• Title/Summary/Keyword: Network Separation Technique

Search Result 39, Processing Time 0.032 seconds

A Design for Network Security System via Non-security Common Network (일반망과 보안망을 연계한 네트워크 보안체계 설계)

  • Cho, Chang-Bong;Lee, Sang-Guk;Dho, Kyeong-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.5
    • /
    • pp.609-614
    • /
    • 2009
  • In this paper, we have proposed a design for security network system passing through the non-security network which is commonly used for various networking services. Based on the security requirements which are assumed that the large classified data are bi-transmitted between a server and several terminals remotely located, some application methods of security techniques are suggested such as the network separation technique, the scale-down application technique of certification management system based on the PKI(Public Key Infrastructure), the double encryption application using the crypto-equipment and the asymmetric keys encryption algorithm, unrecoverable data deleting technique and system access control using USB device. It is expected that the application of this design technique for the security network causes to increase the efficiency of the existing network facilities and reduce the cost for developing and maintaining of new and traditional network security systems.

Optimal heat exchanger network synthesis through heuristics and system separation method (경험법칙과 계의 분리법을 통한 최적 열교환망 합성)

  • Lee, Hae-Pyeong;Ryu, Gyeong-Ok
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.1 no.2
    • /
    • pp.119-126
    • /
    • 1995
  • The purpose of this study is to develop the technique of energy recovery and energy saving by using the optimization of heat exchanger network synthesis. This article proposes a new method of determining the optimal target of a heat exchanger network synthesis problem of which data feature multiple pinch points. The system separation method we suggest here is to subdivide the original system into independent subsystems with one pinch point. The optimal cost target was evaluated and the original pinch rules at each subsystem were employed. The software developed in this study was applied to the Alko prosess, which is an alcohol production process, for the synthesis of heat exchanger network. It was possible to save about 15% of the total annual cost.

  • PDF

Spectrum Sensing for Cognitive Radio Networks Based on Blind Source Separation

  • Ivrigh, Siavash Sadeghi;Sadough, Seyed Mohammad-Sajad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.613-631
    • /
    • 2013
  • Cognitive radio (CR) is proposed as a key solution to improve spectral efficiency and overcome the spectrum scarcity. Spectrum sensing is an important task in each CR system with the aim of identifying the spectrum holes and using them for secondary user's (SU) communications. Several conventional methods for spectrum sensing have been proposed such as energy detection, matched filter detection, etc. However, the main limitation of these classical methods is that the CR network is not able to communicate with its own base station during the spectrum sensing period and thus a fraction of the available primary frame cannot be exploited for data transmission. The other limitation in conventional methods is that the SU data frames should be synchronized with the primary network data frames. To overcome the above limitations, here, we propose a spectrum sensing technique based on blind source separation (BSS) that does not need time synchronization between the primary network and the CR. Moreover, by using the proposed technique, the SU can maintain its transmission with the base station even during spectrum sensing and thus higher rates are achieved by the CR network. Simulation results indicate that the proposed method outperforms the accuracy of conventional BSS-based spectrum sensing techniques.

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

Separation and Purification of Useful Proteins Using Hydrogel Ultratiltration

  • Park, Chang-Ho;Son, Chang-Kyu;Park, Jong-Hwa;Chung, In-Sik
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.2 no.2
    • /
    • pp.113-116
    • /
    • 1997
  • The hydrogel process is a different form of ultrafiltration and has been used to separate biological molecules. In this study, the gel pore size was predicted by pulse NMR technique and neural network using a database obtained from gel filtration chromatography and diffusion experiment. Recombinant alkaline phosphatase expressed in insect cells was concentratred 1.5 times by hydrogel ultrafiltration by swelling at 2$0^{\circ}C$ and collapsing at 35$^{\circ}C$ at 53-65% separation efficiency and 78-83% enzyme recovery. Wild and recombinant Autographa californica unclear polyhedrosis viruses (AcNPV) were also concentrated 1.4 and 1.6 times of the feed solution at 48.5 and 60.0% separation efficiency, respectively Hydrogel ultrafiltration appears to be an attractive alternative for the concentration of AcNPV and recombinant proteins from insect cells.

  • PDF

Energy Analysis in CO2 Membrane Separation Process via Heat Integration (열통합 기법을 통한 이산화탄소 막 분리공정 에너지 해석)

  • Kim, Seong Hun;Kim, Tae Yong;Kim, Beom Seok;Cho, Hyun-Jun;Yeo, Yeong Koo
    • Plant Journal
    • /
    • v.12 no.2
    • /
    • pp.24-30
    • /
    • 2016
  • The membrane separation processes have received attention due to advantages such as compactness, modularity, ease of installation, flexibility of operation, lower capital cost and lower energy consumption. In this study, we evaluated accuracy of cross-flow, co-current and counter-current models. With the most accurate model, we identified the operating conditions of the two-stage membrane separation and examined the effects of permeance and selectivity of the membrane by simulation. Futhermore, power requirements and operating cost savings due to the introduction of the heat exchanger were investigated by applying heat exchanger network synthesis technique in the two-stage membrane separation using vapor sweep.

  • PDF

Base Flow Estimation in Uppermost Nakdong River Watersheds Using Chemical Hydrological Curve Separation Technique (화학적 수문곡선 분리기법을 이용한 낙동강 최상류 유역 기저유출량 산정)

  • Kim, Ryoungeun;Lee, Okjeong;Choi, Jeonghyeon;Won, Jeongeun;Kim, Sangdan
    • Journal of Korean Society on Water Environment
    • /
    • v.36 no.6
    • /
    • pp.489-499
    • /
    • 2020
  • Effective science-based management of the basin water resources requires an understanding of the characteristics of the streams, such as the baseflow discharge. In this study, the base flow was estimated in the two watersheds with the least artificial factors among the Nakdong River watersheds, as determined using the chemical hydrograph separation technique. The 16-year (2004-2019) discontinuous observed stream flow and electrical conductivity data in the Total Maximum Daily Load (TMDL) monitoring network were extended to continuous daily data using the TANK model and the 7-parameter log-linear model combined with the minimum variance unbiased estimator. The annual base flows at the upper Namgang Dam basin and the upper Nakdong River basin were both analyzed to be about 56% of the total annual flow. The monthly base flow ratio showed a high monthly deviation, as it was found to be higher than 0.9 in the dry season and about 0.46 in the rainy season. This is in line with the prevailing common sense notion that in winter, most of the stream flow is base flow, due to the characteristics of the dry season winter in Korea. It is expected that the chemical-based hydrological separation technique involving TANK and the 7-parameter log-linear models used in this study can help quantify the base flow required for systematic watershed water environment management.

LISP based IP Address Virtualization Technique for Resource Utilization on Virtualized SDN (가상화된 SDN에서 효과적인 자원 활용을 위한 LISP 기반 IP 주소 가상화 기법)

  • Go, Youngkeun;Yang, Gyeongsik;Yu, Bong-yeol;Yoo, Chuck
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1404-1411
    • /
    • 2016
  • Network virtualization is a technique that abstracts the physical network to provide multiple virtual networks to users. Virtualized network has the advantage to offer flexible services and improve resource utilization. In SDN architecture, network hypervisor serves to virtualize the network through address virtualization, topology virtualization and policy virtualization. Among them, address virtualization refers to the technique that provides an independent address space for each virtual network. Previous work divided the physical address space, and assigned an individual division to each virtual network. Each virtual address is then mapped one-to-one to a physical address. However, this approach requires a lot of flow entries, thus making it disadvantageous. Since SDN switches use TCAM (Ternary Contents Addressable Memory) for the flow table, it is very important to reduce the number of flow entries in the aspect of cost and scalability. In this paper, we propose a LISP based address virtualization, which separates address spaces for the physical and virtual addresses and transmits packet through tunneling, in order to resolve the limitation of the previous studies. By implementing a prototype, we show that the proposed scheme provides better scalability.

Potential Anomaly Separation and Archeological Site Localization Using Genetically Trained Multi-level Cellular Neural Networks

  • Bilgili, Erdem;Goknar, I. Cem;Albora, Ali Muhittin;Ucan, Osman Nuri
    • ETRI Journal
    • /
    • v.27 no.3
    • /
    • pp.294-303
    • /
    • 2005
  • In this paper, a supervised algorithm for the evaluation of geophysical sites using a multi-level cellular neural network (ML-CNN) is introduced, developed, and applied to real data. ML-CNN is a stochastic image processing technique based on template optimization using neighborhood relationships of the pixels. The separation/enhancement and border detection performance of the proposed method is evaluated by various interesting real applications. A genetic algorithm is used in the optimization of CNN templates. The first application is concerned with the separation of potential field data of the Dumluca chromite region, which is one of the rich reserves of Turkey; in this context, the classical approach to the gravity anomaly separation method is one of the main problems in geophysics. The other application is the border detection of archeological ruins of the Hittite Empire in Turkey. The Hittite civilization sites located at the Sivas-Altinyayla region of Turkey are among the most important archeological sites in history, one reason among others being that written documentation was first produced by this civilization.

  • PDF

Feature Selection Based on Class Separation in Handwritten Numeral Recognition Using Neural Network (신경망을 이용한 필기 숫자 인식에서 부류 분별에 기반한 특징 선택)

  • Lee, Jin-Seon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.2
    • /
    • pp.543-551
    • /
    • 1999
  • The primary purposes in this paper are to analyze the class separation of features in handwritten numeral recognition and to make use of the results in feature selection. Using the Parzen window technique, we compute the class distributions and define the class separation to be the overlapping distance of two class distributions. The dimension of a feature vector is reduced by removing the void or redundant feature cells based on the class separation information. The experiments have been performed on the CENPARMI handwritten numeral database, and partial classification and full classification have been tested. The results show that the class separation is very effective for the feature selection in the 10-class handwritten numeral recognition problem since we could reduce the dimension of the original 256-dimensional feature vector by 22%.

  • PDF