• Title/Summary/Keyword: Network Enhancement

Search Result 735, Processing Time 0.025 seconds

Enhancement OLSR Routing Protocol using Particle Swarm Optimization (PSO) and Genrtic Algorithm (GA) in MANETS

  • Addanki, Udaya Kumar;Kumar, B. Hemantha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.131-138
    • /
    • 2022
  • A Mobile Ad-hoc Network (MANET) is a collection of moving nodes that communicate and collaborate without relying on a pre-existing infrastructure. In this type of network, nodes can freely move in any direction. Routing in this sort of network has always been problematic because of the mobility of nodes. Most existing protocols use simple routing algorithms and criteria, while another important criterion is path selection. The existing protocols should be optimized to resolve these deficiencies. 'Particle Swarm Optimization (PSO)' is an influenced method as it resembles the social behavior of a flock of birds. Genetic algorithms (GA) are search algorithms that use natural selection and genetic principles. This paper applies these optimization models to the OLSR routing protocol and compares their performances across different metrics and varying node sizes. The experimental analysis shows that the Genetic Algorithm is better compared to PSO. The comparison was carried out with the help of the simulation tool NS2, NAM (Network Animator), and xgraph, which was used to create the graphs from the trace files.

Enhancement of the Correctness of Marker Detection and Marker Recognition based on Artificial Neural Network (인공신경망을 이용한 마커 검출 및 인식의 정확도 개선)

  • Kang, Sun-Kyung;Kim, Young-Un;So, In-Mi;Jung, Sung-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.89-97
    • /
    • 2008
  • In this paper, we present a method for the enhancement of marker detection correctness and marker recognition speed by using artificial neural network. Contours of objects are extracted from the input image. They are approximated to a list of line segments. Quadrangles are found with the geometrical features of the approximated line segments. They are normalized into exact squares by using the warping technique and scale transformation. Feature vectors are extracted from the square image by using principal component analysis. Artincial neural network is used to checks if the square image is a marker image or a non-marker image. After that, the type of marker is recognized by using an artificial neural network. Experimental results show that the proposed method enhances the correctness of the marker detection and recognition.

  • PDF

Enhancement of Electrical Conductivity in Silver Nanowire Network for Transparent Conducting Electrode using Copper Electrodeposition (구리 전기도금 방법을 이용한 은 나노와이어 투명전극의 전기전도도 향상)

  • Ji, Hanna;Jang, Jiseong;Lee, Sangyeob;Chung, Choong-Heui
    • Korean Journal of Materials Research
    • /
    • v.29 no.5
    • /
    • pp.311-316
    • /
    • 2019
  • Transparent conducting electrodes are essential components in various optoelectrical devices. Although indium tin oxide thin films have been widely used for transparent conducting electrodes, silver nanowire network is a promising alternative to indium tin oxide thin films owing to its lower processing cost and greater suitability for flexible device application. In order to widen the application of silver nanowire network, the electrical conductance has to be improved while maintaining high optical transparency. In this study, we report the enhancement of the electrical conductance of silver nanowire network transparent electrodes by copper electrodeposition on the silver nanowire networks. The electrodeposited copper lowered the sheet resistance of the silver nanowire networks from $21.9{\Omega}{\square}$ to $12.6{\Omega}{\square}$. We perform detailed X-ray diffraction analysis revealing the effect of the amount of electrodeposited copper-shell on the sheet resistance of the core-shell(silver/copper) nanowire network transparent electrodes. From the relationship between the cross-sectional area of the copper-shell and the sheet resistance of the transparent electrodes, we deduce the electrical resistivity of electrodeposited copper to be approximately 4.5 times that of copper bulk.

Personalized EigenTrust with the Beta Distribution

  • Choi, Dae-Seon;Jin, Seung-Hun;Lee, Youn-Ho;Park, Yong-Su
    • ETRI Journal
    • /
    • v.32 no.2
    • /
    • pp.348-350
    • /
    • 2010
  • This letter presents an enhancement of EigenTrust. Using the beta distribution, local trust values can be more correctly evaluated. Simulation shows that the proposed scheme calculates the local trust more correctly by up to 8%. For personalization, the proposed scheme provides cumulative transitive values from the local trust to the global trust with mathematically guaranteed convergence.

Qos enhancement algorithm of CBR HDTV transport packet stream on AAL5

  • 손종무;이종락;이병렬;서승일;이문기
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.713-716
    • /
    • 1998
  • We propose the dejittering method against the jitter originated from the cell losses in ATM network when CBR traffic is transfereed on AAL5. Cell numbering algong with maintaining a timer at receier side introduces 0.669 times peak-to-peak PDV of the AAL5 PDU to that in ITU-T AAL5 standard, and the AAL5 user-HDTV decoder-receives the same or more error-free transport packets in the proposed algorithm than those in the ITU-T AAL5 standard for the same network simulation environment.

  • PDF

An Effective Intrusion Detection System for MobileAdHocNetwork (모바일 에드혹네트워크를 위한 효과적인 침입 탐지 시스템)

  • Shrestha, Rakesh;Park, Kyu-Jin;Park, Kwang-Chae;Choi, Dong-You;Han, Seung-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.271-276
    • /
    • 2008
  • The intrusion detection system is one of the active fields of research in wireless networks. Intrusion detection in wireless mobile Ad hoc network is challenging because the network topologies is dynamic, lack centralization and are vulnerable to attacks. This paper is about the effective enhancement of the IDS technique that is being implemented in the mobile ad hoc network and deals with security and vulnerabilities issues which results in the better performance and detection of the intrusion.

  • PDF

Security Issues & Application in Korea SCADA

  • Kim, Hak-Man;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.21 no.9
    • /
    • pp.95-100
    • /
    • 2007
  • The importance of communication security is increased in the power industry. The representative communication network of power industry is the SCADA(Supervisory Control and Data Acquisition) systems. The SCADA system has been used for remote measurement and control in the power industry. Recently, many studies of SCADA network security have been carried out around the world. In this paper, we introduce recent security issues in the SCADA network and propose the application of a symmetric encryption method to the Korea SCADA network.

Development of an Obstacle Avoidance Algorithm for a Network-based Autonomous Mobile Robot (네트워크 기반 자율이동로봇을 위한 장애물 회피 알고리즘 개발)

  • Kim Hongryeol;Kim Dae Won;Kim Hong-Seok;Sohn SooKyung
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.5
    • /
    • pp.291-299
    • /
    • 2005
  • An obstacle avoidance algorithm for a network-based autonomous mobile robot is proposed in this paper. The obstacle avoidance algorithm is based on the VFH(Vector Field Histogram) algorithm and two delay compensation methods with the VFH algorithm are proposed for a network-based robot with distributed environmental sensors, mobile actuators, and the VFH controller. Firstly, the environmental sensor information is compensated by prospection with acquired environmental sensor information, measured network delays, and the kinematic model of the robot. The compensated environmental sensor information is used for building polar histogram with the VFH algorithm. Secondly, a sensor fusion algorithm for localization of the robot is proposed to compensate the delay of odometry sensor information and the delay of environmental sensor information. Through some simulation tests, the performance enhancement of the proposed algorithm in the viewpoint of efficient path generation and accurate goal positioning is shown here.

Performance Enhancement for Device-to-Device Under laying Cellular Network Using Coalition Formation Game

  • Radwan, Amr;Kim, Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1415-1423
    • /
    • 2016
  • Interference in device-to-device (D2D) communication underlaying cellular network needs to be elaborately investigated because of channel sharing. The objective is to improve the quality of D2D communications while maintaining high performance for cellular users. In this paper, we solve the above problem by jointly considering channel allocation and power control using coalition formation game. Our cooperative game theoric approach allows to enhance network-wide performance. We design a merge-and-split algorithm to deal with the complexity of the combinatorial structure in coalition formation problem. The analytical and numerical results show that our algorithm converges to a stable point which achieves high network performance.

Enhancement of Internal Network Security in Small Networks Using UTM and ELK Stack (UTM과 ELK Stack을 활용한 소규모 네트워크의 내부망 보안 강화방안)

  • Song Ha Min;DongHwi Lee
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.3-9
    • /
    • 2024
  • Currently, cyberattacks and security threats are constantly evolving, and organizations need quick and efficient security response methods. This paper proposes ways to strengthen internal network security by utilizing Unified Threat Management (UTM) equipment to improve network security and effectively manage and analyze the log data of the internal network collected through these equipment using Elastic Stack (Elasticsearch, Logstash, Kibana, hereinafter referred to as ELK Stack).