• Title/Summary/Keyword: International Network

Search Result 4,256, Processing Time 0.026 seconds

Correlated damage probabilities of bridges in seismic risk assessment of transportation networks: Case study, Tehran

  • Shahin Borzoo;Morteza Bastami;Afshin Fallah;Alireza Garakaninezhad;Morteza Abbasnejadfard
    • Earthquakes and Structures
    • /
    • v.26 no.2
    • /
    • pp.87-96
    • /
    • 2024
  • This paper proposes a logistic multinomial regression approach to model the spatial cross-correlation of damage probabilities among different damage states in an expanded transportation network. Utilizing Bayesian theory and the multinomial logistic model, we analyze the damage states and probabilities of bridges while incorporating damage correlation. This correlation is considered both between bridges in a network and within each bridge's damage states. The correlation model of damage probabilities is applied to the seismic assessment of a portion of Tehran's transportation network, encompassing 26 bridges. Additionally, we introduce extra daily traffic time (EDTT) as an operational parameter of the transportation network and employ the shortest path algorithm to determine the path between two nodes. Our results demonstrate that incorporating the correlation of damage probabilities reduces the travel time of the selected network. The average decrease in travel time for the correlated case compared to the uncorrelated case, using two selected EDTT models, is 53% and 71%, respectively.

Optimization of Cyber-Attack Detection Using the Deep Learning Network

  • Duong, Lai Van
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.159-168
    • /
    • 2021
  • Detecting cyber-attacks using machine learning or deep learning is being studied and applied widely in network intrusion detection systems. We noticed that the application of deep learning algorithms yielded many good results. However, because each deep learning model has different architecture and characteristics with certain advantages and disadvantages, so those deep learning models are only suitable for specific datasets or features. In this paper, in order to optimize the process of detecting cyber-attacks, we propose the idea of building a new deep learning network model based on the association and combination of individual deep learning models. In particular, based on the architecture of 2 deep learning models: Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM), we combine them into a combined deep learning network for detecting cyber-attacks based on network traffic. The experimental results in Section IV.D have demonstrated that our proposal using the CNN-LSTM deep learning model for detecting cyber-attacks based on network traffic is completely correct because the results of this model are much better than some individual deep learning models on all measures.

The Promotive Direction the International Cooperation in Telecommunications (전기통신의 국제협력의 증진방향)

  • 신상각
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.7 no.4
    • /
    • pp.135-150
    • /
    • 1982
  • Nowadays, The function of telecommunication contributes to maintaining the peace of the world, and the international cooperation in the communication field can not be emphasized too much. The pioneers in telecommunication field dvoted their lives to the infinite love for humanity. However, the modern communication system in our country was initiated, in the later part of the Lee-Dynasty, not for the international cooperation but for the invasive avarices of the neighbouring nations such as Japan and China. The true international cooperation should be based on the love of humanity and the peace of the world such as the pioneers'. This paper proposes to resarch the historic process of initiation and development of the international organs relating to telecommunication as well as the international telecommunication network. Finally, I will make the following suggestions for the promotive direction of the true international cooperation. 1. Intensification of the radio administrative power. 2. Promotion of the international cooperation on the man-power and economy in telecommunication field. 3. Establishment and adjustment of research institutes of telecommunication. 4. Promotion of space communications. 5. Establishment of the world telecommunication network for world-wide peace.

  • PDF

Impacts of Capabilities on International Performance in Korean Small Venture Firms : Moderating Effects of Market and Technology Turbulence (한국 중소벤처기업의 역량이 해외진출성과에 미치는 영향: 시장동태성과 기술동태성의 조절효과)

  • Jeong, So Won;Won, Jong-Hyeon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.2
    • /
    • pp.97-105
    • /
    • 2015
  • This study aims to investigate the impacts of small venture firms' capabilities on their international performance and the role of environmental dynamics in these relationships. Specifically, the study examines how international marketing, technology, and network capabilities of small venture firms influence their international performance and how market and technology turbulences moderates these relationships. Employing 162 small venture firms in Korea, the result of multiple regression analysis found that marketing capability did not affect international performance while technology and network capabilities had positive, significant impacts on international performance. Market turbulence was found to have a negative moderation effect on the relationship of network capability and international performance. Technology turbulence had a negative moderation effect on the relationship of technology capability and international performance and a positive moderation effect on the relationship of network capability and international performance. The findings confirm the importance of capabilities in improving the international performance of small venture firms and generate strategic implications for their international success by emphasizing the effect of environmental dynamics.

  • PDF

A Novel Method for Avoiding Congestion in a Mobile Ad Hoc Network for Maintaining Service Quality in a Network

  • Alattas, Khalid A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.132-140
    • /
    • 2021
  • Under the mobile ad-hoc network system, the main reason for causing congestion is because of the limited availability of resources. On the other hand, the standardised TCP based congestion controlling mechanism is unable to control and handle the major properties associated with the shared system of wireless channels. It creates an effect on the design associated with suitable protocols along with protocol stacks through the process of determining the mechanisms of congestion on a complete basis. Moreover, when bringing a comparison with standard TCP systems the major environment associated with mobile ad hoc network is regraded to be more problematic on a complete basis. On the other hand, an agent-based mobile technique for congestion is designed and developed for the part of avoiding any mode of congestion under the ad-hoc network systems.

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

EERA: ENHANCED EFFICIENT ROUTING ALGORITHM FOR MOBILE SENSOR NETWORK

  • Hemalatha, S;Raj, E.George Dharma Prakash
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.389-395
    • /
    • 2022
  • A Mobile Sensor Network is widely used in real time applications. A critical need in Mobile Sensor Network is to achieve energy efficiency during routing as the sensor nodes have scarce energy resource. The nodes' mobility in MWSN poses a challenge to design an energy efficient routing protocol. Clustering helps to achieve energy efficiency by reducing the organization complexity overhead of the network which is proportional to the number of nodes in the network. This paper proposes"EERA: Energy Efficient Routing Algorithm for Mobile Sensor Network" is divided into five phases. 1, Cluster Formation 2.Cluster head and Transmission head selection 3.Path Establishment / Route discovery and 4,Data Transmission. Experimental Analysis has been done and is found that the proposed method performs better than the existing method with respect to four parameters.

Novel VNFI Security Management Function Block For Improved Security Framework For SDN/NFV Networks

  • Alruwaili, Rahaf Hamoud;Alanazi, Haifa Khaled;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.303-309
    • /
    • 2022
  • Software Defined Networking (SDN) is a novel approach that have accelerated the development of numerous technologies such as policy-based access control, network virtualization, and others. It allows to boost network architectural flexibility and expedite the return on investment. However, this increases the system's complexity, necessitating the expenditure of dollars to assure the system's security. Network Function Virtualization (NFV) opens up new possibilities for network engineers, but it also raises security concerns. A number of Internet service providers and network equipment manufacturers are grappling with the difficulty of developing and characterizing NFVs and related technologies. Through Moodle's efforts to maintain security, this paper presents a detailed review of security-related challenges in software-defined networks and network virtualization services.

Analysis of International Relation through Analysis of Research Network of Nation and Organization in Micro Battery and Energy Harvesting (마이크로 배터리와 에너지 하비스팅에서 국가 및 기관 연구 네트워크 분석을 통한 국제 관계 분석)

  • Shin, Hyun-Shik;Kwon, Oh-Jin;Park, Jong-Kyu;Shon, Young-Woo;Bae, Young-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1457-1466
    • /
    • 2013
  • In this paper, we describe the relation of international research of 2 dimensions that deviates the simplification of scientometric analysis focusing on literature. We also present to be able to apply for organization of international relation network centering the micro battery and energy harvesting.

KAAS at 30 Years: Past, Present, and Future

  • Maeng, Cheolkyu
    • Journal of Arbitration Studies
    • /
    • v.31 no.3
    • /
    • pp.91-107
    • /
    • 2021
  • The Korean Association of Arbitration Studies faces its 30th anniversary in 2020 since its foundation in 1991 and is being celebrated and congratulated across the communities in and out of the country. However, the association seems to be standing at crossroads between a negative and positive direction. As shown in the past KAAS pattern in its academic activities, the academic community tends to focus relatively more on domestic issues, expanding its domestic network rather than international network for the past years. KAAS needs to turn its face to see the other side of the world, stretching its hands to the people outside first. For this purpose, this paper suggests that KAAS should strengthen its cooperative capability through the international cooperation division. KAAS' past 30 years of accumulated know-how and its academic network will play critical roles i-n expanding its partners across the global academic community. This paper delivers special thanks to the institutions, including the LMAA, CAC, SIAC, HKIAC, RSPP/ACRU, IDAC, and LAMC who sent cooperative works and congratulatory messages to KAAS 30th anniversary despite the COVID-19 pandemic situation.