• Title/Summary/Keyword: conflict detection

Search Result 74, Processing Time 0.915 seconds

Management of Neighbor Cell Lists and Physical Cell Identifiers in Self-Organizing Heterogeneous Networks

  • Lim, Jae-Chan;Hong, Dae-Hyoung
    • Journal of Communications and Networks
    • /
    • v.13 no.4
    • /
    • pp.367-376
    • /
    • 2011
  • In this paper, we propose self-organizing schemes for the initial configuration of the neighbor cell list (NCL), maintenance of the NCL, and physical cell identifier (PCI) allocation in heterogeneous networks such as long term evolution systems where lower transmission power nodes are additionally deployed in macrocell networks. Accurate NCL maintenance is required for efficient PCI allocation and for avoiding handover delay and redundantly increased system overhead. Proposed self-organizing schemes for the initial NCL configuration and PCI allocation are based on evolved universal terrestrial radio access network NodeB (eNB) scanning that measures reference signal to interference and noise ratio and reference symbol received power, respectively, transmitted from adjacent eNBs. On the other hand, the maintenance of the NCL is managed by adding or removing cells based on periodic user equipment measurements. We provide performance analysis of the proposed schemes under various scenarios in the respects of NCL detection probability, NCL false alarm rate, handover delay area ratio, PCI conflict ratio, etc.

Topic maps Matching and Merging Techniques based on Partitioning of Topics (토픽 분할에 의한 토픽맵 매칭 및 통합 기법)

  • Kim, Jung-Min;Chung, Hyun-Sook
    • The KIPS Transactions:PartD
    • /
    • v.14D no.7
    • /
    • pp.819-828
    • /
    • 2007
  • In this paper, we propose a topic maps matching and merging approach based on the syntactic or semantic characteristics and constraints of the topic maps. Previous schema matching approaches have been developed to enhance effectiveness and generality of matching techniques. However they are inefficient because the approaches should transform input ontologies into graphs and take into account all the nodes and edges of the graphs, which ended up requiring a great amount of processing time. Now, standard languages for developing ontologies are RDF/OWL and Topic Maps. In this paper, we propose an enhanced version of matching and merging technique based on topic partitioning, several matching operations and merging conflict detection.

An Analysis and Evaluation of Policy-Based Network Management Approaches (정책기반 네트워크 관리 구조의 분석과 평가)

  • Lim Hyung J.;Lee Hyun J.;Lee Jong H.;Chung Tai M.
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.289-300
    • /
    • 2005
  • This paper proposed an analytical framework to compare and model the policy-based network management; centralized and distributed typed model. Policy-based network is introduced in various application fields, and a policy framework can offer different processing performance according to application. Therefore, we evaluated the performance and extensibility of each PBNM model when we apply the policy process to the models. The evaluated measurement metrics are policy provisioning time, traffic occurrence amount, PDP processing rate, and global conflict detection in qualitative simulation. The results show that the suitable structure is required according to the analysis for the careful application characteristics, when PBNM is adopted. The modeling framework presented in this paper is intended to quantify the merits and demerits among the currently suggested PBNM models.

Concurrency Conflicts Resolution for IoT Using Blockchain Technology

  • Morgan, Amr;Tammam, Ashraf;Wahdan, Abdel-Moneim
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.331-340
    • /
    • 2021
  • The Internet of Things (IoT) is a rapidly growing physical network that depends on objects, vehicles, sensors, and smart devices. IoT has recently become an important research topic as it autonomously acquires, integrates, communicates, and shares data directly across each other. The centralized architecture of IoT makes it complex to concurrently access control them and presents a new set of technological limitations when trying to manage them globally. This paper proposes a new decentralized access control architecture to manage IoT devices using blockchain, that proposes a solution to concurrency management problems and enhances resource locking to reduce the transaction conflict and avoids deadlock problems. In addition, the proposed algorithm improves performance using a fully distributed access control system for IoT based on blockchain technology. Finally, a performance comparison is provided between the proposed solution and the existing access management solutions in IoT. Deadlock detection is evaluated with the latency of requesting in order to examine various configurations of our solution for increasing scalability. The main goal of the proposed solution is concurrency problem avoidance in decentralized access control management for IoT devices.

Rollback Dependency Detection and Management with Data Consistency in Collaborative Transactional Workflows (협력 트랜잭셔널 워크플로우에서 데이터 일관성을 고려한 철회 종속성 감지 및 관리)

  • Byun, Chang-Woo;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.30 no.2
    • /
    • pp.197-208
    • /
    • 2003
  • Abstract Workflow is not appropriately applied to coordinated execution of applications(steps) that comprise business process such as a collaborative series of tasks because of the lacks of network infra, standard of information exchange and data consistency management with conflict mode of shared data. Particularly we have not mentioned the problem which can be occurred by shared data with conflict mode. In this paper, to handle data consistency in the process of rollback for failure handling or recovery policy, we have classified rollback dependency into three types such as implicit rollback dependency in a transactional workflow, implicit rollback dependency in collaborative transactional workflows and explicit rollback dependency in collaborative transactional workflows. Also, we have proposed the rollback dependency compiler that determines above three types of rollback dependency. A workflow designer specifies the workflow schema and the resources accessed by the steps from a global database of resources. The rollback dependency compiler generates the enhanced workflow schema with the rollback dependency specification. The run-time system interprets this specification and executes the rollback policy with data consistency if failure of steps is occurred. After all, this paper can offer better correctness and performance than state-of-the-art WFMSs.

PRC Maritime Operational Capability and the Task for the ROK Military (중국군의 해양작전능력과 한국군의 과제)

  • Kim, Min-Seok
    • Strategy21
    • /
    • s.33
    • /
    • pp.65-112
    • /
    • 2014
  • Recent trends show that the PRC has stepped aside its "army-centered approach" and placed greater emphasis on its Navy and Air Force for a wider range of operations, thereby reducing its ground force and harnessing its economic power and military technology into naval development. A quantitative growth of the PLA Navy itself is no surprise as this is not a recent phenomenon. Now is the time to pay closer attention to the level of PRC naval force's performance and the extent of its warfighting capacity in the maritime domain. It is also worth asking what China can do with its widening naval power foundation. In short, it is time to delve into several possible scenarios I which the PRC poses a real threat. With this in mind, in Section Two the paper seeks to observe the construction progress of PRC's naval power and its future prospects up to the year 2020, and categorize time frame according to its major force improvement trends. By analyzing qualitative improvements made over time, such as the scale of investment and the number of ships compared to increase in displacement (tonnage), this paper attempts to identify salient features in the construction of naval power. Chapter Three sets out performance evaluation on each type of PRC naval ships as well as capabilities of the Navy, Air Force, the Second Artillery (i.e., strategic missile forces) and satellites that could support maritime warfare. Finall, the concluding chapter estimates the PRC's maritime warfighting capability as anticipated in respective conflict scenarios, and considers its impact on the Korean Peninsula and proposes the directions ROK should steer in response. First of all, since the 1980s the PRC navy has undergone transitions as the focus of its military strategic outlook shifted from ground warfare to maritime warfare, and within 30 years of its effort to construct naval power while greatly reducing the size of its ground forces, the PRC has succeeded in building its naval power next to the U.S.'s in the world in terms of number, with acquisition of an aircraft carrier, Chinese-version of the Aegis, submarines and so on. The PRC also enjoys great potentials to qualitatively develop its forces such as indigenous aircraft carriers, next-generation strategic submarines, next-generation destroyers and so forth, which is possible because the PRC has accumulated its independent production capabilities in the process of its 30-year-long efforts. Secondly, one could argue that ROK still has its chances of coping with the PRC in naval power since, despite its continuous efforts, many estimate that the PRC naval force is roughly ten or more years behind that of superpowers such as the U.S., on areas including radar detection capability, EW capability, C4I and data-link systems, doctrines on force employment as well as tactics, and such gap cannot be easily overcome. The most probable scenarios involving the PRC in sea areas surrounding the Korean Peninsula are: first, upon the outbreak of war in the peninsula, the PRC may pursue military intervention through sea, thereby undermining efforts of the ROK-U.S. combined operations; second, ROK-PRC or PRC-Japan conflicts over maritime jurisdiction or ownership over the Senkaku/Diaoyu islands could inflict damage to ROK territorial sovereignty or economic gains. The PRC would likely attempt to resolve the conflict employing blitzkrieg tactics before U.S. forces arrive on the scene, while at the same time delaying and denying access of the incoming U.S. forces. If this proves unattainable, the PRC could take a course of action adopting "long-term attrition warfare," thus weakening its enemy's sustainability. All in all, thiss paper makes three proposals on how the ROK should respond. First, modern warfare as well as the emergent future warfare demonstrates that the center stage of battle is no longer the domestic territory, but rather further away into the sea and space. In this respect, the ROKN should take advantage of the distinct feature of battle space on the peninsula, which is surrounded by the seas, and obtain capabilities to intercept more than 50 percent of the enemy's ballistic missiles, including those of North Korea. In tandem with this capacity, employment of a large scale of UAV/F Carrier for Kill Chain operations should enhance effectiveness. This is because conditions are more favorable to defend from sea, on matters concerning accuracy rates against enemy targets, minimized threat of friendly damage, and cost effectiveness. Second, to maintain readiness for a North Korean crisis where timely deployment of US forces is not possible, the ROKN ought to obtain capabilities to hold the enemy attack at bay while deterring PRC naval intervention. It is also argued that ROKN should strengthen its power so as to protect national interests in the seas surrounding the peninsula without support from the USN, should ROK-PRC or ROK-Japan conflict arise concerning maritime jurisprudence. Third, the ROK should fortify infrastructures for independent construction of naval power and expand its R&D efforts, and for this purpose, the ROK should make the most of the advantages stemming from the ROK-U.S. alliance inducing active support from the United States. The rationale behind this argument is that while it is strategically effective to rely on alliance or jump on the bandwagon, the ultimate goal is always to acquire an independent response capability as much as possible.

Advanced Freeway Traffic Safety Warning Information System based on Surrogate Safety Measures (SSM): Information Processing Methods (Surrogate Safety Measures(SSM)기반 고속도로 교통안전 경고정보 처리 및 가공기법)

  • O, Cheol;O, Ju-Taek;Song, Tae-Jin;Park, Jae-Hong;Kim, Tae-Jin
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.3
    • /
    • pp.59-70
    • /
    • 2009
  • This study presents a novel traffic information system which is capable of detecting unsafe traffic events leading to accident occurrence and providing warning information to drivers for safer driving. Unsafe traffic events are captured by a vehicle image processing-based detection system in real time. Surrogate safety measures (SSM) representing quantitative accident potentials were derived, and further utilized to develop a data processing algorithm and analysis techniques in the proposed system. This study also defined 'emergency warning area' and 'general warning area' for more effective provision of warning information. In addition, methodologies for determining thresholds to trigger warning information were presented. Technical issues and further studies to fully exploit the benefits of the proposed system were discussed. It is expected that the proposed system would be effective for better management of traffic flow to prevent traffic accidents on freeways.

Enhancement of Sampling Based DDoS Detecting System for SDN (소프트웨어 정의 네트워크를 위한 샘플링 기반 서비스거부공격 탐지 시스템 개선)

  • Nguyen, Sinhngoc;Choi, Jintae;Kim, Kyungbaek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.315-318
    • /
    • 2017
  • Nowadays, Distributed Denial of Service (DDoS) attacks have gained increasing popularity and have been a major factor in a number of massive cyber-attacks. It could easily exhaust the computing and communicating resources of a victim within a short period of time. Therefore, we have to find the method to detect and prevent the DDoS attack. Recently, there have been some researches that provide the methods to resolve above problem, but it still gets some limitations such as low performance of detecting and preventing, scope of method, most of them just use on cloud server instead of network, and the reliability in the network. In this paper, we propose solutions for (1) handling multiple DDoS attacks from multiple IP address and (2) handling the suspicious attacks in the network. For the first solution, we assume that there are multiple attacks from many sources at a times, it should be handled to avoid the conflict when we setup the preventing rule to switches. In the other, there are many attacks traffic with the low volume and same destination address. Although the traffic at each node is not much, the traffic at the destination is much more. So it is hard to detect that suspicious traffic with the sampling based method at each node, our method reroute the traffic to another server and make the analysis to check it deeply.

Dynamic Round size Decision Algorithm for Identification of REID Tag (RFID 태그 인식을 위한 동적 Round Size 결정 알고리즘)

  • Lee Seung-Hyuk;Park Il-Yong;Cho Tae-Kyung;Yoo Hyun-Joong;Park Byoung-Soo;Baek Hyun-Ok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.3
    • /
    • pp.373-378
    • /
    • 2006
  • One of the biggest problems that should be solved in present RFID systems is a reduction of identification efficiency by the collision of singals between different tags. As the number of tags, which should be identified, increases over the size of allocated round, more slots experiences the collision between them. It can causes generation of tag collision assigning the fixed round size and so, allocated round size should be regulated properly. This paper proposes the algorithm which can reduce collision between tags, and allocate specific round size dynamically for efficient tag identification. After each round is finished, the reader allocates the round size dynamically using the collision information of the slot. All collision informations of the slot consists of the number of slots which came into conflict, tags which were realized properly without any conflictions and empty slots. We used slotted aloha algorithm as the collision detection algorithm and finally, checked that this could be used very usefully when this algorithm which was proposed effectively could not know how many number of tags were exisisted through the simulation in advance.

  • PDF

A Development of Central Policy Database for managing Heterogeneous Firewall Systems (이종의 침입 차단시스템 관리를 위한 중앙 정책 데이터베이스 개발)

  • Lee, Dong-Young;Chung, Tai-Myoung
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1063-1070
    • /
    • 2002
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from intrusions and attacks, many vendors have developed various security systems such as firewalls and intrusion detection systems. However, managing these systems individually demands too much work and high cost. Thus, integrated and autonomous security management for various security products has become more important. In this paper, we present the architecture of the WISMSF (Web-based Integrated Security Management System for Firewalls) and the merits of centralized approach for managing heterogeneous firewalls and implement the prototype of the central policy database that is a component of the WISMSF engine. The WISMSF engine supports an integrated view for policies, the integrity of polities and the easy recovery and addition of policies. And also, we define the policy conflicts of WISMSF and present the policy recovery process to support to the policies consistence.