• Title/Summary/Keyword: Two-Mode Network

Search Result 255, Processing Time 0.027 seconds

Software Engineering Meets Network Engineering: Conceptual Model for Events Monitoring and Logging

  • Al-Fedaghi, Sabah;Behbehani, Bader
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.9-20
    • /
    • 2021
  • Abstraction applied in computer networking hides network details behind a well-defined representation by building a model that captures an essential aspect of the network system. Two current methods of representation are available, one based on graph theory, where a network node is reduced to a point in a graph, and the other the use of non-methodological iconic depictions such as human heads, walls, towers or computer racks. In this paper, we adopt an abstract representation methodology, the thinging machine (TM), proposed in software engineering to model computer networks. TM defines a single coherent network architecture and topology that is constituted from only five generic actions with two types of arrows. Without loss of generality, this paper applies TM to model the area of network monitoring in packet-mode transmission. Complex network documents are difficult to maintain and are not guaranteed to mirror actual situations. Network monitoring is constant monitoring for and alerting of malfunctions, failures, stoppages or suspicious activities in a network system. Current monitoring systems are built on ad hoc descriptions that lack systemization. The TM model of monitoring presents a theoretical foundation integrated with events and behavior descriptions. To investigate TM modeling's feasibility, we apply it to an existing computer network in a Kuwaiti enterprise to create an integrated network system that includes hardware, software and communication facilities. The final specifications point to TM modeling's viability in the computer networking field.

Variable structure control of robot manipulator using neural network (신경 회로망을 이용한 가변 구조 로보트 제어)

  • 이종수;최경삼;김성민
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10a
    • /
    • pp.7-12
    • /
    • 1990
  • In this paper, we propose a new manipulator control scheme based on the CMAG neural network. The proposed control consists of two components. The feedforward component is an output of trained CMAC neural network and the feedback component is a modified sliding mode control. The CMAC accepts the position, velocity and acceleration of manipulator as input and outputs two values for the controller : One is the nominal torque used for feedforward compensation(M1 network) and the other is the inertia matrix related information used for the feedback component(M2 network). Since the used control algorithm guarantees the robust trajectory tracking in spite of modeling errors, the CMAC mapping errors due to the memory limitation are little worth consideration.

  • PDF

Seamless Transfer of Single-Phase Utility Interactive Inverters with a Synchronized Output Regulation Strategy

  • Xiang, Ji;Ji, Feifan;Nian, Heng;Zhang, Junming;Deng, Hongqiao
    • Journal of Power Electronics
    • /
    • v.16 no.5
    • /
    • pp.1821-1832
    • /
    • 2016
  • This study presents a strategy using the synchronized output regulation method (SOR) for controlling inverters operating in stand-alone and grid-connected modes. From the view point of networked dynamic systems, SOR involves nodes with outputs that are synchronized but also display a desirable wave shape. Under the SOR strategy, the inverter and grid are treated as two nodes that comprise a simple network. These two nodes work independently under the stand-alone mode. An intermediate mode, here is named the synchronization mode, is emphasized because the transition from the stand-alone mode to the grid-connected mode can be dealt as a standard SOR problem. In the grid-connected mode, the inverter operates in an independent way, in which the voltage reference changes for generalized synchronization where its output current satisfies the required power injection. Such a relatively independent design leads to a seamless transfer between operation modes. The closed-loop system is analyzed in the state space on the basis of the output regulation theory, which improves the robustness of the design. Simulations and experiments are performed to verify the proposed control strategy.

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques

  • El-Semary, Aly M.;Mostafa, Mostafa Gadal-Haqq M.
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.481-500
    • /
    • 2010
  • The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools is an Intrusion detection system which can be classified based on detection approachs as being signature-based or anomaly-based. Even though intrusion detection systems are well defined, their cooperation with each other to detect attacks needs to be addressed. Consequently, a new architecture that allows them to cooperate in detecting attacks is proposed. The architecture uses Software Agents to provide scalability and distributability. It works in two modes: learning and detection. During learning mode, it generates a profile for each individual system using a fuzzy data mining algorithm. During detection mode, each system uses the FuzzyJess to match network traffic against its profile. The architecture was tested against a standard data set produced by MIT's Lincoln Laboratory and the primary results show its efficiency and capability to detect attacks. Finally, two new methods, the memory-window and memoryless-window, were developed for extracting useful parameters from raw packets. The parameters are used as detection metrics.

Electro-optical devices from polymer-stabilized liquid crystals with molecular shape polarity

  • Kim, Sang-Hwa;Chien, Liang Chy;Komitov, Lachezar
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.839-842
    • /
    • 2004
  • We present a fast-switching electro-optical device based on flexoelectro-optic effect in short pitch cholesterics oriented in uniform lying helix texture. The device has two operating modes: amplitude and phase modulation mode. The amplitude modulation mode is a fast in-plane switching of the device optic axis that enables to achieve a high percent of modulation of the transmitted light intensity whereas the phase mode gives a continuous change of the refractive index and thus of the phase shift of the transmitted light. By using a small concentration of diacrylate monomer and selecting the illumination conditions we have been able to create a inhomogeneous polymeric network mostly localized at both substrate surfaces and stabilize the two switching modes.

  • PDF

Priority Based Multi-Channel MAC Protocol for Real-Time Monitoring of Weapon Flight Test Using WSNs

  • Min, Joonki;Kim, Joo-Kyoung;Kwon, Youngmi;Lee, Yong-Jae
    • Journal of Sensor Science and Technology
    • /
    • v.22 no.1
    • /
    • pp.18-27
    • /
    • 2013
  • Real-time monitoring is one of the prime necessities in a weapon flight test that is required for the efficient and timely collection of large amounts of high-rate sampled data acquired by an event-trigger. The wireless sensor network is a good candidate to resolve this requirement, especially considering the inhospitable environment of a weapon flight test. In this paper, we propose a priority based multi-channel MAC protocol with CSMA/CA over a single radio for a real-time monitoring of a weapon flight test. Multi-channel transmissions of nodes can improve the network performance in wireless sensor networks. Our proposed MAC protocol has two operation modes: Normal mode and Priority Mode. In the normal mode, the node exploits the normal CSMA/CA mechanism. In the priority mode, the node has one of three grades - Class A, B, and C. The node uses a different CSMA/CA mechanism according to its grade that is determined by a signal level. High grade nodes can exploit more channels and lower backoff exponents than low ones, which allow high grade nodes to obtain more transmission opportunities. In addition, it can guarantee successful transmission of important data generated by high grade nodes. Simulation results show that the proposed MAC exhibits excellent performance in an event-triggered real-time application.

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area

  • Liu, Xuefeng;Quan, Hanyu;Zhang, Yuqing;Zhao, Qianqian;Liu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1229-1248
    • /
    • 2016
  • With the feature of convenience and low cost, remote healthcare monitoring (RHM) has been extensively used in modern disease management to improve the quality of life. Due to the privacy of health data, it is of great importance to implement RHM based on a secure and dependable network. However, the network connectivity of existing RHM systems is unreliable in disaster area because of the unforeseeable damage to the communication infrastructure. To design a secure RHM system in disaster area, this paper presents a Secure VANET-Assisted Remote Healthcare Monitoring System (SVC) by utilizing the unique "store-carry-forward" transmission mode of vehicular ad hoc network (VANET). To improve the network performance, the VANET in SVC is designed to be a two-level network consisting of two kinds of vehicles. Specially, an innovative two-level key management model by mixing certificate-based cryptography and ID-based cryptography is customized to manage the trust of vehicles. In addition, the strong privacy of the health information including context privacy is taken into account in our scheme by combining searchable public-key encryption and broadcast techniques. Finally, comprehensive security and performance analysis demonstrate the scheme is secure and efficient.

Enhanced Common-Mode Noise Rejection Method Based on Impedance Mismatching Compensation for Wireless Capsule Endoscopy Systems

  • Hwang, Won-Jun;Kim, Ki-Yun;Choi, Hyung-Jin
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.637-645
    • /
    • 2015
  • Common-mode noise (CMN) is an unresolved problem in wireless capsule endoscopy (WCE) systems. In a WCE system, CMN originates from various electric currents found within the human body or external interference sources and causes critical demodulation performance degradation. The differential operation, a typical method for the removal of CMN rejection, can remove CMN by subtracting two signals simultaneously received by two reception sensors attached to a human body. However, when there is impedance mismatching between the two reception sensors, the differential operation method cannot completely remove CMN. Therefore, to overcome this problem, we propose an enhanced CMN rejection method. The proposed method performs not only subtraction but also addition between two received signals. Then a CMN ratio can be estimated by sufficient accumulation of division operation outcomes between the subtraction and addition outputs during the guard period. Finally, we can reject the residual CMN by combining the subtraction and addition outputs.

Design and Fabrication of a Dual-Band Bandpass Filter Using a Dual-Mode Ring Resonator with Two Short-Circuited Stubs for WLAN Application (두 단락 스터브를 갖는 이중 모드 링 공진기를 이용한 WLAN용 이중대역 대역통과 여파기의 설계 및 제작)

  • Choi, Byung-Chang
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.9
    • /
    • pp.814-820
    • /
    • 2015
  • In this paper, A high selective dual-band bandpass filter was proposed using a dual-mode ring resonator with two short-circuited stubs. For dual-mode resonance, the ring resonator is directly connected with non-orthogonal feed-lines via coupling capacitors. Two short-circuited stubs which are unequal lengths are simultaneously placed at two corners along the two symmetry plane of the ring resonator in order to obtain dual-band responses. Because the feeding angle perturbated ring resonator of the proposed dual-band bandpass filter has the symmetrical structure, Even/Odd mode analysis can be well applied to extract the scattering parameters and transmission zero frequencies. The proposed dual-band bandpass filter was designed and fabricated for WLAN(Wireless Local Area Network) application of IEEE 802.11n standard. The measured results showed a good agreement with the simulation results, and it should be well applied not only for WLAN applications but also for any other communication systems.

Face/non-face channel fit comparison of life insurance company and non-life insurance company using social network analysis (소셜네트워크 분석을 활용한 생보사와 손보사의 대면/비대면 채널의 적합성 비교)

  • Chun, Heuiju;Leem, Byunghak
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.6
    • /
    • pp.1207-1219
    • /
    • 2014
  • In this study, 1) we compare face channel and non-face channel of life insurance company and non-life insurance company with insurance employs' suitability opinion about channel type, channel property, channel evaluation items requiring when selling insurance products, 2) we construct two social networks for life insurance companies and non-life insurance companies and find/compare two networks' properties, and then want to suggest any direction about sale channel strategy. As the result of comparing social networks of life insurance company and non-life insurance company created by insurance selling channel fit evaluation, employs of life insurance companies have more common opinion than those of non-life insurance companies and so can have more same directional channel strategy. However, property insurance companies need to manage their own channel strategy based on their own circumstance.