• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.027 seconds

A study on the Establishment of a Digital Healthcare Next-Generation Information Protection System

  • Kim, Ki-Hwan;Choi, Sung-Soo;Kim, Il-Hwan;Shin, Yong-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.57-64
    • /
    • 2022
  • In this paper, the definition and overview of digital health care that has emerged recently, core technology, and We would like to propose a plan to establish a next-generation information protection system that can protect digital healthcare devices and data from cyber attacks. Various vulnerabilities exist for digital healthcare devices and data, and cyber attacks are possible for those vulnerabilities. Through an attack on digital health care devices and information and communication networks, it can directly adversely affect human life and health, Since digital healthcare data contains sensitive and personal information, it is essential to safely protect it from cyber attacks. In the case of this proposal, for continuous safe management of data and cyber attacks on equipment and communication networks for digital health devices, It is expected to be able to respond more effectively and continuously through the establishment of the next-generation information protection system.

Design and Implementation of Mobile Continuous Blood Pressure Measurement System Based on 1-D Convolutional Neural Networks (1차원 합성곱 신경망에 기반한 모바일 연속 혈압 측정 시스템의 설계 및 구현)

  • Kim, Seong-Woo;Shin, Seung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1469-1476
    • /
    • 2022
  • Recently, many researches have been conducted to estimate blood pressure using ECG(Electrocardiogram) and PPG(Photoplentysmography) signals. In this paper, we designed and implemented a mobile system to monitor blood pressure in real time by using 1-D convolutional neural networks. The proposed model consists of deep 11 layers which can learn to extract various features of ECG and PPG signals. The simulation results show that the more the number of convolutional kernels the learned neural network has, the more detailed characteristics of ECG and PPG signals resulted in better performance with reduced mean square error compared to linear regression model. With receiving measurement signals from wearable ECG and PPG sensor devices attached to the body, the developed system receives measurement data transmitted through Bluetooth communication from the devices, estimates systolic and diastolic blood pressure values using a learned model and displays its graph in real time.

Small-cell based Cooperative Multi-Point Communications to Increase Macro-cell User Performance in Ultra-Dense Heterogeneous Networks (고밀도 이기종 네트워크에서 매크로셀 사용자 성능 향샹을 위한 스몰셀 기반 다중점 협력통신)

  • Ban, Ilhak;Kim, Se-Jin
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.9-15
    • /
    • 2021
  • In ultra-dense heterogeneous networks, the amount of interference from small-cell base stations(SBS) to macro-cell user equipments (MUEs) increases significantly as the number of SBSs increases and it causes the MUEs to decrease the signal-to-interference and noise ratio(SINR) and system capacity. In this paper, we propose a small-cell based cooperative multi-point(CoMP) communication scheme that can guarantee the performance of MUEs even when the number of SBSs increases. In the proposed scheme, MUEs first find SBSs that give signal strength equal to or greater than a given SINR threshold and then they are served by different numbers of the selected SBSs using CoMP to improve the performance of MUEs. Simulation results show that the proposed small-cell based CoMP scheme outperforms other interference management or CoMP schemes in terms of the SINR and system capacity of MUEs.

A Novel Mobility Management Scheme for Time Sensitive Communications in 5G-TSN

  • Kim, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.105-113
    • /
    • 2022
  • In this paper, we present and analyze 5G system and IEEE time-sensitive networking(TSN) and propose a novel mobility management scheme for time sensitive communications in 5G-TSN to support ultra-low latency networks. Time-sensitive networking(TSN) has a promising future in the Industrial Automation and Industrial Internet of Things(IIoT), as a key technology that is able to provide low-latency, high-reliable and deterministic communications over the Ethernet. When a TSN capable UE moves the TSN service coverage from the non-TSN service coverage, the UE cannot get the TSN service promptly because the related mobility management is not performed appropriately. For the mobility situation with the TSN service coverage, the proposed scheme reports TSN capability to the network and triggers the initial registration in order to be provided the TSN service immediately and ultra-low latency communications compared to existing schemes in 5G mobile networks.

Path Planning with Obstacle Avoidance Based on Double Deep Q Networks (이중 심층 Q 네트워크 기반 장애물 회피 경로 계획)

  • Yongjiang Zhao;Senfeng Cen;Seung-Je Seong;J.G. Hur;Chang-Gyoon Lim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.2
    • /
    • pp.231-240
    • /
    • 2023
  • It remains a challenge for robots to learn avoiding obstacles automatically in path planning using deep reinforcement learning (DRL). More and more researchers use DRL to train a robot in a simulated environment and verify the possibility of DRL to achieve automatic obstacle avoidance. Due to the influence factors of different environments robots and sensors, it is rare to realize automatic obstacle avoidance of robots in real scenarios. In order to learn automatic path planning by avoiding obstacles in the actual scene we designed a simple Testbed with the wall and the obstacle and had a camera on the robot. The robot's goal is to get from the start point to the end point without hitting the wall as soon as possible. For the robot to learn to avoid the wall and obstacle we propose to use the double deep Q networks (DDQN) to verify the possibility of DRL in automatic obstacle avoidance. In the experiment the robot used is Jetbot, and it can be applied to some robot task scenarios that require obstacle avoidance in automated path planning.

A Study on MEC Network Application Functions for Autonomous Driving (자율주행을 위한 MEC 적용 기능의 연구)

  • Kang-Hyun Nam
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.427-432
    • /
    • 2023
  • In this study, MEC (: Multi-access Edge Computing) proposes a cloud service network configuration for various tests of autonomous vehicles to which V2X (: Vehicle to Everything) is applied in Wave, LTE, and 5G networks and MEC App (: Application) applied V2X service function test verification of two domains (operator (KT, SKT, LG U+), network type (Wave, LTE (including 3G), 5G)) in a specific region. In 4G networks of domestic operators (SKT, KT, LG U+ and Wave), MEC summarized the improvement effects through V2X function blocks and traffic offloading for the purpose of bringing independent network functions. And with a high level of QoS value in the V2X VNF of the 5G network, the traffic steering function scenario was demonstrated on the destination-specific traffic path.

Social Capital and Cross-Cultural Effect of Korean Wave (Hallyu): Genre-specific Hallyu, Social Trust, and Network Heterogeneity in Europe (한류의 사회자본 효과와 문화간 커뮤니케이션 영향: 유럽 사회 한류 문화소비와 사회 연계망의 관계를 중심으로)

  • Na, Eunkyung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.367-375
    • /
    • 2022
  • Given the growing changes in media environment and cultural consumption, globally popular contents of Korean Wave(Hallyu) has also been transformed in its forms and genres. Moreover, extant research on Hallyu has focused on any single respective genre, mostly on East-Asian countries, or studied from Korea-centered perspective. This study examined the social capital effect of Korean Wave in users' own counties, especially in non-English European societies. Survey analysis results reveal that both narrative and non-narrative contents in Hallyu had negative impact on social trust and trust toward people of their own country, whereas positive effect on trust toward Koreans. In contrast, K-pop Hallyu showed positive effect on all types of social trust toward their own country and Koreans, as well as on social participation and bridging/bonding social networks.

Research on the Implementation of 5G SA Test Network Test Bed Function Based on Service-Based Architecture (SBA 기반 5G SA 시험망 시스템 기능 구현에 관한 연구)

  • Park, Jea-Seok;Yoon, Mahn-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.529-531
    • /
    • 2022
  • The 5th generation mobile communication (5G) is being commercialized by major domestic and foreign mobile telecommunication businesses and is spreading to general customers mainly on smart devices such as smartphones, wearables, and IoT. If 4G networks and 5G access equipment were utilized by introducing NSA(None-Stand Alone) technology when 5G was first introduced, recently, 5G convergence services are being realized by gradually expanding evolution to 5G standalone networks through SA (Stand Alone) technology. The purpose of this study is to study a design plan for implementing necessary service-oriented functions from the perspective of communication network users on the configuration of 5G SA equipment based on SBA(Service-based Architecture) mentioned in the 3GPP technical specification document. Through this research, it is expected that companies that need to enter the 5G market can easily access the 5G SA network to develop and supplement specialized 5G convergence services to improve product performance and quality.

  • PDF

Empirical Study on Correlation between Performance and PSI According to Adversarial Attacks for Convolutional Neural Networks (컨벌루션 신경망 모델의 적대적 공격에 따른 성능과 개체군 희소 지표의 상관성에 관한 경험적 연구)

  • Youngseok Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.2
    • /
    • pp.113-120
    • /
    • 2024
  • The population sparseness index(PSI) is being utilized to describe the functioning of internal layers in artificial neural networks from the perspective of neurons, shedding light on the black-box nature of the network's internal operations. There is research indicating a positive correlation between the PSI and performance in each layer of convolutional neural network models for image classification. In this study, we observed the internal operations of a convolutional neural network when adversarial examples were applied. The results of the experiments revealed a similar pattern of positive correlation for adversarial examples, which were modified to maintain 5% accuracy compared to applying benign data. Thus, while there may be differences in each adversarial attack, the observed PSI for adversarial examples demonstrated consistent positive correlations with benign data across layers.

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

  • Jiping Li;Yuanyuan Zhang;Lixiang Shen;Jing Cao;Wenwu Xie;Yi Zheng;Shouyin Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.801-825
    • /
    • 2024
  • For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.