• Title/Summary/Keyword: Local terminal information

Search Result 82, Processing Time 0.024 seconds

A Study on Five Levels of Security Risk Assessment Model Design for Ensuring the u-Healthcare Information System (u-헬스케어시스템의 정보보안 체계 확보를 위한 5단계 보안위험도 평가모델 설계)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.11-17
    • /
    • 2013
  • All u-Health system has security vulnerabilities. This vulnerability locally(local) or network(network) is on the potential risk. Smart environment of health information technology, Ad-hoc networking, wireless communication environments, u-health are major factor to increase the security vulnerability. u-health care information systems user terminal domain interval, interval public network infrastructure, networking section, the intranet are divided into sections. Health information systems by separating domain specific reason to assess vulnerability vulnerability countermeasure for each domain are different. u-Healthcare System 5 layers of security risk assessment system for domain-specific security vulnerability diagnosis system designed to take the security measures are needed. If you use this proposed model that has been conducted so far vaguely USN-based health information network security vulnerabilities diagnostic measures can be done more systematically provide a model.

The Design of IPv6 Traffic Analysis Tool for Detecting Network Attacks (네트워크 공격을 탐지하기 위한 IPv6 트래픽 분석 도구)

  • Oh, Seung-Hee;Oh, Jin-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.848-851
    • /
    • 2005
  • The BcN is applying from public networks to local networks and each terminal step by step until 2007. By IPv6 network introduction, IP address lack problem can be solved. However, the threats that network attacks of another method can be caused with new problem of network security in IPv6 networks. In this paper, we suggest the traffic analysis tool which analyze IPv6 traffic efficiently to detect/response network attack in IPv6 environment. The implemented IPv6 traffic analysis tool uses IPv6 header to analyze traffic and detect network attacks. Also, we also propose detection algorithm to detect network attacks in IPv6 networks.

  • PDF

A Joint Allocation Algorithm of Computing and Communication Resources Based on Reinforcement Learning in MEC System

  • Liu, Qinghua;Li, Qingping
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.721-736
    • /
    • 2021
  • For the mobile edge computing (MEC) system supporting dense network, a joint allocation algorithm of computing and communication resources based on reinforcement learning is proposed. The energy consumption of task execution is defined as the maximum energy consumption of each user's task execution in the system. Considering the constraints of task unloading, power allocation, transmission rate and calculation resource allocation, the problem of joint task unloading and resource allocation is modeled as a problem of maximum task execution energy consumption minimization. As a mixed integer nonlinear programming problem, it is difficult to be directly solve by traditional optimization methods. This paper uses reinforcement learning algorithm to solve this problem. Then, the Markov decision-making process and the theoretical basis of reinforcement learning are introduced to provide a theoretical basis for the algorithm simulation experiment. Based on the algorithm of reinforcement learning and joint allocation of communication resources, the joint optimization of data task unloading and power control strategy is carried out for each terminal device, and the local computing model and task unloading model are built. The simulation results show that the total task computation cost of the proposed algorithm is 5%-10% less than that of the two comparison algorithms under the same task input. At the same time, the total task computation cost of the proposed algorithm is more than 5% less than that of the two new comparison algorithms.

Dynamic Right Sizing of Maximum-windows for Efficient Bandwidth Allocation on EPON (EPON에서 효율적 대역폭 할당을 위한 최대전송윈도우 크기의 동적변화기법)

  • Lee, Sang-Ho;Lee, Tae-Jin;Chung, Min-Young;Lee, You-Ho;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.8 no.4
    • /
    • pp.41-49
    • /
    • 2007
  • Ethernet passive optical network(EPON) is the next-generation technology for supporting services of high-quality at low-cost. In the EPON, all optical network units(ONUs) have to share a limited uplink channel for upstream data. In order to satisfy bandwidth demands of users on high-capacity local access networks(LANs), the optical line terminal(OLT) efficiently divides and allocates time slots of uplink channel to all ONUs. We discuss previous schemes for dynamic bandwidth allocation(DBA), such as interleaved polling with adaptive cycle time(IPACT) and sliding cycle time(SLICT). In this paper, dynamic right sizing of maximum-windows(DRSM), as a novel bandwidth allocation service, is proposed for more effective and efficient time slot allocation of the uplink channel. DRSM which is based on past information of bandwidth allocated by OLT calculates maximum available bandwidth and dynamically alters the maximum window size for the next ONU. This scheme does not only exert every effort to meet bandwidth demands of ONUs with the possible scope, it also seeks fairness of bandwidth allocation among ONUs.

  • PDF

유무선 통합 서비스의 국내외 동향 분석 및 발전방향 제시 : 무선랜, 휴대 인터넷을 중심으로

  • 이혜진;유지은;최문기
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.11a
    • /
    • pp.358-361
    • /
    • 2003
  • As the information and communication technology has been developed, demand for internet and multimedia is increased and customer's needs becomes diverse. Therefore, the convergence of fixed and mobile networks has emerged. Fixed - Mobile Convergence (FMC) service means that it provides users with one type of services from network access to billing regardless of networks and terminal. FMC service is expected to provide an advanced value with both networks providers and users. Wireless local area network (WLAN) and 2.3㎓ HPi are promising services that will generate enormous demands among FMC services. For that reason, this paper investigates the trend of WLAN and HPi in Korea and abroad and suggests future deployment based on reviewing the literature.

  • PDF

1.8V Gilbert Cell CMOS Downconversion Mixer Using Bulk for 2.4GHz ISM band

  • Chae, Yong-Doo;Hwang, Young-Seung;Oh, Bum-Suk;Woong Jung
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.391-395
    • /
    • 2003
  • In this work, we have designed Gilbert cell downconversion mixer using 0.25um Anam CMOS process, we also have analyzed Conversion gain and IIP3 using Taylor series in our own unique way. Especially, bulk terminal is used as LO( Local Oscillator) input for reduction of power consumption and supply voltage. Supply voltage used in this design is lower than 1.8V and core current is less than 500uA. The simulation experiments showed that the conversion gain, IIP3, and power consumption were -1 dB, 4.46dBm, and 0.8mW, respectively.

  • PDF

The Forwarding Channel of a BTS in IS-95 CDMA Cellular Network

  • Kwag, Min-kok;Jung, Duk-in;Shin, In-Cheol
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.990-994
    • /
    • 2000
  • The design of LAI(Local Area Identifier), the first paging area for searching the mobile terminal has a close relation with the performance of paging channel in CDMA cellular network. This paper discusses the performance of the forward channel of IS-95 CDMA standard, known as the paging through the related messages such as call control message, channel assignment message. Modeling and simulation work were conducted to quantify the performance of paging channel in terms of traffic handling capacity and blocking levels. This result serves as illustrative guidelines for the proper engineering of common control channel, which has a major impact on the overall performance of cellular network.

  • PDF

Effect of People Moving near Short-Range Indoor Propagation Links at 2.45 GHz

  • Kara Ali;Bertoni Henry L.
    • Journal of Communications and Networks
    • /
    • v.8 no.3
    • /
    • pp.286-289
    • /
    • 2006
  • Measurement results are presented for the effects of people moving near and across short-range indoor propagation links at 2.45 GHz (ISM band). Excess loss due to scattering and blockage by human bodies in the vicinity of one terminal were measured for different radio links in an office environment. Statistics on fades due to human body motion are given. Polarization coupling (depolarization) for various radio links was measured, and correlation of polarization components is discussed as a basis for using polarization diversity reception in short-range indoor systems.

Decentralized Input-Output Feedback Linearizing Controller for MultiMachine Power Systems : Adaptive Neural-Net Control Approach

  • Park, Jang-Hyun;Jun, Jae-Choon;Park, Gwi-Tae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.41.3-41
    • /
    • 2001
  • In this paper, we present a decentralized adaptive neural net(NN) controller for the transient stability and voltage regulation of a multimachine power system. First, an adaptively input-output linearizing controller using NN is designed to eliminate the nonlinearities and interactions between generators. Then, a robust control term which bounds terminal voltage to a neighborhood of the operating point within the desired value is introduced using only local information. In addition, we consider input saturation which exists in the SCR amplifier and prove that the stability of the overall closed-loop system is maintained regardless of the input saturation. The design procedure is tested on a two machine infinite bus power system.

  • PDF

The Study on Next Generation Network Security Architecture in the BcN Environment (BcN 환경을 고려한 차세대 네트워크 보안 구조에 관한 연구)

  • 오승희;서동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.709-712
    • /
    • 2004
  • The BcN is applying from public networks to local networks and each terminal step by step under supporting MIC(Ministry of Information and Communication Repoblic of Korea) until 2007. The architecture of network sorority should considers BcN environment and evolves to manage Ipv6 traffics. The next generation network security architecture can manage not only Ipv6 environment but also wire and wireless integrated network. We suggest the next generation network security architecture for Ipv6 environment and wire-wireless integrated network environment and verify the performance of the suggested architecture using network security scenario.

  • PDF