• Title/Summary/Keyword: 통신교환

Search Result 2,099, Processing Time 0.028 seconds

Development of Structural Analysis Platform through Internet-based Technology Using Component Models (컴포넌트 모델을 이용한 인터넷 기반 구조해석 플랫폼 개발)

  • Shin Soo-Bong;Park Hun-Sung
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.19 no.2 s.72
    • /
    • pp.161-169
    • /
    • 2006
  • The study proposes component models in developing an efficient platform for internet-based structural analysis. Since a structural analysis requires an operation of complicated algorithms, a client-side computation using X-Internet is preferred to a server-side computation to provide a flexible service for multi-users. To compete with the user-friendly interfaces of available commercial analysis programs, a window-based interface using Smart Client was applied. Also, component-based programming was performed with the considerations on reusability and expandability so that active Preparation for future change or modification could be feasible. The components describe the whole system by subdivision and simplification. In the relationship between upper-and lower-level components and also in the relationship between components and objects, a unified interface was used to clearly classify the connection between the libraries. By performing data communication between different types of platforms using XML WebService, a conner-stone of data transfer is proposed for the future integrated CAE. The efficiency of the developed platform has been examined through a sample structural analysis and design on planar truss structures.

A Design of GPS based Personal Location Self-Control Software on Android Platform (안드로이드 기반 GPS 개인위치정보 자기제어 구조 설계)

  • Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.1 no.1
    • /
    • pp.23-29
    • /
    • 2010
  • The various kinds of application is distributed for the Smart phone user recently. There is the advantage that the open source application on Android operating system based Smart phone supports a multi tasking service. Layar, Wikitude, and Sherpa and the other applications using the GPS location information like an a2b etc. were developed in the Smart phone environment. However, the existing Cell-ID based location information can be directly collected by the mobile ISP unit which the mobile carrier installs, the personal privacy problem occurs. Therefore, the personal location information is possible to be exposed publicly without any access control procedure. Therefore, in this research, the self-control mechanism on the GPS location information at the Smart phone is designed and presented. Through this, it is possible to develop diverse applications providing enhanced access control and GPS location management on the Android based Smart Phone.

A Range-based Relay Node Selecting Algorithm for Vehicular Ad-hoc Network (차량 애드혹 네트워크를 위한 영역 기반 릴레이 노드 선택 알고리즘)

  • Kim Tae-Hwan;Kim Hie-Cheol;Hong Won-Kee
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.88-98
    • /
    • 2006
  • VANET has several different characteristics from MANET such as high mobility of nodes and frequent change of node density and network topology. Due to these characteristics, the network topology based protocol, often used in MANET, can not be applied to VANET. In this paper, we propose an emergency warning message broadcast protocol using range based relay node selecting algorithm which determines the minimal waiting time spent by a given node before rebroadcasting the received warning message. Because the time is randomly calculated based on the distance between sender node and receiver node, a node chosen as a relay node is assured to have a minimal waiting time, even though it is not located at the border of radio transmission range. The proposed emergency warning message broadcast protocol has low network traffic because it does not need to exchange control messages for message broadcasting. In addition, it can reduce End-to-End delay under circumstances of low node density and short transmission range in VANET.

A Study of Hybrid Cryptosystem Design with the Authentication and Self-Key Generation (인증기능과 자기 키 생성기능을 가진 혼합형 암호시스템 설계에 관한 연구)

  • 이선근;송제호;김태형;김환용
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.9
    • /
    • pp.702-713
    • /
    • 2003
  • The importance of protection for data and information is increasing by the rapid development of information communication and network. And the concern for protecting private information is also growing due to the increasing demand for lots of services by users. Asymmetric cryptosystem is the mainstream in encryption system rather than symmetric cryptosystem by above reasons. But asymmetric cryptosystem is restricted in applying fields by the reason it takes more times to process than symmetric cryptosystem. In this paper, encryption system which executes authentication works of asymmetric cryptosystem by means of symmetric cryptosystem. The proposed cryptosystem uses an algorithms combines that combines block cipherment with stream cipherment and has a high stability in aspect of secret rate by means of transition of key sequence according to the information of plaintext while symmetric/asymmetric cryptosystem conducts encipherment/deciphermeent using a fixed key. Consequently, it is very difficult to crack although unauthenticator acquires the key information. So, the proposed encryption system which has a certification function of asymmetric cryptosystem and a processing time equivalent to symmetric cryptosystems will be highly useful to authorize data or exchange important information.

Co-specification for control and dataflow based on the codesign backplane (백플레인에 기반한 제어 부분과 데이터 처리 부분의 통합적 명세)

  • Kim, Do-Hyung;Ha, Soon-Hoi
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.12
    • /
    • pp.36-46
    • /
    • 1999
  • As the requirements of embedded systems increase, the design complexity of the system becomes higher. The formal design methodology is required which supports well-balanced specification for control and dataflow to design a complex system. In this paper, control modules and function modules are separately described with FSMs and dataflow graphs respectively, and integrated into a system specification via inter-model communications. In previous approaches, the system could not be verified until control modules and dataflow modules are combined at the final design stage. However our approach enables us to design each part as the proper model of computation at early stage, and to verify the compositions and to co-synthesize the system effectively in the same framework. Especially this paper focuses on the communication protocols between control and dataflow models. Preliminary experiments show practicality of the proposed technique.

  • PDF

Secure and Energy Efficient Protocol based on Cluster for Wireless Sensor Networks (무선 센서 네트워크에서 안전하고 에너지 효율적인 클러스터 기반 프로토콜)

  • Kim, Jin-Su;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.14-24
    • /
    • 2010
  • Because WSNs operate with limited resources of sensor nodes, its life is extended by cluster-based routing methods. In this study, we use data on direction, distance, density and residual energy in order to maximize the energy efficiency of cluster-based routing methods. Through this study, we expect to minimize the frequency of isolated nodes when selecting a new cluster head autonomously using information on the direction of the upper cluster head, and to reduce energy consumption by switching sensor nodes, which are included in both of the new cluster and the previous cluster and thus do not need to update information, into the sleep mode and updating information only for newly included sensor nodes at the setup phase using distance data. Furthermore, we enhance overall network efficiency by implementing secure and energy-efficient communication through key management robust against internal and external attacks in cluster-based routing techniques. This study suggests the modified cluster head selection scheme which uses the conserved energy in the steady-state phase by reducing unnecessary communications of unchanged nodes between selected cluster head and previous cluster head in the setup phase, and thus prolongs the network lifetime and provides secure and equal opportunity for being cluster head.

SD(Short Data) Performance Measurement in D-TRS Wireless Network Environment (D-TRS 무선망환경에서의 SD(Short Data) 성능측정)

  • Song, Byung-Kwen;Kim, Geon-Ung
    • Journal of IKEEE
    • /
    • v.13 no.3
    • /
    • pp.80-86
    • /
    • 2009
  • TETRA is the standard of Digital Trunked Radio System developed by the ETSI(European Telecommunications Standards Institute). It is adopted as Electric Power IT Wireless Backbone Network in Korea. To use TETRA wireless network, TETRA modem is very necessary. In this paper, the performance measurements of modem and its results are analyzed according to traffics in TETRA network. In this paper, SDS type-4 transmission method is used in the transmission standards suggested by PEI(Peripheral Equipment Interface) of ETSI. Performance measurements are done by varying the data size and transmission interval. The data size is increased by 10 bytes from 10-byte to 140-byte, and it is measured 1,000 times for each transmission interval of 0.5, 1.0, and 1.5 seconds. MU-1000MD of Unimo is used for TETRA modem, and SwMI(Switching and Management Infrastructure) of Teltronic is used for switching system in this paper.

  • PDF

Flush message based Route Optimization Mechanism to Prevent Packet Out-of Sequence Problem in Proxy MIPv6 (Proxy MIPv6에서 패킷의 순서 어긋남을 해결할 수 있는 Flush 메시지 기반의 경로 최적화 메커니즘)

  • Lee, Chang-Min;Lee, Beom-Jae;Lee, Jae-Hwoon;Park, Hyun-Seo;Shin, Gyung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.3
    • /
    • pp.61-67
    • /
    • 2008
  • Proxy MIPv6 (PMIPv6) is that network-based mobility management protocol that network supports mobile node's mobility on behalf of the MN. In PMIPv6, when two MNs located within the same PMIPv6 domain want to communicate each other, sub-optimal path is established between the two MN. Route optimization method for PMIPv6 is proposed to resolve the problem. However, the method still suffer from the performance degradation due to out-of-sequence packet problem. In this paper, we propose the route optimization mechanism in PMIPv6 based on Flush message to resolve the out-of-sequence packet problem. The proposed mechanism is evaluated by performing simulations, and the simulation results show that the proposed one gives better performance.

Performance Advantage of Partial CoMP Transmission Using Finite Feedback (제한적 궤환량 사용 시 부분적 CoMP 전송의 성능 이득)

  • Park, Jae-Yong;Sung, Won-Jin
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.1
    • /
    • pp.14-20
    • /
    • 2012
  • CoMP(Coordinated Multi-Point transmission and reception) refers to a cooperative transmission strategy to control the interference from adjacent base stations in cellular mobile communication systems, which efficiently enhances the data throughput of the systems. As the number of the base stations participating in cooperative transmission increases, however, a larger amount of information exchange to carry the CSI(Channel State Information) of the mobile terminals is required. In this paper, we propose a partial CoMP transmission method for systems under the constraint of finite feedback information data. This method selects candidates of base stations which can provide high efficiency gain when they participate in the CoMP set. To achieve this, the cooperative base station combination is constructed by considering the preferred base stations of users. The cooperative base station combinations are dynamically applied since the preferred base station combinations of users may be different. We perform computer simulations to compare performance of the non-CoMP, full-CoMP and partial CoMP in terms of the average throughput using finite feedback and demonstrate the performance improvement of the proposed method.

A Design and Implementation of Secure Electronic Bidding System (인터넷 기반 전자입찰시스템의 보안 설계 및 구현)

  • 윤선희
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.861-870
    • /
    • 2002
  • The area of business applications in the internet are extended enormously in result of fast development of computing and communication technologies, increase of internet use, and use of intranet/extranet in enterprise information system. Widely spread the use of the internet, there are various applications for Business to Business (B to B) or Business to Customer(B to C) model that are based on the intranet or extranet. This paper designed and implemented the Web-based Electronic Bidding System for Business to Business (B to B) model. The technical issues of electronic bidding system in the internet are involved in the connection between web client and server, electronic data interchange for the contract document, and security solution during the bidding and contracting processes. The web-based electronic bidding system in this paper is implemented using Java applet and servlet as a connection interface for web client and sewer, XML/EDI-based documents for a bid and a contract, and bidding server and notary server for enhancing the security using PKI(Public Key Infrastructure)-based public key cryptography, digital signature and Certification Authority (CA).

  • PDF