• 제목/요약/키워드: Network Evaluation

Search Result 3,678, Processing Time 0.035 seconds

An Outage Evaluation Model for Wireless Telecommunication Network (무선통신망의 장애영향 평가 모델)

  • Lee, Dong-Hoon;Chong, Il-Young
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.111-118
    • /
    • 2003
  • Network reliability means network ability which perform normal operation of network components within defined time period, on the other hand, network survivability is the index of normal operation in nerwork failure. In occurrence of network failure, network operator is interested in the measurement of network survivability, but, in a view of subscribers, it is more interested in how many subscribers are out of service and how long the out of service state lasts. In this paper, a service outage evaluation model fitted for telecommunication network in Korea is proposed, which measures the impacts of subscribers in case of network failure which induces a service outage. The outage evaluation result of "Mobile to Land" service outage which has 30.000 subscribers affected for 30 minutes is 2.5. This value is 5 times larger than that of the same service outage which has 10,000 subscribers affected for 30 minutes, i.e, the impact of subscribers in the former case is 5 times larger than that of the latter case. If 30,000 subscribers have isolated in "Mobile to Land," "Local Mobile to Mobile" service for 30 minutes by the exchange out of order in PCS network, then the evaluation result of this service outage will be 3.75.

Systematic review of the effect of coenzyme Q10 on antioxidant capacity while focused on evaluation of claims for health functional food (건강기능식품의 기능성을 중심으로 한 코엔자임Q10의 항산화 기능성에 대한 체계적 고찰)

  • Kim, Ji Yeon;Jeong, Sewon;Paek, Ju Eun;Kim, Joohee;Kwak, Jin Sook;Lee, Yoon Jung;Kang, Tae Seok;Kwon, Oran
    • Journal of Nutrition and Health
    • /
    • v.46 no.3
    • /
    • pp.218-225
    • /
    • 2013
  • Although the functional ingredient has been evaluated by the Korea Food and Drug Administration (KFDA) based on scientific evidence, the levels of scientific evidence and consistency of the results might vary according to emerging data. Therefore, periodic re-evaluation may be needed for some functional ingredients. In this study, we re-evaluated scientific evidence for the antioxidant activity of coenzyme Q10 as a functional ingredient in health functional food. Literature searches were conducted using the Medline and Cochrane, KISS, and IBIDS databases for the years 1955-2010 with the search term of coenzyme Q10 in combination with antioxidant. The search was limited to human studies published in Korean, English, and Japanese. Using the KFDA's evidence based evaluation system for scientific evaluation of health claims, 33 human studies were identified and reviewed in order to evaluate the strength of the evidence supporting a relation between coenzyme Q10 and antioxidant activity. Among 33 studies, significant effects for antioxidant activities were reported in 22 studies and their daily intake amount was 60 to 300 mg. Based on this systematic review, we concluded that there was possible evidence to support a relation between coenzyme Q10 intake and antioxidant activities. However, because inconsistent results have recently been reported, future studies should be monitored.

Network Security Situation Assessment Method Based on Markov Game Model

  • Li, Xi;Lu, Yu;Liu, Sen;Nie, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2414-2428
    • /
    • 2018
  • In order to solve the problem that the current network security situation assessment methods just focus on the attack behaviors, this paper proposes a kind of network security situation assessment method based on Markov Decision Process and Game theory. The method takes the Markov Game model as the core, and uses the 4 levels data fusion to realize the evaluation of the network security situation. In this process, the Nash equilibrium point of the game is used to determine the impact on the network security. Experiments show that the results of this method are basically consistent with the expert evaluation data. As the method takes full account of the interaction between the attackers and defenders, it is closer to reality, and can accurately assess network security situation.

Air Threat Evaluation System using Fuzzy-Bayesian Network based on Information Fusion (정보 융합 기반 퍼지-베이지안 네트워크 공중 위협평가 방법)

  • Yun, Jongmin;Choi, Bomin;Han, Myung-Mook;Kim, Su-Hyun
    • Journal of Internet Computing and Services
    • /
    • v.13 no.5
    • /
    • pp.21-31
    • /
    • 2012
  • Threat Evaluation(TE) which has air intelligence attained by identifying friend or foe evaluates the target's threat degree, so it provides information to Weapon Assignment(WA) step. Most of TE data are passed by sensor measured values, but existing techniques(fuzzy, bayesian network, and so on) have many weaknesses that erroneous linkages and missing data may fall into confusion in decision making. Therefore we need to efficient Threat Evaluation system that can refine various sensor data's linkages and calculate reliable threat values under unpredictable war situations. In this paper, we suggest new threat evaluation system based on information fusion JDL model, and it is principle that combine fuzzy which is favorable to refine ambiguous relationships with bayesian network useful to inference battled situation having insufficient evidence and to use learning algorithm. Finally, the system's performance by getting threat evaluation on an air defense scenario is presented.

A Design of Evaluation Tool for Information Security System (정보보호 시스템 평가 도구 설계)

  • 정연서;김환국;서동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.669-672
    • /
    • 2003
  • Computing and Networking technologies are rapidly developed. A lot of hacking events are occurring. As a result, people have a interesting for security in these days. Network security systems have come to be widely used in our networks. But, objective testing method to evaluate network sorority system is not established. Therefore we have difficulties that select a system. In this paper, we investigate evaluation methods for network sorority systems(Firewall, IDS, IPS etc.) and, design a evaluation tool for network security systems.

  • PDF

Performance Evaluation of Network Protocol for Protocol for Crane System (자동화 크레인을 위한 네트워크 프로토콜의 성능 평가)

  • Nam Kyoung-Nam;Kim Man-Ho;Lee Kyung Chang;Lee Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.8
    • /
    • pp.709-716
    • /
    • 2005
  • As a way to build more efficient and intelligent container cranes for todays hub ports, communication networks are used to interconnect numerous sensors, actuators, controllers, and operator switches and consoles that are spatially distributed over a crane. Various signals such as sensor values and operator's commands are digitized and broadcast on the network instead of using separate wiring cables. This not only makes the design and manufacturing of a crane more efficient, but also easier implementation of intelligent control algorithms. This paper presents the performance evaluation of CAN(Controller Area Network), TTP(Time Triggered Protocol) and Byteflight that can be used for cranes. Through discrete event simulation, several important quantitative performance factors such as the probability of a transmission failure, average system delay (data latency) and maximum system delay have been evaluated.

Seismic Reliability Evaluation of Electric Power Transmission Systems Considering the Multi-state of Substations (변전소의 다중상태를 고려한 송전시스템의 내진 신뢰성 평가)

  • 고현무;박영준;박원석;조호현
    • Proceedings of the Earthquake Engineering Society of Korea Conference
    • /
    • 2003.09a
    • /
    • pp.66-73
    • /
    • 2003
  • The technique for the seismic reliability evaluation of the electric power network is presented. In the previous study, the state of the substations was represented by the bi-state which is classified as failure or survival. However, the hi-state model can result in oversimplified analysis, because substations are worked by the parallel operating system. In this paper, Considering the characteristics of the parallel operating system, the damage of the substation is expressed by the multi-state for the more realistic seismic reliability evaluation. Using Monte-Carlo simulation method, the seismic reliability for Korean 345㎸ electric power network is evaluated. Analysis results show that reliability levels of the network by the multi-state analysis is higher than that by the hi-state analysis and the electric power network in southeastern area of the Korean Peninsular may be vulnerable to earthquakes.

  • PDF

A Design of SERDL(Security Evaluation Rule Description Language) and Rule Execution Engine for Evaluating Security of IPv6 Network (IPv6 네트워크 계층의 보안성 평가를 위한 평가규칙 표기 언어 및 평가 수행기의 설계)

  • Kwon, Hyeok-Chan;Kim, Sang-Choon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.471-484
    • /
    • 2004
  • Recently. many projects have been actively implementing IPsec on the various Operating Systems for security of IPv6 network. But there is no existing tool that checks the IPsec-based systems, which provide IPsec services, work Properly and provide their network security services well In the IPv6 network. In this paper, we design SERDL(Security Evaluation Rule Description Language) and rule execution tool for evaluating security of the IPv6 network, and we provide implementation details. The system Is divided into following parts : User Interface part, Rule Execution Module part, DBMS part and agent that gathering information needed for security test.

A study on evaluation method of NIDS datasets in closed military network (군 폐쇄망 환경에서의 모의 네트워크 데이터 셋 평가 방법 연구)

  • Park, Yong-bin;Shin, Sung-uk;Lee, In-sup
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.121-130
    • /
    • 2020
  • This paper suggests evaluating the military closed network data as an image which is generated by Generative Adversarial Network (GAN), applying an image evaluation method such as the InceptionV3 model-based Inception Score (IS) and Frechet Inception Distance (FID). We employed the famous image classification models instead of the InceptionV3, added layers to those models, and converted the network data to an image in diverse ways. Experimental results show that the Densenet121 model with one added Dense Layer achieves the best performance in data converted using the arctangent algorithm and 8 * 8 size of the image.

The Study of Performance Evaluation of Train Communication Network for EMU (전동차 차량 네트웍 성능평가기술 연구)

  • Lee Su-Gil;Han Seong-Ho;Koo Dong-Hoe;Song Young-Soo
    • Proceedings of the KSR Conference
    • /
    • 2003.10c
    • /
    • pp.659-665
    • /
    • 2003
  • This paper presents a Train Communication Network simulator (TCNS) that can be used to evaluate the performance of TCN. TCN was accepted as the standard of the protocol for the communication network in trains. We carry out some simulation tests using the TCNS to show practical uses of the simulator. Results of some simulation tests are also reported. This paper presents a Train Communication Network simulator(TCNS) that can be used to evaluate the performance of TCN. TCN was accepted as the standard of the protocol for the communication network in trains. TCN of fieldbus was adopted as international standardization IEC 61375 in 1999. It has been operating on G7 train in korea. This paper developed TCNS(Train Communication Network simulator) as a simulator for performance evaluation. We can verify TCNS for preventing many kinds of occurring problems between the devices in data-communication. This study was developed TCNS as a simulator for the performance evaluation. We analyzed correlation between token, transmission data per paket and transmission speed of bus, through the TCNS, also analyzed result according to error rate of TCN. We carry out some simulation tests using the TCNS to show practical uses of the simulator. Results of some simulation tests are also reported.

  • PDF