one by one. This paper proposes the dynamic trust-based access control to solve the problems of traditional static access control in OSN.

C-COMA: A Continual Reinforcement Learning Model for Dynamic Multiagent Environments (C-COMA: 동적 다중 에이전트 환경을 위한 지속적인 강화 학습 모델)

  • Jung, Kyueyeol;Kim, Incheol
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.4
    • /
    • pp.143-152
    • /
    • 2021
  • It is very important to learn behavioral policies that allow multiple agents to work together organically for common goals in various real-world applications. In this multi-agent reinforcement learning (MARL) environment, most existing studies have adopted centralized training with decentralized execution (CTDE) methods as in effect standard frameworks. However, this multi-agent reinforcement learning method is difficult to effectively cope with in a dynamic environment in which new environmental changes that are not experienced during training time may constantly occur in real life situations. In order to effectively cope with this dynamic environment, this paper proposes a novel multi-agent reinforcement learning system, C-COMA. C-COMA is a continual learning model that assumes actual situations from the beginning and continuously learns the cooperative behavior policies of agents without dividing the training time and execution time of the agents separately. In this paper, we demonstrate the effectiveness and excellence of the proposed model C-COMA by implementing a dynamic mini-game based on Starcraft II, a representative real-time strategy game, and conducting various experiments using this environment.

On-Line Upgrade of Dynamic Linking Library (DLL) in the UNIX Environment (유닉스 환경에서의 DLL의 동적 업그레이드)

  • 김화준;이인환
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10b
    • /
    • pp.660-660
    • /
    • 1998
  • 본 논문은 SUN Solaris 2.6 환경에서 동작 중인 Dynamic Linking Library (DLL)를, 이 DLL을 사용하는 응용 프로그램의 동작에 영향을 주지 않고 온라인으로 교체하기 위한 방법을 제시한다. 구체적으로 이 논문은 Solaris 환경에서의 동적 링킹의 방법과 구조를 분석하고, 이로부터 DLL을 온라인으로 업그레이드하기 위한 교체 환경과 절차 및 방법을 제시하며, 실제 업그레이드를 통해 제시된 방법의 기능을 확인한다. 또한 제시된 방법을 동적 링킹을 사용하지 않은 일반 실행 파일의 온라인 교체에 활용하기 위한 방안을 제시한다.

Likelihood Estimation Using Continuous-Time Markov Channels for Cognitive Radio Networks in Wireless LAN

  • Oo, Thant Zin;Thar, Kyi;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.262-264
    • /
    • 2012
  • Dynamic spectrum access and cognitive radio is a viable solution to solve congestion in ISM band. The dynamic environment of multi-channel wireless LAN is modeled by using continuous time Markov process. Bayes theorem is applied to infer channel access decisions dynamically to ensure current data transmission is switched to only likely candidate channels.

A System Dynamics Approach for Making Group Decision

  • Kwahk Kee-Young;Kim Hee-Woong
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.05a
    • /
    • pp.958-965
    • /
    • 2003
  • The rapidly changing business environment has required cooperation and coorduiation among functional units n organizations which should Involve group decision-making processes Although many group derision-making support tools and methods have provided the collaborative capabilities for organizational members, they often lack features supporting the dynamic complexity issue frequently occurring at group decision-making processes This study proposes system dynamics modeling as a group decision-making support tool to deal with the group derision-making tasks having properties of dynamic complexity in terms of cognitive fit theory.

  • PDF

Link State-Tracing Algorithm Based Dynamic Watermark in Wireless Environment (무선 환경에서 동적 워터마크 기반의 상태 정보 추적 알고리즘)

  • Kim, Do-Sin;Kang, Dae-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1351-1354
    • /
    • 2005
  • 무선 환경에서는 모바일 기기의 이동 혹은 링크의 충돌, 부족한 대역폭등 모바일 기기의 외적 환경 변화에 의해 무선 링크의 단절이 빈번하게 일어나는데, 링크의 단절은 네트워크 자원을 사용하는 어플리케이션의 에러로 이어진다. 이러한 무선 환경의 단절을 어플리케이션이 알 수 있다면, 링크의 단절로 인한 어플리케이션의 에러를 방지 할 수 있게 된다. 본 논문에서는 어플리케이션이 무선 링크에 적응할 수 있도록 링크의 상태 정보를 판단 및 예측할 수 있는 dynamic watermark 기반의 상태 정보 추적 알고리즘을 제안한다.

  • PDF

Development of a RIA-based Dynamic Mashup Service for Ocean Environment (RIA 기반 해양 환경 동적 매쉬업 서비스 개발)

  • Ceong, Hee-Taek;Kim, Hae-Jin;Kim, Hae-Ran
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2292-2298
    • /
    • 2010
  • A mashup is a web page or application that uses and combines information, contents or Open APIs available on the web to create a new service. The mashup developed by the need not combination of simple information can contribute to new added-values with practicality and convenience. Thus, in this paper, we want to develop a RIA-based dynamic mashup service for the users considering weather forecast and marine information importantly. We design and implement the system that it can register a number of information about a domain dynamically through registration process based on the map and present a mark of domain location on the map and the information including internal environment, external environment and weather of related to the domain within a webpage. Implemented service need not require a tedious process visiting other web sites every time to confirm the relevant information because we can see simultaneously related information with a map within a page.

Context-based Dynamic Access Control Model for u-healthcare and its Application (u-헬스케어를 위한 상황기반 동적접근 제어 모델 및 응용)

  • Jeong, Chang-Won;Kim, Dong-Ho;Joo, Su-Chong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.493-506
    • /
    • 2008
  • In this paper we suggest dynamic access control model based on context satisfied with requirement of u-healthcare environment through researching the role based access control model. For the dynamic security domain management, we used a distributed object group framework and context information for dynamic access control used the constructed database. We defined decision rule by knowledge reduction in decision making table, and applied this rule in our model as a rough set theory. We showed the executed results of context based dynamic security service through u-healthcare application which is based on distributed object group framework. As a result, our dynamic access control model provides an appropriate security service according to security domain, more flexible access control in u-healthcare environment.

A Design of DDPT(Dynamic Data Protection Technique) using k-anonymity and ℓ-diversity (k-anonymity와 ℓ-diversity를 이용한 동적 데이터 보호 기법 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.3
    • /
    • pp.217-224
    • /
    • 2011
  • This paper proposes DDPT(Dynamic Data Protection Technique) which solves the problem of private information exposure occurring in a dynamic database environment. The DDPT in this paper generates the MAG(Multi-Attribute Generalization) rules using multi-attributes generalization algorithm, and the EC(equivalence class) satisfying the k-anonymity according to the MAG rules. Whenever data is changed, it reconstructs the EC according to the MAC rules, and protects the identification exposure which is caused by the EC change. Also, it measures the information loss rates of the EC which satisfies the ${\ell}$-diversity. It keeps data accuracy by selecting the EC which is less than critical value and enhances private information protection.