• Title/Summary/Keyword: Form of Communication

Search Result 2,237, Processing Time 0.032 seconds

Network Architecture and Routing Protocol for Supporting Mobile IP in Mobile Ad Hoc Networks (이동 애드 혹 네트워크의 Mobile IP 지원을 위한 네트워크 구조 및 라우팅 프로토콜)

  • Oh, Hoon;TanPhan, Anh
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1A
    • /
    • pp.24-35
    • /
    • 2008
  • We propose a tree-based integrated network of infrastructure network and mobile ad hoc network to effectively support Mobile IP for mobile ad hoc networks and also proposed a network management protocol for formation and management of the integrated network and a tree-based routing protocol suitable for the integrated network. The integrated network has fixed gateways(IGs) that connect two hybrid networks and the mobile nodes in the network form a small sized trees based on the mobile nodes that are in the communication distance with a IG. A new node joins an arbitrary tree and is registered with its HA and FA along tree path. In addition, the proposed protocol establishes a route efficiently by using the tree information managed in every node. We examined the effectiveness of the tree-based integrated network for some possible network deployment scenarios and compared our routing protocol against the Mobile IP supported AODV protocol.

The Implementation of Integrated e-Catalog Transformation and Management System based on B2B using XSLT (XSLT를 이용한 B2B 기반의 통합형 e-Catalog 변환 및 관리 시스템 구현)

  • 김윤기;김창수;정회경
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1582-1589
    • /
    • 2003
  • It is said that electronic documents to exchange information about goods and service in electronic form for electronic commerce between enterprise and enterprise(B2B) liver or enterprise and consumer(B2C) are e-Catalog, e-Catalog used in electronic commerce is important element that can express well enterprise's special quality of goods and product effectively from infinite Internet space. However, e-Catalog system been using in electronic commerce is no clear concept and consistent component etc. and is constructing each other dissimilar system and there is shortcoming that can not use e-Catalog information in exchange and transaction thereby. Hereupon, in this paper, defined e-Catalog document rescue that can process goods information configurationally using XML Schema to increase interoperability in selfishness species system. Also, change e-Catalog document that was defined as XML to e-Catalog document of other structure using XSLT and designed and embody integrated e-Catalog system so that may manage.

A New Small Size Digital Optical Ozone Monitor Using CCD Array as a UV Detector (UV 감지기로서 CCD어레이를 사용한 소형 디지털 광 오존모니터)

  • Chung, Wan-Young;Lee, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.1
    • /
    • pp.158-163
    • /
    • 2008
  • Ozone monitor based on UV techniques has been widely used due to their signal stability. The high concentration ozone monitor for real time ozone monitoring from ozone generator was composed of a low pressure mercury lamp as UV source and a photo multiplier tube as UV detector. The structure could be very useful for low price high concentration ozone monitor and showed good linearity to ozone in the concentration range between 0.05 and 2wt%. For accurate ambient ozone monitoring, the system composed of a high power pulsed xenon lamp as UV source, an optical spectrometer with a high sensitivity linear CCD array as UV detector. The optical signal form the CCD array was converted to digital signal, and the digital signal was displayed on screen using PC interface. The developed system showed good linearity and sensitivity in relatively low measuring range between 10ppm and 10,000ppm, and showed some feasibility of hish resolution ozone monitor using CCD array as a photodetecor.

U-Healthcare & Medical Information System of Status and Operative Challenges for Integrated Medical Information System (U-Healthcare 및 의료정보시스템의 현황과 통합의료정보시스템을 위한 운영과제)

  • Kim, Bo-Soo
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.65-75
    • /
    • 2011
  • For the latest information and communication technology convergence with related technology to integrate all the systems has been developed in the form. In this era as well as the flow of the healthcare industry in recent years many studies on the development and application has been actively. Health IT in healthcare information systems that integrate information systems that have evolved rapidly in the direction to go, and in the future it is expected to do better acceleration. In this paper, state-led ubiquitous environment for building the hospital application system and IT application services are practical and Free in the integrated health information for the patient care service strengthening to integrated medical information system proposal and design do's and At the same time the establishment of integrated health information systems plans and operational challenges presented.

A Study on the Countermeasure of Cyber Attacks Using Anonymous Network (익명네트워크를 이용한 사이버공격에 대한 대응방안 연구)

  • Lee, Jung-Hyun;Ahn, Kwan-Joon;Park, Won-Hyung;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.31-37
    • /
    • 2011
  • Recently on tile network to ensure the anonymity of Mixed networking has been actively researched. It uses encrypted communications between Nodes and communications path is changed often to the attacker traceback and response, including the difficult thing is the reality. National institutions and infrastructure in these circumstances, the attack on the national level, if done on a large scale can be disastrous in. However, an anonymous network technology to cover up their own internet communication, it malicious form of Internet use by people who enjoy being continually updated and new forms of technology being developed is a situation continuously. In addition, attacks in the future application of these technologies is expected to continue to emerge. However, this reality does not deserve this thesis is prepared. In this paper, anonymously using a network to respond effectively to a cyber attack on the early detection research is to proceed.

Intelligent Bridge Safety Prediction Edge System (지능형 교량 안전성 예측 엣지 시스템)

  • Jinhyo Park;Taejin Lee;Yong-Geun Hong;Joosang Youn
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.12
    • /
    • pp.357-362
    • /
    • 2023
  • Bridges are important transportation infrastructure, but they are subject to damage and cracking due to various environmental factors and constant traffic loads, which accelerate their aging. With many bridges now older than their original construction, there is a need for systems to ensure safety and diagnose deterioration. Bridges are already utilizing structural health monitoring (SHM) technology to monitor the condition of bridges in real time or periodically. Along with this technology, the development of intelligent bridge monitoring technology utilizing artificial intelligence and Internet of Things technology is underway. In this paper, we study an edge system technique for predicting bridge safety using fast Fourier transform and dimensionality reduction algorithm for maintenance of aging bridges. In particular, unlike previous studies, we investigate whether it is possible to form a dataset using sensor data collected from actual bridges and check the safety of bridges.

Phase-based Model Using Web Documents for Korean Unknown Word Recognition (웹문서를 이용한 단계별 한국어 미등록어 인식 모델)

  • Park, So-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1898-1904
    • /
    • 2009
  • Recently, real documents such as newspapers as well as blogs include newly coined words such as "Wikipedia". However, most previous information processing technologies cannot deal with these newly coined words because they construct their dictionaries based on materials acquired during system development. In this paper, we propose a model to automatically recognize Korean unknown words excluded from the previously constructed dictionary. The proposed model consists of an unknown noun recognition phase based on full text analysis, an unknown verb recognition phase based on web document frequency, and an unknown noun recognition phase based on web document frequency. The proposed model can recognize accurately the unknown words occurred once and again in a document by the full text analysis. Also, the proposed model can recognize broadly the unknown words occurred once in the document by using web documents. Besides, the proposed model fan recognize both a Korean unknown verb, which syllables can be changed from its base form by inflection, and a Korean unknown noun, which syllables are not changed in any eojeol. Experimental results shows that the proposed model improves precision 1.01% and recall 8.50% as compared with a previous model.

A Study for Depth-map Generation using Vanishing Point (소실점을 이용한 Depth-map 생성에 관한 연구)

  • Kim, Jong-Chan;Ban, Kyeong-Jin;Kim, Chee-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.2
    • /
    • pp.329-338
    • /
    • 2011
  • Recent augmentation reality demands more realistic multimedia data with the mixture of various media. High-technology for multimedia data which combines existing media data with various media such as audio and video dominates entire media industries. In particular, there is a growing need to serve augmentation reality, 3-dimensional contents and realtime interaction system development which are communication method and visualization tool in Internet. The existing services do not correspond to generate depth value for 3-dimensional space structure recovery which is to form solidity in existing contents. Therefore, it requires research for effective depth-map generation using 2-dimensional video. Complementing shortcomings of existing depth-map generation method using 2-dimensional video, this paper proposes an enhanced depth-map generation method that defines the depth direction in regard to loss location in a video in which none of existing algorithms has defined.

Cacti-based Network Traffic Monitoring System Using Libpcap (Libpcap를 이용한 Cacti기반 네트워크 트래픽 모니터링 시스템)

  • Lee, Sung-Ock;Jiang, Zhu;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1613-1618
    • /
    • 2012
  • For network is growing at a rapid rate, network environment is more complex. The technology of using network traffic to monitor our network in real-time is developed. Cacti is a representative monitoring tool which based on RRDTool(Round Robin Database tool), SNMP(Simple Network Management Protocol). In this paper, it show you how to develop a system which based on Cacti and Libpcap to monitor our monitored objects. At this system, using Libpcap to capture network traffic packets, analyze these packets and then turn out in Cacti in graphical form. So as to achieve monitoring system. This system's execution is efficient and the management is easy and the results are accurate, so it can be widely utilized in the future.

An Improved Depth-Based TDMA Scheduling Algorithm for Industrial WSNs to Reduce End-to-end Delay (산업 무선 센서 네트워크에서 종단 간 지연시간 감소를 위한 향상된 깊이 기반 TDMA 스케줄링 개선 기법)

  • Lee, Hwakyung;Chung, Sang-Hwa;Jung, Ik-Joo
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.530-540
    • /
    • 2015
  • Industrial WSNs need great performance and reliable communication. In industrial WSNs, cluster structure reduces the cost to form a network, and the reservation-based MAC is a more powerful and reliable protocol than the contention-based MAC. Depth-based TDMA assigns time slots to each sensor node in a cluster-based network and it works in a distributed manner. DB-TDMA is a type of depth-based TDMA and guarantees scalability and energy efficiency. However, it cannot allocate time slots in parallel and cannot perfectly avoid a collision because each node does not know the total network information. In this paper, we suggest an improved distributed algorithm to reduce the end-to-end delay of DB-TDMA, and the proposed algorithm is compared with DRAND and DB-TDMA.