• Title/Summary/Keyword: network system

Search Result 21,946, Processing Time 0.043 seconds

Online Learning Control for Network-induced Time Delay Systems using Reset Control and Probabilistic Prediction Method (네트워크 기반 시간지연 시스템을 위한 리세트 제어 및 확률론적 예측기법을 이용한 온라인 학습제어시스템)

  • Cho, Hyun-Cheol;Sim, Kwang-Yeul;Lee, Kwon-Soon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.15 no.9
    • /
    • pp.929-938
    • /
    • 2009
  • This paper presents a novel control methodology for communication network based nonlinear systems with time delay nature. We construct a nominal nonlinear control law for representing a linear model and a reset control system which is aimed for corrective control strategy to compensate system error due to uncertain time delay through wireless communication network. Next, online neural control approach is proposed for overcoming nonstationary statistical nature in the network topology. Additionally, DBN (Dynamic Bayesian Network) technique is accomplished for modeling of its dynamics in terms of casuality, which is then utilized for estimating prediction of system output. We evaluate superiority and reliability of the proposed control approach through numerical simulation example in which a nonlinear inverted pendulum model is employed as a networked control system.

Network Management System Based upon Mobile Agent using JNUI (JNDI를 이용한 Mobile Agent 기반 망관리 시스템)

  • 김정철;송왕철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.406-410
    • /
    • 1999
  • This paper supposes the SNMP network management system based upon Mobile Agent using the Naming and Directory Service, which is JNDI(Java Naming Directory Interface) technology. The Mobile Agent network system is expected to provide a solution for the conventional centralized network system. So, We have designed and implemented the network management system based upon Mobile Agent using JNDI

  • PDF

Database Security System for Information Protection in Network Environment

  • Jung, Myung-Jin;Lee, Chung-Yung;Bae, Sang-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.211-215
    • /
    • 2003
  • Network security should be first considered in a distributed computing environment with frequent information interchange through internet. Clear classification is needed for information users should protect and for information open outside. Basically proper encrypted database system should be constructed for information security, and security policy should be planned for each site. This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

  • PDF

Estimation of a Cyclic or Acyclic Network System Reliability and MTTF by the Monte-Carlo Simulation Method (Monte-Carlo Simulation방법(方法)에 의한 복잡한 System의 신뢰성(信賴性)과 평균수명(平均壽命) 추정(推定))

  • Lee, Chang-Ho
    • Journal of Korean Society for Quality Management
    • /
    • v.10 no.2
    • /
    • pp.18-24
    • /
    • 1982
  • This paper estimates the reliability & mean time to failure (MTIF) of a cyclic or acyclic network system by the Monte-Carlo simulation method. Estimates of MTTF and Reliability become difficult as the complexity of a system increases. The method in this paper finds all simple paths from the given network, and then simulates the reliability of the required time and MTFF by using these paths. Life-times of the components in a network follow some probability distributions (Exponential, Weibull, Normal, Lognormal, etc.). The method, written in Level II. Basic Language, is validated for some simple examples and then estimates the reliability and MTFF of some cyclic network system.

  • PDF

A Genetic Algorithm Approach to the Frequency Assignment Problem on VHF Network of SPIDER System

  • Kwon, O-Jeong
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.1
    • /
    • pp.56-69
    • /
    • 2000
  • A frequency assignment problem on time division duplex system is considered. Republic of Korea Army (ROKA) has been establishing an infrastructure of tactical communication (SPIDER) system for next generation and it will be a core network structure of system. VHF system is the backbone network of SPIDER, that performs transmission of data such as voice, text and images. So, it is a significant problem finding the frequency assignment with no interference under very restricted resource environment. With a given arbitrary configuration of communications network, we find a feasible solution that guarantees communication without interference between sites and relay stations. We formulate a frequency assignment problem as an Integer Programming model, which has NP-hard complexity. To find the assignment results within a reasonable time, we take a genetic algorithm approach which represents the solution structure with available frequency order, and develop a genetic operation strategies. Computational result shows that the network configuration of SPIDER can be solved efficiently within a very short time.

  • PDF

SYN Flood DoS Detection System Using Time Dependent Finite Automata

  • Noura AlDossary;Sarah AlQahtani;Reem Alzaher;Atta-ur-Rahman
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.147-154
    • /
    • 2023
  • Network intrusion refers to any unauthorized penetration or activity on a computer network. This upsets the confidentiality, integrity, and availability of the network system. One of the major threats to any system's availability is a Denial-of-Service (DoS) attack, which is intended to deny a legitimate user access to resources. Therefore, due to the complexity of DoS attacks, it is increasingly important to abstract and describe these attacks in a way that will be effectively detected. The automaton theory is used in this paper to implement a SYN Flood detection system based on Time-Dependent Finite Automata (TDFA).

Protecting Accounting Information Systems using Machine Learning Based Intrusion Detection

  • Biswajit Panja
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.111-118
    • /
    • 2024
  • In general network-based intrusion detection system is designed to detect malicious behavior directed at a network or its resources. The key goal of this paper is to look at network data and identify whether it is normal traffic data or anomaly traffic data specifically for accounting information systems. In today's world, there are a variety of principles for detecting various forms of network-based intrusion. In this paper, we are using supervised machine learning techniques. Classification models are used to train and validate data. Using these algorithms we are training the system using a training dataset then we use this trained system to detect intrusion from the testing dataset. In our proposed method, we will detect whether the network data is normal or an anomaly. Using this method we can avoid unauthorized activity on the network and systems under that network. The Decision Tree and K-Nearest Neighbor are applied to the proposed model to classify abnormal to normal behaviors of network traffic data. In addition to that, Logistic Regression Classifier and Support Vector Classification algorithms are used in our model to support proposed concepts. Furthermore, a feature selection method is used to collect valuable information from the dataset to enhance the efficiency of the proposed approach. Random Forest machine learning algorithm is used, which assists the system to identify crucial aspects and focus on them rather than all the features them. The experimental findings revealed that the suggested method for network intrusion detection has a neglected false alarm rate, with the accuracy of the result expected to be between 95% and 100%. As a result of the high precision rate, this concept can be used to detect network data intrusion and prevent vulnerabilities on the network.

A many-objective optimization WSN energy balance model

  • Wu, Di;Geng, Shaojin;Cai, Xingjuan;Zhang, Guoyou;Xue, Fei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.514-537
    • /
    • 2020
  • Wireless sensor network (WSN) is a distributed network composed of many sensory nodes. It is precisely due to the clustering unevenness and cluster head election randomness that the energy consumption of WSN is excessive. Therefore, a many-objective optimization WSN energy balance model is proposed for the first time in the clustering stage of LEACH protocol. The four objective is considered that the cluster distance, the sink node distance, the overall energy consumption of the network and the network energy consumption balance to select the cluster head, which to better balance the energy consumption of the WSN network and extend the network lifetime. A many-objective optimization algorithm to optimize the model (LEACH-ABF) is designed, which combines adaptive balanced function strategy with penalty-based boundary selection intersection strategy to optimize the clustering method of LEACH. The experimental results show that LEACH-ABF can balance network energy consumption effectively and extend the network lifetime when compared with other algorithms.

Speech and Noise Recognition System by Neural Network (신경회로망에 의한 음성 및 잡음 인식 시스템)

  • Choi, Jae-Sung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.357-362
    • /
    • 2010
  • This paper proposes the speech and noise recognition system by using a neural network in order to detect the speech and noise sections at each frame. The proposed neural network consists of a layered neural network training by back-propagation algorithm. First, a power spectrum obtained by fast Fourier transform and linear predictive coefficients are used as the input to the neural network for each frame, then the neural network is trained using these power spectrum and linear predictive coefficients. Therefore, the proposed neural network can train using clean speech and noise. The performance of the proposed recognition system was evaluated based on the recognition rate using various speeches and white, printer, road, and car noises. In this experiment, the recognition rates were 92% or more for such speech and noise when training data and evaluation data were the different.

Network Connecting Structure and Contextual Meanings of Chungbuk Innovation Projects Based on the Amalgamation of Social Network Analysis and System Dynamics Approaches (SNA와 SD 방법론을 활용한 충북 지역혁신사업의 네트워크 연결구조와 함의)

  • Lee, Mi-Ra;Hong, Seong-Ho;Park, Ju-Hye;Lee, Man-Hyung
    • Korean System Dynamics Review
    • /
    • v.10 no.2
    • /
    • pp.103-120
    • /
    • 2009
  • Using various data derived from the regional innovation projects in the IT and BT-sectors within Chungbuk Province, this study tries to observe formation processes of network connecting structure and their spill-over effects. Considering the dynamic nature of key issues, it applies both social network analysis and causal loop methods. After a series of simulation exercises, we find that so-called extroverted regional innovation projects, that is, ones financially supported by the central government, reveal a higher tendency in the centrality, heavily depending on a handful of well reputed organizations. It is quite similar to the reinforcing mechanism, resulting in the rich-get-richer and the poor-get-poorer. Compared with the existing documents, nonetheless, it shows relatively weak in the mechanism strength, implying the fact that regional innovation projects have significantly contributed to ameliorating the unequal distribution of innovation organizations within Chungbuk Province. On the other hand, this study concludes that all the brokerage organizations related to the regional innovation projects have settled in Chungbuk Province. Whereas the Capital Region-based organizations present a higher tendency in the knowledge-network, it seems that the regional innovation projects have significantly contributed to upgrading direct and indirect competitiveness of the local organizations.

  • PDF