• Title/Summary/Keyword: Network Evaluation

Search Result 3,662, Processing Time 0.039 seconds

Impact of Sink Node Location in Sensor Networks: Performance Evaluation (센서 네트워크에서 싱크 노드 위치가 성능에 미치는 영향 분석)

  • Choi, Dongmin;Kim, Seongyeol;Chung, Ilyong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.977-987
    • /
    • 2014
  • Many of the recent performance evaluation of clustering schemes in wireless sensor networks considered one sink node operation and fixed sink node location without mentioning about any network application requirements. However, application environments have variable requirements about their networks. In addition, network performance is sufficiently influenced by different sink node location scenarios in multi-hop based network. We also know that sink location can influence to the sensor network performance evaluation because of changed multipath of sensor nodes and changed overload spots in multipath based wireless sensor network environment. Thus, the performance evaluation results are hard to trust because sensor network is easily changed their network connection through their routing algorithms. Therefore, we suggest that these schemes need to evaluate with different sink node location scenarios to show fair evaluation result. Under the results of that, network performance evaluation results are acknowledged by researchers. In this paper, we measured several clustering scheme's performance variations in accordance with various types of sink node location scenarios. As a result, in the case of the clustering scheme that did not consider various types of sink location scenarios, fair evaluation cannot be expected.

A Network Analysis Approach to the Evaluation of Students' Laboratory Reports (계통도 분석법을 이용한 실험보고서 평가의 효과 분석)

  • Paik, Seoung-Hey;Pak, Sung-Jae
    • Journal of The Korean Association For Science Education
    • /
    • v.12 no.1
    • /
    • pp.93-101
    • /
    • 1992
  • The purposes of this study were; 1) to apply the network analysis to evaluation of students' laboratory reports, 2) to test the applicability of the systematic network analysis. For this purposes, 7th grade 88 students from 22 middle schools in Inchon city of Korea were selected and their laboratory reports were evaluated by a evaluation criterion network developed in this study. The evaluation criterion consisted of 4 categories and 10 subcategories. The results of this study suggested that the network analysis approach was suitable one for the evaluation of students' laboratory reports. This was supported by total score distribution, means/weight, Cronbach's ${\alpha}$ coefficient(0.70), and the subcategories' reliabilities. The resluts of the factor analysis indicated that the evaluation criterion network of this study had two factors.

  • PDF

Analyzing Trends in Early Childhood Evaluation Research Using Keyword Network Analysis (키워드 네트워크 분석을 활용한 영유아교육기관 평가 연구동향 분석)

  • Sung Hee, Hong;Kyeong Hwa, Lee
    • Korean Journal of Childcare and Education
    • /
    • v.20 no.1
    • /
    • pp.91-111
    • /
    • 2024
  • Objective: The purpose of this study is to explore trends in institutional evaluation research in early childhood education through keyword network analysis. This aims to understand trends in academic discourse on institutional evaluation and gain implications for follow-up research and related policy directions. Methods: A total of 6,629 keywords were extracted from 572 dissertations and journal articles published from January 2006 to October 2023 for the purpose of analyzing and visualizing the frequency and centrality of keywords, as well as the structural properties of keyword networks. The analysis and visualization were conducted using the TEXTOM, UCINET6, and NetDraw programs. Results: First, the number of institutional evaluation studies increased steadily from 2006 to 2010 and then decreased, with a higher frequency of studies on daycare centers compared to kindergartens. Second, the most frequently occurring keyword in the analysis was 'daycare center,' and the highest connection strength was found in the term 'daycare-center-evaluation.' Third, network analysis revealed that key terms for institutional evaluation research included 'evaluation certification,' 'recognition,' 'evaluation indicators,' 'teacher,' 'daycare center,' and 'kindergarten.' In the ego network analysis for each institution, 'parent' emerged as a highly ranked keyword. Conclusion/Implications: This study confirmed the perspectives of previous studies by revealing the structure of core concepts in early childhood education institution evaluation research, and provided implications for follow-up and direction of institution evaluation

Node-Level Trust Evaluation Model Based on Blockchain in Ad Hoc Network

  • Yan, Shuai-ling;Chung, Yeongjee
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.169-178
    • /
    • 2019
  • Due to the characteristics of an ad hoc network without a control center, self-organization, and flexible topology, the trust evaluation of the nodes in the network is extremely difficult. Based on the analysis of ad hoc networks and the blockchain technology, a blockchain-based node-level trust evaluation model is proposed. The concepts of the node trust degree of the HASH list on the blockchain and the perfect reward and punishment mechanism are adopted to construct the node trust evaluation model of the ad hoc network. According to the needs of different applications the network security level can be dynamically adjusted through changes in the trust threshold. The simulation experiments demonstrate that ad-hoc on-demand distance vector(AODV) Routing protocol based on this model of multicast-AODV(MAODV) routing protocol shows a significant improvement in security compared with the traditional AODV and on-demand multipath distance vector(AOMDV) routing protocols.

Experimental Performance Evaluation of BACnet MS/TP Protocol Using Network Management System (네트워크 관리 시스템을 이용한 BACnet MS/TP 프로토콜의 실험적 성능해석)

  • Park, Tae-Jin
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.11
    • /
    • pp.1676-1681
    • /
    • 2012
  • In network-based control system, measurement and control information is delivered by the network messages. Therefore, the performance of control system is directly affected by the performance of network system. System engineers need to evaluate the performance of network system to maintain the entire system in stable condition. BACnet is an international standard data communication protocol especially designed for building automation and control systems. In this study, experimental performance evaluation methodologies of BACnet MS/TP protocol and their practical evaluation results are presented.

Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management (대규모 네트워크 환경에서의 보안관리를 위한 보안평가 시스템 설계)

  • 이재승;김상춘
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.776-786
    • /
    • 2003
  • Security Evaluation System is a system that evaluates the security of the entire enterprise network domain which consists of various components and that supports a security manager or a Security Management System in making decisions about security management of the enterprise network based on the evaluation. It helps the security manager or the security management system to make a decision about how to change the configuration of the network to prevent the attack due to the security vulnerabilities of the network. Security Evaluation System checks the “current status” of the network, predicts the possible intrusion and supports decision-making about security management to prevent the intrusion in advance. In this paper we analyze the requirements of the Security Evaluation System that automates the security evaluation of the enterprise network which consists of various components and that supports decision-making about security management to prevent the intrusion, and we propose a design for it which satisfies the requirements.

A Designing Method of Performance Evaluation for Network Security Equipment of Korean Style (한국형 네트워크 보안 시스템 성능 평가 방법론 실계)

  • Ju, Seung Hwan;Seo, Hee Suk;Kim, Sang Youn
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.97-105
    • /
    • 2011
  • With the advancement of network, privacy information as well as confidential information that belongs to government and company are exposed to security incident like spreading viruses or DDoS attack. To prevent these security incident and protect information that belongs to government and company, Security system has developed such as antivirus, firewall, IPS, VPN, and other network security system. Network security systems should be selected based on purpose, usage and cost. Verification for network security product's basic features performed in a variety of ways at home and abroad, but consumers who buy these network security product, just rely on the information presented at companies. Therefore, common user doing self performance evaluation for perform Verification before buying network security product but these verification depends on inaccurate data which based on some user's criteria. On this paper, we designing methodology of network security system performance evaluation focused on Korean using other cases of performance evaluation.

Performance Evaluation of HNCP Home Network Using Stochastic Activity Network Models (Stochastic Activity Network 모델을 이용한 HNCP 홈 네트워트 성능 평가)

  • 이재민;명관주;이감록;전요셉;권욱현
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.183-186
    • /
    • 2003
  • In this paper, performance evaluation of HNCP home network is using stochastic activity network models is proposed. HNCP is a home network protocol for controling and monitoring home appliances using power line communication. a CSMA/CA with packet drop method is used in HNCP MAC layer. Using the proposed stochastic activity network models. performances of HNCP home networks with error-free environment and error environment are evaluated.

  • PDF

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

The Integrity Evaluation of weld zone in railway rails Using Neural Network (신경회로망을 이용한 철도레일 용접부의 건전성평가)

  • 윤인식;임미섭
    • Journal of the Korean Society for Railway
    • /
    • v.6 no.2
    • /
    • pp.81-86
    • /
    • 2003
  • This study proposes the neural network simulator for the integrity evaluation of weld zone in railway rails. For these purposes, the ultrasonic signals for defects(crack) of weld zone in frames are acquired in the type of time series data and echo strength. The detection of the natural defects in railway truck is performed using the characteristics of echodynamic pattern in ultrasonic signal. And then their applications evaluated feature extraction based on the time-frequency-attractor domain(peak to peak, rise time, rise slope, fall time, fall slope, pulse duration, power spectrum, and bandwidth) and attractor characteristics (fractal dimension and attractor quadrant) etc. The constructed neural network simulator agrees fairly well with the measured results of test block(defect location, beam propagation distance, echo strength, etc). The Proposed neural network simulator in this study can be used for the integrity evaluation of weld zone in railway rails.