• Title/Summary/Keyword: Detection Mechanism

Search Result 855, Processing Time 0.037 seconds

Iub Congestion Detection Method for WCDMA HSUPA Network to Improve User Throughput (WCDMA HSUPA 망의 성능 향상을 위한 Iub 혼잡 검출 방법)

  • Ahn, Ku-Ree;Lee, Tae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.16-24
    • /
    • 2010
  • High Speed Uplink Packet Access(HSUPA) is a WCDMA Release 6 technology which corresponds to High Speed Downlink Packet Access(HSDPA). Node B Supports fast scheduling, Hybrid ARQ(HARQ), short Transmission Time Interval(TTI) for high rate uplink packet data. It is very important to detect Iub congestion to improve end user's Quality of Service(QoS). This paper proposes Node B Congestion Detection(BCD) mechanism and suggests to use the hybrid of Transport Network Layer(TNL) congestion detection and BCD. It is shown that HSUPA user throughput performance can be improved by the proposed method even with small Iub bandwidth.

Highly Sensitive and Naked Eye Dual-readout Method for ʟ-Cysteine Detection Based on the NSET of Fluorophore Functionalized Gold Nanoparticles

  • Fu, Xin;Liu, Yuan;Wu, Zhitao;Zhang, He
    • Bulletin of the Korean Chemical Society
    • /
    • v.35 no.4
    • /
    • pp.1159-1164
    • /
    • 2014
  • A simple, highly sensitive and selective method based on the rhodamine B-covered gold nanoparticle with dual-readout (colorimetric and fluorometric) detection for $\small{L}$-cysteine is proposed. A mechanism is that citrate-stabilized AuNPs were modified with RB by electrostatic interaction, which enables the nanometal surface energy transfer (NSET) from the RB to the AuNPs, quenching the fluorescence. In the presence of $\small{L}$-cysteine, it was used as a competitor in the NSET by the strongly Au-S bonding to release RB from the Au surface and recover the fluorescence, and the red-to-purple color change quickly, which was monitored simply by the naked eye. Under the optimum conditions, the detection limit is as low as 10 nM. The method possessed the advantages of simplicity, rapidity and sensitivity at the same time. The method was also successfully applied to the determination of $\small{L}$-cysteine in human urine samples, and the results were satisfying.

A Mechanism for Conflict Detection and Resolution for Service Interaction : Toward IP-based Network Services (IP 기반 융합서비스를 위한 서비스 충돌 감지 및 해결에 대한 연구)

  • Oh, Joseph;Shin, Dong-Min
    • IE interfaces
    • /
    • v.23 no.1
    • /
    • pp.24-34
    • /
    • 2010
  • In the telecommunication system which is based on the existing PSTN(public switched telephone network), feature interaction has been an important research issue in order to provide seamless services to users. Recently, rapid proliferation of IP-based network and the various types of IP media supply services, the feature interaction from the perspective of application services has become a significant aspect. This paper presents conflict detection and resolution algorithms for designing and operating a variety of services that are provided through IP-based network. The algorithms use explicit service interactions to detect conflicts between a new service and registered services. They then apply various rules to reduce search space in resolving conflicts. The algorithms are applied to a wide range of realistic service provision scenarios to validate that it can detect conflicts between services and resolve in accordance with different rule sets. By applying the algorithms to various scenarios, it is observed that the proposed algorithms can be effectively used in operating an IP-based services network.

Fabrication of Fiber Gas Sensor and Analysis of NOx Gas Detection Characteristics (화이버 가스 센서 제작 및 NOx 가스 검출 특성 분석)

  • Son, Ju Hyeong;Kim, Hyun Soo;Yoon, Young Ki;Jang, Kyung Uk
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.32 no.5
    • /
    • pp.432-436
    • /
    • 2019
  • In this study, we produced a light, flexible, wearable gas sensor by depositing MWCNTs (Multi-walled Carbon Nanotubes) into nylon. MWCNTs are widely used as a gas sensor material due to their excellent mechanical, electrical and physical characteristics. We produced a gas sensor to detect NOx gases by depositing nylon yarn in a MWCNT solution. The MWCNT solution was made by mixing 3 mg MWCNT in 5 ml of ethanol. Nylon yarn was placed in the manufactured solution and ultrasonic waves were applied using an ultrasonicator for 3 h, resulting in MCWNT deposition. The MWCNT-deposited nylon yarn was dried at room temperature for 24 h. The MWCNT-thin-film-coated nylon yarn was masked 1 mm apart, and gold was then deposited on the masked nylon yarn to create the gas sensor. The sensor then was installed in a chamber with a controlled atmospheric environment and exposed to NOx gas. The changing signal from the sensor was amplified to analyze its gas detection characteristics.

A Rule Protecting Scheme with Symmetric Cryptosystem for Intrusion Detection System (암호화 기법을 적용한 침입 탐지 시스템의 룰 보호 기법)

  • Son Hyung-Seo;Kim Hyun-Sung;Bu Ki-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.3-13
    • /
    • 2004
  • Kvarnstrom et al. ${in}^{[10]}$ proposed a rule protection scheme by using one-way hash function to protect rules in security systems over ubiquitous environment. Son et at. ${in}^{[5-6]}$ also prooposed a rule protection scheme for Snort, which is one of the most common IDS. These schemes provide security only for the header information but not for its contents. To solve this problem, this paper presents a scheme based on the symmetric cryptosystem over Snort not only for the header information but also contents. This paper uses the key management based on PCMCIA security module proposed ${by}^{[12]}$ for the symmetric cryptosystem. Our scheme could be adjusted to other security systems, which use the rule based detection.

A Study on Building an Optimized Defense System According to the Application of Integrated Security Policy Algorithm (통합 보안정책 알고리즘 적용에 따른 최적화 방어 시스템 구축에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.39-46
    • /
    • 2011
  • This study is conducted to examine the optimal integrated security policy based on network in case of attacks by implementing unique security policies of various network security equipments as an algorithm within one system. To this end, the policies conduct the experiment to implement the optimal security system through the process of mutually integrating the unique defense policy of Firewall, VPN(Virtual Private Network), IDS(Intrusion Detection System), and IPS(Intrusion Prevention System). In addition, this study is meaningful in that it designs integrated mechanism for rapid detection of system load caused by establishment of the security policy and rapid and efficient defense and secures basic network infrastructure implementation.

Status and Prospects of PCR Detection Methods for Diagnosing Pathogenic Escherichia coli : A Review

  • Yim, Jin-Hyeok;Seo, Kun-Ho;Chon, Jung-Whan;Jeong, Dongkwan;Song, Kwang-Young
    • Journal of Dairy Science and Biotechnology
    • /
    • v.39 no.2
    • /
    • pp.51-62
    • /
    • 2021
  • Escherichia coli are the predominant facultative bacteria found in the gastrointestinal tract of animals and humans. Some strains of E. coli that acquire virulence factors and cause foodborne and waterborne diseases in humans are called pathogenic E. coli and can be divided into five pathotypes according to the virulence mechanism: EAEC, EHEC, EIEC, EPEC, and ETEC. Although selective media have been developed to detect E. coli, distinguishing pathogenic strains from non-pathogenic ones is difficult because of their similar biochemical properties. Therefore, it is very important to find a new and effective diagnostic method to identify pathogenic E. coli. With recent advances in molecular biology and whole genome sequencing, the use of polymerase chain reaction (PCR) is increasing rapidly. In this review paper, we provide an overview of pathogenic E. coli and present a review on PCR detection methods that can be used to diagnose pathogenic E. coli. In addition, the possibility of real-time PCR incorporating IAC is introduced. Consequently, this review paper will contribute to solving the current challenges related to the detection of pathogenic E. coli.

Suggestion for deep learning approach to solve the interference effect of ammonium ion on potassium ion-selective electrode

  • Kim, Min-Yeong;Heo, Jae-Yeong;Oh, Eun Hun;Lee, Joo-Yul;Lee, Kyu Hwan
    • Journal of Surface Science and Engineering
    • /
    • v.55 no.3
    • /
    • pp.156-163
    • /
    • 2022
  • An ammonium ion with a size and charge similar to that of potassium can bind to valinomycin, which is used as an ion carrier for potassium, and cause a meaningful interference effect on the detection of potassium ions. Currently, there are few ion sensors that correct the interference effect of ammonium ions, and there are few studies that specifically suggest the mechanism of the interference effect. By fabricating a SPCE-based potassium ion-selective electrode, the electromotive force was measured in the concentration range of potassium in the nutrient solution, and the linear range was measured to be 10-5 to 10-2 M, and the detection limit was 10-5.19 M. And the interference phenomenon of the potassium sensor was investigated in the concentration range of ammonium ions present in the nutrient solution. Therefore, a data-based analysis strategy using deep learning was presented as a method to minimize the interference effect.

RDNN: Rumor Detection Neural Network for Veracity Analysis in Social Media Text

  • SuthanthiraDevi, P;Karthika, S
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.3868-3888
    • /
    • 2022
  • A widely used social networking service like Twitter has the ability to disseminate information to large groups of people even during a pandemic. At the same time, it is a convenient medium to share irrelevant and unverified information online and poses a potential threat to society. In this research, conventional machine learning algorithms are analyzed to classify the data as either non-rumor data or rumor data. Machine learning techniques have limited tuning capability and make decisions based on their learning. To tackle this problem the authors propose a deep learning-based Rumor Detection Neural Network model to predict the rumor tweet in real-world events. This model comprises three layers, AttCNN layer is used to extract local and position invariant features from the data, AttBi-LSTM layer to extract important semantic or contextual information and HPOOL to combine the down sampling patches of the input feature maps from the average and maximum pooling layers. A dataset from Kaggle and ground dataset #gaja are used to train the proposed Rumor Detection Neural Network to determine the veracity of the rumor. The experimental results of the RDNN Classifier demonstrate an accuracy of 93.24% and 95.41% in identifying rumor tweets in real-time events.

Analysis of MANET's Routing Protocols, Security Attacks and Detection Techniques- A Review

  • Amina Yaqoob;Alma Shamas;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.23-32
    • /
    • 2024
  • Mobile Ad hoc Network is a network of multiple wireless nodes which communicate and exchange information together without any fixed and centralized infrastructure. The core objective for the development of MANET is to provide movability, portability and extensibility. Due to infrastructure less network topology of the network changes frequently this causes many challenges for designing routing algorithms. Many routing protocols for MANET have been suggested for last few years and research is still going on. In this paper we review three main routing protocols namely Proactive, Reactive and Hybrid, performance comparison of Proactive such as DSDV, Reactive as AODV, DSR, TORA and Hybrid as ZRP in different network scenarios including dynamic network size, changing number of nodes, changing movability of nodes, in high movability and denser network and low movability and low traffic. This paper analyzes these scenarios on the performance evaluation metrics e.g. Throughput, Packet Delivery Ratio (PDR), Normalized Routing Load(NRL) and End To-End delay(ETE).This paper also reviews various network layer security attacks challenge by routing protocols, detection mechanism proposes to detect these attacks and compare performance of these attacks on evaluation metrics such as Routing Overhead, Transmission Delay and packet drop rates.