• Title/Summary/Keyword: Internet Round

Search Result 165, Processing Time 0.024 seconds

Rmap+: Autonomous Path Planning for Exploration of Mobile Robot Based on Inner Pair of Outer Frontiers

  • Buriboev, Abror;Kang, Hyun Kyu;Lee, Jun Dong;Oh, Ryumduck;Jeon, Heung Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3373-3389
    • /
    • 2022
  • Exploration of mobile robot without prior data about environments is a fundamental problem during the SLAM processes. In this work, we propose improved version of previous Rmap algorithm by modifying its Exploration submodule. Despite the previous Rmap's performance which significantly reduces the overhead of the grid map, its exploration module costs a lot because of its rectangle following algorithm. To prevent that, we propose a new Rmap+ algorithm for autonomous path planning of mobile robot to explore an unknown environment. The algorithm bases on paired frontiers. To navigate and extend an exploration area of mobile robot, the Rmap+ utilizes the inner and outer frontiers. In each exploration round, the mobile robot using the sensor range determines the frontiers. Then robot periodically changes the range of sensor and generates inner pairs of frontiers. After calculating the length of each frontiers' and its corresponding pairs, the Rmap+ selects the goal point to navigate the robot. The experimental results represent efficiency and applicability on exploration time and distance, i.e., to complete the whole exploration, the path distance decreased from 15% to 69%, as well as the robot decreased the time consumption from 12% to 86% than previous algorithms.

Protection of Private information in Electronic Commerce (전자상거래에 있어 개인정보 보호에 관한 국.내외의 비교연구)

  • Cheung, Chong-Soo
    • International Commerce and Information Review
    • /
    • v.4 no.2
    • /
    • pp.77-96
    • /
    • 2002
  • Through the new round DDA(Doha Development Agenda) negotiations which started in Doha/Qatar conference in November, 2001, service industries have been included in the category of international trades. An electronic commerce cannot be exceptional in this field. The 21st century is largely recognized as the era of globalization, knowledge, and information. To make effective and competitive strategy in this century, it is essentially required to organize Network. OPEN, and FU-PLEX. That is why our government also has been promoting this field since years before, now 10,000,000 people in Korea have joined superhighway internet networks. Korea became the top internet-developed country in the world. As a side-effect of this internet spread into our life, however, there is serious problem we are now faced against. That is the outflow of private information through electronic commerce and other cyber transactions. It has caused many social problems to be rapidly on the rise these days. We are now desperately required to struggle continuously to make a solution for that. Taking the precedent case of Germany and United States which are currently recognized as high-leveled country in protection of private information, we have to come up with legal and technical measures and at the same time, to escalate the social consciousness about private information protection.

  • PDF

Secure Bootstrapping Methods of a Mobile Node on the Mobile IPv6 Network (IPv6기반 이동인터넷 환경에서 이동노드의 안전한 시동에 관한 방법)

  • Nah Jaehoon;Chung Kyoil;Han Chi-Moon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.3 s.303
    • /
    • pp.1-8
    • /
    • 2005
  • At IETF (Internet Engineering Task Force), recently RFC3775, RFC3776 documents about the mobile IPv6 were standardized by IETF (Internet Engineering Task Force). Those specifications propose that during the roaming, the mobile node sends securely the binding update to the home agent and the correspondent node after setting the security association between Mobile Node and Home Agent. But there is no secure bootstrapping method between a mobile node and a home agent at the two RFC documents. This paper proposed a method for the secure bootstrapping between a mobile node and a home agent. This makes the authentication, binding update, home agent assignment, security association distribution through the AAA-based secure channel between mobile node and home agent. And the proposed method was analyzed in the view of the procedure, round trip and security strength.

Design of Crypto-processor for Internet-of-Things Applications (사물인터넷 응용을 위한 암호화 프로세서의 설계)

  • Ahn, Jae-uk;Choi, Jae-Hyuk;Ha, Ji-Ung;Jung, Yongchul;Jung, Yunho
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.2
    • /
    • pp.207-213
    • /
    • 2019
  • Recently, the importance for internet of things (IoT) security has increased enormously and hardware-based compact chips are needed in IoT communication industries. In this paper, we propose low-complexity crypto-processor that unifies advanced encryption standard (AES), academy, research, institute, agency (ARIA), and CLEFIA protocols into one combined design. In the proposed crypto-processor, encryption and decryption processes are shared, and 128-bit round key generation process is combined. Moreover, the shared design has been minimized to be adapted in generic IoT devices and systems including lightweight IoT devices. The proposed crypto-processor was implemented in Verilog hardware description language (HDL) and synthesized to gate level circuit in 65nm CMOS process, which results in 11,080 gate counts. This demonstrates roughly 42% better than the aggregates of three algorithm implementations in the aspect of gate counts.

A Study on the Buffer Management and Scheduling of TCP/IP for GFR service in the ATM networks (ATM망에서 GFR서비스를 위한 TCP/IP의 버퍼 관리방법과 스케쥴링에 관한 연구)

  • 문규춘;최현호;박광채
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.275-278
    • /
    • 2000
  • Recently ATM(Asynchronous Transfer Mode) technology is facing challenges from Integrated Service IP(Internet Protocol), IP router, Gigabit Ethernet. Although ATM is approved by ITU-T as the standard technology in B-ISDN, its survival is still in question. In the ATM networks, the Guaranteed Frame Rate(GFR) service has been designed to accommodate non-real-time applications, such as TCP(Transmission Control Protocol)/IP based traffic. The GFR service not only guarantees a minimum throughput at the frame level, but also supports a fairshare of available resources. We have studied different discarding and scheduling schemes, and compared their throughput and fairness when TCP/IP Traffic is carried. Through simulations, we know that only per-VC queueing with weighted Round Robin(WRR) can guarantee Minimum Cell Rate Among all the Schemes that have been experimented, we recommend DT-EPD(Dynamic Threshold-Early Packet Discard) integrated with MCRplus(Minimum Cell Rate) to support the GFR service.

  • PDF

Design and Evaluation of Telematics User Interface for Ubiquitous Vehicle

  • Hong, Won-Kee;Kim, Tae-Hwan;Ko, Jaepil
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.3
    • /
    • pp.9-15
    • /
    • 2014
  • In the ubiquitous computing environment, a ubiquitous vehicle will be a communication node in the vehicular network as well as the means of ground transportation. It will make humans and vehicles seamlessly and remotely connected. Especially, one of the prominent services in the ubiquitous vehicle is the vehicle remote operation. However, mutual-collaboration with the in-vehicle communication network, the vehicle-to-vehicle communication network and the vehicle-to-roadside communication network is required to provide vehicle remote operation services. In this paper, an Internet-based human-vehicle interfaces and a network architecture is presented to provide remote vehicle control and diagnosis services. The performance of the proposed system is evaluated through a design and implementation in terms of the round trip time taken to get a vehicle remote operation service.

Location-awareness based Hybrid P2P System (위치 인식 기반 계층형 P2P 시스템)

  • Min, Su-Hong;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.448-450
    • /
    • 2007
  • Peer-to-Peer system has emerged as a popular model aiming at further utilizing Internet information and resources, complementing the available client-server services. However, the mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical location aware topology can cause serious performance degradation. In this paper, we consider the network distance between peers so that it helps peers select neighbors located at the nearest when they exchange queries for sharing of resources. To reduce the unnecessary signaling traffic and delay of query exchange, we propose a location aware topology based Hybrid P2P system. This system calculates the network distance which combines the direct measurement such as RTT (Round Trip Time) with geographic space of peers using IP address

  • PDF

A Delayed Multiple Copy Retransmission Scheme for Data Communication in Wireless Networks

  • Niu, Zhisheng;Wu, Yi;Zhu, Jing
    • Journal of Communications and Networks
    • /
    • v.5 no.3
    • /
    • pp.222-229
    • /
    • 2003
  • In this paper, we propose a delayed multiple copy retransmission (DMCR) scheme for data communication in wireless networks, by which multiple copies of a lost link layer frame are retransmitted one-by-one with a retransmission delay in between. The number of the copies gradually increases with the number of retransmissions. Furthermore, for implementation of the DMCR scheme in practical mobile communication system, we also propose a dynamic retransmission scheme by interleaving and a new round-robin scheduling algorithm. We compare our scheme with the previous non-delayed retransmission schemes on the performance of frame loss probability, channel capacity and total transmission time. Numerical results show that the DMCR scheme can achieve higher performance. The effect of the delay time on endto-end TCP throughput is investigated as well.

An Improvement on Control Data Transmission Method for Performance Elevation of Router (라우터의 성능향상을 위한 제어 데이터 전송방법 개선)

  • Youn, Chun-Kyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1283-1286
    • /
    • 2005
  • 최근의 대용량 다중 분산 라우터 시스템은 다수의 라인 인터페이스 모듈들과 라우팅 처리 모듈, 스위칭 패브릭 모듈로 구성되어 있고, 고속의 패킷 스위칭 및 라우팅을 구현하기 위하여 일반적으로 입력 패킷을 외부로 전송하기 위한 기능과 제어 및 관리 기능을 담당하는 기능으로 분리하여 실행되고 있다. 이러한 라우터에서는 내부 모듈들의 프로세서들 사이에 정보 송수신을 위해 프로세서 간 통신(IPC : Interprocess Communication)이 이용되고 있다. 라우터의 기능 중 제어 및 관리 기능은 신속한 처리를 위하여 UDP/IP 방식의 IPC 가 사용되고 있는데, 이 UDP/IP 방식을 개선 방안을 제안하고 prototype 시스템을 구현하여 시험한 결과 라우터의 데이터 round trip 시간과 throughput 이 각각 15.1%, 4.3%의 개선되어 라우터의 성능이 향상되었다.

  • PDF

Congestion Control of CBT Multicast Routing Mechanism with load balancing on Internet (로드 밸런싱을 이용한 CBT 멀티캐스트 라우팅 프로토콜의 혼잡제어기법)

  • Yoe, Hyun;So, Sun-Hwe;Lee, Yoon-Ju
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.154-157
    • /
    • 2001
  • In this paper, we propose a new CBT(core-based tree)multicast routing Mechanism by load balancing mechanism. CBT may result in traffice concentration and bottlenecks near the lore routers since traffice from all sources nodes the same set of links as approaches the core. So the router have to load packet to new core router for such congestion. Congestion information is given by rtt(round trip time) between designed core router and the other router.

  • PDF