• Title/Summary/Keyword: science network

Search Result 13,268, Processing Time 0.041 seconds

Implementation of Intelligent Home Network and u-Healthcare System based on Smart-Grid

  • Kim, Tae Yeun;Bae, Sang Hyun
    • Journal of Integrative Natural Science
    • /
    • v.9 no.3
    • /
    • pp.199-205
    • /
    • 2016
  • In this paper, we established ZIGBEE home network and combined smart-grid and u-Healthcare system. We assisted for amount of electricity management of household by interlocking home devices of wireless sensor, PLC modem, DCU and realized smart grid and u-Healthcare at the same time by verifying body heat, pulse, blood pressure change and proceeded living body signal by using SVM algorithm and variety of ZIGBEE network channel and enabled it to check real-time through IHD which is developed by user interface. In addition, we minimized the rate of energy consumption of each sensor node when living body signal is processed and realized Query Processor which is able to optimize accuracy and speed of query. We were able to check the result that is accuracy of classification 0.848 which is less accounting for average 17.9% of storage more than the real input data by using Mjoin, multiple query process and SVM algorithm.

Hybridized Decision Tree methods for Detecting Generic Attack on Ciphertext

  • Alsariera, Yazan Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.56-62
    • /
    • 2021
  • The surge in generic attacks execution against cipher text on the computer network has led to the continuous advancement of the mechanisms to protect information integrity and confidentiality. The implementation of explicit decision tree machine learning algorithm is reported to accurately classifier generic attacks better than some multi-classification algorithms as the multi-classification method suffers from detection oversight. However, there is a need to improve the accuracy and reduce the false alarm rate. Therefore, this study aims to improve generic attack classification by implementing two hybridized decision tree algorithms namely Naïve Bayes Decision tree (NBTree) and Logistic Model tree (LMT). The proposed hybridized methods were developed using the 10-fold cross-validation technique to avoid overfitting. The generic attack detector produced a 99.8% accuracy, an FPR score of 0.002 and an MCC score of 0.995. The performances of the proposed methods were better than the existing decision tree method. Similarly, the proposed method outperformed multi-classification methods for detecting generic attacks. Hence, it is recommended to implement hybridized decision tree method for detecting generic attacks on a computer network.

A Hybrid Routing Protocol Based on Bio-Inspired Methods in a Mobile Ad Hoc Network

  • Alattas, Khalid A
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.207-213
    • /
    • 2021
  • Networks in Mobile ad hoc contain distribution and do not have a predefined structure which practically means that network modes can play the role of being clients or servers. The routing protocols used in mobile Ad-hoc networks (MANETs) are characterized by limited bandwidth, mobility, limited power supply, and routing protocols. Hybrid routing protocols solve the delay problem of reactive routing protocols and the routing overhead of proactive routing protocols. The Ant Colony Optimization (ACO) algorithm is used to solve other real-life problems such as the travelling salesman problem, capacity planning, and the vehicle routing challenge. Bio-inspired methods have probed lethal in helping to solve the problem domains in these networks. Hybrid routing protocols combine the distance vector routing protocol (DVRP) and the link-state routing protocol (LSRP) to solve the routing problem.

Develop an Effective Security Model to Protect Wireless Network

  • Ataelmanan, Somya Khidir Mohmmed;Ali, Mostafa Ahmed Hassan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.48-54
    • /
    • 2021
  • Security is an important issue for wireless communications and poses many challenges. Most security schemes have been applied to the upper layers of communications networks. Since in a typical wireless communication, transmission of data is over the air, third party receiver(s) may have easy access to the transmitted data. This work examines a new security technique at the physical layer for the sake of enhancing the protection of wireless communications against eavesdroppers. We examine the issue of secret communication through Rayleigh fading channel in the presence of an eavesdropper in which the transmitter knows the channel state information of both the main and eavesdropper channel. Then, we analyze the capacity of the main channel and eavesdropper channel we also analyze for the symbol error rate of the main channel, and the outage probability is obtained for the main transmission. This work elucidate that the proposed security technique can safely complement other Security approaches implemented in the upper layers of the communication network. Lastly, we implement the results in Mat lab

Intrusion Detection using Attribute Subset Selector Bagging (ASUB) to Handle Imbalance and Noise

  • Priya, A.Sagaya;Kumar, S.Britto Ramesh
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.97-102
    • /
    • 2022
  • Network intrusion detection is becoming an increasing necessity for both organizations and individuals alike. Detecting intrusions is one of the major components that aims to prevent information compromise. Automated systems have been put to use due to the voluminous nature of the domain. The major challenge for automated models is the noise and data imbalance components contained in the network transactions. This work proposes an ensemble model, Attribute Subset Selector Bagging (ASUB) that can be used to effectively handle noise and data imbalance. The proposed model performs attribute subset based bag creation, leading to reduction of the influence of the noise factor. The constructed bagging model is heterogeneous in nature, hence leading to effective imbalance handling. Experiments were conducted on the standard intrusion detection datasets KDD CUP 99, Koyoto 2006 and NSL KDD. Results show effective performances, showing the high performance of the model.

Blockchain and IoT Integrated Banana Plant System

  • Geethanjali B;Muralidhara B.L.
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.155-157
    • /
    • 2024
  • Internet of Things (IoT) integrated with the Blockchain is the state of the art for keen cultivation and agriculture. Recently the interest in agribusiness information is enlarging owing to the fact of commercializing the smart farming technology. Agribusiness information are known to be untidy, and experts are worried about the legitimacy of information. The blockchain can be a potential answer for the expert's concern on the uncertainty of the agriculture data. This paper proposes an Agri-Banana plant system using Blockchain integrated with IoT. The system is designed by employing IoT sensors incorporated with Hyperledger fabric network, aims to provide farmers with secure storage for preserving the large amounts of IoT and agriculture data that cannot be tampered with. A banana smart contract is implemented between farmer peer and buyer peer of two different organizations under the Hyperledger fabric network setup aids in secure transaction of transferring banana from farmer to buyer.

Classification of Network Traffic using Machine Learning for Software Defined Networks

  • Muhammad Shahzad Haroon;Husnain Mansoor
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.91-100
    • /
    • 2023
  • As SDN devices and systems hit the market, security in SDN must be raised on the agenda. SDN has become an interesting area in both academics and industry. SDN promises many benefits which attract many IT managers and Leading IT companies which motivates them to switch to SDN. Over the last three decades, network attacks becoming more sophisticated and complex to detect. The goal is to study how traffic information can be extracted from an SDN controller and open virtual switches (OVS) using SDN mechanisms. The testbed environment is created using the RYU controller and Mininet. The extracted information is further used to detect these attacks efficiently using a machine learning approach. To use the Machine learning approach, a dataset is required. Currently, a public SDN based dataset is not available. In this paper, SDN based dataset is created which include legitimate and non-legitimate traffic. Classification is divided into two categories: binary and multiclass classification. Traffic has been classified with or without dimension reduction techniques like PCA and LDA. Our approach provides 98.58% of accuracy using a random forest algorithm.

A Novel Network Anomaly Detection Method based on Data Balancing and Recursive Feature Addition

  • Liu, Xinqian;Ren, Jiadong;He, Haitao;Wang, Qian;Sun, Shengting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.3093-3115
    • /
    • 2020
  • Network anomaly detection system plays an essential role in detecting network anomaly and ensuring network security. Anomaly detection system based machine learning has become an increasingly popular solution. However, due to the unbalance and high-dimension characteristics of network traffic, the existing methods unable to achieve the excellent performance of high accuracy and low false alarm rate. To address this problem, a new network anomaly detection method based on data balancing and recursive feature addition is proposed. Firstly, data balancing algorithm based on improved KNN outlier detection is designed to select part respective data on each category. Combination optimization about parameters of improved KNN outlier detection is implemented by genetic algorithm. Next, recursive feature addition algorithm based on correlation analysis is proposed to select effective features, in which a cross contingency test is utilized to analyze correlation and obtain a features subset with a strong correlation. Then, random forests model is as the classification model to detection anomaly. Finally, the proposed algorithm is evaluated on benchmark datasets KDD Cup 1999 and UNSW_NB15. The result illustrates the proposed strategies enhance accuracy and recall, and decrease the false alarm rate. Compared with other algorithms, this algorithm still achieves significant effects, especially recall in the small category.

Effects of the Social Network Structure on Suicidal Thoughts of Elderly Single and Couple Households in Korea: Supportive and Conflictual Networks (노인단독가구 노인의 사회적 관계망구조가 자살생각에 미치는 영향: 도움관계망과 갈등관계망을 중심으로)

  • Oh, Young Eun;Lee, Jeong Hwa;Shin, Hyo Yeon
    • The Korean Journal of Community Living Science
    • /
    • v.25 no.4
    • /
    • pp.511-531
    • /
    • 2014
  • This study explores supportive and conflictual network structures of elderly single and couple households and analyzes the effects of supportive and conflictual networks on suicidal thoughts by gender and family type. The analysis considered a sample of 522 individuals over the age of 60 who did not live with their adult children. The statistical methods used to analyze data were descriptive statistics, a t-test, a chi-square test and a regression analysis using SPSS WIN 20.0. The results are as follows. First, men and elderly single households had support networks that were smaller than those of women and elderly couple households. The conflictual network of elderly couples households was larger than that of elderly single households. In addition, the larger the network, the more the conflictual was. Second, elderly single households thought about suicide more often than elderly couple households. Third, economic status, the number of adult children, the size of conflictual network and subjective health had considerable influence on suicidal thoughts of elderly single and couple households. The size of the conflictual network had a greater effect on suicidal thoughts of elderly individuals than that of the supportive network. These results have important policy implications for elderly single and couple households.

Image Restoration using GAN (적대적 생성신경망을 이용한 손상된 이미지의 복원)

  • Moon, ChanKyoo;Uh, YoungJung;Byun, Hyeran
    • Journal of Broadcast Engineering
    • /
    • v.23 no.4
    • /
    • pp.503-510
    • /
    • 2018
  • Restoring of damaged images is a fundamental problem that was attempted before digital image processing technology appeared. Various algorithms for reconstructing damaged images have been introduced. However, the results show inferior restoration results compared with manual restoration. Recent developments of DNN (Deep Neural Network) have introduced various studies that apply it to image restoration. However, if the wide area is damaged, it can not be solved by a general interpolation method. In this case, it is necessary to reconstruct the damaged area through contextual information of surrounding images. In this paper, we propose an image restoration network using a generative adversarial network (GAN). The proposed system consists of image generation network and discriminator network. The proposed network is verified through experiments that it is possible to recover not only the natural image but also the texture of the original image through the inference of the damaged area in restoring various types of images.