• Title/Summary/Keyword: Hierarchical Network

Search Result 975, Processing Time 0.027 seconds

Genetic Algorithm Based Routing Method for Efficient Data Transmission for Reliable Data Transmission in Sensor Networks (센서 네트워크에서 데이터 전송 보장을 위한 유전자 알고리즘 기반의 라우팅 방법)

  • Kim, Jin-Myoung;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.3
    • /
    • pp.49-56
    • /
    • 2007
  • There are many application areas of wireless sensor networks, such as combat field surveillance, terrorist tracking and highway traffic monitoring. These applications collect sensed data from sensor nodes to monitor events in the territory of interest. One of the important issues in these applications is the existence of the radio-jamming zone between source nodes and the base station. Depending on the routing protocol the transmission of the sensed data may not be delivered to the base station. To solve this problem we propose a genetic algorithm based routing method for reliable transmission while considering the balanced energy depletion of the sensor nodes. The genetic algorithm finds an efficient routing path by considering the radio-jamming zone, energy consumption needed fur data transmission and average remaining energy level. The fitness function employed in genetic algorithm is implemented by applying the fuzzy logic. In simulation, our proposed method is compared with LEACH and Hierarchical PEGASIS. The simulation results show that the proposed method is efficient in both the energy consumption and success ratio of delivery.

  • PDF

The Analysis of the APT Prelude by Big Data Analytics (빅데이터 분석을 통한 APT공격 전조 현상 분석)

  • Choi, Chan-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.317-320
    • /
    • 2016
  • The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and Classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on December in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attack thus far. Therefore, we will use big data analytics to analyze whether or not APT attack has occurred in order to defend against the manipulative attackers. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean defense system. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attack and evaluate the models' accuracy and other results. Lastly, we will present an effective response method to address a detected APT attack.

  • PDF

The Effectiveness Evaluation Methods of DDoS Attacks Countermeasures Techniques using Simulation (시뮬레이션을 이용한 DDoS공격 대응기술 효과성평가방법)

  • Kim, Ae-Chan;Lee, Dong-Hoon;Jang, Seong-Yong
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.3
    • /
    • pp.17-24
    • /
    • 2012
  • This paper suggests Effectiveness Evaluation Methods of DDoS attacks countermeasures model by simulation. According to the security objectives that are suggested by NIST(National Institute of Standards and Technology), It represents a hierarchical Effectiveness Evaluation Model. we calculated the weights of factors that security objectives, security controls, performance indicator through AHP(Analytic Hierarchy Process) analysis. Subsequently, we implemented Arena Simulation Model for the calculation of function points at the performance indicator. The detection and protection algorithm involve methods of critical-level setting, signature and anomaly(statistic) based detection techniques for Network Layer 4, 7 attacks. Proposed Effectiveness Evaluation Model can be diversely used to evaluate effectiveness of countermeasures and techniques for new security threats each organization.

The Effect of Family Resilience, Social Support and Death Recognition on Quality of Death on the Adaptation of Bereavement Family (사별가족의 가족 탄력성, 사회적지지, 죽음인식, 죽음의 질이 사별 적응에 미치는 영향)

  • Heo, Hyeon-Jeom;Kwon, Young-Chae
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.271-280
    • /
    • 2019
  • The purpose of this study was to examine how resilience, social support, perception of death and quality of death affect the bereavement adaptation. Data collection was collected from 2 April to 30 May 2018 by distributing self-reporting questionnaires to 236 people using the eyeball presentation method to those who experienced family history in B city and K area Data were analyzed with descriptive statistics and, t-test, ANOVA, and Pearson's correlations that used SPSS WIN 22.0 program and the analysis of control effect was made by using Hierarchical Multiple Regression Analysis. The result of degree of adaptation of the subject was 3.5, family resilience was 3.8 and 3.9 in the lower part. Social support was not significant. But family resilience, belief system, death perception and quality of death influenced bereavement. Based on the results of this study, it is necessary to bulid a social support network for bereavement families, to prepare for death, and to develop and program a systematic program for well-being to become a beautiful and dignified death.

Implications of Circadian Rhythm in Dopamine and Mood Regulation

  • Kim, Jeongah;Jang, Sangwon;Choe, Han Kyoung;Chung, Sooyoung;Son, Gi Hoon;Kim, Kyungjin
    • Molecules and Cells
    • /
    • v.40 no.7
    • /
    • pp.450-456
    • /
    • 2017
  • Mammalian physiology and behavior are regulated by an internal time-keeping system, referred to as circadian rhythm. The circadian timing system has a hierarchical organization composed of the master clock in the suprachiasmatic nucleus (SCN) and local clocks in extra-SCN brain regions and peripheral organs. The circadian clock molecular mechanism involves a network of transcription-translation feedback loops. In addition to the clinical association between circadian rhythm disruption and mood disorders, recent studies have suggested a molecular link between mood regulation and circadian rhythm. Specifically, genetic deletion of the circadian nuclear receptor Rev-$erb{\alpha}$ induces mania-like behavior caused by increased midbrain dopaminergic (DAergic) tone at dusk. The association between circadian rhythm and emotion-related behaviors can be applied to pathological conditions, including neurodegenerative diseases. In Parkinson's disease (PD), DAergic neurons in the substantia nigra pars compacta progressively degenerate leading to motor dysfunction. Patients with PD also exhibit non-motor symptoms, including sleep disorder and neuropsychiatric disorders. Thus, it is important to understand the mechanisms that link the molecular circadian clock and brain machinery in the regulation of emotional behaviors and related midbrain DAergic neuronal circuits in healthy and pathological states. This review summarizes the current literature regarding the association between circadian rhythm and mood regulation from a chronobiological perspective, and may provide insight into therapeutic approaches to target psychiatric symptoms in neurodegenerative diseases involving circadian rhythm dysfunction.

A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing (모바일 클라우드 컴퓨팅 환경에서 ID-기반 키 암호화를 이용한 안전한 데이터 처리 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.3-8
    • /
    • 2015
  • Most mobile cloud computing system use public key cryptography to provide data security and mutual authentication. A variant of traditional public key technologies called Identity-Based Cryptography(IBC) has recently received considerable attention. The certificate-free approach of IBC may well match the dynamic qualities of cloud environment. But, there is a need for a lightweight secure framework that provides security with minimum processing overhead on mobile devices. In this paper, we propose to use hierarchical ID-Based Encryption in mobile cloud computing. It is suitable for a mobile network since it can reduce the workload of root Public Key Generators by delegating the privilege of user authentication and private key generation. The Identity-Based Encryption and Identity-Based Signature are also proposed and an ID-Based Authentication scheme is presented to secure data processing. The proposed scheme is designed by one-way hash functions and XOR operations, thus has low computation costs for mobile users.

S-RCSA : Efficiency Analysis of Sectored Random Cluster Header Selection Algorithm (섹터화된 랜덤 클러스터 헤더 선출 알고리즘 효율성 분석)

  • Kim, Min-Je;Lee, Doo-Wan;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.831-834
    • /
    • 2011
  • LEACH(One of the leading algorithms in the field of WSN) for the life of the system, even by the number of all nodes to ensure that the cluster header. However, each round does not guarantee a certain number of cluster header. So sometimes cluster header is elected of small number or not elected. If cluster header number is to small, takes a heavy load on cluster header. And empty cluster is occur depending on the location of the cluster header. The algorithm proposed in this paper, the area of interest is divided into sectors. And randomly, cluster header be elected one the in each sector. When clustering the sensor nodes will belong to the nearest cluster header. So clustering is independent of the sector. This algorithm is guarantee a certain number of cluster header in each round. And has prevent occurrence of empty cluster.

  • PDF

Workflow Pattern Extraction based on ACTA Formalism (ACTA 형식론에 기반한 워크플로우 패턴추출)

  • Lee Wookey;Bae Joonsoo;Jung Jae-yoon
    • Journal of KIISE:Databases
    • /
    • v.32 no.6
    • /
    • pp.603-615
    • /
    • 2005
  • As recent business environments are changed and become complex, a more efficient and effective business process management are needed. This paper proposes a new approach to the automatic execution of business processes using Event-Condition-Action (ECA) rules that can be automatically triggered by an active database. First of all, we propose the concept of blocks that can classify process flows into several patterns. A block is a minimal unit that can specify the behaviors represented in a process model. An algorithm is developed to detect blocks from a process definition network and transform it into a hierarchical tree model. The behaviors in each block type are modeled using ACTA formalism. This provides a theoretical basis from which ECA rules are identified. The proposed ECA rule-based approach shows that it is possible to execute the workflow using the active capability of database without users' intervention.

Perception of infection control activities and patient safety culture among dental hygienists (치과위생사의 감염관리활동과 환자안전문화에 대한 인식)

  • Choi, Eun-Mi;Noh, Hie-Jin;Chung, Won-Gyun;Mun, So-Jung
    • Journal of Korean society of Dental Hygiene
    • /
    • v.17 no.5
    • /
    • pp.769-777
    • /
    • 2017
  • Objectives: The study was to promote patient safety by analyzing the effect of dental hygienist's perception of patient safety culture on infection control activities. Methods: The study is based on a survey of 377 dental hygienists in total working in dental settings. The questionnaire consisted of 119 questions, including 34 questions on perception of patient safety culture, and 85 questions on infection control activities. Hierarchical regression analysis was used to examine the relationship between the perception of patient safety culture and infection control activities. The data was analyzed using the SPSS version 20.0, and p<0.05 was adopted to decide on significance. Results: The longer dental hygienists have worked n the dental settings, the more active they become in infection control activities. Among the different types of dental care settings, general (university) hospitals had the largest number of infection control activities, followed by dental clinics, and network dental clinics, in descending order. The dental settings possessing a higher number of dental hygienists were found to conduct more infection control activities than other dental settings. In addition, it was found that when a dental setting adopts a patient safety policy across all the units in the hospital, more systems and procedures for patient safety tend to be established, and that stricter management response to error leads to improvement of infection control activities. Conclusions:In order to enhance infection control activities, infection control activity programs should develop and implement periodic reinforcement of infection control education. regular monitoring of infection control activities.

An analysis on the street weaving system and its design characteristics in Seattle (시애틀 도심가로 구성체계 및 계획특성 분석)

  • Lee, Hee-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.5
    • /
    • pp.1201-1210
    • /
    • 2007
  • The urban streets as a featured and well performing public space for people should be organized in a way that can work as a whole system through network as well as that can provide amenities fur pedestrian. This is a study on Seattle's 'Blue Ring' project for an analysis focused on how its street weaving system organized and what are the design characteristics of the streets. The results are as followings. (1)Pedestrian oriented design, (2)Urban street as a part of open space that can accommodate human activities, (3)Integrated, not isolated with outer/ other open space, (4)Organically networked in a hierarchical manner that can promote pedestrian movement, (5)Utilization of regionally identical design elements. And Smart Growth concept lies in the core of 'Blue Ring' project.

  • PDF