• 제목/요약/키워드: Data Network

Search Result 18,207, Processing Time 0.046 seconds

Identification of prognosis-specific network and prediction for estrogen receptor-negative breast cancer using microarray data and PPI data (마이크로어레이 데이터와 PPI 데이터를 이용한 에스트로겐 수용체 음성 유방암 환자의 예후 특이 네트워크 식별 및 예후 예측)

  • Hwang, Youhyeon;Oh, Min;Yoon, Youngmi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.137-147
    • /
    • 2015
  • This study proposes an algorithm for predicting breast cancer prognosis based on genetic network. We identify prognosis-specific network using gene expression data and PPI(protein-protein interaction) data. To acquire the network, we calculate Pearson's correlation coefficient(PCC) between genes in all PPI pairs using gene expression data. We develop a prediction model for breast cancer patients with estrogen-receptor-negative using the network as a classifier. We compare classification performance of our algorithm with existing algorithms on independent data and shows our algorithm is improved. In addition, we make an functionality analysis on the genes in the prognosis-specific network using GO(Gene Ontology) enrichment validation.

A Model for Privacy Preserving Publication of Social Network Data (소셜 네트워크 데이터의 프라이버시 보호 배포를 위한 모델)

  • Sung, Min-Kyung;Chung, Yon-Dohn
    • Journal of KIISE:Databases
    • /
    • v.37 no.4
    • /
    • pp.209-219
    • /
    • 2010
  • Online social network services that are rapidly growing recently store tremendous data and analyze them for many research areas. To enhance the effectiveness of information, companies or public institutions publish their data and utilize the published data for many purposes. However, a social network containing information of individuals may cause a privacy disclosure problem. Eliminating identifiers such as names is not effective for the privacy protection, since private information can be inferred through the structural information of a social network. In this paper, we consider a new complex attack type that uses both the content and structure information, and propose a model, $\ell$-degree diversity, for the privacy preserving publication of the social network data against such attacks. $\ell$-degree diversity is the first model for applying $\ell$-diversity to social network data publication and through the experiments it shows high data preservation rate.

A Privacy Protection Method in Social Networks Considering Structure and Content Information (소셜 네트워크에서 구조정보와 내용정보를 고려한 프라이버시 보호 기법)

  • Sung, Minh-Kyoung;Lee, Ki-Yong;Chung, Yon-Dohn
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.119-128
    • /
    • 2010
  • Recently, social network services are rapidly growing and it is estimated that this trend will continue in the future. Social network data can be published for various purposes such as statistical analysis and population studies. When data publication, however, it may disclose the personal privacy of some people, since it can be combined with external information. Therefore, a social network data holder has to remove the identifiers of persons and modify data which have the potential to disclose the privacy of the persons by combining it with external information. The utility of data is maximized when the modification of data is minimized. In this paper, we propose a privacy protection method for social network data that considers both structural and content information. Previous work did not consider content information in the social network or distorted too much structural information. We also verify the effectiveness and applicability of the proposed method under various experimental conditions.

A Non-Uniform Network Split Method for Energy Efficiency in a Data Centric Sensor Network (데이타 중심 센서 네트워크에서 에너지 효율성을 고려한 비균등 네트워크 분할 기법)

  • Kang, Hong-Koo;Kim, Joung-Joon;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.9 no.3
    • /
    • pp.35-50
    • /
    • 2007
  • In a data centric sensor network, a sensor node to store data is determined by the measured data value of each sensor node. Therefore, if the same data occur frequently, the energy of the sensor node to store the data is exhausted quickly due to the concentration of loads. And if the sensor network is extended, the communication cost for storing data and processing queries is increased, since the length of the routing path for them is usually in the distance. However, the existing researches that generally focus on the efficient management of data storing can not solve these problems efficiently. In this paper, we propose a NUNS(Non-Uniform Network Split) method that can distribute loads of sensor nodes and decrease the communication cost caused by the sensor network extension. By dividing the sensor network into non-uniform partitions that have the minimum difference in the number of sensor nodes and the splitted area size and storing the data which is occurred in a partition at the sensor nodes within the partition, the NUNS can distribute loads of sensor nodes and decrease the communication cost efficiently. In addition, by dividing each partition into non-uniform zones that have the minimum difference in the splitted area size as many as the number of the sensor nodes in the partition and allocating each of them as the processing area of each sensor node, the NUNS can protect a specific sensor node from the load concentration and decrease the unnecessary routing cost.

  • PDF

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF

Various Techniques for Improving of the Reliability of the Wireless Network Design/Optimization Simulation Tool (무선망 설계/최적화 시뮬레이션 툴 의 다양한 신뢰도 향상 기법)

  • Jeon Hyun-Cheol;Ryu Jae-Hyun;Park Sang-Jin;Park Joo-Yeoul;Kim Jung-Chul
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.39-42
    • /
    • 2006
  • There are various analysis functions(including prediction of path loss, analyzing of capacity and coverage, etc.) of simulation tool to design and optimize the mobile communication network. Its reliability absolutely effects the performance of mobile communication network. Especially as the wireless network highly advancing focused on data service, it more needs to research and develop on the standard establishment of reliability of the simulation tool. Also it is important the systematic research how to improve the reliability of simulation tool. In this paper, to give the concrete process and skill about how to improve reliability, we define the kinds of reliability at first. And then we explain the comparison results between real field measurement data and theoretic simulation data.

  • PDF

Simulation of Storage Capacity Analysis with Queuing Network Models (큐잉 네트워크 모델을 적용한 저장용량 분석 시뮬레이션)

  • Kim, Yong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.221-228
    • /
    • 2005
  • Data storage was thought to be inside of or next to server cases but advances in networking technology make the storage system to be located far away from the main computer. In Internet era with explosive data increases, balanced development of storage and transmission systems is required. SAN(Storage Area Network) and NAS(Network Attached Storage) reflect these requirements. It is important to know the capacity and limit of the complex storage network system to got the optimal performance from it. The capacity data is used for performance tuning and making purchasing decision of storage. This paper suggests an analytic model of storage network system as queuing network and proves the model though simulation model.

  • PDF

An Area Efficient Network Interface Architecture (NoC에서 면적 효율적인 Network Interface 구조에 관한 연구)

  • Lee, Ser-Hoon;Hwang, Sun-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5C
    • /
    • pp.361-370
    • /
    • 2008
  • NoC is adopted for data communication between processors and IPs in MPSoC system. NoC has an advantage of scalability in that system can be easily expanded just by adding switches. However, as the number of switches increases, chip area increases as well as data transfer latency. This paper proposes an architecture that can reduce the number of switches in the system by sharing network interfaces. To reduce NI area, the modules sharing network interface use a common buffer in network interface. Experimental results show that the chip area has been reduced by 46.5% and data transfer latency by 17.1%, respectively, compared to conventional architecture.

Efficient Data Transmission Scheme with Data Fusion inside a Smart Vessel (Data Fusion 기술을 활용한 스마트선박 내 효율적 데이터 전송 방안)

  • Kim, Yeon-Geun;Lee, Seong Ro;Jeong, Min-A;Kim, Beom-Mu;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1146-1150
    • /
    • 2014
  • Recently, there has been interests in smart vessel technology, and it needs to consider an intelligent control system for efficient vessel manangement. In a smart vessel, however, it can cause a network overload due to a number of data transmission from a variety of sensor nodes and bridge nodes. In this letter, we propose an data transmission scheme with data fusion to reduce the number of traffic from the sensor nodes. Hence it can decrease network overload for intelligent vessel management.

A Study on Smart Network Utilizing the Data Localization for the Internet of Things (사물 인터넷을 위한 데이터 지역화를 제공하는 스마트 네트워크에 관한 연구)

  • Kang, Mi-Young;Nam, Ji-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.336-342
    • /
    • 2017
  • Traffic can be localized by reducing the traffic load on the physical network by causing traffic to be generated at the end of the packet network. By localizing traffic, the IoT-based sensitive data-related security issues can be supported effectively. In addition, it can be applied effectively to the next-generation smart network environment without changing the existing network infrastructure. In this paper, a content priority scheme was applied to smart network-based IoT data. The IoT contents were localized to efficiently pinpoint the flow of traffic on the network to enable smart forwarding. In addition, research was conducted to determine the effective network traffic routes through content localization. Through this study, the network load was reduced. In addition, it is a network structure that can guarantee user quality. In addition, it proved that the IoT service can be accommodated effectively in a smart network-based environment.