• Title/Summary/Keyword: network protection system

Search Result 545, Processing Time 0.027 seconds

Design and implementation of MPEG-4 streaming system with prioritized adaptive transport (우선순위화에 기반한 적응형 전송 기능을 가진 MPEG-4 스트리밍 시스템의 설계 및 구현)

  • 박상훈;장혜영;권영우;김종원;유웅식;권오형
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.95-98
    • /
    • 2003
  • To provide high-quality media streaming service over the best-effort Internet, an efficient streaming system with a network-adaptive transport is essential. By adopting FEC-based adaptive transport and by matching it to the priority of media packets, in this paper, an enhanced MPEG-4 streaming system is implemented. The implemented adaptive transport can complement the existing MPEG-4 streaming server with components such as elementary stream provider, sync layer and DMIF layer. Sync layer packets of each MPEG-4 elementary stream are prioritized and then selectively dropped at the sender to match the currently available bandwidth. Also, with the proposed adaptive transport module, the level of FEC protection is dynamically adjusted based on the underlying network condition. With preliminary verification over the emulated network testbed, it is shown that the proposed implementation can mitigate the impact of network fluctuation and thus improve the quality of streaming.

  • PDF

Human Face Recognition Based on improved CNN Model with Multi-layers

  • Zhang, Ruyang;Lee, Eung-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.5
    • /
    • pp.701-708
    • /
    • 2021
  • As one of the most widely used technology in the world right now, Face recognition has already received widespread attention by all the researcher and institutes. It has been used in many fields such as safety protection, surveillance system, crime control and even in our ordinary life such as home security and so on. This technology with today's technology has advantages such as high connectivity and real time transformation. But we still need to improve its recognition rate, reaction time and also reduce impact of different environmental status to the whole system. So in this paper we proposed a face recognition system model with improved CNN which combining the characteristics of flat network and residual network, integrated learning, simplify network structure and enhance portability and also improve the recognition accuracy. We also used AR and ORL database to do the experiment and result shows higher recognition rate, efficiency and robustness for different image conditions.

A Study of the Design of NIDS System for the Effective Information Detection (효율적인 정보검출을 위한 NIDS 시스템 설계에 관한 연구)

  • 이선근
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.156-162
    • /
    • 2003
  • With the network environment and user's application service increasing information protection and private information protection fields are very important fields. But it is necessary detection methodology to unspecified unknown signal, information increasing and various information media. Therefore in this thesis, we design NIDS that classify others information for detection of the unknown signal as the unauthenticated signal or illegal outer access, etc. proposed NIDS design used Synopsys Ver. 1999 and VHDL. The proposed NIDS system is practical in the system performance and cost for the individually existed NIDS, and utilized a part of system resources.

  • PDF

A Simulation Program for Protection Coordination in the Power Distribution System with Distributed Generators (분산전원 연계 배전계통의 보호협조 정정 프로그램 개발)

  • Kim, Sang-Ok;Seo, In-Yong;Lee, Heung-Ho;Rho, Dae-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.1
    • /
    • pp.1-8
    • /
    • 2013
  • A higher penetration of renewable energy sources and adoption of renewable portfolio standard(RPS), the penetration of distributed generators(DGs) into power distribution network is becoming a threat for the safe operation of distribution network. The ground fault current of DGs can cause parasitic trip and mal-trip of protective device in the power distribution network. KEPRI has developed a simulation program for current setting of protective devices in DGs connected distribution network. In this study, we analyzed fault currents of a sample network in two cases, i.e. case 1 is for no DG connection, case 2 for a DG connection. We performed protection coordination for relays installed in the network and analyzed the contribution of a DG.

Design and Implementation of Location Information System and User Mapping System using DSDV Routing Algorithm in Ad-hoc Network Environment (Ad-hoc 네트워크 환경에서 DSDV 라우팅 알고리즘을 이용한 위치 정보 시스템 및 사용자 맵핑 시스템의 설계 및 구현)

  • Kwak, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.3
    • /
    • pp.1-9
    • /
    • 2014
  • In this paper, we design and implement location information system and user mapping system using DSDV(Destination Sequenced Distance Vector) routing algorithm in ad-hoc network environment to efficient manage a number of mobile devices. The software part in proposed system construct ad-hoc network using DSDV routing algorithm and it activate alarm system, such as vibration, when one of devices disappears in the network. The hardware system, called u_LIN (User Location Information Node) construct ad-hoc network and it helps to find a disappeared device by using warning system. When we evaluate the performance of our prototype system, we have checked a correct operation, within the range of 250m in case of 1:1 communication and within the range of 100m in case of 1:N communication. The implemented system in this paper is highly expected to flexibly use in juvenile protection system, stray-child protection system, tourist guide system and so on.

Literature Review and Current Trends of Automated Design for Fire Protection Facilities (화재방호 설비 설계 자동화를 위한 선행연구 및 기술 분석)

  • Hong, Sung-Hyup;Choi, Doo Chan;Lee, Kwang Ho
    • Land and Housing Review
    • /
    • v.11 no.4
    • /
    • pp.99-104
    • /
    • 2020
  • This paper presents the recent research developments identified through a review of literature on the application of artificial intelligence in developing automated designs of fire protection facilities. The literature review covered research related to image recognition and applicable neural networks. Firstly, it was found that convolutional neural network (CNN) may be applied to the development of automating the design of fire protection facilities. It requires a high level of object detection accuracy necessitating the classification of each object making up the image. Secondly, to ensure accurate object detection and building information, the data need to be pulled from architectural drawings. Thirdly, by applying image recognition and classification, this can be done by extracting wall and surface information using dimension lines and pixels. All combined, the current review of literature strongly indicates that it is possible to develop automated designs for fire protection utilizing artificial intelligence.

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area

  • Liu, Xuefeng;Quan, Hanyu;Zhang, Yuqing;Zhao, Qianqian;Liu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1229-1248
    • /
    • 2016
  • With the feature of convenience and low cost, remote healthcare monitoring (RHM) has been extensively used in modern disease management to improve the quality of life. Due to the privacy of health data, it is of great importance to implement RHM based on a secure and dependable network. However, the network connectivity of existing RHM systems is unreliable in disaster area because of the unforeseeable damage to the communication infrastructure. To design a secure RHM system in disaster area, this paper presents a Secure VANET-Assisted Remote Healthcare Monitoring System (SVC) by utilizing the unique "store-carry-forward" transmission mode of vehicular ad hoc network (VANET). To improve the network performance, the VANET in SVC is designed to be a two-level network consisting of two kinds of vehicles. Specially, an innovative two-level key management model by mixing certificate-based cryptography and ID-based cryptography is customized to manage the trust of vehicles. In addition, the strong privacy of the health information including context privacy is taken into account in our scheme by combining searchable public-key encryption and broadcast techniques. Finally, comprehensive security and performance analysis demonstrate the scheme is secure and efficient.

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

A study of the directional recloser and sectionalizer protective coordination at 22.9[kV] distribution system with new renewable energy generation (신재생에너지원이 연계된 22.9[kV] 배전계통의 양방향 리클로저와 섹셔널라이저 보호협조 방안)

  • Lee, Yeon-Hwa;Choi, Joon-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.525-526
    • /
    • 2007
  • Recently, there has been growing interest in utilizing distributed generation (DG). However, an insertion of DG to existing distribution system can cause several problems such as voltage variations, harmonics, protective coordination, increasing fault current etc,. The typical protection system of the existing distribution system is designed for radial network. But penetration of DG to distribution system changes existing unidirectional power flow to bidirectional power flow. Therefore, investigation to cover whole field of distribution system must be accomplished such as changing of protection devices rating by increasing fault current, reevaluation of protective coordination. This paper presents that PSCAD/EMTDC simulations was accomplished to analyze effect of DG on the distribution protective coordination. In addition, directional recloser-sectionalizer coordination are evaluates distribution system with DG by using PSCAD/EMTDC simulation.

  • PDF

A Study on Electronic Copyright Management System for Digital Contents (디지털 정보의 전자저작권관리시스템에 관한 연구)

  • Hong, Jae-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.1
    • /
    • pp.171-200
    • /
    • 2001
  • Electronic Copyright Management System is the technical solution to protect copyright and to manage the distribution of digital contents in network environment. This paper examined the theoretical plane of Electronic Copyright Management System and analyzed the characteristics and the protection technologies of some of the commercial systems. And this paper investigated the essential protection technologies and payment systems that is needed to develop and manage the successful system in the future. Finally this study suggested the fundamental function model of Electronic Copyright Management System.

  • PDF