• Title/Summary/Keyword: Information network

Search Result 31,247, Processing Time 0.061 seconds

Comparative Analysis of PM10 Prediction Performance between Neural Network Models

  • Jung, Yong-Jin;Oh, Chang-Heon
    • Journal of information and communication convergence engineering
    • /
    • v.19 no.4
    • /
    • pp.241-247
    • /
    • 2021
  • Particulate matter has emerged as a serious global problem, necessitating highly reliable information on the matter. Therefore, various algorithms have been used in studies to predict particulate matter. In this study, we compared the prediction performance of neural network models that have been actively studied for particulate matter prediction. Among the neural network algorithms, a deep neural network (DNN), a recurrent neural network, and long short-term memory were used to design the optimal prediction model using a hyper-parameter search. In the comparative analysis of the prediction performance of each model, the DNN model showed a lower root mean square error (RMSE) than the other algorithms in the performance comparison using the RMSE and the level of accuracy as metrics for evaluation. The stability of the recurrent neural network was slightly lower than that of the other algorithms, although the accuracy was higher.

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF

Building structural health monitoring using dense and sparse topology wireless sensor network

  • Haque, Mohammad E.;Zain, Mohammad F.M.;Hannan, Mohammad A.;Rahman, Mohammad H.
    • Smart Structures and Systems
    • /
    • v.16 no.4
    • /
    • pp.607-621
    • /
    • 2015
  • Wireless sensor technology has been opened up numerous opportunities to advanced health and maintenance monitoring of civil infrastructure. Compare to the traditional tactics, it offers a better way of providing relevant information regarding the condition of building structure health at a lower price. Numerous domestic buildings, especially longer-span buildings have a low frequency response and challenging to measure using deployed numbers of sensors. The way the sensor nodes are connected plays an important role in providing the signals with required strengths. Out of many topologies, the dense and sparse topologies wireless sensor network were extensively used in sensor network applications for collecting health information. However, it is still unclear which topology is better for obtaining health information in terms of greatest components, node's size and degree. Theoretical and computational issues arising in the selection of the optimum topology sensor network for estimating coverage area with sensor placement in building structural monitoring are addressed. This work is an attempt to fill this gap in high-rise building structural health monitoring application. The result shows that, the sparse topology sensor network provides better performance compared with the dense topology network and would be a good choice for monitoring high-rise building structural health damage.

Active Routing Mechanism for Mobile IP Network (모바일 IP 네트워크를 위한 액티브 라우팅 매커니즘)

  • Soo-Hyun Park;Hani Jang;Lee-Sub Lee;Doo-Kwon Baik
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.3
    • /
    • pp.55-68
    • /
    • 2003
  • As mobile IP has been suggested only to support mobility of mobile station(MS) by which it dose nothing but guarantee MS's new connection to the network, it is for nothing in Quality of Service(QoS) after handoff of MS. QoS is very important factor in mobile IP network to provide multimedia applications and real-time services in mobile environment, and it is closely related to handoff delay Therefore as a main issue in mobile IP research area, handoff delay problem is actively studied to guarantee and promote QoS. In this paper, in order to resolve such a problem, we suggest Simple Network Management Network(SNMP) information-based routing that adds keyword management method to information-based routing in active network, and then propose QoS controlled handoff by SNMP information-based routing. After setting up routing convergence time, modeling of suggested method and existing handoff method is followed in order to evaluate the simulations that are carried out with NS-2. The result of simulation show the improvement of handoff delay, and consequently it turns off the QoS has been improved considerably.

  • PDF

Rationalization of Network Segregation for Continuity of Financial Services Following COVID-19

  • Choi, Manyong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4163-4183
    • /
    • 2021
  • As measures for protecting users and ensuring security of electronic financial transactions, such as online banking, financial institutions in South Korea have implemented network segregation policies. However, a revision of such domain-centered standardized network segregation policies has been increasingly requested because of: 1) increased demand for remote work due to changes resulting from COVID-19 pandemic; and 2) the difficulty of applying new technologies of fintech companies based on information and communications technologies (ICTs) such as cloud services. Therefore, in this study, problems of the remote work environment arising from the network segregation policy currently applied to the financial sector in South Korea and those from the application of new ICTs such as fintech technology have been investigated. In addition, internal network protection policies of foreign financial sectors, such as those of the United States, United Kingdom, European Union, and Russia, and internal network protection policies of non-financial sectors, such as control systems, have been analyzed. As measures for the effective improvement of the current network segregation policy, we propose a policy change from domain-based to data-centric network segregation. Furthermore, to resolve threats of hacking at remote work, recently emerging as a global problem due to COVID-19 pandemic, a standard model for remote work system development applicable to financial companies and a reinforced terminal security model are presented, and an alternative control method applicable when network segregation is not applied is proposed.

Analysis of MANET's Routing Protocols, Security Attacks and Detection Techniques- A Review

  • Amina Yaqoob;Alma Shamas;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.23-32
    • /
    • 2024
  • Mobile Ad hoc Network is a network of multiple wireless nodes which communicate and exchange information together without any fixed and centralized infrastructure. The core objective for the development of MANET is to provide movability, portability and extensibility. Due to infrastructure less network topology of the network changes frequently this causes many challenges for designing routing algorithms. Many routing protocols for MANET have been suggested for last few years and research is still going on. In this paper we review three main routing protocols namely Proactive, Reactive and Hybrid, performance comparison of Proactive such as DSDV, Reactive as AODV, DSR, TORA and Hybrid as ZRP in different network scenarios including dynamic network size, changing number of nodes, changing movability of nodes, in high movability and denser network and low movability and low traffic. This paper analyzes these scenarios on the performance evaluation metrics e.g. Throughput, Packet Delivery Ratio (PDR), Normalized Routing Load(NRL) and End To-End delay(ETE).This paper also reviews various network layer security attacks challenge by routing protocols, detection mechanism proposes to detect these attacks and compare performance of these attacks on evaluation metrics such as Routing Overhead, Transmission Delay and packet drop rates.

Design of Home Network Security System (홈 네트워크 보안시스템 설계)

  • Seol, Jeong-Hwan;Lee, Ki-Young
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.193-194
    • /
    • 2006
  • In this paper, the SPINS, a sensor network security mechanism, was researched to design a system to be applied to home network structure and check the security of which degree was ensured by a virtual network of home networking middleware. Sensor Network security mechanism SPINS provides data confidentiality and authentication by SNEP, and provides authenticated broadcast by ${\mu}TESLA$. We designed the system that applied SPINS to home networking middleware basic structure.

  • PDF

Information Networking and its Application in the Digital Era with Illustration from the University of Port Harcourt Library

  • Umeozor, Susan Nnadozie
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.9 no.2
    • /
    • pp.33-44
    • /
    • 2019
  • This paper discussed the factors that necessitated information networking, types of networks, benefits of information networking, library information networking and the University of Port 0Harcourt library network initiatives. Information networking is a process of communication, exchange of ideas, resource sharing and collaboration between individuals, organizations, institutions and libraries and it is facilitated by ICTs and the internet for improved accessibility. It has been brought about by information explosion, rapid advancement in information communication technologies, inadequate funding and increased demand for quality information. Networks can be classified into local, national, regional, and international networks and are formed to serve different categories of user communities. Benefits of information networking include resource sharing, on-line conferences and participation in programmes at distant centers, collaboration among scholars in different countries. Communication flow through the internet, social media, and electronic mail. Library information networking started with the interlibrary loan which has metamorphosed into library consortia in which groups of libraries partner to coordinate activities, share resources and combine expertise. The University of Port Harcourt Library network initiatives started with an e-granary (a CD ROM) and the establishment of a local area network. The library subscribes to more than 10 electronic databases. Information networking has greatly improved the sharing of resources in acquisition and dissemination of information resources since no single institution can acquire the overwhelming number of information resources in their various formats.

Generation of Indoor Network by Crowdsourcing (크라우드 소싱을 이용한 실내 공간 네트워크 생성)

  • Kim, Bo Geun;Li, Ki-Joune;Kang, Hae-Kyong
    • Spatial Information Research
    • /
    • v.23 no.1
    • /
    • pp.49-57
    • /
    • 2015
  • Due to high density of population and progress of high building construction technologies, the number of high buildings has been increasing. Several information services have been provided to figure out complex indoor structures of building such as indoor navigations and indoor map services. The most fundamental information for these services are indoor network information. Indoor network in building provides topological connectivity between spaces unlike geometric information of buildings. In order to make indoor network information, we have to edit network manually or derive network properties based on the geometric data of buildings. This process is not easy for complex buildings. In this paper, we suggest a method to generate indoor network automatically based on crowdsourcing. From the collected individual trajectories, we derive indoor network information with crowdsourcing. We validate our method with a sample set of trajectory data and the result shows that our method is practical if the indoor positioning technology is reasonably accurate.

Obstacle Avoidance Algorithm for a Network-based Autonomous Mobile Robot

  • Sohn, Sook-Yung;Kim, Hong-Ryeol;Kim, Dae-Won;Kim, Hong-Seok;Lee, Ho-Gil
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.831-833
    • /
    • 2004
  • In this paper, an obstacle avoidance algorithm is proposed for a network-based robot considering network delay by distribution. The proposed algorithm is based on the VFH(Vector Field Histogram) algorithm, and for the network-based robot system, in which it is assumed robot localization information is transmitted through network communication. In this paper, target vector for the VFH algorithm is estimated through the robot localization information and the measurement of its delay by distribution. The delay measurement is performed by time-stamp method. To synchronize all local clocks of the nodes distributed on the network, a global clock synchronization method is adopted. With the delay measurement, the robot localization estimation is performed by calculating the kinematics of the robot. The validation of the proposed algorithm is performed through the performance comparison of the obstacle avoidance between the proposed algorithm and the existing VFH algorithm on the network-based autonomous mobile robot.

  • PDF