• Title/Summary/Keyword: network scope

Search Result 330, Processing Time 0.027 seconds

Defining the Scope of the Internet of Things with a Particular Focus on Its Role in Healthcare: A Review Paper

  • Abdulaziz Alomari;Ben Soh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.187-197
    • /
    • 2023
  • Today's world is experiencing rapid technological advancement like never before. The ever-changing technology space has overwhelmed citizens with a substantial load of information, which has made it difficult for them to keep up with the technology awareness. This review paper is written to provide information about the Internet of Things in a way that technical along with nontechnical individuals can understand the definition, historical evolution, components, and scope of IoT technology. Relevant literature published between January 2009 and February 2023 was included in this paper. The applications of the Internet of Things in healthcare have been a special focus of this paper as IoT has massive potential in this field and healthcare professionals often face significant issues in keeping their technology knowledge up to date. Moreover, some of the most common issues associated with IoT introduction in healthcare are also discussed in the paper along with some suitable recommendations. Although, IoT can significantly transform our lives and can introduce convenience and efficiency, particularly in the healthcare sector. However, its adoption in healthcare is still a major task due to various challenges presented by the health workforce. Thus, in-depth empirical research is suggested to assist the IoT technology transition.

Research on security technology to respond to edge router-based network attacks (Edge 라우터 기반 네트워크 공격에 대응하는 보안기술 연구)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1374-1381
    • /
    • 2022
  • Existing research on security technology related to network attack response has focused on research using hardware network security technology, network attacks that wiretap and wiretap network packets, denial of service attack that consumes server resources to bring down the system, and network by identifying vulnerabilities before attack. It is classified as a scanning attack. In addition, methods for increasing network security, antivirus vaccines and antivirus systems have been mainly proposed and designed. In particular, many users do not fully utilize the security function of the router. In order to overcome this problem, it is classified according to the network security level to block external attacks through layered security management through layer-by-layer experiments. The scope of the study was presented by examining the security technology trends of edge routers, and suggested methods and implementation examples to protect from threats related to edge router-based network attacks.

HEXACO Personality Traits and Job Seekers' Networking Behavior: The Effect of Network Size

  • MAI, Khac Thanh;LE, Son-Tung;PHUNG, Manh-Trung;NGUYEN, Thi Thuy Hong
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.545-553
    • /
    • 2020
  • Although networking behavior is an effective job search method to students, far too little attention has been paid to mechanisms explaining the antecedents and networking behavior. The goal of this study was to demonstrate the effect of the HEXACO personality dimensions on graduated students' job search networking behavior through their network size. A survey of 773 participants was conducted to assess personality traits, network size, and networking behavior. All constructs in the study were measured by 5-point Likert scales. This study employed a structural equation model to examine the proposed conceptual model and the correlations among variables. Results showed that the personality of emotionality negatively influence students' network size, while extraversion and agreeableness are positively associated with the scope of their social network. Second, the findings confirmed that network size is directly related to the level of looking-for job behavior, particularly networking behavior. Finally, our results explored that network size played the mediating effect on how personality traits affect networking behavior. These findings suggest that network size is a dynamic mechanism that helps to understand the correlation between personality traits and job search networking behavior. The theoretical and practical implication of the study, as well as the future research direction were discussed.

ARARO: Aggregate Router-Assisted Route Optimization for Mobile Network Support

  • Rho, Kyung-Taeg;Jung, Soo-Mok
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.11 no.4
    • /
    • pp.9-17
    • /
    • 2007
  • Network Mobility basic support protocol (NEMO Basic) extends the operation of Mobile IPv6 to provide uninterrupted Internet connectivity to the communicating nodes of mobile networks. The protocol uses a mobile router (MR) in the mobile network to perform prefix scope binding updates with its home agent (HA) to establish a bi-directional tunnel between the HA and MR. This solution reduces location-update signaling by making network movements transparent to the mobile nodes (MNs) behind the MR. However, delays in data delivery and higher overheads are likely to occur because of sub-optimal routing and multiple encapsulation of data packets. To manage the mobility of the mobile network, it is important to minimize packet overhead, to optimize routing, and to reduce the volume of handoff signals over the nested mobile network. This paper proposes en aggregate router-assisted route optimization (ARARO) scheme for nested mobile networks support which introduces a local anchor router in order to localize handoff and to optimize routing. With ARARO, a mobile network node (MNN) behind a MR performs route optimization with a correspondent node (CN) as the MR sends a binding update message (BU) to aggregate router (AGR) via root-MR on behalf of all active MNNs when the mobile network moves. This paper describes the new architecture and mechanisms and provides simulation results which indicate that our proposal reduces transmission delay, handoff latency and signaling overhead. To evaluate the scheme, we present the results of simulation.

  • PDF

Analysis on the definition and typology of library networks (도서관 네트워크의 정의의 분석과 유형별 특성)

  • 박준식
    • Journal of Korean Library and Information Science Society
    • /
    • v.12
    • /
    • pp.1-33
    • /
    • 1985
  • This study has been aimed to analyze the following three points which are believed to be the most important in establishing efficient library networks. The writers have done the research into the literature and references concerning the networks of library, as they are considered crucial functions in cooperative administration between the libraries. The following are the findings from the survey: 1) The established networks in foreign countries have been compared with those of Korea, basing upon the data and present situations in both areas and the definition and agreed viewpoint of the networks are presented. 2) The relations between the existing Library system and Consortia were clarified in view of the current trend, thus showing the scope and integral aspects of them. 3) Finally, we have classified the types of network into four categories, such as search service network, customized service network, service center/network and state local networks, and made through analysis of the character, organization and management of each realm.

  • PDF

Bibliometric Network Analysis on Low Cost Carrier Research (저가항공 관련 국내학술지 네트워크 텍스트 분석)

  • Rha, Jin-Sung;Choi, Dong-Hyun
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.23 no.1
    • /
    • pp.14-23
    • /
    • 2015
  • This study applied the network text analysis to reveal the scope and trends of low cost carrier studies. We analyzed low cost carrier research published in Korean journals and news articles. The results showed that there are three clusters in terms of research topics. First dimension consists of articles investigating growth in the low cost carrier industry. The second dimension is associated with service characteristics. The last dimension has strong ties organizational and human resource dimension. We run Krkwic, Krtitle, Netdraw, and Ucinet 6.0 to conduct the network text analysis. This study suggests the direction of low cost carrier research in the future.

Productivity on the Chinese Logistics Network and Korean Economic Strategy (중국 물류네트워크의 생산성과 한국의 글로벌통상전략)

  • Choi, Yong-Lock
    • International Commerce and Information Review
    • /
    • v.9 no.1
    • /
    • pp.259-274
    • /
    • 2007
  • The paradigm of the global logistics network has been rapidly changing from traditional concept of productivity in cost terms, toward the new characteristics of innovative productivity in terms of economies of scale, economies of scope, and economies of network. As the ship or airplane becomes larger and speedier, the less logistics hub required. The more diverse logistics parties integrate each other horizontally or vertically, the higher synergy effects they get. The more systematic concurrent engineering available for global supply chain management such as Korean manufacturers in China, the higher productivity they get. The paper analyzes these three paradigms of logistics into the application for the Korean manufacturers in China and concludes that the Korean government, the companies in China should be more focused on the governance of the logistics and the intermediary such as the 4th party logistics(4PL) is definitely developed its role and functions based on three paradigms above mentioned.

  • PDF

Security Simulation with Collaboration of Intrusion Detection System and Firewall (침입 탐지 시스템과 침입 차단 시스템의 연동을 통한 보안 시뮬레이션)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.10 no.1
    • /
    • pp.83-92
    • /
    • 2001
  • For the prevention of the network intrusion from damaging the system, both IDS (Intrusion Detection System) and Firewall are frequently applied. The collaboration of IDS and Firewall efficiently protects the network because of making up for the weak points in the each demerit. A model has been constructed based on the DEVS (Discrete Event system Specification) formalism for the simulation of the system that consists of IDS and Firewall. With this model we can simulation whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. If an agent detects intrusions, it transfers attacker's information to a Firewall. Using this mechanism attacker's packets detected by IDS can be prevented from damaging the network.

  • PDF

Catalyzing social media scholarship with open tools and data

  • Smith, Marc A.
    • Journal of Contemporary Eastern Asia
    • /
    • v.14 no.2
    • /
    • pp.87-96
    • /
    • 2015
  • Social media comprises a vast and consequential landscape that has been poorly mapped and understood. Hundreds of millions of people have eagerly moved many of the conversations and discussions that compose civil society into these services and platforms. There is a need to document and analyze these social spaces for many academic and commercial purposes. The Social Media Research Foundation has engaged a strategy to cultivate better research into the structure and dynamics of social media. The foundation is dedicated to the creation of open tools, open data, and open scholarship related to social media. It has implemented a free and open network collection, analysis, and visualization tool called NodeXL to facilitate social media network research. Using NodeXL a group of researchers has collectively authored a publicly available archive, called the NodeXL Graph Gallery, composed of network data sets and visualizations from users around the world. This site has enabled the aggregation of tens of thousands of network datasets and images. Use of the archive has led to scholarly research results that are based on the wide range and scope of social media data sets available.

A Hybrid Learning Model to Detect Morphed Images

  • Kumari, Noble;Mohapatra, AK
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.364-373
    • /
    • 2022
  • Image morphing methods make seamless transition changes in the image and mask the meaningful information attached to it. This can be detected by traditional machine learning algorithms and new emerging deep learning algorithms. In this research work, scope of different Hybrid learning approaches having combination of Deep learning and Machine learning are being analyzed with the public dataset CASIA V1.0, CASIA V2.0 and DVMM to find the most efficient algorithm. The simulated results with CNN (Convolution Neural Network), Hybrid approach of CNN along with SVM (Support Vector Machine) and Hybrid approach of CNN along with Random Forest algorithm produced 96.92 %, 95.98 and 99.18 % accuracy respectively with the CASIA V2.0 dataset having 9555 images. The accuracy pattern of applied algorithms changes with CASIA V1.0 data and DVMM data having 1721 and 1845 set of images presenting minimal accuracy with Hybrid approach of CNN and Random Forest algorithm. It is confirmed that the choice of best algorithm to find image forgery depends on input data type. This paper presents the combination of best suited algorithm to detect image morphing with different input datasets.