• Title/Summary/Keyword: Data loss protection

Search Result 133, Processing Time 0.023 seconds

Energy-efficient Multicast Algorithm for Survivable WDM Networks

  • Pu, Xiaojuan;Kim, Young-Chon
    • Current Optics and Photonics
    • /
    • v.1 no.4
    • /
    • pp.315-324
    • /
    • 2017
  • In recent years, multicast services such as high-definition television (HDTV), video conferencing, interactive distance learning, and distributed games have increased exponentially, and wavelength-division multiplexing (WDM) networks are considered to be a promising technology due to their support for multicast applications. Multicast survivability in WDM networks has been the focus of extensive attention since a single-link failure in an optical network may result in a massive loss of data. But the improvement of network survivability increases energy consumption due to more resource allocation for protection. In this paper, an energy-efficient multicast algorithm (EEMA) is proposed to reduce energy consumption in WDM networks. Two cost functions are defined based on the link state to determine both working and protection paths for a multicast request in WDM networks. To increase the number of sleeping links, the link cost function of the working path aims to integrate new working path into the links with more working paths. Sleeping links indicate the links in sleep mode, which do not have any working path. To increase bandwidth utilization by sharing spare capacity, the cost function of the protection path is defined to use sleeping fibers for establishing new protection paths. Finally, the performance of the proposed algorithm is evaluated in terms of energy consumption, and also the blocking probability is evaluated under various traffic environments through OPNET. Simulation results show that our algorithm reduces energy consumption while maintaining the quality of service.

A Study on The Protection of Industrial Technology based on LDAP (LDAP기반의 산업기술 유출방지에 관한 연구)

  • Kim, Do-Hyeoung;Yoo, Jae-Hyung;Lee, Dong-Hwi;Ki, Jae-Seok;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.21-30
    • /
    • 2008
  • This study researched into the method that allows only the certified user and computational engineer to possibly use network resources and computing resources by implementing the system of the intensified certification and security based on LDAP(Lightweight Directory Access Protocol) directory service, that copes with incapacitation in security program due to making the security program forcibly installed, and that can correctly track down the industrial-technology exporter along with applying the user-based security policy through inter-working with the existing method for the protection of industrial technology. Through this study, the intensified method for the protection of industrial technology can be embodied by implementing the integrated infra system through strengthening the existing system of managing the protection of industrial technology, and through supplementing vulnerability to the method for the protection of industrial technology.

  • PDF

Structural health monitoring response reconstruction based on UAGAN under structural condition variations with few-shot learning

  • Jun, Li;Zhengyan, He;Gao, Fan
    • Smart Structures and Systems
    • /
    • v.30 no.6
    • /
    • pp.687-701
    • /
    • 2022
  • Inevitable response loss under complex operational conditions significantly affects the integrity and quality of measured data, leading the structural health monitoring (SHM) ineffective. To remedy the impact of data loss, a common way is to transfer the recorded response of available measure point to where the data loss occurred by establishing the response mapping from measured data. However, the current research has yet addressed the structural condition changes afterward and response mapping learning from a small sample. So, this paper proposes a novel data driven structural response reconstruction method based on a sophisticated designed generating adversarial network (UAGAN). Advanced deep learning techniques including U-shaped dense blocks, self-attention and a customized loss function are specialized and embedded in UAGAN to improve the universal and representative features extraction and generalized responses mapping establishment. In numerical validation, UAGAN efficiently and accurately captures the distinguished features of structural response from only 40 training samples of the intact structure. Besides, the established response mapping is universal, which effectively reconstructs responses of the structure suffered up to 10% random stiffness reduction or structural damage. In the experimental validation, UAGAN is trained with ambient response and applied to reconstruct response measured under earthquake. The reconstruction losses of response in the time and frequency domains reached 16% and 17%, that is better than the previous research, demonstrating the leading performance of the sophisticated designed network. In addition, the identified modal parameters from reconstructed and the corresponding true responses are highly consistent indicates that the proposed UAGAN is very potential to be applied to practical civil engineering.

Personal Information Protection for Biometric Verification based TeleHealth Services (바이오인식을 이용한 원격의료에서의 개인정보보호)

  • Shin, Yong-Nyuo;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.659-664
    • /
    • 2010
  • This paper provides an integrated framework for biometric data and private information protection in TeleHealth. Biometric technology is indispensable in providing identification and convenience in the TeleHealth environment. Once biometric information is exposed to mallicious attacker, he will suffer great loss from the illegferuse of his biometric data by someone else because of difficulty of change not like ID and password. We have to buil by someone esystem data bon the integrated framework for biometric data and private information protection in TeleHealth. First, we consider the structure of the biometric system and the security requirements of y someone esystem data bon the biometrics. And then, we define the TeleHealth system model and provide the vulnerabilities and countermeasures of the biometric-data by someone eintegrated model.byhe TeleHealth sse bec requires two-phata authentication for countermeasure. Finally, we made some functionferrequirements for main componenets of biometric-data bintegrated TeleHealth system framework to protect biometric data.

A Study on the Temporal Change of Soil Loss of Kyungan River Basin with GIS (토지이용변화에 따른 경안천 유역 토양유실에 관한 연구)

  • 김상욱;박종화
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 1995.12a
    • /
    • pp.22-32
    • /
    • 1995
  • The purpose of this study is to estimate not only the watershed soil loss but also its temporal changes of Kyungan River basin, the study area, due to the land development. To analyze the soil loss of the river basin, USLE was employed. GIS and remote sensing were also utilized to estimate the soil loss. The data for this analysis consist of a series of thematic map and remotely sensed data. The remotely sensed images for this study are Landsat TM(Oct, 28, 1997 & Sep. 22, 1992), In Kyungan River basin, not only the detection of temporal changes of land use and GVI, but also the estimation of soil loss provided very significant factors that affect to the watershed environment quality. The management of the factors of vegetative cover, slope steepness and length were the keys to reduce soil loss and solve conservation and protection issues of Kyungan River basin. GIS application with USLE to the watershed analysis allows the planner to recognize sensitive sites and to plan strategies to minimize soil loss.

  • PDF

Variable Aggregation in the ILP Design of WDM Networks with Dedicated Protection

  • Tornatore, Massimo;Maier, Guido;Pattavina, Achille
    • Journal of Communications and Networks
    • /
    • v.9 no.4
    • /
    • pp.419-427
    • /
    • 2007
  • In wavelength-division-multiplexing(WDM) networks a link failure may cause the failure of several high-bit-rate optical channels, thereby leading to large data loss. Recently, various protection and restoration mechanisms have been proposed to efficiently deal with this problem in mesh networks. Among them, dedicated path protection(DPP) is a promising candidate because of its ultra-fast restoration time and robustness. In this work we investigate the issue of planning and optimization of WDM networks with DPP. Integer linear programming(ILP), in particular, is one of the most common exact method to solve the design optimization problem for protected WDM networks. Traditional ILP formalizations to solve this problem rely on the classical flow or route formulation approaches, but both these approaches suffer from a excessively high computational burden. In this paper, we present a variable-aggregation method that has the ability of significantly reducing the complexity of the traditional flow formulation. We compare also the computational burden of flow formulation with variable aggregation both with the classical flow and route formulations. The comparison is carried out by applying the three alternative methods to the optimization of two case-study networks.

Data hiding technique using image pixel value and spatial encryption technique

  • Jung, Soo-Mok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.50-55
    • /
    • 2021
  • In this paper, we proposed a technique for hiding the double-encrypted confidential data in the image using the pixel value of the image and the spatial encryption technique. The proposed technique inserts encrypted confidential data into the LSB of an image pixel in order to maintain high image quality. The stego-image generated by hiding the encrypted confidential data has very good quality and is visually indistinguishable from the original cover image, so that it is impossible to recognize whether the confidential data is hidden in the stego-image. It is possible to extract the original confidential data from the stego-image without loss. By conducting an experiment on the proposed technique, it was confirmed that the proposed technique is an effective technique for the practical application of data hiding. The proposed technique can be used in applications such as military and intellectual property protection that require high security.

Study on the Pressure Loss of Hoses in a Fire Hose Reel Hydrant (호스릴옥내소화전 호스에 대한 압력손실에 관한 연구)

  • Whang, Young-Kwon;Lee, Seung-Chul
    • Fire Science and Engineering
    • /
    • v.33 no.2
    • /
    • pp.63-67
    • /
    • 2019
  • In this study, the pressure loss of a fire hose reel hydrant was examined and the effects of each factor on the pressure loss were analyzed. First, in the pressure loss experiment according to the length of the reel hose, the pressure loss increased with increasing length of the reel hose; it was approximately 38.86% based on a 25 m hose. Second, the pressure loss of the reel hose per unit length was estimated to be $.13{\sim}.15kgf/cm^2$. Third, in the pressure loss experiment according to the change in the flow rate, the result was similar to the relation, flow rate - pressure loss (${\Delta}P{\sim}Q^2$), in the piping flow. These results provide basic data on the evaluation of fire pump pressure and the performance-based fire-protecting design of fire hose reel hydrants used in buildings.

Electrochemical Behavior and Corrosion Protection of Galvanized Steel Sheet Treated in Ce Based Solution

  • Song, Yon-Kyun;Mansfeld, F.
    • Corrosion Science and Technology
    • /
    • v.7 no.6
    • /
    • pp.332-337
    • /
    • 2008
  • A reaction and evaporation types of cerium based conversion coatings were developed for galvanized steel sheet. The corrosion loss Q(Cb/cm2) and protection efficiency P(%) were obtained using a polarization technique for cerium based conversion coatings on galvanized steel exposed to 0.5N NaCl for 7 days. The microstructure of coating layer was observed using SEM. An excellent corrosion reistnce of galvanized steel was obtained by two types of cerium basd conversion coating. Salt spray test was done to evaluate the corrosion resistance of three samples by visual inspection. The corrosion ranking of three samples-untreated and two treatedby electrochemical data was matched well with the results of salt spray test.

A Selection of an Optimal Mother Wavelet for Stator Fault Detection of AC Generator (교류 발전기 고정자 사고 검출을 위한 최적 마더 웨이브릿의 선정)

  • Park, Chul-Won
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.57 no.4
    • /
    • pp.377-382
    • /
    • 2008
  • For stator winding protection of AC generator, KCL(Kirchhoff's Current Law) is widely applied. Actually a CRDR(Current Ratio Differential Relay) based on DFT(Discrete Fourier Transform) has been used for protecting generator. It has been pointed out that defects can occur during the process of transforming a time domain signal into a frequency domain one which can lead to loss of time domain information. Wavelets techniques are proposed for the analysis of power system transients. This paper introduces an algorithm to choose a suitable Mother Wave1et for generator stator fault detection. For optimal selection, we analyzed db(Daubechies), sym(Symlets), and coif(Coiflects) of Mother Wavelet. And we compared with performance of the choice algorithm using detail coefficients energy and RMS(root mean square) error. It can be improved the reliability of the conventional DFT based CRDR. The feasibility and effectiveness of the proposed scheme is proved with simulation using collected data obtained from ATP (Alternative Transient Program) package.