• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.034 seconds

Methodology of Cyber Security Assessment in the Smart Grid

  • Woo, Pil Sung;Kim, Balho H.
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.495-501
    • /
    • 2017
  • The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. In other words, The Energy Management System (EMS) and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. In this study, the optimal power flow (OPF) and Power Flow Tracing are used to assess the interaction between the EMS and the power system. Through OPF and Power Flow Tracing based analysis, the physical and economic impacts from potential cyber threats are assessed, and thereby the quantitative risks are measured in a monetary unit.

Shade Avoidance and the Regulation of Leaf Inclination in Rice

  • Shin, Juhee;Park, Phun Bum
    • Rapid Communication in Photoscience
    • /
    • v.3 no.3
    • /
    • pp.53-55
    • /
    • 2014
  • The shade avoidance syndrome is a morphological and physiological response when plants are exposed to shade. Recent work in Arabidopsis had begun to define the molecular components of the shade avoidance syndrome in dicotyledonous model plant. However, little is known about the shade avoidance response networks in agriculturally important monocotyledon crops such as rice. Here, we found that the degree of bending at the lamina joint is inversely proportional to the R:FR ratio. To elucidate which phytochrome is involved in this response, we did lamina joint inclination assay with the rice phytochrome-deficient mutants (osphyA, osphyB, and osphyC) and the wild type plants. Whereas the osphyA and osphyC knockout mutants bent at the lamina joint in the far-red rich condition as the wild type plants, the osphyB knockout mutants no longer bent at the lamina joint in the far-red rich condition. These results suggest that PHYB acts as a sole photoreceptor in the lamina joint inclination response in rice.

Weighted Distance-Based Quantization for Distributed Estimation

  • Kim, Yoon Hak
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.215-220
    • /
    • 2014
  • We consider quantization optimized for distributed estimation, where a set of sensors at different sites collect measurements on the parameter of interest, quantize them, and transmit the quantized data to a fusion node, which then estimates the parameter. Here, we propose an iterative quantizer design algorithm with a weighted distance rule that allows us to reduce a system-wide metric such as the estimation error by constructing quantization partitions with their optimal weights. We show that the search for the weights, the most expensive computational step in the algorithm, can be conducted in a sequential manner without deviating from convergence, leading to a significant reduction in design complexity. Our experments demonstrate that the proposed algorithm achieves improved performance over traditional quantizer designs. The benefit of the proposed technique is further illustrated by the experiments providing similar estimation performance with much lower complexity as compared to the recently published novel algorithms.

Quality of service management for intelligent systems

  • Lee, Sang-Hyun;Jung, Byeong-Soo;Moon, Kyung-Il
    • International journal of advanced smart convergence
    • /
    • v.3 no.2
    • /
    • pp.18-21
    • /
    • 2014
  • A control application requirements currently used is very low, such as packet loss rate, minimum delay on sensor networks with quality of service (QoS) requirements some packet delivery guarantee. This paper is the sampling period at the end of the actuator and sensor data transfer related to the Miss ratio for each source sensor node, use the controller and the internal ANFIS. The proposed scheme has the advantages of simplicity, scalability, and General. Simulation results of the proposed scheme can provide QoS support in WSANs.

Scheduling for Virtual MIMO in Single Carrier FDMA (SC-FDMA) System

  • Kim, Jinwoo;Hwang, In Seok;Kang, Chung Gu
    • Journal of Communications and Networks
    • /
    • v.17 no.1
    • /
    • pp.27-33
    • /
    • 2015
  • In this paper, we consider a joint frequency-domain scheduling and user-pairing problem for virtual MIMO in the single carrier frequency division multiple access (SC-FDMA) system, e.g., the uplink transmission for third generation partnership project-long term evolution (3GPP-LTE) standard. Due to the subcarrier adjacency constraint inherent to SC-FDMA, its complexity becomes unmanageable. We propose a greedy heuristic algorithm for PF scheduling so as to deal with the complexity issue in this joint problem. It has been shown that its performance can reach up to 90% of its upper bound.

Network, Channel, and Geographical Proximity of Knowledge Transfer: The Case of University-Industry Collaboration in South Korea

  • Kwon, Ki-Seok;Jang, Duckhee;Park, Han Woo
    • Asian Journal of Innovation and Policy
    • /
    • v.4 no.2
    • /
    • pp.242-262
    • /
    • 2015
  • The relationship between geographical proximity and academics' formal and informal knowledge-transfer activities in the network is analyzed with a mixed research method. With social network analysis as a basis, we have explored the networks between academics and firms in the 16 regions of South Korea. The result shows Seoul and Gyunggi are identified as central nodes, meaning that the academics in other regions tend to collaborate with firms in these regions. An econometric analysis is performed to confirm the localization of knowledge-transfer activities. The intensity of formal channels measured by the number of academic papers is negatively, but significantly associated with the geographical proximity. However, we have not found any significant relationship between the formality of the channels and geographical proximity. Possibly, the regional innovation systems in South Korea are neither big enough nor strong enough to show a localization effect.

Dynamic Multi-frame Transmission Technology Using the WiMedia MAC for Multi-hop N-screen Services

  • Hur, Kyeong
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.1
    • /
    • pp.21-25
    • /
    • 2016
  • N-screen is a promising technology to improve support for multimedia multicasting, content sharing, content mobility, media scalability, and seamless mobility. In this paper, the WiMedia distributed-MAC (D-MAC) protocol is adopted for development of a seamless N-screen wireless service. Furthermore, to provide a multi-hop, one source multi-use N-screen service through point to point streaming in a seamless D-MAC protocol, a dynamic multi-frame transmission technology is proposed. In this technology, a dynamic time slot allocation scheme and a multi-hop resource reservation scheme are combined. In the proposed dynamic time slot allocation scheme, two thresholds, a hard threshold and a soft threshold, are included to satisfy the power consumption and delay requirements. A multi-frame DRP reservation scheme is proposed to minimize end-to-end delay during the multi-hop transmissions between N-screen devices. The proposed dynamic multi-frame transmission scheme enhances N-screen performance in terms of the multi-hop link establishment success rate and link establishment time compared to the conventional WiMedia D-MAC system.

A Study for the Efficient Constructure on the Local Area Networks (효율적인 구내 통신망의 구축에 관한 연구)

  • 권기형
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.1
    • /
    • pp.149-160
    • /
    • 1998
  • Many company or college construct the information and communication network for the office efficient but they construct the total solution from vendor without consultant. It makes two problems. The one is that it is makes difficulties for the office efficiency because network is to slow and the other is that the investment is to be excessive. In this paper, Ⅰexplaned the network construction method from small size network to large network step by step for the performance view point.

  • PDF

Border Effect of Transmission Coverage in Mobile Wireless Communications

  • Haughs, J. David;Kim, Dong-Soo S.
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.2 no.2
    • /
    • pp.97-104
    • /
    • 2008
  • In this paper, we demonstrate the boundary effect of a deployed regions on the effective coverage of a mobile node. A node coverage area is not uniform throughout the entire deployed region. Assuming a uniform coverage can result in significant error in calculations. In this study, we analyze the behavior of a node's coverage area as a function of its transmission range throughout the entire deployed region. Using this analysis, a mathematical model for effective coverage in mobile wireless communications is created. The mathematical model considers the effect of the deployed regions boundaries on the coverage area of a mobile node. Lastly, we present simulation results to verify the analytical model and to compare this model with that of a uniform coverage.

  • PDF

MKR: Bit-stream Cipher Protocol using Sensing Data in Wireless Sensor Networks (MKR: 센싱 정보에 기반한 비트 스트림 암호화 방식의 센서 네트워크 보안 프로토콜)

  • Moon Hyung-Chul;Park Sun-Ho;Han Young-Ju;Chung Tai-Myoung
    • Annual Conference of KIPS
    • /
    • 2006.05a
    • /
    • pp.885-888
    • /
    • 2006
  • 최근 몇 년 동안 센서 네트워크에 보안을 제공하기 위한 여러 연구가 진행되었고 그 결과물로 몇 가지의 보안 프로토콜이 제시되었다. 그러나 지금까지 제시된 보안 프로토콜들은 많은 시스템 자원과 부가적인 통신 횟수들을 필요로 하는 기존의 암호화 방식을 그대로 사용하고 있어 실제 센서 네트워크에 적용하여 사용하기에는 힘들다. 이의 해결 방안으로 본 논문에서는 새로운 암호화 방식을 사용하는 센싱 정보에 기반한 보안 프로토콜 모델인 MKR 프로토콜을 제시한다.

  • PDF