• Title/Summary/Keyword: Network Evolution

Search Result 646, Processing Time 0.033 seconds

A Study on the Design of the Gateway for a Strong and Safe Mobile Agent System (강하고 안전한 이동 에이전트 시스템을 위한 게이트웨이 설계에 관한 연구)

  • Kim Hyo-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.183-188
    • /
    • 2004
  • In the course of Internet proliferation. many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies in private networks has further fuelled the demand for network-based applications. The most Promising among the new paradigms is use of mobile agents. It also however, suffers from a major drawback, namely the potential for malicious attacks, abuse of resources pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper proposed the design of strong and safe mobile agent gateway that split and merge the agent code with security policy database. This mechanism will promote the security in mobile agent systems and mobile agent itself.

  • PDF

Regulation of Inflammation by Bidirectional Signaling through CD137 and Its Ligand

  • Kwon, Byungsuk
    • IMMUNE NETWORK
    • /
    • v.12 no.5
    • /
    • pp.176-180
    • /
    • 2012
  • Although the majority of research on CD137 has been directed to T cells, it is becoming clear that this molecule has distinct functions in other lineages of cells, including non-hematopoietic cells. In particular, emerging evidence suggests that the CD137-its ligand (CD137L) network involving immune cells and non-immune cells, directly or indirectly regulates inflammation in both positive and negative manners. Bidirectional signaling through both CD137 and CD137L is critical in the evolution of inflammation: 1) CD137L signaling plays an indispensible role in the activation and recruitment of neutrophils by inducing the production of proinflammatory cytokines and chemokines in hematopoietic and non-hematopoietic cells such as macrophages, endothelial cells and epithelial cells; 2) CD137 signaling in NK cells and T cells is required for their activation and can influence other cells participating in inflammation via either their production of proinflammatory cytokines or engagement of CD137L by their cell surface CD137: 3) CD137 signaling can suppress inflammation by controlling regulatory activities of dendritic cells and regulatory T cells. As recognition grows of the role of dysregulated CD137 or CD137L stimulation in inflammatory diseases, significant efforts will be needed to develop antagonists to CD137 or CD137L.

Channel Grade Method of multi-mode mobile device for avoiding Interference at WPAN (WPAN에서 간섭을 피하기 위한 멀티모드 단말기 채널등급 방법)

  • Jung, Sungwon;Kum, Donghyun;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2015
  • There is a new evolution in technological advancement taking place called the Internet of Things (IoT), The IoT enables physical world objects in our surrounding to be connected to the Internet. ISM (Industrial Scientific Medical) band that is 2.4GHz band authorized free of charge is being widely used for smart devices. Accordingly studies have been continuously conducted on the possibility of coexistence among nodes using ISM band. In particular, the interference of IEEE 802.11b based Wi-Fi devices using overlapping channel during communication among IEEE 802.15.4 based wireless sensor nodes suitable for low-power, low-speed communication using ISM band. Because serious network performance deterioration of wireless sensor networks. In this paper, we will propose an algorithm that identifies the possibility of using more accurate channels by mixing utilization of interference signal and RSSI (Received Signal Strength Indicator) Min/Max/Activity of Interference signal by wireless sensor nodes. In addition, it will verify our algorithm by using OPNET Network verification simulator.

The Design of the VoDSL Terminal based on TDM (TDM 방식을 이용한 VoDSL단말의 설계에 관한 연구)

  • 안성진;윤정철;정진욱
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.5
    • /
    • pp.11-20
    • /
    • 2002
  • The tendency of the technology that is aggregated voice and data circuit is VoP, especially VoIP. But if we try VoP, we have to throw away well structured and well known TDM resources. In this case CLEC and ILEC will encounter lots of troubles about standardization of progress of network evolution, heavy cost of network construction and so on. Therefore in this paper, I suggest designing VoDSL terminal and its operation environment (such as DSLAM) based on TDM. This designed VoDSL terminal can be installed with the DSLAM between PSTN and ISP without any additional facilities. This is more convenient low cost, operation and easier to construct than VoP.

  • PDF

A Co-Evolutionary Approach for Learning and Structure Search of Neural Networks (공진화에 의한 신경회로망의 구조탐색 및 학습)

  • 이동욱;전효병;심귀보
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1997.10a
    • /
    • pp.111-114
    • /
    • 1997
  • Usually, Evolutionary Algorithms are considered more efficient for optimal system design, However, the performance of the system is determined by fitness function and system environment. In this paper, in order to overcome the limitation of the performance by this factor, we propose a co-evolutionary method that two populations constantly interact and coevolve. In this paper, we apply coevolution to neural network's evolving. So, one population is composed of the structure of neural networks and other population is composed of training patterns. The structure of neural networks evolve to optimal structure and, at the same time, training patterns coevolve to feature patterns. This method prevent the system from the limitation of the performance by random design of neural network structure and inadequate selection of training patterns. In this time neural networks are trained by evolution strategies that are able to apply to the unsupervised learning. And in the coding of neural networks, we propose the method to maintain nonredundancy and character preservingness that are essential factor of genetic coding. We show the validity and the effectiveness of the proposed scheme by applying it to the visual servoing of RV-M2 robot manipulators.

  • PDF

Performance Evaluation of Overlaid Single Frequency Broadcast and Cellular network using Superposition Coding (중첩부호를 이용한 단일주파수 방송 서비스 및 데이터 서비스 오버레이 시스템의 성능 평가)

  • Yoon, Seok-Hyun;Kim, Dong-Hee
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.7
    • /
    • pp.32-38
    • /
    • 2009
  • In this paper, we consider the overlaid system of single frequency network broadcast service and cellular-based unicast data service. In general, broadcast service and unicast data service were considered as a separate services so that different frequency resources have been allocated for each. As the frequency resource get more expensive, however, there were some efforts to provide both the broadcast and unicast service over the same frequency resource by employing the so-called superposition coding. In fact, such an service overlay system has already been accepted as a standards in 3GPP long-term evolution (LTE). In this paper, we specifically investigate such overlay system within 3GPP framework and evaluate their performance in terms of BC coverage and UC data throughput.

A Survey on Spectrum Sharing in Cognitive Radio Networks

  • Xu, Tangwen;Li, Zhenshuang;Ge, Jianhua;Ding, Haiyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3751-3774
    • /
    • 2014
  • With the rapid development of wireless communication, the confliction between the scarce frequency resources and the low spectral efficiency caused by the stationary spectrum sharing strategies seriously restricts the evolution of the future mobile communication. For this purpose, cognitive radio (CR) emerges as one of the most promising inventions which can overcome the spectrum shortage. As the key technology and main objective of CR, spectrum sharing can make full use of the limited spectrum, alleviate the scarcity of frequency resources and improve the system utilities, playing thereby an important role in improving the system performance of cognitive radio networks (CRNs). In this survey, the spectrum sharing in CRNs is discussed in terms of the sharing process, mainstream sharing technologies and spectrum sharing models. In particular, comparisons of different spectrum sharing strategies are concluded, as well as that of different spectrum sensing schemes in sharing procedure. Moreover, some application examples of the spectrum sharing in CRNs, such as smart grid, public safety, cellular network and medical body area networks are also introduced. In addition, our previous related works are presented and the open research issues in the field of spectrum sharing are stated as well.

A Cost-Efficient LTE Network Design and Deployment Methodology for Developing Countries (개도국 LTE 망의 비용-효율적인 구축을 위한 요구사항 도출과 기술 분석)

  • Ko, Kiyoung;Lee, Jaiyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.140-148
    • /
    • 2017
  • This paper focused on finding a cost-effective LTE mobile network design methodology, suitable for socio-economic circumstances of developing countries. Developing countries have different requirements and circumstances compared with those of developed countries that had deployed LTE networks in advance, thus a differentiated way of design and deployment methods are necessary. This paper analyzed LTE design-related attributes of developing countries, identified relevant technological requirements and appropriate technologies, and suggested design methodologies. These suggestions were verified through the case studies of several developing countries that a Korean telecommunication company (Korean telecom company A) had participated in the LTE design and deployment for future reference by other developing countries.

Worm Virus Modeling and Simu1ation Methodology Using Artificial Life (인공생명 기반의 웜바이러스 모델링 및 시뮬레이선 방법론)

  • You, Yong-Jun;Chae, Soo-Hoan;Chi, Sung-Do;Oh, Ji-Yeon
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.1-10
    • /
    • 2006
  • Computer virus modeling and simulation research has conducted with focus on the network vulnerability analysis. But computer virus shows the biological virus characters such as proliferation, reproduction and evolution. Therefore it is necessary to research the computer virus modeling and simulation using the Artificial life technique. The approach of computer modeling and simulation using Artificial life provides the analysis method about the effects on the network by computer virus and the behavior mechanism of computer virus. Hence this paper proposes the methodology of computer virus modeling and simulation using Artificial life, which is effected to contribute the research on the computer virus vaccine.

  • PDF

Design of a 3GPP LTE system Information(MIB) detection simulator (3GPP LTE 시스템정보(MIB) 추출에 대한 연구)

  • Gwag, Gyoung-Hun;Oh, Hyuk-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.827-829
    • /
    • 2015
  • This paper presents process of the UE obtains the cell system information in order to achieve communication with the LTE network on the LTE. This paper deals with the process of extracting MIB(Master Information Block) cell system information in LTE. To study the 3GPP LTE standard spec series 36.200 and 36.300, the simulation is implemented to extract the MIB in MATLAB program. The simulation process is divided into three parts. It consisted of a part that extracts the PSS, SSS and MIB. Called a cell search process for detecting the PSS and SSS, the process is to be done in order to extract only the cell system information. The simulation program is verified based on the signal captured from the real Air.

  • PDF