• Title/Summary/Keyword: Network Convergence

Search Result 4,073, Processing Time 0.032 seconds

Design and Implementation about Trust Evaluation Mechanism of Distributed Services In Mobile Ad-hoc Network (Mobile Ad-hoc Network 상의 분산된 서비스에 대한 신뢰도 평가 기법 설계 및 구현)

  • Jang, Jong-Deok;Ryu, Hwang-Bin;Yoon, Chang-Pyo
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.29-34
    • /
    • 2009
  • The many transaction occurs because of service will not be able to trust in mobile Ad-hoc Network. Overcomes like this problem point with the plan for, This paper proposes the trust evaluation mechanism which is the possibility becoming the standard of the node selection which provides a better service by using the transaction message which is basic occurs from within the mobile Ad-hoc network and in the transaction message which is additional. At last, this paper embodies the trust mechanism which proposes, confirms the trust value which is evaluated with NS2 simulator.

  • PDF

Prediction of Nonlinear Sequences by Self-Organized CMAC Neural Network (자율조직 CMAC 신경망에 의한 비선형 시계열 예측)

  • 이태호
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.3 no.4
    • /
    • pp.62-66
    • /
    • 2002
  • An attempt of using SOCMAC neural network for the prediction of a nonlinear sequence, which is generated by Mackey-Glass equation, is reported. The ,report shows the SOCMAC can handle a system with multi-dimensional continuous inputs, which has been considered very difficult, if not impossible, task to be implemented by a CMAC neural network because of a huge amount of memory required. Also, an improved training method based on the variable receptive fields is proposed. The Performance ranged somewhere around those of TDNN and BP neural networks.

  • PDF

Design of neural network based ALE for QRS enhancement (QRS 파의 증대를 위한 신경망 ALE 설계)

  • 원상철;박종철;최한고
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2000.08a
    • /
    • pp.217-220
    • /
    • 2000
  • This paper describes the application of a neural network based adaptive line enhancer (ALE) for enhancement of the weak QRS complex corrupted with background noise. Modified fully-connected recurrent neural network is used as a nonlinear adaptive filter in the ALE. The connecting weights between network nodes as well as the parameters of the node activation function are updated at each iteration using the gradient descent algorithm. The real ECG signal buried with moderate and severe background noise is applied to the ALE. Simulation results show that the neural network based ALE performs well the enhancement of the QRS complex from noisy ECG signals.

  • PDF

Enhancement of Internal Network Security in Small Networks Using UTM and ELK Stack (UTM과 ELK Stack을 활용한 소규모 네트워크의 내부망 보안 강화방안)

  • Song Ha Min;DongHwi Lee
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.3-9
    • /
    • 2024
  • Currently, cyberattacks and security threats are constantly evolving, and organizations need quick and efficient security response methods. This paper proposes ways to strengthen internal network security by utilizing Unified Threat Management (UTM) equipment to improve network security and effectively manage and analyze the log data of the internal network collected through these equipment using Elastic Stack (Elasticsearch, Logstash, Kibana, hereinafter referred to as ELK Stack).

Efficient Data-replication between Cluster-heads for Solar-powered Wireless Sensor Networks with Mobile Sinks

  • Jun Min Yi;Hong Sub Lee;Ikjune Yoon;Dong Kun Noh
    • Journal of Internet Technology
    • /
    • v.19 no.6
    • /
    • pp.1801-1810
    • /
    • 2018
  • In this study, an energy-aware data-replication is proposed to effectively support a mobile sink in a solar-powered wireless sensor network (WSN). By utilizing the redundant energy efficiently, the proposed scheme shares the gathered data among the cluster heads using a backbone network, in order to increase data-reliability. It also maintains a backup cluster head in each cluster to enhance topological resilience. The simulation result showed that, compared to conventional clustering techniques, the proposed scheme decreases the total amount of data loss from the mobile sink as well as saving its energy (by reducing its moving distance), while minimizing the unexpected blackout time of the sensor node.

Network function virtualization (NFV) resource allocation (RA) scheme and research trend (네트워크기능 가상화 (NFV) 자원할당 (RA) 방식과 연구동향)

  • Kim, Hyuncheol;Yoon, Seunghyun;Jeon, Hongseok;Lee, Wonhyuk
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.159-165
    • /
    • 2016
  • Through the NFV (Network Function Virtualization), companies such as network service providers and carriers have sought to dramatically reduce CAPEX / OPEX by improving the speed of new service provisioning and flexibility of network construction through the S/W-based devices provided by NFV. One of the most important considerations for establishing an NFV network to provide dynamic services is to determine how to dynamically allocate resources (VNFs), the basic building blocks of network services, in the right place. In this paper, we analyzed the latest research trends on VNF node, link allocation, and scheduling in nodes that are required to provide arbitrary NS in NFV framework. In this paper, we also propose VNF scheduling problems that should be studied further in RA (Resource Allocation).

Understanding the Relationship between Value Co-Creation Mechanism and Firm's Performance based on the Service-Dominant Logic (서비스지배논리하에서 가치공동창출 매커니즘과 기업성과간의 관계에 대한 연구)

  • Nam, Ki-Chan;Kim, Yong-Jin;Yim, Myung-Seong;Lee, Nam-Hee;Jo, Ah-Rha
    • Asia pacific journal of information systems
    • /
    • v.19 no.4
    • /
    • pp.177-200
    • /
    • 2009
  • AIn the advanced - economy, the services industry hasbecome a dominant sector. Evidently, the services sector has grown at a much faster rate than any other. For instance, in such developed countries as the U.S., the proportion of the services sector in its GDP is greater than 75%. Even in the developing countries including India and China, the magnitude of the services sector in their GDPs is rapidly growing. The increasing dependence on service gives rise to new initiatives including service science and service-dominant logic. These new initiatives propose a new theoretical prism to promote the better understanding of the changing economic structure. From the new perspectives, service is no longer regarded as a transaction or exchange, but rather co-creation of value through the interaction among service users, providers, and other stakeholders including partners, external environments, and customer communities. The purpose of this study is the following. First, we review previous literature on service, service innovation, and service systems and integrate the studies based on service dominant logic. Second, we categorize the ten propositions of service dominant logic into conceptual propositions and the ones that are directly related to service provision. Conceptual propositions are left out to form the research model. With the selected propositions, we define the research constructs for this study. Third, we develop measurement items for the new service concepts including service provider network, customer network, value co-creation, and convergence of service with product. We then propose a research model to explain the relationship among the factors that affect the value creation mechanism. Finally, we empirically investigate the effects of the factors on firm performance. Through the process of this research study, we want to show the value creation mechanism of service systems in which various participants in service provision interact with related parties in a joint effort to create values. To test the proposed hypotheses, we developed measurement items and distributed survey questionnaires to domestic companies. 500 survey questionnaires were distributed and 180 were returned among which 171 were usable. The results of the empirical test can be summarized as the following. First, service providers' network which is to help offer required services to customers is found to affect customer network, while it does not have a significant effect on value co-creation and product-service convergence. Second, customer network, on the other hand, appears to influence both value co-creation and product-service convergence. Third, value co-creation accomplished through the collaboration of service providers and customers is found to have a significant effect on both product-service convergence and firm performance. Finally, product-service convergence appears to affect firm performance. To interpret the results from the value creation mechanism perspective, service provider network well established to support customer network is found to have significant effect on customer network which in turn facilitates value co-creation in service provision and product-service convergence to lead to greater firm performance. The results have some enlightening implications for practitioners. If companies want to transform themselves into service-centered business enterprises, they have to consider the four factors suggested in this study: service provider network, customer network, value co-creation, and product-service convergence. That is, companies becoming a service-oriented organization need to understand what the four factors are and how the factors interact with one another in their business context. They then may want to devise a better tool to analyze the value creation mechanism and apply the four factors to their own environment. This research study contributes to the literature in following ways. First, this study is one of the very first empirical studies on the service dominant logic as it has categorized the fundamental propositions into conceptual and empirically testable ones and tested the proposed hypotheses against the data collected through the survey method. Most of the propositions are found to work as Vargo and Lusch have suggested. Second, by providing a testable set of relationships among the research variables, this study may provide policy makers and decision makers with some theoretical grounds for their decision making on what to do with service innovation and management. Finally, this study incorporates the concepts of value co-creation through the interaction between customers and service providers into the proposed research model and empirically tests the validity of the concepts. The results of this study will help establish a value creation mechanism in the service-based economy, which can be used to develop and implement new service provision.

Design and Implementation of Architecture for Convergence of Home Network Services and Data Broadcasting Services (홈네트워크 서비스와 데이터방송 서비스의 컨버전스를 위한 구조 설계 및 구현)

  • Bae, Yu-Seok;Oh, Bong-Jin;Moon, Kyeong-Deok;Kim, Sang-Wook
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.717-724
    • /
    • 2006
  • This paper describes the design and implementation of architecture for convergence of home network services and data broadcasting services based on UMB and ACAP middleware; the one is used for interoperability of home networked devices, and the other for data broadcasting services. The proposed architecture provides TV-centric user interface capable of managing home network services and data broadcasting services together using a remote controller and TV sets TV applying Java TV Xlet interface and HAVi user interface for home network services like data broadcasting services. Besides, we define the service proxy for accessing home network services in a set-top box and the service broker for providing data related to home network services in a home server. Finally, the application manager in ACAP middleware manages the lifecycle of home network services through service events from the service proxy to the application manager.

MTD (Moving Target Detection) with Preposition Hash Table for Security of Drone Network (드론 네트워크 보안을 위한 해시표 대체 방식의 능동 방어 기법)

  • Leem, Sungmin;Lee, Minwoo;Lim, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.477-485
    • /
    • 2019
  • As the drones industry evolved, the security of the drone network has been important. In this paper, MTD (Moving Target Detection) technique is applied to the drone network for improving security. The existing MTD scheme has a risk that the hash value is exposed during the wireless communication process, and it is restricted to apply the one-to-many network. Therefore, we proposed PHT (Preposition Hash Table) scheme to prevent exposure of hash values during wireless communication. By reducing the risk of cryptographic key exposure, the use time of the cryptographic key can be extended and the security of the drone network will be improved. In addition, the cryptographic key exchange is not performed during flight, it is advantageous to apply PHT for a swarm drone network. Through simulation, we confirmed that the proposed scheme can contribute to the security of the drone network.

A Study on the Improvement of the Defense-related International Patent Classification using Patent Mining (특허 마이닝을 이용한 국방관련 국제특허분류 개선 방안 연구)

  • Kim, Kyung-Soo;Cho, Nam-Wook
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.1
    • /
    • pp.21-33
    • /
    • 2022
  • Purpose: As most defense technologies are classified as confidential, the corresponding International Patent Classifications (IPCs) require special attention. Consequently, the list of defense-related IPCs has been managed by the government. This paper aims to evaluate the defense-related IPCs and propose a methodology to revalidate and improve the IPC classification scheme. Methods: The patents in military technology and their corresponding IPCs during 2009~2020 were utilized in this paper. Prior to the analysis, patents are divided into private and public sectors. Social network analysis was used to analyze the convergence structure and central defense technology, and association rule mining analysis was used to analyze the convergence pattern. Results: While the public sector was highly cohesive, the private sector was characterized by easy convergence between technologies. In addition, narrow convergence was observed in the public sector, and wide convergence was observed in the private sector. As a result of analyzing the core technologies of defense technology, defense-related IPC candidates were identified. Conclusion: This paper presents a comprehensive perspective on the structure of convergence of defense technology and the pattern of convergence. It is also significant because it proposed a method for revising defense-related IPCs. The results of this study are expected to be used as guidelines for preparing amendments to the government's defense-related IPC.