• Title/Summary/Keyword: Open Computing Environment

Search Result 206, Processing Time 0.019 seconds

A Basic Guide to Network Simulation Using OMNeT++ (OMNeT++을 이용한 네크워크 시뮬레이션 기초 가이드)

  • Sooyeon Park
    • Journal of Internet Computing and Services
    • /
    • v.25 no.4
    • /
    • pp.1-6
    • /
    • 2024
  • OMNeT++ (Objective Modular Network Testbed in C++) is an extensible and modular C++ simulation library and framework for building network simulators. OMNeT++ provides simulation models independently developed for various fields, including sensor networks, and Internet protocols. This enables researchers to use the tools and features required for their desired simulations. OMNeT++ uses NED (Network Description) Language to define nodes and network topologies, and it is able to implement the creation and behavior of defined network objects in C++. Moreover, the INET framework is an open-source model library for the OMNeT++ simulation environment, containing models for various networking protocols and components, making it convenient for designing and validating new network protocols. This paper aims to explain the concepts of OMNeT++ and the procedures for network simulation using the INET framework to assist novice researchers in modeling and analyzing various network scenarios.

Visual Verb and ActionNet Database for Semantic Visual Understanding (동영상 시맨틱 이해를 위한 시각 동사 도출 및 액션넷 데이터베이스 구축)

  • Bae, Changseok;Kim, Bo Kyeong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.5
    • /
    • pp.19-30
    • /
    • 2018
  • Visual information understanding is known as one of the most difficult and challenging problems in the realization of machine intelligence. This paper proposes deriving visual verb and construction of ActionNet database as a video database for video semantic understanding. Even though development AI (artificial intelligence) algorithms have contributed to the large part of modern advances in AI technologies, huge amount of database for algorithm development and test plays a great role as well. As the performance of object recognition algorithms in still images are surpassing human's ability, research interests shifting to semantic understanding of video contents. This paper proposes candidates of visual verb requiring in the construction of ActionNet as a learning and test database for video understanding. In order to this, we first investigate verb taxonomy in linguistics, and then propose candidates of visual verb from video description database and frequency of verbs. Based on the derived visual verb candidates, we have defined and constructed ActionNet schema and database. According to expanding usability of ActionNet database on open environment, we expect to contribute in the development of video understanding technologies.

Efficient RSA-Based PAKE Procotol for Low-Power Devices (저전력 장비에 적합한 효율적인 RSA 기반의 PAKE 프로토콜)

  • Lee, Se-Won;Youn, Taek-Young;Park, Yung-Ho;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.23-35
    • /
    • 2009
  • Password-Authenticated Key Exchange (PAKE) Protocol is a useful tool for secure communication conducted over open networks without sharing a common secret key or assuming the existence of the public key infrastructure (PKI). It seems difficult to design efficient PAKE protocols using RSA, and thus many PAKE protocols are designed based on the Diffie-Hellman key exchange (DH-PAKE). Therefore it is important to design an efficient PAKE based on RSA function since the function is suitable for designing a PAKE protocol for imbalanced communication environment. In this paper, we propose a computationally-efficient key exchange protocol based on the RSA function that is suitable for low-power devices in imbalanced environment. Our protocol is more efficient than previous RSA-PAKE protocols, required theoretical computation and experiment time in the same environment. Our protocol can provide that it is more 84% efficiency key exchange than secure and the most efficient RSA-PAKE protocol CEPEK. We can improve the performance of our protocol by computing some costly operations in offline step. We prove the security of our protocol under firmly formalized security model in the random oracle model.

Random Balance between Monte Carlo and Temporal Difference in off-policy Reinforcement Learning for Less Sample-Complexity (오프 폴리시 강화학습에서 몬테 칼로와 시간차 학습의 균형을 사용한 적은 샘플 복잡도)

  • Kim, Chayoung;Park, Seohee;Lee, Woosik
    • Journal of Internet Computing and Services
    • /
    • v.21 no.5
    • /
    • pp.1-7
    • /
    • 2020
  • Deep neural networks(DNN), which are used as approximation functions in reinforcement learning (RN), theoretically can be attributed to realistic results. In empirical benchmark works, time difference learning (TD) shows better results than Monte-Carlo learning (MC). However, among some previous works show that MC is better than TD when the reward is very rare or delayed. Also, another recent research shows when the information observed by the agent from the environment is partial on complex control works, it indicates that the MC prediction is superior to the TD-based methods. Most of these environments can be regarded as 5-step Q-learning or 20-step Q-learning, where the experiment continues without long roll-outs for alleviating reduce performance degradation. In other words, for networks with a noise, a representative network that is regardless of the controlled roll-outs, it is better to learn MC, which is robust to noisy rewards than TD, or almost identical to MC. These studies provide a break with that TD is better than MC. These recent research results show that the way combining MC and TD is better than the theoretical one. Therefore, in this study, based on the results shown in previous studies, we attempt to exploit a random balance with a mixture of TD and MC in RL without any complicated formulas by rewards used in those studies do. Compared to the DQN using the MC and TD random mixture and the well-known DQN using only the TD-based learning, we demonstrate that a well-performed TD learning are also granted special favor of the mixture of TD and MC through an experiments in OpenAI Gym.

Spatio-Temporal Semantic Sensor Web based on SSNO (SSNO 기반 시공간 시맨틱 센서 웹)

  • Shin, In-Su;Kim, Su-Jeong;Kim, Jeong-Joon;Han, Ki-Joon
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.9-18
    • /
    • 2014
  • According to the recent development of the ubiquitous computing environment, the use of spatio-temporal data from sensors with GPS is increasing, and studies on the Semantic Sensor Web using spatio-temporal data for providing different kinds of services are being actively conducted. Especially, the W3C developed the SSNO(Semantic Sensor Network Ontology) which uses sensor-related standards such as the SWE(Sensor Web Enablement) of OGC and defines classes and properties for expressing sensor data. Since these studies are available for the query processing about non-spatio-temporal sensor data, it is hard to apply them to spatio-temporal sensor data processing which uses spatio-temporal data types and operators. Therefore, in this paper, we developed the SWE based on SSNO which supports the spatio-temporal sensor data types and operators expanding spatial data types and operators in "OpenGIS Simple Feature Specification for SQL" by OGC. The system receives SensorML(Sensor Model Language) and O&M (Observations and Measurements) Schema and converts the data into SSNO. It also performs the efficient query processing which supports spatio-temporal operators and reasoning rules. In addition, we have proved that this system can be utilized for the web service by applying it to a virtual scenario.

Channel assignment for 802.11p-based multi-radio multi-channel networks considering beacon message dissemination using Nash bargaining solution (802.11p 기반 다중 라디오 다중채널 네트워크 환경에서 안전 메시지 전송을 위한 내쉬 협상 해법을 이용한 채널할당)

  • Kwon, Yong-Ho;Rhee, Byung-Ho
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.63-69
    • /
    • 2014
  • For the safety messages in IEEE 802.11p vehicles network environment(WAVE), strict periodic beacon broadcasting requires status advertisement to assist the driver for safety. WAVE standards apply multiple radios and multiple channels to provide open public road safety services and improve the comfort and efficiency of driving. Although WAVE standards have been proposed multi-channel multi-radio, the standards neither consider the WAVE multi-radio environment nor its effect on the beacon broadcasting. Most of beacon broadcasting is designed to be delivered on only one physical device and one control channel by the WAVE standard. also conflict-free channel assignment of the fewest channels to a given set of radio nodes without causing collision is NP-hard, even with the knowledge of the network topology and all nodes have the same transmission radio. Based on the latest standard IEEE 802.11p and IEEE 1609.4, this paper proposes an interference aware-based channel assignment algorithm with Nash bargaining solution that minimizes interference and increases throughput with wireless mesh network, which is deigned for multi-radio multi-cahnnel structure of WAVE. The proposed algorithm is validated against numerical simulation results and results show that our proposed algorithm is improvements on 8 channels with 3 radios compared to Tabu and random channel allocation algorithm.

Strengthening security structure of open Blockchain platform to enhance privacy protection of DApp users (DApp 사용자의 프라이버시 보호 강화를 위한 공개형 블록체인 플랫폼 보안구조 강화방안)

  • Hwang, Seonjin;Ko, DongHyun;Bahk, Taeu;Choi, Yoon-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.1-9
    • /
    • 2020
  • Along with the growth of Blockchain, DApp (Distributed Application) is getting attention. As interest in DApp grows, market size continues to grow and many developers participate in development. Many developers are using API(Application Programming Interface) services to mediate Blockchain nodes, such as Infura, for DApp development. However, when using such a service, there is a serious risk that the API service operator can violate the user's privacy by 1 to 1 matching the account address of the Transaction executed by the DApp user with the IP address of the DApp user. It can have an adverse effect on the reliability of public Blockchains that need to provide users with a secure DApp service environment. The proposed Blockchain platform is expected to provide user privacy protection from API services and provide a reliable DApp use environment that existing Blockchain platforms did not provide. It is also expected to help to activate DApp and increase the number of DApp users, which has not been activated due to the risk of an existing privacy breach.

Active Network Management System with Automatic Generation of Network Management Program using Triggers (트리거를 이용한 네트워크관리프로그램 자동생성 기능을 가진 능동적인 네트워크 관리 시스템)

  • Shin, Moon-Sun;Lee, Myong-Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.19-31
    • /
    • 2009
  • Network management involves configuring and operating various network elements in a suitable manner. Generally, a network management system can perform basic functionalities such as configuration management, performance management, and fault management. Due to the open structure of the Internet, the volume of network traffic and the network equipment used have increased in size and complexity. Therefore, it is expensive and time consuming to develop a network management program for heterogeneous network equipment in an SNMP.based network. In order to facilitate the management of network environments and the control of heterogeneous devices in an efficient manner, we propose an Active Network Management System (ANMS) comprising an automatic generator that uses triggers to generate a network management program. The concept of triggers can be represented through event condition action rules performed in response to a change in the status of a network environment. The proposed ANMS comprises basic components for real time network management and also includes an automatic generator (AG). When the ANMS is monitoring network elements that are newly added or changed, a trigger rule is activated and these components are then able to collaborate and automatically generate a new network management program by using the information provided along with the SNMP libraries. Our method is useful for expanding the network structure and replacing network equipment. Through experiments, we have proved that our ANMS is useful when new network objects are added or changed in the network environment to expand the network structure. Further, we have verified that our ANMS system reduces the time and cost required to develop a network management program as compared to the manual method used in existing network management systems.

  • PDF

Geometry Design of a Pitch Controlling Type Horizontal Axis Turbine and Comparison of Power Coefficients (피치각 제어형 수평축 조류 터빈의 형상설계 및 출력계수 비교)

  • Park, Hoon Cheol;Truong, Quang-Tri;Phan, Le-Quang;Ko, Jin Hwan;Lee, Kwang-Soo;Le, Tuyen Quang;Kang, Taesam
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.17 no.3
    • /
    • pp.167-173
    • /
    • 2014
  • In this work, based on the blade element-momentum theory (BEMT), we proposed the geometry of a lab-scale horizontal axis tidal turbine with a diameter of 80cm, which can demonstrate the maximum power coefficient, and investigated the effect of blade pitch angle increase on the power coefficient. For validation of the computed power coefficients by the BEMT, we also computed the power coefficient using the computational fluid dynamics (CFD) for each case. For the CFD, 15 times of the turbine radius was used for the length and diameter of the computational domain, and the open boundary condition was prescribed at the boundary of the computational domain. The maximum power coefficients of the turbine acquired by the BEMT and CFD were about 48%, showing a good agreement. Both of the power coefficients computed by the BEMT and CFD tended to decrease when the blade pitch angle increases. The two power coefficients for a given tip-speed ratio were in good agreement. Through the present study, we have confirmed that we can trust the proposed geometry and the computed power coefficients based on the BEMT.

Development of a Remote Multi-Task Debugger for Qplus-T RTOS (Qplus-T RTOS를 위한 원격 멀티 태스크 디버거의 개발)

  • 이광용;김흥남
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.393-409
    • /
    • 2003
  • In this paper, we present a multi-task debugging environment for Qplus-T embedded-system such as internet information appliances. We will propose the structure and functions of a remote multi-task debugging environment supporting environment effective ross-development. And, we are going enhance the communication architecture between the host and target system to provide more efficient cross-development environment. The remote development toolset called Q+Esto consists to several independent support tools: an interactive shell, a remote debugger, a resource monitor, a target manager and a debug agent. Excepting a debug agent, all these support tools reside on the host systems. Using the remote multi-task debugger on the host, the developer can spawn and debug tasks on the target run-time system. It can also be attached to already-running tasks spawned from the application or from interactive shell. Application code can be viewed as C/C++ source, or as assembly-level code. It incorporates a variety of display windows for source, registers, local/global variables, stack frame, memory, event traces and so on. The target manager implements common functions that are shared by Q+Esto tools, e.g., the host-target communication, object file loading, and management of target-resident host tool´s memory pool and target system´s symbol-table, and so on. These functions are called OPEn C APIs and they greatly improve the extensibility of the Q+Esto Toolset. The Q+Esto target manager is responsible for communicating between host and target system. Also, there exist a counterpart on the target system communicating with the host target manager, which is called debug agent. Debug agent is a daemon task on real-time operating systems in the target system. It gets debugging requests from the host tools including debugger via target manager, interprets the requests, executes them and sends the results to the host.