• Title/Summary/Keyword: Technology network analysis

Search Result 3,917, Processing Time 0.04 seconds

Analysis of MANET's Routing Protocols, Security Attacks and Detection Techniques- A Review

  • Amina Yaqoob;Alma Shamas;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.23-32
    • /
    • 2024
  • Mobile Ad hoc Network is a network of multiple wireless nodes which communicate and exchange information together without any fixed and centralized infrastructure. The core objective for the development of MANET is to provide movability, portability and extensibility. Due to infrastructure less network topology of the network changes frequently this causes many challenges for designing routing algorithms. Many routing protocols for MANET have been suggested for last few years and research is still going on. In this paper we review three main routing protocols namely Proactive, Reactive and Hybrid, performance comparison of Proactive such as DSDV, Reactive as AODV, DSR, TORA and Hybrid as ZRP in different network scenarios including dynamic network size, changing number of nodes, changing movability of nodes, in high movability and denser network and low movability and low traffic. This paper analyzes these scenarios on the performance evaluation metrics e.g. Throughput, Packet Delivery Ratio (PDR), Normalized Routing Load(NRL) and End To-End delay(ETE).This paper also reviews various network layer security attacks challenge by routing protocols, detection mechanism proposes to detect these attacks and compare performance of these attacks on evaluation metrics such as Routing Overhead, Transmission Delay and packet drop rates.

A Hierarchical Autonomous System Based Topology Control Algorithm in Space Information Network

  • Zhang, Wei;Zhang, Gengxin;Gou, Liang;Kong, Bo;Bian, Dongming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3572-3593
    • /
    • 2015
  • This article investigates the topology control problem in the space information network (SIN) using a hierarchical autonomous system (AS) approach. We propose an AS network topology control (AS-TC) algorithm to minimize the time delay in the SIN. Compared with most existing approaches for SIN where either the purely centralized or the purely distributed control method is adopted, the proposed algorithm is a hybrid control method. In order to reduce the cost of control, the control message exchange is constrained among neighboring sub-AS networks. We prove that the proposed algorithm achieve logical k-connectivity on the condition that the original physical topology is k-connectivity. Simulation results validate the theoretic analysis and effectiveness of the AS-TC algorithm.

Priority Analysis for Software Functions Using Social Network Analysis and DEA(Data Envelopment Analysis) (사회연결망 분석과 자료포락분석 기법을 이용한 소프트웨어 함수 우선순위 분석 연구)

  • Huh, Sang Moo;Kim, Woo Je
    • Journal of Information Technology Services
    • /
    • v.17 no.3
    • /
    • pp.171-189
    • /
    • 2018
  • To remove software defects and improve performance of software, many developers perform code inspections and use static analysis tools. A code inspection is an activity that is performed manually to detect software defects in the developed source. However, there is no clear criterion which source codes are inspected. A static analysis tool can automatically detect software defects by analyzing the source codes without running the source codes. However, it has disadvantage that analyzes only the codes in the functions without analyzing the relations among source functions. The functions in the source codes are interconnected and formed a social network. Functions that occupy critical locations in a network can be important enough to affect the overall quality. Whereas, a static analysis tool merely suggests which functions were called several times. In this study, the core functions will be elicited by using social network analysis and DEA (Data Envelopment Analysis) for CUBRID open database sources. In addition, we will suggest clear criteria for selecting the target sources for code inspection and will suggest ways to find core functions to minimize defects and improve performance.

A Study on Forecast of the Promising Fusion Technology by US Patent Analysis (특허분석을 통한 유망융합기술의 예측)

  • Gang, Hui-Jong;Eom, Mi-Jeong;Kim, Dong-Myeong
    • Journal of Technology Innovation
    • /
    • v.14 no.3
    • /
    • pp.93-116
    • /
    • 2006
  • This study provides a quantitative forecasting method to identify promising fusion technology and it also applies the method based on patent analysis to IT. This study defines fusion technology, promising technology, fusion index, promising index and promising fusion technology. From the analysis, this study found that the next generation computer network is the most promising in IT area. This result is consistent with the forecasts made by the interviews and discussion of experts.

  • PDF

A Study on Gamification Consumer Perception Analysis Using Big Data

  • Se-won Jeon;Youn Ju Ahn;Gi-Hwan Ryu
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.3
    • /
    • pp.332-337
    • /
    • 2023
  • The purpose of the study was to analyze consumers' perceptions of gamification. Based on the analyzed data, we would like to provide data by systematically organizing the concept, game elements, and mechanisms of gamification. Recently, gamification can be easily found around medical care, corporate marketing, and education. This study collected keywords from social media portal sites Naver, Daum, and Google from 2018 to 2023 using TEXTOM, a social media analysis tool. In this study, data were analyzed using text mining, semantic network analysis, and CONCOR analysis methods. Based on the collected data, we looked at the relevance and clusters related to gamification. The clusters were divided into a total of four clusters: 'Awareness of Gamification', 'Gamification Program', 'Future Technology of Gamification', and 'Use of Gamification'. Through social media analysis, we want to investigate and identify consumers' perceptions of gamification use, and check market and consumer perceptions to make up for the shortcomings. Through this, we intend to develop a plan to utilize gamification.

Preliminary Hazard Analysis for Communication Software in Train Communication Network (열차 차상 통신용 소프트웨어의 사전 위험원 분석 연구)

  • Yim, Hyun-Jae;Cha, Gi-Ho;Song, Gyu-Youn
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.9
    • /
    • pp.1379-1384
    • /
    • 2017
  • To guarantee safety and reliability, RAMS(Reliability Availability Maintainability and Safety) activity for a communication software in train communication network is studied. In this paper, preliminary hazard analysis in RAMS activities is studied for the communication software. Preliminary hazard analysis is done through library for communication software that the specification is defined by IEC 61375. The hazards are defined, then causes and consequence for each hazard are defined. The total 36 preliminary hazards are classified. For high severity hazards are changed to acceptable level by upgrading of system requirement specification.

An ECG Monitoring and Analysis Method for Ubiquitous Healthcare System in WSN

  • Bhardwaj, Sachin;Lee, Dae-Seok;Chung, Wan-Young
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.1
    • /
    • pp.7-11
    • /
    • 2007
  • The aim of this paper is to design and implement a new ECG signal monitoring and analysis method for the home care of elderly persons or patients, using wireless sensor network (WSN) technology. The wireless technology for home-care purpose gives new possibilities for monitoring of vital parameter with wearable biomedical sensors and will give the patient freedom to be mobile and still be under continuously monitoring. Developed platform for portable real-time analysis of ECG signals can be used as an advanced diagnosis and alarming system. The ECG features are used to detect life-threatening arrhythmias, with an emphasis on the software for analyzing the P-wave, QRS complex, and T-wave in ECG signals at server after receiving data from base station. Based on abnormal ECG activity, the server transfer diagnostic results and alarm conditions to a doctor's PDA. Doctor can diagnose the patients who have survived from arrhythmia diseases.

Movie Popularity Classification Based on Support Vector Machine Combined with Social Network Analysis

  • Dorjmaa, Tserendulam;Shin, Taeksoo
    • Journal of Information Technology Services
    • /
    • v.16 no.3
    • /
    • pp.167-183
    • /
    • 2017
  • The rapid growth of information technology and mobile service platforms, i.e., internet, google, and facebook, etc. has led the abundance of data. Due to this environment, the world is now facing a revolution in the process that data is searched, collected, stored, and shared. Abundance of data gives us several opportunities to knowledge discovery and data mining techniques. In recent years, data mining methods as a solution to discovery and extraction of available knowledge in database has been more popular in e-commerce service fields such as, in particular, movie recommendation. However, most of the classification approaches for predicting the movie popularity have used only several types of information of the movie such as actor, director, rating score, language and countries etc. In this study, we propose a classification-based support vector machine (SVM) model for predicting the movie popularity based on movie's genre data and social network data. Social network analysis (SNA) is used for improving the classification accuracy. This study builds the movies' network (one mode network) based on initial data which is a two mode network as user-to-movie network. For the proposed method we computed degree centrality, betweenness centrality, closeness centrality, and eigenvector centrality as centrality measures in movie's network. Those four centrality values and movies' genre data were used to classify the movie popularity in this study. The logistic regression, neural network, $na{\ddot{i}}ve$ Bayes classifier, and decision tree as benchmarking models for movie popularity classification were also used for comparison with the performance of our proposed model. To assess the classifier's performance accuracy this study used MovieLens data as an open database. Our empirical results indicate that our proposed model with movie's genre and centrality data has by approximately 0% higher accuracy than other classification models with only movie's genre data. The implications of our results show that our proposed model can be used for improving movie popularity classification accuracy.

A Study on the Effect of Evaluators' Network on the Efficiency of Nuclear Program in Korean R&D Program (평가위원간 네트워크가 국가연구개발사업의 효율성에 미치는 영향에 관한 연구 - 원자력연구개발사업을 중심으로 -)

  • Kim, Tae-Hee
    • Journal of Korea Technology Innovation Society
    • /
    • v.13 no.4
    • /
    • pp.794-816
    • /
    • 2010
  • To explore the answer on how the evaluators' network affects efficiency of National R&D Program, this paper analyzes the network of evaluators who attended the peer-review committee for National Nuclear R&D Program from 2007 to 2008. The result derived from network analysis was applied to measure the efficiency of programs by Data Envelopment Analysis. The result shows that the weaker network produces higher efficiency as much as the research result itself. Along with the expertise of evaluators themselves, this paper implies that network should be considered as a main item for evaluation.

  • PDF

Routing protocol Analysis for Minimum delay Between Hierarchical node in Low Power Sensor Network (저 전력 센서 네트워크에서의 계층 노드 간 지연 감소를 위한 라우팅 프로토콜 분석)

  • Kim, Dong Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1721-1726
    • /
    • 2014
  • The sensor network technology for core technology of ubiquitous computing is in the spotlight recently, the research on sensor network is proceeding actively which is composed many different sensor node. The major traffic patterns of plenty of sensor networks are composed of collecting types of single directional data, which is transmitting packets from several sensor nodes to sink node. One of the important condition for design of sensor node is to extend for network life which is to minimize power-consumption under the limited resources of sensor network. In this paper analysis used routing protocols using the network simulation that was used second level cluster structure to reduce delay and power-consumption of sensor node.