• Title/Summary/Keyword: Information Network Law

Search Result 302, Processing Time 0.026 seconds

Throughput Scaling Law of Hybrid Erasure Networks Based on Physical Model (물리적 모델 기반 혼합 소거 네트워크의 용량 스케일링 법칙)

  • Shin, Won-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.57-62
    • /
    • 2014
  • The benefits of infrastructure support are shown by analyzing a throughput scaling law of an erasure network in which multiple relay stations (RSs) are regularly placed. Based on suitably modeling erasure probabilities under the assumed network, we show our achievable network throughput in the hybrid erasure network. More specifically, we use two types of physical models, a exponential decay model and a polynomial decay model. Then, we analyze our achievable throughput using two existing schemes including multi-hop transmissions with and without help of RSs. Our result indicates that for both physical models, the derived throughput scaling law depends on the number of nodes and the number of RSs.

Protection of Information Sovereignty as an Important Component of the Political Function of the State

  • Zadorozhnia, Halyna;Mykhtunenko, Viktoriia;Kovalenko, Hanna;Kuryliuk, Yurii;Yurchenko, Liubov;Maslennykova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.151-154
    • /
    • 2021
  • State information policy is an important component of foreign and domestic policy of the country and covers all spheres of society. The rapid development of the information sphere is accompanied by the emergence of fundamentally new threats to the interests of the individual, society, state and its national security. The article considers the components of the state information policy to ensure information security of the country and identifies the main activities of public authorities in this area. Internal and external information threats to the national security of Ukraine and ways to guarantee the information security of the country are analyzed. Information security is seen as a component of national security, as well as a global problem of information protection, information space, information sovereignty of the country and information support of government decisions. Approaches to ensure the process of continuity of the information security system of the state in order to monitor new threats, identify risks and levels of their intensity are proposed.

Information and Communication Technologies in the Main Types of Legal Activities

  • Kornev, Arkadiy;Lipen, Sergey;Zenin, Sergey;Tanimov, Oleg;Glazunov, Oleg
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.177-183
    • /
    • 2022
  • Thanks to the informatization of society, complex and high-tech devices are being introduced in all areas of human life, and the latest technologies are being actively improved in the modern, globalizing world. The article deals with the issues of using information and communication technologies in legal activities. It also covers the main types of such activities: law-making, law enforcement, and interpretive activity. Since there is an increase in the flow and accumulation of legal information, it is practically impossible to use traditional methods of working with legal information. The article considers and analyzes the role of information and communication technologies in modern legal activity. It is necessary to reveal the principles, concepts, conditions, and factors of their development and develop theoretical and practical recommendations for the use of such technologies in order to solve legal tasks. The authors of the article raise the issues of increasing the efficiency of legal activity, as well as the integration of information technologies into practical legal activity and their use for collecting, storing, searching, and issuing legal and reference information. Much attention is paid to the specific use of automated data banks and information retrieval systems in legal practice that ensure the accumulation, systematization, and effective search for legally important information. The development of such technologies leads to the creation of comfortable conditions for a lawyer in the course of their professional activity. Currently, legal activity cannot exist without telecommunication technologies, legal reference systems, and electronic programs. The authors believe that due to the use of the latest information technologies, the time for making legal decisions has significantly accelerated, the process of searching and systematizing evidence has been worked out, and it has become possible to quickly and efficiently find information on adopted laws and legal acts.

A Social Network Analysis on the Common Initiative for the Electronic Government Law: Focusing on the Ruling Party and Seniority Effect

  • Lee, Hun-Hee;Han, Sang-Ik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.6
    • /
    • pp.125-133
    • /
    • 2019
  • This study aimed to investigate the political system related to the Electronic Government Law by analyzing the process of the common initiative of the law. To achieve the goal, this study applied the method of social analysis and sugessted the proper role of the assembly for realizing the electronic government and its control. The data were gathered from the bill information service of the national assembly. Netminer 4.0 was used for refining and analyzing data. The results are as follows. First, by analyzing three centrality(degree, betweenness, and eigenvector) of assembly member, the network effect of the powered party and reelected members were revealed as strong in the network. Second, through the component analysis, 5 sub-network has shown in total. The sub-networks showed two distinctive difference between two big parties. By the difference, members in two parties showed different characteristics in constituting communities and the effect of the powered party revealed as strong and clear. Based on the result, this study demonstrated the necessity of social solidarity rather than solipsism in committing common initiative. And a chronological research is need to anlayze $18^{th}$ and $19^{th}$ assembly to verify the effect of the powered party in prospect study.

Criminal and Legal Countermeasures against Cybercrime in the Conditions of Martial Law

  • Nataliia, Veselovska;Serhii, Krushynskyi;Oleh, Kravchuk;Olеksandr, Punda;Ivan, Piskun
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.85-90
    • /
    • 2022
  • The article is devoted to the consideration of the features of the application of criminal and legal countermeasures against cybercrime in the conditions of martial law. While conducting this research, we found an opportunity to formulate the author's recommendations for solving the most complex law enforcement problems, as well as to propose changes to the Criminal Code of Ukraine aimed at eliminating the flaws of the analyzed Law, the adoption of which will contribute to the achievement of higher efficiency of the relevant criminal law prescriptions. It is argued that the removal of the previously existing in the footnote of Art. 361 of the Criminal Code of a fundamentally important caveat regarding the fact that when assessing "significant damage", the mentioned property equivalent was to be taken into account only when such damage consisted in causing material damage, which led to a significant and unjustified narrowing of the scope of potential application of Part 4 of Article 361 of the Criminal Code.

Analysis of Seoul Metropolitan Subway Network Characteristics Using Network Centrality Measures (네트워크 중심성 지표를 이용한 서울 수도권 지하철망 특성 분석)

  • Lee, Jeong Won;Lee, Kang Won
    • Journal of the Korean Society for Railway
    • /
    • v.20 no.3
    • /
    • pp.413-422
    • /
    • 2017
  • In this study we investigate the importance of the subway station using network centrality measures. For centrality measures, we have used betweenness centrality, closeness centrality, and degree centrality. A new measure called weighted betweenness centrality is proposed, that combines both traditional betweenness centrality and passenger flow between stations. Through correlation analysis and power-law analysis of passenger flow on the Seoul metropolitan subway network, we have shown that weighted betweenness centrality is a meaningful and practical measure. We have also shown that passenger flow between any two stations follows a highly skewed power-law distribution.

The Method of Feature Selection for Anomaly Detection in Bitcoin Network Transaction (비트코인 네트워크 트랜잭션 이상 탐지를 위한 특징 선택 방법)

  • Baek, Ui-Jun;Shin, Mu-Gon;Jee, Se-Hyun;Park, Jee-Tae;Kim, Myung-Sup
    • KNOM Review
    • /
    • v.21 no.2
    • /
    • pp.18-25
    • /
    • 2018
  • Since the development of block-chain technology by Satoshi Nakamoto and Bitcoin pioneered a new cryptocurrency market, a number of scale of cryptocurrency have emerged. There are crimes taking place using the anonymity and vulnerabilities of block-chain technology, and many studies are underway to improve vulnerability and prevent crime. However, they are not enough to detect users who commit crimes. Therefore, it is very important to detect abnormal behavior such as money laundering and stealing cryptocurrency from the network. In this paper, the characteristics of the transactions and user graphs in the Bitcoin network are collected and statistical information is extracted from them and presented as plots on the log scale. Finally, we analyze visualized plots according to the Densification Power Law and Power Law Degree, as a result, present features appropriate for detection of anomalies involving abnormal transactions and abnormal users in the Bitcoin network.

On-Line Social Network Generation Model (온라인 소셜 네트워크 생성 모델)

  • Lee, Kang-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.7
    • /
    • pp.914-924
    • /
    • 2020
  • In this study we developed artificial network generation model, which can generate on-line social network. The suggested model can represent not only scale-free and small-world properties, but also can produce networks with various values of topological characteristics through controlling two input parameters. For this purpose, two parameter K and P are introduced, K for controlling the strength of preferential attachment and P for controlling clustering coefficient. It is found out on-line social network can be generated with the combinations of K(0~10) and P(0.3~0.5) or K=0 and P=0.9. Under these combinations of P and K small-world and scale-free properties are well represented. Node degree distribution follows power-law. Clustering coefficients are between 0.130 and 0.238, and average shortest path distance between 5.641 and 5.985. It is also found that on-line social network properties are maintained as network node size increases from 5,000 to 10,000.

The Power of Power Law: A View from VoD Service

  • Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.607-614
    • /
    • 2013
  • In this work we investigate the power of power law in the VoD service over IP network. Especially, we show that the power of power law is strong in the location of the contents storage for the VoD service and its impact on the link dimensioning. This work first shows the instance of the power law in the popularity of the video contents from the real data for the IPTV service. After that we propose an analytic model that characterizes the behavior of customers in accessing the video servers as well as the power law in the viewing pattern. Finally, we show the impact of the power law by proposing a model for the cost as well as link dimensioning. Via numerical experiment we show the implication of the proposition.

Generalized Network Generation Method for Small-World Network and Scale-Free Network (Small-World 망과 Scale-Free 망을 위한 일반적인 망 생성 방법)

  • Lee, Kang-won;Lee, Jae-hoon;Choe, Hye-zin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.7
    • /
    • pp.754-764
    • /
    • 2016
  • To understand and analyze SNS(Social Network Service) two important classes of networks, small-world and scale-free networks have gained a lot of research interests. In this study, a generalized network generation method is developed, which can produce small-world network, scale-free network, or network with the properties of both small-world and scale-free by controlling two input parameters. By tuning one parameter we can represent the small-world property and by tuning the other one we can represent both scale-free and small-world properties. For the network measures to represent small-world and scale-free properties clustering coefficient, average shortest path distance and power-law property are used. Using the model proposed in this study we can have more clear understanding about relationships between small-world network and scale-free network. Using numerical examples we have verified the effects of two parameters on clustering coefficient, average shortest path distance and power-law property. Through this investigation it can be shown that small-world network, scale-free network or both can be generated by tuning two input parameters properly.