• Title/Summary/Keyword: Hierarchical Network

Search Result 975, Processing Time 0.021 seconds

A study of set route path avoiding traffic concentration in Mobile Ad hoc Network (MANET에서 트래픽 집중현상을 회피하는 경로설정에 관한 연구)

  • Oh, Dong-keun;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.781-783
    • /
    • 2014
  • Mobile ad hoc network(MANET) consists of node that has mobility. MANET has increased overhead that caused by frequent topology changes. For reducing overhead, hierarchical network that communicates through cluster head node has been researched. When traffic is concentrated on cluster head node, cluster member node can't send message. To solve this problem, we proposed Step Parent algorithm. Proposed algorithm, cluster member node checks traffic of cluster head node using route path of other cluster head node in efficient coverage area. When cluster head node has increased traffic, cluster member node make a new route path by route path by routing path to another cluster head node. So cluster member node sends a message to destination node, we check improving delivery ratio.

  • PDF

Network Security Modeling and Simulation Using the SES/MB Framework (SES/MB 프레임워크를 이용한 네트워크 보안 모델링 및 시뮬레이션)

  • 지승도;박종서;이장세;김환국;정기찬;정정례
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.13-26
    • /
    • 2001
  • This paper presents the network security modeling methodology and simulation using the hierarchical and modular modeling and simulation framework. Recently, Howard and Amoroso developed the cause-effect model of the cyber attack, defense, and consequences, Cohen has been proposed the simplified network security simulation methodology using the cause-effect model, however, it is not clear that it can support more complex network security model and also the model-based cyber attack simulation. To deal with this problem, we have adopted the hierarchical and modular modeling and simulation environment so called the System Entity Structure/Model Base (SES/MB) framework which integrates the dynamic-based formalism of simulation with the symbolic formalism of AI. Several simulation tests performed on sample network system verify the soundness of our method.

A SOA Service Identification Model Based on Hierarchical Ontology (계층적 온톨로지 기반의 SOA서비스 식별 모델)

  • Park, Sei-Kwon;Choi, Ko-Bong
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.323-340
    • /
    • 2013
  • As the importance of collaboration becomes critical in today's open and complex business environment network, the issues and solutions on compatibility and reusability between different kinds of applications are being increasingly important as well in systems analysis and design. And therefore, service-centered SOA is receiving attention in such business environment as a strategic approach that makes possible for prompt action according to the needs of users and business process. Various implementation methodologies have been proposed for SOA, however, in practical aspects most of them have some problems since they fail to propose specific policies in definition and identification of services for the exact user requirements and business situations. To solve or alleviate those problems, this paper suggests a new service identification model based on hierarchical ontology, where three different ontologies such as business ontology, context ontology and service ontology are proposed to define the relationship and design the link between user requirements, business process, applications and services. Through a suggested methodology in this paper, it would be possible to provide proactive services that meets a variety of business environments and demands of user. Also, since the information can be modified adaptively and dynamically by hierarchical ontology, this study is expected to play a positive role in increasing the flexibility of systems and business environments.

A Two level Detection of Routing layer attacks in Hierarchical Wireless Sensor Networks using learning based energy prediction

  • Katiravan, Jeevaa;N, Duraipandian;N, Dharini
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4644-4661
    • /
    • 2015
  • Wireless sensor networks are often organized in the form of clusters leading to the new framework of WSN called cluster or hierarchical WSN where each cluster head is responsible for its own cluster and its members. These hierarchical WSN are prone to various routing layer attacks such as Black hole, Gray hole, Sybil, Wormhole, Flooding etc. These routing layer attacks try to spoof, falsify or drop the packets during the packet routing process. They may even flood the network with unwanted data packets. If one cluster head is captured and made malicious, the entire cluster member nodes beneath the cluster get affected. On the other hand if the cluster member nodes are malicious, due to the broadcast wireless communication between all the source nodes it can disrupt the entire cluster functions. Thereby a scheme which can detect both the malicious cluster member and cluster head is the current need. Abnormal energy consumption of nodes is used to identify the malicious activity. To serve this purpose a learning based energy prediction algorithm is proposed. Thus a two level energy prediction based intrusion detection scheme to detect the malicious cluster head and cluster member is proposed and simulations were carried out using NS2-Mannasim framework. Simulation results achieved good detection ratio and less false positive.

Misclassified Samples based Hierarchical Cascaded Classifier for Video Face Recognition

  • Fan, Zheyi;Weng, Shuqin;Zeng, Yajun;Jiang, Jiao;Pang, Fengqian;Liu, Zhiwen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.785-804
    • /
    • 2017
  • Due to various factors such as postures, facial expressions and illuminations, face recognition by videos often suffer from poor recognition accuracy and generalization ability, since the within-class scatter might even be higher than the between-class one. Herein we address this problem by proposing a hierarchical cascaded classifier for video face recognition, which is a multi-layer algorithm and accounts for the misclassified samples plus their similar samples. Specifically, it can be decomposed into single classifier construction and multi-layer classifier design stages. In single classifier construction stage, classifier is created by clustering and the number of classes is computed by analyzing distance tree. In multi-layer classifier design stage, the next layer is created for the misclassified samples and similar ones, then cascaded to a hierarchical classifier. The experiments on the database collected by ourselves show that the recognition accuracy of the proposed classifier outperforms the compared recognition algorithms, such as neural network and sparse representation.

Hierarchical Location Caching Scheme for Mobile Object Tracking in the Internet of Things

  • Han, Youn-Hee;Lim, Hyun-Kyo;Gil, Joon-Min
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1410-1429
    • /
    • 2017
  • Mobility arises naturally in the Internet of Things networks, since the location of mobile objects, e.g., mobile agents, mobile software, mobile things, or users with wireless hardware, changes as they move. Tracking their current location is essential to mobile computing. To overcome the scalability problem, hierarchical architectures of location databases have been proposed. When location updates and lookups for mobile objects are localized, these architectures become effective. However, the network signaling costs and the execution number of database operations increase particularly when the scale of the architectures and the numbers of databases becomes large to accommodate a great number of objects. This disadvantage can be alleviated by a location caching scheme which exploits the spatial and temporal locality in location lookup. In this paper, we propose a hierarchical location caching scheme, which acclimates the existing location caching scheme to a hierarchical architecture of location databases. The performance analysis indicates that the adjustment of such thresholds has an impact on cost reduction in the proposed scheme.

An efficient Clustering Node Life Time management Technique in MANET algorithm (MANET에서 클러스터링 노드의 효율적인 수명 관리 기법)

  • Lee, Jong-Seung;Kim, Yeong-Sam;Oh, Young-Jun;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.746-748
    • /
    • 2011
  • MANET(Mobile Ad-hoc Network) is a self-configuration network or wireless multi-hop network based on inference topology. The proposed ATICC(Adaptive Time Interval Clustering Control) algorithm for hierarchical cluster based MANET. The proposed ATICC algorithm is time interval control technique for node management considering the attribute of node and network traffic. ATICC could be made low the network traffic. Also it could be improving the network life time by using timing control method.

  • PDF

A Connectionist Expert System for Fault Diagnosis of Power System (전력계통 사고구간 판정을 위한 Commectionist Expert System)

  • 김광호;박종근
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.41 no.4
    • /
    • pp.331-338
    • /
    • 1992
  • The application of Connectionist expert system using neural network to fault diagnosis of power system is presented and compared with rule-based expert system. Also, the merits of Connectionist model using neural network is presented. In this paper, the neural network for fault diagnosis is hierarchically composed by 3 neural network classes. The whole power system is divided into subsystems, the neural networks (Class II) which take charge of each subsystem and the neural network (Class III) which connects subsystems are composed. Every section of power system is classified into one of the typical sections which can be applied with same diagnosis rules, as line-section, bus-section, transformer-section. For each typical section, only one neural network (Class I) is composed. As the proposed model has hierarchical structure, the great reduction of learning structure is achieved. With parallel distributed processing, we show the possibility of on-line fault diagnosis.

  • PDF

OPTIMAL DESIGN MODEL FOR A DISTRIBUTED HIERARCHICAL NETWORK WITH FIXED-CHARGED FACILITIES

  • Yoon, Moon-Gil;Baek, Young-Ho;Tcha, Dong-Wan
    • Management Science and Financial Engineering
    • /
    • v.6 no.2
    • /
    • pp.29-45
    • /
    • 2000
  • We consider the design of a two-level telecommunication network having logical full-mesh/star topology, with the implementation of conduit systems taken together. The design problem is then viewed as consisting of three subproblems: locating hub facilities, placing a conduit network, and installing cables therein to configure the logical full-mesh/star network. Without partitioning into subproblems as done in the conventional approach, the whole problem is directly dealt with in a single integrated framework, inspired by some recent successes with the approach. We successfully formulate the problem as a variant of the classical multicommodity flow model for the fixed charge network design problem, aided by network augmentation, judicious commodity definition, and some flow restrictions. With our optimal model, we solve some randomly generated sample problems by using CPLEX MIP program. From the computational experiments, it seems that our model can be applied to the practical problem effectively.

  • PDF

A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET (MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.87-93
    • /
    • 2013
  • MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.