• Title/Summary/Keyword: layer approach

Search Result 1,221, Processing Time 0.033 seconds

Present and Future Technologies of Satellite Communication Network Security (위성 통신망 보안 기술 당면 과제 및 향후 발전 방향 분석)

  • Choi, Jihwan;Joo, Changhee
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.3
    • /
    • pp.50-53
    • /
    • 2017
  • Satellite communications are vulnerable to malicious eavesdroppers and interceptors due to wide coverage and broadcasting applications. However, technologies for securing satellite networks have yet to be more articulated beyond high-layer packet encryption. As attempts for jamming and spoofing attacks spread out, it is extremely critical to invest on the development of physical layer security solutions. In this paper, we review current technologies for satellite communication network security both in high and physical layers. We also present recent research results on physical layer security in the fields of information theory and wireless networks. We suggest a future direction for satellite communication security, including a cross-layer approach.

Robust Multi-Layer Hierarchical Model for Digit Character Recognition

  • Yang, Jie;Sun, Yadong;Zhang, Liangjun;Zhang, Qingnian
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.2
    • /
    • pp.699-707
    • /
    • 2015
  • Although digit character recognition has got a significant improvement in recent years, it is still challenging to achieve satisfied result if the data contains an amount of distracting factors. This paper proposes a novel digit character recognition approach using a multi-layer hierarchical model, Hybrid Restricted Boltzmann Machines (HRBMs), which allows the learning architecture to be robust to background distracting factors. The insight behind the proposed model is that useful high-level features appear more frequently than distracting factors during learning, thus the high-level features can be decompose into hybrid hierarchical structures by using only small label information. In order to extract robust and compact features, a stochastic 0-1 layer is employed, which enables the model's hidden nodes to independently capture the useful character features during training. Experiments on the variations of Mixed National Institute of Standards and Technology (MNIST) dataset show that improvements of the multi-layer hierarchical model can be achieved by the proposed method. Finally, the paper shows the proposed technique which is used in a real-world application, where it is able to identify digit characters under various complex background images.

Cross-layered Video Information Sharing Method and Selective Retransmission Technique for The Efficient Video Streaming Services (효율적인 영상 스트리밍 서비스를 위한 Cross-layer 영상 정보 공유 방법 및 선택적 재전송 기법)

  • Chung, Taewook;Chung, Chulho;Kim, Jaeseok
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.7
    • /
    • pp.853-863
    • /
    • 2015
  • In this paper, we proposed cross-layered approach of video codec and communication system for the efficient video streaming service. Conventional video streaming is served by divided system which consist of video codec layer and communication layer. Its disintegration causes the limitation of the performance of video streaming service. With the cross-layered design, each layer could share the information and the service is able to enhance the performance. And we proposed the selective retransmission method in communication system based on the cross-layered system that reflect the information of encoded video data. Selective retransmission method which consider the characteristics of video data improves the performance of video streaming services. We verified the proposed method with raw format full HD test sequence with H.264/AVC codec and MATLAB simulation. The simulation results show that the proposed method improves about 10% PSNR performance.

A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks

  • Gao, Ning;Jing, Xiaojun;Sun, Songlin;Mu, Junsheng;Lu, Xiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3414-3434
    • /
    • 2016
  • Classical key generation is complicated to update and key distribution generally requires fixed infrastructures. In order to eliminate these restrictions researchers have focused much attention on physical-layer (PHY-layer) based key generation methods. In this paper, we present a PHY-layer fingerprints based fuzzy key generation scheme, which works to prevent primary user emulation (PUE) attacks and spectrum sensing data falsification (SSDF) attacks, with multi-node collaborative defense strategies. We also propose two algorithms, the EA algorithm and the TA algorithm, to defend against eavesdropping attacks and tampering attacks in mobile cognitive radio networks (CRNs). We give security analyses of these algorithms in both the spatial and temporal domains, and prove the upper bound of the entropy loss in theory. We present a simulation result based on a MIMO-OFDM communication system which shows that the channel response characteristics received by legitimates tend to be consistent and phase characteristics are much more robust for key generation in mobile CRNs. In addition, NIST statistical tests show that the generated key in our proposed approach is secure and reliable.

Cross-Layer Protocol Design for Effective Video Transmission in Wireless Ad hoc Networks (무선 에드 혹 네트워크에서 비디오 전송에 효율적인 Cross-Layer 프로토콜 설계)

  • Seo Jee-Young;Cho Eun-Hee;Yoo Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2A
    • /
    • pp.144-153
    • /
    • 2006
  • In this paper, we propose an efficient video data transmission protocol using the cross-layer approach in ad hoc networks. Due to node movement, the MANET is frequently changing path and each path has different transmission rate so that it has low performance when transmitters select a constant transmission late at the encoding time. Because MANET is running limited energy, efficient energy management is important because it increases network life time and network throughput. Therefore we need an effective video transmission method that considers physical layer channelstatistics, node's energy status, and network topology changes at the same time unlike the OSI recommendation protocol in that each layer isindependent and hard to transmit adaptively video data according to the network conditions. Therefore, in this paper we propose a cross-layer effective video transmission protocol and mechanism that can select an optimal path using multilayer information such as node's residual energy, channel condition and hop counts and can determine the adequate coding rate adaptively.

A Cross-Layer Transmission Architecture to Support Power Saving High-Speed Multimedia Services in Mobile Ad-hoc Wireless Sensor Networks (모바일 Ad-hoc 무선 센서 네트워크에서 전력 절약 고속 멀티미디어 서비스를 지원하기 위한 Cross-Layer 전송구조)

  • An, Beongku;Choi, Ginkyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.15-24
    • /
    • 2008
  • In this paper, we propose a Cross-Layer Transmission Architecture (CLTA) to support power saving high-speed multimedia services in mobile ad-hoc wireless sensor networks(MAWSN). The main goals of this paper are in showing and proposing how the routing routes are decided on route stability based on mobility of mobile nodes to increase the operational lifetime of routes as well as how the transmit power can be saved in mobile ad-hoc wireless sensor networks. To obtain these goals, we propose a cross-layer architecture strategy which combines network layer technology with physical layer technology to get synergy effects in the view of transmission power saving. We consider a realistic approach, in the points of view of the MAWSN, based on mobile sensor nodes as well as fixed sensor nodes in sensor fields while the conventional research for sensor networks focus on mainly fixed sensor nodes. The performance evaluation of the proposed CLTA is performed via simulation and analysis.

  • PDF

A Boundary-layer Stress Analysis of Laminated Composite Beams via a Computational Asymptotic Method and Papkovich-Fadle Eigenvector (전산점근해석기법과 고유벡터를 이용한 복합재료 보의 경계층 응력 해석)

  • Sin-Ho Kim;Jun-Sik Kim
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.37 no.1
    • /
    • pp.41-47
    • /
    • 2024
  • This paper utilizes computational asymptotic analysis to compute the boundary layer solution for composite beams and validates the findings through a comparison with ANSYS results. The boundary layer solution, presented as a sum of the interior solution and pure boundary layer effects, necessitates a mathematically rigorous formalization for both interior and boundary layer aspects. Computational asymptotic analysis emerges as a robust technique for addressing such problems. However, the challenge lies in connecting the boundary layer and interior solutions. In this study, we systematically separate the principles of virtual work and the principles of Saint-Venant to tackle internal and boundary layer issues. The boundary layer solution is articulated by calculating the Papkovich-Fadle eigenfunctions, representing them as linear combinations of real and imaginary vectors. To address warping functions in the interior solutions, we employed a least squares method. The computed solutions exhibit excellent agreement with 2D finite element analysis results, both quantitatively and qualitatively. This validates the effectiveness and accuracy of the proposed approach in capturing the behavior of composite beams.

STRATEGIC RESEARCH AT ORNL FOR THE DEVELOPMENT OF ADVANCED COATED CONDUCTORS: PART - I

  • Christen, D.K.;Cantoni, C.;Feenstra, R.;Aytug, T.;Heatherly, L.;Kowalewski, M.M.;List, F.A.;Goyal, A.;Kroeger, D.M.
    • Proceedings of the Korea Institute of Applied Superconductivity and Cryogenics Conference
    • /
    • 2002.02a
    • /
    • pp.339-339
    • /
    • 2002
  • In the RABiTS approach to coated conductor development, successful (both economic and technological) depends on the refinement and optimization of each of three important components: the metal tape substrate, the buffer layer(s), and the HTS layer. Here we will report on the ORNL approach and progress in each of these areas. - Most applications will require metal tapes with low magnetic hysteresis, mechanical strength, and excellent crystalline texture. Some of these requirements are competing. We report on progress in obtaining a good combination of these characteristics on metal alloys of Ni-Cr and Ni-W. - The deposition of appropriate buffer layers is a crucial step. Recently, base research has shown that the presence of a stable sulfur superstructure present on the metal surface is needed for the nucleation and epitaxial growth of vapor-deposited seed buffer layers such as YSZ, CeO$_2$ and SrTiO$_3$. We report on the details and control of this superstructure for nickel tapes, as well as recent results for Cu and Ni-13%Cr. - Processes for deposition of the HTS coating must economically provide large values of the figure-of-merit for conductors, current x length. At ORNL, we have devoted efforts to a precursor/post-annealing approach to YBCO coatings, for which the deposition and reaction steps are separate. We describe motivation for and progress toward developing this approach. - Finally, we address some issues for the implementation of coated conductors in real applications, including the need for texture control and electrical stabilization of the HTS coating.

  • PDF

An adaptive MAC protocol exploiting multiple paths in wireless mesh networks

  • Lee, Hyung-Keun;Yi, Joon-Hwan
    • Journal of IKEEE
    • /
    • v.13 no.1
    • /
    • pp.94-100
    • /
    • 2009
  • In recent years, the wireless mesh network (WMN) has been an emerging technology to provide Internet access to fixed and mobile wireless devices. The main goal of this paper is the design and simulation of a new MAC protocol based on the multi-path routing information for wireless mesh networks. The information about multiple paths discovered in the network layer is exploited by the MAC layer in order to forward a frame over the best hop out of multiple hop choices. The performance of our approach is compared with conventional 802.11 MAC through the simulation. The results show that our scheme exhibits a significantly better performance rather than conventional 802.11 MAC protocol in terms of packet overhead, end-to-end throughput and delay.

  • PDF

Electrochemical Effectiveness Factors for Butler-Volmer Reaction Kinetics in Active Electrode Layers of Solid Oxide Fuel Cells

  • Nam, Jin Hyun
    • Journal of Electrochemical Science and Technology
    • /
    • v.8 no.4
    • /
    • pp.344-355
    • /
    • 2017
  • In this study, a numerical approach is adopted to investigate the effectiveness factors for distributed electrochemical reactions in thin active reaction layers of solid oxide fuel cells (SOFCs), taking into account the Butler-Volmer reaction kinetics. The mathematical equations for the electrochemical reaction and charge conduction process were formulated by assuming that the active reaction layer has a small thickness, homogeneous microstructure, and high effective electronic conductivity. The effectiveness factor is defined as the ratio of the actual reaction rate (or equivalently, current generation rate) in the active reaction layer to the nominal reaction rate. From extensive numerical calculations, the effectiveness factors were obtained for various charge transfer coefficients of 0.3-0.8. These effectiveness data were then fitted to simple correlation equations, and the resulting correlation coefficients are presented along with estimated magnitude of error.