• Title/Summary/Keyword: 네트워크 레벨

Search Result 436, Processing Time 0.026 seconds

Cluster Coordinator Node Based Inter-Cell Interference Management Methods in Heterogeneous Networks (이기종 네트워크에서 클러스터 코디네이터 노드 기반의 셀간 간섭 관리 방법)

  • Yang, Mochan;Wu, Shanai;Shin, Oh-Soon;Shin, Yoan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.3
    • /
    • pp.277-288
    • /
    • 2013
  • 3GPP LTE-Advanced (Third Generation Partnership Project Long Term Evolution-Advanced) as a next generation mobile communication standard introduced small base stations such as femto cells or pico cells, and D2D (Device-to-Device) communications between mobiles in the proximity in order to satisfy the needs of rapidly growing wireless data traffic. A diverse range of topics has been studied to solve various interference situations which may occur within a single cell. In particular, an introduction of a small base station along with D2D communication raises important issues of how to increase the channel capacity and frequency efficiency in HetNets (Heterogeneous Networks). To this end, we propose in this paper methods to manage the interference between the macro cell and other small cells in the HetNet to improve the frequency efficiency. The proposed CCN (Cluster Coordinator Node)-assisted ICI (Inter-Cell Interference) avoidance methods exploit the CCN to control the interference in HetNet comprising of an MeNB (Macro enhanced Node-B) and a large number of small cells. A CCN which is located at the center of a number of small cells serves to avoid the interference between macro cell and small cells. We propose methods of resource allocation to avoid ICI for user equipments within the CCN coverage, and evaluate their performance through system-level computer simulations.

Design and Implementation of Anomaly Traffic Control framework based on Linux Netfilter System and CBQ Routing Mechanisms (리눅스 Netfilter시스템과 CBQ 라우팅 기능을 이용한 비정상 트래픽 제어 프레임워크 설계 및 구현)

  • 조은경;고광선;이태근;강용혁;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.129-140
    • /
    • 2003
  • Recently viruses and various hacking tools that threat hosts on a network becomes more intelligent and cleverer, and so the various security mechanisms against them have ken developed during last decades. To detect these network attacks, many NIPSs(Network-based Intrusion Prevention Systems) that are more functional than traditional NIDSs are developed by several companies and organizations. But, many previous NIPSS are hewn to have some weakness in protecting important hosts from network attacks because of its incorrectness and post-management aspects. The aspect of incorrectness means that many NIPSs incorrectly discriminate between normal and attack network traffic in real time. The aspect of post-management means that they generally respond to attacks after the intrusions are already performed to a large extent. Therefore, to detect network attacks in realtime and to increase the capability of analyzing packets, faster and more active responding capabilities are required for NIPS frameworks. In this paper, we propose a framework for real-time intrusion prevention. This framework consists of packet filtering component that works on netfilter in Linux kernel and traffic control component that have a capability of step-by-step control over abnormal network traffic with the CBQ mechanism.

Performance of the Road Network with Market Penetration Rates and Traffic Volumes of Autonomous Vehicle using Traffic Simulation (시뮬레이션 기반 자율주행자동차 혼입률과 교통량 변화에 따른 도로 네트워크의 성능 분석)

  • Do, Myungsik;Jeong, Yumi
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.44 no.3
    • /
    • pp.349-360
    • /
    • 2024
  • The purpose of this study is to analyze the performance of the road network according to the penetration rate of autonomous vehicles (AV) of Level 4 or higher and the change in traffic volume. First, prior studies related to vehicle control variables of AV were reviewed, and future traffic demand in 2040, which is predicted to have a 50 % market share of AVs, was reflected in the simulation analysis. In addition, the change in traffic flow of continuous and intermittent flows was analyzed by increasing the AV market penetration rate and traffic volume of passenger cars, trucks, and buses by 25 % step by step from 0 to 100 %. As a result of the analysis, it was confirmed that the travel time increased as the traffic increased, and the pattern of decreasing the travel time due to the increase in the share of AVs, that is, the development of technology, can also be confirmed. Furthermore, it was also confirmed that the traffic speed showed a trend of increasing as the share of AVs increased. In this study, it was confirmed that the law of diminishing marginal rate of substitution (MRS) was satisfied by calculating the MRS according to the combination of traffic volume and speed while increasing the market penetration rate of AVs. Furthermore, it was confirmed that the convexity of the indifference curve was also satisfied in both intermittent and continuous traffic flow environments.

Story-based Information Retrieval (스토리 기반의 정보 검색 연구)

  • You, Eun-Soon;Park, Seung-Bo
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.81-96
    • /
    • 2013
  • Video information retrieval has become a very important issue because of the explosive increase in video data from Web content development. Meanwhile, content-based video analysis using visual features has been the main source for video information retrieval and browsing. Content in video can be represented with content-based analysis techniques, which can extract various features from audio-visual data such as frames, shots, colors, texture, or shape. Moreover, similarity between videos can be measured through content-based analysis. However, a movie that is one of typical types of video data is organized by story as well as audio-visual data. This causes a semantic gap between significant information recognized by people and information resulting from content-based analysis, when content-based video analysis using only audio-visual data of low level is applied to information retrieval of movie. The reason for this semantic gap is that the story line for a movie is high level information, with relationships in the content that changes as the movie progresses. Information retrieval related to the story line of a movie cannot be executed by only content-based analysis techniques. A formal model is needed, which can determine relationships among movie contents, or track meaning changes, in order to accurately retrieve the story information. Recently, story-based video analysis techniques have emerged using a social network concept for story information retrieval. These approaches represent a story by using the relationships between characters in a movie, but these approaches have problems. First, they do not express dynamic changes in relationships between characters according to story development. Second, they miss profound information, such as emotions indicating the identities and psychological states of the characters. Emotion is essential to understanding a character's motivation, conflict, and resolution. Third, they do not take account of events and background that contribute to the story. As a result, this paper reviews the importance and weaknesses of previous video analysis methods ranging from content-based approaches to story analysis based on social network. Also, we suggest necessary elements, such as character, background, and events, based on narrative structures introduced in the literature. We extract characters' emotional words from the script of the movie Pretty Woman by using the hierarchical attribute of WordNet, which is an extensive English thesaurus. WordNet offers relationships between words (e.g., synonyms, hypernyms, hyponyms, antonyms). We present a method to visualize the emotional pattern of a character over time. Second, a character's inner nature must be predetermined in order to model a character arc that can depict the character's growth and development. To this end, we analyze the amount of the character's dialogue in the script and track the character's inner nature using social network concepts, such as in-degree (incoming links) and out-degree (outgoing links). Additionally, we propose a method that can track a character's inner nature by tracing indices such as degree, in-degree, and out-degree of the character network in a movie through its progression. Finally, the spatial background where characters meet and where events take place is an important element in the story. We take advantage of the movie script to extracting significant spatial background and suggest a scene map describing spatial arrangements and distances in the movie. Important places where main characters first meet or where they stay during long periods of time can be extracted through this scene map. In view of the aforementioned three elements (character, event, background), we extract a variety of information related to the story and evaluate the performance of the proposed method. We can track story information extracted over time and detect a change in the character's emotion or inner nature, spatial movement, and conflicts and resolutions in the story.

A Study on development of Innovational Cluster for Knowledge Management in Busan (부산지역 지식경영을 위한 혁신클러스터 모델 구축에 관한 연구)

  • Jeong, Hyung-Il;Bang, Kwuen-Soo;Kim, Jong-Duk
    • Management & Information Systems Review
    • /
    • v.29 no.4
    • /
    • pp.169-186
    • /
    • 2010
  • This study aims to reveal the ways to sharpen the edges of Korean companies through the relativity analysis between knowledge management and innovational cluster in environmental changes in resent Busan. That is, according to the knowledge management approach, the methods and directions of strengthening industrial competition were established, while the strategy of innovational clusters was suggested as a way of expanding and encouraging knowledge management. The key words of innovational cluster are in this research are the framework of Cluster theory, the importance of innovational cluster, and the change of managerial strategy paradigm. This study provide the several implication for the practice of knowledge management and the researchers. Based on these theories of knowledge management and industrial clusters, their close relationships were analyzed. As a result, industrial clusters were found to be effectively utilized to enlarge and deepen knowledge management. In addition, this suggests the efficient operation guideline of knowledge management. this study indicates both knowledge and innovational cluster should be operated and handled together in the managerial strategy. but this research has limitations in generaling the study result because it collects data from local firms only in Busan.

  • PDF

Tile, Slice, and Deblocking Filter Parallelization Method in HEVC (HEVC 복호기에서의 타일, 슬라이스, 디블록킹 필터 병렬화 방법)

  • Son, Sohee;Baek, Aram;Choi, Haechul
    • Journal of Broadcast Engineering
    • /
    • v.22 no.4
    • /
    • pp.484-495
    • /
    • 2017
  • The development of display devices and the increase of network transmission bandwidth bring demands for over 2K high resolution video such as panorama video, 4K ultra-high definition commercial broadcasting, and ultra-wide viewing video. To compress these image sequences with significant amount of data, High Efficiency Video Coding (HEVC) standard with the highest coding efficiency is a promising solution. HEVC, the latest video coding standard, provides high encoding efficiency using various advanced encoding tools, but it also requires significant amounts of computation complexity compared to previous coding standards. In particular, the complexity of HEVC decoding process is a imposing challenges on real-time playback of ultra-high resolution video. To accelerate the HEVC decoding process for ultra high resolution video, this paper introduces a data-level parallel video decoding method using slice and/or tile supported by HEVC. Moreover, deblocking filter process is further parallelized. The proposed method distributes independent decoding operations of each tile and/or each slice to multiple threads as well as deblocking filter operations. The experimental results show that the proposed method facilitates executions up to 2.0 times faster than the HEVC reference software for 4K videos.

The Item Distribution Method for the Party System in the MMORPG Using the Observer Pattern (Observer 패턴을 적용한 MMORPG의 파티 시스템 아이템 배분 방법)

  • Kim, Tai-Suk;Kim, Shin-Hwan;Kim, Jong-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.8
    • /
    • pp.1060-1067
    • /
    • 2007
  • We need various methods to develop MMORPG that is game genre which many users use among various game genre using Internet. Specially, to heighten efficiency of distributing work, Object-oriented language such as C++ is used and we need design techniques that can take advantage of enough object-oriented concept when making large-scale game. There is various pattern that can apply in software breakup design in GoF's design pattern for these design techniques. If you apply Observer pattern to Party System Design for forming community between game users, you can easily add new class and maintain system later. Party Play is one of the important system that is used to form game users' community in MMORPG games. The main point that must be considered in Party-Play-System is to divide evenly experience value and acquisition that is got by Party-Play among users according to each user's level. To implement Party Play System that consider maintenance of system, in this paper, we propose a method using GoF's Observer-Pattern, showing you that proposed method which has advantage to dynamic memory allocation and to virtual method call can be used usefully to change object to real time at program run and to add new class and to maintain system new.

  • PDF

Technique for Concurrent Processing Graph Structure and Transaction Using Topic Maps and Cassandra (토픽맵과 카산드라를 이용한 그래프 구조와 트랜잭션 동시 처리 기법)

  • Shin, Jae-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.3
    • /
    • pp.159-168
    • /
    • 2012
  • Relation in the new IT environment, such as the SNS, Cloud, Web3.0, has become an important factor. And these relations generate a transaction. However, existing relational database and graph database does not processe graph structure representing the relationships and transactions. This paper, we propose the technique that can be processed concurrently graph structures and transactions in a scalable complex network system. The proposed technique simultaneously save and navigate graph structures and transactions using the Topic Maps data model. Topic Maps is one of ontology language to implement the semantic web(Web 3.0). It has been used as the navigator of the information through the association of the information resources. In this paper, the architecture of the proposed technique was implemented and design using Cassandra - one of column type NoSQL. It is to ensure that can handle up to Big Data-level data using distributed processing. Finally, the experiments showed about the process of storage and query about typical RDBMS Oracle and the proposed technique to the same data source and the same questions. It can show that is expressed by the relationship without the 'join' enough alternative to the role of the RDBMS.

Military Security Policy Research Using Big Data and Text Mining (빅데이터와 텍스트마이닝 기법을 활용한 군사보안정책 탐구)

  • Kim, Doo Hwan;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.23-34
    • /
    • 2019
  • This study utilized big data, one of the new technologies of the Fourth Industrial Revolution as a policy direction study related to the military security of the Army. By utilizing Text mining and analyzing military security trends in domestic and foreign papers, it will be able to set policy directions and reduce trial and error. In this study, we found differences in domestic and international studies on military sucurity. At first, Domestic research has shown that in the course of the fourth industrial revolution, there is a strong interest in technological security, such as IT technology in security and cyber security in North Korea. On the other hand, Foreign research confirmed that policies are being studied in such a way that military sucurity is needed at the level of cooperation between countries and that it can contribute to world peace. Various academic policy studies have been underway in terms of determining world peace and security levels, not just security levels. It contrasted in our immediate confrontation with North Korea for decades but suggest complementary measures that cannot be overlooked from a grand perspective. Conclusionally, the direction of academic research in domestic and foreign should be done in macro perspective under national network cooperation, not just technology sucurity research, recognizing that military security is a policy product that should be studied in a security system between countries.

An Improved Way of Remote Storage Service based on iSCSI for Mobile Device using Intermediate Server (모바일 디바이스를 위한 iSCSI 기반의 원격 스토리지 서비스에서 중간 서버를 이용한 성능 개선 방안)

  • Kim Daegeun;Park Myong-Soon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.843-850
    • /
    • 2004
  • As mobile devices prevail, requests for various services using mobile devices have increased. Requests for application services that require large data space such as multimedia, game and database [1] specifically have greatly increased. However, mobile appliances have difficulty in applying various services like a wire environment, because the storage capacity of one is not enough. Therefore, research (5) which provides remote storage service for mobile appliances using iSCSI is being conducted to overcome storage space limitations in mobile appliances. But, when iSCSI is applied to mobile appliances, iSCSI I/O performance drops rapidly if a iSCSI client moves from the server to a far away position. In the case of write operation, $28\%$ reduction of I/O performance occurred when the latency of network is 64ms. This is because the iSCSI has a structural quality that is very .sensitive to delay time. In this paper, we will introduce an intermediate target server and localize iSCSI target to improve the shortcomings of iSCSI performance dropping sharply as latency increases when mobile appliances recede from a storage server.