• Title/Summary/Keyword: Issue-network

Search Result 1,546, Processing Time 0.023 seconds

The study for the differentiation of transmission and vertical integration of Internet Service Provider over the issue of network neutrality (망 중립성 이슈에서 ISP 사업자의 전송 차등화와 수직계열화에 대한 연구)

  • Lee, Jae-Ho;Byun, Dong-Sik;Kim, Hee-Kyung
    • Korean journal of communication and information
    • /
    • v.62
    • /
    • pp.200-222
    • /
    • 2013
  • A recent argument of network neutrality is converted by the differentiation of transmission and cost adjustment. However, It is raised that this phenomenon caused strategy for vertical integration operator to exclude a competitive operator. This study analyzed a number of instances about differentiation of transmission of ISP and problems of ISP that vertical integration in IX markets. The result of research, differentiation of transmission increased service differentiation about application programs used a best effort network like OTT or Smart TV. But this study was analyzed that a related law was vague for solving this issue. Besides, ISPs that is vertical integrated and commercial operated in an IX market discriminated competitive services, and this phenomenon can be proceeded plainly and orginated in an issue of a related law.

  • PDF

A Scalable and Practical Authentication Protocol in Mobile IP (Mobile IP에서 확장성과 실용성 있는 인증 프로토콜 제안 및 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.11
    • /
    • pp.35-44
    • /
    • 2005
  • In Mobile IP protocol, because a mobile node still uses its home IP address even though it moves to foreign network from home network, authentication among mobile node, foreign network and home network is critical issue. Many researches about this issue have been based on shared secret, for example mobile node and home agent authenticate each other with pre-shared symmetry key. And they missed several security issues such as replay attack. Although public key scheme could be applied to this issue easily, since the public key cryptography is computationally complicated, it still has the problem that it is not practical to realistic environment. In this paper, we describe several security issues in Mobile IP protocol. And we propose new Mobile IP authentication protocol that is applicable to realistic environment using public key algorithm based on certificate. It has scalability for mobile nodes and is applicable to the original Mobile IP protocol without any change. Finally we prove security of the proposed protocol and that it might not affect performance of the original Mobile IP protocol.

Related Term Extraction with Proximity Matrix for Query Related Issue Detection using Twitter (트위터를 이용한 질의어 관련 이슈 탐지를 위한 인접도 행렬 기반 연관 어휘 추출)

  • Kim, Je-Sang;Jo, Hyo-Geun;Kim, Dong-Sung;Kim, Byeong Man;Lee, Hyun Ah
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.1
    • /
    • pp.31-36
    • /
    • 2014
  • Social network services(SNS) including Twitter and Facebook are good resources to extract various issues like public interest, trend and topic. This paper proposes a method to extract query-related issues by calculating relatedness between terms in Twitter. As a term that frequently appears near query terms should be semantically related to a query, we calculate term relatedness in retrieved documents by summing proximity that is proportional to term frequency and inversely proportional to distance between words. Then terms, relatedness of which is bigger than threshold, are extracted as query-related issues, and our system shows those issues with a connected network. By analyzing single transitions in a connected network, compound words are easily obtained.

Analysis of Social Issues and Media-specific Characteristics Related to Presidential Records based on Semantic Network (언어 네트워크 기반 대통령기록물 관련 이슈 및 매체별 특성 분석)

  • Jung, Sang Jun;Yun, Bo-Hyun;Oh, Hyo-Jung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.30 no.1
    • /
    • pp.181-207
    • /
    • 2019
  • This study analyzed social issues related to presidential records in press releases using semantic network analysis method. For this purpose, we 1) selected five major news medias in Korea - Chosun Ilbo, JoongAng Ilbo, Dong-A Ilbo, Hankyoreh, and Kyunghyang Newspaper; 2) collected relevant articles including the subject word "Presidential Records", and 3) analyzed issue trends based on timeline using semantic network. According to medias, the issue related to the presidential records were analyzed by comparing the specific keywords in terms of persons, entities, actions. At the results, It is possible to identify the reporting patterns and components of the presidential records related issues. And the difference of media characteristics according to news media tendency was derived.

Deep learning-based sensor fault detection using S-Long Short Term Memory Networks

  • Li, Lili;Liu, Gang;Zhang, Liangliang;Li, Qing
    • Structural Monitoring and Maintenance
    • /
    • v.5 no.1
    • /
    • pp.51-65
    • /
    • 2018
  • A number of sensing techniques have been implemented for detecting defects in civil infrastructures instead of onsite human inspections in structural health monitoring. However, the issue of faults in sensors has not received much attention. This issue may lead to incorrect interpretation of data and false alarms. To overcome these challenges, this article presents a deep learning-based method with a new architecture of Stateful Long Short Term Memory Neural Networks (S-LSTM NN) for detecting sensor fault without going into details of the fault features. As LSTMs are capable of learning data features automatically, and the proposed method works without an accurate mathematical model. The detection of four types of sensor faults are studied in this paper. Non-stationary acceleration responses of a three-span continuous bridge when under operational conditions are studied. A deep network model is applied to the measured bridge data with estimation to detect the sensor fault. Another set of sensor output data is used to supervise the network parameters and backpropagation algorithm to fine tune the parameters to establish a deep self-coding network model. The response residuals between the true value and the predicted value of the deep S-LSTM network was statistically analyzed to determine the fault threshold of sensor. Experimental study with a cable-stayed bridge further indicated that the proposed method is robust in the detection of the sensor fault.

Coordination of Anti-Spoofing Mechanisms in Partial Deployments

  • An, Hyok;Lee, Heejo;Perrig, Adrian
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.948-961
    • /
    • 2016
  • Internet protocol (IP) spoofing is a serious problem on the Internet. It is an attractive technique for adversaries who wish to amplify their network attacks and retain anonymity. Many approaches have been proposed to prevent IP spoofing attacks; however, they do not address a significant deployment issue, i.e., filtering inefficiency caused by a lack of deployment incentives for adopters. To defeat attacks effectively, one mechanism must be widely deployed on the network; however, the majority of the anti-spoofing mechanisms are unsuitable to solve the deployment issue by themselves. Each mechanism can work separately; however, their defensive power is considerably weak when insufficiently deployed. If we coordinate partially deployed mechanisms such that they work together, they demonstrate considerably superior performance by creating a synergy effect that overcomes their limited deployment. Therefore, we propose a universal anti-spoofing (UAS) mechanism that incorporates existing mechanisms to thwart IP spoofing attacks. In the proposed mechanism, intermediate routers utilize any existing anti-spoofing mechanism that can ascertain if a packet is spoofed and records this decision in the packet header. The edge routers of a victim network can estimate the forgery of a packet based on this information sent by the upstream routers. The results of experiments conducted with real Internet topologies indicate that UAS reduces false alarms up to 84.5% compared to the case where each mechanism operates individually.

Analysis of UGV Effectiveness Based on ABM(Agent Based Modeling) and Communication Network Environments (에이전트 기반 모델링 및 네트워크 통신 환경을 고려한 UGV 효과분석)

  • Lee, Jaeyeong;Shin, Sunwoo;Kim, Chongman
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.3
    • /
    • pp.89-97
    • /
    • 2018
  • In future warfare, most part of resources and their platforms would be replaced by unmanned system like UGV(Unmanned Ground Vehicle). They are also connected each other with communication network and it is called NCW(Network Centric Warfare) environment. Hence how to measure the effectiveness of UGV operated in NCW circumstance become an important issue. However, there are few research paper to deal with this kind of UGV effectiveness issue coupled with communication failure. In this paper, we proposed a new ABM process to measure the UGV effectiveness combined with communication success ratio based on terrain condition of the ground engagement. Additionally, we also provide the effectiveness analysis result when communication repeater is applied in case of communication failure.

Weighted Local Naive Bayes Link Prediction

  • Wu, JieHua;Zhang, GuoJi;Ren, YaZhou;Zhang, XiaYan;Yang, Qiao
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.914-927
    • /
    • 2017
  • Weighted network link prediction is a challenge issue in complex network analysis. Unsupervised methods based on local structure are widely used to handle the predictive task. However, the results are still far from satisfied as major literatures neglect two important points: common neighbors produce different influence on potential links; weighted values associated with links in local structure are also different. In this paper, we adapt an effective link prediction model-local naive Bayes model into a weighted scenario to address this issue. Correspondingly, we propose a weighted local naive Bayes (WLNB) probabilistic link prediction framework. The main contribution here is that a weighted cluster coefficient has been incorporated, allowing our model to inference the weighted contribution in the predicting stage. In addition, WLNB can extensively be applied to several classic similarity metrics. We evaluate WLNB on different kinds of real-world weighted datasets. Experimental results show that our proposed approach performs better (by AUC and Prec) than several alternative methods for link prediction in weighted complex networks.

Group based DV-Hop localization Algorithm in Wireless Sensor Network (그룹 기반의 DV-HoP 무선 센서네트워크 위치측정 알고리즘)

  • Kim, Hwa-Joong;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1A
    • /
    • pp.65-75
    • /
    • 2009
  • In Wireless Sensor Network, the sensor node localization is important issue for information tracking, event detection, routing. Generally, in wireless sensor network localization, the absolute positions of certain anchor nodes are required based on the use of global positioning system, then all the other nodes are approximately localized using various algorithms based on a coordinate system of anchor DV-Hop is a localized, distributed, hop by hop positioning algorithm in wireless sensor network where only a limited fraction of nodes have self positioning capability. However, instead of uniformly distributed network, in anisotropic network with possible holes, DV-Hop's performance is very low. To address this issue, we propose Group based DV-Hop (GDV-Hop) algorithm. Best contribution of GDV-Hop is that it performs localization with reduced error compared with DV-Hop in anisotropic network.

Measures to Activate the Community Network of Community Child Centers Based on the Systems Thinking (시스템사고에 근거한 지역아동센터의 지역사회 연계 활성화방안)

  • Cho, Sungsook
    • Korean System Dynamics Review
    • /
    • v.16 no.2
    • /
    • pp.33-52
    • /
    • 2015
  • This study aims to comprehensively understand the dynamics of the community network of Community Child Centers and further find out the measures to activate its community network based on the Systems Thinking. The contents of the study are as follows. Firstly, it examines the existing studies on the community network of Community Child Centers and presents the major variables to understand the situation of its community network. Secondly, it analyzes the structure of its causation in order to understand the dynamics of its community network. Lastly, it concludes with the suggestions to activate its community network based on its feedback structure presented in the causal loop diagrams. This study is expected to make a useful and basic material as the first research to dynamically understand the community network issue of the Community Child Centers.