• Title/Summary/Keyword: network computing

Search Result 3,181, Processing Time 0.03 seconds

ETRI AI Strategy #3: Leading Future Technologies of Network, Media, and Content (ETRI AI 실행전략 3: 네트워크 및 미디어·콘텐츠 미래기술 선도)

  • Kim, S.M.;Yeon, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.7
    • /
    • pp.23-35
    • /
    • 2020
  • In this paper, we introduce ETRI AI Strategy #3, "Leading Future Technologies of Network, Media, and Content." Its first goal is "to innovate AI service technology to overcome the current limitations of AI technologies." Artificial intelligence (AI) services, such as self-driving cars and robots, are combinations of computing, network, AI algorithms, and other technologies. To develop AI services, we need to develop different types of network, media coding, and content creation technologies. Moreover, AI technologies are adopted in ICT technologies. Self-planning and self-managing networks and automatic content creation technologies using AI are being developed. This paper introduces the two directions of ETRI's ICT technology development plan for AI: ICT for AI and ICT by AI. The area of ICT for AI has only recently begun to develop. ETRI, the ICT leader, hopes to have opportunities for leadership in the second wave of AI services.

A Performance Evaluation for SDP(Socket Direct Protocol) in Channel based Network (고속 채널 기반 네트웍에서 SDP 프로토콜 성능 평가)

  • Park, Chang-Won;Kim, Young-Hwan
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.3 no.2
    • /
    • pp.18-25
    • /
    • 2004
  • As using of network Increases rapidly, performance of system has been deteriorating because of the overhead and bottleneck. Nowadays, high speed I/O network standard, that is a sort of InfiniBand, PCI Express and so on, has come out to improve the limites of traditional I/O bus. The InfiniBand provides some protocols to service the applications such as SDP, SRP and IPoIB. In our paper, We explain the architecture of SDP(Socket Direct Protocol) and its features in channel based I/O network. And so, we provide a result of performance evaluation of SDP which is compared with current network protocol. Our experimental results also show that SDP is better than TCP/IP protocol.

  • PDF

Database Security System for Information Protection in Network Environment

  • Jung, Myung-Jin;Lee, Chung-Yung;Bae, Sang-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.211-215
    • /
    • 2003
  • Network security should be first considered in a distributed computing environment with frequent information interchange through internet. Clear classification is needed for information users should protect and for information open outside. Basically proper encrypted database system should be constructed for information security, and security policy should be planned for each site. This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

  • PDF

Soft computing with neural networks for engineering applications: Fundamental issues and adaptive approaches

  • Ghaboussi, Jamshid;Wu, Xiping
    • Structural Engineering and Mechanics
    • /
    • v.6 no.8
    • /
    • pp.955-969
    • /
    • 1998
  • Engineering problems are inherently imprecision tolerant. Biologically inspired soft computing methods are emerging as ideal tools for constructing intelligent engineering systems which employ approximate reasoning and exhibit imprecision tolerance. They also offer built-in mechanisms for dealing with uncertainty. The fundamental issues associated with engineering applications of the emerging soft computing methods are discussed, with emphasis on neural networks. A formalism for neural network representation is presented and recent developments on adaptive modeling of neural networks, specifically nested adaptive neural networks for constitutive modeling are discussed.

Measurement of Management Point for Secure Network (안전한 네트워크를 위한 보호조치 대응 시점)

  • Lee, Jae-Sung;Ji, Jung-Eun;Lim, Hui-Bin;Shin, Yong-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.613-614
    • /
    • 2009
  • 최근 네트워크의 가용성을 침해하는 DDoS공격으로 국내외 주요 사이트가 마비되는 사건이 있었다. 본 논문에서는 TCP와 UDP의 자기유사성을 이용하여 유효 대역폭을 측정하고 네트워크의 가용성을 보장하기 위한 한계 대응 시점을 예측하였다. 그리고 실험을 통해 한계 대응 시점의 예측이 정확함을 확인 할 수 있었다.

An Effective Resource Discovery in Mobile Ad-hoc Network for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 이동 애드혹 네트워크의 효율적인 리소스 발견 기법)

  • Noh Dong-Geon;Shin Heon-Shik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.9
    • /
    • pp.666-676
    • /
    • 2006
  • Rapid advances in ubiquitous computing and its pervasive influence over our society demand an efficient way to locate resources over the network. In mobile ad-hoc networks (MANETs) which is a special type of the sub-networks in ubiquitous environment, effective resource discovery is particularly important, due to their dynamics and the resource constraints on wireless nodes. In this paper, we propose an adaptive and efficient resource discovery strategy for MANETs. Our strategy also provides a solution to bridge different types of networks which coexist in ubiquitous environment.

A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction

  • Xia, Yunhao;Hong, Hanshu;Lin, Guofeng;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4197-4219
    • /
    • 2017
  • Cloud computing is a new service to provide dynamic, scalable virtual resource services via the Internet. Cloud market is available to multiple cloud computing resource providers and users communicate with each other and participate in market transactions. However, since cloud computing is facing with more and more security issues, how to complete the allocation process effectively and securely become a problem urgently to be solved. In this paper, we firstly analyze the cloud resource allocation problem and propose a mathematic model based on combinatorial double auction. Secondly, we introduce a trust evaluation mechanism into our model and combine genetic algorithm with simulated annealing algorithm to increase the efficiency and security of cloud service. Finally, by doing the overall simulation, we prove that our model is highly effective in the allocation of cloud resources.

Supplements an Initial Creation and User Addition in VANET Cloud Architecture (초기 생성과 사용자 추가를 고려한 VANET 클라우드 아키텍처)

  • Kim, Taehyeong;Song, JooSeok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.12
    • /
    • pp.449-454
    • /
    • 2014
  • While the era of driverless car has come, Vehicular Ad hoc NETwork(VANET) is getting important. Original VANET has a limit that cannot use computation power, storage space of On Board Unit(OBU) installed in a vehicle efficiently. VANET cloud computing(VCC) solves the limit to focus on using abilities of each vehicle. This article proposes VCC architecture for supplementing user addition and initial cloud creation that have been researched insufficiently.

A Hybrid Soft Computing Technique for Software Fault Prediction based on Optimal Feature Extraction and Classification

  • Balaram, A.;Vasundra, S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.348-358
    • /
    • 2022
  • Software fault prediction is a method to compute fault in the software sections using software properties which helps to evaluate the quality of software in terms of cost and effort. Recently, several software fault detection techniques have been proposed to classifying faulty or non-faulty. However, for such a person, and most studies have shown the power of predictive errors in their own databases, the performance of the software is not consistent. In this paper, we propose a hybrid soft computing technique for SFP based on optimal feature extraction and classification (HST-SFP). First, we introduce the bat induced butterfly optimization (BBO) algorithm for optimal feature selection among multiple features which compute the most optimal features and remove unnecessary features. Second, we develop a layered recurrent neural network (L-RNN) based classifier for predict the software faults based on their features which enhance the detection accuracy. Finally, the proposed HST-SFP technique has the more effectiveness in some sophisticated technical terms that outperform databases of probability of detection, accuracy, probability of false alarms, precision, ROC, F measure and AUC.

Stability-based On-demand Multi-path Distance Vector Protocol for Edge Internet of Things

  • Dongzhi Cao;Peng Liang;Tongjuan Wu;Shiqiang Zhang;Zhenhu Ning
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2658-2681
    • /
    • 2023
  • In edge computing scenarios, IoT end devices play a crucial role in relaying and forwarding data to significantly improve IoT network performance. However, traditional routing mechanisms are not applicable to this scenario due to differences in network size and environment. Therefore, it becomes crucial to establish an effective and reliable data transmission path to ensure secure communication between devices. In this paper, we propose a trusted path selection strategy that comprehensively considers multiple attributes, such as link stability and edge cooperation, and selects a stable and secure data transmission path based on the link life cycle, energy level, trust level, and authentication status. In addition, we propose the Stability-based On-demand Multipath Distance Vector (STAOMDV) protocol based on the Ad hoc AOMDV protocol. The STAOMDV protocol implements the collection and updating of link stability attributes during the route discovery and maintenance process. By integrating the STAOMDV protocol with the proposed path selection strategy, a dependable and efficient routing mechanism is established for IoT networks in edge computing scenarios. Simulation results validate that the proposed STAOMDV model achieves a balance in network energy consumption and extends the overall network lifespan.