• Title/Summary/Keyword: Complex Network

Search Result 2,217, Processing Time 0.032 seconds

Hybrid Mobile IP Protocol for Service Session Continuity between WiBro and HSDPA (WiBro와 HSDPA 망간 서비스 연속성을 제공하기 위한 Hybrid Mobil IP 프로토콜)

  • Kim, Sung-Jin;Choi, Woo-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.223-228
    • /
    • 2008
  • Recently, various types of wireless access networks, such as WLAN, WiBro and HSDPA, etc, have been successfully deployed by commercial service providers (i.e., KT, KTF). In this situation, there are many efforts to provide high quality of services to guarantee seamless mobility between heterogeneous networks. The IP layer mobility protocols are efficient mechanisms to provide seamless mobility between IP based heterogeneous networks as well as homogeneous networks. However, to apply IP mobility protocols in real heterogeneous networks (i.e., WiBro and HSDPA), we must consider not only the basic features of techniques of wireless access networks (i.e., Data rate, Coverage, Quality of Service) but also the problem of real environment of service provider (i.e., Expanse cost to change the access network). Due to this reason, it is difficult to satisfy required conditions by using only one IP mobility protocol in real heterogeneous networks. Therefore, in this paper, we propose an efficient mobility protocol to solve the complex problems that are occurred in real heterogeneous networks. The proposed protocol, so-called, "Hybrid Mobile IP" tries to provide a synergy effect by integrating Client Mobile IPv4 (CMIPv4) and Proxy Mobile IPv4 (PMIPv4), and using the two mobility protocols selectively according to the situation of real heterogeneous networks.

  • PDF

Handoff signaling implementation using H.323 rerouting in IP-based network (IP 기반 망에서 H.323 리라우팅을 이용한 핸드오프 시그널링 구현)

  • Lee, Yeong-Sin;Choi, Gi-Moo
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.821-830
    • /
    • 2001
  • H.323 proposes to use Mobile IP and H.323 ad hoc conference signaling to provide Handoff function to a mobile terminal. But H.323 ad hoc conference signaling has a drawback. It requires an H.323 endpoint to do a complex conference signaling which makes inter-operability between H.323 endpoints difficult and takes the longer signaling time. In this paper, we propose an Handoff signaling using H.323 rerouting(Third party initiated Pause and Rerouting). H.323 rerouting signaling only requires an H.323 endpoint to do H.323 basic signaling in reestablishing media channel, and makes inter-operability more easier and provides the faster Handoff. To do this, our H.323 GK has derived H.245 control channel using tunneling for all H.323 calls including the fast connect calls which enable endpoints communicate each other if they don\`t have H.245 control channel. In order to evaluate the performance of the proposed signaling, we have conducted an experiment that compares a call transfer signaling using H.323 rerouting with ad hoc conference signaling in inter-operability and signaling delay. The results of our experiment shows that the call transfer signaling can inter-operate with four H.323 endpoints among five H.323 endpoints of other vendors and reduces the signaling delay average 1.4 sec.

  • PDF

The development of water circulation model based on quasi-realtime hydrological data for drought monitoring (수문학적 가뭄 모니터링을 위한 실적자료 기반 물순환 모델 개발)

  • Kim, Jin-Young;Kim, Jin-Guk;Kim, Jang-Gyeng;Chun, Gun-il;Kang, Shin-uk;Lee, Jeong-Ju;Nam, Woo-Sung;Kwon, Hyun-Han
    • Journal of Korea Water Resources Association
    • /
    • v.53 no.8
    • /
    • pp.569-582
    • /
    • 2020
  • Recently, Korea has faced a change in the pattern of water use due to urbanization, which has caused difficulties in understanding the rainfall-runoff process and optimizing the allocation of available water resources. In this perspective, spatially downscaled analysis of the water balance is required for the efficient operation of water resources in the National Water Management Plan and the River Basin Water Resource Management Plan. However, the existing water balance analysis does not fully consider water circulation and availability in the basin, thus, the obtained results provide limited information in terms of decision making. This study aims at developing a novel water circulation analysis model that is designed to support a quasi-real-time assessment of water availability along the river. The water circulation model proposed in this study improved the problems that appear in the existing water balance analysis. More importantly, the results showed a significant improvement over the existing model, especially in the low flow simulation. The proposed modeling framework is expected to provide primary information for more realistic hydrological drought monitoring and drought countermeasures by providing streamflow information in quasi-real-time through a more accurate natural flow estimation approach with highly complex network.

Design and Implementation of Sequential Pattern Miner to Analyze Alert Data Pattern (경보데이터 패턴 분석을 위한 순차 패턴 마이너 설계 및 구현)

  • Shin, Moon-Sun;Paik, Woo-Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.1-13
    • /
    • 2009
  • Intrusion detection is a process that identifies the attacks and responds to the malicious intrusion actions for the protection of the computer and the network resources. Due to the fast development of the Internet, the types of intrusions become more complex recently and need immediate and correct responses because the frequent occurrences of a new intrusion type rise rapidly. Therefore, to solve these problems of the intrusion detection systems, we propose a sequential pattern miner for analysis of the alert data in order to support intelligent and automatic detection of the intrusion. Sequential pattern mining is one of the methods to find the patterns among the extracted items that are frequent in the fixed sequences. We apply the prefixSpan algorithm to find out the alert sequences. This method can be used to predict the actions of the sequential patterns and to create the rules of the intrusions. In this paper, we propose an extended prefixSpan algorithm which is designed to consider the specific characteristics of the alert data. The extended sequential pattern miner will be used as a part of alert data analyzer of intrusion detection systems. By using the created rules from the sequential pattern miner, the HA(high-level alert analyzer) of PEP(policy enforcement point), usually called IDS, performs the prediction of the sequence behaviors and changing patterns that were not visibly checked.

  • PDF

Deep Learning-based SISR (Single Image Super Resolution) Method using RDB (Residual Dense Block) and Wavelet Prediction Network (RDB 및 웨이블릿 예측 네트워크 기반 단일 영상을 위한 심층 학습기반 초해상도 기법)

  • NGUYEN, HUU DUNG;Kim, Eung-Tae
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.703-712
    • /
    • 2019
  • Single image Super-Resolution (SISR) aims to generate a visually pleasing high-resolution image from its degraded low-resolution measurement. In recent years, deep learning - based super - resolution methods have been actively researched and have shown more reliable and high performance. A typical method is WaveletSRNet, which restores high-resolution images through wavelet coefficient learning based on feature maps of images. However, there are two disadvantages in WaveletSRNet. One is a big processing time due to the complexity of the algorithm. The other is not to utilize feature maps efficiently when extracting input image's features. To improve this problems, we propose an efficient single image super resolution method, named RDB-WaveletSRNet. The proposed method uses the residual dense block to effectively extract low-resolution feature maps to improve single image super-resolution performance. We also adjust appropriated growth rates to solve complex computational problems. In addition, wavelet packet decomposition is used to obtain the wavelet coefficients according to the possibility of large scale ratio. In the experimental result on various images, we have proven that the proposed method has faster processing time and better image quality than the conventional methods. Experimental results have shown that the proposed method has better image quality by increasing 0.1813dB of PSNR and 1.17 times faster than the conventional method.

Management Automation Technique for Maintaining Performance of Machine Learning-Based Power Grid Condition Prediction Model (기계학습 기반 전력망 상태예측 모델 성능 유지관리 자동화 기법)

  • Lee, Haesung;Lee, Byunsung;Moon, Sangun;Kim, Junhyuk;Lee, Heysun
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.6 no.4
    • /
    • pp.413-418
    • /
    • 2020
  • It is necessary to manage the prediction accuracy of the machine learning model to prevent the decrease in the performance of the grid network condition prediction model due to overfitting of the initial training data and to continuously utilize the prediction model in the field by maintaining the prediction accuracy. In this paper, we propose an automation technique for maintaining the performance of the model, which increases the accuracy and reliability of the prediction model by considering the characteristics of the power grid state data that constantly changes due to various factors, and enables quality maintenance at a level applicable to the field. The proposed technique modeled a series of tasks for maintaining the performance of the power grid condition prediction model through the application of the workflow management technology in the form of a workflow, and then automated it to make the work more efficient. In addition, the reliability of the performance result is secured by evaluating the performance of the prediction model taking into account both the degree of change in the statistical characteristics of the data and the level of generalization of the prediction, which has not been attempted in the existing technology. Through this, the accuracy of the prediction model is maintained at a certain level, and further new development of predictive models with excellent performance is possible. As a result, the proposed technique not only solves the problem of performance degradation of the predictive model, but also improves the field utilization of the condition prediction model in a complex power grid system.

Analysis of Technology Association Rules Between CPC Codes of the 'Internet of Things(IoT)' Patent (CPC 코드 기반 사물인터넷(IoT) 특허의 기술 연관성 규칙 분석)

  • Shim, Jaeruen
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.5
    • /
    • pp.493-498
    • /
    • 2019
  • This study deals with the analysis of the technology association rules between CPC codes of the Internet of Things(IoT) patent, the core of the Fourth Industrial Revolution ICT-based technology. The association rules between CPC codes were extracted using R, an open source for data mining. To this end, we analyzed 369 of the 605 patents related to the Internet of Things filed with the Patent Office until July 2019, with a complex CPC code, up to the subclass-level. As a result of the technology association rules, CPC codes with high support were [H04W ${\rightarrow}$ H04L](18.2%), [H04L ${\rightarrow}$ H04W](18.2%), [G06Q ${\rightarrow}$ H04L](17.3%), [H04L ${\rightarrow}$ G06Q](17.3%), [H04W ${\rightarrow}$ G06Q](9.8%), [G06Q ${\rightarrow}$ H04W](9.8%), [G06F ${\rightarrow}$ H04L](7.9%), [H04L ${\rightarrow}$ G06F](7.9%), [G06F ${\rightarrow}$ G06Q](6.2%), [G06Q ${\rightarrow}$ G06F](6.2%). After analyzing the technology interconnection network, the core CPC codes related to technology association rules are G06Q and H04L. The results of this study can be used to predict future patent trends.

Restoration of The Transportation Network between North and South Korea for Mt. Geumgang Tourism (금강산(내금강) 관광을 위한 남북연결 교통망에 관한 연구)

  • HONG, Gil-Jong;BAE, Sun-Hak
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.3
    • /
    • pp.51-64
    • /
    • 2019
  • Mt. Geumgang has been a scenic spot representing the Korean peninsula since the Joseon Dynasty, and became a symbol of inter-Korean exchanges with the Gaesong Industrial Complex after the division of the South and North. Mt. Geumgang Tour Course is divided into the Inner-Geumgang (Naegeumgang) and the Outer-Geumgang (Oegeumgang). It was common for the Mt. Geumgang tour route during the Joseon Dynasty and the Japanese Imperialization period to enter the Inner-Geumgang, near Seoul, and come to the East Sea through the Outer-Geumgang. However, the tour route starting from Goseong was utilized for the Mt. Geumgang tour course operated by Hyundai. Because North Korea opened only the Outer-Geumgang area. North Korea has only opened some of its tour courses to Hyundai, but if Geumgang tourism is resumed in the future, there is a high possibility that it will be opened further, such as opening some sections of the Inner-Geumgang in 2007. In this case, it is necessary to connect additional transportation networks to access Inner-Geumgang from South Korea. The best alternative was the restoration of the Mt. Geumgang Railway. However, considering the fact that the reconstruction of the Mt. Geumgang Railway can not be completed due to the construction of the Imnam Dam, it is the most realistic alternative to restore Route 31 connecting Yanggu and Geumgang-eup. As a result of the analysis of road connecting Inner-Geumgang, three routes were confirmed. All of which were adjacent to the existing National Route 31. These routes passing through Dutayeon and Mundeung-ri and joining the Route 31 from Inje. Considering road length, topography characteristics, and military facility layout, it seems that the connection of 'Dutaeyun - Mundeung - Geumgang' is a realistic alternative connecting from South Korea to Inner-Geumgang.

Design and Implementation of Blockchain Network Based on Domain Name System (블록체인 네트워크 기반의 도메인 네임 시스템 설계 및 구현)

  • Heo, Jae-Wook;Kim, Jeong-Ho;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.36-46
    • /
    • 2019
  • The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.

RDP-based Lateral Movement Detection using PageRank and Interpretable System using SHAP (PageRank 특징을 활용한 RDP기반 내부전파경로 탐지 및 SHAP를 이용한 설명가능한 시스템)

  • Yun, Jiyoung;Kim, Dong-Wook;Shin, Gun-Yoon;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.4
    • /
    • pp.1-11
    • /
    • 2021
  • As the Internet developed, various and complex cyber attacks began to emerge. Various detection systems were used outside the network to defend against attacks, but systems and studies to detect attackers inside were remarkably rare, causing great problems because they could not detect attackers inside. To solve this problem, studies on the lateral movement detection system that tracks and detects the attacker's movements have begun to emerge. Especially, the method of using the Remote Desktop Protocol (RDP) is simple but shows very good results. Nevertheless, previous studies did not consider the effects and relationships of each logon host itself, and the features presented also provided very low results in some models. There was also a problem that the model could not explain why it predicts that way, which resulted in reliability and robustness problems of the model. To address this problem, this study proposes an interpretable RDP-based lateral movement detection system using page rank algorithm and SHAP(Shapley Additive Explanations). Using page rank algorithms and various statistical techniques, we create features that can be used in various models and we provide explanations for model prediction using SHAP. In this study, we generated features that show higher performance in most models than previous studies and explained them using SHAP.