• Title/Summary/Keyword: User Network

Search Result 4,628, Processing Time 0.035 seconds

The Network Architecture and Protocol for Avatar Interaction in Distributed Virtual Environment (분산 가상공간내 분신간 상호작용을 위한 네트웍 구조 및 프로토콜 설계)

  • SUNG, ManKyu;PARK, ChanJong;KIM, DongHyun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.4 no.1
    • /
    • pp.47-54
    • /
    • 1998
  • The multi-user VR system can more enhance the sense of reality than existing single user VR system, but it also cause a significant problem about network structure and protocol, since the current Internet using TCP/IP can not afford to deliver such a massive information required to the real-time constraint of multi-user VR system. In this paper, we introduce new network structure and protocol for multiple user's virtual world navigation and interaction through their avatars. The virtual worlds are based on virtual building and managed by distributed servers. The avatars have 9 behaviors and recognize the state of each other by pre-defined network protocol.

  • PDF

Development of User Protocol Converter about Modbus and NMEA0183 (Modbus와 NMEA0183에 대한 사용자 프로토콜 컨버터 개발)

  • Eum, Sang-hee;Hong, Sung-ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2584-2589
    • /
    • 2015
  • In this paper, we want to able to reduce the time effectively about the analysis of protocol and development of protocol converter in industrial network. For this purpose, we developed the user protocol converter that can be to analysing the communication protocol in the industrial network. and also that is able to converting to user protocol and transmitting to another network. The developed user protocol converter was consist of S/W and H/W, and is supporting the Modbus, the NMEA0183 and the ethernet. The hardware main processor was used the AVR128, and placed the serial communication part and the ethernet part in converter board. The experiment results, we acquired very high transmission rate and conversion rate.

Joint Opportunistic Spectrum Access and Optimal Power Allocation Strategies for Full Duplex Single Secondary User MIMO Cognitive Radio Network

  • Yue, Wenjing;Ren, Yapeng;Yang, Zhen;Chen, Zhi;Meng, Qingmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.3887-3907
    • /
    • 2015
  • This paper introduces a full duplex single secondary user multiple-input multiple-output (FD-SSU-MIMO) cognitive radio network, where secondary user (SU) opportunistically accesses the authorized spectrum unoccupied by primary user (PU) and transmits data based on FD-MIMO mode. Then we study the network achievable average sum-rate maximization problem under sum transmit power budget constraint at SU communication nodes. In order to solve the trade-off problem between SU's sensing time and data transmission time based on opportunistic spectrum access (OSA) and the power allocation problem based on FD-MIMO transmit mode, we propose a simple trisection algorithm to obtain the optimal sensing time and apply an alternating optimization (AO) algorithm to tackle the FD-MIMO based network achievable sum-rate maximization problem. Simulation results show that our proposed sensing time optimization and AO-based optimal power allocation strategies obtain a higher achievable average sum-rate than sequential convex approximations for matrix-variable programming (SCAMP)-based power allocation for the FD transmission mode, as well as equal power allocation for the half duplex (HD) transmission mode.

A Researcher Model based on Ontology and a Social Network Construction Technique (온톨로지 기반의 연구자 모델링 기법과 연구자 네트워크 구축 기법)

  • Mun, Hyeon-Jeong;Jun, In-Ha;Woo, Yong-Tae
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.7
    • /
    • pp.1022-1031
    • /
    • 2009
  • In this paper, we propose a researcher modeling technique based on ontology and construct social network for researchers using diverse relational properties. User ontology schema is created by extending the existing HR-XML model for a researcher model. User ontology schema and instance are created by OWL. We compose social network model for efficient cooperation between researchers using static relational properties such as educational background and dynamic relational properties such as co-authors and co-workers, etc. Closeness has direction because researcher network is differently configured by the researchers. We define inferencing rules using SWRL and inference ontology rules using racer inference machine to compose direct relationships between researchers. The proposed model for researchers can be applied to the cooperation model for researchers by retrieving common expert group dynamically.

  • PDF

A Study for PKI Based Home Network System Authentication and Access Control Protocol (PKI 기반 홈 네트워크 시스템 인증 및 접근제어 프로토콜에 관한 연구)

  • Lee, Young-Gu;Kim, Jung-Jae;Kim, Hyun-Chul;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.592-598
    • /
    • 2010
  • A home network system is made up of subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. So, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this paper designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

Implementation of User Interface for ZigBee Wireless Network (ZigBee 무선 네트워크를 위한 사용자 인터페이스의 구현)

  • Lee, Hye-rim;Kim, Yu-doo;Kang, Cheol-gyu;Oh, Chang-heon;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.752-755
    • /
    • 2009
  • Recently, the production process system is largely composed automatic system using the wired network. The production process system using wired network has disadvantages that take place expense when the installed and inspected production of equipment was replaced. The each equipment happens to repair cost for control and management in production processes. In this paper, the industrial equipment that applied for IEEE 802.15.4(ZigBee) technology solves a complicated space at the plant. And then when the industrial equipments replace wired network with wireless network, this paper studied its user interface.

  • PDF

Contents Recommendation Scheme Considering User Activity in Social Network Environments (소셜 네트워크 환경에서 사용자 행위를 고려한 콘텐츠 추천 기법)

  • Ko, Geonsik;Kim, Byounghoon;Kim, Daeyun;Choi, Minwoong;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.2
    • /
    • pp.404-414
    • /
    • 2017
  • With the development of smartphones and online social networks, users produce a lot of contents and share them with each other. Therefore, users spend time by viewing or receiving the contents they do not want. In order to solve such problems, schemes for recommending useful contents have been actively studied. In this paper, we propose a contents recommendation scheme using collaborative filtering for users on online social networks. The proposed scheme consider a user trust in order to remove user data that lower the accuracy of recommendation. The user trust is derived by analyzing the user activity of online social network. For evaluating the user trust from various points of view, we collect user activities that have not been used in conventional techniques. It is shown through performance evaluation that the proposed scheme outperforms the existing scheme.

A Group based Privacy-preserving Data Perturbation Technique in Distributed OSN (분산 OSN 환경에서 프라이버시 보호를 위한 그룹 기반의 데이터 퍼튜베이션 기법)

  • Lee, Joohyoung;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.675-680
    • /
    • 2016
  • The development of various mobile devices and mobile platform technology has led to a steady increase in the number of online social network (OSN) users. OSN users are free to communicate and share information through activities such as social networking, but this causes a new, user privacy issue. Various distributed OSN architectures are introduced to address the user privacy concern, however, users do not obtain technically perfect control over their data. In this study, the control rights of OSN user are maintained by using personal data storage (PDS). We propose a technique to improve data privacy protection that involves making a group with the user's friend by generating and providing fake text data based on user's real text data. Fake text data is generated based on the user's word sensitivity value, so that the user's friends can receive the user's differential data. As a result, we propose a system architecture that solves possible problems in the tradeoff between service utility and user privacy in OSN.

Context-based Service Reasoning Model Based on User Environment Information (사용자환경정보 기반 Context-based Service 추론모델)

  • Ko, Kwang-Eun;Jang, In-Hun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.7
    • /
    • pp.907-912
    • /
    • 2007
  • The present level of ubiquitous computing technology have developed to the point where Home-server provides services that user require directly for user in the intelligent space. But it will need intelligent system to provides more active services for user in the near future. In this paper, we define the environment information about situation that user is in as Context, and collect the Context that stereotype as 4W1H form for construct the system that can decision service will be provide from information about a situation that user is in, without user's involvement. Additionally we collect information about user's emotional state, use these informations as nodes of Bayesian network for probabilistic reasoning. From that, we materialize Context Awareness system about it that what kind of situation user is in. And, we propose the Context-based Service reasoning model using Bayesian Network from the result of Context Awareness.

Scheduling Management Agent using Bayesian Network based on Location Awareness (베이지안 네트워크를 이용한 위치인식 기반 일정관리 에이전트)

  • Yeon, Sun-Jung;Hwang, Hye-Jeong;Lee, Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.6
    • /
    • pp.712-717
    • /
    • 2011
  • Recently, diverse schedule management agents are being researched for the efficient schedule management of smart devices users, but they remain at a confirmatory level. In order to efficiently manage user's schedules, execution of planned schedules should be monitored to help users properly execute their schedules, or feedback must be given so that when setting up new schedules, users can plan their schedule according to their schedule establishment patterns. This research proposes a schedule management agent that infers the user's behaviors by using acquired user context, and provides schedule related feedback depending on the user's behavior patterns, when users are executing their schedules or planning new schedules. For this, collected user context information is preprocessed and user's behavior is inferred by Bayesian network. Also, in order to provide feedbacks necessary for confirming the user's schedule execution and new schedule establishment, a context tree pattern matching method for the user's schedule, location and time contexts was applied, then verified with 6 weeks of user simulation in a mobile environment.