• Title/Summary/Keyword: Network science

검색결과 13,058건 처리시간 0.037초

양자암호기반의 통신망 구축 및 성능시험 검증연구 (A study on Performance Evaluation for Network Architecture using Quantum Key Distribution Technology)

  • 이원혁;석우진;박찬진;권우창;손일권;김승해;박병연
    • KNOM Review
    • /
    • 제22권2호
    • /
    • pp.39-47
    • /
    • 2019
  • 과학기술연구망(KREONET)에서는 기상기후 정보, 고에너지물리, 천문연구, 위성정보데이터, 유전체 연구데이터 등의 빅데이터 중심 첨단 연구 활동을 지원을 수행하고 있다. 기존의 네트워크 보안장비들이 있는 환경에서는 성능 저하가 발생하기 때문에, 고성능 연구전용 네트워크 상에서 성능저하를 방지하고, 고속 연구협업을 위한 방안들이 연구되고 있다. 또한 최근 이슈가 되는 양자컴퓨터의 등장으로 기존 암호체계를 활용한 보안성에 위협이 되고 있다. 본 논문에서는 단대단(End-to-End)의 고속 연구전용 네트워크상에서 양자암호기반의 통신망 구축을 통하여 물리적 보안성을 강화시키는 환경구축과 고성능 전송테스트를 통하여 양자암호기반 통신망을 구성한다. 물리적 암호화 수행시에 망 성능에 미치는 영향을 분석하여, 고성능 연구협업 네트워크 구축을 위한 기초 자료로 활용하고자 한다.

여성자원활동센터의 네트워크 구축 방안 (Network Construction of Women′s Volunteer Center)

  • 이성철
    • 대한안전경영과학회지
    • /
    • 제5권3호
    • /
    • pp.179-197
    • /
    • 2003
  • Since 1991, so many women's volunteer centers have established in local self governing body or several women's organizations. The aims are to promote and manage women's volunteer activities. For last 12 years, one of aims has been already attained. But the other one is beyond attainment, because there are few network system among women's volunteer centers. For more efficient management of volunteer activities, it is necessary to construct computer network system in every volunteer center. In this paper, we describe current network situation and suggest network construction method of women's volunteer centers.

Clustering Algorithms for Reducing Energy Consumption - A Review

  • Kinza Mubasher;Rahat Mansha
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.109-118
    • /
    • 2023
  • Energy awareness is an essential design flaw in wireless sensor network. Clustering is the most highly regarded energy-efficient technique that offers various benefits such as energy efficiency and network lifetime. Clusters create hierarchical WSNs that introduce the efficient use of limited sensor node resources and thus enhance the life of the network. The goal of this paper is to provide an analysis of the various energy efficient clustering algorithms. Analysis is based on the energy efficiency and network lifetime. This review paper provides an analysis of different energy-efficient clustering algorithms for WSNs.

A study on Advanced Load-Balanced Ad hoc Routing Protocol

  • Lee, Joo-Yeon;Lee, Cheong-Jae;Kim, Yong-Woo;Song, Joo-Seok
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2004년도 춘계학술발표대회
    • /
    • pp.1433-1436
    • /
    • 2004
  • The ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure of centralized administration. Load-Balanced Ad hoc Routing(LBAR) protocol is an on-demand routing protocol intended for delay-sensitive applications where users are most concern with packet transmission delay. Although LBAR mechanism is a novel load balancing routing protocol for ad hoc network, it has own limitation in route path maintenance phase. Therefore, in this paper, we propose Advanced Load-Balanced Ad hoc Routing(A-LBAR) that is delay-sensitive and has an efficient path maintenance scheme. The robust path maintenance scheme is maintained by considering about nodal loads all over network and misbehavior of overloaded or selfish nodes. The proposed scheme provides good performance over DSR and AODV in terms of packet delay and packet loss rate when some misbehaving nodes exist in the network.

  • PDF

Self-Organized Hierarchy Tree Protocol for Energy-Efficiency in Wireless Sensor Networks

  • THALJAOUI, Adel
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.230-238
    • /
    • 2021
  • A sensor network is made up of many sensors deployed in different areas to be monitored. They communicate with each other through a wireless medium. The routing of collected data in the wireless network consumes most of the energy of the network. In the literature, several routing approaches have been proposed to conserve the energy at the sensor level and overcome the challenges inherent in its limitations. In this paper, we propose a new low-energy routing protocol for power grids sensors based on an unsupervised clustering approach. Our protocol equitably harnesses the energy of the selected cluster-head nodes and conserves the energy dissipated when routing the captured data at the Base Station (BS). The simulation results show that our protocol reduces the energy dissipation and prolongs the network lifetime.

Distributed Denial of Service Defense on Cloud Computing Based on Network Intrusion Detection System: Survey

  • Samkari, Esraa;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.67-74
    • /
    • 2022
  • One type of network security breach is the availability breach, which deprives legitimate users of their right to access services. The Denial of Service (DoS) attack is one way to have this breach, whereas using the Intrusion Detection System (IDS) is the trending way to detect a DoS attack. However, building IDS has two challenges: reducing the false alert and picking up the right dataset to train the IDS model. The survey concluded, in the end, that using a real dataset such as MAWILab or some tools like ID2T that give the researcher the ability to create a custom dataset may enhance the IDS model to handle the network threats, including DoS attacks. In addition to minimizing the rate of the false alert.

Examination of Required Functions in the PBNM Scheme for Multiple Domains as Cyber Physical System that Utilizes Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.31-38
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, required functions in the PBNM Scheme for multiple domains as cyber physical system that utilizes data science and AI is examined.

Basic System Design in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.1-7
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, basic system design for PBNM scheme for multi-domain management utilizing data science and AI is proposed.

Time-varying Network Model of Conveyor Systems

  • Kang, Maing-Kyu
    • 한국경영과학회지
    • /
    • 제7권2호
    • /
    • pp.5-29
    • /
    • 1982
  • This paper presents the network models for general dynamic conveyor systems which are characterized by transporting and storing materials between work stations over time. With an appropriate choice of time-slice the conveyor system can be represented exactly as a dynamic flow network which can be solved by an efficient pure network algorithm.

  • PDF

네트워크 기반 확산모형 (Network Based Diffusion Model)

  • 주영진
    • 경영과학
    • /
    • 제32권3호
    • /
    • pp.29-36
    • /
    • 2015
  • In this research, we analyze the sensitivity of the network density to the estimates for the Bass model parameters with both theoretical model and a simulation. Bass model describes the process that the non-adopters in the market potential adopt a new product or an innovation by the innovation effect and imitation effect. The imitation effect shows the word of mouth effect from the previous adopters to non-adopters. But it does not divide the underlying network structure from the strength of the influence over the network. With a network based Bass model, we found that the estimate for the imitation coefficient is highly sensitive to the network density and it is decreasing while the network density is decreasing. This finding implies that the interpersonal influence can be under-looked when the network density is low. It also implies that both of the network density and the interpersonal influence are important to facilitate the diffusion of an innovation.