• Title/Summary/Keyword: Local Connected Network

Search Result 128, Processing Time 0.022 seconds

TECDS Protocol for Wireless Ad Hoc Networks (무선 에드혹 네트워크를 위한 타이머를 이용한 CDS 구축)

  • Kim, Bo-Nam;Yang, Jun-Mo
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.365-370
    • /
    • 2007
  • Connected Dominating Set(CDS) has been used as a virtual backbone in wireless ad hoc networks by numerous routing and broadcast protocols. Although computing minimum CDS is known to be NP-hard, many protocols have been proposed to construct a sub-optimal CDS. However, these protocols are either too complicated, needing non- local information, not adaptive to topology changes, or fail to consider the difference of energy consumption for nodes in and outside of the CDS. In this paper, we present two Timer-based Energy-aware Connected Dominating Set Protocols(TECDS). The energy level at each node is taken into consideration when constructing the CDS. Our protocols are able to maintain and adjust the CDS when network topology is changed. The simulation results have shown that our protocols effectively construct energy-aware CDS with very competitive size and prolong the network operation under different level of nodal mobility.

A Study on The Response of Local Government Facing Governance Era (거버넌스시대 기초자치단체의 대응 -구미지역을 중심으로-)

  • Lee, Seong-Chil;Lee, Seung-Hee;Kim, Hye-Kyoung
    • Journal of Digital Convergence
    • /
    • v.6 no.2
    • /
    • pp.23-32
    • /
    • 2008
  • This paper tried to discuss response of local government facing governance era. Governance is intended to introduce a variety of residents' participating systems to revive the citizen's society and strengthen the foundation for that purpose, thus seeking the paradigm for decentralized operation of the nation. As widely accepted, governance has many meanings connected with controling method of interdependence activity. However bureaucracy do not make decisions as one-side and vertical like past but is form of public decisions that stakeholder in policy. Firstly, we reviewed the terms of governance and policy issues and policies on governance. And also survey on actual performer associated with governance in Gumi. Next, proposals of the development of policy in governance, role of local government are made in terms of construction of governance.

  • PDF

A D2D communication architecture under full control using SDN

  • Ngo, Thanh-Hai;Kim, Younghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3435-3454
    • /
    • 2016
  • Device-to-device (D2D) communication is a potential solution to the incessant increase in data traffic on cellular networks. The greatest problem is how to control the interference between D2D users and cellular mobile users, and between D2D users themselves. This paper proposes a solution for this issue by putting the full control privilege in cellular network using the software-defined networking (SDN) concept. A software virtual switch called Open vSwitch and several components are integrated into mobile devices for data forwarding and radio resource mapping, whereas the control functions are executed in the cellular network via a SDN controller. This allows the network to assign radio resources for D2D communication directly, thus reducing interference. This solution also brings out many benefits, including resource efficiency, energy saving, topology flexibility, etc. The advantages and disadvantages of this architecture are analyzed by both a mathematical method and a simple implementation. The result shows that implementation of this solution in the next generation of cellular networks is feasible.

The shortest path finding algorithm using neural network

  • Hong, Sung-Gi;Ohm, Taeduck;Jeong, Il-Kwon;Lee, Ju-Jang
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1994.10a
    • /
    • pp.434-439
    • /
    • 1994
  • Recently neural networks leave been proposed as new computational tools for solving constrained optimization problems because of its computational power. In this paper, the shortest path finding algorithm is proposed by rising a Hopfield type neural network. In order to design a Hopfield type neural network, an energy function must be defined at first. To obtain this energy function, the concept of a vector-represented network is introduced to describe the connected path. Through computer simulations, it will be shown that the proposed algorithm works very well in many cases. The local minima problem of a Hopfield type neural network is discussed.

  • PDF

Residual Learning Based CNN for Gesture Recognition in Robot Interaction

  • Han, Hua
    • Journal of Information Processing Systems
    • /
    • v.17 no.2
    • /
    • pp.385-398
    • /
    • 2021
  • The complexity of deep learning models affects the real-time performance of gesture recognition, thereby limiting the application of gesture recognition algorithms in actual scenarios. Hence, a residual learning neural network based on a deep convolutional neural network is proposed. First, small convolution kernels are used to extract the local details of gesture images. Subsequently, a shallow residual structure is built to share weights, thereby avoiding gradient disappearance or gradient explosion as the network layer deepens; consequently, the difficulty of model optimisation is simplified. Additional convolutional neural networks are used to accelerate the refinement of deep abstract features based on the spatial importance of the gesture feature distribution. Finally, a fully connected cascade softmax classifier is used to complete the gesture recognition. Compared with the dense connection multiplexing feature information network, the proposed algorithm is optimised in feature multiplexing to avoid performance fluctuations caused by feature redundancy. Experimental results from the ISOGD gesture dataset and Gesture dataset prove that the proposed algorithm affords a fast convergence speed and high accuracy.

A study on the proposal of integrated security management of Affiliated Organizations within the Local Governments (지방자치단체 산하기관의 통합 보안관리 제안에 관한 연구)

  • Hwanju Choi;Yongsuk Park
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.117-128
    • /
    • 2021
  • Most of the Affiliated Organizations of the Local Governments are constantly exposed to cyber threats due to the lack of dedicated information security organizations, dedicated personnel and interest from institutions. As an institution invested and contributed by the Local Government, it has the legal responsibility of management and supervision. Therefore, in this study, the network of the Local Government is connected by using the network of the Local Government, information security infrastructure, and security control infrastructure. It was an opportunity to conduct research on the improvement of the security control system of the Local Government to protect important information (personal information, etc.) owned by the Local Government. In the long term, we propose a transfer to the cloud system for stable services of personal information processing systems such as public systems, ERPs, and groupwares operated by Affiliated Organizations, and consider enhancing the security of Affiliated Organizations and security control. It is hoped that the results of this study will be helpful to the Local Governments.

A Study on Intrusion Detection of ARP Poisoning Attack on Wireless LAN

  • Ham Young Hwan;Lee Sok Joon;Chung Byung Ho;Chung Kyoll;Chung Jin Wook
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.540-543
    • /
    • 2004
  • Address Resolution Protocol (ARP) cache poisoning is a MAC layer attack that can only be carried out when an attacker is connected to the same local network as the target machines. ARP is not a new problem, but wireless network introduces a new attack point and more vulnerable to the attack. The attack on wireless network cannot be detected by current detection tool installed on wired network. In order to detect the ARP poisoning attack, there must be a ARP poisoning detection tool for wireless LAN environment. This paper proposes linux-based ARP poisoning detection system equipped with wireless LAN card and Host AP device driver

  • PDF

Power control in Ad Hoc network using ZigBee/IEEE802.15.4 Standard (ZigBee/IEEE802.15.4 표준을 사용하는 Ad Hoc 네트워크 상의 전력 통제)

  • Kirubakaran K.;Lee Jae-Kwang
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.219-222
    • /
    • 2006
  • In this paper an intrusion detection system technique of wireless Ad Hoc network is explained and the advantage of making them work in IEEE 802.15.4/ZigBee wireless standard is also discussed. The methodology that is mentioned here is intrusion detection architecture based on a local intrusion database [1]. An ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Due to increased connectivity (especially on the Internet), and the vast spectrum of financial possibilities that are opening up, more and more systems are subject to attack by intruders. An ideal IDS should able to detect an anomaly caused by the intruders quickly so that the misbehaving node/nodes can be identified and appropriate actions (e.g. punish or avoid misbehaving nodes) can be taken so that further damage to the network is minimized

  • PDF

Traffic analysis and storage allocation in a hierarchical two level network for VOD service (2계층 VOD 서비스망에서의 트래픽 분석과 저장용량 결정)

  • 김여근;김재윤;박승현;강성수
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.04a
    • /
    • pp.89-92
    • /
    • 1996
  • It is generally recognized that Video On Demand (VOD) service will become a promising interactive service in B-ISDN. We consider a hierarchical two level network architecture for VOD service. The first level consists of connected Local Video Servers(LVSs) in which a limited number of high vision programs are stored. The second level has one Central Video Server(CVS) containing all the programs served in the network. The purpose of this paper is to analyze the network traffic and to propose the storage policy for LVSs. For this purpose, we present an analysis of program storage amount in each LVS, transmission traffic volume between LVSs, and link traffic volume between CVS and LVSs, according to changing the related factors such as demand, the number of LVSs is also presented on the basis of the tradeoffs among program storage cost, link traffic cost, and transmission cost.

  • PDF

Design of a pattern recognizing neural network using information-processing mechanism in optic nerve fields (시각정보 처리 메커니즘을 이용한 형태정보인식 신경회로망의 구성)

  • Kang, Ick-Tae;Kim, Wook-Hyun;Lee, Gun-Ki
    • Journal of Biomedical Engineering Research
    • /
    • v.16 no.1
    • /
    • pp.33-42
    • /
    • 1995
  • A new neural network architecture for the recognition of patterns from images is proposed, which is partially based on the results of physiological studies. The proposed network is composed of multi-layers and the nerve cells in each layer are connected by spatial filters which approximate receptive fields in optic nerve fields. In the proposed method, patterns recognition for complicated images is carried out using global features as well as local features such as lines and end-points. A new generating method of matched filters representing global features is proposed in this network.

  • PDF