• Title/Summary/Keyword: network technology

Search Result 14,315, Processing Time 0.045 seconds

Design of CNN with MLP Layer (MLP 층을 갖는 CNN의 설계)

  • Park, Jin-Hyun;Hwang, Kwang-Bok;Choi, Young-Kiu
    • Journal of the Korean Society of Mechanical Technology
    • /
    • v.20 no.6
    • /
    • pp.776-782
    • /
    • 2018
  • After CNN basic structure was introduced by LeCun in 1989, there has not been a major structure change except for more deep network until recently. The deep network enhances the expression power due to improve the abstraction ability of the network, and can learn complex problems by increasing non linearity. However, the learning of a deep network means that it has vanishing gradient or longer learning time. In this study, we proposes a CNN structure with MLP layer. The proposed CNNs are superior to the general CNN in their classification performance. It is confirmed that classification accuracy is high due to include MLP layer which improves non linearity by experiment. In order to increase the performance without making a deep network, it is confirmed that the performance is improved by increasing the non linearity of the network.

An Efficient Key Management Scheme in Tactical Ad-Hoc Network (전술 Ad-hoc 네트워크에서의 효율적인 키 관리 기법)

  • Kim, Eun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.3
    • /
    • pp.317-324
    • /
    • 2009
  • Tactical Information Communication Network(TICN) uses both a wireless and wired network. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. However, Ad-hoc network is faced to many security threats due to its intrinsic characteristics. Therefore, to apply the Ad-hoc networking technology to battlefield environments and TICN, an intensive study on security countermeasure must go side by side with the development of enabling technology. In this paper, we suggest an efficient key management scheme for TICN of which the Ad-hoc networking technology is applied.

Trends in Network Address Moving Technology (네트워크 주소 이동 기술 동향)

  • Park, K.M.;Woo, S.;Moon, D.S.;Kim, I.K.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.6
    • /
    • pp.73-82
    • /
    • 2017
  • Moving Target Defense(MTD) is a novel security technology concept in which the IT infrastructure changes its form actively and prevents various types of cyber attacks. Network address moving technology is the field that has been most actively researched in terms of MTD. A number of studies on network address moving published over the last decade have suggested a virtual address-based network address moving technology for efficiency in the implementation. However, virtual address-based network address moving technology has serious vulnerabilities in terms of security and availability. This paper examines the technological characteristics of the existing studies and analyzes their limitations. It suggests security requirements to be considered when designing the network address moving technology through a technological analysis.

A Study on Provisions for Internet Services (인터넷서비스 이용약관에 대한 고찰)

  • Kim, Ki-Jae;Lee, Gil-Haeng;Kim, Dae-Ung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1579-1582
    • /
    • 2002
  • 국내 초고속 인터넷 가입자 수의 증가와 더불어 이용서비스 형태에 있어서, 인터넷 뱅킹을 통한 각종 조회, 자금이체, 및 대출서비스와 전자상거래 등을 이용한 금전 결재 등이 꾸준히 증가하고 있다. 또한 인터넷 보급률의 증가와 더불어 이용자의 피해도 꾸준히 증가하고 있다. 따라서 정부에서는 이용자의 피해와 불만사항을 해소할 수 있는 강력한 인터넷서비스 품질개선 규제 노력이 필요하다. 또한 사업자들은 이용자와의 사전 서비스 계약(SLA: Service Level Agreement, 서비스 수준 협약)을 통한 철저한 품질개선 노력이 필요하다. 이용자와의 계약은 서비스 이용약관에 구체적인 사항을 명시하여 약속을 이행함으로써 고객의 불만을 해소해 나가야 할 것이다. 본 논문에서는 인터넷 가입자 수의 증가에 따른 사업자들의 품질보장 노력이 미흡함을 지적하고, 국내 인터넷 사업자의 서비스 이용약관에 대해 조사하였으며, 이용자 보호 관점에서 구체적인 내용을 서비스 이용약관에 명시하여야 함을 강조한다.

  • PDF

Privacy Protection Method for Sensitive Weighted Edges in Social Networks

  • Gong, Weihua;Jin, Rong;Li, Yanjun;Yang, Lianghuai;Mei, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.540-557
    • /
    • 2021
  • Privacy vulnerability of social networks is one of the major concerns for social science research and business analysis. Most existing studies which mainly focus on un-weighted network graph, have designed various privacy models similar to k-anonymity to prevent data disclosure of vertex attributes or relationships, but they may be suffered from serious problems of huge information loss and significant modification of key properties of the network structure. Furthermore, there still lacks further considerations of privacy protection for important sensitive edges in weighted social networks. To address this problem, this paper proposes a privacy preserving method to protect sensitive weighted edges. Firstly, the sensitive edges are differentiated from weighted edges according to the edge betweenness centrality, which evaluates the importance of entities in social network. Then, the perturbation operations are used to preserve the privacy of weighted social network by adding some pseudo-edges or modifying specific edge weights, so that the bottleneck problem of information flow can be well resolved in key area of the social network. Experimental results show that the proposed method can not only effectively preserve the sensitive edges with lower computation cost, but also maintain the stability of the network structures. Further, the capability of defending against malicious attacks to important sensitive edges has been greatly improved.

An Empirical Study on the Influencing Factors on the Technology Performance in the Embedded Firms and The Moderating Effect of Government Support (국내 임베디드 기업의 기술성과에 미치는 영향요인과 정부지원의 조절효과)

  • Moon, Tae-Soo;Kim, Sung-Min;Kim, Kab-Sik
    • Journal of Digital Convergence
    • /
    • v.6 no.4
    • /
    • pp.137-145
    • /
    • 2008
  • Embedded industry has emerged as one of the important industry for u-IT based application service. Technology development related to embedded hardware and software provides the base for the development of U-IT convergence industry. This study intends to suggest a research model to investigate the influence of industry, organization, technology factors on technology performance in the embedded companies. This study adopted research variables such as global network, local network, industry intensity, and technology capability as independent variables, with technology performance as a dependent variable from the existing literatures. The purpose of this study is to analyze the influence of industrial and organizational factors on technology performance of embedded companies SCM systems, including the moderating effect of government support. 94 companies data were collected by survey. The result of this empirical study is summarized as follows. First, local network and technology capability are the important determinants to influence technology performance of embedded companies in direct effect model. Second, global network and industry intensity has more positive influence on technology performance of embedded companies through a moderating variable of government support.

  • PDF

Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City

  • Sharma, Pradip Kumar;Moon, Seo Yeon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.184-195
    • /
    • 2017
  • In recent decades, the ad hoc network for vehicles has been a core network technology to provide comfort and security to drivers in vehicle environments. However, emerging applications and services require major changes in underlying network models and computing that require new road network planning. Meanwhile, blockchain widely known as one of the disruptive technologies has emerged in recent years, is experiencing rapid development and has the potential to revolutionize intelligent transport systems. Blockchain can be used to build an intelligent, secure, distributed and autonomous transport system. It allows better utilization of the infrastructure and resources of intelligent transport systems, particularly effective for crowdsourcing technology. In this paper, we proposes a vehicle network architecture based on blockchain in the smart city (Block-VN). Block-VN is a reliable and secure architecture that operates in a distributed way to build the new distributed transport management system. We are considering a new network system of vehicles, Block-VN, above them. In addition, we examine how the network of vehicles evolves with paradigms focused on networking and vehicular information. Finally, we discuss service scenarios and design principles for Block-VN.

Miblie Network based on Virtual Network environment (가상 네트워크 환경에 기반한 모바일 네트워크)

  • Lee, Jong-seo;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.793-794
    • /
    • 2009
  • In recent years a significant increase in computing resources, the Internet, many computing resources associated with multiple users using the service and how it will do for cloud computing or grid computing technology is attracting attention from the networks on physical networks and virtual network links You can configure the virtual network of nodes to configure the virtual network environment, research is being made. Virtualization technology, rather than the actual network operating system is being developed in the field of research for a long time, but this paper is applied to the network field is applied to a mobile network based virtualization technology for virtual mobile network will explore.

  • PDF

A Mechanism for Configurable Network Service Chaining and Its Implementation

  • Xiong, Gang;Hu, Yuxiang;Lan, Julong;Cheng, Guozhen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3701-3727
    • /
    • 2016
  • Recently Service Function Chaining (SFC) is promising to innovate the network service mode in modern networks. However, a feasible implementation of SFC is still difficult due to the need to achieve functional equivalence with traditional modes without sacrificing performance or increasing network complexity. In this paper, we present a configurable network service chaining (CNSC) mechanism to provide services for network traffics in a flexible and optimal way. Firstly, we formulate the problem of network service chaining and design an effective service chain construction framework based on integrating software-defined networking (SDN) with network functions virtualization (NFV). Then, we model the service path computation problem as an integer liner optimization problem and propose an algorithm named SPCM to cooperatively combine service function instances with a network utility maximum policy. In the procedure of SPCM, we achieve the service node mapping by defining a service capacity matrix for substrate nodes, and work out the optimal link mapping policies with segment routing. Finally, the simulation results indicate that the average request acceptance ratio and resources utilization ratio can reach above 85% and 75% by our SPCM algorithm, respectively. Upon the prototype system, it is demonstrated that CNSC outperforms other approaches and can provide flexible and scalable network services.