• Title/Summary/Keyword: MOST Network

Search Result 6,173, Processing Time 0.04 seconds

Development of Multiple DC-Motor Control System using TCP/IP (TCP/IP를 이용한 다중 DC모터 제어시스템 구축)

  • Kim, Yi-Cheal;Jung, Tea-Soo;Kim, Seung-Hyun;Park, Ki-Heon
    • Proceedings of the KIEE Conference
    • /
    • 2004.07d
    • /
    • pp.2386-2388
    • /
    • 2004
  • Recently, rapid process of network technology has an effect on the field of control engineering. And it gives effect to network control system(NCS) research that grafts existing control system and network has been studied. According to one-chip development of TCP/IP that is the most useful in LAN server for hardware, it can usefully and conveniently apply to network control system before. This paper construct network control system that can work close-loop control takes advantage of Ethernet that is the most for general data transmission network. Here, protocol uses for data transmission makes use for TCP/IP. This work the basic data transmitter-receive experiment to take advantage of network node was produced. And then, DC-motor can be control plant. Finally, I will prove to build speed control system of multiple DC-motor through Ethernet.

  • PDF

Anonymized Network Monitoring for Intrusion Detection Systems

  • Srinivas, DB;Mohan, Sagar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.191-198
    • /
    • 2022
  • With the ever-increasing frequency of public sector and smalls-cale industries going live on the internet in developing countries, their security of which, while crucial, is often overlooked in most cases. This is especially true in Government services, whilst essential, are poorly monitored if at all. This is due to lack of funds and personnel. Most available software which can help these organizations monitor their services are either expensive or very outdated. Thus, there is a need for any developing country to develop a networking monitoring system. However, developing a network monitoring system is still a challenge and expensive and out sourcing network monitoring system to third party is a security threat. Therefore, in this article we propose a method to anonymize network logs and outsource networking monitoring system to third-party without breach in integrity of their network logs.

A Study on the Design Method of dynamic gateway system for MOST GATEWAY Performance Analysis in MOST25 and MOST150 Networks (MOST25와 MOST150 네트워크에서 효율적인 데이터 전송을 위한 MOST GATEWAY 성능분석을 위한 설계 방안)

  • Jang, Seong-Jin;Jang, Jong-Yug
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.712-715
    • /
    • 2010
  • In recent years, the driver needs the convenience of their vehicles and that there is an increasing requirement. Many researches have been mainly focused on MOST Networks to provide quality of multimedia service. The MOST network to support different bandwidth(MOST 25, MOST 50, MOST 150) should consist of a heterogeneous network. So the networks to used different protocols required gateway for receive and transmit information. The method to used gateway has problems occured loss of a packet by a lot of delay. In our previous research, we proposed a MOST GATEWAY system for organically connected to the network MOST150 and MOST 25. Therefore in this paper, we propose a simulation design Method of dynamic gateway system for MOST GATEWAY Performance Analysis in MOST25 and MOST150 Networks.

  • PDF

A Simulation Modeling for the Effect of Resource Consumption Attack over Mobile Ad Hoc Network

  • Raed Alsaqour;Maha Abdelhaq;Njoud Alghamdi;Maram Alneami;Tahani Alrsheedi;Salma Aldghbasi;Rahaf Almalki;Sarah Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.111-119
    • /
    • 2023
  • Mobile Ad-hoc Network (MANET) is an infrastructure-less network that can configure itself without any centralized management. The topology of MANET changes dynamically which makes it open for new nodes to join it easily. The openness area of MANET makes it very vulnerable to different types of attacks. One of the most dangerous attacks is the Resource Consumption Attack (RCA). In this type of attack, the attacker consumes the normal node energy by flooding it with bogus packets. Routing in MANET is susceptible to RCA and this is a crucial issue that deserves to be studied and solved. Therefore, the main objective of this paper is to study the impact of RCA on two routing protocols namely, Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR); as a try to find the most resistant routing protocol to such attack. The contribution of this paper is a new RCA model (RCAM) which applies RCA on the two chosen routing protocols using the NS-2 simulator.

A Study on dynamic gateway system for MOST GATEWAY Scheduling Algorithm in MOST25 and MOST150 Networks (MOST25와 MOST150 네트워크에서 효율적인 데이터 전송을 위한 MOST GATEWAY 스케줄링 알고리즘에 관한 연구)

  • Jang, Seong-jin;Jang, Jong-yug
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.784-788
    • /
    • 2009
  • In recent years, the driver needs the convenience of their vehicles and that there is an increasing requirement. Many researches have been mainly focused on MOST Networks to provide quality of multimedia service. The MOST network to support different bandwidth(MOST 25, MOST 50, MOST 150) should consist of a heterogeneous network. So the networks to used different protocols required gateway for receive and transmit information. The method to used gateway has problems occured loss of a packet by a lot of delay. Therefore in this paper, we propose a MOST GATEWAY system for organically connected to the network MOST150 and MOST 25. After analyzing the performance of the existing scheduling algorithm, we will present an improvement scheme of the efficiency and scalability.

  • PDF

Network Analysis to Describe Service Link for Customized Visiting Health Care Program (맞춤형방문건강관리사업의 지역사회 네트워크 탐색)

  • Jang, Soong-Nang;Cho, Sung-Il
    • Korean Journal of Health Education and Promotion
    • /
    • v.29 no.1
    • /
    • pp.1-11
    • /
    • 2012
  • Objectives: The nurse visiting health service named Customized Visiting Health Care Program(CVHCP) requires the service innovations incorporating community support into a local service network. The purpose of this study was to assess the community network in CVHCP and inform improvement in this network. Methods: We used Social Network Analysis(SNA) in one CVHCP at H city. Network links were generated by self-administered questionnaires by the 14 community resource centers who quantified their links to all other 25 agents on the list. Links were analyzed by a dichotomous scale for any experience of collaboration and a scored scale of 0 to 3 for level of collaboration using UCINET v6. Results: A list of 14 agents was generated, and local network was dominated by the Public Health Center and a local welfare center named Unlimited Care Center(UCC). According to centrality score, UCC was the most prominent agent, and Public Health Center was the most influential agent, being a link in the pathway flow between other agents for 9.5% of contribution. CVHCP scored lower rank of prominent with 30.8% of other agents reported referring to it. Conclusions: Social network analysis provides a useful network description for informing and evaluation service network improvement in maximizing its service for the CVHCP.

A Network-based Optimization Model for Effective Target Selection (핵심 노드 선정을 위한 네트워크 기반 최적화 모델)

  • Jinho Lee;Kihyun Lee
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.53-62
    • /
    • 2023
  • Effects-Based Operations (EBO) refers to a process for achieving strategic goals by focusing on effects rather than attrition-based destruction. For a successful implementation of EBO, identifying key nodes in an adversary network is crucial in the process of EBO. In this study, we suggest a network-based approach that combines network centrality and optimization to select the most influential nodes. First, we analyze the adversary's network structure to identify the node influence using degree and betweenness centrality. Degree centrality refers to the extent of direct links of a node to other nodes, and betweenness centrality refers to the extent to which a node lies between the paths connecting other nodes of a network together. Based on the centrality results, we then suggest an optimization model in which we minimize the sum of the main effects of the adversary by identifying the most influential nodes under the dynamic nature of the adversary network structure. Our results show that key node identification based on our optimization model outperforms simple centrality-based node identification in terms of decreasing the entire network value. We expect that these results can provide insight not only to military field for selecting key targets, but also to other multidisciplinary areas in identifying key nodes when they are interacting to each other in a network.

Design and Implementation of In-Vehicle Infotainment Software using MOST Network Based on Mobile Open-source (모바일 오픈소스기반 MOST네트워크를 이용한 차량용 인포테인먼트 소프트웨어 설계 및 구현)

  • Lee, Jae Kyu;Park, Duck-Keun;Lee, Sang Yub;Ko, Jae Jin
    • Smart Media Journal
    • /
    • v.3 no.3
    • /
    • pp.46-50
    • /
    • 2014
  • Nowadays, mobile devices such as smartphones and tablet PC's are making big changes in our life. The most widely used mobile operating systems are Google's Android, Apple's iOS and Microsoft's Windows Mobile. Among them, Android has been researched in various electronic fields such as smartphones and tablet PC's as well as automobiles, Media oriented systems transport(MOST) is a standard for high-speed multimedia communications in automotive industries. In this paper, we present the design results of in-vehicle infotainment software using MOST network based on Android.

Design and Implementation of User Interface for Managing MOST Network States (MOST 네트워크의 상태정보 관리를 위한 사용자인터페이스 설계 및 구현)

  • Kim, Seon-Nam;Yu, Yun-Sik;Jang, Si-Woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.746-749
    • /
    • 2010
  • 차량용 인포테인먼트 네트워크인 MOST에서 네트워크 상태정보를 효율적으로 관리하는 것이 요구된다. 현재 효율적인 관리를 위한 도구로 MOST Radar, Optolyzer가 있으나, 많은 라이센스 비용이 들고, 국내에는 이와 같은 MOST 네트워크를 위한 소프트웨어가 존재하지 않는다. 그리고 국내 MOST 엔지니어에 요구에 맞는 툴이 필요한 실정이며, 좀 더 직관적으로 MOST 네트워크를 진단하고 상태를 파악할 수 있는 툴이 요구된다. 따라서 본 논문에서는 MOST 네트워크의 상태정보를 효율적이며 직관적으로 표현할 수 있도록 MFC 2008을 이용하여 사용자 인터페이스를 설계하였다. 이러한 사용자 인터페이스를 통해 MOST 시스템 엔지니어가 보다 쉽게 MOST 네트워크 상태를 효율적으로 관리할 수 있다.

  • PDF

The Study on Relation and Structure of Social Network Service User's Motivation (소셜 네트워크 서비스 이용 동기의 다차원적 구조 및 영향관계)

  • Ock, Jung-Won
    • Management & Information Systems Review
    • /
    • v.31 no.4
    • /
    • pp.517-538
    • /
    • 2012
  • The purpose of this study is to explore key factors that influence the intention of continuous use of social network service users in the online environment. Since the intention of continuous use is one of the most critical factors in the profit model of social network service, the findings of this study should be useful to the SNS firms. This study use the personal and network aspects as major behavior intention of that influence user's attachment to a social network service. The results are summarized as follows. First, use motivation in self-determination have effects on emotional attachment, information sharing intention, loyalty. The world's most leading social network services now, the social network service has developed very fast as a kind of new online service. During the past few years, the number of Twitter's registered users around the world has already exceeded 170 million. Not only have the United Sates, many countries around the world have also been hit by the wave of SNS, including those in Korea. Since the intention of continuous use is one of the most critical factors in the profit model of social network service, the findings of this study should be useful to the SNS firms. We need to continue the study of social network.

  • PDF