• 제목/요약/키워드: Internal Network Information

검색결과 502건 처리시간 0.028초

웹 이용자의 접속 정보 분석을 통한 웹 활용 그래프의 구성 및 분석 (An Analysis on the Web Usage Pattern Graph Using Web Users' Access Information)

  • 김후곤;김재교
    • 경영과학
    • /
    • 제23권3호
    • /
    • pp.63-75
    • /
    • 2006
  • There are many kinds of research on web graph, most of them are focus on the hyperlinked structure of the web graph. Well known results on the web graph are rich-get-richer phenomenon, small-world phenomenon, scale-free network, etc. In this paper, we define 3 new directed web graph, so called the Web Usage Pattern Graph (WUPG), that nodes represent web sites arid arcs between nodes represent a movement between two sites by users' browsing behavior. The data to constructing the WUPG, approximately 56,000 records, are gathered from some users' PCs. The results analysing the data summarized as follows : (i) extremely rich-get-richer phenomenon (ii) average path length between sites is significantly less than the previous one (iii) less external hyperlinks, more internal hyperlinks.

다층 레벨 VHDL 시뮬레이터의 설계 (Design of a Multi-level VHDL Simulator)

  • 이영희;김헌철;황선영
    • 전자공학회논문지A
    • /
    • 제30A권10호
    • /
    • pp.67-76
    • /
    • 1993
  • This paper presents the design and implementation of SVSIM (Sogang VHDL SIMulator), a multi-level VHDL simulator, designed for the construction of an integrated VGDL design environment. The internal model of SVSIM is the hierarchical C/DFG which is extended from C/DFG to include the network hierarchy and local/glabal control informations. Hierarchical network is not flattened for simulation, resulting in the reduction of space complexity. The predufined/user-defined types except for the record type and the predefined/user-defined attributes are supported in SVSIM. Algorithmic-level descriptions can be siumlated by the support of recursive procedure/function calls. Input stimuli can be generated by command script in stimuli file or in VHDL source code. Experimential results show SVSIM can be efficiently used for the simulation of the pure behavioral descriptions, structural descriptions or mixture of these.

  • PDF

신경회로망을 이용한 ATM 교환기의 제어부 설계 (Design of an ATM Switch Controller Using Neural Networks)

  • 김영우;임인칠
    • 전자공학회논문지B
    • /
    • 제31B권5호
    • /
    • pp.123-133
    • /
    • 1994
  • This paper presents an output arbitrator for input buffering ATM (Asynchronous Transfer Mode) switches using neural networks. To avoid blocking in ATM switches with blocking characteristics, it is required to buffer ATM cells in input buffer and to schedule them. The N$\times$N request matrix is divided into N/16 submatrices in order to get rid of internal blocking systematically in scheduling phase. The submatrices are grouped into N/4 groups, and the cells in each group are switched alternatively. As the window size of input buffer is increases, the number of input cells switched in a time slot approaches to N. The selection of nonblocking cells to be switched is done by neural network modules. N/4 neural network modules are operated simultaneously. Fast selection can be achieved by massive parallelism of neural networks. The neural networks have 4N neurons and 14N connection. The proposed method is implemented in C language, and the simulation result confirms the feasibility of this method.

  • PDF

Radix-2 트리 ATM 스위치를 위한 멀티캐스팅 알고리즘에 관한 연구 (A study on the multicasting algorithm for radix-2 tree ATM switch)

  • 김홍열;임제택
    • 전자공학회논문지S
    • /
    • 제34S권1호
    • /
    • pp.1-8
    • /
    • 1997
  • A wide class of networking application services, such as video teleconferencing, VOD, LAN bridging, and distributed data processing require multipoint communications. The essential component inteh network to achieve this is a multicast packet switch which is capable of packet replication and switching. In this paper, we propose an efficient mukticast addressing scheme using the smallest number of routing bits which is deterministic lower bound. The new scheme performs all point-to-multipoint connection in radix-2 tree ATM switch like banyan network. Also, we provide a simple radix-2 switch block diagram for achieving our algorithm. And we investigate several addressing schemes for implementing multicasting in radix-r tree ATM switch and evaluate several performance factors, such as complexity of the additional header bits, requirement of the internal speedup and complexity of the major hardware.

  • PDF

카오틱 신경망을 이용한 다입력 다출력 시스템의 단일 예측 (The Single Step Prediction of Multi-Input Multi-Output System using Chaotic Neural Networks)

  • 장창화;김상희
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1999년도 하계종합학술대회 논문집
    • /
    • pp.1041-1044
    • /
    • 1999
  • In This paper, we investigated the single step prediction for output responses of chaotic system with multi Input multi output using chaotic neural networks. Since the systems with chaotic characteristics are coupled between internal parameters, the chaotic neural networks is very suitable for output response prediction of chaotic system. To evaluate the performance of the proposed neural network predictor, we adopt for Lorenz attractor with chaotic responses and compare the results with recurrent neural networks. The results demonstrated superior performance on convergence and computation time than the predictor using recurrent neural networks. And we could also see good predictive capability of chaotic neural network predictor.

  • PDF

공간회로망법을 이용한 GIS 내부의 움직이는 도체이물질에 의한 불평등전계 해석 (Analysis of Unequal Electric Field by Moving Metal Particle in GIS Using SNM)

  • 박경수;최성열;고영호
    • 대한전기학회논문지:전기물성ㆍ응용부문C
    • /
    • 제51권2호
    • /
    • pp.68-73
    • /
    • 2002
  • In compared with air insulated switchgear, GIS has a high efficiency and confidence. Insulation method using $SF_6$ gas has a very excellent insulation characteristic for high voltage equipment but has a characteristic that insulation heredity is changed for internal unequal electric field. So analysis of time varying electromagnetic field in GIS is very important for structure design and trouble diagnosis process. In compared with established method, the SNM(Spatial Network Method) in this Paper can observe variation of electromagnetic field with real time and get result very similar to measurement. In order to Know variation of electromagnetic field distribution in fast moving particle, we make used of SNM.

Theoretical Foundations Of Election Campaign Research: Problems, Approaches And Methods

  • Dreshpak, Valerii;Pavlenko, Evgen;Babachenko, Nataliia;Prokopenko, liudmyla;Senkevych, Hennadii;Marchuk, Mykola
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.113-117
    • /
    • 2021
  • The article defines the basic concepts: "election campaign", "social capital", "conversion of social capital"; the principles and methods of research of social capital conversion in election campaigns are studied; the process of using social capital in politics is defined; ways of converting social capital into politics are considered; the possibilities of converting social capital in election campaigns are described. Election campaigns have been found to be a successful form of social capital conversion. The ability to use social capital in the election campaign speaks of its high potential. Election campaigns are not an effective use of social capital.

A Beacon-Based Trust Management System for Enhancing User Centric Location Privacy in VANETs

  • Chen, Yi-Ming;Wei, Yu-Chih
    • Journal of Communications and Networks
    • /
    • 제15권2호
    • /
    • pp.153-163
    • /
    • 2013
  • In recent years, more and more researches have been focusing on trust management of vehicle ad-hoc networks (VANETs) for improving the safety of vehicles. However, in these researches, little attention has been paid to the location privacy due to the natural conflict between trust and anonymity, which is the basic protection of privacy. Although traffic safety remains the most crucial issue in VANETs, location privacy can be just as important for drivers, and neither can be ignored. In this paper, we propose a beacon-based trust management system, called BTM, that aims to thwart internal attackers from sending false messages in privacy-enhanced VANETs. To evaluate the reliability and performance of the proposed system, we conducted a set of simulations under alteration attacks, bogus message attacks, and message suppression attacks. The simulation results show that the proposed system is highly resilient to adversarial attacks, whether it is under a fixed silent period or random silent period location privacy-enhancement scheme.

Study on Optimum Meteorological Information System of Korea

  • Kim, Eui-Hong;Lee, Wan-Ho
    • 대한원격탐사학회지
    • /
    • 제2권1호
    • /
    • pp.49-54
    • /
    • 1986
  • This study has been intended to design an optimum meteorological information system appropriate for Korea as a part of 5 year development plan. The 5 year plan was that to set up new direction in order to modernize meteorological data acquisition, processing and information distribution. The detailed research has been led to presentation of optimum meteorological information system of Korea eventually, selecting the computerization of communication as the primary object of modernization. In the study, research concerning effective equipment configuration, data communications internal as wall as external, and the related implementations has been carried out with the approach of system component consideration under system application design. As tile results of the study, integrated network of meterorological data communication was presented including earth quakes, radar, aerologic, marine weather observations and so on.

블룸필터를 이용한 아웃바운드 트래픽 모니터링 방안 연구 (Study on Outbound Traffic Monitoring with Bloom Filter)

  • 강성중;김형중
    • 디지털콘텐츠학회 논문지
    • /
    • 제19권2호
    • /
    • pp.327-334
    • /
    • 2018
  • PC가 악성코드에 감염되면 C&C서버와 통신하며 공격자의 명령에 따라 내부 네트워크에 확산, 정보획득 등의 과정을 거쳐 최종적인 악성행위를 하게 된다. 기업은 외부로부터의 공격을 사전에 차단하는데 중점을 두고 있으나 APT공격을 목적으로 한 악성코드는 어떤 형대로든 내부로 유입된다. 이때 피해의 확산을 방지하기 위하여 악성코드에 감염되어 C&C서버와 통신을 시도하는 PC를 찾아내는 내부 모니터링이 필요하다. 본 논문에서 수많은 패킷들의 목적지IP가 블랙리스트 IP인지 여부를 빠르고 효과적으로 대조하기 위한 블룸필터를 이용한 목적지 IP 모니터링 방안을 제시한다.