• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.037 seconds

Communication Protocol for Mobile Sensor Networks with Continuous Mobility (지속적인 이동성을 갖는 이동 센서네트워크를 위한 통신 프로토콜)

  • Kim, Hyoung-Jin;Kim, Lae-Young;Song, Joo-Seok
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.139-146
    • /
    • 2007
  • Mobile Sensor Network(MSN) is actively studied due to the advent of mobile sensors such as Robomote and Robotic Sensor Agents(RSAs), However, existing studies on MSN have mainly focused on coverage hole problem which occurs in Stationary Sensor Network(SSN). To address coverage hole problem, these studies make mobile sensors move temporarily so that they do not make the best use of the mobility of mobile sensors, Thus, a mechanism utilizing the continuous movement of mobile sensors is proposed to improve the network coverage performance. However, this mechanism is presently immature and does not explain how to make routing path and send data from mobile sensors to a sink node, Therefore, to efficiently make routing path and send data from mobile sensors to a sink node, we propose a communication protocol for mobile sensor network where mobile sensors continuously move. The proposed protocol deploys not only mobile sensors but also stationary sensors which send sensing data to a sink node instead of mobile sensors. Simulation results show that the proposed protocol improves the performance in terms of network coverage and traffic overhead, compared to conventional SSN protocols.

Research for the satisfaction of social network service - Functional elements of Instagram and Facebook - (소셜 네트워크 서비스의 만족도를 위한 연구 - 인스타그램과 페이스북의 기능적 요소를 중심으로 -)

  • Choi, Seula-A;Hong, Mi-Hee
    • Cartoon and Animation Studies
    • /
    • s.40
    • /
    • pp.423-442
    • /
    • 2015
  • In a digital environment that is keep in change content from smart phones to tablet PC are a social network service is holding deep place in our lives. Social networking applications has building a network and communication with others than other application, it means that Social networking applications are sharing not only personal purpose in that trend of variety and competition of these social networks can be expected to trend and be developed thru analysis of user certification. this study of social network service application is proposed to developing of application thru analyze the two-effective application which is high ranked in google store. the theoretical foundation was set based on the seven elements of the social network service of the information structures designed by Jean Smith. This study proceeded analysis is for the functional elements of Facebook and Instagram, and the advantages and disadvantages through survey research. As a result of the empirical analysis to user of Instagram and face book of communication, identity, satisfaction for the group are equally. Instagram is about the presence, reputation, and Facebook has had a high level of satisfaction for each sharing and relationship. Facebook got high satisfaction from sharing features, but user feel of discomfort in the randomly showing advertising content. Instagram is not showing off advertise on common page of content, it is good point to be complementary to facebook. And, Instagram hashtag is good for convenience, but satisfaction is high with Facebook. in order to increase the satisfaction of Instagram, it is necessary to consider the main advantage of the communication and the functional aspects of the share from facebook.

An Efficient Data Centric Storage Scheme with Non-uniformed Density of Wireless Sensor Networks (센서의 불균일한 배포밀도를 고려한 효율적인 데이터 중심 저장기법)

  • Seong, dong-ook;Lee, seok-jae;Song, seok-il;Yoo, jae-soo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.135-139
    • /
    • 2007
  • Recently Data Centric Storage (DCS) schemes are variously studied for several applications (e.g. natural environment investigation, military application systems and environmental changes monitoring). In DCS scheme, data is stored at nodes within the network by name. There are several drawbacks in the existing schemes. The first is the inefficiency of the range query processing on not considered the locality of store point. the second is the non-homogeneity of store load of each sensors in case of the sensor distribution density is non-uniformed. In this paper, we propose a novel data centric storage scheme with the sensor distribution density which satisfied with the locality of data store location. This scheme divides whole sensor network area using grid and distributes the density bit map witch consist of the sensor density information of each cell. sensors use the density bit map for storing and searching the data. We evaluate our scheme with existing schemes. As a result, we show improved load balancing and more efficient range query processing than existing schemes in environment which sensors are distributed non-uniform.

  • PDF

Design of Integrated Management System for Electronic Library Based on SaaS and Web Standard

  • Lee, Jong-Hoon;Min, Byung-Won;Oh, Yong-Sun
    • International Journal of Contents
    • /
    • v.11 no.1
    • /
    • pp.41-51
    • /
    • 2015
  • Management systems for electronic library have been developed on the basis of Client/Server or ASP framework in domestic market for a long time. Therefore, both service provider and user suffer from their high cost and effort in management, maintenance, and repairing of software as well as hardware. Recently in addition, mobile devices like smartphone and tablet PC are frequently used as terminal devices to access computers through the Internet or other networks, sophisticatedly customized or personalized interface for n-screen service became more important issue these days. In this paper, we propose a new scheme of integrated management system for electronic library based on SaaS and Web Standard. We design and implement the proposed scheme applying Electronic Cabinet Guidelines for Web Standard and Universal Code System. Hosted application management style and software on demand style service models based on SaaS are basically applied to develop the management system. Moreover, a newly improved concept of duplication check algorithm in a hierarchical evaluation process is presented and a personalized interface based on web standard is applied to implement the system. Algorithms of duplication check for journal, volume/number, and paper are hierarchically presented with their logic flows. Total framework of our development obeys the standard feature of Electronic Cabinet Guidelines offered by Korea government so that we can accomplish standard of application software, quality improvement of total software, and reusability extension. Scope of our development includes core services of library automation system such as acquisition, list-up, loan-and-return, and their related services. We focus on interoperation compatibility between elementary sub-systems throughout complex network and structural features. Reanalyzing and standardizing each part of the system under the concept on the cloud of service, we construct an integrated development environment for generating, test, operation, and maintenance. Finally, performance analyses are performed about resource usability of server, memory amount used, and response time of server etc. As a result of measurements fulfilled over 5 times at different test points and using different data, the average response time is about 62.9 seconds for 100 clients, which takes about 0.629 seconds per client on the average. We can expect this result makes it possible to operate the system in real-time level proof. Resource usability and memory occupation are also good and moderate comparing to the conventional systems. As total verification tests, we present a simple proof to obey Electronic Cabinet Guidelines and a record of TTA authentication test for topics about SaaS maturity, performance, and application program features.

An Adaptive Relay Node Selection Scheme for Alert Message Propagation in Inter-vehicle Communication (차량간 통신에서 긴급 메시지 전파를 위한 적응적 릴레이 노드 선정기법)

  • Kim, Tae-Hwan;Kim, Hie-Cheol;Hong, Won-Kee
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.571-582
    • /
    • 2007
  • Vehicular ad-hoc networks is temporarily established through inter-vehicle communication without any additional infrastructure aids. It requires a immediate message propagation because it mainly deals with critical traffic information such as traffic accidents. The distance-based broadcast scheme is one of the representative broadcast schemes for vehicular ad-hoc network. In this scheme, a node to disseminate messages is selected based on a distance from a source node. However, a message propagation delay will be increased if the relay nodes are not placed at the border of transmission range of the source node. In particular, when the node density is low, the message propagation delay is getting longer. In this paper, we propose a time-window reservation based relay node selection scheme. A node receiving the alert message from the source node has its time-window and randomly selects its waiting time within the given time-window range. A proportional time period of the given time-window is reserved in order to reduce the message propagation delay. The experimental results show that the proposed scheme has shorter message propagation delay than the distance-based broadcast scheme irrespective of node density in VANET. In particular, when the node density is low, the proposed scheme shows about 26% shorter delay and about 46% better performance in terms of compound metric, which is a function of propagation latency and network traffic.

Lightweight Authentication Scheme for Secure Data Transmission in Terrestrial CNPC Links (지상 CNPC 링크에서 안전한 데이터 전송을 위한 경량화된 인증기법)

  • Kim, Man Sik;Jun, Moon-Seog;Kang, Jung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.9
    • /
    • pp.429-436
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) that are piloted without human pilots can be commanded remotely via frequencies or perform pre-inputted missions. UAVs have been mainly used for military purposes, but due to the development of ICT technology, they are now widely used in the private sector. Teal Group's 2014 World UAV Forecast predicts that the UAV market will grow by 10% annually over the next decade, reaching $ 12.5 billion by 2023. However, because UAVs are primarily remotely controlled, if a malicious user accesses a remotely controlled UAV, it could seriously infringe privacy and cause financial loss or even loss of life. To solve this problem, a secure channel must be established through mutual authentication between the UAV and the control center. However, existing security techniques require a lot of computing resources and power, and because communication distances, infrastructure, and data flow are different from UAV networks, it is unsuitable for application in UAV environments. To resolve this problem, the study presents a lightweight UAV authentication method based on Physical Unclonable Functions (PUFs) that requires less computing resources in the ground Control and Non-Payload Communication (CNPC) environment, where recently, technology standardization is actively under progress.

A 2MC-based Framework for Sensor Data Loss Decrease in Wireless Sensor Network Failures (무선센서네트워크 장애에서 센서 데이터 손실 감소를 위한 2MC기반 프레임워크)

  • Shin, DongHyun;Kim, Changhwa
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.2
    • /
    • pp.31-40
    • /
    • 2016
  • Wireless sensor networks have been used in many applications such as marine environment, army installation, etc. The sensor data is very important, because all these applications depend on sensor data. The possibility of communication failures becomes high since the surrounding environment of a wireless sense network has an sensitive effect on its communications. In particular, communication failures in underwater communications occur more frequently because of a narrow bandwidth, slow transmission speed, noises from the surrounding environments and so on. In cases of communication failures, the sensor data can be lost in the sensor data delivery process and these kinds of sensor data losses can make critical huge physical damages on human or environments in applications such as fire surveillance systems. For this reason, although a few of studies for storing and compressing sensor data have been proposed, there are lots of difficulties in actual realization of the studies due to none-existence of the framework using network communications. In this paper, we propose a framework for reducing loss of the sensor data and analyze its performance. The our analyzed results in non-framework application show a decreasing data recovery rate, T/t, as t time passes after a network failure, where T is a time period to fill the storage with sensor data after the network failure. Moreover, all the sensor data generated after a network failure are the errors impossible to recover. But, on the other hand, the analyzed results in framework application show 100% data recovery rate with 2~6% data error rate after data recovery.

The Analysis of Content Regulation on Social Network Service(SNS): Focusing on the Problem of Legal and Administrative Regulation (표현매체로서 SNS(Social Network Service)에 대한 내용규제의 문제점 분석: 법률적.행정적 규제를 중심으로)

  • Hwang, Yong-Suk
    • Korean journal of communication and information
    • /
    • v.58
    • /
    • pp.106-129
    • /
    • 2012
  • Social Network Service(SNS), which are an emerging form of political architecture, have been a political means to promote civic engagement and shape pubic opinions on social issues. Along with the influence of SNSs, the governmental control on the dissemination of information over SNSs has increased more and more. It would be ideal if the autonomous governance regulates SNSs which facilitate the networks of the dispersed people. It is the fact, though, that compulsory regulations under which the government controls impose policy and legal restrictions on political expressions. The current study addresses expressive and participatory nature embedded in technological characteristics of SNSs and discusses the problems of content regulations of political expression over SNSs. First of all, it is analyzed that light touch regulation or light touch monitoring should be applied to regulating content on SNSs, particularly political expressions. Constitutional Court proclaimed that legal restrictions on the Internet could infringe basic rights of the people and thus under unambiguous standards, the Doctrine of Clear and Present Danger should be applied to its content. Second, it is found that clarifying the definition of illegality in the application of legal restrictions is necessary to minimize the excessive misleading. Third, it is required that Korea Communications Standards Commission under the government control needs to change in determining the scope of illegal information. In a domestic level, there needs to be safeguards for the protection of the self-regulatory organization such as KISO to guarantee voluntary and autonomous regulatory practices.

  • PDF

Implementation of ATM/Internet Gateway System for Real Time Multimedia Service (실시간 멀티미디어 서비스를 위한 ATM/Internet 게이트웨이 시스템의 구현)

  • Han Tae-Man;Jeong You-Hyeon;Kim Dong-Won
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.799-806
    • /
    • 2004
  • A growing diversity of pervasive devices is gaming access to the Internet and other information. However, much of the rich multimedia contents cannot be easily handled by the client devices because of the limited communication, processing, storage and display capabilities. The in-tegration of voice, data and video service modified the target of networking technologies. Networks must have some the capabilities for in-tegration of various services and also for QoS support as required by each of those service. Because of these reasons, we developed EAGIS(Efficient ATM Gateway for real time Internet Service) to provide seamless multimedia service between the ATM network and the Internet. EAGIS consists of the interworking unit, content server, transcoding server, and the serveice broker to provide seamless multimedia service be-tween the ATM network and the Internet. In this paper, we design the architecture and transcoding service scenario of the EAGIS. When the RTP is used for the bi-directional communication, transcoding time is configured by the time-stamp of RTCP. When HTTP is used for unidirec-tional communication, self-timer is used. By using these reference time, standard transcoding method is applicable according to the frame trans-mission rate and network traffic load. And we can also assure the QoS of the multiple users` effective bandwidth by our algorithm.

Location Accuracy Analysis and Accuracy Improvement Method of Pattern Matching Algorithm Using Database Construction Algorithm (패턴매칭 알고리즘의 측위 성능 분석 및 데이터베이스 구축 알고리즘을 이용한 정확도 향상 방법)

  • Ju, Yeong-Hwan;Park, Yong-Wan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.4
    • /
    • pp.86-94
    • /
    • 2009
  • Currently, positioning methods for LBS(Location Based Service) are GPS and network-based positioning techniques that use mobile communication networks. In these methods, however, the accuracy of positioning decreases due to the propagation delay caused by the non-line-of-sight(NLOS) effect and the repeater. To address this disadvantage, the CDMA system uses Pattern Matching algorithm. The Pattern Matching algorithm constructs a database of the propagation characteristics of the RF signals measured during the GPS positioning along with the positioned locations, so that the location can be provided by comparing the propagation characteristics of the received signals and the database, upon a user's request. In the area where GPS signals are not received, however, a database cannot be constructed. There are problem that the accuracy of positioning decreases due to the area without a database Because Pattern Matching algorithm depend on database existence. Therefore, this paper proposed a pilot signal strength prediction algorithm to enable construction of databases for areas without databases, so as to improve the performance of the Pattern Matching algorithm. The database was constructed by predicting the pilot signals in the area without a database using the proposed algorithm, and the Pattern Matching algorithm analysed positioning performance.