• Title/Summary/Keyword: existing network

Search Result 5,650, Processing Time 0.047 seconds

IDs Assignment of Hybrid Method for Efficient and Secure USN (Ubiquitous Sensor Networks) (효율적인 안전한 유비쿼터스 센서 네트워크를 위한 하이브리드 방식의 아이디 할당)

  • Sung, Soon-Hwa
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.15-25
    • /
    • 2008
  • Due to the differences between a mobile ad-hoc network and a sensor network, the pre-existing autoconfiguration for a mobile ad-hoc network cannot be simply applied to a sensor network. But. a mechanism is still necessary to assign locally unique addresses to sensor nodes efficiently. This paper proposes a hybrid IDs assignment scheme of local area sensor networks. The IDs assignment scheme of hybrid method combines a proactive IDs assignment with a reactive IDs assignment scheme. The proposed scheme considers efficient communication using reactive IDs assignment, and security for potential attacks using zone-based self-organized clustering with Byzantine Agreement in sensor networks. Thus, this paper has solved the shortage of security due to minimizing network traffic and the problem of repairing the network from the effects of an aberrant node in sensor networks.

  • PDF

On the Enhancement of the Recognition Performance for Back Propagation Neural Networks (역전파 선경회로망의 인식성능 향상에 관한 연구)

  • 홍봉화;이지영
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.4
    • /
    • pp.86-93
    • /
    • 1999
  • This paper proposes the multi-modular neural network and compensative input algorithm. The former is to reduce convergence speed which is one of the neural network's inveterate problems, and the latter is to improve the recognition performance of the neural network. This paper consists of two major parts and a simulation. First, it shows the structure of mu1ti-modular neural network, which is applied to the recognition of Korean, English characters and numbers. Second, it describes the compensative input algorithm and shows the steps that determine the compensative input. The proposed algorithm was tested and compared with the existing neural networks in the recognition of Korean and English characters and numbers. The convergence speed is three times or more faster than the existing neural network. In the case that compensative input was applied to neural network, the recognition rate was improved more than 10%.

  • PDF

A Study on Metaphor Characteristics of Social Network Service (소셜 네트워크 서비스의 은유적 특성 연구)

  • Han, Hye-Won;Moon, ARum
    • Journal of Digital Contents Society
    • /
    • v.15 no.5
    • /
    • pp.621-630
    • /
    • 2014
  • The purpose of this study is to extract metaphor characteristics of Social Network Service. Social Network Service is different from existing media only available in one-way communication, each individual expands opinion by sharing daily life and opinion directly and interpreting another user's post. This Study premise that the reason of converting from passive reader to active enunciator is the metaphor characteristics of Social Network Service by 'Source Domain' and 'Target Domain'. In addition, this study examines the meaning of structure user's text production and interpreting based triple mimesis of Paul Ricoeur. This study has significance as arguing with existing study on SNS as metonymic media and suggesting metaphor characteristics and meaning of Social Network Service.

A Study on Butter Managment Mechanism for Efficient Cell Transmission in ATM Network (ATM망에서 효율적인 셀 전송을 위한 버퍼 관리 기법에 관한 연구)

  • 양신현;서진교;김준년;김영일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.4
    • /
    • pp.782-792
    • /
    • 1997
  • Asynchronous transfer mode (ATM) provides the means to support with variety of multimedia serivices in broadband network. For the support of multimedia services, various data traffic with priortes should be controlled errectively and congestion function is required in the network to carry out the control operation. To accomplish this in a flexible and effective manner, priorty classes for the different services are commonly used. In this paper, we suggested a buffer managment algorithm in ATM network to improve overall network performance with separated buffer which consists of existing buffer with threshold andauxiliary buffer whose input consists of superposition of voice and data traffic. To evaluate the proposed buffer managment algorithms, simulations are excuted with two proiorities and the results are provied that network throughput is improved better than the existing parital buffer method.

  • PDF

A Study for Improving WSNs(Wireless Sensor Networks) Performance using Clustering and Location Information (Clustering 및 위치정보를 활용한 WSN(Wireless Sensor Network) 성능 향상 방안 연구)

  • Jeon, Jin-han;Hong, Seong-hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.260-263
    • /
    • 2019
  • Recently, the need of researches and developments about WSN(Wireless Sensor Network) technologies, which can be applied to services to regions where the access is difficult or services that require continuous monitoring, has gradually increased due to its expansion and efficiency of the application areas. In this paper, we analyze existing researches which focused on reducing packet loss rate and increasing lifetime of sensor nodes. Then, we conduct studies about performance improvement factors where some schemes - clustering and location-based approaches - are applied and compare our study results with existing researches. Based on our studies, we are planning to conduct researches about a new scheme that could contribute to improve WSN's performance in terms of packet loss rate and network lifetime.

  • PDF

Detection and Localization of Image Tampering using Deep Residual UNET with Stacked Dilated Convolution

  • Aminu, Ali Ahmad;Agwu, Nwojo Nnanna;Steve, Adeshina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.203-211
    • /
    • 2021
  • Image tampering detection and localization have become an active area of research in the field of digital image forensics in recent times. This is due to the widespread of malicious image tampering. This study presents a new method for image tampering detection and localization that combines the advantages of dilated convolution, residual network, and UNET Architecture. Using the UNET architecture as a backbone, we built the proposed network from two kinds of residual units, one for the encoder path and the other for the decoder path. The residual units help to speed up the training process and facilitate information propagation between the lower layers and the higher layers which are often difficult to train. To capture global image tampering artifacts and reduce the computational burden of the proposed method, we enlarge the receptive field size of the convolutional kernels by adopting dilated convolutions in the residual units used in building the proposed network. In contrast to existing deep learning methods, having a large number of layers, many network parameters, and often difficult to train, the proposed method can achieve excellent performance with a fewer number of parameters and less computational cost. To test the performance of the proposed method, we evaluate its performance in the context of four benchmark image forensics datasets. Experimental results show that the proposed method outperforms existing methods and could be potentially used to enhance image tampering detection and localization.

Topological Design of Reliable Network Expansion (신뢰성있는 네트워크 확장을 위한 위상설계)

  • Yum Chang Sun;Lee Han Jin
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2004.11a
    • /
    • pp.37-41
    • /
    • 2004
  • The existing network can be expanded with addition of new nodes and multiple choices of link type for each nossible link. In this paper, the design problem of network expansion is defined as finding the network topology minimizing cost subject to reliability constraint. To efficiently solve the problem, an genetic algorithm approach is suggested.

  • PDF

Global Positioning System and Strengthening of Geodetic Network of Nepal

  • Adhikary, Krishna Raj;Mahara, Shree Prakash
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.955-958
    • /
    • 2003
  • Nepal is a country of mountains The higher order geodetic points were mostly established on the top of mountains and these points were used for the geodetic network extension. Lower order geodetic control networks were established at different times and used for the surveying and mapping activities of the country.. It has been found that the rate of convergence between north and south borders of Nepal to be 21${\pm}$2 mm each year and the rate translation of Kathmandu to 55${\pm}$3 mm/year to the plates. The most intense deformation in Nepal occurs along the belt of high mountains along its northern border res ulting in a strain contraction rate normal to the Himalayan Arc. This belt is approximately 40 km wide and extends into southern Tibet.( 13). Recently Survey Department of Nepal has lunched a program of strengthening the existing geodetic network of Nepal and re-observed the position of higher order geodetic points by using geodetic GPS receivers to evaluate their position and thus to define the precision of the control points once again. This paper describes the observation procedure and the adjustment results of the existing higher order control network of Nepal established in different time using different types of equipment and techniques; and highlights the observation procedure and the result obtained after the post processing of the GPS observation results. Attempt has been made to give the procedure and identify the methodology for the re observation of existing higher order geodetic points by using GPS receiver and post processing the observed data so that the existing higher order geodetic points are within the given accuracy standard.

  • PDF

High-Speed Maritime Object Detection Scheme for the Protection of the Aid to Navigation

  • Lee, Hyochan;Song, Hyunhak;Cho, Sungyoon;Kwon, Kiwon;Park, Sunghyun;Im, Taeho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.692-712
    • /
    • 2022
  • Buoys used for Aid to Navigation systems are widely used to guide the sea paths and are powered by batteries, requiring continuous battery replacement. However, since human labor is required to replace the batteries, humans can be exposed to dangerous situation, including even collision with shipping vessels. In addition, Maritime sensors are installed on the route signs, so that these are often damaged by collisions with small and medium-sized ships, resulting in significant financial loss. In order to prevent these accidents, maritime object detection technology is essential to alert ships approaching buoys. Existing studies apply a number of filters to eliminate noise and to detect objects within the sea image. For this process, most studies directly access the pixels and process the images. However, this approach typically takes a long time to process because of its complexity and the requirements of significant amounts of computational power. In an emergent situation, it is important to alarm the vessel's rapid approach to buoys in real time to avoid collisions between vessels and route signs, therefore minimizing computation and speeding up processes are critical operations. Therefore, we propose Fast Connected Component Labeling (FCCL) which can reduce computation to minimize the processing time of filter applications, while maintaining the detection performance of existing methods. The results show that the detection performance of the FCCL is close to 30 FPS - approximately 2-5 times faster, when compared to the existing methods - while the average throughput is the same as existing methods.

The Success Factors and Strategy of Social Network Online Game in Korea: A Case Study of Nexon (국내 Social Network Online Game(SNOG)의 성공 요인 및 전략: Nexon 사례 연구)

  • Yoo, Byung-Joon;Kim, Kwan-Soo
    • Journal of Korea Game Society
    • /
    • v.11 no.6
    • /
    • pp.127-138
    • /
    • 2011
  • The creation and interchange of information through the Internet network forms online community and makes Social Network Game (SNG) as a new entertainment by grafting it onto the most popular online games. SNG means the service which amalgamates social network service (e.g., Facebook, Twitter, etc) strong points and the fun of online game. It promotes the intimacy of relation between the friends above social network service and the gaming amusement for users. The domestic SNG market is currently fast changing according to the smart environment which is quickly shifted. The existing online game field will continuously maintain a market size. SNOG will be more developed because it is competitive from the business perspective of managing cost and production cost when compares with the existing online game. In relation to Facebook, Twitter, etc. overseas SNS platform base SNOG service, the domestic competition for launching SNG is expected to heat up as NHN, Daum and SK Communication introduce open type SNS. This study examines the successful factors and strategy for domestic SNOG by studying the case of MapleStory Adventures successful possibility. The possible successful factors are combing SNS on the existing popular online game, marketing through the existing users, and solving the platform problem of a failure factor of NexonStar. This case study is expected to contribute to the domestic SNOG industry development by providing several implications for the successful factors and strategy of SNOG which will be continuously developed.