• Title/Summary/Keyword: Network-engine

Search Result 479, Processing Time 0.023 seconds

Implementation Knapsack Problem Algorithm M2M Simulator for Optimal Network (최적 통신망을 위한 Knapsack Problem 알고리즘 M2M 시뮬레이터 구현)

  • Lee, Sun-Sik;Song, Min-Seop;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.481-484
    • /
    • 2013
  • Many people today are interested in Machine to Machine (M2M) as the new-generation growth engine of mobile communications service providers in Korea. Its use and application are broadening to various areas and the number of devices used for it is increasing to increase the number of information transmitted for each object. When the traffic reaches its limit while each set of data is transmitted from the devices divided into each group through the mobile network, M2M communications service might not be processed smoothly. This study used the Knapsack Problem algorithm to create a virtual simulator for a smooth M2M service when the mobile network used for the M2M communications reaches its limit. The virtual simulator applies smooth processing of services from the M2M communications that should be processed first to other subsequent services when data comes to each group of devices. As the M2M technology develops to make many objects more compact in size, it would help with smoother processing of M2M services for the mobile network with fast-increasing traffic.

  • PDF

A Design and Implementation of A Robot Client Middleware for Network-based Intelligent Robot based on Service-Oriented (지능형 네트워크 로봇을 위한 서비스 지향적인 로봇 클라이언트 미들웨어 설계와 구현)

  • Kwak, Dong-Gyu;Choi, Jae-Young
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.1-8
    • /
    • 2012
  • Network-based intelligent robot is connected with network system, provides interactions with humans, and carries out its own roles on ubiquitous computing environments. URC (Ubiquitous Robot Companion) robot has been proposed to develop network-based robot by applying distributed computing techniques. On URC robot, it is possible to save the computing power of robot client by environments, has been proposed to develop robot software using service-oriented architecture on server-client computing environments. The SOMAR client robot consists of two layers - device service layer and robot service layer. The device service controls physical devices, and the robot service abstracts robot's services, which are newly defined and generated by combining many device services. RSEL (Robot Service Executing Language) is defined in this paper to represent relations and connections between device services and robot services. A RESL document, including robot services by combining several device services, is translated to a programming language for robot client system using RSEL translator, then the translated source program is compiled and uploaded to robot client system with RPC (Remote Procedure Call) command. A SOMAR client system is easy to be applied to embedded systems of host/target architecture. Moreover it is possible to produce a light-weight URC client robot by reducing workload of RSEL processing engine.

Research Technology Evolution of UAV(Unmanned Aerial Vehicle) and to Prospect Promising Technology (무인항공기 기술진화 탐색 및 유망기술 발굴 연구)

  • Joo, Seong-Hyeon
    • Journal of Aerospace System Engineering
    • /
    • v.13 no.6
    • /
    • pp.80-89
    • /
    • 2019
  • Prospecting future social environmental changes and improvement research on future technologies is required for prospecting promising technology, as it would be useful for institution·company to set up technical planning. This study aims at providing a methodology for retaining international technology competitiveness, marketable industry, and sustainable promising technology in a field of new growth engine industry such as national unmanned aerial vehicle industry. We draw a result by analysing with tools such as KrKwic, Excel, NetMiner, presenting methods of a Social Network Analysis, sub-group analysis, and cognitive map analysis based on patent data in a field of unmanned aerial vehicle industry. Therefore, this study explored the technology evolution of UAV and to prospect promising technology. As a result, some future promising technologies are prospected as what worths concentrated investment, such as 'system integration tech', 'assessment/airworthiness certification tech', 'avionics', 'pilot control tech', 'identification of friend or foe', 'flight control tech', 'supportive equipment'.

Big Data and Knowledge Generation in Tertiary Education in the Philippines

  • Fadul, Jose A.
    • Journal of Contemporary Eastern Asia
    • /
    • v.13 no.1
    • /
    • pp.5-18
    • /
    • 2014
  • This exploratory study investigates the use of a computational knowledge engine (WolframAlpha) and social networking sites (Gmail, Yahoo and Facebook) by 200 students at De La Salle-College of Saint Benilde, their "friends" and their "friends of friends" during the 2009 through 2013 school years, and how this appears to have added value in knowledge generation. The primary aim is to identify what enhances productiveness in knowledge generation in Philippine Tertiary Education. The phenomenological approach is used, therefore there are no specific research questions or hypotheses proposed in this paper. Considering that knowledge generation is a complex phenomenon, a stochastic modelling approach is also used for the investigation that was developed specifically to study un-deterministic complex systems. A list of salient features for knowledge generation is presented as a result. In addition to these features, various problem types are identified from literature. These are then integrated to provide a proposed framework of inclusive (friendly) and innovative social networks, for knowledge generation in Philippine tertiary education. Such a framework is necessarily multidisciplinary and useful for problem-solving in a globalized and pluralist reality. The implementation of this framework is illustrated in the three parts of the study: Part 1: Online lessons, discussions, and examinations in General Psychology, Introduction to Sociology, and Life and Works of Jose Rizal, for the author's students in De La Salle-College of Saint Benilde; Part 2: Facebook Report analytics of students and teachers, their friends and their friends of friends via WolframAlpha; and Part 3: Social Network Analysis of the people and groups influencing the courses' scope-and-sequence in the new General Education Curriculum for Tertiary Schools and Institutions in the Philippines.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Performance Evaluation and Optimization of NoSQL Databases with High-Performance Flash SSDs (고성능 플래시 SSD 환경에서 NoSQL 데이터베이스의 성능 평가 및 최적화)

  • Han, Hyuck
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.93-100
    • /
    • 2017
  • Recently, demands for high-performance flash-based storage devices (i.e., flash SSD) have rapidly grown in social network services, cloud computing, super-computing, and enterprise storage systems. The industry and academic communities made the NVMe specification for high-performance storage devices, and NVMe-based flash SSDs can be now obtained in the market. In this article, we evaluate performance of NoSQL databases that social network services and cloud computing services heavily adopt by using NVMe-based flash SSDs. To this end, we use NVMe SSD that Samsung Electronics recently developed, and the SSD used in this study has performance up to 3.5GB/s for sequential read/write operations. We use WiredTiger for NoSQL databases, and it is a default storage engine for MongoDB. Our experimental results show that log processing in NoSQL databases is a major overhead when high-performance NVMe-based flash SSDs are used. Furthermore, we optimize components of log processing and optimized WiredTiger show up to 15 times better performance than original WiredTiger.

Position Estimation of a Mobile Robot Based on USN and Encoder and Development of Tele-operation System using Internet (USN과 회전 센서를 이용한 이동로봇의 위치인식과 인터넷을 통한 원격제어 시스템 개발)

  • Park, Jong-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.55-61
    • /
    • 2009
  • This paper proposes a position estimation of a mobile robot based on USN(Ubiquitous Sensor Network) and encoder, and development of tele-operation system using Internet. USN used in experiments is based on ZigBee protocol and has location estimation engine which uses RSSI signal to estimate distance between nodes. By distortion the estimated distance using RSSI is not correct, compensation method is needed. We obtained fuzzy model to calculate more accurate distance between nodes and use encoder which is built in robot to estimate accurate position of robot. Based on proposed position estimation method, tele-operation system was developed. We show by experiment that proposed method is more appropriate for estimation of position and remote navigation of mobile robot through Internet.

  • PDF

An Extended SNMP Scheme for a Digital Convergence Device with Control Functions (제어 기능을 갖는 디지털 컨버전스 장비를 위한 SNMP 확장에 관한 연구)

  • Heo, Gil;Kim, Eun-Hoe;Choi, Jae-Young
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.369-380
    • /
    • 2009
  • SNMP (Simple Network Management Protocol) is a standard protocol for management of network devices, and it provides excellent features such as scalability, information management, authentication, encryption, and access control. However, SNMP has a structural weakness to fully support control functions for integrated management of digital convergence devices, and it has a limitation of message length in SNMP communication. In this paper, we present an extended SNMP scheme for integrated management of digital convergence devices with control functions. We modified the SNMP architecture by adding DDS (Device Driver Subsystem) to SNMP engine for controlling different devices and by defining CADM (Control Agent Driver Model), therefore we solved the ambiguity problem between 'set' and 'control' of SNMP. And the extended SNMP made it easy for SNMP applications to use various control functions. The extended SNMP can transport massive high-level information by adding three new SNMP commands which eliminate the limit of message length.

Structure Method for IOT Middle Ware with Plug-in module for Automation & Smart processing of Ppuri Manufacturing Factory (뿌리기업 자동화·스마트 공정을 위한 Plug-in 구조의 IOT 미들웨어 구축 방법)

  • Lee, Jeong-Hoon;Kim, Eui-Ryong;Kim, Sin-Ryeong;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.229-236
    • /
    • 2019
  • IOT middleware is required to play a pivotal role in interpreting, managing, and controlling data information of Internet devices (sensors, etc.). In particular, the root industry has different process flows for different industries, and there are various data processing requirements for each company. Therefore, a general purpose IOT middleware is needed to accommodate this. The IOT middleware structure proposed by this paper is a plug-in that can be used as an engine part for middleware basic processes such as communication, data collection, processing and service linkage, We propose a flexible and effective smart process for root industry. In addition, we propose a method to strengthen prevention and security against tampering, deodorization, etc. through encryption of network data between middleware plug - in and related service layer. We propose a system that will be developed as an IOT middleware platform that is specialized in the root industry so that it can be extended in various network protocols such as MQTT, COAP, XAMP.

Performance Evaluation of Energy Saving in Core Router and Edge Router Architectures with LPI for Green OBS Networks (Green OBS 망에서 LPI를 이용하는 코어 및 에지 라우터 구조의 에너지 절감 성능 분석)

  • Yang, Won-Hyuk;Jeong, Jin-Hyo;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2B
    • /
    • pp.130-137
    • /
    • 2012
  • In this paper, we propose core and edge router architectures with LPI(Low Power Idle) for reducing energy consumption in OBS networks. The proposed core router architecture is comprised of a BCP switch, a burst switch, line cards and sleep/wake controller for LPI. When the offered load of network is low, sleep/wake controller can change the state of the core router line card from active to sleep state for saving the energy after receiving network control packet. The edge router consists of a switch for access line card, a SCU and OBS edge router line cards. The LPI function in edge router line card is performed through network level control by network control packet, individually. Additionally, PHY/transceiver modules can transition active state to sleep state when burst assemble engine generates new bursts. To evaluate the energy saving performance of proposed architecture with LPI, the power consumption of each router is analyzed by using data sheet of commercial router and optical device. And, simulation is also performed in terms of sleep time of PHY/Transceiver through OPNET.