• Title/Summary/Keyword: network system

Search Result 21,905, Processing Time 0.048 seconds

Study about the home network system implementation that used an ubiquitous sensor network (유비쿼터스 센서 네트워크을 이용한 홈네트워크 시스템 구현에 관한 연구)

  • Nam, Sang-Yep;Park, Chun-Myoung
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.479-480
    • /
    • 2007
  • It is study about implementation of the home network system that used an ubiquitous sensor network and an embedded system in this paper. PXA270 and CC2420 were used, and the home server of a wireless sensor home network system composed it. A wireless control system is composed of a gas valve, a DC motor, a lamp and a door rock. A wireless detection system is composed of a gas detection sensor, a movement detection sensor, an extension detection sensor The wireless detection system that was an environment sensing system was composed of temperature, humidity, mic, illuminance, a speed-up, infrared rays temperature sensing module, and modular, other RFID established an USB camera, and an ubiquitous home network was composed.

  • PDF

Examination of Required Functions in the PBNM Scheme for Multiple Domains as Cyber Physical System that Utilizes Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.31-38
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, required functions in the PBNM Scheme for multiple domains as cyber physical system that utilizes data science and AI is examined.

A Novel Method for Survivability Test Based on End Nodes in Large Scale Network

  • Ming, Liang;Zhao, Gang;Wang, Dongxia;Huang, Minhuan;Li, Xiang;Miao, Qing;Xu, Fei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.620-636
    • /
    • 2015
  • Survivability is a necessary property of network system in disturbed environment. Recovery ability is a key actor of survivability. This paper concludes network survivability into a novel composite metric, i.e. Network Recovery Degree (NRD). In order to measure this metric in quantity, a concept of Source-Destination Pair (SD Pair), is created to abstract end-to-end activity based on end nodes in network, and the quality of SD Pair is also used to describe network performance, such as connectivity, quality of service, link degree, and so on. After that, a Survivability Test method in large scale Network based on SD pairs, called STNSD, is provided. How to select SD Pairs effectively in large scale network is also provided. We set up simulation environment to validate the test method in a severe destroy scenario and evaluate the method scalability in different large scale network scenarios. Experiment and analysis shows that the metric NRD correctly reflects the effort of different survivability strategy, and the proposed test method STNSD has good scalability and can be used to test and evaluate quantitative survivability in large scale network.

Control Simulation of Left Ventricular Assist Device using Artificial Neural Network (인공신경망을 이용한 좌심실보조장치의 제어 시뮬레이션)

  • Kim, Sang-Hyeon;Jeong, Seong-Taek;Kim, Hun-Mo
    • Journal of Biomedical Engineering Research
    • /
    • v.19 no.1
    • /
    • pp.39-46
    • /
    • 1998
  • In this paper, we present a neural network identification and a control of highly complicated nonlinear left ventricular assist device(LVAD) system with a pneumatically driven mock circulation system. Generally, the LVAD system needs to compensate for nonlinearities. It is necessary to apply high performance control techniques. Fortunately, the neural network can be applied to control of a nonlinear dynamic system by learning capability. In this study, we identify the LVAD system with neural network identification(NNI). Once the NNI has learned the dynamic model of the LVAD system, the other network, called neural network controller(NNC), is designed for a control of the LVAD system. The ability and effectiveness of identifying and controlling the LVAD system using the proposed algorithm will be demonstrated by computer simulation.

  • PDF

A Design and Implementation of Web-based Traffic Monitoring System for Management of Small-scale PC-room (소규모 실습실 관리를 위한 웹기반 트래픽 모니터링 시스템의 설계 및 구현)

  • Lee Kang-ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.127-131
    • /
    • 2004
  • In this paper, I propose the web-based network traffic monitoring system to monitor computers running MS Windows in the small-scale PC-room. The system can support network and system operation, management, expansion, and design using network analysis and diagnosis to a network administrator. The whole system consists of two parts: analysis server for collection and analysis of the network information. and supports real-time monitoring of network traffic, and the web-based interface system. a client system shows user a graphical data that analyzed a returned result from the server. This system implements web-based technology using java and contributes to enhance the effectiveness of network administrator's management activities in PC-room by controlling and monitoring.

  • PDF

Research on data analysis method of KTX TORNAD network system (고속열차(KTX)의 TORNAD 네트워크시스템 데이터 분석방법 연구)

  • Kim, Hyeong-In;Jung, Sung-Youn;Kim, Hyun-Shik;Jung, Do-Won;Kim, Han-Dou
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1032-1038
    • /
    • 2008
  • KTX train system is composed of TORNAD* network for transmitting information of train's internal equipments and OBCS which proceed information within train. OBCS of one trainset consisted of 28 equipments takes intelligent and dynamic composition according to equipment handling, train command and control flow. Each OBCS which is installed within trainset handle and supervise mutually action information about equipments, transmit it to driver to transmit information about train operation and preventive management. This mutual supervision and information transmission use KTX TORNAD* network system. TORNAD* network system is the one which is uniquely developped by GEC ALSTHOM, the KTX trainset manafacturing provider and this field is excluded from technical know-how transfer item. Through the research on analysis method of KTX TORNAD* system data structure which is operating on Seoul-Pusan Line, I hope that this thesis can contribute to train network system's standardization after applying it to improvement of train network system maintenance, enhancing quality of train service and applying it to future Korean rolling stock network system development.

  • PDF

A Mechanism for Configurable Network Service Chaining and Its Implementation

  • Xiong, Gang;Hu, Yuxiang;Lan, Julong;Cheng, Guozhen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3701-3727
    • /
    • 2016
  • Recently Service Function Chaining (SFC) is promising to innovate the network service mode in modern networks. However, a feasible implementation of SFC is still difficult due to the need to achieve functional equivalence with traditional modes without sacrificing performance or increasing network complexity. In this paper, we present a configurable network service chaining (CNSC) mechanism to provide services for network traffics in a flexible and optimal way. Firstly, we formulate the problem of network service chaining and design an effective service chain construction framework based on integrating software-defined networking (SDN) with network functions virtualization (NFV). Then, we model the service path computation problem as an integer liner optimization problem and propose an algorithm named SPCM to cooperatively combine service function instances with a network utility maximum policy. In the procedure of SPCM, we achieve the service node mapping by defining a service capacity matrix for substrate nodes, and work out the optimal link mapping policies with segment routing. Finally, the simulation results indicate that the average request acceptance ratio and resources utilization ratio can reach above 85% and 75% by our SPCM algorithm, respectively. Upon the prototype system, it is demonstrated that CNSC outperforms other approaches and can provide flexible and scalable network services.

Robust Extraction of Lean Tissue Contour From Beef Cut Surface Image

  • Heon Hwang;Lee, Y.K.;Y.r. Chen
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 1996.06c
    • /
    • pp.780-791
    • /
    • 1996
  • A hybrid image processing system which automatically distinguished lean tissues in the image of a complex beef cut surface and generated the lean tissue contour has been developed. Because of the in homegeneous distribution and fuzzy pattern of fat and lean tissue on the beef cut, conventional image segmentation and contour generation algorithm suffer from a heavy computing requirement, algorithm complexity and poor robustness. The proposed system utilizes an artificial neural network enhance the robustness of processing. The system is composed of pre-network , network and post-network processing stages. At the pre-network stage, gray level images of beef cuts were segmented and resized to be adequate to the network input. Features such as fat and bone were enhanced and the enhanced input image was converted tot he grid pattern image, whose grid was formed as 4 X4 pixel size. at the network stage, the normalized gray value of each grid image was taken as the network input. Th pre-trained network generated the grid image output of the isolated lean tissue. A training scheme of the network and the separating performance were presented and analyzed. The developed hybrid system showed the feasibility of the human like robust object segmentation and contour generation for the complex , fuzzy and irregular image.

  • PDF

CRF Based Intrusion Detection System using Genetic Search Feature Selection for NSSA

  • Azhagiri M;Rajesh A;Rajesh P;Gowtham Sethupathi M
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.131-140
    • /
    • 2023
  • Network security situational awareness systems helps in better managing the security concerns of a network, by monitoring for any anomalies in the network connections and recommending remedial actions upon detecting an attack. An Intrusion Detection System helps in identifying the security concerns of a network, by monitoring for any anomalies in the network connections. We have proposed a CRF based IDS system using genetic search feature selection algorithm for network security situational awareness to detect any anomalies in the network. The conditional random fields being discriminative models are capable of directly modeling the conditional probabilities rather than joint probabilities there by achieving better classification accuracy. The genetic search feature selection algorithm is capable of identifying the optimal subset among the features based on the best population of features associated with the target class. The proposed system, when trained and tested on the bench mark NSL-KDD dataset exhibited higher accuracy in identifying an attack and also classifying the attack category.

Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter

  • Osman Goni;Md. Abu Shameem
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.141-146
    • /
    • 2024
  • A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.