• Title/Summary/Keyword: Network Technique

Search Result 4,356, Processing Time 0.034 seconds

A Study on Fashion Show Project Management with the Aud of the Network Technique (네트웍 기법에 의한 패션쇼 프로젝트의 관리 모형에 관한 연구)

  • 양리나
    • The Research Journal of the Costume Culture
    • /
    • v.6 no.3
    • /
    • pp.21-33
    • /
    • 1998
  • A project manager is required to have systematic knowledge in the project management in fashion and apparel industry. The Network Technique is a modern project management technique and applies to almost all industry sectors, including fashion and apparel industry. Through the Network Technique, we can save project time and cost. The purpose of present study are - to introduce the Network Technique into fashion and apparel industry management area, and - to make an practical application of he Network Technique to fashion and apparel industry. For these purpose, fist we define the Network Technique, and then we apply it to fashion show as an example. Only time component is considered in this study. Cost component can be dealt with later on in the project planning area.

  • PDF

A Study for Detection Accuracy Improvement of Malicious Nodes on MANET (MANET에서의 의심노드 탐지 정확도 향상을 위한 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.95-101
    • /
    • 2013
  • MANET has an advantage that can build a network quickly and easily in difficult environment to build network. In particular, routing protocol that uses in existing mobile environment cannot be applied literally because it consists of only mobile node. Thus, routing protocol considering this characteristic is necessary. Malicious nodes do extensive damage to the whole network because each mobile node has to act as a router. In this paper, we propose technique that can detect accurately the suspected node which causes severely damage to the performance of the network. The proposed technique divides the whole network to zone of constant size and is performed simultaneously detection technique based zone and detection technique by collaboration between nodes. Detection based zone translates the information when member node finishes packet reception or transmission to master node managing zone and detects using this. The collaborative detection technique uses the information of zone table managing in master node which manages each zone. The proposed technique can reduce errors by performing detection which is a reflection of whole traffic of network.

A Design for Network Security System via Non-security Common Network (일반망과 보안망을 연계한 네트워크 보안체계 설계)

  • Cho, Chang-Bong;Lee, Sang-Guk;Dho, Kyeong-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.5
    • /
    • pp.609-614
    • /
    • 2009
  • In this paper, we have proposed a design for security network system passing through the non-security network which is commonly used for various networking services. Based on the security requirements which are assumed that the large classified data are bi-transmitted between a server and several terminals remotely located, some application methods of security techniques are suggested such as the network separation technique, the scale-down application technique of certification management system based on the PKI(Public Key Infrastructure), the double encryption application using the crypto-equipment and the asymmetric keys encryption algorithm, unrecoverable data deleting technique and system access control using USB device. It is expected that the application of this design technique for the security network causes to increase the efficiency of the existing network facilities and reduce the cost for developing and maintaining of new and traditional network security systems.

Computer Analysis Technique of the Network having 3-terminal Elements Characterized by Nonlinear Function Group (비선형 함수군 특성의 3단자소자를 포함하는 회로망의 전산해석기법)

  • 고명삼;이석한
    • 전기의세계
    • /
    • v.26 no.1
    • /
    • pp.63-70
    • /
    • 1977
  • This paper deals with computer analysis technique of the network having 3-terminal elements whose input and output characteristics are defined by nonuniform spacing function group on the volt-ampere space. Developing the algorithms to obtain the solutions of the network mentioned above by computer, we propose optimization technique, which can solve the normal form equations of the network defined in this paper and which involves mode analysis technique to be able to analyze the case that the function group has negative resistance characteristics.

  • PDF

Communication Failure Resilient Improvement of Distributed Neural Network Partitioning and Inference Accuracy (통신 실패에 강인한 분산 뉴럴 네트워크 분할 및 추론 정확도 개선 기법)

  • Jeong, Jonghun;Yang, Hoeseok
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.1
    • /
    • pp.9-15
    • /
    • 2021
  • Recently, it is increasingly necessary to run high-end neural network applications with huge computation overhead on top of resource-constrained embedded systems, such as wearable devices. While the huge computational overhead can be alleviated by distributed neural networks running on multiple separate devices, existing distributed neural network techniques suffer from a large traffic between the devices; thus are very vulnerable to communication failures. These drawbacks make the distributed neural network techniques inapplicable to wearable devices, which are connected with each other through unstable and low data rate communication medium like human body communication. Therefore, in this paper, we propose a distributed neural network partitioning technique that is resilient to communication failures. Furthermore, we show that the proposed technique also improves the inference accuracy even in case of no communication failure, thanks to the improved network partitioning. We verify through comparative experiments with a real-life neural network application that the proposed technique outperforms the existing state-of-the-art distributed neural network technique in terms of accuracy and resiliency to communication failures.

Analyses of requirements for Network Security Technology

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.1
    • /
    • pp.64-67
    • /
    • 2007
  • IT industry strategy trend and home network security technology is presented. First, we consider the development strategy to improve next generation IT industry. Second, we have analyzed the technique for implementing home network. Last, we have analyzed the technique to security home network field.

Differences in Network-Based Kernel Density Estimation According to Pedestrian Network and Road Centerline Network

  • Lee, Byoungkil
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.36 no.5
    • /
    • pp.335-341
    • /
    • 2018
  • The KDE (Kernel Density Estimation) technique in GIS (Geographic Information System) has been widely used as a method for determining whether a phenomenon occurring in space forms clusters. Most human-generated events such as traffic accidents and retail stores are distributed according to a road network. Even if events on forward and rear roads have short Euclidean distances, network distances may increase and the correlation between them may be low. Therefore, the NKDE (Network-based KDE) technique has been proposed and applied to the urban space where a road network has been developed. KDE is being studied in the field of business GIS, but there is a limit to the microscopic analysis of economic activity along a road. In this study, the NKDE technique is applied to the analysis of urban phenomena such as the density of shops rather than traffic accidents that occur on roads. The results of the NKDE technique are also compared to pedestrian networks and road centerline networks. The results show that applying NKDE to microscopic trade area analysis can yield relatively accurate results. In addition, it was found that pedestrian network data that can consider the movement of actual pedestrians are necessary for accurate trade area analysis using NKDE.

The proposal of the energy efficiency sensor network using directional antennas (방향성 안테나를 이용한 에너지 효율적인 센서 네트워크의 제안)

  • Kim, Kyung-Kuen;Jung, Won-Soo;Oh, Young-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.351-352
    • /
    • 2007
  • The sensor networking technique as the radio network which does not have the base infrastructure network. The sensor nodes oneself automatic compose the network and simultaneously accomplish two roles of the router and data source. The sensor network is kind of Ad-hoc network is a possibility of seeing from point. sensor networking technique is restricted that limit of the memory and the battery back with the resources of the node. The sensor nodes overcomes the restriction of the resources it is in the process of researching the multi-hop routing technique which the sensor network divided cluster routing techniques which are researched. this paper proposed using beamforming antenna which has the directivity of the electric wave. the beamforming antenna from the Ad-hoc network using technique. the proposal is that raises the efficient of data trans mission from the sensor network and extends the lift time of the sensor network.

  • PDF

Time-Cost Trade-Off by Lead-Time Adjustment in the PDM Network

  • Kim, Seon-Gyoo
    • Architectural research
    • /
    • v.11 no.2
    • /
    • pp.43-49
    • /
    • 2009
  • Since the late 1980s, the schedule technique applied to the construction industry around the world has rapidly changed from the traditional ADM (Arrow Diagramming Method) to the PDM (Precedence Diagramming Method) technique. The main reason for this change is to overcome the limits and inconveniences of the traditional ADM technique. The time-cost trade-off is one of the core scheduling techniques to establish the best optimized combination plan in terms of a relationship between the cost and schedule. However, most of the schedule-related textbooks and research papers have discussed and proposed applications of a time-cost trade-off technique based only on the Finish to Start relationship. Therefore, there are almost no consideration and discussion of problems or restrictions that emerge when the time-cost trade-off technique is applied to the PDM network that has overlapping relationships. This paper proposes the lead-time adjustment method as a methodology for overcoming some restrictions that are encountered when the time-cost trade-off technique is applied to the overlapping relationships of the PDM network.

A Study on Intrusion Detection Method using Collaborative Technique (협업 기법을 이용한 침입탐지 탐지 방법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.121-127
    • /
    • 2021
  • MANET, which does not have any infrastructure other than wireless nodes, has the advantage of being able to construct a fast network. However, the movement of nodes and wireless media are also the causes of security vulnerabilities of MANET. In particular, the damage caused by the attacking nodes existing on the network is considerably greater than that of other networks. Therefore, it is necessary to detection technique for attacking nodes and techniques to reduce damage caused by attacks. In this paper, we proposed a hierarchical structure technique to increase the efficiency of intrusion detection and collaboration-based intrusion detection technique applying a P2P mesh network configuration technique to reduce damage caused by attacks. There was excluded the network participation of the attacking node in advance through the reliability evaluation of the nodes in the cluster. In addition, when an attack by an attacking node is detected, this paper was applied a method of minimizing the damage of the attacking node by transmitting quickly the attack node information to the global network through the P2P mesh network between cluster heads. The ns-2 simulator was used to evaluate the performance of the proposed technique, and the excellent performance of the proposed technique was confirmed through comparative experiments.