• Title/Summary/Keyword: Unidirectional network

Search Result 66, Processing Time 0.022 seconds

Response Analysis Model of Social Networks Using Fuzzy Sets and Feedback-Based System Dynamics (퍼지집합과 피드백 기반의 시스템 다이나믹스를 이용한 소셜네트웍의 반응 분석 모델)

  • Cho, Min-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.797-804
    • /
    • 2017
  • A social network is a typical social science environment with both network and iteration characteristics. This research presents a reaction analysis model of how each node responds to social networks when given input such as promotions or incentives. In addition, the setting value of a specific node is changed while examining the response of each node. And we try to understand the reactions of the nodes involved. The reaction analysis model is constructed by applying various techniques such as unidirectional, fuzzy set, weighting, and cyclic feedback, so it can accommodate the complicated environment of practice. Finally, the implementation model is implemented using Vensim rather than NetLogo because it requires repetitive input, change of setting value in real time, and analysis of association between nodes.

Home Energy Management System for Interconnecting and Sensing of Electric Appliances

  • Cho, Wei-Ting;Lai, Chin-Feng;Huang, Yueh-Min;Lee, Wei-Tsong;Huang, Sing-Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.7
    • /
    • pp.1274-1292
    • /
    • 2011
  • Due to the variety of household electric devices and different power consumption habits of consumers at present, general home energy management (HEM) systems suffer from the lack of dynamic identification of various household appliances and a unidirectional information display. This study presented a set of intelligent interconnection network systems for electric appliances, which can measure the power consumption of household appliances through a current sensing device based on OSGi platform. The system establishes the characteristics and categories of related electric appliances, and searches the corresponding cluster data and eliminates noise for recognition functionality and error detection mechanism of electric appliances by applying the clustering algorithm. The system also integrates household appliance control network services so as to control them according to users' power consumption plans or through mobile devices, thus realizing a bidirectional monitoring service. When the system detects an abnormal operating state, it can automatically shut off electric appliances to avoid accidents. In practical tests, the system reached a recognition rate of 95%, and could successfully control general household appliances through the ZigBee network.

A Heuristic Algorithm for Optimal Facility Placement in Mobile Edge Networks

  • Jiao, Jiping;Chen, Lingyu;Hong, Xuemin;Shi, Jianghong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3329-3350
    • /
    • 2017
  • Installing caching and computing facilities in mobile edge networks is a promising solution to cope with the challenging capacity and delay requirements imposed on future mobile communication systems. The problem of optimal facility placement in mobile edge networks has not been fully studied in the literature. This is a non-trivial problem because the mobile edge network has a unidirectional topology, making existing solutions inapplicable. This paper considers the problem of optimal placement of a fixed number of facilities in a mobile edge network with an arbitrary tree topology and an arbitrary demand distribution. A low-complexity sequential algorithm is proposed and proved to be convergent and optimal in some cases. The complexity of the algorithm is shown to be $O(H^2{\gamma})$, where H is the height of the tree and ${\gamma}$ is the number of facilities. Simulation results confirm that the proposed algorithm is effective in producing near-optimal solutions.

Architecture Design for Maritime Centimeter-Level GNSS Augmentation Service and Initial Experimental Results on Testbed Network

  • Kim, Gimin;Jeon, TaeHyeong;Song, Jaeyoung;Park, Sul Gee;Park, Sang Hyun
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.11 no.4
    • /
    • pp.269-277
    • /
    • 2022
  • In this paper, we overview the system development status of the national maritime precise point positioning-real-time kinematic (PPP-RTK) service in Korea, also known as the Precise POsitioning and INTegrity monitoring (POINT) system. The development of the POINT service began in 2020, and the open service is scheduled to start in 2025. The architecture of the POINT system is composed of three provider-side facilities-a reference station, monitoring station, and central control station-and one user-side receiver platform. Here, we propose the detailed functionality of each component considering unidirectional broadcasting of augmentation data. To meet the centimeter-level user positioning accuracy in maritime coverage, new reference stations were installed. Each reference station operates with a dual receiver and dual antenna to reduce the risk of malfunctioning, which can deteriorate the availability of the POINT service. The initial experimental results of a testbed from corrections generated from the testbed network, including newly installed reference stations, are presented. The results show that the horizontal and vertical accuracies satisfy 2.63 cm and 5.77 cm, respectively. For the purpose of (near) real-time broadcasting of POINT correction data, we designed a correction message format including satellite orbit, satellite clock, satellite signal bias, ionospheric delay, tropospheric delay, and coordinate transformation parameters. The (near) real-time experimental setup utilizing (near) real-time processing of testbed network data and the designed message format are proposed for future testing and verification of the system.

A Study on Leakage of Critical Information via the Power Analysis of Power Lines (전원선의 전력분석을 이용한 주요정보 유출 가능성에 관한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.11
    • /
    • pp.1571-1574
    • /
    • 2014
  • In this paper, we propose a unidirectional transmission of critical information obtained by keyboard hacking or kernel and keyboard driver hacking even though the computer is not connected to the external network. We show the hacking can be attempted in the proposed method to show the way preventing such attempts in advance. Firewalls and other various methods are used to prevent the hacking from the external network but the hacking is also attempted in various ways to detour the firewall. One of the most effective way preventing from the hacking attack is physically disconnect the internal intranet systems from the external internet and most of the government systems, military systems and big corporate systems are using this way as on one of the protection method. In this paper, we show the feasibility of transmission of security codes, etc via the short message to the external network on the assumption that a hacking program such as Trojan Horse is installed on the computer systems separated from the external network. Previous studies showed that the letters on the monitor can be hijacked by electromagnetic analysis on the computer to obtain the information even though the system is not connected ti the network. Other studies showed that the security code hint can obtained by analyzing the power consumption distribution of CPU. In this paper, the power consumption distribution of externally accessible power line is analyzed to obtain the information and the information can be transmitted to the external network. Software controlling the CPU and GPU usage is designed to control the power supply of computer. The sensors such as the Rogowski coils can be used on the external power line to collect the data of power consumption change rates. To transmit the user password by short message, due to the capacitive components and the obstacle from other power supply, A very slow protocol are used.

Asan Medical Center Laboratory Information System (R) Information Communication System for Routine Hematology Using a Down-Sized Computer - (서울중앙병원 임상병리과 정보관리시스템(III))

  • 민원기;최윤미
    • Journal of Biomedical Engineering Research
    • /
    • v.15 no.3
    • /
    • pp.333-340
    • /
    • 1994
  • Laboratory information system (LIS) is a key tool to manage laboratory data in clinical pathology. Our department has developed an information system for routine hematology using down-sized computer system. We have used an IBM 486 compatible PC with 16 MB main memory, 210 MB hard disk drive, 9 RS-232C port and 24 pin dot printer The operating system and database management system were SCO UNIX and SCO foxbase, respectively. For program development, we used Xbase language provided by SCO foxbase. The C language was used for interface purpose. To make the system use friendly, pull-down menu was used. The system connected to our hospital information system via application program interface (API), so the information related to patient and request details is automatically transmitted to our computer. Our system interfaced with two complete blood count analyzers (Sysmex WE-8000 and Coulter STKS) for unidirectional data transmission from analyzer to computer. The authors suggests that this system based on down-sized computer could provide a progressive approach to total LIS based on local area network, and the implemented system could serve as a model for other hospital's LIS for routine hematology.

  • PDF

Design of a Limited Two-Way Communications System (제한적 양방향 통신 시스템 설계)

  • Kim, Dongwook;Min, Byunggil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1129-1140
    • /
    • 2017
  • Unidirectional data transmission system, which allows physical one way transmission, removes the backward link physically to prevent the intrusion from the outside through the network. However, the system is difficult to apply to the environment requiring either backward transmissions or bi-directional communications. In this paper, we proposed Limited Two-way communications system, called as LimTway, which only allows outbound TCP two-way communications. LimTway uses two one-way links(forward, backward). While the forward one-way link is staying to be activated so that an allowed outbound UDP traffic could be transmitted one-way always, the backward one-way link is activated while allowed outbound TCP sessions are established. In order to prevent the intrusion from the outside during the period, the software of LimTway is designed to allow only the transmissions of both outbound TCP two-way communication traffics and outbound UDP traffics.

Performance Analysis of the fairmess MAC protocol under the CATV/LAN network (CATV/LAN 전송망에서 공정성을 고려한 MAC프로토콜의 성능해석에 관한 연구)

  • 우상철;윤종호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1A
    • /
    • pp.74-80
    • /
    • 2000
  • In this paper, we proposed the MAC protocol and analyzed the performance for CATV/LAN network which was based upon HFC(hybrid optic coaxial) increased abruptly as alternative method of high speed network. Upstream channel which analyzed very deeply for CATV/LAN network have the preferential access property depending upon that position and unidirectional property. To solve this fairness problem, we propose the CSMA-CD/U/P protocol that transm it as $P_i$ probability although data packets is immediately transmitted when it was occurred. As the analytic result and simulation, we obtained $P_i$ value and its average delay time. Also, we get its variance value and queue length distribution. The mean delay time and queue length increase as the load and number of stations increase in the CATV/LAN network.

  • PDF

Comparative study on cleaning effects of air scouring and unidirectional flushing considering water flow direction of water pipes (상수도관의 물 흐름 방향을 고려한 공기주입 세척 및 단방향 플러싱 공법의 세척 효과 비교 연구)

  • Seo, Jeewon;Lee, Gyusang;Kim, Kibum;Hyung, Jinseok;Kim, Taehyeon;Koo, Jayong
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.33 no.5
    • /
    • pp.353-366
    • /
    • 2019
  • This research proposes an optimal flushing operation technique in an effort to prevent secondary water pollutions and accidents in aged pipes, and to improve the cleaning effect of unidirectional flushing. Water flow directions were analyzed using EPANET 2.0, while flushing and air scouring experiments in forward and reverse directions were performed in the field. In 42 experiments, average residual chlorine concentration and turbidity were improved after cleaning compared to before cleaning. It was found that even when the same cleaning method was used, further improvement of cleaning effect was possible by applying air injection and reverse direction cleaning techniques. By means of one-way ANOVA(Analysis of variance), it was also possible to statistically verify the need of actively utilizing air injection and reverse direction cleaning. Based on correlation between turbidity and TSS, the total amount of suspended solids removal was estimated for 874 flushing operations and 194 air scouring operations. The result showed that air scouring used more discharge water than flushing by an average of $4.9m^3$ yet with larger amounts of suspended solids removal by an average of 145.9 g. The result of analysis on turbidity values from 887 flushing operations showed low cleaning effect of unidirectional flushing for the pipes with diameters over 300 mm. In addition, the turbidity values measured during cleaning showed an increasing tendency as pipe age increased. The methodology and results of this research are expected to contribute to the efficient maintenance and improvement of water quality in water distribution networks. Follow-up research involving the measurement of water quality at regular time intervals during cleaning would allow a more accurate comparison of discharge water quality characteristics and cleaning effects between different cleaning methods. To this end, it is considered necessary to develop a standardized manual that can be used in the field and to provide relevant trainings.

Survivable Traffic Grooming in WDM Ring Networks

  • Sankaranarayanan, Srivatsan;Subramaniam, Suresh;Choi, Hong-Sik;Choi, Hyeong-Ah
    • Journal of Communications and Networks
    • /
    • v.9 no.1
    • /
    • pp.93-104
    • /
    • 2007
  • Traffic grooming, in which low-rate circuits are multiplexed onto wavelengths, with the goal of minimizing the number of add-drop multiplexers (ADMs) and wavelengths has received much research attention from the optical networking community in recent years. While previous work has considered various traffic models and network architectures, protection requirements of the circuits have not been considered. In this paper, we consider survivable traffic grooming, or grooming traffic which contains a mix of circuits that need protection and that do not need protection. We assume a unidirectional ring network with all-to-all symmetric traffic with $t\geq1$ circuits between each node pair, of which s require protection. As it turns out, survivable traffic grooming presents a significant tradeoff between the number of wavelengths and the number of ADMs, which is almost non-existent in non-survivable traffic grooming for this type of traffic. We explore this tradeoff for some specific cases in this paper. We also present some new results and solution methods for solving certain non-survivable traffic grooming problems.