• Title/Summary/Keyword: network performance and reliability

Search Result 582, Processing Time 0.03 seconds

Fault Diagnosis and Performance Evaluation of Auxiliary Block for Korean High-Speed Railway (한국형 고속열차 보조전원장치 고장진단과 성능평가)

  • Kim, Seog-Won;Kim, Ki-Hwan;Kim, Sang-Soo;Koo, Hun-Mo;Joo, Hyun-Wook;Han, Young-Jae
    • Journal of the Korean Society for Railway
    • /
    • v.9 no.5 s.36
    • /
    • pp.612-617
    • /
    • 2006
  • As the on-board electric devices determine the performances of vehicles, production of reliable devices is important. To keep the reliability of devices constant, management of performance evaluation of the on-board devices is crucial. Because temperature has a serious effect on failures of the components of the devices, its measurement is the first step for good management. In this study, we described performance characteristics of domestic auxiliary block developed through G7 project. We measured the performances of auxiliary block during test running by the developed on-line measurement system. After we save the input real-time data from each signal of Korean High Speed Train through the network line, we can acquire necessary information through post-processing program. We verify the motor block characteristics of Korean High Speed Train by this system.

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

  • Navmani, TM;Yogesh, P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3386-3411
    • /
    • 2019
  • Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks. The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time. However, it is not always true due to the presence of malicious and mistrustful nodes. Hence, it is essential to establish a secure, reliable and stable route between a source node and a destination node in WMN. In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security tag model for providing effective secured routing. This model uses only the trusted nodes with the forwarding reliability of data transmission and it isolates the malicious nodes from the providing path. Moreover, every node in this model is assigned with a security tag that is used for efficient authentication. Thus, by combining authentication, trust and subject logic, the proposed approach is capable of choosing the trusted nodes effectively to participate in forwarding the packets of trustful peer nodes successfully. The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.

Security Analysis of AMI Using ACT (ACT를 이용한 AMI 보안 분석)

  • Wi, Miseon;Kim, Dong Seong;Park, Jong Sou
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.639-653
    • /
    • 2013
  • Smart grid is a network of computers and power infrastructure that monitor and manage energy usage efficiently. Recently, the smart grid demonstration projects around the world, including the United States, Europe, Japan, and the technology being developed. The protection of the many components of the grid against cyber-threats has always been critical, but the recent Smart grid has been threatened by a variety of cyber and physical attacks. We model and analyze advanced metering infrastructure(AMI) in smart grid. Using attack countermeasure tree(ACT) we show qualitative and probabilistic security analysis of AMI. We implement using SHARPE(Symbolic Hierarchical Automated Reliability and Performance Evaluator) tool and calculate probability, ROA, ROI, Structure Importance, Birnbaum Importance.

Performance Analysis of Entropy-based Multi-Robot Cooperative Systems in a MANET

  • Kim, Sang-Chul;Shin, Kee-Hyun;Woo, Chong-Woo;Eom, Yun-Shick;Lee, Jae-Min
    • International Journal of Control, Automation, and Systems
    • /
    • v.6 no.5
    • /
    • pp.722-730
    • /
    • 2008
  • This paper proposes two novel algorithms enabling mobile robots to cooperate with each other in a reliability-based system and a time-critical system. In the reliability-based cooperative system, the concepts of a mobile ad hoc network (MANET) and an object entropy are adopted in order to coordinate a specific task. A logical robot group is created based on the exchange of request and reply messages in a robot communication group whose organization depends on transmission range. In the time-critical cooperative system, relational entropy is used to define the relationship between mobile robots. A group leader is selected based on optimizing power consumption. The proposed algorithm has been verified based on the computer-based simulation and soccer robot experiment. The performance metrics are defined. The metrics include the number of messages needed to make a logical robot group and to obtain the relationship of robots and the power consumption to select a group leader. They are verified by simulation and experiment.

IMPROVING SOCIAL MEDIA DATA QUALITY FOR EFFECTIVE ANALYTICS: AN EMPIRICAL INVESTIGATION BASED ON E-BDMS

  • B. KARTHICK;T. MEYYAPPAN
    • Journal of applied mathematics & informatics
    • /
    • v.41 no.5
    • /
    • pp.1129-1143
    • /
    • 2023
  • Social media platforms have become an integral part of our daily lives, and they generate vast amounts of data that can be analyzed for various purposes. However, the quality of the data obtained from social media is often questionable due to factors such as noise, bias, and incompleteness. Enhancing data quality is crucial to ensure the reliability and validity of the results obtained from such data. This paper proposes an enhanced decision-making framework based on Business Decision Management Systems (BDMS) that addresses these challenges by incorporating a data quality enhancement component. The framework includes a backtracking method to improve plan failures and risk-taking abilities and a steep optimized strategy to enhance training plan and resource management, all of which contribute to improving the quality of the data. We examine the efficacy of the proposed framework through research data, which provides evidence of its ability to increase the level of effectiveness and performance by enhancing data quality. Additionally, we demonstrate the reliability of the proposed framework through simulation analysis, which includes true positive analysis, performance analysis, error analysis, and accuracy analysis. This research contributes to the field of business intelligence by providing a framework that addresses critical data quality challenges faced by organizations in decision-making environments.

Performance Analysis on Wireless Sensor Network using LDPC Code over Node-tonode Interference

  • Choi Sang-Min;Moon Byung-Hyun
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2006.05a
    • /
    • pp.143-147
    • /
    • 2006
  • Wireless sensor networks(WSN) technology has various applications such as surveillance and information gathering in the uncontrollable area of human. One of major issues in WSN is the research for reducing the energy consumption and reliability of data. A system with forward error correction(FEC) can provide an objective reliability while using less transmission power than a system without FEC. In this paper, we propose to use LDPC codes of various code rate(0.53, 0.81, 0.91) for FEC for WSN. Also, we considered node-to-node interference in addition to AWGN channel. The proposed system has not only high reliable data transmission at low SNR, but also reduced transmission power usage.

  • PDF

Securing Anonymous Authenticated Announcement Protocol for Group Signature in Internet of Vehicles

  • Amir, Nur Afiqah Suzelan;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4573-4594
    • /
    • 2020
  • Announcement protocol in Internet of Vehicles (IoV) is an intelligent application to enhance public safety, alleviate traffic jams and improve transportation quality. It requires communication between vehicles, roadside units and pedestrian to disseminate safety-related messages. However, as vehicles connected to internet, it makes them accessible globally to a potential adversary. Safety-related application requires a message to be reliable, however it may intrude the privacy of a vehicle. Contrarily, if some misbehaviour emerges, the malicious vehicles must be able to traceable and revoke from the network. This is a contradiction between privacy and accountability since the privacy of a user should be preserved. For a secure communication among intelligent entities, we propose a novel announcement protocol in IoV using group signature. To the best of our knowledge, our work is the first comprehensive construction of an announcement protocol in IoV that deploys group signature. We show that our protocol efficiently solves these conflicting security requirements of message reliability, privacy and accountability using 5G communication channel. The performance analysis and simulation results signify our work achieves performance efficiency in IoV communication.

Improved Anti-Jamming Frame Error Rate and Hamming Code Repetitive Transmission Techniques for Enhanced SATURN Network Reliability Supporting UAV Operations (UAV 운영 신뢰성 개선을 위한 SATURN 통신망 항재밍 프레임 오율과 해밍코드 반복 전송 향상 기술)

  • Hwang, Yoonha;Baik, Jungsuk;Gu, Gyoan;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.1-12
    • /
    • 2022
  • As the performance of Unmanned Aerial Vehicles (UAVs) are improving and the prices are lowering, it is expected that the use of UAVs will continuously grow in the future. It is important to always maintain control signal and video communication to operate remote UAVs stably, especially in military UAV operations, as unexpected jamming attacks can result in fatal UAV crashes. In this paper, to improve the network reliability and low latency when supporting UAV operations, the anti-jamming performance of Second generation Anti-jam Tactical UHF Radio for NATO (SATURN) networks is analyzed and enhanced by applying Forward Error Correction (FEC) and Minimum Shift Keying (MSK) modulation as well as Hamming code based multiple transmission techniques.

Federated Filter Approach for GNSS Network Processing

  • Chen, Xiaoming;Vollath, Ulrich;Landau, Herbert
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.171-174
    • /
    • 2006
  • A large number of service providers in countries all over the world have established GNSS reference station networks in the last years and are using network software today to provide a correction stream to the user as a routine service. In current GNSS network processing, all the geometric related information such as ionospheric free carrier phase ambiguities from all stations and satellites, tropospheric effects, orbit errors, receiver and satellite clock errors are estimated in one centralized Kalman filter. Although this approach provides an optimal solution to the estimation problem, however, the processing time increases cubically with the number of reference stations in the network. Until now one single Personal Computer with Pentium 3.06 GHz CPU can only process data from a network consisting of no more than 50 stations in real time. In order to process data for larger networks in real time and to lower the computational load, a federated filter approach can be considered. The main benefit of this approach is that each local filter runs with reduced number of states and the computation time for the whole system increases only linearly with the number of local sensors, thus significantly reduces the computational load compared to the centralized filter approach. This paper presents the technical aspect and performance analysis of the federated filter approach. Test results show that for a network of 100 reference stations, with the centralized approach, the network processing including ionospheric modeling and network ambiguity fixing needs approximately 60 hours to process 24 hours network data in a 3.06 GHz computer, which means it is impossible to run this network in real time. With the federated filter approach, only less than 1 hour is needed, 66 times faster than the centralized filter approach. The availability and reliability of network processing remain at the same high level.

  • PDF

Verification of failover effects from distributed control system communication networks in digitalized nuclear power plants

  • Min, Moon-Gi;Lee, Jae-Ki;Lee, Kwang-Hyun;Lee, Dongil;Lim, Hee-Taek
    • Nuclear Engineering and Technology
    • /
    • v.49 no.5
    • /
    • pp.989-995
    • /
    • 2017
  • Distributed Control System (DCS) communication networks, which use Fast Ethernet with redundant networks for the transmission of information, have been installed in digitalized nuclear power plants. Normally, failover tests are performed to verify the reliability of redundant networks during design and manufacturing phases; however, systematic integrity tests of DCS networks cannot be fully performed during these phases because all relevant equipment is not installed completely during these two phases. In additions, practical verification tests are insufficient, and there is a need to test the actual failover function of DCS redundant networks in the target environment. The purpose of this study is to verify that the failover functions works correctly in certain abnormal conditions during installation and commissioning phase and identify the influence of network failover on the entire DCS. To quantify the effects of network failover in the DCS, the packets (Protocol Data Units) must be collected and resource usage of the system has to be monitored and analyzed. This study introduces the use of a new methodology for verification of DCS network failover during the installation and commissioning phases. This study is expected to provide insight into verification methodology and the failover effects from DCS redundant networks. It also provides test results of network performance from DCS network failover in digitalized domestic nuclear power plants (NPPs).