• Title/Summary/Keyword: network separation

Search Result 309, Processing Time 0.028 seconds

Molecular Computing Simulation of Cognitive Anagram Solving (애너그램 문제 인지적 해결과정의 분자컴퓨팅 시뮬레이션)

  • Chun, Hyo-Sun;Lee, Ji-Hoon;Ryu, Je-Hwan;Baek, Christina;Zhang, Byoung-Tak
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.12
    • /
    • pp.700-705
    • /
    • 2014
  • An anagram is a form of word play to find a new word from a set of given alphabet letters. Good human anagram solvers use the strategy of bigrams. They explore a constraint satisfaction network in parallel and answers consequently pop out quickly. In this paper, we propose a molecular computational algorithm using the same process as this. We encoded letters into DNA sequences and made bigrams and then words by connecting the letter sequences. From letters and bigrams, we performed DNA hybridization, ligation, gel electrophoresis and finally, extraction and separation to extract bigrams. From the matched bigrams and words, we performed the four molecular operations again to distinguish between right and wrong results. Experimental results show that our molecular computer can identify cor rect answers and incorrect answers. Our work shows a new possibility for modeling the cognitive and parallel thinking process of a human.

A study on the frequency sharing among broadcasting satellite networks (방송위성망간 주파수 공유에 관한 연구)

  • 박주홍;성향숙
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2A
    • /
    • pp.174-180
    • /
    • 2004
  • The World Radiocommunication Conference in year of 2000 adopted new Plans as well as Lists for BSS and its feeder-link in the Regions 1 and 3, based on the new technical criteria such as small size of antenna and low satellite power. Since the new Plans and Lists were based on new technical criteria, ITU was requested to review the relevant regulatory procedures and sharing criteria of broadcasting satellite networks contained in Appendices 30 and 30A of Radio Regulations. Korean BSS network at 116$^{\circ}$E was chosen for the study and ITU S/W (MSPACEG) was used. We analyzed the interference effects from adjacent BSS networks to Korean BSS network using parameters of an antenna diameter and polarization of receiving earth station. The analysis shows that it is difficult to co-operate BSS networks both at 116$^{\circ}$E and 113$^{\circ}$E, however, it is possible to use small antenna (i.e. 45cm) in frequency sharing among BSS networks with 6$^{\circ}$ orbital separation.

End-to-End Performance of Packet Aggregation Transmission on MANET under DDoS Attacks (DDoS 공격이 있는 MANET에서 패킷취합전송의 종단간 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.6
    • /
    • pp.689-694
    • /
    • 2014
  • DDoS attacks on MANET makes disable any node which support network function, cause critical results as a stopping of entire network service or separation to some parts. Packet aggregation, which gather some pieces of short length into a certain length of data, improves transmission performances on MANETs. In this paper, some effects on transmission performance of packet aggregation transmission be caused by DDoS Attacks are measured and analyzed in point of end-to-end level. MANET simulator, based on NS-2, is used for measurement end-to-end performances. MOS, connection rate, delay and packet loss rate is used as performance parameters. VoIP traffic is used for object service measurement. Finally, it is suggested that number of packet aggregation is more then 4 for keeping the transmission quality over MANETs under DDoS attacks.

A Study of Security Certification and Accreditation for DNP3 linkage section in EMS/SCADA (EMS/SCADA의 DNP3 연계구간 보안성 평가·인증 기술 연구)

  • Kim, Jongwan;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.703-713
    • /
    • 2015
  • The linking system between the control system and the field devices in the existing EMS/SCADA, in order to increase the reliability of the data, and access control through the separation of external network. Currently, There is a tendency that the need for connection to an external network that takes into account the economic aspect, systematic management and efficiency of operations is increasing. Such is evolved linkage section, is to have more security vulnerabilities than in the past, Eventually communication EMS/SCADA linkage section requires special management method. In this paper, taking into account the domestic environment, were presented the security Certification and Accreditation technology that was applied to serial DNP3 and TCP/IP based DNP3 that are mainly used in EMS/SCADA linkage section. Presented to security of Certification and Accreditation technology, divided into Resource Robustness Test and Malicious Packet Test for evaluate the safety. Each of the security requirements and evaluation method in proposed technology, is an attempt to present the differentiation of the existing Certification and Accreditation technology.

Fast Switching of a Polymer-networked Twisted Nematic Liquid Crystal Cell (폴리머 네트워크가 형성된 TN 액정셀의 고속응답 특성)

  • Jin, Hye-Jung;Kim, Ki-Han;Baek, Jong-In;Kim, Jae-Chang;Yoon, Tae-Hoon
    • Korean Journal of Optics and Photonics
    • /
    • v.21 no.2
    • /
    • pp.69-73
    • /
    • 2010
  • We propose a method to enhance the response time of a twisted nematic liquid crystal (TN-LC) cell using an anisotropic polymer. Polymer networks are formed by the phase separation between a LC and a UV-curable polymer. A TN-LC cell is exposed to UV light after the mixture of LC and anisotropic polymer is injected into the TN-LC cell. As a result, turn-off time of a TN-LC cell can be decreased remarkably without any loss of the transmittance. The turn-off time of a TN-LC cell with pure LC was 16 ms, but those of polymer networked TN-LC cells were 12, 11, and 9 ms when the concentration of the polymer was 3, 5, and 10 wt%, respectively. Moreover, by virtue of the polymer network, the backflow effect and the delay time generated during the turn-off process disappeared.

Multiple Texture Objects Extraction with Self-organizing Optimal Gabor-filter (자기조직형 최적 가버필터에 의한 다중 텍스쳐 오브젝트 추출)

  • Lee, Woo-Beom;Kim, Wook-Hyun
    • The KIPS Transactions:PartB
    • /
    • v.10B no.3
    • /
    • pp.311-320
    • /
    • 2003
  • The Optimal filter yielding optimal texture feature separation is a most effective technique for extracting the texture objects from multiple textures images. But, most optimal filter design approaches are restricted to the issue of supervised problems. No full-unsupervised method is based on the recognition of texture objects in image. We propose a novel approach that uses unsupervised learning schemes for efficient texture image analysis, and the band-pass feature of Gabor-filter is used for the optimal filter design. In our approach, the self-organizing neural network for multiple texture image identification is based on block-based clustering. The optimal frequency of Gabor-filter is turned to the optimal frequency of the distinct texture in frequency domain by analyzing the spatial frequency. In order to show the performance of the designed filters, after we have attempted to build a various texture images. The texture objects extraction is achieved by using the designed Gabor-filter. Our experimental results show that the performance of the system is very successful.

An Analysis on the Effects of Inter-Device Interference in the ORC-OQ2PSK Based Wireless Personal Area Networks (ORC-OQ2PSK 변조 기반의 근거리 무선통신 시스템에서 기기 간 상호 간섭의 영향 분석)

  • Jeon, Sang Yeop;Kim, Myoung Jin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.3
    • /
    • pp.3-10
    • /
    • 2016
  • To establish a network environment where multiple wireless personal area networks(WPAN) are simultaneously operating in the same area, we need to consider the effects of inter-device interference. The extent of interference effect from neighboring frequency channel interferer may be different depending on the modulation types that are used for constructing the wireless network. If a modulation scheme with high spectral side lobes is used, the spatial separation between devices plays a major role in determining the amount of interference from neighboring frequency channel interferer. In this paper, we investigate the effect of inter-device interference in the overlapped raised cosine offset quadrature-quadrature phase shift keying (ORC-$OQ^2PSK$) modulation based WPAN. By comparing the results with those of GFSK modulation based WPAN, we verify the feasibility of ORC-$OQ^2PSK$ based WPAN.

A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System (국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구)

  • Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1153-1165
    • /
    • 2019
  • Recently, threats of hacking have been increasing on the national intelligence service network and key infrastructure, including the defense field. The defense information system responds to threats from the outside through the network separation, but if the defense information system is hacked, it has a serious impact on the operations of wartime or peacetime military forces. Today, cyberattacks and threats are rising to unpredictable levels and making it practically impossible to completely block and prevent hacking threats completly. So, in this study proposed a maturity model to assess the level of cyber-resilience, which is the ability to ensure the system's viability and maintain continuity through rapid response and recovery if signs of cyberattacks by the defense information system are expected or occurred. The proposed maturity model is expected to contribute to improving the cyber security level of the defense information system by assessing the level of cyber resilience of the defense information system and identifying and supplementing fields that are lacking.

The Public Choice Analysis of Korean Mobile Telecom Policy (이동통신 정책의 공공 선택 분석)

  • Shin, Jin;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.917-920
    • /
    • 2014
  • In Korea mobile phone subscribers exceeded 1 million people in 1995, and ten million people in 1998. Prevalence of the mobile phone increased dramatically over 110% compared to the population. And all family members including children and students use one or two mobile terminal. Mobile phone is obviously necessary good more than washer, vacuum cleaner, passenger car. Our daily life with mobile communication are conveniently positioned, but communication related costs including the price of the device has become a big burden on the household. But the government does not seem to do the right role at the right time to prevent the failure of the market to further maximize consumer welfare and social welfare through fair competition. This principal-agent problems exist especially in perspective of joint use of the mobile communication network, number portability, separation of phone distribution and phone service and network neutrality among in mobile communication policies since the early 1990s up to now.

  • PDF

Blockchain-based lightweight consensus algorithm (L-PBFT) for building trust networks in IoT environment (IoT 환경에서 신뢰 네트워크 구축을 위한 블록체인 기반의 경량 합의 알고리즘(L-PBFT))

  • Park, Jung-Oh
    • Journal of Industrial Convergence
    • /
    • v.20 no.6
    • /
    • pp.37-45
    • /
    • 2022
  • With the development of the Internet of Things (IoT), related network infrastructures require new technologies to protect against threats such as external hacking. This study proposes an L-PBFT consensus algorithm that can protect IoT networks based on a blockchain consensus algorithm. We designed a blockchain (private) model suitable for small networks, tested processing performance for ultra-small/low-power IoT devices, and verified stability. As a result of performance analysis, L-PBFT proved that at least the number of nodes complies with the operation of the consensus algorithm(minimum 14%, maximum 29%) and establishes a trust network(separation of secure channels) different from existing security protocols. This study is a 4th industry convergence research and will be a foundation technology that will help develop IoT device security products in the future.