• Title/Summary/Keyword: Network Performance Analysis

Search Result 3,741, Processing Time 0.032 seconds

Efficiently Development Plan from the User's Need Analysis of the Army Tactical C4I(ATCIS) System (지상전술 C4I(ATCIS)체계 운용자 요구분석을 통한 효율적 발전 방안)

  • Park, Chang-Woon;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.5
    • /
    • pp.246-259
    • /
    • 2008
  • This study was to minimize the trial and error in the primary step of the C4I system(ATCIS) of the each army corps on the front line, and test the economy and efficiency was tested by reviewing related papers and the system characteristics of other countries. The relationship was researched by analyzing the collected survey data and survey data related to the user's requirement level such as the army standards, that is, commonality, timeliness, simplification, automaticity, field availability and viability, multi-stage security and interoperability, unification. The result showed that the C4I system was efficiently operated through the system reliability for the specification of the system and operation manual, maneuverability and security, adaptability of the war field and system support and management, and good education and training about system operation, and less system maintenance and supplementary element. As a result, the development plan confirmed that the continuous operator education and the construction of the maintenance, and the upgrade digitalization(C4ISR+D) with the korean characteristics based on IT of network systems, and system development of the measurement model of the operator performance must be continuously supplemented in the near future.

Detection of Group of Targets Using High Resolution Satellite SAR and EO Images (고해상도 SAR 영상 및 EO 영상을 이용한 표적군 검출 기법 개발)

  • Kim, So-Yeon;Kim, Sang-Wan
    • Korean Journal of Remote Sensing
    • /
    • v.31 no.2
    • /
    • pp.111-125
    • /
    • 2015
  • In this study, the target detection using both high-resolution satellite SAR and Elecro-Optical (EO) images such as TerraSAR-X and WorldView-2 is performed, considering the characteristics of targets. The targets of our interest are featured by being stationary and appearing as cluster targets. After the target detection of SAR image by using Constant False Alarm Rate (CFAR) algorithm, a series of processes is performed in order to reduce false alarms, including pixel clustering, network clustering and coherence analysis. We extend further our algorithm by adopting the fast and effective ellipse detection in EO image using randomized hough transform, which is significantly reducing the number of false alarms. The performance of proposed algorithm has been tested and analyzed on TerraSAR-X SAR and WordView-2 EO images. As a result, the average false alarm for group of targets is 1.8 groups/$64km^2$ and the false alarms of single target range from 0.03 to 0.3 targets/$km^2$. The results show that groups of targets are successfully identified with very low false alarms.

Design and Evaluation of an Edge-Fog Cloud-based Hierarchical Data Delivery Scheme for IoT Applications (사물인터넷 응용을 위한 에지-포그 클라우드 기반 계층적 데이터 전달 방법의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.37-47
    • /
    • 2018
  • The number of capabilities of Internet of Things (IoT) devices will exponentially grow over the next years. These devices may generate a vast amount of time-constrained data. In the context of IoT, data management should act as a layer between the objects and devices generating the data and the applications accessing the data for analysis purposes and services. In addition, most of IoT services will be content-centric rather than host centric to increase the data availability and the efficiency of data delivery. IoT will enable all the communication devices to be interconnected and make the data generated by or associated with devices or objects globally accessible. Also, fog computing keeps data and computation close to end users at the edge of network, and thus provides a new breed of applications and services to end users with low latency, high bandwidth, and geographically distributed. In this paper, we propose Edge-Fog cloud-based Hierarchical Data Delivery ($EFcHD^2$) method that effectively and reliably delivers IoT data to associated with IoT applications with ensuring time sensitivity. The proposed $EFcHD^2$ method stands on basis of fully decentralized hybrid of Edge and Fog compute cloud model, Edge-Fog cloud, and uses information-centric networking and bloom filters. In addition, it stores the replica of IoT data or the pre-processed feature data by edge node in the appropriate locations of Edge-Fog cloud considering the characteristic of IoT data: locality, size, time sensitivity and popularity. Then, the performance of $EFcHD^2$ method is evaluated through an analytical model, and is compared to fog server-based and Content-Centric Networking (CCN)-based data delivery methods.

An Efficient BotNet Detection Scheme Exploiting Word2Vec and Accelerated Hierarchical Density-based Clustering (Word2Vec과 가속화 계층적 밀집도 기반 클러스터링을 활용한 효율적 봇넷 탐지 기법)

  • Lee, Taeil;Kim, Kwanhyun;Lee, Jihyun;Lee, Suchul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.11-20
    • /
    • 2019
  • Numerous enterprises, organizations and individual users are exposed to large DDoS (Distributed Denial of Service) attacks. DDoS attacks are performed through a BotNet, which is composed of a number of computers infected with a malware, e.g., zombie PCs and a special computer that controls the zombie PCs within a hierarchical chain of a command system. In order to detect a malware, a malware detection software or a vaccine program must identify the malware signature through an in-depth analysis, and these signatures need to be updated in priori. This is time consuming and costly. In this paper, we propose a botnet detection scheme that does not require a periodic signature update using an artificial neural network model. The proposed scheme exploits Word2Vec and accelerated hierarchical density-based clustering. Botnet detection performance of the proposed method was evaluated using the CTU-13 dataset. The experimental result shows that the detection rate is 99.9%, which outperforms the conventional method.

A Tactical Internet Geocasting Protocol for Efficient Message Delivery (효율적인 메시지 전달을 위한 전술인터넷 지오캐스팅 프로토콜)

  • Yoon, Sun-Joong;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10B
    • /
    • pp.1050-1061
    • /
    • 2009
  • The Tactical Internet(TI) managed by Infantry Brigades is used for the purpose of sharing information of Command Control and Situation Awareness. When there are more than two destinations to transmit data in the TI system, a multicasting is utilized based on pre-defined multicast groups. However even in the case when a source node needs to send some messages like weathercast and attack alarm etc to only a part of Battalion or Brigades in a specific geographical region (destination region), the current TI multicasting protocol is designed to transmit the messages to the pre-defined group or all of the Battalion/Brigade nodes, resulting in inefficiency in terms of end-to-end delay and overhead. In this paper, we propose more efficient protocol for such cases, named as "Tactical Internet Geocasting (TIG)". The proposed scheme firstly checks whether the destination region belongs to one Battalion region or more than two Battalion regions using location information, and then performs a greedy forwarding from the source node to the destination region, followed by a local flooding inside of the destination region. With performance analysis and simulations using NS-2, TIG is compared to the current TI multicasting protocol (i.e., Simplified MDP) and the LBM (Location-based Multicast). The simulation results show that the proposed TIG is more efficient than both in terms of delay and network overhead.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Channel characteristics of multi-path power line using a contactless inductive coupling unit (비접촉식 유도성 결합기를 이용한 다중경로 전력선 채널 특성)

  • Kim, Hyun-Sik;Sohn, Kyung-Rak
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.9
    • /
    • pp.799-804
    • /
    • 2016
  • Broadband powerline communication (BPLC) uses distribution lines as a medium for achieving effective bidirectional data communication along with electric current flow. As the material characteristics of power lines are not good at the communication channel, the development of power line communication (PLC) systems for internet, voice, and data services requires measurement-based models of the transfer characteristics of the network suitable for performance analysis by simulation. In this paper, an analytic model describing a complex transfer function is presented to obtain the attenuation and path parameters for a multipath power line model. The calculated results demonstrated frequency-selective fading in multipath channels and signal attenuation with frequency, and were in good agreement with the experimental results. Inductive coupling units are used as couplers for coupling the signal to the power line to avoid physical connections to the distribution line. The inductance of the ferrite core, which depends on the frequency, determines the cut-off frequency of the inductive coupler. Coupling loss can be minimized by increasing the number of windings around the coupler. Coupling efficiency was improved by more than 6 dB with three windings compared to the results obtained with one winding.

Distributed Key Management Using Regression Model for Hierarchical Mobile Sensor Networks (계층적인 이동 센서 네트워크에서 회귀모델을 이용한 분산 키 관리)

  • Kim Mi-Hui;Chae Ki-Joon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.1-13
    • /
    • 2006
  • In this paper, we introduce a novel key management scheme that is based on the key pre-distribution but provides the key re-distribution method, in order to manage keys for message encryption and authentication of lower-layer sensor nodes on hierarchical mobile sensor networks. The characteristics of our key management are as follows: First, the role of key management is distributed to aggregator nodes as well as a sink node, to overcome the weakness of centralized management. Second, a sink node generates keys using regression model, thus it stores only the information for calculating the keys using the key information received from nodes, but does not store the relationship between a node and a key, and the keys themselves. As the disadvantage of existing key pre-distributions, they do not support the key re-distribution after the deployment of nodes, and it is hard to extend the key information in the case that sensor nodes in the network enlarge. Thirdly, our mechanism provides the resilience to node capture(${\lambda}$-security), also provided by the existing key pre-distributions, and fourth offers the key freshness through key re-distribution, key distribution to mobile nodes, and scalability to make up for the weak points in the existing key pre-distributions. Fifth, our mechanism does not fix the relationship between a node and a key, thus supports the anonymity and untraceability of mobile nodes. Lastly, we compare ours with existing mechanisms, and verify our performance through the overhead analysis of communication, computation, and memory.

Numerical Simulation of Local Atmospheric Circulations in the Valley of Gwangneung KoFlux Sites (광릉 KoFlux 관측지 계곡에서의 국지순환 수치모의)

  • Lee, Seung-Jae;Kim, Joon;Kang, Minseok;Malla-Thakuri, Bindu
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.16 no.3
    • /
    • pp.246-260
    • /
    • 2014
  • A 90-m horizontal-resolution numerical model was configured to study the micrometeorological features of local winds in the valley of Gwangneung KoFlux (Korea Flux network) Sites (GDK: Gwangneung Deciduous forest site in Korea, GCK: Gwangneung Coniferous forest site in Korea) during summer days. The U. S. Geological Survey (USGS) Shuttle Radar Topography Mission (SRTM) data were employed for high-resolution model terrain height. Model performance was evaluated by comparing observed and simulated near-surface temperature and winds. Detailed qualitative analysis of the model-simulated wind field was carried out for two selected cases which are a clear day (Case I) and a cloudy day (Case II). Observed winds exhibited that GDK and GCK, as well as Case I and Case II, had differences in timing, duration and strength of daytime and nighttime wind direction and speeds. The model simulation results strongly supported the existence of the drainage flow in the valley of the KoFlux tower sites. Overall, the simulated model fields realistically presented the diurnal cycle of local winds in and around the valley, including the morning drainage-upslope transition and the evening reversal of upslope wind. Also, they indicated the complexity of local winds interactions by presenting that daytime westerly winds in the valley were not always pure mountain winds and were often coupled with larger-scale wind systems, such as synoptic-scale winds or mesoscale sea breezes blowing from the west coast of the peninsula.

A Study on the Planning Technique of High-rised Housing Estates Applying Smart Green City Concept : Focus on Multi-functional Administrative City 2-1 Neighborhood (스마트 그린시티 개념을 적용한 고층주거단지 계획기법에 관한 연구 : 행정중심복합도시 2-1생활권을 중심으로)

  • Lee, Seo-Jeong;Lee, Eung-Hyun;Oh, Deog-Seong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.379-387
    • /
    • 2016
  • The goal of this research is to identify the planning techniques of high-rise housing estates applying a smart green city concept in order to understand the necessity of integrating 'planning & building' planning techniques and 'smart system' planning techniques and to analyze the current status of application. For the research, firstl, the definition of smart green city was established and high-rise housing estates planning was categorized according to a three space hierarchy, seven planning directions and 17 major features through literature review. Second, 28 'planning & building' planning techniques and 'smart system' planning techniques were derived through literature review and FGI analysis. Last, four cases in Multi-functional Administrative City were analyzed for the current status of application of planning techniques. In conclusion, planning techniques in 'Transportation Network', 'Environment-friendly layout planning of housing', 'Revitalization of green transportation', 'Utilization of new & renewable energy', 'Crime prevention and accident reduction', 'Use of high performance, and efficiency facility' main feature were identified as important planning techniques for Smart Green City and its implications were estimated.