• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.034 seconds

Multi-Attribute based on Data Management Scheme in Big Data Environment (빅 데이터 환경에서 다중 속성 기반의 데이터 관리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.263-268
    • /
    • 2015
  • Put your information in the object-based sensors and mobile networks has been developed that correlate with ubiquitous information technology as the development of IT technology. However, a security solution is to have the data stored in the server, what minimal conditions. In this paper, we propose a data management method is applied to a hash chain of the properties of the multiple techniques to the data used by the big user and the data services to ensure safe handling large amounts of data being provided in the big data services. Improves the safety of the data tied to the hash chain for the classification to classify the attributes of the data attribute information according to the type of data used for the big data services, functions and characteristics of the proposed method. Also, the distributed processing of big data by utilizing the access control information of the hash chain to connect the data attribute information to a geographically dispersed data easily accessible techniques are proposed.

Security Vulnerability and Countermeasure on 5G Networks: Survey (5G 네트워크의 보안 취약점 및 대응 방안: 서베이)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.197-202
    • /
    • 2019
  • In line with the era of the 4th Industrial Revolution, 5G technology has become common technology, and 5G technology is evaluated as a technology that minimizes the speed and response speed compared to 4G using technologies such as network slicing and ultra-multiple access. 5G NR stands for 5G mobile communication standard, and network slicing cuts the network into parallel connections to optimize the network. In addition, the risk of hacking is increasing as data is processed in the base station unit. In addition, since the number of accessible devices per unit area increases exponentially, there is a possibility of base station attack after hacking a large number of devices in the unit area. To solve this problem, this study proposes the introduction of quantum cryptography and 5G security standardization.

A Study on Architecture Design of Network Management System for DX (구축함(DX) 네트워크 관리 시스템 구조 설계에 대한 연구)

  • Lee, Kwang-Je;Chung, Jin-Wook
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.2
    • /
    • pp.95-103
    • /
    • 2002
  • We know that the all of warfare system has been becoming complex and variety in warfield thru the Gulf-War. The all of warfare electronic systems is designed to inter-operate by networks in recently. Especially Warfare Equipment systems of Men-of-War(War ship) as like KDX(Korea Destroyer, Experimental), FF(Frigate), PCC(Costal Patrol Craft), Submarine are connected by Combat System Databus to the Command system(C2 System), so C2 system can control all of equipments in ship. In this view, the status of network(Combat System Databus) is very critical parameter in war field. So In this paper, we propose the method of Network Management System construction for War ship, and especially propose the architectural design of network management system for DX(Destroyer, Experimental) equipments using SNMP(Simple Network Management Protocol). And Link Utilization is monitored by simulation. 

Design and Implementation of Optimal Adaptive Generalized Stack Filter for Image Restoration Using Neural Networks (신경회로망을 이용한 영상복원용 적응형 일반스택 최적화 필터의 설계 및 구현)

  • Moon, Byoung-Jin;Kim, Kwang-Hee;Lee, Bae-Ho
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.7
    • /
    • pp.81-89
    • /
    • 1999
  • Image obtained by incomplete communication always include noise, blur and distortion, etc. In this paper, we propose and apply the new spatial filter algorithm, called an optimal adaptive generalized stack filter(AGSF), which optimizes adaptive generalized stack filter(AGSF) using neural network weight learning algorithm of back-propagation learning algorithm for improving noise removal and edge preservation rate. AGSF divides into two parts: generalized stack filter(GSF) and adaptive multistage median filter(AMMF), GSF improves the ability of stack filter algorithm and AMMF proposes the improved algorithm for reserving the sharp edge. Applied to neural network theory, the proposed algorithm improves the performance of the AGSF using two weight learning algorithms, such as the least mean absolute(LAM) and least mean square (LMS) algorithms. Simulation results of the proposed filter algorithm are presented and discussed.

  • PDF

Analysis of Viterbi Algorithm for Low-power Wireless Sensor Network (저전력 무선 센서네트워크를 위한 비터비 알고리즘의 적용 및 분석)

  • Park, Woo-Jun;Kim, Keon-Wook
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.6 s.360
    • /
    • pp.1-8
    • /
    • 2007
  • In wireless sensor network which uses limited battery, power consumption is very important factor for the survivality of the system. By using low-power communication to reduce power consumption, error rate is increased in typical conditions. This paper analyzes power consumption of specific error control coding (ECC) implementations. With identical link quality, ECC provides coding gain which save the power for transmission at the cost of computing power. In sensor node, transmit power is higher than computing power of Micro Controller Unit (MCU). In this paper, Viterbi algerian is applied to the low-transmit-power sensor networks in terms of network power consumption. Practically, Viterbi algorithm presents 20% of reduction of re-transmission in compared with Auto Repeat Request (ARQ) system. Furthermore, it is observed that network power consumption is decreased by almost 18%.

Enhanced Segmentized Clear Channel Assessment Method for IEEE 802.15.4 Network (IEEE 802.15.4 Network의 전송효율 향상을 위한 Enhanced Semgentized Clear Channel Assessment 기법)

  • Son, Kyou Jung;Chang, Tae Gyu
    • Journal of IKEEE
    • /
    • v.20 no.3
    • /
    • pp.322-325
    • /
    • 2016
  • This paper proposed Enhanced Segmentized Clear Channel Assesment(ESCCA) for the IEEE 802.15.4 networks. This method divides original CCA into two groups to check precise channel status and perform additional CCA to increase throughput performance. Through the proposed method, the device can access the channel more often, so the transmission efficiency of the IEEE 802.15.4 network improves. To confirm the feasibility and usability of the proposed method, computer simulation has been performed. In the simulation, a star topology with one coordinator and a lot of devices is considered and the traffic flows are all one way, with the communication directed to the coordinator. Simulation results_ show the proposed method is improving maximum 10 kbps of throughput and decreasing maximum 15 of the average number of total CCA than IEEE 802.15.4 CCA method.

ICT and the Changing Nature of Work: Work Fragmentation (ICT와 업무의 변화 - 일의 파편화 관점에서 -)

  • Lee, Seyoon;Park, Jun-Gi;Lee, Jungwoo
    • Informatization Policy
    • /
    • v.21 no.1
    • /
    • pp.35-56
    • /
    • 2014
  • Information and communication technologies(ICT) allow and force people to work anywhere, anytime using remote databases and application systems available in real-time twenty four hours a day and seven days a week. With the real time nature of ICT, individual work is becoming more and more fragmented. Instead of working on a similar task repeatedly, individuals are required to respond to e-mails and inquiries through social networks, work on planning documents, work on presentation documents, work on spreadsheets, input necessary data on company databases, generate necessary reports from the database, run teleconference, etc., all maybe in a day's work. Work fragmentation may impact negatively on productivity as the flow is interrupted, but it may increase the productivity by allowing people to handle multiple tasks in a shorter time period. This study explores the types of work fragmentation and their characteristics. An online survey was administered to collect data about work fragmentation and work characteristics including autonomy, complexity, flexibility, usage of ICT, etc. 300 cases were used in the analysis. Analysis of k-mean cluster indicated four different types of work fragmentation: concentrated, temporally distributed, spatially distributed, and fully fragmented.

Performance Analysis on Next Generation Korea Radio Train Control System Network (한국형 차세대 무선통신 열차제어시스템 네트워크 성능평가)

  • Bang, June-Ho;Chae, Sung-Yoon;Kim, Hyung-Jin;Park, Seong-Joon;Cho, Young-Jong;Oh, Seh-Chan;Yoon, Yong-Ki;Kim, Yong-Kyu
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.1
    • /
    • pp.11-20
    • /
    • 2014
  • In this paper, we analyze the performance and reliability of the next-generation KRTCS (Korea Radio Train System) network. The KRTCS has been designed to manage and control the overall status of trains including location, speed, stop position, door open/close status and interior monitoring and so forth. System faults of the KRTCS operation can lead to the disruption of smooth train flow, even to terrible traffic accident. Prior to installation we need to assure the reliability of the designed KRTCS system. For this purpose, we simulated and analyzed the KRTCS network using QualNet simulator, assuming the various environmental operation data of train flows and communication faults that can be found in real telecommunication networks.

Reliability Constrained Resource Allocation in Cellular Network Uplink Scheduler (이동통신 역방향 스케줄러에서의 고신뢰성 자원 할당 기법)

  • Lee, Sung-Won;Jung, Kwang-Ryul;Park, Ae-Soon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.57-66
    • /
    • 2010
  • In this paper, we propose the reliability constrained resource allocation scheduling algorithm in cellular network for uplink transmission, where uplink transmission is supported via packet switching schemes without the dedicated uplink circuit links. We evaluate the performance of the proposed algorithm, and compared with the conventional works to identify the pros and cons. The proposed uplink scheduling algorithm is to satisfy the constraints requirements of the MTC services which is considered as the core technology for future mobile wireless networks. It is different to conventional works which target to maximize the link capacity. The proposed algorithm provides reliable uplink transmission independent to the location and the quality of the wireless link of the mobile terminal. Based on the performance evaluation results, we conclude that the proposed method provides enhanced reliability performance than conventional works.

A Study on Monitoring of Bio-Signal for u-Health System (u-Health System을 위한 생체신호 모니터링에 관한 연구)

  • Han, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.9-15
    • /
    • 2011
  • U-healthcare system has an aim to provide reliable and fast medical services for patient regardless of time and space by transmitting to doctors a large quantity of vital signs collected from sensor networks. Existing u-healthcare systems can merely monitoring patients' health status. In this paper, we describe the implementation and validation of a prototype of a u-health monitoring system based on a wireless sensor network. This system is easy to derive physiologically meaningful results by analyzing rapidly vital signs. The monitoring system sends only the abnormal data of examinee to the service provider. This technique can reduces the wireless data packet overload between a monitoring part and service provider. The real-time bio-signal monitoring system makes possible to implement u-health services and improving efficiency of medical services.