• Title/Summary/Keyword: Network Characteristics

Search Result 5,676, Processing Time 0.034 seconds

ADSL Network Configuration and Performance Analysis based on Packet Mode (패킷모드에 의한 ADSL 망 구성 및 성능 분석)

  • 오채형;이운영임병학김이한
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.131-134
    • /
    • 1998
  • This paper is describing an ADSL access network configuration by packet mode and analyzed the performance of this ADSL network. We are interesting in difference between ATM mode and packet mode concerning to the performance and service availability. So, this paper has described the characteristics of packet mode ADSL network.

  • PDF

Implementation of Open & Distributed Intelligent Control Network for BAS (빌딩자동화용 개방.지능 분산제어 네트워크 구축에 관한 연구)

  • Hong, Won-Pyo;Lee, Sung-Hak
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.2446-2451
    • /
    • 2000
  • This paper presents the conceptual model of open & distributed intelligent control network for BAS. The characteristics and definition of this network also is proposed from theoretical study of LonWorks and a comparison between LonWorks and conventional network.

  • PDF

TDX-1스윗칭 네트워크의 통화량

  • 오돈성;박권철
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1986.04a
    • /
    • pp.142-145
    • /
    • 1986
  • The traffic characteristics of digital switch network depend on the structure, blocking probability, path searching method and etc. This paper presents the study of TDX-1 switch network traffic capacity by considering some decisive factors such as call processing software, switch network structure and control scheme. Conclusively the study shows that the switch network of TDX-1 can handle approximatly up to 1650 Erlang.

  • PDF

A Study on Recognition of Operating Condition for Hydraulic Driving Members (유압구동 부재의 작동조건 식별에 관한 연구)

  • 조연상;류미라;김동호;박흥식
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.20 no.4
    • /
    • pp.136-142
    • /
    • 2003
  • The morphological analysis of wear debris can provide early a failure diagnosis in lubricated moving system. It can be effective to analyze operating conditions of oil-lubricated tribological system with shape characteristics of wear debris in a lubricant. But, in order to predict and recognize an operating condition of lubricated machine, it is needed to analyze and to identify shape characteristics of wear debris. Therefore, If the morphological characteristics of wear debris are recognized by computer image analysis using the neural network algorithm, it is possible to recognize operating condition of hydraulic driving members. In this study, wear debris in the lubricating oil are extracted by membrane filter (0.45 ${\mu}{\textrm}{m}$), and the quantitative values of shape parameters of wear debris are calculated by the digital image processing. This shape parameters are studied and identified by the artificial neural network algorithm. The result of study could be applied to prediction and to recognition of the operating condition of hydraulic driving members in lubricated machine systems.

Network Modeling and Circuit Characteristics of Aperture-Coupled Vertically Mounted Strip Antenna

  • Kim, Jeong-Phill
    • Journal of electromagnetic engineering and science
    • /
    • v.11 no.2
    • /
    • pp.122-127
    • /
    • 2011
  • A general analysis of an aperture-coupled vertically mounted strip antenna is presented to examine its circuit characteristics. Based on the present analysis, an equivalent circuit model is developed, and an analytic or semi-analytic evaluation of the related circuit element values is described. The effects of structure parameters on the antenna characteristics were studied with the developed equivalent circuit, and the design curves were obtained. To check the validity of the proposed analysis and design theory, two C-band antennas (5.0 GHz and 4.5 GHz) were designed and fabricated. Their computed characteristics, derived from the proposed network analysis, were compared with the measurement and simulation results. The error of the current model in predicting the operating center frequency was less than 0.50 %. In addition, the observed bandwidth was found to be comparable to the conventional microstrip antennas. All the results fully validated the efficiency and accuracy of the proposed analysis and network model.

Topological and Statistical Analysis for the High-Voltage Transmission Networks in the Korean Power Grid

  • Kang, Seok-Gu;Yoon, Sung-Guk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.923-931
    • /
    • 2017
  • A power grid is one of the most complex networks and is critical infrastructure for society. To understand the characteristics of a power grid, complex network analysis has been used from the early 2000s mainly for US and European power grids. However, since the power grids of different countries might have different structures, the Korean power grid needs to be examined through complex network analysis. This paper performs the analysis for the Korean power grid, especially for high-voltage transmission networks. In addition, statistical and small-world characteristics for the Korean power grid are analyzed. Generally, the Korean power grid has similar characteristics to other power grids, but some characteristics differ because the Korean power grid is concentrated in the capital area.

Design of Neural Network Controller Using RTDNN and FLC (RTDNN과 FLC를 사용한 신경망제어기 설계)

  • Shin, Wee-Jae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.13 no.4
    • /
    • pp.233-237
    • /
    • 2012
  • In this paper, We propose a control system which compensate a output of a main Neual Network using a RTDNN(Recurrent Time Delayed Neural Network) with a FLC(Fuzzy Logic Controller)After a learn of main neural network, it can occur a Over shoot or Under shoot from a disturbance or a load variations. In order to adjust above case, we used the fuzzy compensator to get an expected results. And the weight of main neural network can be changed with the result of learning a inverse model neural network of plant, so a expected dynamic characteristics of plant can be got. We can confirm good response characteristics of proposed neural network controller by the results of simulation.

Enhanced Operator Authentication Method in SCADA Control Network (SCADA제어망에서 강화된 운용자 인증 방안)

  • Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.416-424
    • /
    • 2019
  • The authentication technologies used to access computers in both IT and operational technology (OT) network areas include ID/PW, public certificate, and OTP. These authentication technologies can be seen as reflecting the nature of the business-driven IT network. The same authentication technologies is used in SCADA control networks where the operational technology is centered. However, these authentication technologies do not reflect the characteristics of the OT control network environment, which requires strict control. In this paper, we proposed a new enhanced user authentication method suitable for the OT SCADA control network centered on control information processing, utilizing the physical terminal address and operator location information characteristics of the operator's mobile terminal and control network.

The Successful Strategies for YouTube Channels Using the Network Overlap (네트워크 중복을 이용한 유튜브 채널의 성공 전략)

  • Shin, Jin-Hee;Son, Jung-Min
    • The Journal of Information Systems
    • /
    • v.29 no.1
    • /
    • pp.267-287
    • /
    • 2020
  • Purpose Online platform companies can increase the spread of content by communicating with users who have diverse preferences through social networks. Previous studies show the mixed effect on the network overlap, and there was a limited examinations for the underlying mechanism. This study expects high academic and practical implications that can be provided by studying on the user's viewership network. The purpose of this research is to examine the effects of network overlap on the users' viewership for creators of user-generated content in YouTube. We explain the direct and in-direct effects through the content sharing and the valence of user ratings. Design/methodology/approach The data contains 45 channels and 4,085 video clips from YouTube. We control the effect of the categories, channel characteristics, and vide clip characteristics on the viewership. PROCESS macro were used to analyze the direct and in-direct effects of network overlap. Findings The analysis results showed that the network overlap directly affect on the users' viewership. The variable decreases the moderators (i.e., content sharing and the valence of user ratings). This result implies that the users can not satisfy their need for uniqueness which is achieved by content sharing and rating in the overlapped network.

Blockchain Technology and Utilization Schemes in Tactical Communication Network

  • Yoo, In-Deok;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Jo, Se-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.49-55
    • /
    • 2018
  • In this paper, we propose schemes of blockchain utilization in tactical communication environment. The military tactical communication environment has similar characteristics with blockchain network such as distributed architecture, decentralization, and the need for data integrity. A communication node constituting a tactical communication network is constituted by a system capable of configuring and connecting a network for each node. When a communication node, having such capabilities, is configured as a node of blockchain network, various functions could be performed. In this paper, we propose utilization schemes of authentication, integrity, record management, and privilege control based blockchain technology. Functions for authentication, integrity verification, and record management need to ensure the stored data and could track history. The requirement of function's characteristics are matched to blockchain which is storing data sequentially and difficult to hack data, so that it could perform functionally and sufficiently well. Functions for authority control should be able to assign different privileges according to the state of the requestor. Smart contract will function when certain conditions are satisfied and it will be able to perform its functions by using it. In this paper, we will look over functions and utilization schemes of blockchain technology which could reliably share and synchronize data in a tactical communication environment composed of distributed network environment.