• Title/Summary/Keyword: Network science

Search Result 13,127, Processing Time 0.038 seconds

A Fault-Tolerant Multistage Interconnection Network with Self-Loop Switch (자기 루프 스위치를 가진 결함-허용 다단계 상호연결망)

  • Kim, Gum-Ho;Kim, Hyung-Wook;Nam, Soon-Hyun;Youn, Sung-Dae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.231-234
    • /
    • 2001
  • 본 논문은 다단계 상호연결망에서 높은 처리율과 결함 허용을 위해 중복 경로를 제공하는 E-Cube-network 구조를 제안한다. Cube network의 확장된 형태인 E(Extended)-Cube network 구조를 통해 패킷 전송중 충돌이 발생한 경우 스위치 자신을 순환하고, 재차 충돌이 발생하면 멀티플렉서를 통해 또 다른 새로운 경로로 패킷을 전송하는 새로운 알고리즘을 제시한다. 그리고 모의실험을 통해 기존의 Cube network 구조보다 높은 종단간 처리율을 보인다.

  • PDF

Network Traffic Analysis between Two Military Bases Using Modeling and Simulation (M&S를 활용한 두 개의 군 부대간 네트워크 트래픽 용량 분석)

  • Park, Myunghwan;Yoo, Seunghoon;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.425-432
    • /
    • 2019
  • Modeling and Simulation(M&S) has widely been used in various areas such as industry, academy and military. Especially, military have used the technology for acquisition, training, and combat assessment. In this paper, we introduce our experience using M&S technique to analyze the network traffic amount and packet delay time between two military bases. For this, we modeled the current network configuration of the military bases and simulated the model with NS-3 tool. The result provided us for an insight regarding the required network performance between two bases.

Improved User Privacy in SocialNetworks Based on Hash Function

  • Alrwuili, Kawthar;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.97-104
    • /
    • 2022
  • In recent years, data privacy has become increasingly important. The goal of network cryptography is to protect data while it is being transmitted over the internet or a network. Social media and smartphone apps collect a lot of personal data which if exposed, might be damaging to privacy. As a result, sensitive data is exposed and data is shared without the data owner's consent. Personal Information is one of the concerns in data privacy. Protecting user data and sensitive information is the first step to keeping user data private. Many applications user data can be found on other websites. In this paper, we discuss the issue of privacy and suggest a mechanism for keeping user data hidden in other applications.

Comparison Analysis of Co-authorship Network and Citation Based Network for Author Research Similarity Exploration

  • Jeeyoung, Yoon;Min, Song
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.4
    • /
    • pp.269-284
    • /
    • 2022
  • Exploring research similarity of researchers offers insight on research communities and potential interactions among scholars. While co-authorship is a popular measure for studying research similarity of researchers, it cannot provide insight on authors who have not collaborated yet. In this work, we present novel approach to capture research similarity of authors using citation information. Extensive study is conducted on DATA & KNOWLEDGE ENGINEERING (DKE) publications to demonstrate and compare suggested approach with co-authorship based approach. Analysis result shows that proposed approach distinguishes author relationships that is not shown in co-authorship network.

Novel Two-Level Randomized Sector-based Routing to Maintain Source Location Privacy in WSN for IoT

  • Jainulabudeen, A.;Surputheen, M. Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.285-291
    • /
    • 2022
  • WSN is the major component for information transfer in IoT environments. Source Location Privacy (SLP) has attracted attention in WSN environments. Effective SLP can avoid adversaries to backtrack and capture source nodes. This work presents a Two-Level Randomized Sector-based Routing (TLRSR) model to ensure SLP in wireless environments. Sector creation is the initial process, where the nodes in the network are grouped into defined sectors. The first level routing process identifies sector-based route to the destination node, which is performed by Ant Colony Optimization (ACO). The second level performs route extraction, which identifies the actual nodes for transmission. The route extraction is randomized and is performed using Simulated Annealing. This process is distributed between the nodes, hence ensures even charge depletion across the network. Randomized node selection process ensures SLP and also avoids depletion of certain specific nodes, resulting in increased network lifetime. Experiments and comparisons indicate faster route detection and optimal paths by the TLRSR model.

Estrus Detection in Sows Based on Texture Analysis of Pudendal Images and Neural Network Analysis

  • Seo, Kwang-Wook;Min, Byung-Ro;Kim, Dong-Woo;Fwa, Yoon-Il;Lee, Min-Young;Lee, Bong-Ki;Lee, Dae-Weon
    • Journal of Biosystems Engineering
    • /
    • v.37 no.4
    • /
    • pp.271-278
    • /
    • 2012
  • Worldwide trends in animal welfare have resulted in an increased interest in individual management of sows housed in groups within hog barns. Estrus detection has been shown to be one of the greatest determinants of sow productivity. Purpose: We conducted this study to develop a method that can automatically detect the estrus state of a sow by selecting optimal texture parameters from images of a sow's pudendum and by optimizing the number of neurons in the hidden layer of an artificial neural network. Methods: Texture parameters were analyzed according to changes in a sow's pudendum in estrus such as mucus secretion and expansion. Of the texture parameters, eight gray level co-occurrence matrix (GLCM) parameters were used for image analysis. The image states were classified into ten grades for each GLCM parameter, and an artificial neural network was formed using the values for each grade as inputs to discriminate the estrus state of sows. The number of hidden layer neurons in the artificial neural network is an important parameter in neural network design. Therefore, we determined the optimal number of hidden layer units using a trial and error method while increasing the number of neurons. Results: Fifteen hidden layers were determined to be optimal for use in the artificial neural network designed in this study. Thirty images of 10 sows were used for learning, and then 30 different images of 10 sows were used for verification. Conclusions: For learning, the back propagation neural network (BPN) algorithm was used to successful estimate six texture parameters (homogeneity, angular second moment, energy, maximum probability, entropy, and GLCM correlation). Based on the verification results, homogeneity was determined to be the most important texture parameter, and resulted in an estrus detection rate of 70%.

Research on Data-Flow Optimization and Advanced Application Research on KREONET (국가과학기술연구망에서의 첨단연구 적용과 데이터흐름 최적화모델 연구)

  • Noh, Minki;Lee, Chankyun;Jang, Minseok;Seok, Woojin
    • KNOM Review
    • /
    • v.22 no.2
    • /
    • pp.1-11
    • /
    • 2019
  • The paradigm of science and technology and R&D system changes from the existing form of independent research to community research which transmits and stores large-capacity data generated from observation and experiment to the research site through a high-speed network. Network-dependent advanced research is improves form of collaboration, sharing, globalization. For this purpose, not only the integration of science and IT technology, but also the optimized network infrastructure and technology for real-time sharing of the enormous data is necessary. This paper explains the direction of change through the case of KREONET's network-dependent advanced research and analyzes the technology and network resources supported in each research field. Through this, we propose a network optimization model for each advanced research field with the main data flow and satisfy the network required performance by advanced applications on KREONET.

Implementation of Network Level Simulator for Tactical Network Performance Analysis (전술통신망 성능분석을 위한 네트워크 시뮬레이터 구현)

  • Choi, Jeong-In;Shin, Sang-Heon;Baek, Hae-Hyeon;Park, Min-Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.5
    • /
    • pp.666-674
    • /
    • 2013
  • This paper studied about the design and implementation of tactical communication network simulator in order to obtain tactical communication network parameter, such as link capacity and routing plan, and a number of exceptional cases that may occur during actual deployment by conducting simulation of a large-scale tactical communication networks. This tactical communication network simulator provides equipment models and link models of commercial OPNET simulator for tactical communication network. In addition, 6 types of simulation scenario writings convenience functions and traffic generation models that may occur in situations of tactical communication network environment were implemented in order to enhance user friendliness. By taking advantages of SITL(System-In-The-Loop) function of OPNET, the tactical communication network simulator allows users to perform interoperability test between M&S models and actual equipment in operating simulation of tactical communication network, which is run on software. In order to confirm the functions and performance of the simulator, small-scale of tactical communication network was configured to make sure interoperability between SITL-based equipment and a large-scale tactical communication network was simulated and checked how to cope with traffic generated for each network node. As the results, we were able to confirm that the simulator is operated properly.

Social Network Effects on Travel Agency Employees' Occupational Outcomes: Innovation Behavior as a Mediator

  • Lee, Byeong-Cheol
    • Journal of Distribution Science
    • /
    • v.15 no.6
    • /
    • pp.13-24
    • /
    • 2017
  • Purpose - The current study aims to examine the effect of social network factors on travel agency employees' occupational outcomes such as job performance and job satisfaction through innovation behavior in a comprehensive model. Research design, data, and methodology - Based on a theory of social network, the concept of social network was assessed by three factors: a) network size, b) network range, and c) tie strength. To test the proposed hypotheses, structural equation modeling (SEM) was employed based on data from 197 travel agency employees in Korea. Result - The results showed that the associational activity of network size had a positive effect on innovation behavior, while the network range of network size had a significant negative effect on innovation behavior. Subsequently, innovation behavior positively influenced on job performance and job satisfaction, respectively. Conclusions - The results offer some insights into the extended model and have important managerial implications for Korean travel agencies. More specifically, considering diverse domains of social network and organizational research, this study advances critical utility of social network factors in a high facilitating level of innovation behavior, which can help travel agency employees promote their job performance and job satisfaction.

SD-ICN: Toward Wide Area Deployable Software Defined Information Centric Networking

  • Xing, Changyou;Ding, Ke;Hu, Chao;Chen, Ming;Xu, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2267-2285
    • /
    • 2016
  • Information Centric Networking that uses content name instead of IP address as routing identifier can handle challenges such as traffic explosion and user mobility, but it also suffers from scalability and incompatibility problems. In this paper by combining the concept of software defined networking and Internet end to end arguments, we propose a wide area deployable software defined information centric networking service model named SD-ICN. SD-ICN employs a dual space structure that separates edge service network and core transmission network. The enhanced SDN techniques are used in edge service network in order to implement intelligent data routing and caching, while traditional IP technique is reserved in core transmission network so as to provide wide area high speed data transmission. Besides, a distributed name resolution system based on the cooperation of different controllers is also presented. The prototype experiments in our campus network show that SD-ICN can be deployed in a scalable and incremental way with no modification of the core network, and can support typical communication modes such as multicast, mobility, multihoming, load balancing, and multipath data transmission effectively.