• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.034 seconds

Quadruple-Metric Based Command and Control Information Recommendation System (쿼드러플-메트릭 기반 지휘통제 정보 추천 시스템)

  • Park, Gyudong;Kim, Jongmo;Jeon, Hocheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.40-42
    • /
    • 2022
  • Command and control (C2) information is exploding as sensor and network technologies development. In the C2 are a, processing information on time is very important. If it is not possible to process all information on time because of resource limitation, higher priority information should be processed first. For this, recommendation system is available. Because it can select and present information suitable for each user among tons of information in the order of priority. This study extends the triple-metric priority criterion, which is widely used to implement military communication networks, to the quadruple-metric priority criterion, and proposes a C2 information recommendation system based on it, and shows it's feasibility through experiments.

  • PDF

Design of Short Messaging Service based Public Address System for Industrial Architectures over Wireless Networks

  • Caytiles, Ronnie D.;Park, Byungjoo
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.9 no.2
    • /
    • pp.15-27
    • /
    • 2019
  • This paper deals with a web-based public address system for conveying information for different institutions. An architecture for a Short Messaging Service (SMS) based public address (PA) system that can be programmed by an authorized mobile phone or device is proposed. This PA system will facilitate information transfer from heads of offices, managers, directors, and deans of the institutions to its constituents or unit area as well as enable postings of information with proper authentication and validation remotely. The system supports high priority messaging, allowing the conveyance of critical and time sensitive information. The mobility management support for the PA system will be based on the Hierarchical Mobile Internet Protocol version 6 (HMIPv6), hence, allowing for a seamless connectivity to the system. The major advantage of this proposed PA system as compared with the traditional electronic displays and bulletin boards is seamless mobility wherein the display devices can be programmed remotely by heads of the institutions and business organization. It also allows faster communication and immediate actions concerning the different institutions, organizations, and businesses, thus, ensuring high productivity.

A Study on Service Quality Diagnosis Techniques for LTE/5G Network Backhaul (LTE/5G 네트워크 백홀(Backhaul)의 서비스 품질진단 기법에 관한 연구)

  • Ji-Hyun Yoo
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.617-623
    • /
    • 2023
  • With the evolution of communication networks, there is a growing demand for stable high-speed data connections to support services relying on large-capacity data. The increasing volume of packet data aggregated from user devices underscores the significance of quality diagnostics for the backhaul network, an intermediate link transmitting data to the core network. This paper conducts empirical research on techniques to diagnose issues within the backhaul network through practical case studies, through diagnosing various factors such as circuit bandwidth, speed disparities within switches, network segment-specific buffer sizes, routing policies, among other factors that could potentially cause RTT (Round Trip Time) delays and performance degradation.

Deep Reinforcement Learning-Based C-V2X Distributed Congestion Control for Real-Time Vehicle Density Response (실시간 차량 밀도에 대응하는 심층강화학습 기반 C-V2X 분산혼잡제어)

  • Byeong Cheol Jeon;Woo Yoel Yang;Han-Shin Jo
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.379-385
    • /
    • 2023
  • Distributed congestion control (DCC) is a technology that mitigates channel congestion and improves communication performance in high-density vehicular networks. Traditional DCC techniques operate to reduce channel congestion without considering quality of service (QoS) requirements. Such design of DCC algorithms can lead to excessive DCC actions, potentially degrading other aspects of QoS. To address this issue, we propose a deep reinforcement learning-based QoS-adaptive DCC algorithm. The simulation was conducted using a quasi-real environment simulator, generating dynamic vehicular densities for evaluation. The simulation results indicate that our proposed DCC algorithm achieves results closer to the targeted QoS compared to existing DCC algorithms.

Stability-based On-demand Multi-path Distance Vector Protocol for Edge Internet of Things

  • Dongzhi Cao;Peng Liang;Tongjuan Wu;Shiqiang Zhang;Zhenhu Ning
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2658-2681
    • /
    • 2023
  • In edge computing scenarios, IoT end devices play a crucial role in relaying and forwarding data to significantly improve IoT network performance. However, traditional routing mechanisms are not applicable to this scenario due to differences in network size and environment. Therefore, it becomes crucial to establish an effective and reliable data transmission path to ensure secure communication between devices. In this paper, we propose a trusted path selection strategy that comprehensively considers multiple attributes, such as link stability and edge cooperation, and selects a stable and secure data transmission path based on the link life cycle, energy level, trust level, and authentication status. In addition, we propose the Stability-based On-demand Multipath Distance Vector (STAOMDV) protocol based on the Ad hoc AOMDV protocol. The STAOMDV protocol implements the collection and updating of link stability attributes during the route discovery and maintenance process. By integrating the STAOMDV protocol with the proposed path selection strategy, a dependable and efficient routing mechanism is established for IoT networks in edge computing scenarios. Simulation results validate that the proposed STAOMDV model achieves a balance in network energy consumption and extends the overall network lifespan.

A Study on modifying OSPF protocol for wireless tactical backbone networks (무선 전술 백본망을 위한 OSPF 프로토콜 수정 방안)

  • Yoon-Young Sung;Sung-Sook Kook;Moon-Jeong Chang;Mee-Jeong Lee
    • Annual Conference of KIPS
    • /
    • 2008.11a
    • /
    • pp.1336-1339
    • /
    • 2008
  • 최근, 우리 군에서는 무선을 기반으로 하는 차세대 전술통신 체계인 전술 종합 정보 통신 체계 (TICN: Tactical Information Communication Network) 구축 사업을 진행하고 있다. 이 시스템의 백본 역할을 수행하는 TICN 전달망에서의 라우팅 알고리즘은 기존 인터넷에서 사용 중인 표준 라우팅 알고리즘과는 다른 특성이 요구된다. 즉 무선전송 링크의 특성 및 재밍 등의 영향으로 링크 상태가 불안정한 상황에서도 생존성과 안정성이 요구되는 군 전술망 환경에 적합하여야 하며, TICN 전달망의 자원 효율성도 최대화할 수 있어야 한다. 그러므로 본 논문에서는 기존의 인터넷 표준 라우팅 프로토콜들 중에서 네트워크 상태변화에 신속하게 대처할 수 있으며, 이미 널리 사용되고 있는 OSPF 프로토콜을 TICN 전달망에 적합한 라우팅 프로토콜이 되도록 수정하고자 한다. 이를 위해 라우팅 프로토콜의 대상 네트워크가 유선망에서 무선 전술 백본망으로 변경됨에 따라 튜닝될 필요가 있는 프로토콜 파라미터들을 추출하고, 시뮬레이션을 통해 추출한 파라미터들의 값들을 튜닝 하고자 한다.

Black Ice Detection Platform and Its Evaluation using Jetson Nano Devices based on Convolutional Neural Network (CNN)

  • Sun-Kyoung KANG;Yeonwoo LEE
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.4
    • /
    • pp.1-8
    • /
    • 2023
  • In this paper, we propose a black ice detection platform framework using Convolutional Neural Networks (CNNs). To overcome black ice problem, we introduce a real-time based early warning platform using CNN-based architecture, and furthermore, in order to enhance the accuracy of black ice detection, we apply a multi-scale dilation convolution feature fusion (MsDC-FF) technique. Then, we establish a specialized experimental platform by using a comprehensive dataset of thermal road black ice images for a training and evaluation purpose. Experimental results of a real-time black ice detection platform show the better performance of our proposed network model compared to conventional image segmentation models. Our proposed platform have achieved real-time segmentation of road black ice areas by deploying a road black ice area segmentation network on the edge device Jetson Nano devices. This approach in parallel using multi-scale dilated convolutions with different dilation rates had faster segmentation speeds due to its smaller model parameters. The proposed MsCD-FF Net(2) model had the fastest segmentation speed at 5.53 frame per second (FPS). Thereby encouraging safe driving for motorists and providing decision support for road surface management in the road traffic monitoring department.

The Concentric Clustering Method based on Fuzzy Logic in Sensor Networks (센서 네트워크에서 퍼지 이론 기반의 동심원 형태 클러스터링 방법)

  • Choi, Jin-Young;Jung, Sung-Min;Han, Young-Ju;Kim, Jong-Myoung;Chung, Tai-Myoung
    • Annual Conference of KIPS
    • /
    • 2008.05a
    • /
    • pp.710-713
    • /
    • 2008
  • 센서 네트워크는 습도, 온도, 조도 등의 다양한 정보를 수집할 수 있는 센서들을 특정한 지역이나 광범위한 지역에 분포하여 특정 이벤트를 탐지하거나 계속적으로 환경을 관찰하여 수집된 정보를 효율적으로 Base Station으로 전송하는 일종의 애드 혹 네트워크이다. 본 논문은 센서 네트워크의 라우팅 프로토콜 중 PEGASIS와 동심원 형태의 클러스터링 방법에 대해 취약점을 알아보고, 이를 해결하기 위한 방법으로 클러스터 헤드 선출을 위한 두 가지 기준을 정하고, 퍼지 이론을 기반으로 적절한 선택 값을 도출하여 효율적인 클러스터 헤드를 선출하는 방법을 제안한다. 이 방법은 각 센서 노드들의 남아있는 에너지를 고려할 수 있으며, 각 레벨에서 클러스터 헤드들은 가깝게 위치하게 되어 Multi-hop으로 데이터 전송 시 기존의 방법들보다 전송 거리를 줄일 수 있는 장점을 가지고 있다.

An Efficient Misused Key Detecting Method in Wireless Sensor Networks (무선 센서 네트워크에서 효율적인 오용키 탐지 기법)

  • Kim, Jong-Myoung;Han, Young-Ju;Park, Seon-Ho;Chung, Tai-Myoung
    • Annual Conference of KIPS
    • /
    • 2008.05a
    • /
    • pp.1088-1091
    • /
    • 2008
  • 무선 센서 네트워크에서 보안 서비스를 제공하기 위하여 키 관리 방법에 대한 연구가 많이 진행되어 왔다. 대부분 센서 노드의 자원적인 제약사항으로 인해 공개키 방법보다는 대칭키 방법을 이용하기 위한 연구가 진행되었으며 그 결과 센서 노드 사이에 대칭키를 공유하여 기밀성, 인증 그리고 무결성 등의 보안 서비스를 제공할 수 있게 되었다. 하지만 센서 노드의 저장 공간의 제약으로 인해 모든 노드와의 대칭키를 저장할 수 없어 대부분의 센서 네트워크에서의 키 관리 메커니즘들은 확률적인 방법을 이용하여 키를 공유하도록 한다. 이 경우 확률적으로 공격자가 네트워크에 물리적 노드 획득 공격을 감행할 경우 공격자에게 타협되지 않은 정상 노드 사이의 키를 얻을 수 있다. 공격자는 이러한 키를 이용하여 센서 네트워크의 정상적인 동작을 방해할 수 있으며 특히 센서 네트워크 어플리케이션의 동작에 있어서 치명적인 영향을 줄 수 있다. 본 논문에서는 이렇게 공격자에게 드러난 키를 통해 공격자가 공격을 감행한 경우 해당 오용키를 효율적으로 파악하고 정상노드 사이의 대칭 키를 안전한 키로 대체하는 방법을 제안한다.

A Multidimensional View of SNS Usage: Conceptualization and Validation

  • Edgardo R. Bravo;Christian Fernando Libaque-Saenz
    • Asia pacific journal of information systems
    • /
    • v.32 no.3
    • /
    • pp.601-629
    • /
    • 2022
  • Social networking sites (SNSs) have become an essential part of people's lives. It is thus crucial to understand how individuals use these platforms. Previous literature has divided usage into numerous activities and then grouped them into dimensions to avoid excessive granularity. However, these categories have not been derived from a uniform theoretical background; consequently, these dimensions are dispersed, overlapping, and disconnected from each other. This study argues that "SNS usage" is a complex phenomenon consisting of multiple activities that can be grouped into dimensions under the umbrella of communication theories and these dimensions are related to each other in a particular multi-dimensional architecture. "SNS usage" is conceptualized as a third-order construct formed by "producing," "consuming," and "communicating." "Producing," in turn, is proposed as a second-order construct manifested by "commenting," "general information sharing," and "self-disclosure." The proposed model was assessed with data collected from 414 USA adult users and PLS-SEM technique. The results show empirical support for the theorized model. SNS providers now have this architecture that clarifies the role of each dimension of use, which will allow them to design effective strategies to encourage the use of these networks.