• 제목/요약/키워드: Approach of Network

검색결과 4,556건 처리시간 0.041초

센서 네트워크와 인터넷과의 정적 주소 연동 방안 구현 (Implementation of Static Address-Internetworking Scheme between Wireless Sensor Network and Internet)

  • 김정희;권훈;곽호영;도양회;변영철;김도현
    • 한국콘텐츠학회논문지
    • /
    • 제6권12호
    • /
    • pp.40-49
    • /
    • 2006
  • 집적회로, 무선 통신, 그리고 마이크로 컴퓨팅 등의 기술 발전에 힘입어, 유비쿼터스 컴퓨팅 환경을 실현하고 차세대 IT 산업을 이끌 새로운 기술로서 센서 네트워크 기술이 점차 주목 받고 있으며 많은 연구가 활발히 수행되고 있다. 향후 센서 네트워크는 이를 구성하는 각각의 센서 노드들, 그리고 더 나아가 센서 네트워크 자체도 지속적으로 생성되거나 소멸되면서 기존의 네트워크와 상호 통신하고 주위환경에 맞추어 변화하며 동적으로 진화해 나갈 전망이다. 따라서 서로 다른 주소 체계를 사용하고 있는 센서 네트워크와 기존 네트워크간의 상호 연동이 요구된다. 본 논문은 센서 네트워크와 인터넷과의 상호 통신을 위한 주소 연동 방안을 제안한다. 제안된 연동 방안은 응용 계층 게이트웨이 기법과 IP 오버레이 네트워크 기법을 갖추면서 Zigbee 기반 센서 네트워크의 주소 체계와 인터넷의 주소체계인 IP 기반 인터넷 주소 체계가 서로 통신할 수 있도록 주소를 배정시켜주는 방안이며, 실험을 통해 제안된 연동 방안을 검증한다.

  • PDF

QFD를 이용한 미래 공격헬기의 핵심기능 도출 (Derivation of Critical Functions of the Future Attack Helicopter Using QFD)

  • 이재원;권용수;고남경
    • 한국군사과학기술학회지
    • /
    • 제16권3호
    • /
    • pp.348-357
    • /
    • 2013
  • This work describes an approach that contributes to derive from mission to critical functions of the attack helicopter under future battle space environment. An existing mission of the attack helicopter is limited to the only shooter oriented functions. In the future environment, mission and its functions of the helicopter might be much expanded. The functions should be derived by the top down approach based on systems engineering approach. In this point of view, this work describes network based future battle environment. From this environment, the missions of the attack helicopter are identified and optimized functions are derived through sequential procedures like from missions to tasks, tasks to activities, and activities to functions. The selected activities are obtained from the tasks using QFD. The weighting scores of the QFD are calculated by the AHP computational procedure. Finally the critical functions are presented through the similar procedure.

신경회로망을 이용한 UPFC가 연계된 송전선로의 거리계전기에 관한 연구 (A Study on Distance Relay of Transmission with UPFC Using Artificial Neural Network)

  • 박정호;정창호;신동준;김진오
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2002년도 하계학술대회 논문집 A
    • /
    • pp.196-198
    • /
    • 2002
  • This paper represents a new approach for the protective relay of power transmission lines using a Artificial Neural Network(ANN). A different fault on transmission lines need to be detected, classified and located accurately and cleared as fast as possible. However, The protection range of the distance relay is always designed on the basis of fixed settings, and unfortunately these approach do not have the ability to adapt dynamically to the system operating condition. ANN is suitable for the adaptive relaying and the detection of complex faults. The backpropagation algorithm based multi-layer perceptron is utilized for the learning process. It allows to make control to various protection functions. As expected, the simulation result demonstrate that this approach is useful and satisfactory.

  • PDF

Enhancing cloud computing security: A hybrid machine learning approach for detecting malicious nano-structures behavior

  • Xu Guo;T.T. Murmy
    • Advances in nano research
    • /
    • 제15권6호
    • /
    • pp.513-520
    • /
    • 2023
  • The exponential proliferation of cutting-edge computing technologies has spurred organizations to outsource their data and computational needs. In the realm of cloud-based computing environments, ensuring robust security, encompassing principles such as confidentiality, availability, and integrity, stands as an overarching imperative. Elevating security measures beyond conventional strategies hinges on a profound comprehension of malware's multifaceted behavioral landscape. This paper presents an innovative paradigm aimed at empowering cloud service providers to adeptly model user behaviors. Our approach harnesses the power of a Particle Swarm Optimization-based Probabilistic Neural Network (PSO-PNN) for detection and recognition processes. Within the initial recognition module, user behaviors are translated into a comprehensible format, and the identification of malicious nano-structures behaviors is orchestrated through a multi-layer neural network. Leveraging the UNSW-NB15 dataset, we meticulously validate our approach, effectively characterizing diverse manifestations of malicious nano-structures behaviors exhibited by users. The experimental results unequivocally underscore the promise of our method in fortifying security monitoring and the discernment of malicious nano-structures behaviors.

Securing SCADA Systems: A Comprehensive Machine Learning Approach for Detecting Reconnaissance Attacks

  • Ezaz Aldahasi;Talal Alkharobi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.1-12
    • /
    • 2023
  • Ensuring the security of Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) is paramount to safeguarding the reliability and safety of critical infrastructure. This paper addresses the significant threat posed by reconnaissance attacks on SCADA/ICS networks and presents an innovative methodology for enhancing their protection. The proposed approach strategically employs imbalance dataset handling techniques, ensemble methods, and feature engineering to enhance the resilience of SCADA/ICS systems. Experimentation and analysis demonstrate the compelling efficacy of our strategy, as evidenced by excellent model performance characterized by good precision, recall, and a commendably low false negative (FN). The practical utility of our approach is underscored through the evaluation of real-world SCADA/ICS datasets, showcasing superior performance compared to existing methods in a comparative analysis. Moreover, the integration of feature augmentation is revealed to significantly enhance detection capabilities. This research contributes to advancing the security posture of SCADA/ICS environments, addressing a critical imperative in the face of evolving cyber threats.

연속형 중심-주변 네트워크 모형을 통한 세대 간 세대 내 디지털 격차 해소를 위한 전략 도출 (Deriving a Strategy for Resolving the Inter-and Intra-generational Digital Divide based on the Continuous Core-periphery Network Model)

  • 유인진;하상집;박도형
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제31권1호
    • /
    • pp.115-146
    • /
    • 2022
  • Purpose The purpose of this study is to find meaningful insights using regression analysis to resolve the digital divide between generations. In the analysis process of this study, social network analysis was applied to approach it with a perspective differentiated from the existing statistical techniques. Design/methodology/approach This study used a social network analysis methodology that transforms and analyzes government-led survey data into relational data. First, the cross-sectional data were converted into relational data, and a continuous core-periphery model and multidimensional scaling method were applied. Afterwards, the relationship between various factors affecting the digital divide and the difference in influence were analyzed by generation. Findings According to the network analysis results, it can be seen that all generations commonly use 'information and news search' and 'living information service'. However, it can be seen that the centrally used services of each generation are clearly different from each other, and the degree of linkage between the services is also clearly different. In addition, it can be seen that the relationship between factors influencing the digital divide by generation is also different.

Applying Deep Reinforcement Learning to Improve Throughput and Reduce Collision Rate in IEEE 802.11 Networks

  • Ke, Chih-Heng;Astuti, Lia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권1호
    • /
    • pp.334-349
    • /
    • 2022
  • The effectiveness of Wi-Fi networks is greatly influenced by the optimization of contention window (CW) parameters. Unfortunately, the conventional approach employed by IEEE 802.11 wireless networks is not scalable enough to sustain consistent performance for the increasing number of stations. Yet, it is still the default when accessing channels for single-users of 802.11 transmissions. Recently, there has been a spike in attempts to enhance network performance using a machine learning (ML) technique known as reinforcement learning (RL). Its advantage is interacting with the surrounding environment and making decisions based on its own experience. Deep RL (DRL) uses deep neural networks (DNN) to deal with more complex environments (such as continuous state spaces or actions spaces) and to get optimum rewards. As a result, we present a new approach of CW control mechanism, which is termed as contention window threshold (CWThreshold). It uses the DRL principle to define the threshold value and learn optimal settings under various network scenarios. We demonstrate our proposed method, known as a smart exponential-threshold-linear backoff algorithm with a deep Q-learning network (SETL-DQN). The simulation results show that our proposed SETL-DQN algorithm can effectively improve the throughput and reduce the collision rates.

홉필드 신경회로망을 이용한 배전계통계획의 최적 경로 탐색 (Optimal Routing of Distribution System Planning using Hopfield Neural Network)

  • 김대욱;이명환;김병섭;신중린;채명석
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1999년도 하계학술대회 논문집 C
    • /
    • pp.1117-1119
    • /
    • 1999
  • This paper presents a new approach for the optimal routing problem of distribution system planning using the well known Hopfield Neural Network(HNN) method. The optimal routing problem(ORP) in distribution system planning(DSP) is generally formulated as combinational mixed integer problem with various equality and inequality constraints. For the exceeding nonlinear characteristics of the ORP most of the conventional mathematical methods often lead to a local minimum. In this paper, a new approach was made using the HNN method for the ORP to overcome those disadvantages. And for this approach, a appropriately designed energy function suited for the ORP was proposed. The proposed algorithm has been evaluated through the sample distribution planning problem and the simulation results are presented.

  • PDF

Advanced Transverse Wave Approach for MM-Wave Analysis of Planar Antennas applied in 5G-Technology

  • Ayari, Mohamed;Touati, Yamen El;Altowaijri, Saleh
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.295-299
    • /
    • 2022
  • In this paper, a fast numerical electromagnetic (EM) method based on the transverse wave formulation called-up Advanced Transverse Wave Approach (A-TWA) is presented. An appropriate 5G antenna is designed, simulated and investigated in the context of Millimeter-Wave Wireless Communication Systems. The obtained simulation results are found in good agreement with literature. Such a method can provide for the simulators a great library integrating the most complexly and sensitively geometry elements that can have a huge impact on the applications supported by new wireless technologies.

Teenagers Consumption Within the Moderating Role of Saudis Habit Through Fuzzy Set Approach

  • Maher Toukabri
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.173-181
    • /
    • 2024
  • The healthy products dedicated for young people are qualified as a solution to protect the future generation, especially that most commercial deals do not consider the consumer's health and environment. Therefore, it is crucial to define the antecedent of healthy purchases and to examine their impact on teenagers. This research aims to explore the antecedents and the consequences of the consumption of Saudis teenagers. Therefore, we develop a research model in the conceptual framework and the hypotheses to test. The empirical analysis required two samples from Saudis youth consumers. The first sample was utilized in the exploratory study with SPSS software. Then, the second was employed to the confirmatory part with the Amos software, as well as the validation of the hypotheses, and model with Fuzzy Set approach. The findings of this study have significant insights into the Saudi consumption and implications for both practitioners and researchers. Then, we have particularly strenuous on intention purchase antecedents of organic foods, and their consume habit moderation.