• Title/Summary/Keyword: Internal Network Information

Search Result 504, Processing Time 0.029 seconds

Automatic Extraction of Road Network using GDPA (Gradient Direction Profile Algorithm) for Transportation Geographic Analysis

  • Lee, Ki-won;Yu, Young-Chul
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.775-779
    • /
    • 2002
  • Currently, high-resolution satellite imagery such as KOMPSAT and IKONOS has been tentatively utilized to various types of urban engineering problems such as transportation planning, site planning, and utility management. This approach aims at software development and followed applications of remotely sensed imagery to transportation geographic analysis. At first, GDPA (Gradient Direction Profile Algorithm) and main modules in it are overviewed, and newly implemented results under MS visual programming environment are presented with main user interface, input imagery processing, and internal processing steps. Using this software, road network are automatically generated. Furthermore, this road network is used to transportation geographic analysis such as gamma index and road pattern estimation. While, this result, being produced to do-facto format of ESRI-shapefile, is used to several types of road layers to urban/transportation planning problems. In this study, road network using KOMPSAT EOC imagery and IKONOS imagery are directly compared to multiple road layers with NGI digital map with geo-coordinates, as ground truth; furthermore, accuracy evaluation is also carried out through method of computation of commission and omission error at some target area. Conclusively, the results processed in this study is thought to be one of useful cases for further researches and local government application regarding transportation geographic analysis using remotely sensed data sets.

  • PDF

Selection of Machine Learning Techniques for Network Lifetime Parameters and Synchronization Issues in Wireless Networks

  • Srilakshmi, Nimmagadda;Sangaiah, Arun Kumar
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.833-852
    • /
    • 2019
  • In real time applications, due to their effective cost and small size, wireless networks play an important role in receiving particular data and transmitting it to a base station for analysis, a process that can be easily deployed. Due to various internal and external factors, networks can change dynamically, which impacts the localisation of nodes, delays, routing mechanisms, geographical coverage, cross-layer design, the quality of links, fault detection, and quality of service, among others. Conventional methods were programmed, for static networks which made it difficult for networks to respond dynamically. Here, machine learning strategies can be applied for dynamic networks effecting self-learning and developing tools to react quickly and efficiently, with less human intervention and reprogramming. In this paper, we present a wireless networks survey based on different machine learning algorithms and network lifetime parameters, and include the advantages and drawbacks of such a system. Furthermore, we present learning algorithms and techniques for congestion, synchronisation, energy harvesting, and for scheduling mobile sinks. Finally, we present a statistical evaluation of the survey, the motive for choosing specific techniques to deal with wireless network problems, and a brief discussion on the challenges inherent in this area of research.

Leveling Up the Information Culture of Social Work Bachelors

  • Bartosh, Olena;Povidaichyk, Oksana;Kozubovska, Iryna;Shandor, Fedir;Afanasiev, Dmytro;Bodnar, Olesia;Katsora, Oleksandr;Oros, Oleksandra
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.222-230
    • /
    • 2021
  • The article reviews the issue of formation of information culture of social work bachelors in the process of their professional training. The main internal / external factors that determine the need for the information culture formation of social workers-to-be have been identified. To determine the levels of information culture formed in bachelors of social work criteria and their indicators have been substantiated. The model of information culture formation in BSW has been developed and implemented in Ukrainian universities under the following pedagogic conditions: organized informational environment; interconnection between general and professionally-directed courses; curriculum includes course directed on IC formation. The model contained interconnected components: aim - to achieve higher level of information culture formed; specific principles; content, interactive methods and forms of organization of educational process, methods of control and correction; components of information culture. The implemented mastered learning procedure has contributed to the leveling up of information culture formed in social work bachelors.

Design and Implementation of Information Security System to Prevent Leakage of Drawing Information (설계정보 유출방지를 위한 정보보안시스템 설계 및 구현)

  • Chang, H.B.;Lee, H.S.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.11 no.5
    • /
    • pp.327-334
    • /
    • 2006
  • Recently, security incidents are growing rapidly in which internal employees let the drawing leak out to competitors or other countries. This type of security incidents has a characteristic that it occurs less frequently than other types of security incidents such as network or server security incident, but the damage is a lot more serious. The existing information security technologies to prevent internal information from being leaked out are only applicable to general documents(office documents, web pages and image files in which data are encrypted one by one). However, architectural drawings made up of collection of files with various formats(extensions) have problems with the process speed of en(de) cryption and accuracy, so the developments of security technologies by new methods are required. In this study, we design and develop a security technology based on work area with which users can protect the leakage of critical information in the kernel level while maintaining their work environment when they have to use sharing information that cannot be managed by the unit of file. As a result, we developed the "Virtual Secure Disk" which allows only authorized users and applications to have an access to drawings, and have verified its security by applying it to the actual company.

Implementation of Ship Area Network NMEA protocol Bridge Based on Power Line Communication (전력선통신 기반의 선박용 M모A 프로토콜 브릿지 구현)

  • Kim, Gwan-Hyung;Kang, Sung-In;Jeon, Jae-Hwan;Kwon, Oh-Hyun;Oh, Am-Suk;Cho, Hyun-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2419-2422
    • /
    • 2010
  • The current marine internal communication systems are usually composed of NMEA0183, NMEA2000, and MiTS protocols which are located on the physical layer based on RS-422, RS-485, CAN, and EtherNet. However, general vessel communication method have a weak point that must establish the extra private line. But, the power line communication has advantage over general vessel communication method as it uses AC220V/DC24V without changing line. Therefore, we will propose a new bridge based on the DC-PLC(power Line communication) technique which support the NMEA0183 protocol inside vessel network systems.

Red Tide Prediction using Neural Network and SVM (신경망과 SVM을 이용한 적조 발생 예측)

  • Park, Sun;Kim, Kyung-Jun;Lee, Jin-Seok;Lee, Seong-Ro
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.5
    • /
    • pp.39-45
    • /
    • 2011
  • There have been many studies on red tide because of increasing of damage to sea farming by a red tide blooms of harmful algae. The studies of red tide have mostly focused chemical properties and investigation of biological cause. If we can predict the occurrence of red tide, we will be able to minimize the damage of red tide. However, internal study of prediction of red tide blooms is only classification method that is still insufficient for red tide blooms forecast. In this paper, we proposed the red tide blooms prediction method using neural network and SVM.

A Study on the Regional Knowledge-Information Service: Focusing on Public Libraries in Korea and Japan (지역 지식정보서비스에 관한 연구 - 한국과 일본의 공공도서관을 중심으로 -)

  • Park, Hyun-Hee;Lee, Sung-Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.3
    • /
    • pp.393-412
    • /
    • 2015
  • The purpose of this study is to suggest development plan of the Regional knowledge information services through the case study analysis between Korea and Japan public libraries. For this purpose, we analyzed literature related to the Regional knowledge information services, performed case study, and carried out a investigation which focuses on a public libraries webpage. According to the analysis, the development plan for the Regional knowledge information services was suggested as follow; that is user-friendly service, internal cooperation, external network cooperative strategy, visible public relations and recognition improvement. This study has aimed to prepare for the basic data which will help Korea public libraries to make better Regional knowledge information services in the future.

Ensuring Information Security in the System of Public Management of Sustainable Development of the Region: EU Experience

  • Zahorskyi, Volodymyr;Bobrovskyi, Oleksii;Bondarenko, Dmytro;Karpa, Marta;Akimov, Oleksandr;Akimova, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.163-168
    • /
    • 2022
  • The main purpose of the study is to analyze the features of ensuring information security in the system of public administration of the constant development of the region. The actualization of the research topic is because the information has become a powerful means of manipulating the public and individual consciousness, as well as a real weapon used in new types of conflicts, confrontations, and confrontations. Creating opportunities for everyone to access information sources, developing the ability to use it, and at the same time protecting people from dirty information flows create a kind of subject-research field, one of the most relevant aspects of which is the problem of forming and implementing information security policy at the state, public and civil levels. The research methodology involved the use of theoretical and scientific methods. As a result of the study, the key features of ensuring information security in the system of public management of the continuous development of the region of the EU countries were identified.

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining

  • Liu, Weixin;Zheng, Kangfeng;Wu, Bin;Wu, Chunhua;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2781-2800
    • /
    • 2016
  • Emerging attacks aim to access proprietary assets and steal data for business or political motives, such as Operation Aurora and Operation Shady RAT. Skilled Intruders would likely remove their traces on targeted hosts, but their network movements, which are continuously recorded by network devices, cannot be easily eliminated by themselves. However, without complete knowledge about both inbound/outbound and internal traffic, it is difficult for security team to unveil hidden traces of intruders. In this paper, we propose an autonomous anomaly detection system based on behavior profiling and relation mining. The single-hop access profiling model employ a novel linear grouping algorithm PSOLGA to create behavior profiles for each individual server application discovered automatically in historical flow analysis. Besides that, the double-hop access relation model utilizes in-memory graph to mine time-sequenced access relations between different server applications. Using the behavior profiles and relation rules, this approach is able to detect possible anomalies and violations in real-time detection. Finally, the experimental results demonstrate that the designed models are promising in terms of accuracy and computational efficiency.

Optimization Methods for Power Allocation and Interference Coordination Simultaneously with MIMO and Full Duplex for Multi-Robot Networks

  • Wang, Guisheng;Wang, Yequn;Dong, Shufu;Huang, Guoce;Sun, Qilu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.216-239
    • /
    • 2021
  • The present work addresses the challenging problem of coordinating power allocation with interference management in multi-robot networks by applying the promising expansion capabilities of multiple-input multiple-output (MIMO) and full duplex systems, which achieves it for maximizing the throughput of networks under the impacts of Doppler frequency shifts and external jamming. The proposed power allocation with interference coordination formulation accounts for three types of the interference, including cross-tier, co-tier, and mixed-tier interference signals with cluster head nodes operating in different full-duplex modes, and their signal-to-noise-ratios are respectively derived under the impacts of Doppler frequency shifts and external jamming. In addition, various optimization algorithms, including two centralized iterative optimization algorithms and three decentralized optimization algorithms, are applied for solving the complex and non-convex combinatorial optimization problem associated with the power allocation and interference coordination. Simulation results demonstrate that the overall network throughput increases gradually to some degree with increasing numbers of MIMO antennas. In addition, increasing the number of clusters to a certain extent increases the overall network throughput, although internal interference becomes a severe problem for further increases in the number of clusters. Accordingly, applications of multi-robot networks require that a balance should be preserved between robot deployment density and communication capacity.