• Title/Summary/Keyword: Issue-network

Search Result 1,546, Processing Time 0.028 seconds

Reliable Transmission Using Intermediate Relay Node-based Transmission for Reliability in Sensor Network (센서 네트워크의 고 신뢰성을 위한 중계 노드 기반 전송)

  • Lee Bo-Hyung;Yoon Hyung-Wook;Park Jongho;Chung Min Young;Lee Tea-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9A
    • /
    • pp.850-857
    • /
    • 2005
  • Sensor networks consist of sensor nodes with small size, low cost, lowpower consumption, and multi-functions to sense, to process and to communicate. The main issue in sensor networks has been focused on minimizing power consumption of sensors to maximize network life time. In some critical applications, however, the most important issue is to transmitsensing information to the end user (the sink node) with reliability. Reliable information forwarding using multiple paths in sensor networks (ReinForM) has been proposed to achieve desired reliability in the error-prone channel, but it needs increasing transmission riverhead as the channel error rate becomes high and the number of hops between the source node and the sink node increases. In this paper, we propose a reliable transmission rnechanissmusing intermediate source nodes in sensor networks (ReTrust) to reduce packet overhead while keeping the desired reliability. ReTrust has beenshown to provide desired reliability and reduced overhead via simulationsand analysis.

A study of Web Service Security System using the Secure Network Transfer Message (안전한 네트워크 전송 메시지를 이용한 웹 서비스 보안 시스템에 관한 연구)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.850-853
    • /
    • 2008
  • As th Internet grew rapidly, the Electronic Commerce that is based on Internet increased. The Electronic Commerce is unsubstantial in the mutual authentication between the parties and a commerce As a solution to this issue, a Web server uses a Client Message technology. The purpose of Client Message is to validate the user and the electronic commercial transaction. Further, it increases efficiency and offers several ability at various purposes. However, the Client Message is transferred and stored as an unencrypted text file, the information can be exposed easily to the network threats, end system threats, and Client Message harvesting threats. In this paper designed by used crypto algorithm a Secure Message as a solution to the issue have proposed above. Further, designed a security service per Network transmitting message to transfer client's user input information to a Web server safety.

  • PDF

The Effects of Social Environmental Issue on the Establishment of Internal & External Network and Sustainable Environmental Management Performance (사회적 환경이슈화가 기업의 내·외부 네트워크구축 및 지속가능 환경경영성과에 미치는 영향)

  • Park, Nam Hong;Kim, Dae Yong
    • Smart Media Journal
    • /
    • v.9 no.2
    • /
    • pp.78-85
    • /
    • 2020
  • This study aims to clarify the impact of environmental issues on sustainable environmental management performance through the establishment of internal and external networks and environmental management activities. As a result of analyzing 163 final collected data of companies, social environmental issues did not have a significant effect on the internal sharing system, but they had a significant positive effect on both regulatory response and cooperation network establishment. In addition, the regulatory response to the environment has a significant effect on both the internal sharing system, cooperation network establishment, and environmental management activities. Lastly, environmental management activities have a significant impact on sustainable environmental management performance, indicating that environmental issues are leading to environmental management activities and performance by promoting sustainable growth of companies.

A Scheduling Scheme Considering Multiple-Target Coverage and Connectivity in Wireless Sensor Networks (무선 센서 네트워크에서 다중 타겟 커버리지와 연결성을 고려한 스케줄링 기법)

  • Kim, Yong-Hwan;Han, Youn-Hee;Park, Chan-Yeol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.453-461
    • /
    • 2010
  • A critical issue in wireless sensor networks is an energy-efficiency since the sensor batteries have limited energy power and, in most cases, are not rechargeable. The most practical manner relate to this issue is to use a node wake-up scheduling protocol that some sensor nodes stay active to provide sensing service, while the others are inactive for conserving their energy. Especially, CTC (Connected Target Coverage) problem has been considered as a representative energy-efficiency problem considering connectivity as well as target coverage. In this paper, we propose a new energy consumption model considering multiple-targets and create a new problem, CMTC (Connected Multiple-Target Coverage) problem, of which objective is to maximize the network lifetime based on the energy consumption model. Also, we present SPT (Shortest Path based on Targets)-Greedy algorithm to solve the problem. Our simulation results show that SPT-Greedy algorithm performs much better than previous algorithm in terms of the network lifetime.

Design of the Energy Efficient Virtual Backbone Construction in the Zigbee Network (지그비 네트워크에서 효율적인 에너지 관리를 위한 가상 백본 설계)

  • Kim, Bo-Nam;Lee, Jin-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2413-2418
    • /
    • 2007
  • IN wireless sensor networks (WSNs), one challenging issue is to In wireless sensor networks (WSNs), one challenging issue is to construct a virtual backbone in a distributed and localized way while considering energy limitation. Dominating set has been used extensively as core or virtual backbone in WSNs for the purposes like routing and message broadcast. To ensure network performance, a good dominating set construction protocols should be simple and avoid introducing extra message. In addition, the resulting dominating set should be small, connected, and take into account the energy level at each node. This paper studies efficient and simple virtual backbone construction protocol using defer time in IEEE 802.15.4- based WSNs (e.g. Zigbee). The efficiency of our proposed protocol is confirmed through simulation results.

Exploring the Issue Structure of Drone Crime in Newspaper Articles: Focusing on Language Network Analysis (신문 기사에서의 드론 범죄 관련 이슈구조 탐색: 언어 네트워크 분석을 중심으로)

  • Park, Hee-Young;Lee, Soo-Bum
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.11
    • /
    • pp.20-29
    • /
    • 2021
  • This study aims to explore the issue of drones and crime in newspaper articles. BIG KINDS, an online news archive of the Korea Press Foundation, collected 1,213 newspaper articles that met the terms of "drone" and "crime" in 11 central and 28 regional comprehensive newspapers between January 1, 1990 and May 1, 2021. Among them, we perform keyword frequency, centrality analysis, network structure construction, CONCOR analysis, and density matrix analysis on 117 key keywords. According to the analysis, the main issues were classified into eight, and the report analysis on drones and crimes in newspaper articles showed that the government's policy-making and social problems on protecting people's privacy, preventing illegal filming, securing navigation safety, social security and resolution. This study attempts to expand the field of humanities and social studies related to drones and crime, and specifically suggests the current status and counterplan against drone-related crimes as policy implications and media implications.

The Interoperability Issue in Broadband Convergence network Implementation (광대역통합망 구축에서 상호운용성 이슈)

  • Lee, Jae-Jeong;Ryu, Han-Yang;Nam, Ki-Dong;Kim, Chang-Bong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.2
    • /
    • pp.57-64
    • /
    • 2011
  • The NGN (Next Generation Network) means the kernel infrastructure technology to provide information and communication services which are able to be used at present and future when a ubiquitous computing era has been realized. In other words, NGN can be the frame providing the same information and communication services anytime and anywhere regardless of wire and wireless. The broadband convergence network that has been built in the public institution has established a broadband multimedia communication network supporting voice telephone, task net, internet network, video conference network, voice over IP (VoIP) network and etc. It is possible for a requested bandwidth and services to be served, only if a broadband convergence network provide the interoperability between the various classes which include a transport network layer, network control layer, service control layer and other layers. In this paper, we analyzed the interoperability issues of the present broadband convergence network and propose a guideline for the future one.

Intrusion detection agents on the wireless network design (무선네트워크 상에서의 침입탐지 에이전트 설계)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.59-70
    • /
    • 2013
  • Along with the rapid development of the wireless network (Wireless Network) technology for secure wireless communications, security problems have emerged as an important issue. In order to operate the wireless network intrusion detection system detects the agent installed on each wireless node should be. Ad-hoc network structures scattered in the AP over a wireless network without the node is a structure that makes it possible to communicate to connect. Intrusion detection agent to be installed on the node, and the corresponding energy consumption occurs when the survival time is reduced. On a node that can monitor a lot of traffic in order to increase the effect of intrusion detection, an intrusion detection agent should be placed. Therefore, in this paper, by taking advantage of the structure of Ad-hoc wireless network, considering the maximum living time of the network, while at the same time, the effectiveness of intrusion detection and intrusion detection by proposing a plan for installing the agent. Also improve the system performance by reducing the network load on each network, a system designed for data aggregation to reduce data redundancy, network energy consumption by reducing.

A study on the improvement of the network fee system under network neutrality (망 중립성 하에서 망 이용대가 개선에 대한 연구)

  • Byun, Sangkyu;Do, Joonho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.3
    • /
    • pp.151-161
    • /
    • 2022
  • As Internet traffic surges due to global CPs, a request to share network investment costs has emerged in the industry. This has significantly changed the issue of the principle of network neutrality from accessibility to network fee. Some of the academic researchers had a negative view to network fees in the Internet space. However, in the industry, a number of disputes have occurred and some have escalated into court battles, and attention has been focused on the court's decision. The courts began to accept fee-for-service under network neutrality, and the government responded quickly by revising regulations. However, it still focuses on service stability, and there is no regulation that directly stipulates payment of network fee. In the study, changes in network neutrality were verified by analyzing cases of disputes between operators, court judgments, and improvement of regulations. And referring to the tragedy of the commons, the restoration of the correct price signal based on the principle of beneficiary pays was suggested as the most important solution. The payment of network fee by CP is one of the solutions.

Parallel Implementations of the Self-Organizing Network for Normal Mixtures (병렬처리를 통한 정규혼합분포의 추정)

  • Lee, Chul-Hee;Ahn, Sung-Mahn
    • Communications for Statistical Applications and Methods
    • /
    • v.19 no.3
    • /
    • pp.459-469
    • /
    • 2012
  • This article proposes a couple of parallel implementations of the self-organizing network for normal mixtures. In principle, self-organizing networks should be able to be implemented in a parallel computing environment without issue. However, the network for normal mixtures has inherent problem in being operated parallel in pure sense due to estimating conditional expectations of the mixing proportion in each iteration. This article shows the result of the parallel implementations of the network using Java. According to the results, both of the implementations achieved a faster execution without any performance degradation.