• 제목/요약/키워드: Network Evaluation

검색결과 3,680건 처리시간 0.033초

컴퓨터 통합 생산을 위한 통신망의 성능 관리 (Performance Management of Communication Networks for Computer Intergrated Manufacturing)

  • Lee, S.
    • 한국정밀공학회지
    • /
    • 제11권4호
    • /
    • pp.126-137
    • /
    • 1994
  • Performance management of computer networks is intended to improve a given network performance in order for more efficient information exchange between subsystems of an integrated large-scale system. Importance of perfomance management is growing as many functions of the large- scale system depend on the quality of communication services provided by the network. The role of performance management is to manipulate the adjustable protocol parameters on line so that the network can adapt itself to a dynamic environment. This can be divided into two subtasks : performance evaluation to find how changes in protocol parameters affect the network performance and decision making to determine the magnitude and direction of parameter adjustment. This paper is the first part of the two papers focusing on conceptual design, development, and evaluation of performance management for token bus networks. This paper specifically deals with the task of performance evaluation which utilizes the principle of perturbation analysis of discrete event dynamic systems. The developed algorithm can estimate the network performance under a perturbed protocol parameter setting from observations of the network operations under a nominal parameter setting.

  • PDF

네트워크 접근제어 시스템의 보안성 메트릭 개발 (Development of Security Metric of Network Access Control)

  • 이하용;양효식
    • 디지털융복합연구
    • /
    • 제15권6호
    • /
    • pp.219-227
    • /
    • 2017
  • 네트워크 접근제어(Network Access Control)를 통해 IT 인프라에 대한 보안위협 즉, 비인가 사용자, 단말의 네트워크 무단 접속, 직원의 내부 서버 불법접근 등을 효과적으로 차단할 수있어야 한다. 이러한 관점에서는 보안성을 충족시키고 있음을 확실히 하기 위해 관련 표준에 기반을 둔 메트릭 구축이 요구된다. 그러므로 관련 표준에 따른 NAC의 보안성 평가를 위한 방법의 체계화가 필요하다. 따라서 이 연구에서는 네트워크 접근제어시스템의 보안성 메트릭 개발을 위해 ISO/IEC 15408(CC:Common Criteria)과 ISO 25000 시리즈의 보안성 평가 부분을 융합한 모델을 구축하였다. 이를 위해 네트워크 접근제어시스템의 품질 요구사항을 분석하고 두 국제표준의 보안성에 관한 융합 평가메트릭을 개발하였다. 이를 통해 네트워크 접근제어시스템의 보안성 품질수준 평가 모델을 구축하고, 향후 네트워크 접근제어시스템에 대한 평가방법의 표준화에 적용할 수 있을 것으로 사료된다.

EGM과 Neural Network을 이용한 Website 감성사용성 분석시스템 프로토타입 구축 (Development of Prototype Kansei Usability Website Evaluation System based on EGM and Neural Network)

  • 김지관;차두원;박범;민병찬
    • 한국멀티미디어학회:학술대회논문집
    • /
    • 한국멀티미디어학회 2002년도 춘계학술발표논문집(하)
    • /
    • pp.1040-1045
    • /
    • 2002
  • This paper described the developed website usability evaluation system in terms of Kansei engineering using neural network. Developed system simultaneously operates with the MS Internet Explorer by entering the target URL for usability evaluation, and the results are learned using neural network. We firstly derived the Kansei adjectives and website usability factors and they were matched by the correspondence analysis. Then, highly corresponded adjectives were implemented on the system for the Kansei evaluation. Finally, the results showed the appropriate efficiency of developed algorithm and system for the website evaluation. If more subjects were used for the system learning, the efficiency of system could be improved.

  • PDF

Construction of Abalone Sensory Texture Evaluation System Based on BP Neural Network

  • Li, Xiaochen;Zhao, Yuyang;Li, Renjie;Zhang, Ning;Tao, Xueheng;Lee, Eung-Joo
    • 한국멀티미디어학회논문지
    • /
    • 제22권7호
    • /
    • pp.790-803
    • /
    • 2019
  • The effects of different heat treatments on the sensory characteristics of abalones are studied in this study. In this paper, the sensory evaluation of abalone samples under different heat treatment conditions is carried out, and the evaluation results are analyzed. The three-dimensional (3D) scanning and reverse engineering are used in tooth modeling of the sensory evaluation of abalone samples under different heat treatment conditions. Besides, the chewing movement models are simplified into three modes, including the cutting mode, compressing mode and grinding mode, which are simulated using finite element simulation. The elastic modulus of the abalone samples is obtained through the compression testing using a texture analyzer to distinguish their material properties under different heat treatments and to obtain simulated mechanical parameters. Finally, taking the mechanical parameters of the finite element simulation of abalone chewing as input and sensory evaluation parameters as the output, BP neural network is established in which the sensory texture evaluation model of abalone samples is obtained. Through verification, the neural network prediction model can meet the requirements of food texture evaluation, with an average error of 9.12%.

확률적 네트워크의 신뢰도 평가를 위한 분산 감소기법의 응용 (An Application of Variance Reduction Technique for Stochastic Network Reliability Evaluation)

  • 하경재;김원경
    • 한국시뮬레이션학회논문지
    • /
    • 제10권2호
    • /
    • pp.61-74
    • /
    • 2001
  • The reliability evaluation of the large scale network becomes very complicate according to the growing size of network. Moreover if the reliability is not constant but follows probability distribution function, it is almost impossible to compute them in theory. This paper studies the network evaluation methods in order to overcome such difficulties. For this an efficient path set algorithm which seeks the path set connecting the start and terminal nodes efficiently is developed. Also, various variance reduction techniques are applied to compute the system reliability to enhance the simulation performance. As a numerical example, a large scale network is given. The comparisons of the path set algorithm and the variance reduction techniques are discussed.

  • PDF

시간제약하의 네트워크 신뢰성 계산에 대한 알고리즘 (An Algorithm for Computing the Source-to-Terminal Reliability in the Network with Delay)

  • 홍순식;이창훈
    • 대한산업공학회지
    • /
    • 제12권1호
    • /
    • pp.133-138
    • /
    • 1986
  • In this paper, we are modeling the problem of the reliability evaluation in the network with delay. The triconnected decomposition and factoring algorithm for the network reliability, known as the most efficient algorithm, does not work in this constrained problem. So, we propose some ideas that reduce the above constrained problem to the general network reliability problem. We also present an algorithm for the reliability evaluation in the network with delay based on these ideas.

  • PDF

네트워크 보안시스템 보안성 평가 연구 (A Study on Evaluation Technique of Network Security System)

  • 김점구
    • 융합보안논문지
    • /
    • 제9권2호
    • /
    • pp.33-39
    • /
    • 2009
  • 네트워크 보안시스템을 단일 요소로 구분하여 점검하고 있는 현실의 문제점을 개선하기 위해 본 논문은 네트워크 보안시스템 점검은 취약성을 찾는 것이 아니라, 네트워크 보안시스템을 이루는 각 보안장비가 유기적으로 잘 작동하는지 종합적으로 점검하는 것임에 착안 네트워크 보안시스템을 점검하는 자동화 방법을 제안하고 이를 구현하였다.

  • PDF

통신 회선 접속 장비의 성능 및 품질평가 (Performance and Quality Evaluation of the Dial Up Network Modem)

  • 이석훈;이상설;강희정
    • 산업경영시스템학회지
    • /
    • 제16권28호
    • /
    • pp.181-186
    • /
    • 1993
  • The objective of this paper is to present a method for synthetic performance and quality evaluation of dial up network modem in users place. In the past, universally recognized criteria have not been available to model switched network modem performance. Reasonable assurance of modem performance on the public switched telephone network by standardized test channel which is suggested by ELA(Electronic Industries Association). These tests of modem from a variety manufacturers more reflective of actual performance on the network.

  • PDF

ANP 모형을 이용한 SP 인증 핵심 평가항목 도출 연구 (A Study to Establish the Core Evaluation Items of SP Authentication using ANP(Analytic Network Process))

  • 허상무;김우제
    • 한국IT서비스학회지
    • /
    • 제17권1호
    • /
    • pp.59-77
    • /
    • 2018
  • Software process (SP) authentication is a certification system designed in order to improve software process and ensure software reliability of the Korean small and medium enterprises (SMEs). It is composed of 3 grades, 17 evaluation items and 70 detailed evaluation items (software process). In order to certificate grade 2, 42 detailed evaluation items must be satisfied. In order to certificate grade 3, all 70 detailed evaluation items must be satisfied. SMEs are more vulnerable to manpower and material resources than the major company. Therefore, it is difficult for SMEs to invest in the long term to improve the software process. If we can provide the core evaluation items to SMEs, SMEs will be able to improve software quality more efficiently and effectively. It can be used as a short way to acquire SP authentication. The evaluation items of SP are defined as influencing each other. Therefore, the core evaluation items might be established using related techniques. Although we searched for previous researches and related informations, the associated study was insufficient. In this study, ANP (Analytic Network Process) technique was applied, and the core evaluation items of SP authentication were established. SMEs will be able to acquire SP authentication more easily using the core evaluation items. Finally, we expect that this study will be used as a basis material for creating the SP 2.0 version.

IPv6의 방화벽 규칙을 기반으로한 보안위험 평가 (Security Risks Evaluation based on IPv6 Firewall Rules)

  • 팽상우;이훈재;임효택
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 추계종합학술대회 B
    • /
    • pp.261-264
    • /
    • 2008
  • IPv6 has been proposed and deployed to cater the shortage of IPv4 addresses. It is expected to foresee mobile phones, pocket PCs, home devices and any other kind of network capable devices to be connected to the Internet with the introduction and deployment of IPv6. This scenario will bring in more challenges to the existing network infrastructure especially in the network security area. Firewalls are the simplest and the most basic form of protection to ensure network security. Nowadays, firewalls' usage has been extended from not only to protect the whole network but also appear as software firewalls to protect each network devices. IPv6 and IPv4 are not interoperable as there are separate networking stacks for each protocol. Therefore, the existing states of the art in firewalling need to be reengineered. In our context here, we pay attention only to the IPv6 firewalls configuration anomalies without considering other factors. Pre-evaluation of security risk is important in any organization especially a large scale network deployment where an add on rules to the firewall may affect the up and running network. We proposed a new probabilistic based model to evaluate the security risks based on examining the existing firewall rules. Hence, the network administrators can pre-evaluate the possible risk incurred in their current network security implementation in the IPv6 network. The outcome from our proposed pre-evaluation model will be the possibilities in percentage that the IPv6 firewall is configured wrongly or insecurely where known attacks such as DoS attack, Probation attack, Renumbering attack and etc can be launched easily. Besides that, we suggest and recommend few important rules set that should be included in configuring IPv6 firewall rules.

  • PDF