• Title/Summary/Keyword: Equivalent Networks

Search Result 146, Processing Time 0.026 seconds

Service-Oriented Wireless Sensor Networks Ontology for Ubiquitous Services (유비쿼터스 서비스를 위한 서비스 지향 센서 네트워크 온톨로지)

  • Kim, Jeong-Hee;Kwon, Hoon;Kim, Do-Hyeun;Kwak, Ho-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.971-978
    • /
    • 2008
  • This paper designs a service-oriented wireless sensor network ontology model which can be used as a knowledge base in future ubiquitous computing. In contrast to legacy approaches, this paper defines the new service classes (ServiceProperty, LocationProperty, and PhysicalProperty), as well as their properties and constraints that enable the service-oriented service based on service items. The service item merging between the proposed model and the legacy ontology was processed using the "equivalentClass" object property of OWL. The Protege 3.3.1 and RACER 1.9.0 inference tools were used for the validation and consistency check of the proposed ontology model, respectively, and the results of service query was applied to the newly defined property in SPARQL language without reference to the properties of legacy ontology.

IoT botnet attack detection using deep autoencoder and artificial neural networks

  • Deris Stiawan;Susanto ;Abdi Bimantara;Mohd Yazid Idris;Rahmat Budiarto
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1310-1338
    • /
    • 2023
  • As Internet of Things (IoT) applications and devices rapidly grow, cyber-attacks on IoT networks/systems also have an increasing trend, thus increasing the threat to security and privacy. Botnet is one of the threats that dominate the attacks as it can easily compromise devices attached to an IoT networks/systems. The compromised devices will behave like the normal ones, thus it is difficult to recognize them. Several intelligent approaches have been introduced to improve the detection accuracy of this type of cyber-attack, including deep learning and machine learning techniques. Moreover, dimensionality reduction methods are implemented during the preprocessing stage. This research work proposes deep Autoencoder dimensionality reduction method combined with Artificial Neural Network (ANN) classifier as botnet detection system for IoT networks/systems. Experiments were carried out using 3- layer, 4-layer and 5-layer pre-processing data from the MedBIoT dataset. Experimental results show that using a 5-layer Autoencoder has better results, with details of accuracy value of 99.72%, Precision of 99.82%, Sensitivity of 99.82%, Specificity of 99.31%, and F1-score value of 99.82%. On the other hand, the 5-layer Autoencoder model succeeded in reducing the dataset size from 152 MB to 12.6 MB (equivalent to a reduction of 91.2%). Besides that, experiments on the N_BaIoT dataset also have a very high level of accuracy, up to 99.99%.

Variable Optical Fiber Attenuator Using Bending-Sensitive Fiber

  • Lee, Dong-Ho;Kwon, Kwang-Hee;Song, Jae-Won;Park, Jae-hee
    • Journal of the Optical Society of Korea
    • /
    • v.8 no.2
    • /
    • pp.83-89
    • /
    • 2004
  • A variable optical attenuator with a bending-sensitive fiber (BSF) that can be used in optical networks is developed. The refractive index profile of the BSF is divided into four regions which are inner core, center dip of inner core, outer core and clad. The 3-dimensional finite difference beam propagation method (3D FD-BPM) is utilized to find the characteristics of the BSF, so the mode profile of the BSF and optical power attenuation according to the bending are investigated, and the equivalent model of the BSF is made. By using this equivalent model of the BSF, the BSF is fabricated, and the refractive index profile of the BSF is measured, which is similar to refractive index profile of the proposed BSF. The fabricated variable optical fiber attenuator (VOFA) consists of the BSF in a rectangular rubber ring with a fixed bend radius (BR) in a steady state. The VOFA using the proposed BSF was able to attenuate the optical power by more than about -38 ㏈ at certain wavelengths (1540∼1560 nm) based on adjusting the mechanical pressure applied to the upper surface of the rectangular rubber ring with the bent BSF. In addition, the proposed VOFA produced an insertion loss of 0.68 ㏈, polarization dependent loss (PDL) of about 0.5 ㏈, and return loss of less than -60 ㏈.

Optimization of modular Truss-Z by minimum-mass design under equivalent stress constraint

  • Zawidzki, Machi;Jankowski, Lukasz
    • Smart Structures and Systems
    • /
    • v.21 no.6
    • /
    • pp.715-725
    • /
    • 2018
  • Truss-Z (TZ) is an Extremely Modular System (EMS). Such systems allow for creation of structurally sound free-form structures, are comprised of as few types of modules as possible, and are not constrained by a regular tessellation of space. Their objective is to create spatial structures in given environments connecting given terminals without self-intersections and obstacle-intersections. TZ is a skeletal modular system for creating free-form pedestrian ramps and ramp networks. The previous research on TZ focused on global discrete geometric optimization of the spatial configuration of modules. This paper reports on the first attempts at structural optimization of the module for a single-branch TZ. The internal topology and the sizing of module beams are subject to optimization. An important challenge is that the module is to be universal: it must be designed for the worst case scenario, as defined by the module position within a TZ branch and the geometric configuration of the branch itself. There are four variations of each module, and the number of unique TZ configurations grows exponentially with the branch length. The aim is to obtain minimum-mass modules with the von Mises equivalent stress constrained under certain design load. The resulting modules are further evaluated also in terms of the typical structural criterion of compliance.

Method for High-Frequency Modeling of Common-Mode Choke (공통모드 초크의 간단한 고주파 모델링 기법)

  • Jung, Hyeonjong;Yoon, Seok;Kim, Yuseon;Bae, Seok;Lim, Yeongseog
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.12
    • /
    • pp.964-973
    • /
    • 2017
  • In this paper, we analyze the effects of parasitic components of common-mode choke on the common mode and differential mode in a wide band, and we propose a simple method for high-frequency modeling. Common mode and differential mode 2-port networks were configured and the S-parameters in each mode were measured using a network analyzer. Equivalent circuit elements were extracted from the measured results to model a high-frequency equivalent circuit, and the validity was verified by comparing the measured S-parameters with the simulation results.

Contention-based Reservation Protocol Using a Counter for Detecting a Source Conflict in WDM Single-hop Optical Network with Non-equivalent Distance

  • Sakuta, Makoto;Nishino, Yoshiyuki;Sasase, Iwao
    • Journal of Communications and Networks
    • /
    • v.3 no.4
    • /
    • pp.365-373
    • /
    • 2001
  • We propose a new channel reservation protocol which can reduce message delay by using a counter for detection of d source conflict in a WDM single-hop network with non-equivalent propagation delay. A source convict occurs when a source node has the right to transmit more than or equal to two messages simultaneously, which are transmitted using different wavelengths. In such a case, the source node has to newly obtain the right to transmit the message. In the proposed protocol, by using a source conflict counter a source node can detect a source conflict before a wave-length assignment is performed. Therefore, the source node can start a procedure to newly obtain the right to transmit the message which cannot be transmitted due to a source conflict. We analyse the throughput performance by taking the effect of a source conflict into account, and show that the approximate analysis and the computer simulated results are close. Also, from computer simulated results, we show that our proposed protocol can reduce mean message delay dramatically without degrading throughput performance as the offered load becomes large.

  • PDF

An Adaptive Connection Admission Control Method Based on the Measurement in ATM Networks (ATM망에서 측정 기반 적응적 연결 수락 제어)

  • 윤지영;김순자
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.8
    • /
    • pp.1907-1914
    • /
    • 1998
  • This paper proposes the adaptive connection admission cotrol using the variale MRR(measurement reflection ratio) and the distribution of the number of cells arriving during the fixed interval. This distribution is estimated from the measured number of cells arriving at the output buffer during the fixed interval and traffic parameters specified by user. MRR is varied by the difference of estimated distribution and measurement distribution. As MRR is adaptively varied by estimated distribution error of accepted connections, it quickly reduces estimation error. Also, the scheduling scheme is proposed for multiplexed traffic with various traffic characteristics. For each traffic class, this scheme estimates adaptively equivalent bandwidth and schedules according to equivalent bandwidth ratio of each traffic class, so it improves cell loss rate and link utilization.

  • PDF

Comparison of Two- and Three-dimensional Approaches for the Numerical Determination of Equivalent Mechanical Properties of Fractured Rock Masses (균열암반의 역학적 등가물성의 수치해석적 결정을 위한 2차원 및 3차원 해석의 비교)

  • Min, Ki-Bok;Thoraval, Alain
    • Tunnel and Underground Space
    • /
    • v.22 no.2
    • /
    • pp.93-105
    • /
    • 2012
  • This paper compares the two- and three-dimensional (2D and 3D) approaches for the numerical determination of the equivalent mechanical properties of fractured rock masses. Both orthogonally-fractured model and discrete fracture networks (DFN) were used for the geometry and 2D models were cut in various directions from 3D model to compare their mechanical properties. Geological data were loosely based on the data available from Sellafield, UK. Analytical method based on compliance tensor transformation was used for investigation in orthogonally fractured rock and numerical experiments were conducted on fractured rock mass with DFN geometry. It is shown that 2D approach always overestimates the elastic modulus of fractured rock masses by a factor of up to around two because fractures are assumed to be perpendicular to the model plane in 2D problems. Poisson ratios tend to have larger values in 2D analysis while there is opposite trend in some sections. The study quantitatively demonstrates the limitation of the 2D approach that uses the simplified model from true 3D geometry.

Diffraction Analysis of Multi-layered Grating Structures using Rigorous Equivalent Transmission-Line Theory (정확한 등가 전송선로 이론을 사용한 다층 격자 구조의 회절특성 분석)

  • Ho, Kwang-Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.261-267
    • /
    • 2015
  • The eigenvalue problems involving the diffraction of waves by multi-layered grating configurations can be explained by rigorous modal expansion terms. Such a modal solution can be represented by equivalent transmission-line networks, which are generalized forms of simple conventional circuits. This approach brings considerable physical insight into the grating diffraction process of the fields everywhere. In particular, the transmission-line representation can serve as a template for computational algorithms that systematically evaluate dispersion properties, radiation effects and other optical characteristics that are not readily obtained by other methods. To illustrate the validity of the present rigorous approach, the previous research works are numerically confirmed and the results agree well each other.

Performance Analysis of Compensation Algorithm for Localization using Equivalent Distance Rate (균등거리비율을 적용한 위치인식 보정 알고리즘 설계 및 성능분석)

  • Kwon, Seong-Ki;Lee, Dong-Myung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1248-1253
    • /
    • 2010
  • In this paper, the compensation algorithm for localization using the concept of equivalent distance rate(AEDR) in order to compensate ranging error in the SDS-TWR(Symmetric Double-Sided Two-Way Ranging) is proposed and the performance of the proposed algorithm is analyzed by the localization experiments. The ranging error of the SDS-TWR in the distance between mobile node and beacon node is measured to average 1m~8m by ranging experiments. But it is confirmed that the performance of the localization by the AEDR is better than that of the SDS-TWR 4 times in university auditorium and corridor, and the localization error of above 3~10m is reduced to average 2m and that of below 3m is reduced to average 1m respectively. It is concluded that the AEDR is superior to the NLOS(Non Line Of Sight) than LOS(Line Of Sight) in performance of ranging compensation for localization, and the AEDR is more helpful to localization systems practically considering the environment of sensor networks is under NLOS.