• Title/Summary/Keyword: 네트워크 구간

Search Result 505, Processing Time 0.027 seconds

Structural Analysis of Locking Parts in the Gauge -Adjustable Wheelset (궤간 가변 윤축의 잠금부품들에 대한 구조해석)

  • Kim, Chul-Su;Chang, Cheon-Soo;Jang, Seung-Ho;Kim, Jung-Kyu
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.1
    • /
    • pp.33-38
    • /
    • 2008
  • To reduce the cost and time of transport in Eurasian railroad networks such as TKR, TCR and TSR owing to the problem of different track gauges (narrow/standard/broad gauge), it is important to develop the gauge-adjustable wheelset system to adapt easily to these gauges. Moreover, freight trains having the gauge-adjustable wheelsets should be passing various curved tracks in railroad networks. Therefore, to assure the safety of the gauge-adjustment whellset system, it is necessary to evaluate integrity of locking parts in the system using stress analysis. This study is focused on analyzing contact stress of locking parts by using FEA(finite element analysis) simulation during the gauge changeover operation and freight trains' service in the curved track, respectively.

Simulation of ULP Self-Sustaining Sensor Node System (ULP 자기유지 센서노드 시스템의 시뮬레이션)

  • Kim, Yun-Ho;Seong, Yeong-Rak;Oh, Ha-Ryoung;Park, Jun-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1435-1443
    • /
    • 2009
  • In this paper, an energy harvesting sensor network system is modeled and simulated by using the DEVS (Discrete Event System Specification) formalism. The system is composed of a sink (master) node, which is battery or mains powered, and a set of sensor (slave) nodes, each of which harvests ambient energy and converts it into electrical energy. For simulation, (i) the behavior of energy harvesting and storing circuits of the slave node is partitioned into a set of piecewise continuous segments and then each segment is represented as a discrete state; (ii) the interaction among the master node and components of the slave node is investigated preciously; and (iii) the investigated result is modeled and simulated by using the DEVS formalism.

Application of Fountain code for Improved Performance of Cooperative Multihop Communication over Underwater Acoustic Networks (Underwater Acoustic Networks에서 협력적 다중홉 통신의 성능 향상을 위한 파운틴 code의 적용)

  • Choi, Min-Cheal;Kim, Chang-Joong;Lee, Ho-Kyoung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.1
    • /
    • pp.45-49
    • /
    • 2011
  • Cooperative multihop communications support effective transmissions over underwater acoustic channels as inferior wireless channels. But the performance of cooperative multihop systems may degrade due to the lack of cooperative nodes at the initial operation time duration. At the initial time duration, the lack of cooperative nodes causes more errors, and the multihop network propagates these errors. In this paper, we apply fountain code to the cooperative multihop system at the initial time duration, and show performance improvements by simulations.

The Study of Building Security-Established Enterprise Mobile-VPN on WiBro Network (WiBro망에서 보안성이 확립된 기업용 Mobile-VPN 구축 방안 연구)

  • Cho, Do-Hyeoun;Kang, Dae-Seok;Han, Kyu-Jeong;Ji, Yung-Ha;Han, Wan-Ok
    • 전자공학회논문지 IE
    • /
    • v.47 no.4
    • /
    • pp.48-52
    • /
    • 2010
  • Recently, WiBro service as a mobile internet has been being extended. The market of wireless data communication has been being extended rapidly due to the increase of mobile data communication service supply such as smart-phone, WiBro service and so on. As the result, security is also emphasized in the mobile Internet In this paper, we propose the methods that tighten up security in the upcoming Enterprise Mobile-VPN service on WiBro network.

Bridge Road Surface Frost Prediction and Monitoring System (교량구간의 결빙 예측 및 감지 시스템)

  • Sin, Geon-Hun;Song, Young-Jun;You, Young-Gap
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.11
    • /
    • pp.42-48
    • /
    • 2011
  • This paper presents a bridge road surface frost prediction and monitoring system. The node sensing hardware comprises microprocessor, temperature sensors, humidity sensors and Zigbee wireless communication. A software interface is implemented the control center to monitor and acquire the temperature and humidity data of bridge road surface. A bridge road surface frost occurs when the bridge deck temperature drops below the dew point and the freezing point. Measurement data was used for prediction of road surface frost occurrences. The actual alert is performed at least 30 minutes in advance the road surface frost. The road surface frost occurrences data are sent to nearby drivers for traffic accidents prevention purposes.

Design of a Safe-driving Assistant System based on the IEEE WAVE (IEEE WAVE 기반 안전운전 지원 시스템의 설계)

  • Ko, Jae-Cheol;Lee, Hyuk-Joon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.1
    • /
    • pp.55-68
    • /
    • 2010
  • IEEE WAVE is going through the final standardization process as the wireless access technology which provides drivers in high-speed vehicles with safety-related information and commercial services This paper presents an application-layer protocol for safe driving assistant service and a service system emulator based on this protocol. The safe driving assistant system includes a construction zone information service and a vehicle crash notification service, an emergency vehicle notification service, a probing service and a dilemma zone decision assistant service. Emulator System design for verifying functions of system, The emulator consists of an emulator server that models the movement of all vehicles and road states and a number of clients that models functional units for OBUs, RSUs, and a traffic control center).

Energy Efficiency of Cooperative Routing with EGC Over Rayleigh Fading Channel (레일리 페이딩 채널을 통해 결합된 등가 이득 협력 라우팅의 에너지 효율)

  • Kong, Hyung-Yun;Tran, Truc Thanh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.65-70
    • /
    • 2013
  • In this paper, we propose a multi-hop cooperative transmission protocol to obtain energy savings in static wireless networks. Each terminal in the network is equipped with a single antenna and each receiver uses equal gain combining technique (EGC) to combine received signals. We also propose a power allocation strategy which optimizes the total transmit power at each stage. Monte-Carlo simulations are presented to evaluate and compare performance of the proposed protocol with the multi-hop direct transmission (MDT) and the cooperative routing protocol proposed by Khadani [8], in terms of the average total transmit power and the average number of required stages.

Methods for screening time series data according to data quality and statistical status (품질 및 조건 기반 시계열 데이터 선별 활용 방법)

  • Moon, JaeWon;Yu, MiSeon;Oh, SeungTaek;Kum, SeungWoo;Hwang, JiSoo;Lee, JiHoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.399-402
    • /
    • 2022
  • 본 논문에서는 불완전한 시계열 데이터를 활용하기 전 데이터를 선별하여 활용하는 방법을 소개한다. 시계열 데이터의 품질은 수집 네트워크와 수집 기기의 시간적 변화와 같은 가변적 상황에 의존적이므로 불규칙적으로 이상 혹은 누락 데이터가 발생한다. 이때 에러를 포함하였다는 이유로 일괄적으로 데이터를 제거하여 활용하지 않거나, 혹은 누락 데이터의 구간을 조건 없이 복원하여 활용한다면 원하지 않는 결과를 초래할 수 있다. 제안하는 방법은 시계열 데이터의 구간에 대한 누락 데이터의 통계적 정보를 축출하고 이에 기반하여 활용 목적과 활용 가능한 품질의 기준에 부합하지 않는다면 활용 불가능한 데이터라고 판별하고 미리 분석 등의 데이터 활용 시 자동 제외하는 구조를 제안하고 실험하였다. 제안하는 방법은 활용 목적과 상황에 적응적으로 누락 값을 포함하는 데이터의 빠른 활용 판단이 가능하며 보다 나은 분석 결과를 얻을 수 있다.

  • PDF

IDS Model using Improved Bayesian Network to improve the Intrusion Detection Rate (베이지안 네트워크 개선을 통한 탐지율 향상의 IDS 모델)

  • Choi, Bomin;Lee, Jungsik;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.5
    • /
    • pp.495-503
    • /
    • 2014
  • In recent days, a study of the intrusion detection system collecting and analyzing network data, packet or logs, has been actively performed to response the network threats in computer security fields. In particular, Bayesian network has advantage of the inference functionality which can infer with only some of provided data, so studies of the intrusion system based on Bayesian network have been conducted in the prior. However, there were some limitations to calculate high detection performance because it didn't consider the problems as like complexity of the relation among network packets or continuos input data processing. Therefore, in this paper we proposed two methodologies based on K-menas clustering to improve detection rate by reforming the problems of prior models. At first, it can be improved by sophisticatedly setting interval range of nodes based on K-means clustering. And for the second, it can be improved by calculating robust CPT through applying weighted-leaning based on K-means clustering, too. We conducted the experiments to prove performance of our proposed methodologies by comparing K_WTAN_EM applied to proposed two methodologies with prior models. As the results of experiment, the detection rate of proposed model is higher about 7.78% than existing NBN(Naive Bayesian Network) IDS model, and is higher about 5.24% than TAN(Tree Augmented Bayesian Network) IDS mode and then we could prove excellence our proposing ideas.

A Design and Implementation of Bulk Data Transmission Tool based on UDT (UDT 기반의 대용량 데이터 전송도구 설계 및 구현)

  • Park, Jong-Seon;Kim, Seung-Hae;Hwang, Gun-Joon;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.2
    • /
    • pp.23-31
    • /
    • 2012
  • With advance of high bandwidth network infrastructure, the requirement is dramatically increasing to cooperate between the users who are far from each other and make use of bulk data. However, as the prominent data transmission protocol, it is well known that TCP suffers some degrees of inefficiency for bulk data transmission when RTT is relatively big. So, some works are on going to suggest a new transmission method to utilize the bandwidth in effective. UDT(UDP-based Data Transfer protocol) is one of these. It is a UDP based application level protocol which can guarantee reliability and stability. much like as TCP. In this paper, we present a design and implementation of UDT based bulk data transmission tool by applying parallel and compressive techniques. The implementation result is examined to measured its performance improvement on a real test-bed, and then compared with existing bulk data transmission tools. Experimental results show that proposed tool is more stable and shows greater performance than that of native UDT. Especially, the performances show 244% improvement in RTT 400ms without losses and 229% in RTT 250ms with 0.005% losses respectively.