• 제목/요약/키워드: Network Connectivity

검색결과 765건 처리시간 0.02초

Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing

  • Lin, Te-Yuan;Fuh, Chiou-Shann
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.5654-5668
    • /
    • 2018
  • Driven by security and real-time demands of Internet of Things (IoT), the timing of fog computing and edge computing have gradually come into place. Gateways bear more nearby computing, storage, analysis and as an intelligent broker of the whole computing lifecycle in between local devices and the remote cloud. In fog computing, the edge broker requires X-aware capabilities that combines software programmability, stream processing, hardware optimization and various connectivity to deal with such as security, data abstraction, network latency, service classification and workload allocation strategy. The prosperous of Field Programmable Gate Array (FPGA) pushes the possibility of gateway capabilities further landed. In this paper, we propose a software-defined gateway (SDG) scheme for fog computing paradigm termed as Fog Computing Zero-Knowledge Gateway that strengthens data protection and resilience merits designed for industrial internet of things or highly privacy concerned hybrid cloud scenarios. It is a proxy for fog nodes and able to integrate with existing commodity gateways. The contribution is that it converts Privacy-Enhancing Technologies rules into provable statements without knowing original sensitive data and guarantees privacy rules applied to the sensitive data before being propagated while preventing potential leakage threats. Some logical functions can be offloaded to any programmable micro-controller embedded to achieve higher computing efficiency.

Analysis of Web Browser Security Configuration Options

  • Jillepalli, Ananth A.;de Leon, Daniel Conte;Steiner, Stuart;Alves-Foss, Jim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6139-6160
    • /
    • 2018
  • For ease of use and access, web browsers are now being used to access and modify sensitive data and systems including critical control systems. Due to their computational capabilities and network connectivity, browsers are vulnerable to several types of attacks, even when fully updated. Browsers are also the main target of phishing attacks. Many browser attacks, including phishing, could be prevented or mitigated by using site-, user-, and device-specific security configurations. However, we discovered that all major browsers expose disparate security configuration procedures, option names, values, and semantics. This results in an extremely hard to secure web browsing ecosystem. We analyzed more than a 1000 browser security configuration options in three major browsers and found that only 13 configuration options had syntactic and semantic similarity, while 4 configuration options had semantic similarity, but not syntactic similarity. We: a) describe the results of our in-depth analysis of browser security configuration options; b) demonstrate the complexity of policy-based configuration of web browsers; c) describe a knowledge-based solution that would enable organizations to implement highly-granular and policy-level secure configurations for their information and operational technology browsing infrastructures at the enterprise scale; and d) argue for necessity of developing a common language and semantics for web browser configurations.

Modulation Recognition of BPSK/QPSK Signals based on Features in the Graph Domain

  • Yang, Li;Hu, Guobing;Xu, Xiaoyang;Zhao, Pinjiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권11호
    • /
    • pp.3761-3779
    • /
    • 2022
  • The performance of existing recognition algorithms for binary phase shift keying (BPSK) and quadrature phase shift keying (QPSK) signals degrade under conditions of low signal-to-noise ratios (SNR). Hence, a novel recognition algorithm based on features in the graph domain is proposed in this study. First, the power spectrum of the squared candidate signal is truncated by a rectangular window. Thereafter, the graph representation of the truncated spectrum is obtained via normalization, quantization, and edge construction. Based on the analysis of the connectivity difference of the graphs under different hypotheses, the sum of degree (SD) of the graphs is utilized as a discriminate feature to classify BPSK and QPSK signals. Moreover, we prove that the SD is a Schur-concave function with respect to the probability vector of the vertices (PVV). Extensive simulations confirm the effectiveness of the proposed algorithm, and its superiority to the listed model-driven-based (MDB) algorithms in terms of recognition performance under low SNRs and computational complexity. As it is confirmed that the proposed method reduces the computational complexity of existing graph-based algorithms, it can be applied in modulation recognition of radar or communication signals in real-time processing, and does not require any prior knowledge about the training sets, channel coefficients, or noise power.

Establishment of ICT Specialized Teaching-Learning System in the Era of Superintelligence, Super-Connectivity, and Super-Convergence

  • Seung-Woo LEE;Sangwon LEE
    • International journal of advanced smart convergence
    • /
    • 제12권3호
    • /
    • pp.149-156
    • /
    • 2023
  • Joint research on software, electronic engineering, computer engineering, and financial engineering and the use of ICT knowledge through network formation play an important role in strengthening science and technology-based innovation capabilities and facilitating the development and production process of products using new technologies. For the purpose of this study, I would like to strategically propose ICT specialized education in the 4th industrial revolution. To this end, the ICT specialization model, ICT specialization strategy analysis, and ICT specialization operation and effect were explored to establish ICT specialization strategies centered on software, electronic engineering, computer engineering, and financial engineering in the era of super-intelligence, hyper-connected, and hyper-convergence. Secondly, a roadmap for detailed promotion tasks related to efficient ICT characterization based on core strategies, detailed promotion tasks, and programs was proposed, focusing on talent related to ICT characterization. Thirdly, we would like to propose a reorganization of the academic structure and organization related to ICT characterization. Finally, we would like to propose the establishment of a future-oriented education system related to ICT specialization based on the advanced education and research environment.

Energy-efficient semi-supervised learning framework for subchannel allocation in non-orthogonal multiple access systems

  • S. Devipriya;J. Martin Leo Manickam;B. Victoria Jancee
    • ETRI Journal
    • /
    • 제45권6호
    • /
    • pp.963-973
    • /
    • 2023
  • Non-orthogonal multiple access (NOMA) is considered a key candidate technology for next-generation wireless communication systems due to its high spectral efficiency and massive connectivity. Incorporating the concepts of multiple-input-multiple-output (MIMO) into NOMA can further improve the system efficiency, but the hardware complexity increases. This study develops an energy-efficient (EE) subchannel assignment framework for MIMO-NOMA systems under the quality-of-service and interference constraints. This framework handles an energy-efficient co-training-based semi-supervised learning (EE-CSL) algorithm, which utilizes a small portion of existing labeled data generated by numerical iterative algorithms for training. To improve the learning performance of the proposed EE-CSL, initial assignment is performed by a many-to-one matching (MOM) algorithm. The MOM algorithm helps achieve a low complex solution. Simulation results illustrate that a lower computational complexity of the EE-CSL algorithm helps significantly minimize the energy consumption in a network. Furthermore, the sum rate of NOMA outperforms conventional orthogonal multiple access.

Enhancing VANET Security: Efficient Communication and Wormhole Attack Detection using VDTN Protocol and TD3 Algorithm

  • Vamshi Krishna. K;Ganesh Reddy K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권1호
    • /
    • pp.233-262
    • /
    • 2024
  • Due to the rapid evolution of vehicular ad hoc networks (VANETs), effective communication and security are now essential components in providing secure and reliable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, due to their dynamic nature and potential threats, VANETs need to have strong security mechanisms. This paper presents a novel approach to improve VANET security by combining the Vehicular Delay-Tolerant Network (VDTN) protocol with the Deep Reinforcement Learning (DRL) technique known as the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. A store-carry-forward method is used by the VDTN protocol to resolve the problems caused by inconsistent connectivity and disturbances in VANETs. The TD3 algorithm is employed for capturing and detecting Worm Hole Attack (WHA) behaviors in VANETs, thereby enhancing security measures. By combining these components, it is possible to create trustworthy and effective communication channels as well as successfully detect and stop rushing attacks inside the VANET. Extensive evaluations and simulations demonstrate the effectiveness of the proposed approach, enhancing both security and communication efficiency.

Network Analysis about Study on the Oral Health of People with Disabilities

  • Seol-Hee Kim
    • 치위생과학회지
    • /
    • 제24권2호
    • /
    • pp.107-114
    • /
    • 2024
  • Background: This study aimed to analyze trends in oral health research among people with disabilities. Methods: Data were obtained from 70 oral studies on individuals with disabilities from 2000 to 2024. Keywords were analyzed. Frequency, betweenness centrality, and cluster analyses were performed using NetMiner. Results: The main keywords for oral health research on disabled people were oral health, dental caries, DMFT (decayed-missing-filled-teeth), dental treatment, oral health centers, and disabled children. As a result of the centrality analysis, DMFT had the highest connectivity, followed by disabled children, special care dentistry, oral health behavior, periodontitis, and health insurance. Cluster analysis results of research on disabled people: Group 1, oral diseases and functions of disabled people; Group 2, oral care for disabled children; Group 3, dental treatment for disabled people; Group 4, oral health policy; Group 5, oral care by dental hygienists; and Group 6, conservative dentistry. Conclusion: Considering the increase in the number of disabled people in a super-aging society, research on ways to promote oral health for disabled people, oral health policies, and training of oral health experts for disabled people is required.

Revolutionizing Nepal's Transportation: The Potential of Advanced Air Mobility (AAM) in Overcoming Geographical Challenges

  • Leeladhar Joshi;Kwang-Byeng Lee
    • 한국항공운항학회지
    • /
    • 제32권2호
    • /
    • pp.37-47
    • /
    • 2024
  • This paper examines the unique transportation challenges posed by Nepal's diverse and rugged terrain, which significantly hampers socio-economic development due to its negative impact on infrastructure, trade, and accessibility. Despite ongoing efforts to enhance road and traditional air transport systems, Nepal's geographic and environmental conditions continue to obstruct efficient connectivity, particularly in rural and remote areas. This study proposes Advanced Air Mobility (AAM) as a transformative solution, leveraging recent technological advancements in unmanned aerial vehicles (UAVs) and electric vertical takeoff and landing (eVTOL) aircraft. By conducting a comprehensive analysis of Nepal's current transportation infrastructure and the feasibility of AAM implementation, the paper highlights the potential benefits of AAM, including improved accessibility, economic growth, and environmental sustainability. Furthermore, it addresses the anticipated challenges and regulatory considerations necessary for integrating AAM into Nepal's transportation network. Through a multidisciplinary approach, this research aims to contribute to the discourse on overcoming transportation barriers in mountainous regions, offering policy recommendations and identifying areas for future study to facilitate the adoption of AAM in Nepal and similar contexts worldwide.

무선 메쉬 네트워크를 이용한 홈 임베디드 시스템의 성능에 대한 연구 (A Study on the Performance of Home Embedded System Using a Wireless Mesh Network)

  • 노재성;예휘진
    • 디지털콘텐츠학회 논문지
    • /
    • 제8권3호
    • /
    • pp.323-328
    • /
    • 2007
  • 3G 이후의 통신 시스템은 무선 접속을 위하여 100 Mbps 이상을 제공해야 한다. 스마트 안테나 외에도 무선 멀티 홉 네트워크는 셀 크기와 처리율을 증가시키는 방식이다. 예를 들어 지그비 기술은 기기 사이의 저 가격과 저 전력 연결을 제공하며 블루투스에서 제공하는 네트워크 구성보다 큰 메쉬 네트워크를 구축할 수 있다. 무선 메쉬 네트워크를 이용한 홈 임베디드 시스템은 지그비 응용을 위한 큰 시장중의 하나이다. 만약 LOS 경로가 보장되지 않고 높은 주파수를 사용하면 AP와 마지막 노드사이에 직접 연결은 불가능하다. 따라서 멀티 홉 릴레이 기법을 사용하게 되면 AP와 마지막 노드사이의 연결은 가능하게 된다. 본 논문은 AP와 마지막 노드사이의 데이터 릴레이 방식을 연구하였으며 멀티 홉 무선 메쉬 네트워크에서 DSSS/BPSK 시스템의 처리율과 PER 성능을 분석하였다.

  • PDF

Big Data Management System for Biomedical Images to Improve Short-term and Long-term Storage

  • Qamar, Shamweel;Kim, Eun Sung;Park, Peom
    • 시스템엔지니어링학술지
    • /
    • 제15권2호
    • /
    • pp.66-71
    • /
    • 2019
  • In digital pathology, an electronic system in the biomedical domain storage of the files is a big constrain and because all the analysis and annotation takes place at every user-end manually, it becomes even harder to manage the data that is being shared inside an enterprise. Therefore, we need such a storage system which is not only big enough to store all the data but also manage it and making communication of that data much easier without losing its true from. A virtual server setup is one of those techniques which can solve this issue. We set a main server which is the main storage for all the virtual machines(that are being used at user-end) and that main server is controlled through a hypervisor so that if we want to make changes in storage overall or the main server in itself, it could be reached remotely from anywhere by just using the server's IP address. The server in our case includes XML-RPC based API which are transmitted between computers using HTTP protocol. JAVA API connects to HTTP/HTTPS protocol through JAVA Runtime Environment and exists on top of other SDK web services for the productivity boost of the running application. To manage the server easily, we use Tkinter library to develop the GUI and pmw magawidgets library which is also utilized through Tkinter. For managing, monitoring and performing operations on virtual machines, we use Python binding to XML-RPC based API. After all these settings, we approach to make the system user friendly by making GUI of the main server. Using that GUI, user can perform administrative functions like restart, suspend or resume a virtual machine. They can also logon to the slave host of the pool in case of emergency and if needed, they can also filter virtual machine by the host. Network monitoring can be performed on multiple virtual machines at same time in order to detect any loss of network connectivity.