• Title/Summary/Keyword: Concept Network

Search Result 1,803, Processing Time 0.065 seconds

Product Development in the Network-Centric Engineering Environment: Concept and Approach (네트워크 기반 엔지니어링 환경에서의 제품 개발: 개넘과 접근방식)

  • 방건동
    • Korean Journal of Computational Design and Engineering
    • /
    • v.5 no.1
    • /
    • pp.79-87
    • /
    • 2000
  • This paper presents an integrated but open product development environment for distributed and collaborative design. The web-based framework, called DOME, allows designers to build integrated models using both local and distributed resources, and to collaborate by exchanging services in a network-centric product development environment. Thus, an integrated model can be created while each participant focuses on his or her own area of expertise. A design problem model is created by connecting modules, which represent specific system components, analysis capabilities/software, disciplines, or organizations relevant to the problem. The modules interact with each other using service exchanges based upon the CORBA standard communication protocol. The goal of this framework is tall provide the ability to rapidly construct integrated design problem models to facilitate collaborative design work, improve product quality and reduce development time. Ultimately, it should allow specialized engineering applications and design problem models to operate under a common design environment.

  • PDF

A Study on the Multilevel Electronic Commerce Security using Scalable Multicast (확장 멀티캐스트를 이용한 다중레벨 전자상거래 보안에 관한 연구)

  • 서장원
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.66-74
    • /
    • 2002
  • Through the increment of requirement for EC(Electronic Commerce) oriented communication services, security multicast communications is becoming more important. However, multicast to EC environment is much different from unicast concept most network security protocols. On the network security, using mandatory access control of multilevel architecture which assigns a specific meaning to each subject, so we accomplish access control. In this way, access control security based on the information security level is proposed. A security protocol based on the architecture proposed in this paper would be utilized in security multicast communications, group key management service and leveled security service through multilevel EC security policy, Also we discuss and propose the security level scaleability and key management method on the network.

  • PDF

Key Distribution Process for Encryption of SCADA Communication using Game Theory applied Multiagent System

  • Kim, Hak-Man;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.11
    • /
    • pp.34-43
    • /
    • 2009
  • SCADA (Supervisory Control and Data Acquisition) system has been used for remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks, SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, flexible key distribution concept is proposed for improving the security of SCADA network using Multiagent System (MAS).

NMS Design Model based on Component Outsourcing (컴포넌트 아웃소싱에 기반한 NMS 디자인 모델)

  • 이광형
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.851-860
    • /
    • 2002
  • By managing various communication networks, we have Telecommunication Management Network(TMN) which has the aim of unified and effective communication network operation and maintenance. However, since TMN has been developed by different platforms in the implementation process, several problems have been found in the step of developing and maintaining the class of TMN system agent. In order to solve these problems, this paper suggests the component outsourcing concept which is based on Component Based Development.

  • PDF

Statistical Characteristics of Self-similar Data Traffic (자기유사성을 갖는 데이터 트래픽의 통계적인 특성)

  • Koo Hye-Ryun;Hong Keong-Ho;Lim Seog-Ku
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.410-415
    • /
    • 2005
  • Recent measurements of local-area and wide-area traffic have shown that network traffic exhibits at a wide range of scales - Self-similarity. Self-similarity is expressed by long term dependency, this is contradictory concept with Poisson model that have relativity short term dependency. Therefore, first of all for design and dimensioning of next generation communication network, traffic model that are reflected burstness and self-similarity is required. Here self-similarity can be characterized by Hurst parameter. In this paper, when different many data traffic being integrated under various environments is arrived to communication network, Hurst Parameter's change is analyzed and compared with simulation results.

  • PDF

Teleoperation of an Autonomous Mobile Robot Based on H.263 and Internet (H.263과 인터넷을 이용한 자율 이동 로봇의 원격 운용)

  • Park, Bok-Man;Kang, Geun-Taek;Lee, Won-Chang
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.183-187
    • /
    • 2002
  • This paper proposes a remote control system that combines computer network and an autonomous mobile robot. We control remotely an autonomous mobile robot with vision via the internet to guide it under unknown environments in the real time. The main feature of this system is that local operators need a World Wide Web browser and a computer connected to the internet communication network and so they can command the robot in a remote location through our Home Page. This system offers an image compression method using motion H.263 concept which reduces large time delay that occurs in network during image transmission.

  • PDF

Internal Teleoperation of an Autonomous Mobile Robot (인터넷을 이용한 자율운행로봇의 원격운용)

  • 박태현;강근택;이원창
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.45-45
    • /
    • 2000
  • This paper proposes a remote control system that combines computer network and an autonomous mobile robot. We control remotely an autonomous mobile robot with vision via the internet to guide it under unknown environments in the real time. The main feature of this system is that local operators need a World Wide Web browser and a computer connected to the internet communication network and so they can command the robot in a remote location through our Home Page. The hardware architecture of this system consists of an autonomous mobile robot, workstation, and local computers. The software architecture of this system includes the server part for communication between user and robot and the client part for the user interface and a robot control system. The server and client parts are developed using Java language which is suitable to internet application and supports multi-platform. Furthermore, this system offers an image compression method using motion JPEG concept which reduces large time delay that occurs in network during image transmission.

  • PDF

Design of Neuro-Fuzzy Controller using Relative Gain Matrix (상대이득행렬을 이용한 뉴로 퍼지 제어기의 설계)

  • 서삼준;김동식
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.157-157
    • /
    • 2000
  • In the fuzzy control for the multi-variable system, it is difficult to obtain the fuzzy rule. Therefore, the parallel structure of the independent single input-single output fuzzy controller using a pairing between the input and output variable is applied to the multi-variable system. The concept of relative gain matrix is used to obtain the input-output pairs. However, among the input/output variables which are not paired the interactive effects should be taken into account. these mutual coupling of variables affect the control performance. Therefore, for the control system with a strong coupling property, the control performance is sometimes lowered. In this paper, the effect of mutual coupling of variables is considered by tile introduction of a simple compensator. This compensator adjusts the degree of coupling between variables using a neural network. In this proposed neuro-fuzzy controller, the Neural network which is realized by back-propagation algorithm, adjusts the mutual coupling weight between variables.

  • PDF

Throughput-Reliability Tradeoff in Decode-and-Forward Cooperative Relay Channels: A Network Information Theory Approach

  • Li, Jun;Chen, Wen
    • Journal of Communications and Networks
    • /
    • v.11 no.5
    • /
    • pp.445-454
    • /
    • 2009
  • Cooperative transmission protocols are always designed to achieve the largest diversity gain and the network capacity simultaneously. The concept of diversity-multiplexing tradeoff (DMT) in multiple input multiple output (MIMO) systems has been extended to this field. However, DMT constrains a better understanding of the asymptotic interplay between transmission rate, outage probability (OP) and signal-to-noise ratio. Another formulation called the throughput-reliability tradeoff (TRT) was then proposed to avoid such a limitation. By this new rule, Azarian and Gamal well elucidated the asymptotic trends exhibited by the OP curves in block-fading MIMO channels. Meanwhile they doubted whether the new rule can be used in more general channels and protocols. In this paper, we will prove that it does hold true in decode-and-forward cooperative protocols. We deduce the theoretic OP curves predicted by TRT and demonstrate by simulations that the OP curves will asymptotically overlap with the theoretic curves predicted by TRT.

Context-Driven Framework for High Level Configuration of Virtual Businesses (가상기업의 형성을 위한 컨텍스트 기반 프레임워크)

  • Lee, Kyung-Huy;Oh, Sang-Bong
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.2
    • /
    • pp.11-26
    • /
    • 2007
  • In this paper we suggest a context-driven configuration model of virtual businesses to form a business network model consisting of role-based, interaction-centered business partners. The model makes use of the subcontext concept which explicitly represents actors and interactions in virtual business (VB) context. We separate actors who have capacities on tasks in a specific kind of role and actor subcontext which models requirements in specific interaction subcontext. Three kinds of actors are defined in virtual service chains, service user, service provider, and external service supporter. Interaction subcontext models a service exchange process between two actor subcontexts with consideration of context dependencies like task and quality dependencies. Each subcontext may be modeled in the form of a situation network which consists of a finite set of situation nodes and transitions. A specific situation is given in a corresponding context network of actors and interactions. It is illustrated with a simple example.

  • PDF