• Title/Summary/Keyword: Data-Link

Search Result 2,421, Processing Time 0.03 seconds

Link-State Routing Security Mechanism based on Double Hash Chain (이중 해쉬체인에 기반을 둔 Link-State 라우팅 보안 메커니즘)

  • 유병익;임정미;유선영;박창섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.31-40
    • /
    • 2003
  • The current security issue for the Internet is focused on the security for user data. On the other hand, the research on the security for routing protocols is not so active, considering the importance of its role for the harmonious and accurate operation of the Internet. In this paper, we investigate the security problems of the link-state routing protocol which has been employed in the Internet, and suggest a new authentication mechanism for routing messages which complements and extends the previous ones. For this purpose, a concept of dual hash chains is newly introduced, which is provably secure, and we explain how to provide both the integrity and source authentication service for routing messages based on the session hash chains.

Multi-step Ahead Link Travel Time Prediction using Data Fusion (데이터융합기술을 활용한 다주기 통행시간예측에 관한 연구)

  • Lee, Young-Ihn;Kim, Sung-Hyun;Yoon, Ji-Hyeon
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.4 s.82
    • /
    • pp.71-79
    • /
    • 2005
  • Existing arterial link travel time estimation methods relying on either aggregate point-based or individual section-based traffic data have their inherent limitations. This paper demonstrates the utility of data fusion for improving arterial link travel time estimation. If the data describe traffic conditions, an operator wants to know whether the situations are going better or worse. In addition, some traffic information providing strategies require predictions of what would be the values of traffic variables during the next time period. In such situations, it is necessary to use a prediction algorithm in order to extract the average trends in traffic data or make short-term predictions of the control variables. In this research. a multi-step ahead prediction algorithm using Data fusion was developed to predict a link travel time. The algorithm performance were tested in terms of performance measures such as MAE (Mean Absolute Error), MARE(mean absolute relative error), RMSE (Root Mean Square Error), EC(equality coefficient). The performance of the proposed algorithm was superior to the current one-step ahead prediction algorithm.

Comparison of Dynamic Origin Destination Demand Estimation Models in Highway Network (고속도로 네트워크에서 동적기종점수요 추정기법 비교연구)

  • 이승재;조범철;김종형
    • Journal of Korean Society of Transportation
    • /
    • v.18 no.5
    • /
    • pp.83-97
    • /
    • 2000
  • The traffic management schemes through traffic signal control and information provision could be effective when the link-level data and trip-level data were used simultaneously in analysis Procedures. But, because the trip-level data. such as origin, destination and departure time, can not be obtained through the existing surveillance systems directly. It is needed to estimate it using the link-level data which can be obtained easily. Therefore the objective of this study is to develop the model to estimate O-D demand using only the link flows in highway network as a real time. The methodological approaches in this study are kalman filer, least-square method and normalized least-square method. The kalman filter is developed in the basis of the bayesian update. The normalized least-square method is developed in the basis of the least-square method and the natural constraint equation. These three models were experimented using two kinds of simulated data. The one has two abrupt changing Patterns in traffic flow rates The other is a 24 hours data that has three Peak times in a day Among these models, kalman filer has Produced more accurate and adaptive results than others. Therefore it is seemed that this model could be used in traffic demand management. control, travel time forecasting and dynamic assignment, and so forth.

  • PDF

Change Acceptable In-Depth Searching in LOD Cloud for Efficient Knowledge Expansion (효과적인 지식확장을 위한 LOD 클라우드에서의 변화수용적 심층검색)

  • Kim, Kwangmin;Sohn, Yonglak
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.171-193
    • /
    • 2018
  • LOD(Linked Open Data) cloud is a practical implementation of semantic web. We suggested a new method that provides identity links conveniently in LOD cloud. It also allows changes in LOD to be reflected to searching results without any omissions. LOD provides detail descriptions of entities to public in RDF triple form. RDF triple is composed of subject, predicates, and objects and presents detail description for an entity. Links in LOD cloud, named identity links, are realized by asserting entities of different RDF triples to be identical. Currently, the identity link is provided with creating a link triple explicitly in which associates its subject and object with source and target entities. Link triples are appended to LOD. With identity links, a knowledge achieves from an LOD can be expanded with different knowledge from different LODs. The goal of LOD cloud is providing opportunity of knowledge expansion to users. Appending link triples to LOD, however, has serious difficulties in discovering identity links between entities one by one notwithstanding the enormous scale of LOD. Newly added entities cannot be reflected to searching results until identity links heading for them are serialized and published to LOD cloud. Instead of creating enormous identity links, we propose LOD to prepare its own link policy. The link policy specifies a set of target LODs to link and constraints necessary to discover identity links to entities on target LODs. On searching, it becomes possible to access newly added entities and reflect them to searching results without any omissions by referencing the link policies. Link policy specifies a set of predicate pairs for discovering identity between associated entities in source and target LODs. For the link policy specification, we have suggested a set of vocabularies that conform to RDFS and OWL. Identity between entities is evaluated in accordance with a similarity of the source and the target entities' objects which have been associated with the predicates' pair in the link policy. We implemented a system "Change Acceptable In-Depth Searching System(CAIDS)". With CAIDS, user's searching request starts from depth_0 LOD, i.e. surface searching. Referencing the link policies of LODs, CAIDS proceeds in-depth searching, next LODs of next depths. To supplement identity links derived from the link policies, CAIDS uses explicit link triples as well. Following the identity links, CAIDS's in-depth searching progresses. Content of an entity obtained from depth_0 LOD expands with the contents of entities of other LODs which have been discovered to be identical to depth_0 LOD entity. Expanding content of depth_0 LOD entity without user's cognition of such other LODs is the implementation of knowledge expansion. It is the goal of LOD cloud. The more identity links in LOD cloud, the wider content expansions in LOD cloud. We have suggested a new way to create identity links abundantly and supply them to LOD cloud. Experiments on CAIDS performed against DBpedia LODs of Korea, France, Italy, Spain, and Portugal. They present that CAIDS provides appropriate expansion ratio and inclusion ratio as long as degree of similarity between source and target objects is 0.8 ~ 0.9. Expansion ratio, for each depth, depicts the ratio of the entities discovered at the depth to the entities of depth_0 LOD. For each depth, inclusion ratio illustrates the ratio of the entities discovered only with explicit links to the entities discovered only with link policies. In cases of similarity degrees with under 0.8, expansion becomes excessive and thus contents become distorted. Similarity degree of 0.8 ~ 0.9 provides appropriate amount of RDF triples searched as well. Experiments have evaluated confidence degree of contents which have been expanded in accordance with in-depth searching. Confidence degree of content is directly coupled with identity ratio of an entity, which means the degree of identity to the entity of depth_0 LOD. Identity ratio of an entity is obtained by multiplying source LOD's confidence and source entity's identity ratio. By tracing the identity links in advance, LOD's confidence is evaluated in accordance with the amount of identity links incoming to the entities in the LOD. While evaluating the identity ratio, concept of identity agreement, which means that multiple identity links head to a common entity, has been considered. With the identity agreement concept, experimental results present that identity ratio decreases as depth deepens, but rebounds as the depth deepens more. For each entity, as the number of identity links increases, identity ratio rebounds early and reaches at 1 finally. We found out that more than 8 identity links for each entity would lead users to give their confidence to the contents expanded. Link policy based in-depth searching method, we proposed, is expected to contribute to abundant identity links provisions to LOD cloud.

Semantic Dependency Link Topic Model for Biomedical Acronym Disambiguation (의미적 의존 링크 토픽 모델을 이용한 생물학 약어 중의성 해소)

  • Kim, Seonho;Yoon, Juntae;Seo, Jungyun
    • Journal of KIISE
    • /
    • v.41 no.9
    • /
    • pp.652-665
    • /
    • 2014
  • Many important terminologies in biomedical text are expressed as abbreviations or acronyms. We newly suggest a semantic link topic model based on the concepts of topic and dependency link to disambiguate biomedical abbreviations and cluster long form variants of abbreviations which refer to the same senses. This model is a generative model inspired by the latent Dirichlet allocation (LDA) topic model, in which each document is viewed as a mixture of topics, with each topic characterized by a distribution over words. Thus, words of a document are generated from a hidden topic structure of a document and the topic structure is inferred from observable word sequences of document collections. In this study, we allow two distinct word generation to incorporate semantic dependencies between words, particularly between expansions (long forms) of abbreviations and their sentential co-occurring words. Besides topic information, the semantic dependency between words is defined as a link and a new random parameter for the link presence is assigned to each word. As a result, the most probable expansions with respect to abbreviations of a given abstract are decided by word-topic distribution, document-topic distribution, and word-link distribution estimated from document collection though the semantic dependency link topic model. The abstracts retrieved from the MEDLINE Entrez interface by the query relating 22 abbreviations and their 186 expansions were used as a data set. The link topic model correctly predicted expansions of abbreviations with the accuracy of 98.30%.

A study on the Analysis Method of Interference using SEAMCAT in UHF band (UHF대역에서의 SEAMCAT을 이용한 간섭 분석기법에 관한 연구)

  • Cho, Seung-Il;Jang, Kyoung-Seung;Kang, Sung-Chul;Lee, Joo-Hwan;Kang, Jeong-Jin;Choi, Gyoo-Seok;Cha, Jae-Sang;Kim, Seong-Kweon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.119-125
    • /
    • 2008
  • In this paper, we proposed the modeling of UHF frequency environment in a random mountainous area with line of sight. A transmitting station is defined as wanted transmitter(Wr) and a receiving station is defined as victim receiver(Vr). These set up victim link. A interference transmitter(It) and wanted receiver(Wr) set up interference link. We compared measured data at random mountainous area with data of the result using spectrum engineering advanced monte calo analysis tool(SEAMCAT), interference simulation based on the monte-carlo method. The desired received signal strength(dRSS) of SEAMCAT had the calculated error of 70% from the measured received signal strength because there was a topographical effect. Therefore, the effect of diffraction interference was included to lessen the power of transmitter in the proposed simulation. The cause of received power error are cable loss and errors of a measuring instrument. The proposed simulation modeling in UHF frequency environment expect that is the useful study on interference analysis and reassignment of broadcasting frequency.

  • PDF

Link Adaptation Method of the Block Coded Modulation for UWB-IR (무선광대역통신을 위한 블록부호화방식의 링크 적응 기법)

  • Min, Seungwook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.7
    • /
    • pp.24-35
    • /
    • 2018
  • In wireless communications environments, a link adaptation technique that selects the proper rate from among several transmission rates is adopted to cope with variations in channel status. In block coded modulation, the frame time and/or the block length can be adjusted to the channel status. A smaller frame time can cause inter-frame interference (IFI), however, a larger frame time can reduce the data rate. Therefore, frame time is the design factor decided by a tradeoff between performance and the data rate. This paper presents a method to determine the frame time based on the processing gain for the channel model, CM1~CM4, recommended by IEEE 802.15a. Also, a link adaptation technique for block coded modulation is proposed for efficient communications by varying the frame time and the block length. Through simulation, link adaptation can be carried out with a step size of 2~5 nsec in a frame time range of 14~ 50 nsec for channel models CM1~CM4.

Local Repair Routing Algorithm using Link Breakage Prediction in Mobile Ad Hoc Networks (모바일 애드 혹 네트워크에서 링크 단절 예측을 사용한 지역 수정 라우팅 알고리즘)

  • Yoo, Dae-Hun;Choi, Woong-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1173-1181
    • /
    • 2007
  • A number of routing algorithms have been studied for wireless mobile ad-hoc network. Among them, the AODV routing algorithm with on-demand method periodically transmits hello message and monitors link state during data transmission in order to maintain routing paths. When a path is disconnected, a node that senses it transmits a RERR packet to the transmitting node or transmits a RREQ locally so that the path could be repaired. With that, the control packet such as a RREQ is broadcast, which causes the consumption of bandwidth and incurs data latency. This paper proposes a LRRLBP algorithm that locally repairs a path by predicting link state before disconnecting the path based on the AODV routing protocol for solving such problems. Intensive simulations with the results using NS-2 simulator are shown for verifying the proposed protocol.

An Enhanced Data Communication Protocol based on HF Radios for supporting Naval Operations (해상작전 지원을 위한 HF 무전기 기반 개선된 데이터 통신 프로토콜)

  • Lee, Seung Gu;Kang, Seung Nam;Lee, Soon Bok;So, Eul-Deuk;Lim, Jae Sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1990-1998
    • /
    • 2017
  • The success of naval operation prioritizes the implementation of a robust communication network that delivers accurate and prompt communications to one another. The satellite, which is the main communication network of the military, is required to construct a preliminary communication network because of the enemy radio disturbance and weak point of fixed antenna. The military operational communication network has been in transition from voice-centered wireless communication network to text message-based communication network. In this paper we suggest an enhanced communication method built on Roll Call, the main communication method of ROK Navy operating tactical data link called Link-11. Simulation results display that the proposed method reduces the transmission time per unit frame by 4.3 times compared to the Roll Call and 6.3 times compared with the Round Robin & Broadcasting; it is also proved that the higher the direct reception rate, the shorter the transmission time required by 1.6 times maximum.

A Novel Frequency Planning and Power Control Scheme for Device-to-Device Communication in OFDMA-TDD Based Cellular Networks Using Soft Frequency Reuse (OFDMA-TDD 기반 셀룰러 시스템에서 디바이스간 직접통신을 위한 SFR 자원할당 및 전송 전력조절 방법)

  • Kim, Tae-Sub;Lee, Sang-Joon;Lim, Chi-Hun;Ryu, Seungwan;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.10
    • /
    • pp.885-894
    • /
    • 2012
  • Currently, Demand of data traffic has rapidly increased by popular of smart device. It is very difficult to accommodate demand of data traffic by limited resource of base station (BS). To solve this problem, method has proposed that the Device-to-Device (D2D) reduce frequency overload of the BS and all of the user equipment (UE) inside the BS and neighbor BS don't allow communicating directly to BS. However, in LTE-Advance system cellular link and sharing radio resources of D2D link, the strong interference of the cellular network is still high. So we need to eliminate or mitigate the interference. In this paper, we use the transmission power control method and Soft Frequency Reuse (SFR) resource allocation method to mitigate the interference of the cellular link and D2D link. Simulation results show that the proposed scheme has high performance in terms of Signal to Noise Ratio (SINR) and system average throughput.