• Title/Summary/Keyword: Computer Networks

Search Result 5,189, Processing Time 0.043 seconds

A Study on Security System of 4G Network System (4세대 네트워크 시스템의 보안시스템에 관한 연구)

  • Kim, Hee-Sook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.15-23
    • /
    • 2016
  • In this paper we presented 4G security models in an open environment. 4G networks have still more security holes and open issues for expert to notice. In here. we show that a number of new security threats to cause unexpected service interruption and disclosure of information will be possible in 4G due mainly to the fact that 4G is an IP-based, heterogeneous network. it tells about the security issues and vulnerabilities present in the above 4G standards.. we try to present several architectures behind 4G infrastructure for example WiMAX and 3GPP LTE architecture. Finally, we point to potential areas for future vulnerabilities and evaluate areas in 4G security which warrant attention. When you make a big dada program, If you use this network architecture then you can improve your learning speed.

Detection of Epileptic Seizure Based on Peak Using Sequential Increment Method (점증적 증가를 이용한 첨점 기반의 간질 검출)

  • Lee, Sang-Hong
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.287-293
    • /
    • 2015
  • This study proposed signal processing techniques and neural network with weighted fuzzy membership functions(NEWFM) to detect epileptic seizure from EEG signals. This study used wavelet transform(WT), sequential increment method, and phase space reconstruction(PSR) as signal processing techniques. In the first step of signal processing techniques, wavelet coefficients were extracted from EEG signals using the WT. In the second step, sequential increment method was used to extract peaks from the wavelet coefficients. In the third step, 3D diagram was produced from the extracted peaks using the PSR. The Euclidean distances and statistical methods were used to extract 16 features used as inputs for NEWFM. The proposed methodology shows that accuracy, specificity, and sensitivity are 97.5%, 100%, 95% with 16 features, respectively.

Advanced FEC Scheme Considering Energy and Link-Quality for Solar-Powered WSNs (태양 에너지 기반 무선 센서 네트워크에서 에너지와 링크 품질을 고려한 향상된 FEC 기법)

  • Gil, Gun Wook;Kang, Minjae;Noh, Dong Kun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.4
    • /
    • pp.83-88
    • /
    • 2020
  • In Solar-powered wireless sensor networks(SP-WSN), the battery is periodically charged, so the best use of harvested energy is more important, rather than minimizing energy consumption. Meanwhile, as is well known, the reliability of communication between sensor nodes is very limited due to the resource-constraint of sensor nodes. In this paper, we propose an advanced FEC (forward error correction) scheme which can give SP-WSN more reliability for communication. Firstly, the proposed scheme uses energy modeling to calculate the amount of surplus energy which can be utilized for extra operations, and then determines the number of additional parity bits according to this amount of surplus energy. At the same time, link quality modeling calculates the optimal parity bits for error recovery in the current data communication environment. Finally, by considering these two parity sizes, it is possible to determine the optimal parity size that can maximize the data reliability without affecting the node black out. Performance verification was performed by comparing the amount of data collected at the sink and the number of outage nodes with other schemes.

Efficient Computing Method for Location-Based Density of Mobile Node (효과적인 위치 기반 이동 노드 밀집도 계산방법)

  • Kim, In-bum;Seo, Choon-weon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2196-2204
    • /
    • 2015
  • Location-based density information of mobile node could be used well in various, new and expanding areas such as location-based services, internet of things, smart grid technologies, and intelligent building. In general, receiving mobile nodes of a wireless mobile node depend on the maximum communication range of transmitting mobile node. In this paper, efficient computing method for mobile node using Delaunay triangulation is proposed, which is irrespective of mobile node's maximum communication range and reflect relative location in a given situation. Proposed method may be good used to find out the density of network constructed by various max communication range devices as Internet of Things. This method suggested in this paper could work well for location-based services, internet of things, smart grid technologies, and intelligent building.

A Study on Intelligent Performance Diagnostics of a Gas Turbine Engine Using Neural Networks (신경회로망을 이용한 가스터빈 엔진의 지능형 성능진단에 관한 연구)

  • Kong, Chang-Duk;Kho, Seong-Hee;Ki, Ja-Young
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.32 no.3
    • /
    • pp.51-57
    • /
    • 2004
  • An intelligent performance diagnostic computer program of a gas turbine using the NN(Neural Network) was developed. Recently on-condition performance monitoring of major gas path components using the GPA(Gas Path Analysis) method has been performed in analyzing of engine faults. However because the types and severities of engine faults are various and complex, it is not easy that all fault conditions of the engine would be monitored only by the GPA approach Therefore in order to solve this problem, application of using the NNs for learning and diagnosis would be required. Among then, a BPN (Back Propagation Neural Network) with one hidden layer, which can use an updating learning rate, was proposed for diagnostics of PT6A-62 turboprop engine in this work.

Scheduling for Guaranteeing QoS of Continuous Multimedia Traffic (연속적 멀티미디어 트래픽의 서비스 질 보장을 위한 스케쥴링)

  • 길아라
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.1
    • /
    • pp.22-32
    • /
    • 2003
  • Many of multimedia applications in distributed environments generate the packets which have the real-time characteristics for continuous audio/video data and transmit them according to the teal-time task scheduling theories. In this paper, we model the traffic for continuous media in the distributed multimedia applications based on the high-bandwidth networks and introduce the PDMA algorithm which is the hard real-time task scheduling theory for guaranteeing QoS requested by the clients. Furthermore, we propose the admission control to control the new request not to interfere the current services for maintaining the high quality of services of the applications. Since the proposed admission control is sufficient for the PDMA algorithm, the PDMA algorithm is always able to find the feasible schedule for the set of messages which satisfies it. Therefore, if the set of messages including the new request to generate the new traffic. Otherwise, it rejects the new request. In final, we present the simulation results for showing that the scheduling with the proposed admission control is of practical use.

Efficient Energy Management for a Solar Energy Harvesting Sensor System (태양 에너지 기반 센서 시스템을 위한 효율적인 에너지 관리 기법)

  • Noh, Dong-Kun;Yoon, Ik-Joon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.7
    • /
    • pp.478-488
    • /
    • 2009
  • Using solar power in wireless sensor networks (WSNs) requires adaptation to a highly varying energy supply and to a battery constraint. From an application's perspective, however, it is often preferred to operate at a constant quality level as opposed to changing application behavior frequently. Reconciling the varying supply with the fixed demand requires good tools for allocating energy such that average of energy supply is computed and demand is fixed accordingly. In this paper, we propose a probabilistic observation-based model for harvested solar energy. Based on this model, we develop a time-slot-based energy allocation scheme to use the periodically harvested solar energy optimally, while minimizing the variance in energy allocation. We also implement the testbed and demonstrate the efficiency of the approach by using it.

Anonymity of Tor Users on Unsecured Applications (비 암호화 프로그램 사용자의 토르망 익명성 보장 분석)

  • Shin, Seok-Joo;Dahal, Saurav;Pudasaini, Amod;Kang, Moon-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.805-816
    • /
    • 2017
  • Tor is a popular, low-latency open network that offers online anonymity to users by concealing their information from anyone conducting traffic analysis. At the same time, a number of conventional passive and active attacking schemes have been proposed to compromise the anonymity provided by the Tor network. In addition to attacks on the network through traffic analysis, interacting with an unsecured application can reveal a Tor user's IP address. Specific traffic from such applications bypasses Tor proxy settings in the user's machine and forms connections outside the Tor network. This paper presents such applications and shows how they can be used to deanonymize Tor users. Extensive test studies performed in the paper show that applications such as Flash and BitTorrent can reveal the IP addresses of Tor users.

A Golden Coded-Spatial Modulation MIMO System (골든 부호 기반의 공간 변조 다중 안테나 시스템)

  • Park, Myung Chul;Han, Dong Seog
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.31-40
    • /
    • 2013
  • In this paper, the spatial modulation (SM) multi-input multi-output (MIMO) system is proposed for indoor wireless local area networks (WLANs) with improved spectral efficiency. SM is suitable for high speed WLANs with avoiding the inter channel interference (ICI). Only one transmit antenna is activated in SM at each symbol interval. Therefore, it fails to attain the maximum coding gain of MIMO. The space time block code (STBC)-SM MIMO system can attain the maximum diversity gain at the expense of spectral efficiency. The proposed Golden-SM MIMO system uses the Golden code to improve the coding gain and spectral efficiency at the same time. The Golden code is adapted for STBC-SM and it makes the new code book for transmission symbols. The performance of the proposed system is compared with the conventional systems with computer simulations.

Study on Improving Vulhearability in IPv4/IPv6 Header Translation Mechanism (IPv4/IPv6 헤더변환 방식에서의 취약성 개선에 관한 연구)

  • 황호준;유승재;김귀남
    • Convergence Security Journal
    • /
    • v.3 no.1
    • /
    • pp.73-84
    • /
    • 2003
  • The IPv4 that used to be generally used as a medium of computer communications in 1980s has reached its limits now. IPv6 (IP Version 6) is being prepared to solve the limitations of the IPv4. However, the biggest problem of IPv6 is that it is not compatible with the IPv4. To resolve the compatibility issue, Dual Stack, Tunneling and Header Converting methods have been proposed. The Header Converting method allows communications between the IPv4 and IPv6 networks with the converter. This method's strength is that it is easy to embody and the procedures for embodiment is simple. However, this method still contains the weaknesses that the existing IPv4 has. On the current document, the Header Converting method among the three methods is discussed to resolve the problems this method has. To solve the Header Converting method's weakness, the security problem between sections, the IP Header field values are converted to the relative field values and IPSec (IP Security) and ESP (Encapsulation Security Payload) are applied. The proposed "Encrypted Header Converting Method" that is encrypted in packet units has solved the weakness that the pre-existing Header Converting method used to have.d to have.

  • PDF