• Title/Summary/Keyword: Network Environment

Search Result 7,876, Processing Time 0.038 seconds

Business Collaborative System Based on Social Network Using MOXMDR-DAI+

  • Lee, Jong-Sub;Moon, Seok-Jae
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.223-230
    • /
    • 2020
  • Companies have made an investment of cost and time to optimize processing of a new business model in a cloud environment, applying collaboration technology utilizing business processes in a social network. The collaborative processing method changed from traditional BPM to the cloud and a mobile cloud environment. We proposed a collaborative system for operating processes in social networks using MOXMDR-DAI+ (eXtended Metadata Registry-Data Access & Integration based multimedia ontology). The system operating cloud-based collaborative processes in application of MOXMDR-DAI+, which was suitable for data interoperation. MOXMDR-DAI+ applied to this system was an agent effectively supporting access and integration between multimedia content metadata schema and instance, which were necessary for data interoperation, of individual local system in the cloud environment, operating collaborative processes in the social network. In operating the social network-based collaborative processes, there occurred heterogeneousness such as schema structure and semantic collision due to queries in the processes and unit conversion between instances. It aimed to solve the occurrence of heterogeneousness in the process of metadata mapping using MOXMDR-DAI+ in the system. The system proposed in this study can visualize business processes. And it makes it easier to operate the collaboration process through mobile support. Real-time status monitoring of the operation process is possible through the dashboard, and it is possible to perform a collaborative process through expert search using a community in a social network environment.

Relationship between the Flow data on the Unit Watersheds and on the Stream Flow Monitoring Network (수질오염총량관리 단위유역 유량자료와 하천유량 측정망 자료의 연계성 분석)

  • Park, Jun Dae;Oh, Seung Young
    • Journal of Korean Society on Water Environment
    • /
    • v.29 no.1
    • /
    • pp.55-65
    • /
    • 2013
  • It is very difficult to apply stream flow data directly to the management of Total Maximum Daily Loads because there are some differences between the unit watershed and the stream flow monitoring network in their characteristics such as monitoring locations and its intervals. Flow duration curve can be developed by linking the daily flow data of stream monitoring network to 8 day interval flow data of the unit watershed. This study investigated the current operating conditions of the stream flow monitoring network and the flow relationships between the unit watershed and the stream flow monitoring network. Criteria such as missing and zero value data, and correlation coefficients were applied to select the stream flow reference sites. The reference sites were selected in 112 areas out of 142 unit watersheds in 4 river basins, where the stream flow observations were carried out in relatively normal operating conditions. These reference sites could be utilized in various ways such as flow variation analysis, flow duration curve development and so on for the management of Total Maximum Daily Loads.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Implementation of Complex Growth-environment Control System in Greenhouse (온실 복합생장환경 관제 시스템 구현)

  • Cho, Hyun Wook;Cho, Jong Sik;Park, In Gon;Seo, Beom Seok;Kim, Chan Woo;Shin, Chang Sun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.1-9
    • /
    • 2011
  • In this paper, Wireless sensor network technology applied to various greenhouse agro-industry items such as horticulture and local specialty etc., we was constructed automatic control system for optimum growth environment by measuring growth status and environmental change. existing monitoring systems of greenhouse gather information about growth environment depends on the temperature. but in this system, Can be efficient collection and control of information to construct wireless sensor network by growth measurement sensor and environment monitoring sensor inside of the greenhouse. The system is consists of sensor manager for information processing, an environment database that stores information collected from sensors, the GUI of show the greenhouse status, it gather soil and environment information to soil and environment(including weather) sensors, growth measurement sensor. In addition to support that soil information service shows the temperature, moisture, EC, ph of soil to user through the interaction of obtained data and Complex Growth Environment information service for quality and productivity can prevention and response by growth disease or disaster of greenhouse agro-industry items how temperature, humidity, illumination acquiring informationin greenhouse(strawberry, ginseng). To verify the executability of the system, constructing the complex growth environment measurement system using wireless sensor network in greenhouse and we confirmed that it is can provide our optimized growth environment information.

DEVELOPMENT OF A NETWORK-BASED TRACTION CONTROL SYSTEM, VALIDATION OF ITS TRACTION CONTROL ALGORITHM AND EVALUATION OF ITS PERFORMANCE USING NET-HILS

  • Ryu, J.;Yoon, M.;SunWoo, M.
    • International Journal of Automotive Technology
    • /
    • v.7 no.6
    • /
    • pp.687-695
    • /
    • 2006
  • This paper presents a network-based traction control system(TCS), where several electric control units(ECUs) are connected by a controller area network(CAN) communication system. The control system consists of four ECUs: the electric throttle controller, the transmission controller, the engine controller and the traction controller. In order to validate the traction control algorithm of the network-based TCS and evaluate its performance, a Hardware-In-the-Loop Simulation(HILS) environment was developed. Herein we propose a new concept of the HILS environment called the network-based HILS(Net-HILS) for the development and validation of network-based control systems which include smart sensors or actuators. In this study, we report that we have designed a network-based TCS, validated its algorithm and evaluated its performance using Net-HILS.

The Effect of Interpenetrating Polymer Network upon Tracking Resistance of Epoxy Composite Materials (에폭시 복합재료의 내트래킹성에 미치는 상호침입망목의 효과)

  • 김탁용;이덕진;손인환;김명호;김경환;김재환
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 1996.11a
    • /
    • pp.225-229
    • /
    • 1996
  • In this study, in order to develop outdoor insulating materials, SIN(simultaneous interpenetrating polymer network) was introduced to Epoxy resin and the environment resistance was investigated. The single network structure specimen(E series) formed of Epoxy resin alone and simultaneous interpenetrating polymer network specimen (EM series) in which epoxy resin was taken as the first network and methyl methacrylate resin as the second network were manufactured. Ten kinds of specimens were manufacture by filler (SiO$_2$) content. SEM were utilized in order to confirm their network structure changes, and AC voltage dielectric strength was measured. Also, UV-test and tracking test were carried out investigate the environment resistance characteristic. Therefore the variations of network structure were happened as a result of SEM test, and it was confirmed that simultaneous interpenetrating polymer network specimens were more excellent than single network structure specimens.

  • PDF

A Graph-based Model for RSUs Deployment in Vehicular Networks by Considering Urban and Network Limitations and QoS Requirements of Service Advertisement and Discovery

  • Balouchzahi, Nik Mohammad;Fathy, Mahmood;Akbari, Ahmad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1662-1681
    • /
    • 2015
  • The efficient send and receive of information in VANET improves the efficiency of the safety and traffic services advertisment and discovery. However, if the V2V is the only communication system used, the restrictions of the urban environment and network drop the performance of VANET. In order to improve the performance of the network, it is necessary to use V2I communication as well as V2V communication. Therefore, RSUs must be placed in the environment. However due to the high costs of placement, the full coverage of the environment would not be possible. Therefore, it is necessary to optimally install a limited number of RSUs in the environment.

A Study on Traffic Volume Prediction for e-Commerce Systems (전자상거래 시스템의 트래픽량 예측에 관한 연구)

  • Kim, Jeong-Su
    • The KIPS Transactions:PartC
    • /
    • v.18C no.1
    • /
    • pp.31-44
    • /
    • 2011
  • The applicability of network-based computing depends on the availability of the underlying network bandwidth. Such a growing gap between the capacity of the backbone network and the end users' needs results in a serious bottleneck of the access network in between. As a result, ISP incurs disadvantages in their business. If this situation is known to ISP in advance, or if ISP is able to predict traffic volume end-to-end link high-load zone, ISP and end users would be able to decrease the gap for ISP service quality. In this paper, simulation tools, such as ACE, ADM, and Flow Analysis, were used to be able to perceive traffic volume prediction and end-to-end link high-load zone. In using these simulation tools, we were able to estimate sequential transaction in real-network for e-Commerce. We also imported virtual network environment estimated network data, and create background traffic. In a virtual network environment like this, we were able to find out simulation results for traffic volume prediction and end-to-end link high-load zone according to the increase in the number of users based on virtual network environment.

A Study on Network Mobility Support for Uniquitous Communication Environment (유비쿼터스 통신 환경을 위한 네트워크 이동성 지원 방안에 관한 연구)

  • Lee, Ho-Seon;Kim, Seong-Chul;Cho, Yong-Bum;Cho, Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.589-592
    • /
    • 2007
  • Ubiquitous environment means the environment in which users can access the Internet at anytime and anywhere. Network mobility support is needed for seamless Internet service in ubiquitous environment. When users try to access the Internet in public transportation such as bus, train, airplane, to support network mobility by composing several sub-networks is more efficient than to support host mobility. IETF established 'Network Mobility(NEMO)' working group to research and develop network mobility technology. In this paper, we investigate the concept of network mobility, trends of research in NEMO and developed technology on the basis of 'Network Mobility Basic Support Protocol' standardized by IETF.

  • PDF