• 제목/요약/키워드: Network Enhancement

검색결과 735건 처리시간 0.024초

Enhancement OLSR Routing Protocol using Particle Swarm Optimization (PSO) and Genrtic Algorithm (GA) in MANETS

  • Addanki, Udaya Kumar;Kumar, B. Hemantha
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.131-138
    • /
    • 2022
  • A Mobile Ad-hoc Network (MANET) is a collection of moving nodes that communicate and collaborate without relying on a pre-existing infrastructure. In this type of network, nodes can freely move in any direction. Routing in this sort of network has always been problematic because of the mobility of nodes. Most existing protocols use simple routing algorithms and criteria, while another important criterion is path selection. The existing protocols should be optimized to resolve these deficiencies. 'Particle Swarm Optimization (PSO)' is an influenced method as it resembles the social behavior of a flock of birds. Genetic algorithms (GA) are search algorithms that use natural selection and genetic principles. This paper applies these optimization models to the OLSR routing protocol and compares their performances across different metrics and varying node sizes. The experimental analysis shows that the Genetic Algorithm is better compared to PSO. The comparison was carried out with the help of the simulation tool NS2, NAM (Network Animator), and xgraph, which was used to create the graphs from the trace files.

인공신경망을 이용한 마커 검출 및 인식의 정확도 개선 (Enhancement of the Correctness of Marker Detection and Marker Recognition based on Artificial Neural Network)

  • 강선경;김영운;소인미;정성태
    • 한국컴퓨터정보학회논문지
    • /
    • 제13권1호
    • /
    • pp.89-97
    • /
    • 2008
  • 본 논문에서는 인공신경망을 이용하여 사각형 형태 마커 검출 및 인식의 성능을 향상시키는 방법을 제안한다. 본 논문의 방법에서는 입력 영상으로부터 객체의 윤곽선을 찾은 다음에 선분으로 근사화한다. 근사화된 선분으로부터 기하학적 특징을 이용하여 사각형을 찾고 워핑 기법과 확대/축소 변환을 이용하여 사각형 영상을 정사각형 형태로 정규화 한다. 정사각형 형태로 정규화 한 다음에는 주성분 분석을 적용하여 특징 벡터의 크기를 줄인 다음에 인공신경망을 이용하여 마커 영상인지 아닌지를 검사한다. 마커 영상으로 판별된 영상에 대하여 인공신경망을 이용하여 마커의 종류를 인식한다. 인식 실험 결과 인공신경망을 사용함으로써 마커 검출의 오류 줄일 수 있었고 인식의 정확도를 개선할 수 있었다.

  • PDF

구리 전기도금 방법을 이용한 은 나노와이어 투명전극의 전기전도도 향상 (Enhancement of Electrical Conductivity in Silver Nanowire Network for Transparent Conducting Electrode using Copper Electrodeposition)

  • 지한나;장지성;이상엽;정중희
    • 한국재료학회지
    • /
    • 제29권5호
    • /
    • pp.311-316
    • /
    • 2019
  • Transparent conducting electrodes are essential components in various optoelectrical devices. Although indium tin oxide thin films have been widely used for transparent conducting electrodes, silver nanowire network is a promising alternative to indium tin oxide thin films owing to its lower processing cost and greater suitability for flexible device application. In order to widen the application of silver nanowire network, the electrical conductance has to be improved while maintaining high optical transparency. In this study, we report the enhancement of the electrical conductance of silver nanowire network transparent electrodes by copper electrodeposition on the silver nanowire networks. The electrodeposited copper lowered the sheet resistance of the silver nanowire networks from $21.9{\Omega}{\square}$ to $12.6{\Omega}{\square}$. We perform detailed X-ray diffraction analysis revealing the effect of the amount of electrodeposited copper-shell on the sheet resistance of the core-shell(silver/copper) nanowire network transparent electrodes. From the relationship between the cross-sectional area of the copper-shell and the sheet resistance of the transparent electrodes, we deduce the electrical resistivity of electrodeposited copper to be approximately 4.5 times that of copper bulk.

Personalized EigenTrust with the Beta Distribution

  • Choi, Dae-Seon;Jin, Seung-Hun;Lee, Youn-Ho;Park, Yong-Su
    • ETRI Journal
    • /
    • 제32권2호
    • /
    • pp.348-350
    • /
    • 2010
  • This letter presents an enhancement of EigenTrust. Using the beta distribution, local trust values can be more correctly evaluated. Simulation shows that the proposed scheme calculates the local trust more correctly by up to 8%. For personalization, the proposed scheme provides cumulative transitive values from the local trust to the global trust with mathematically guaranteed convergence.

Qos enhancement algorithm of CBR HDTV transport packet stream on AAL5

  • 손종무;이종락;이병렬;서승일;이문기
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1998년도 하계종합학술대회논문집
    • /
    • pp.713-716
    • /
    • 1998
  • We propose the dejittering method against the jitter originated from the cell losses in ATM network when CBR traffic is transfereed on AAL5. Cell numbering algong with maintaining a timer at receier side introduces 0.669 times peak-to-peak PDV of the AAL5 PDU to that in ITU-T AAL5 standard, and the AAL5 user-HDTV decoder-receives the same or more error-free transport packets in the proposed algorithm than those in the ITU-T AAL5 standard for the same network simulation environment.

  • PDF

모바일 에드혹네트워크를 위한 효과적인 침입 탐지 시스템 (An Effective Intrusion Detection System for MobileAdHocNetwork)

  • ;박규진;박광채;최동유;한승조
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 춘계종합학술대회 A
    • /
    • pp.271-276
    • /
    • 2008
  • The intrusion detection system is one of the active fields of research in wireless networks. Intrusion detection in wireless mobile Ad hoc network is challenging because the network topologies is dynamic, lack centralization and are vulnerable to attacks. This paper is about the effective enhancement of the IDS technique that is being implemented in the mobile ad hoc network and deals with security and vulnerabilities issues which results in the better performance and detection of the intrusion.

  • PDF

Security Issues & Application in Korea SCADA

  • Kim, Hak-Man;Kang, Dong-Joo
    • 조명전기설비학회논문지
    • /
    • 제21권9호
    • /
    • pp.95-100
    • /
    • 2007
  • The importance of communication security is increased in the power industry. The representative communication network of power industry is the SCADA(Supervisory Control and Data Acquisition) systems. The SCADA system has been used for remote measurement and control in the power industry. Recently, many studies of SCADA network security have been carried out around the world. In this paper, we introduce recent security issues in the SCADA network and propose the application of a symmetric encryption method to the Korea SCADA network.

네트워크 기반 자율이동로봇을 위한 장애물 회피 알고리즘 개발 (Development of an Obstacle Avoidance Algorithm for a Network-based Autonomous Mobile Robot)

  • 김홍열;김대원;김홍석;손수경
    • 대한전기학회논문지:시스템및제어부문D
    • /
    • 제54권5호
    • /
    • pp.291-299
    • /
    • 2005
  • An obstacle avoidance algorithm for a network-based autonomous mobile robot is proposed in this paper. The obstacle avoidance algorithm is based on the VFH(Vector Field Histogram) algorithm and two delay compensation methods with the VFH algorithm are proposed for a network-based robot with distributed environmental sensors, mobile actuators, and the VFH controller. Firstly, the environmental sensor information is compensated by prospection with acquired environmental sensor information, measured network delays, and the kinematic model of the robot. The compensated environmental sensor information is used for building polar histogram with the VFH algorithm. Secondly, a sensor fusion algorithm for localization of the robot is proposed to compensate the delay of odometry sensor information and the delay of environmental sensor information. Through some simulation tests, the performance enhancement of the proposed algorithm in the viewpoint of efficient path generation and accurate goal positioning is shown here.

Performance Enhancement for Device-to-Device Under laying Cellular Network Using Coalition Formation Game

  • Radwan, Amr;Kim, Hoon
    • 한국멀티미디어학회논문지
    • /
    • 제19권8호
    • /
    • pp.1415-1423
    • /
    • 2016
  • Interference in device-to-device (D2D) communication underlaying cellular network needs to be elaborately investigated because of channel sharing. The objective is to improve the quality of D2D communications while maintaining high performance for cellular users. In this paper, we solve the above problem by jointly considering channel allocation and power control using coalition formation game. Our cooperative game theoric approach allows to enhance network-wide performance. We design a merge-and-split algorithm to deal with the complexity of the combinatorial structure in coalition formation problem. The analytical and numerical results show that our algorithm converges to a stable point which achieves high network performance.

UTM과 ELK Stack을 활용한 소규모 네트워크의 내부망 보안 강화방안 (Enhancement of Internal Network Security in Small Networks Using UTM and ELK Stack)

  • 민송하;이동휘
    • 융합보안논문지
    • /
    • 제24권1호
    • /
    • pp.3-9
    • /
    • 2024
  • 현재 사이버 공격과 보안 위협은 지속적으로 진화하고 있으며, 조직은 신속하고 효율적인 보안 대응 방법을 필요로 한다. 본 논문은 Unified Threat Management (UTM) 장비를 활용하여 네트워크 보안을 향상시키고, 이러한 장비를 통해 수집되는 내부망의 로그 데이터를 Elastic Stack (Elasticsearch, Logstash, Kibana, 이하 ELK Stack)을 활용하여 효과적으로 관리하고 분석하는 내부망 보안 강화방안을 제안하고자 한다.