• Title/Summary/Keyword: Network Resilience

Search Result 113, Processing Time 0.025 seconds

Hybrid Error Concealment Algorithm for Intra-Frame in H.264 (H.264의 인트라 프레임을 위한 하이브리드 에러 은닉 알고리즘)

  • Yim Chang-Hoon;Kim Won-Jung;Lim Hye-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8C
    • /
    • pp.777-785
    • /
    • 2006
  • H.264 is the prominent video coding standard in various applications such as real-time video streaming and digital multimedia broadcasting, since it provides enhanced compression performance, error resilience tools, and network adaptation. Since compressed video stream is vulnerable to packet loss, error resilience and error concealment(EC) tools are essential for the transmission of video over the Internet. In this paper, we first propose a simple temporal EC method that improves the EC performance for intra-frame in H.264 when the amount of motion is relatively small. Then we propose a new hybrid EC method for intra-frame in H.264, which combines the spatial EC and temporal EC adaptively. The simulations are performed in packet-lossy environments, and the proposed hybrid EC method shows about 0.5-4dB PSNR improvement compared to the conventional spatial EC method that is used for intra-frame in H.264.

Resilience Engineering Indicators and Safety Management: A Systematic Review

  • Ranasinghe, Udara;Jefferies, Marcus;Davis, Peter;Pillay, Manikam
    • Safety and Health at Work
    • /
    • v.11 no.2
    • /
    • pp.127-135
    • /
    • 2020
  • A safe work environment is crucial in high-risk industries, such as construction refurbishment. Safety incidents caused by uncertainty and unexpected events in construction refurbishment systems are difficult to control using conventional safety management techniques. Resilience engineering (RE) is proposed as an alternative to traditional safety management approaches. It presents a successful safety management methodology designed to deal with uncertainty in high-risk work environments. Despite the fact that RE resides in the safety domain, there is no common set of RE indicators to measure and assess resilient in the work environment. The main aim of this research is to explore RE indicators that have been identified as important in developing and assessing the resilient work environment in high-risk industries, particularly in construction refurbishment. Indicators have been attained through a systematic literature review of research and scholarly articles published between the years 2004 and 2019. The literature review explored RE indicators in various industries. Descriptive analysis and co-occurrence-based network visualization were used for data analysis. The findings revealed 28 RE indicators in 11 different high-risk industries. The results show that the four commonly used indicators were: top-management commitment, awareness, learning, and flexibility, all of which have a strong relationship with RE. The findings of this study are useful for stakeholders when making decisions concerning the most important RE indicators in the context of their research or practice as this would avoid the ambiguity and disparity in the identification of RE indicators.

Factors Influencing Post-traumatic Growth in Mothers with Premature Infants Admitted to the Neonatal Intensive Care Unit (신생아집중치료실에 입원 경험이 있는 미숙아 어머니의 외상 후 성장에 영향을 미치는 요인)

  • Lee, Hyeun Soo;Kang, Sook Jung
    • Child Health Nursing Research
    • /
    • v.26 no.2
    • /
    • pp.267-276
    • /
    • 2020
  • Purpose: Caring for a vulnerable premature baby is a challenging task, but some mothers experience growth through that process. The purpose of this study was to investigate the factors influencing post-traumatic growth in mothers with premature infants admitted to the neonatal intensive care unit. Methods: A correlational research design was used and 105 mothers of premature infants were recruited from an online community. Data were collected from January 15 to January 25, 2019. Post-traumatic growth was measured using the Korean version of the Posttraumatic Growth Inventory. Data were analyzed using descriptive statistics, the t-test, analysis of variance, the Scheffé test, Pearson correlation coefficients, and hierarchical multiple regression. Results: The final model developed in this study explained 45.5% of post-traumatic growth (F=13.66, p<.001). Resilience (β=.54, p<.001) was the strongest predictor of post-traumatic growth, followed by the age of the mother when giving birth (β=.17, p=.028) and current employment status (β=.17, p=.049). Conclusion: For mother with premature infants to grow psychologically after their experience, it may be needed to support them to develop and strengthen their resilience through either education or their own support network.

KMMR: An Efficient and scalable Key Management Protocol to Secure Multi-Hop Communications in large scale Wireless Sensor Networks

  • Guermazi, Abderrahmen;Belghith, Abdelfettah;Abid, Mohamed;Gannouni, Sofien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.901-923
    • /
    • 2017
  • Efficient key distribution and management mechanisms as well as lightweight ciphers are the main pillar for establishing secure wireless sensor networks (WSN). Several symmetric based key distribution protocols are already proposed, but most of them are not scalable, yet vulnerable to a small number of compromised nodes. In this paper, we propose an efficient and scalable key management and distribution framework, named KMMR, for large scale WSNs. The KMMR contributions are three fold. First, it performs lightweight local processes orchestrated into upward and downward tiers. Second, it limits the impact of compromised nodes to only local links. Third, KMMR performs efficient secure node addition and revocation. The security analysis shows that KMMR withstands several known attacks. We implemented KMMR using the NesC language and experimented on Telosb motes. Performance evaluation using the TOSSIM simulator shows that KMMR is scalable, provides an excellent key connectivity and allows a good resilience, yet it ensures both forward and backward secrecy. For a WSN comprising 961 sensor nodes monitoring a 60 hectares agriculture field, KMMR requires around 2.5 seconds to distribute all necessary keys, and attains a key connectivity above 96% and a resilience approaching 100%. Quantitative comparisons to earlier work show that KMMR is more efficient in terms of computational complexity, required storage space and communication overhead.

Study on Emerging Security Threats and National Response

  • Il Soo Bae;Hee Tae Jeong
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.34-41
    • /
    • 2023
  • The purpose of this paper is to consider the expansion of non-traditional security threats and the national-level response to the emergence of emerging security threats in ultra-uncertain VUCA situations. As a major research method for better analysis, the theoretical approach was referred to papers published in books and academic journals, and technical and current affairs data were studied through the Internet and literature research. The instability and uncertainty of the international order and security environment in the 21st century brought about a change in the security paradigm. Human security emerged as the protection target of security was expanded to individual humans, and emerging security was emerging as the security area expanded. Emerging security threatsthat have different characteristicsfrom traditionalsecurity threats are expressed in various ways, such as cyber threats, new infectious disease threats, terrorist threats, and abnormal climate threats. First, the policy and strategic response to respond to emerging security threats is integrated national crisis management based on artificial intelligence applying the concept of Foresight. Second, it is to establish network-based national crisis management smart governance. Third, it is to maintain the agile resilience of the concept of Agilience. Fourth, an integrated response system that integrates national power elements and national defense elements should be established.

An Transport Layer Vertical Handover Approach for Video Services in Overlay Network Environments (오버레이 네트워크 환경에서 비디오 서비스를 위한 트랜스포트 계층에서의 수직 핸드오버 방안)

  • Chang, Moon-Jeong;Lee, Mee-Jeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.163-170
    • /
    • 2007
  • The next generation communication environment consists of various wireless access networks with distinct features that are configured as an overlay topology. In the network environments, the frequency of hand overs should be minimized and the error propagation should be solved in order to provide high-quality multimedia services to mobile users. Therefore, we propose an performance enhancement approach, based on mSCTP, that provides high quality multimedia services to mobile users by ameliorating the error propagation problem. We utilizes the following four functions: 1) the separation of transmission paths according to the types of frames. 2) retransmission strategy to minimize the loss rate of frames, 3) Foced vertical handover execution by utilizing bicasting, 4) using the stability period in order to reduce the effect of the ping pong phenomenon. The simulation results show that the proposed approach provides seamless multimedia service to mobile users by achieving error resilience.

Security Information and Event Management System for Ship Cyber Security (해사 사이버 보안 대응을 위한 선박용 보안 정보와 이벤트 관리 시스템)

  • Nam-seon Kang;Chang-sik Lee;Seong-sang Yu;Jong-min Lee;Gum-jun Son
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.4
    • /
    • pp.497-506
    • /
    • 2024
  • In this study, we proposed security information and event management for ship as a technology to respond to maritime cybersecurity regulations and evolving cyber threats. We analyze the main technologies of network management system and security information and event management, which are representative technologies for responding to ship cyber security, and propose SIEM for ships based on this. Optimized for ships based on the International Maritime Organization's Maritime Cyber Threat Management Guidelines, IACS UR E26, 27, etc. Derive the main functions of the SIEM for ship, linkage and normalization plan for the ship's heterogeneous equipment, ship's cyber threat and ship detection policy to identify ship's cyber security threats, and ship's operating environment and operating personnel.

SonicStream: A Network Coding Based Live P2P Media Streaming System With Rich User Experiences

  • Chen, Xiaogang;Ren, Ning;Zhang, Xiaochen;Wang, Xin;Zhao, Jin
    • Journal of Communications and Networks
    • /
    • v.10 no.4
    • /
    • pp.430-436
    • /
    • 2008
  • Recent studies have convinced that network coding can improve the performance of live media streaming in terms of startup delay, resilience to peer dynamics, as well as reduced bandwidth cost on dedicated streaming servers. However, there still exist some strategy drawbacks and neglected problems which need to be further researched. In addition to the commonly used evaluation parameters of the network and user experiences mentioned above, we focus on additional key factors, playback lag and switch lag, which have not been fully explored in previous work. In this paper, we present SonicStream, a novel and fully implemented live peer to peer (P2P) media streaming system with consideration of rich user experiences, including startup delay, playback continuity, playback lag, switch lag, etc. In pursuit of a further enhanced user experience, we revise traditional peer selection/data scheduling methods. Through a series of experimental evaluations and a cautious comparison with the latest similar work $R^2$, the superior performance of SonicStream has been preliminarily verified.

Providing survivability for virtual networks against substrate network failure

  • Wang, Ying;Chen, Qingyun;Li, Wenjing;Qiu, Xuesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4023-4043
    • /
    • 2016
  • Network virtualization has been regarded as a core attribute of the Future Internet. In a network virtualization environment (NVE), multiple heterogeneous virtual networks can coexist on a shared substrate network. Thus, a substrate network failure may affect multiple virtual networks. In this case, it is increasingly critical to provide survivability for the virtual networks against the substrate network failures. Previous research focused on mechanisms that ensure the resilience of the virtual network. However, the resource efficiency is still important to make the mapping scheme practical. In this paper, we study the survivable virtual network embedding mechanisms against substrate link and node failure from the perspective of improving the resource efficiency. For substrate link survivability, we propose a load-balancing and re-configuration strategy to improve the acceptance ratio and bandwidth utilization ratio. For substrate node survivability, we develop a minimum cost heuristic based on a divided network model and a backup resource cost model, which can both satisfy the location constraints of virtual node and increase the sharing degree of the backup resources. Simulations are conducted to evaluate the performance of the solutions. The proposed load balancing and re-configuration strategy for substrate link survivability outperforms other approaches in terms of acceptance ratio and bandwidth utilization ratio. And the proposed minimum cost heuristic for substrate node survivability gets a good performance in term of acceptance ratio.

Enhancing Security Gaps in Smart Grid Communication

  • Lee, Sang-Hyun;Jeong, Heon;Moon, Kyung-Il
    • International Journal of Advanced Culture Technology
    • /
    • v.2 no.2
    • /
    • pp.7-10
    • /
    • 2014
  • In order to develop smart grid communications infrastructure, a high level of interconnectivity and reliability among its nodes is required. Sensors, advanced metering devices, electrical appliances, and monitoring devices, just to mention a few, will be highly interconnected allowing for the seamless flow of data. Reliability and security in this flow of data between nodes is crucial due to the low latency and cyber-attacks resilience requirements of the Smart Grid. In particular, Artificial Intelligence techniques such as Fuzzy Logic, Bayesian Inference, Neural Networks, and other methods can be employed to enhance the security gaps in conventional IDSs. A distributed FPGA-based network with adaptive and cooperative capabilities can be used to study several security and communication aspects of the smart grid infrastructure both from the attackers and defensive point of view. In this paper, the vital issue of security in the smart grid is discussed, along with a possible approach to achieve this by employing FPGA based Radial Basis Function (RBF) network intrusion.