• Title/Summary/Keyword: Hierarchical Network

Search Result 975, Processing Time 0.027 seconds

A Study on the Application of Block Chain to Ensure Data Integrity in MANET Environment (MANET 환경에서 데이터 무결성 보장을 위한 블록체인 적용에 관한 연구)

  • Yang, Hwanseok;Choi, Daesoo
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.53-58
    • /
    • 2018
  • MANET transmits data by hop-by-hop method because it is composed of mobile nodes without support of any infrastructure. Its structure is very similar to a block chain. However, it is exposed to various threats such as data tampering or destruction by malicious nodes because of transmission method. So, ensuring the integrity of transmitted data is an important complement to MANET. In this paper, we propose a method to apply the block chain technique in order to protect the reliability value of the nodes consisting the network from malicious nodes. For this, hierarchical structure of a cluster type is used. Only cluster head stores the reliability information of the nodes in a block and then, this can be spread. In addition, we applied block generation difficulty automatic setting technique using the number of nodes selecting cluster head and the reliability of cluster head to prevent the spread of wrong blocks. This can prevent block generation and spread by malicious nodes. The superior performance of the proposed technique can be verified by comparing experiments with the SAODV technique.

  • PDF

Asymmetric Temporal Privilege Management on Untrusted Storage Server (네트워크 스토리지에서 비대칭키 방식의 시 분할 권한 권리 (ATPM))

  • Kim, Euh-Mi;Yoon, Hyo-Jin;Cheon, Jung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.31-42
    • /
    • 2005
  • We consider a network storage model whose administrator can not be fully trusted. In this model, we assume that all data stored are encrypted for data confidentiality and one owner distributes the decryption key for each time period to users. In this paper, we propose three privilege management schemes. In the first scheme, called Temporal Privilege Management (TPM), we use a symmetric encryption based on one-way function chains for key encapsulation. In the second scheme, called Asymmetric Temporal Privilege Management (ATPM), anyone can encrypt the data using the public key of owner, but only privileged users can decrypt the encrypted data. Finally, we present a scheme to restrict writers' privilege using ID-based signatures in ATPM. In our schemes, the privilege managements are based on the time and the addition of users is efficient. Specially, applying TPM and ATPM, we can solve the back-issue problem.

A Regionalization Model to Increase Equity of Access to Maternal and Neonatal Care Services in Iran

  • Daniali, Zahra Mohammadi;Sepehri, Mohammad Mehdi;Sobhani, Farzad Movahedi;Heidarzadeh, Mohammad
    • Journal of Preventive Medicine and Public Health
    • /
    • v.55 no.1
    • /
    • pp.49-59
    • /
    • 2022
  • Objectives: Access to maternal and neonatal care services (MNCS) is an important goal of health policy in developing countries. In this study, we proposed a 3-level hierarchical location-allocation model to maximize the coverage of MNCS providers in Iran. Methods: First, the necessary criteria for designing an MNCS network were explored. Birth data, including gestational age and birth weight, were collected from the data bank of the Iranian Maternal and Neonatal Network national registry based on 3 service levels (I, II, and III). Vehicular travel times between the points of demand and MNCS providers were considered. Alternative MNCS were mapped in some cities to reduce access difficulties. Results: It was found that 130, 121, and 86 MNCS providers were needed to respond to level I, II, and III demands, respectively, in 373 cities. Service level III was not available in 39 cities within the determined travel time, which led to an increased average travel time of 173 minutes to the nearest MNCS provider. Conclusions: This study revealed inequalities in the distribution of MNCS providers. Management of the distribution of MNCS providers can be used to enhance spatial access to health services and reduce the risk of neonatal mortality and morbidity. This method may provide a sustainable healthcare solution at the policy and decision-making level for regional, or even universal, healthcare networks.

Blurred Image Enhancement Techniques Using Stack-Attention (Stack-Attention을 이용한 흐릿한 영상 강화 기법)

  • Park Chae Rim;Lee Kwang Ill;Cho Seok Je
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.2
    • /
    • pp.83-90
    • /
    • 2023
  • Blurred image is an important factor in lowering image recognition rates in Computer vision. This mainly occurs when the camera is unstablely out of focus or the object in the scene moves quickly during the exposure time. Blurred images greatly degrade visual quality, weakening visibility, and this phenomenon occurs frequently despite the continuous development digital camera technology. In this paper, it replace the modified building module based on the Deep multi-patch neural network designed with convolution neural networks to capture details of input images and Attention techniques to focus on objects in blurred images in many ways and strengthen the image. It measures and assigns each weight at different scales to differentiate the blurring of change and restores from rough to fine levels of the image to adjust both global and local region sequentially. Through this method, it show excellent results that recover degraded image quality, extract efficient object detection and features, and complement color constancy.

What Promotes International Sustainable Development of Green Ventures? The Joint Effects of Entrepreneurial Orientation and Home Country-Based Networks

  • Dejin Su;Yeong-Gil Kim
    • Journal of Korea Trade
    • /
    • v.26 no.4
    • /
    • pp.39-62
    • /
    • 2022
  • Purpose - Along with the growing awareness of environmental sustainability, international green entrepreneurship is expected to realize international sustainable development (ISD) by introducing ecological innovation results, using fewer resources consumption, and reducing negative environmental impacts. Building upon contingency theory and social network theory, this paper attempts to explore the role of home country-based networks (technology ties and business ties) as contingent factors that might impact the effectiveness of entrepreneurial orientation (EO) in promoting ISD among green ventures. Design/methodology - Original data were collected from 127 green ventures in China based on the random sampling technique. These green ventures mainly focus on the lower use of energy or materials, lower CO2 emissions, and higher ecological benefits located in the Fujian province, which highlights green economic growth and economic cooperation with international markets. Moderated hierarchical linear regression analysis was conducted to test our hypotheses concerning the main relationship between EO (innovativeness, proactiveness, and risk-taking) and ISD as well as the moderating effects of home country-based networks (technology ties and business ties) on the main relationship. Findings - Empirical results indicate that: first, both innovativeness and proactiveness positively affect ISD; second, both technology ties and business ties at home might significantly strengthen the positive relationship between innovativeness (or proactiveness) and ISD. However, this study did not find significant moderating effects of technology ties or business ties at home on the relationship between risk-taking and ISD. Originality/value - Since previous literature often gives more focus on the host country context of social networks, this study shifts to a home country-based network context. Therefore, our research might enrich the international green entrepreneurship literature by empirically investigating the contingent value of home country-based networks in the relationship between EO and ISD in the context of an emerging economy such as China.

Association Between Structural and Functional Aspects of Social Networks and Health Promoting Behaviors: Focusing on Community-Dwelling Older Adults (사회적 관계망의 구조적, 기능적 측면과 건강증진행동과의 관계: 지역사회 거주 노인을 중심으로)

  • An, Hyunseo;Kim, Inhye;Yun, Sohyeon;Park, Hae Yean
    • Therapeutic Science for Rehabilitation
    • /
    • v.12 no.4
    • /
    • pp.81-96
    • /
    • 2023
  • Objective : This study aimed to examine the association between the structural and functional aspects of social networks and health-promoting behaviors in community-dwelling older adults. Methods : Social networks based on structural and functional aspects and health-promoting behaviors by lifestyle were measured in 226 community-dwelling adults aged 65 years and over. To analyze the collected data, an independent t-test, one-way ANOVA, Pearson's correlation analysis, and hierarchical regression were performed. Results : The network size was the highest in the friend network, and the frequency of contact and social support was the highest in the non-living family network. Health-promoting behaviors were highest for activities of daily living and lowest for productive and social activities. All subfactors of social networks showed significant positive correlations with health-promoting behaviors. Hierarchical regression showed social support from neighbors as the variable with a significant effect on health-promoting behaviors; gender and depression were also influencing factors, and this model showed 37% explanatory power. Conclusion : To promote healthy behaviors of older adultsin the community, the development of health promotion programs and related policies considering social networks centering on social support from neighbors is required.

The Research of Security Vulnerabilities of Smartphone (스마트폰 보안 취약 요소에 따른 분석 연구)

  • Choi, Hee Sik;Cho, Yang Hyun;Joo, Heon Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.119-127
    • /
    • 2013
  • The merits of Smartphone are portability, convenience and especially a lot of information can be stored in the device. Especially in Smartphone, users can install programs that cannot install to normal cell phone and users can use many different services through these Smartphone programs. Also Smartphone can connect to Internet through network, so it can access information anytime, anywhere easily. Security of personal information and variety of information which stored in Smartphone are in risk. In Chapter 2 of thesis, it will discuss the definition and features of the Smartphone and market trends. In Chapter 3 of thesis, it will discuss security vulnerabilities of Smartphone and it will analyze and research security vulnerabilities of Smartphone in Chapter 4. In conclusion, it will check users' identification twice in useful application especially application that relate to finance and mobile payment. By checking users' identification several times, it will help to defend from security threats. Users can use Smartphone safely and convenience by know how to prevent from mobile hacking for personal and private information. the quality of APIs matching by the clustering and hierarchical relationships mechanism.

Game Theoretic MAP Load Balancing Scheme in HMIPv6 (HMIPv6에서 게임 이론을 이용한 MAP 부하 분산 기법)

  • Ki, Bum-Do;Kim, Sung-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7B
    • /
    • pp.991-1000
    • /
    • 2010
  • The Hierarchical Mobile IPv6 (HMIPv6) has been proposed to accommodate frequent mobility of the Mobile Node. HMIPv6 can effectively reduce the signaling overhead and latency. However, it has a problem that the registration of a mobile node concentrates on the furthest MAP(Mobility Anchor Point) when the mobile node enters into a new domain. This paper proposes a new load distribution mechanism by using the concept of Nash Bargaining Solution. The main advantage of the proposed scheme can prevent load concentration from being registered to the specified MAP based on the weight value according to the available resource-ratio of a MAP. With a simulation study, the proposed scheme can improve network performance under widely diverse traffic load intensities.

A Practical RTP Packetization Scheme for SVC Video Transport over IP Networks

  • Seo, Kwang-Deok;Kim, Jin-Soo;Jung, Soon-Heung;Yoo, Jeong-Ju
    • ETRI Journal
    • /
    • v.32 no.2
    • /
    • pp.281-291
    • /
    • 2010
  • Scalable video coding (SVC) has been standardized as an extension of the H.264/AVC standard. This paper proposes a practical real-time transport protocol (RTP) packetization scheme to transport SVC video over IP networks. In combined scalability of SVC, a coded picture of a base or scalable enhancement layer is produced as one or more video layers consisting of network abstraction layer (NAL) units. The SVC NAL unit header contains a (DID, TID, QID) field to identify the association of each SVC NAL unit with its scalable enhancement layer without parsing the payload part of the SVC NAL unit. In this paper, we utilize the (DID, TID, QID) information to derive hierarchical spatio-temporal relationship of the SVC NAL units. Based on the derivation using the (DID, TID, QID) field, we propose a practical RTP packetization scheme for generating single RTP sessions in unicast and multicast transport of SVC video. The experimental results indicate that the proposed packetization scheme can be efficiently applied to transport SVC video over IP networks with little induced delay, jitter, and computational load.

A Classification Model of Electronic Commerce Technology (전자상거래 기술분류 모형의 개발 및 활용)

  • 김창수;권혁인
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.219-239
    • /
    • 2003
  • The world of business is being profoundly transformed by the Internet and electronic commerce. E-commerce is driven by Internet and e-commerce technology. That is, the new e-commerce is commonly associated with highly developed technical elements, ranging from web , graphic design. payment systems and network infrastructure. Thus, it is necessary to decide which technologies are important and how they are related to each other. To anticipate the future of each information communication technology and electronic commerce accurately , we have attempted to develop a classification model of electronic commerce technology. A classification model for EC technologies consists of three categories: basic technology, base technology, and application technology. This model can play a role as a guideline in classifying EC technologies into three hierarchical category and in comparing the relative relationships of each electronic commerce technology. It will also provide an impetus for the study of electronic commerce technologies and for the shaping process of electronic commerce generally.

  • PDF