• 제목/요약/키워드: Physical Network Approach

검색결과 206건 처리시간 0.03초

신경회로망을 이용한 센서 고장진단 및 극복 (Sensor Failure Detection and Accommodation Based on Neural Networks)

  • 이균정;이봉기
    • 한국군사과학기술학회지
    • /
    • 제1권1호
    • /
    • pp.82-91
    • /
    • 1998
  • 본 논문에서는 실제 물리적인 여유 센서를 가지지 않는 수중운동체의 센서 고장진단 및 극복에 관한 문제를 신경회로망을 사용하여 접근하였다. 이를 위하여 설계된 신경회로망은 센서 고장 진단을 위한 신경회로망과 고장 확인 및 대체정보 생성을 위한 신경회로망으로 구성하였으며, 온라인(on-line) 학습을 위하여 확장 역전(Extended Back-Propagation) 학습법을 사용하였다. 시뮬레이션은 수중운동체의 방위변화율 센서에 대하여 수행하였으며, 제안된 기법이 센서에 대한 고장진단기와 센서 추정기로 사용할 수 있음을 확인하였다.

  • PDF

Security Concerns on e-Healthcare System with Countermeasures Applied

  • ;김현호;박제훈;김창균;이훈재
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.256-259
    • /
    • 2013
  • Data and network security for e-Healthcare Systems are a primary concern due to the easiest deployment area accessibility of the sensor devices. Furthermore, they are often interacting closely in cooperation with the physical environment and the surrounding people, where such exposure increases security vulnerabilities in cases of improperly managed security of the information sharing among different healthcare organizations. Hence, healthcare-specific security standards such as authentication, data integrity, system security and internet security are used to ensure security and privacy of patients' information. This paper discusses security threats on e-Healthcare Systems where an attacker can access both data and network using masquerade attack. Moreover, an efficient and cost effective approach for countermeasures is discussed for the delivery of secure services.

  • PDF

Towards a hierarchical global naming framework in network virtualization

  • Che, Yanzhe;Yang, Qiang;Wu, Chunming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.1198-1212
    • /
    • 2013
  • Network virtualization enables autonomous and heterogeneous Virtual Networks (VNs) to co-exist on a shared physical substrate. In a Network Virtualization Environment (NVE), the fact that individual VNs are underpinned by diverse naming mechanisms brings about an obvious challenge for transparent communication across multiple VN domains due to the complexity of uniquely identifying users. Existing solutions were mainly proposed compatible to Internet paradigm with little consideration of their applications in a virtualized environment. This calls for a scalable and efficient naming framework to enable consistent communication across a large user population (fixed or mobile) hosted by multiple VNs. This paper highlights the underlying technical requirements and presents a scalable Global Naming Framework (GNF), which (1) enables transparent communication across multiple VNs owned by the same or different SPs; (2) supports communication in the presence of dynamics induced from both VN and end users; and (3) greatly reduces the network operational complexity (space and time). The suggested approach is assessed through extensive simulation experiments for a range of network scenarios. The numerical result clearly verifies its effectiveness and scalability which enables its application in a large-scale NVE without significant deployment and management hurdles.

운동하는 몸에 대한 생태윤리학적 접근(1): 퇴계의 경을 중심으로 (Eco-ethical Approach to Sporting body: Focusing on Toegye's Gyeong)

  • 이정란
    • 한국체육학회지인문사회과학편
    • /
    • 제55권3호
    • /
    • pp.15-25
    • /
    • 2016
  • 이 연구는 퇴계의 경(敬)을 중심으로 운동하는 몸에 대한 생태윤리학적 접근을 시도하였다. 인간과 자연의 갈등원인은 인간의 욕망에서 비롯된 잘못된 자연관을 들 수 있다. 퇴계는 욕망의 문제를 경을 통해 극복할 수 있다고 보았다. 퇴계 경사상의 생태윤리학적 접근 가능성은 다음과 같다. 첫째, 퇴계의 경은 자연 속에서 완성된 것이기에 가능하다. 둘째, 퇴계의 경은 자연에 대한 인간의 책임(배려)을 강조한다. 셋째, 경은 도덕 실천능력과 연관되기 때문이다. 한편, 퇴계는 '몸을 잘 보존하는 것'이 자기보존인 동시에 자연의 순리를 따르는 천리의 의미로 이해하였다. 이러한 관점에서 운동하는 몸은 신체건강과 마음건강의 의미가 존재하며 동시에 인간과 자연을 하나의 관계망으로 이해하여 자연 질서를 따르는 생태적 가치의 측면도 존재한다. 운동하는 몸을 통한 경의 획득은 '경신(敬身)'과 '활경(活敬)'의 실천을 제안한다. 자연과 함께하는 신체운동을 할 때 몸을 공경하는 '경신'의 단계에 머무르는 것뿐만 아니라 생태환경을 보전(活敬)하면서 자연을 통해 요산요수(樂山樂水)의 덕을 함양하는 단계로 나아가는 것이다.

Indoor Passive Location Tracking and Activity Monitoring using WSN for Ubiquitous Healthcare

  • Singh, Vinay Kumar;Lee, Seung-Chul;Lim, Hyo-Taek;Myllyla, Risto;Chung, Wan-Young
    • Journal of information and communication convergence engineering
    • /
    • 제5권4호
    • /
    • pp.382-388
    • /
    • 2007
  • Indoor location system using wireless sensor network technology was applied for the status evaluation and activity monitoring of elderly person or chronic invalid at home. Location awareness application is transparent to the daily activities, while providing the embedded computing infrastructure with an awareness of what is happening in this space. To locate an object, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. By using only the sensor nodes without any external network infrastructure the cost of the system was reduced while the accuracy in our experiments. was fairly good and fine grained between 7 and 15 cm for location awareness in indoor environments. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object and several applications are enabled for context awareness.

트래픽 그루밍을 이용한 SONET/WDM 단방향, 양방향 링 네트워크의 경제성 분석 (Economic Analysis of SONET/WDM UPSR and BLSR Ring Networks Using Traffic Grooming)

  • 강동한;박성수
    • 대한산업공학회지
    • /
    • 제30권3호
    • /
    • pp.213-223
    • /
    • 2004
  • We consider the traffic grooming problem for the design of SONET/WDM(Synchronous Optical NETwork/Wavelength Division Multiplexing) ring networks. Given a physical network with ring topology and a set of traffic demands between pairs of nodes, we are to obtain a stack of rings with the objective of minimizing the number of ADMs installed at the nodes. This problem arises when a single ring capacity is not large enough to accommodate all the demands. As a solution method, an efficient algorithm based on the branch-and-price approach has been reported in the literature for the problem in which only unidirecional path switched ring (UPSR) was considered. In this study, we suggest integer programming models and the algorithms based on the same approach as the above one, considering two-fiber bidirectional line switched ring(BLSR/2), and BLSR/4 additionally. Using the results, we compare the number of required ADMs for all types of the ring architecture.

다단계 재구성 가능한 광 네트워크상에서 가상 토폴로지 관리 정책 (A Virtual Topology Management Policy in Multi-Stage Reconfigurable Optical Networks)

  • Ji-Eun Keum;Lin Zhang;Chan-Hyun Youn
    • 한국정보과학회논문지:정보통신
    • /
    • 제30권1호
    • /
    • pp.1-8
    • /
    • 2003
  • 본 논문에서는 광 인터넷의 가상 토폴로지 재구성을 효과적으로 관리하는 정책을 제시한다. 기존의 휴리스틱 기법의 근사 문제를 해결하기 위해 트래픽 예측 기반 다단계 재구성 알고리즘을 바탕으로 트래픽 패턴과 망 혼잡 정도의 변화에 따라 적응적인 토폴로지 재구성 기법을 제시한다. 이 알고리즘은 네트워크의 상태를 고려하여 적정 재구성 시기를 결정함으로써 가상망의 관리를 단순화한다. 시뮬레이션 결과, 제안된 가상망 관리 정책이 물리적인 자원 사용이 제한될 때 기존의 방법에 비해 좋은 성능을 보인다.

Prediction of concrete spall damage under blast: Neural approach with synthetic data

  • Dauji, Saha
    • Computers and Concrete
    • /
    • 제26권6호
    • /
    • pp.533-546
    • /
    • 2020
  • The prediction of spall response of reinforced concrete members like columns and slabs have been attempted by earlier researchers with analytical solutions, as well as with empirical models developed from data generated from physical or numerical experiments, with different degrees of success. In this article, compared to the empirical models, more versatile and accurate models are developed based on model-free approach of artificial neural network (ANN). Synthetic data extracted from the results of numerical experiments from literature have been utilized for the purpose of training and testing of the ANN models. For two concrete members, namely, slabs and columns, different sets of ANN models were developed, each of which proved to have definite advantages over the corresponding empirical model reported in literature. In case of slabs, for all three categories of spall, the ANN model results were superior to the empirical models as evaluated by the various performance metrics, such as correlation, root mean square error, mean absolute error, maximum overestimation and maximum underestimation. The ANN models for each category of column spall could handle three variables together: namely, depth, spacing of longitudinal and transverse reinforcement, as contrasted to the empirical models that handled one variable at a time, and at the same time yielded comparable performance. The application of the ANN models for spall prediction of concrete slabs and columns developed in this study has been discussed along with their limitations.

Development of field programmable gate array-based encryption module to mitigate man-in-the-middle attack for nuclear power plant data communication network

  • Elakrat, Mohamed Abdallah;Jung, Jae Cheon
    • Nuclear Engineering and Technology
    • /
    • 제50권5호
    • /
    • pp.780-787
    • /
    • 2018
  • This article presents a security module based on a field programmable gate array (FPGA) to mitigate man-in-the-middle cyber attacks. Nowadays, the FPGA is considered to be the state of the art in nuclear power plants I&C systems due to its flexibility, reconfigurability, and maintainability of the FPGA technology; it also provides acceptable solutions for embedded computing applications that require cybersecurity. The proposed FPGA-based security module is developed to mitigate information-gathering attacks, which can be made by gaining physical access to the network, e.g., a man-in-the-middle attack, using a cryptographic process to ensure data confidentiality and integrity and prevent injecting malware or malicious data into the critical digital assets of a nuclear power plant data communication system. A model-based system engineering approach is applied. System requirements analysis and enhanced function flow block diagrams are created and simulated using CORE9 to compare the performance of the current and developed systems. Hardware description language code for encryption and serial communication is developed using Vivado Design Suite 2017.2 as a programming tool to run the system synthesis and implementation for performance simulation and design verification. Simple windows are developed using Java for physical testing and communication between a personal computer and the FPGA.

Prediction of Student's Interest on Sports for Classification using Bi-Directional Long Short Term Memory Model

  • Ahamed, A. Basheer;Surputheen, M. Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.246-256
    • /
    • 2022
  • Recently, parents and teachers consider physical education as a minor subject for students in elementary and secondary schools. Physical education performance has become increasingly significant as parents and schools pay more attention to physical schooling. The sports mining with distribution analysis model considers different factors, including the games, comments, conversations, and connection made on numerous sports interests. Using different machine learning/deep learning approach, children's athletic and academic interests can be tracked over the course of their academic lives. There have been a number of studies that have focused on predicting the success of students in higher education. Sports interest prediction research at the secondary level is uncommon, but the secondary level is often used as a benchmark to describe students' educational development at higher levels. An Automated Student Interest Prediction on Sports Mining using DL Based Bi-directional Long Short-Term Memory model (BiLSTM) is presented in this article. Pre-processing of data, interest classification, and parameter tweaking are all the essential operations of the proposed model. Initially, data augmentation is used to expand the dataset's size. Secondly, a BiLSTM model is used to predict and classify user interests. Adagrad optimizer is employed for hyperparameter optimization. In order to test the model's performance, a dataset is used and the results are analysed using precision, recall, accuracy and F-measure. The proposed model achieved 95% accuracy on 400th instances, where the existing techniques achieved 93.20% accuracy for the same. The proposed model achieved 95% of accuracy and precision for 60%-40% data, where the existing models achieved 93% for accuracy and precision.