• Title/Summary/Keyword: 다중 모듈

Search Result 524, Processing Time 0.032 seconds

The Congestion Control using Selective Slope Control under Multiple Time Scale of TCP (TCP의 다중 시간 간격에서 선택적 기울기 제어를 이용한 혼잡 제어)

  • Kim, Gwang-Jun;Kang, Ki-Woong;Lim, Se-Jung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.1
    • /
    • pp.10-18
    • /
    • 2007
  • In this paper, we extend the multiple time scale control framework to window-based congestion control, in particular, TCP. This is performed by interfacing TCP with a large time scale control module which adjusts the aggressiveness of bandwidth consumption behavior exhibited by TCP as a function of "large time scale" network state. i.e., conformation that exceeds the horizon of the feedback loop as determined by RTT. Performance evaluation of multiple time scale TCP is facilitated by a simulation bench-mark environment which is based on physical modeling of self-similar traffic. If source traffic is not extended exceeding, when RTT is 450ms, in self similar burst environment, performance gain of TCP-SSC is up to 45% for ${\alpha}$=1.05. However, its is acquired only 20% performance gain for ${\alpha}$=1.95 relatively. Therefore we showed that by TCP-MTS at large time scale into a rate-based feedback congestion control, we are able to improve two times performance significantly.

  • PDF

The Plan Characteristics of Shared Housing through the Boundaries of Shared Space - A Focusing on the case of Urban Area in Domestic and Overseas - (공유경계를 통해 본 공유주거의 계획특성 - 국내외 도심 속 사례를 중심으로 -)

  • Kang, Su-Gyeong;Kim, Yong-Sung
    • Korean Institute of Interior Design Journal
    • /
    • v.25 no.6
    • /
    • pp.3-14
    • /
    • 2016
  • According to Plato's ontology, we lead our lives by establishing a relationship with others in the society. However in rapidly changing era, our lives was gradually moving towards personal tendency. Even for the relationship with family, not with others. Thus, awareness about owning properties has changed due to the sociocultural factors and increase number of single-person households. So in this study, the considerations for single-person housing were perceived through preceding research, and the elements making spatial boundary of shared housing were drawn to make rational space sharing based on the boundary with others and of the living environment. With overall analysis based on the spatial boundary features of planned shared housing, the plan characteristics according to the spatial boundary of the current shared housing is to be drawn and analyzed. Third, The expressive and structural features of spatial boundary as above appear with mutual flexible connectivity, And the result shows that the modularity was the highest. Among them variable coupling modularity of shows how it is possible to combine efficiently and variously the private and public spaces with regularity of 'space of optimal unit'. This study drew plan characteristics from more detailed space border of shared housing. Therefore, The basic framework of the characteristics spin for the cases that newly emerge later on.

Development of Problem-based learning module for Bioterrorism (생물테러재난안전교육을 위한 문제중심학습개발)

  • Kim, Jee-Hee;Moon, Tae-Young;Park, Jeong-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.774-777
    • /
    • 2009
  • 2001년 9 11 테러 이후 미국에서 탄저균을 이용한 생물테러가 발생한 이래 미국을 비롯한 여러 나라에서는 생물무기 및 생물테러에 대한 대응방안들이 준비되고 있다. 따라서 이런 대응방안과 더불어 생물무기를 쓰는 테러리스트의 행동과 위협에 대비를 할 필요가 있다. 생물테러 전염병은 치명률이 높고, 인간 상호간에 전염이 용이하며 치료하기가 어려우므로, 인명의 손실을 최소화하기 위해서는 보건의료기관 등에서 근무하는 보건의료인이 생물테러로 의심되는 병원체 및 전염병을 조기에 인지하는 것이 가장 중요하다. 따라서 보건분야 전문가들은 환자나 일반 대중, 그리고 다른 보건전문가들에게 생물무기와 생물테러에 의해 퍼질 가능성이 있는 질병들에 대해 신중하게 대응할 수 있는 방법들을 교육해야 한다. 질병이 발생했을 때 보건전문가들은 조사에 착수할 역학자들과 협조를 해야 하고, 임상 또는 연구소에 일하는 보건전문가들은 생물무기로 사용될 수 있는 병원체나 생물무기를 생산하는데 사용되는 시설에 접근하는 것을 제한하도록 도울 수 있다. 2005년 질병관리본부 생물테러대응팀에서는 의료인, 다중시설이용 근무자, 보건요원을 대상으로 생물테러 인식도를 조사한 바 있다. 조사결과, 의료인에 대한 생물테러 교육 및 교육훈련의 필요성에 대해 94.2%가 필요하다고 응답하였다. 이런 자료를 바탕으로 하여 국내에서도 생물테러교육의 필요성이 대두되기 시작하였다. 본 연구는 미국, 영국에서 진행되고 있는 생물테러 관련 교육에 대한 관련 자료와 사례를 문헌 분석을 통해 우리나라에 맞는 생물테러 교육에 대한 방향을 제시하고 문제중심학습모듈을 개발하고자 하는데 그 목적이 있다.

  • PDF

The Composition and Analytical Classification of Cyber Incident based Hierarchical Cyber Observables (계층적 침해자원 기반의 침해사고 구성 및 유형분석)

  • Kim, Young Soo;Mun, Hyung-Jin;Cho, Hyeisun;Kim, Byungik;Lee, Jin Hae;Lee, Jin Woo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.139-153
    • /
    • 2016
  • Cyber incident collected from cyber-threat-intelligence sharing Center is growing rapidly due to expanding malicious code. It is difficult for Incident analysts to extract and classify similar features due to Cyber Attacks. To solve these problems the existing Similarity Analysis Method is based on single or multiple cyber observable of similar incidents from Cyber Attacks data mining. This method reduce the workload for the analysis but still has a problem with enhancing the unreality caused by the provision of improper and ambiguous information. We propose a incident analysis model performed similarity analysis on the hierarchically classified cyber observable based on cyber incident that can enhance both availability by the provision of proper information. Appling specific cyber incident analysis model, we will develop a system which will actually perform and verify our suggested model.

Study on the Ambiguity Difference Adjustment between Reference Station Cells for the Improvement in Rover's Continuous Network-RTK Positioning (Network RTK 항체의 불연속 위치 결정 개선을 위한 기준국 셀간 미지정수 차이 조정 연구)

  • Park, Byung-Woon;Song, June-Sol;Kee, Chang-Don
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.4
    • /
    • pp.619-626
    • /
    • 2012
  • One-way Network-RTK(Real Time Kinematics) is considered as a method which can satisfy moving vehicle's recently-required high accuracy and mobility. When we use one-way Network RTK for vehicle navigation, multiple cells-based system is required to provide the service continuously in wide area. The rover which moves through various cells inevitably experiences a correction discontinuity, which is not eliminated by the DD(Double Difference) method and to cause 13cm(horizontal) and 48cm(vertical) position error. We suggest three solutions to reduce this discontinuity, which are identification of master RS with neighbor networks, duplication of communication module to receive corrections from other cells, and ambiguity adjustment between neighbor cells. All of our suggestions reduce the error to 1/4 wavelength in measurement and 3cm in position-domain, and we suggest the ambiguity adjustment is the best when we consider the extendibility of service area and the cost of rover device.

A WPAN Protocol for N-Screen Services in Indoor and Ship Area Networks (선박 및 실내 N-스크린 서비스를 위한 WPAN 프로토콜)

  • Hur, Kyeong;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.1185-1192
    • /
    • 2015
  • A wireless bridge is essential to transmit control and managing information to sensors or instruments from a central integrated ship area network station. In this paper, a WPAN protocol is adopted for development of a seamless N-screen wireless service in Indoor and Ship Area Networks. Furthermore, to provide the OSMU (One Source Multi Use) N-screen service through P2P streaming in the seamless WPAN protocol, a Grid-based WPAN networking technology is proposed and analyzed. The proposed Grid-based WPAN networking technology supports multi-path and fast path-setup functions for N-screen communications. The simulation results demonstrate that the proposed Grid-based WPAN networking technology outperforms the IEEE 802.15.4 based network in terms of N-screen transmission delay.

Design and Implementation of Large Tag Data Transmission Protocol for 2.4GHz Multi-Channel Active RFID System (2.4GHz 다중채널 능동형 RFID시스템을 위한 대용량 태그 데이터 전송 프로토콜의 설계 및 구현)

  • Lee, Chae-Suk;Kim, Dong-Hyun;Kim, Jong-Doek
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.217-227
    • /
    • 2010
  • To apply active RFID technology in the various kinds of industry, it needs to quickly transmit a large amount of data. ISO/IEC 18000-7 standard uses the 433.92MHz as single channel system and its transmit rate is just 27.8kbps, that is insufficient for a large amount of data transmission. To solve this problem, we designed a new data transmission protocol using 2.4GHz band. The feature of designed protocol is not only making over 255bytes data messages using the Burst Read UDB but also efficiently transmitting it. To implement this protocol, we use Texas Instruments's SmartRF04 develop kit and CC2500 transceiver as RF module. As an evaluation of 63.75kbytes data transmission, we demonstrate that transmission time of Burst Read UDB has improved as 17.95% faster than that of Read UDB in the ISO/IEC 18000-7.

A Web-based Real-time Odor Monitoring and Device Management System (웹기반 실시간 악취 모니터링 및 장치 관리 시스템)

  • Shen, Meiling;Kim, Sang-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.101-109
    • /
    • 2009
  • The people around industrial complexes and polluted areas suffer from the many occurrences of odors, and frequently issue a request for solving the odors to their local government in charge of those areas. Recently local governments whose regions have a number of such areas have a great interest in monitoring odor occurrences and gathering air on demand. This paper proposes a system in which a user can perform real-time monitoring the values of odor and atmospheric sensors, and the management of odor sensing devices using the Internet browser. Compared to previous systems, the system has an advantage of providing the functions for controlling and managing a number of devices irregardless of the location of the user. Also, the system is built around a blackboard-based multi-process architecture, enabling the easy incorporation of a new software model to be found useful. To our experiment, users showed great satisfactions in terms of the easiness of use. Our system has been installed and operated in an area of a local government in which odors are likely to occur.

  • PDF

Implementation of Multi-Streaming System of Live Video of Drone (드론 라이브 영상의 다중 스트리밍 시스템 구현)

  • Hwang, Kitae;Kim, Jina;Choi, Yongseok;Kim, Joonhee;Kim, Hyungmin;Jung, Inhwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.1
    • /
    • pp.143-149
    • /
    • 2018
  • This paper presents an implementation of a streaming system which can forward live video stream to multiple users from a Phantom4, which is a drone made by DJI. We constructed the streaming server on Raspberry Pi 3 board for high mobility. Also We implemented the system so that the video stream can be played on any devices if the HTML5 standard web browser is utilized. We compiled C codes of FFmpeg open sources and installed in the Raspberry Pi3 as the streaming server and developed a Java application to execute as the integrated server that controls the other softwares on the streaming server. Also we developed an Android application which receives the live video stream from the drone and sends the streaming server continuously. The implemented system in this paper can successfully stream the live video on 24 frames per second at the resolution of 148x112 in considering the low hardware throughput of the streaming server.

A Study on Distributed Cooperation Intrusion Detection Technique based on Region (영역 기반 분산협력 침입탐지 기법에 관한 연구)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.53-58
    • /
    • 2014
  • MANET can quickly build a network because it is configured with only the mobile node and it is very popular today due to its various application range. However, MANET should solve vulnerable security problem that dynamic topology, limited resources of each nodes, and wireless communication by the frequent movement of nodes have. In this paper, we propose a domain-based distributed cooperative intrusion detection techniques that can perform accurate intrusion detection by reducing overhead. In the proposed intrusion detection techniques, the local detection and global detection is performed after network is divided into certain size. The local detection performs on all the nodes to detect abnormal behavior of the nodes and the global detection performs signature-based attack detection on gateway node. Signature DB managed by the gateway node accomplishes periodic update by configuring neighboring gateway node and honeynet and maintains the reliability of nodes in the domain by the trust management module. The excellent performance is confirmed through comparative experiments of a multi-layer cluster technique and proposed technique in order to confirm intrusion detection performance of the proposed technique.