• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.036 seconds

Anomaly-Based Network Intrusion Detection: An Approach Using Ensemble-Based Machine Learning Algorithm

  • Kashif Gul Chachar;Syed Nadeem Ahsan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.107-118
    • /
    • 2024
  • With the seamless growth of the technology, network usage requirements are expanding day by day. The majority of electronic devices are capable of communication, which strongly requires a secure and reliable network. Network-based intrusion detection systems (NIDS) is a new method for preventing and alerting computers and networks from attacks. Machine Learning is an emerging field that provides a variety of ways to implement effective network intrusion detection systems (NIDS). Bagging and Boosting are two ensemble ML techniques, renowned for better performance in the learning and classification process. In this paper, the study provides a detailed literature review of the past work done and proposed a novel ensemble approach to develop a NIDS system based on the voting method using bagging and boosting ensemble techniques. The test results demonstrate that the ensemble of bagging and boosting through voting exhibits the highest classification accuracy of 99.98% and a minimum false positive rate (FPR) on both datasets. Although the model building time is average which can be a tradeoff by processor speed.

Game Theory-Based Scheme for Optimizing Energy and Latency in LEO Satellite-Multi-access Edge Computing

  • Ducsun Lim;Dongkyun Lim
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.7-15
    • /
    • 2024
  • 6G network technology represents the next generation of communications, supporting high-speed connectivity, ultra-low latency, and integration with cutting-edge technologies, such as the Internet of Things (IoT), virtual reality, and autonomous vehicles. These advancements promise to drive transformative changes in digital society. However, as technology progresses, the demand for efficient data transmission and energy management between smart devices and network equipment also intensifies. A significant challenge within 6G networks is the optimization of interactions between satellites and smart devices. This study addresses this issue by introducing a new game theory-based technique aimed at minimizing system-wide energy consumption and latency. The proposed technique reduces the processing load on smart devices and optimizes the offloading decision ratio to effectively utilize the resources of Low-Earth Orbit (LEO) satellites. Simulation results demonstrate that the proposed technique achieves a 30% reduction in energy consumption and a 40% improvement in latency compared to existing methods, thereby significantly enhancing performance.

Evaluating Chest Abnormalities Detection: YOLOv7 and Detection Transformer with CycleGAN Data Augmentation

  • Yoshua Kaleb Purwanto;Suk-Ho Lee;Dae-Ki Kang
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.195-204
    • /
    • 2024
  • In this paper, we investigate the comparative performance of two leading object detection architectures, YOLOv7 and Detection Transformer (DETR), across varying levels of data augmentation using CycleGAN. Our experiments focus on chest scan images within the context of biomedical informatics, specifically targeting the detection of abnormalities. The study reveals that YOLOv7 consistently outperforms DETR across all levels of augmented data, maintaining better performance even with 75% augmented data. Additionally, YOLOv7 demonstrates significantly faster convergence, requiring approximately 30 epochs compared to DETR's 300 epochs. These findings underscore the superiority of YOLOv7 for object detection tasks, especially in scenarios with limited data and when rapid convergence is essential. Our results provide valuable insights for researchers and practitioners in the field of computer vision, highlighting the effectiveness of YOLOv7 and the importance of data augmentation in improving model performance and efficiency.

Optimal Terminal Interconnections Using Minimum Cost Spanning Tree of Randomly Divided Planes

  • Minkwon Kim;Yeonsoo Kim;Hanna Kim;Byungyeon Hwang
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.3
    • /
    • pp.215-220
    • /
    • 2024
  • This paper presents an efficient method for expanding interconnections in scenarios involving the reconstruction of interconnections across arbitrarily divided planes. Conventionally, such situations necessitate rebuilding interconnections based on all targets, ensuring minimal cost but incurring substantial time expenditure. In this paper, we present a tinkered tree algorithm designed to efficiently expand interconnections within a Euclidean plane divided into m randomly generated regions. The primary objective of this algorithm is to construct an optimal tree by utilizing the minimum spanning tree (MST) of each region, resulting in swift interconnection expansion. Interconnection construction is applied in various design fields. Notably, in the context of ad hoc networks, which lack a fixed-wired infrastructure and communicate solely with mobile hosts, the heuristic proposed in this paper is anticipated to significantly reduce costs while establishing rapid interconnections in scenarios involving expanded connection targets.

Quantifying Optical Link Loss of Fiber-to-the-Home Infrastructure

  • Karan Bahadur Bhandari;Bhanu Shrestha;Surendra Shrestha
    • International journal of advanced smart convergence
    • /
    • v.13 no.3
    • /
    • pp.48-58
    • /
    • 2024
  • Fiber to the Home (FTTH) technology is among the most advanced broadband services, delivering voice, data, and television through a single optical fiber directly to customer premises, ensuring high-speed and reliable connectivity. The study conducted on Nepal Telecom's FTTH networks involved direct measurements from the optical line terminal to the fiber access point and optical network unit, providing detailed insights into network performance. Using the OptiSystem software, the analysis revealed a link loss of 24.99 dB, a Q-factor of 12.98, and a minimum Bit Error Rate (BER) of 7.31E-39, all within standard limits, which underscores the robustness of the network. The study also identified that the highest contributors to signal loss were connector loss, fiber attenuation, and fusion splices, emphasizing the importance of minimizing these factors to maintain optimal network performance. Overall, these findings highlight the critical aspects of FTTH network design and maintenance, ensuring that service providers can deliver high-quality broadband services to customers.

Implementation of Absolute Delay Differentiation Scheme in Next-Generation Networks (차세대 네트워크에서의 절대적 지연 차별화 기능 구현)

  • Paik, Jung-Hoon;Kim, Dae-Ub;Joo, Bheom-Soon
    • 전자공학회논문지 IE
    • /
    • v.45 no.1
    • /
    • pp.15-23
    • /
    • 2008
  • In this paper, an algorithm, that provisions absolute differentiation of packet delays is proposed, simulated, and implemented with VHDL on XPC 860 CPU based test board with an objective for enhancing quality of service (QoS) in future packet networks. It features a scheme that compensates the deviation for prediction on the traffic to be arrived continuously. It predicts the traffic to be arrived at the beginning of a time slot and measures the actual arrived traffic at the end of the time slot and derives the difference between them. The deviation is utilized to the delay control operation for the next time slot to offset it. As it compensates the prediction error continuously, it shows superior adaptability to the bursty traffic as well as the exponential traffic. It is demonstrated through both simulation and the real traffic test on the board that the algorithm meets the quantitative delay bounds and shows superiority to the traffic fluctuation in comparison with the conventional non-adaptive mechanism.

A Study on Detecting and Monitoring of Weld Root Gap using Neural Networks (신경회로망을 이용한 용접 Root Gap 검출과 모니터링에 관한연구)

  • Kang Sung-In;Kim Gwan-Hyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1326-1331
    • /
    • 2006
  • Weld root gap is a important fact of a falling-off weld quality in various kind of weld defect. The welding quality can be controlled by monitoring important parameters, such as, the Arc voltage, welding current and welding speed during the welding process. Welding systems use either a vision sensor or an Arc sensor, both of which are unable to control these parameters directly. Therefore, it is difficult to obtain necessary bead geometry without automatically controlling the welding parameters through the sensors. In this paper we propose a novel approach using neural networks for detecting and monitoring of weld root gap and bead shape. Through experiments we demonstrate that the proposed system can be used for real welding processes. The results demonstrate that the system can efficiently estimate the weld bead shape and detect the welding defects.

A Study on the Network Throughput of Bluetooth Packet Communication System for Short Distance Wireless Connectivity (근거리 무선 연결을 위한 블루투스 패킷 통신 시스템의 네트워크 처리율에 관한 연구)

  • Ye, Hwi-Jin;Kim, Moon;Kim, Seong-Chul;Roh, Jae-Sung
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.281-287
    • /
    • 2007
  • The Bluetooth technology represents an attractive approach to enable short distance wireless connectivity. The Bluetooth standard operates at the 2.4 GHz ISM band and offers the advantage of establishing ad hoc networks, called piconet and scatternet. The spread of Bluetooth implementation in consumer products opens up a new short range wireless networking applications. Bluetooth MAC avoids packet collision within a piconet by simple time multiplexing. But lack of synchronization among independent neighboring piconets introduces packet overlapping within a time slot. In this paper, the wireless network throughput of Bluetooth packet transmission system applying the pure-ALOHA and slotted-ALOHA MAC is investigated according to the impact of channel environment. From the obtained results, the throughput of the Bluetooth MAC protocol shown to offer good performance in wireless channel, and the results are useful for the implementation of Bluetooth networks.

  • PDF

A Study on Encouragement Strategy of Electronic Commerce through Clothing Industry (의류산업을 통한 전자상거래 활성화 전략 방안 연구)

  • Lee, Hyun-Chang;Jin, Chan-Young;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2359-2364
    • /
    • 2011
  • E-commerce is a kind of trade type between buyers and sellers rely on computer networks. Carried out according to certain standards of various business activities. e-commerce is based on modern information technology and network technology, financial electronic collection, management, information technology, business and trade information networks into one, aimed at logistics, capital flow and information flow of harmony and unity of the new trade, trade activities of the entire process, electronic, networking and digital. E-commerce has brought to the traditional ways of trading a huge impact, led to changes in economic structures, is a business revolution in the way and is recognized internationally as the 21st century is an important driver of economic development compared to current traditional companies. In this material, we first consider the current problem, analyze particular characteristics of clothing shopping mall to increase the purchasing power of customer. For these reasons, we describe the process for building the clothing site.

A Study on Node Authentication Mechanism using Sensor Node's Energy Value in WSN (WSN 환경에서 센서 노드의 에너지 값을 이용한 노드 인증 메커니즘에 관한 연구)

  • Kim, Bo-Seung;Lim, Hui-Bin;Choi, Jong-Seok;Shin, Yong-Tae
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.2
    • /
    • pp.86-95
    • /
    • 2011
  • Sensor nodes in wireless sensor networks are vulnerable to security than wired network due to using limited hardware performance and wireless communications that network topology changes frequently. Among techniques to enhance the security, the node authentication mechanism is used to defend against data forgery attacks using the ID of the node or to interfere with the routing of the network routing. In this paper, we proposed the AM-E mechanism that makes authentication key by using the energy value of node requesting authentication and performs the communication procedures for data transfer between different nodes. Because the energy value of node is changed depending on time, every time the authentication request is, an authentication key is changed. These features enhance the security of sensor networks and will help to configure the more secure WSN.