• Title/Summary/Keyword: Network Robustness

Search Result 499, Processing Time 0.027 seconds

Traffic Analysis of a Cognitive Radio Network Based on the Concept of Medium Access Probability

  • Khan, Risala T.;Islam, Md. Imdadul;Amin, M.R.
    • Journal of Information Processing Systems
    • /
    • v.10 no.4
    • /
    • pp.602-617
    • /
    • 2014
  • The performance of a cognitive radio network (CRN) solely depends on how precisely the secondary users can sense the presence or absence of primary users. The incorporation of a spatial false alarm makes deriving the probability of a correct decision a cumbersome task. Previous literature performed this task for the case of a received signal under a Normal probability density function case. In this paper we enhance the previous work, including the impact of carrier frequency, the gain of antennas on both sides, and antenna heights so as to observe the robustness against noise and interference and to make the correct decision of detection. Three small scale fading channels: Rayleigh, Normal, and Weibull were considered to get the real scenario of a CRN in an urban area. The incorporation of a maximal-ratio combining and selection combing with a variation of the number of received antennas have also been studied in order to achieve the correct decision of spectral sensing, so as to serve the cognitive users. Finally, we applied the above concept to a traffic model of the CRN, which we based on a two-dimensional state transition chain.

Co-authorship Credit Allocation Methods in the Assessment of Citation Impact of Chemistry Faculty

  • Lee, Jongwook;Yang, Kiduk
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.3
    • /
    • pp.273-289
    • /
    • 2015
  • This study examined changes in citation index scores and rankings of thirty-five chemistry faculty members at Seoul National University using different co-authorship credit allocation models. Using 1,436 Web of Science papers published between 2007 and 2013, we applied the inflated, fractional, harmonic, network-based allocation, and harmonic+ models to calculate faculty's h-, R-, and normalization of h- and R- index scores and rankings. The harmonic+ model, which is based on our belief that contribution of primary authors should be the same regardless of collaboration, is designed to minimize the penalty for research collaboration imposed by harmonic and NBA models by boosting the contribution of collaborating primary authors to be on the equal footing with single authors. Although citation rankings by different models are correlated with each other within the same type of citation indicator, rankings of many faculty members changed across models, suggesting the importance of an accurate and relevant authorship credit allocation model in the citation assessment of researchers. The study also found that authorship patterns in conjunction with citation counts are important factors for robust authorship models such as harmonic and NBA, and harmonic+ model may be beneficial for collaborating primary authors. Future research that reexamines the models with updated empirical data would provide further insights into the robustness of the models.

Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices

  • Liu, Weiwei;Liu, Guangjie;Ji, Xiaopeng;Zhai, Jiangtao;Dai, Yuewei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1866-1883
    • /
    • 2019
  • As the youngest branch of information hiding, network covert timing channels conceal the existence of secret messages by manipulating the timing information of the overt traffic. The popular model-based framework for constructing covert timing channels always utilizes cumulative distribution function (CDF) of the inter-packet delays (IPDs) to modulate secret messages, whereas discards high-order statistics of the IPDs completely. The consequence is the vulnerability to high-order statistical tests, e.g., entropy test. In this study, a rich security model of covert timing channels is established based on IPD chains, which can be used to measure the distortion of multi-order timing statistics of a covert timing channel. To achieve rich security, we propose two types of covert timing channels based on nested lattices. The CDF of the IPDs is used to construct dot-lattice and interval-lattice for quantization, which can ensure the cell density of the lattice consistent with the joint distribution of the IPDs. Furthermore, compensative quantization and guard band strategy are employed to eliminate the regularity and enhance the robustness, respectively. Experimental results on real traffic show that the proposed schemes are rich-secure, and robust to channel interference, whereas some state-of-the-art covert timing channels cannot evade detection under the rich security model.

Soft computing-based estimation of ultimate axial load of rectangular concrete-filled steel tubes

  • Asteris, Panagiotis G.;Lemonis, Minas E.;Nguyen, Thuy-Anh;Le, Hiep Van;Pham, Binh Thai
    • Steel and Composite Structures
    • /
    • v.39 no.4
    • /
    • pp.471-491
    • /
    • 2021
  • In this study, we estimate the ultimate load of rectangular concrete-filled steel tubes (CFST) by developing a novel hybrid predictive model (ANN-BCMO) which is a combination of balancing composite motion optimization (BCMO) - a very new optimization technique and artificial neural network (ANN). For this aim, an experimental database consisting of 422 datasets is used for the development and validation of the ANN-BCMO model. Variables in the database are related with the geometrical characteristics of the structural members, and the mechanical properties of the constituent materials (steel and concrete). Validation of the hybrid ANN-BCMO model is carried out by applying standard statistical criteria such as root mean square error (RMSE), coefficient of determination (R2), and mean absolute error (MAE). In addition, the selection of appropriate values for parameters of the hybrid ANN-BCMO is conducted and its robustness is evaluated and compared with the conventional ANN techniques. The results reveal that the new hybrid ANN-BCMO model is a promising tool for prediction of the ultimate load of rectangular CFST, and prove the effective role of BCMO as a powerful algorithm in optimizing and improving the capability of the ANN predictor.

Analysis of normalization effect for earthquake events classification (지진 이벤트 분류를 위한 정규화 기법 분석)

  • Zhang, Shou;Ku, Bonhwa;Ko, Hansoek
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.2
    • /
    • pp.130-138
    • /
    • 2021
  • This paper presents an effective structure by applying various normalization to Convolutional Neural Networks (CNN) for seismic event classification. Normalization techniques can not only improve the learning speed of neural networks, but also show robustness to noise. In this paper, we analyze the effect of input data normalization and hidden layer normalization on the deep learning model for seismic event classification. In addition an effective model is derived through various experiments according to the structure of the applied hidden layer. As a result of various experiments, the model that applied input data normalization and weight normalization to the first hidden layer showed the most stable performance improvement.

Deep Learning-based Indoor Positioning System Using CSI (채널 상태 정보를 이용한 딥 러닝 기반 실내 위치 확인 시스템)

  • Zhang, Zhongfeng;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.1-7
    • /
    • 2020
  • Over the past few years, Wi-Fi signal based indoor positioning system (IPS) has been researched extensively because of its low expenses of infrastructure deployment. There are two major aspects of location-related information contained in Wi-Fi signals. One is channel state information (CSI), and one is received signal strength indicator (RSSI). Compared to the RSSI, the CSI has been widely utilized because it is able to reveal fine-grained information related to locations. However, the conventional IPS that employs a single access point (AP) does not exhibit decent performance especially in the environment of non-line-of-sight (NLOS) situations due to the reliability degeneration of signals caused by multipath fading effect. In order to address this problem, in this paper, we propose a novel method that utilizes multiple APs instead of a single AP to enhance the robustness of the IPS. In our proposed method, a hybrid neural network is applied to the CSIs collected from multiple APs. By relying more on the fingerprint constructed by the CSI collected from an AP that is less affected by the NLOS, we find that the performance of the IPS is significantly improved.

A Robust Energy Consumption Forecasting Model using ResNet-LSTM with Huber Loss

  • Albelwi, Saleh
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.301-307
    • /
    • 2022
  • Energy consumption has grown alongside dramatic population increases. Statistics show that buildings in particular utilize a significant amount of energy, worldwide. Because of this, building energy prediction is crucial to best optimize utilities' energy plans and also create a predictive model for consumers. To improve energy prediction performance, this paper proposes a ResNet-LSTM model that combines residual networks (ResNets) and long short-term memory (LSTM) for energy consumption prediction. ResNets are utilized to extract complex and rich features, while LSTM has the ability to learn temporal correlation; the dense layer is used as a regression to forecast energy consumption. To make our model more robust, we employed Huber loss during the optimization process. Huber loss obtains high efficiency by handling minor errors quadratically. It also takes the absolute error for large errors to increase robustness. This makes our model less sensitive to outlier data. Our proposed system was trained on historical data to forecast energy consumption for different time series. To evaluate our proposed model, we compared our model's performance with several popular machine learning and deep learning methods such as linear regression, neural networks, decision tree, and convolutional neural networks, etc. The results show that our proposed model predicted energy consumption most accurately.

Secure Device to Device Communications using Lightweight Cryptographic Protocol

  • Ajith Kumar, V;Reddy, K Satyanarayan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.354-362
    • /
    • 2021
  • The device to device (D2D) communication is an important and emerging area for future cellular networks. It is concerned about all aspect of secure data transmission between end devices along with originality of the data. In this paradigm, the major concerns are about how keys are delivered between the devices when the devices require the cryptographic keys. Another major concern is how effectively the receiver device verifies the data sent by the sender device which means that the receiver checks the originality of the data. In order to fulfill these requirements, the proposed system able to derive a cryptographic key using a single secret key and these derived keys are securely transmitted to the intended receiver with procedure called mutual authentication. Initially, derived keys are computed by applying robust procedure so that any adversary feel difficulties for cracking the keys. The experimental results shows that both sender and receiver can identify themselves and receiver device will decrypt the data only after verifying the originality of the data. Only the devices which are mutually authenticated each other can interchange the data so that entry of the intruder node at any stage is not possible.

Using Faster-R-CNN to Improve the Detection Efficiency of Workpiece Irregular Defects

  • Liu, Zhao;Li, Yan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.625-627
    • /
    • 2022
  • In the construction and development of modern industrial production technology, the traditional technology management mode is faced with many problems such as low qualification rates and high application costs. In the research, an improved workpiece defect detection method based on deep learning is proposed, which can control the application cost and improve the detection efficiency of irregular defects. Based on the research of the current situation of deep learning applications, this paper uses the improved Faster R-CNN network structure model as the core detection algorithm to automatically locate and classify the defect areas of the workpiece. Firstly, the robustness of the model was improved by appropriately changing the depth and the number of channels of the backbone network, and the hyperparameters of the improved model were adjusted. Then the deformable convolution is added to improve the detection ability of irregular defects. The final experimental results show that this method's average detection accuracy (mAP) is 4.5% higher than that of other methods. The model with anchor size and aspect ratio (65,129,257,519) and (0.2,0.5,1,1) has the highest defect recognition rate, and the detection accuracy reaches 93.88%.

Artificial Intelligence (AI) and Blockchain-based Online Payments in the Global World

  • Ahlam Alhalafi;Prakash Veeraraghavan;Dalal Hanna
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.1-11
    • /
    • 2024
  • Payment systems are evolving, and this study examines how blockchain and AI improve online transactional security and service quality. The study examines micro and macro payment systems, compares online, and offline methods all over the world. The study also examines how blockchain and AI affect payment system security, privacy, and efficiency globally and rapidly digitizing economy. Digital payment methods are growing all over the world with high literacy and digital engagement, but they face challenges. The research highlights cybersecurity threats and the need to balance user convenience and security. It suggests blockchain and AI improve online payment services, supporting the policies for different countries. In this extensive research survey, we compare and evaluate the strengths and weaknesses of various payment systems, their practicality, and their robustness. This study also examines how technological innovations and payment systems interact to reveal how blockchain and AI could transform the financial sector. It seeks to understand how technology-enhancing service quality can boost customer satisfaction and financial stability in the digital age. The findings should help policymakers, financial institutions, and technology developers optimize online payment systems for a more secure and efficient digital economy.