• Title/Summary/Keyword: network separation

Search Result 309, Processing Time 0.022 seconds

Legislative Networks of Multicultural, Family, Gender Policy (다문화, 가족, 젠더 정책의 입법네트워크)

  • Jang, Im Sook
    • Korean Journal of Legislative Studies
    • /
    • v.23 no.2
    • /
    • pp.179-217
    • /
    • 2017
  • The purpose of this study is to analyze the integration and separation phenomenon of the legislative network by analyzing the Legislative cosponsorship networks in the process of multicultural, family, and gender legislation. First, I analyzed the Legislative cosponsorship networks centered on the proposed bills in the Women and Family Committee. Second, Analyze the network of joint initiatives for multicultural, family, gender related legislation and representative laws in each field. In this process, we analyze who participates in the Legislative cosponsorship networks and who is the leader of the political coalition. Finally, Understand the shared characteristics and differentiated characteristics of policy networks according to policy issues.

INTERFERENCE CHARACTERISTICS OF CONSTRUCTION ENVIRONMENT FOR WSN APPLICATIONS

  • Sun-Chan Bae;Won-Sik Jang;Sang-Dae Park;Won-Suk Jang
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.592-595
    • /
    • 2013
  • Advent of Wireless Sensor Networks (WSN) has provided potentials to a variety of construction applications. It is well appreciated that WSNs have advantages over traditional wired system, such as ease of installation and maintenance with increased cost savings and efficiencies. However, the obstruction of wireless signal from physical objects in the heterogeneous construction environment often brings challenges to WSN measurement system. This paper analyzed the obstruction characteristic of construction environment where construction materials, equipment, and built structures obstruct the wireless signal yielding negative effect of measurement system. By adopting evaluation criteria, such as packet reception rate, field experiments have been implemented to quantitatively identify the interference of wireless signal from penetration, reflection, and network traffic under the construction environment. The results show that reliable performance of wireless sensor in construction environment depends on the optimal separation distance between a receiver and a transmitter, obstruction types, obstruction thickness, and transmission interval. In addition, the methodology and experimental results of this paper could be used in the practical design of network topology when hundreds of sensor nodes form a mesh network in the large scale construction applications.

  • PDF

Dynamic Threshold Method for Isolation of Worm Hole Attack in Wireless Sensor Networks

  • Surinder Singh;Hardeep Singh Saini
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.119-128
    • /
    • 2024
  • The moveable ad hoc networks are untrustworthy and susceptible to any intrusion because of their wireless interaction approach. Therefore the information from these networks can be stolen very easily just by introducing the attacker nodes in the system. The straight route extent is calculated with the help of hop count metric. For this purpose, routing protocols are planned. From a number of attacks, the wormhole attack is considered to be the hazardous one. This intrusion is commenced with the help of couple attacker nodes. These nodes make a channel by placing some sensor nodes between transmitter and receiver. The accessible system regards the wormhole intrusions in the absence of intermediary sensor nodes amid target. This mechanism is significant for the areas where the route distance amid transmitter and receiver is two hops merely. This mechanism is not suitable for those scenarios where multi hops are presented amid transmitter and receiver. In the projected study, a new technique is implemented for the recognition and separation of attacker sensor nodes from the network. The wormhole intrusions are triggered with the help of these attacker nodes in the network. The projected scheme is utilized in NS2 and it is depicted by the reproduction outcomes that the projected scheme shows better performance in comparison with existing approaches.

Microfluidic Biosensor System for HDL Cholesterol

  • Kim, Joo-Eun;Paek, Se-Hwan
    • 한국생물공학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.717-720
    • /
    • 2003
  • A chromogenic biosensor employing microfluidics on a chip has been developed for the determination of high-density lipoprotein (HDL) cholesterol (HDL-C) in human serum. We have investigated a plain and effective method to immobilize enzymes within the microchip without chemically modifying micro-channel or technically micro-fabricating column reactor and fluid channel network. In assessing risk factors of coronary heart disease, a micro-chip system would minimize requirements of instrument and reagent handling.

  • PDF

국가 지하수 관측망 자료를 이용한 충적층 지하수 함양률의 공간적 변동성 연구

  • 문상기;우남칠;한원식
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2002.04a
    • /
    • pp.237-242
    • /
    • 2002
  • This study is objected to assess the recharges of phreatic aquifers in the south Korea. The water level data of the national ground-water monitoring network were analysed by PCA(Principal Component Analysis), and classified to 8 types. The recharge were estimated by ‘water-level change method’ on basis of the classified types and compared with the previous methods(hydrograph separation methods) on basis of 4 river basins. The recharge were various type by type and site by site. But the recharge estimated by this study were consistent with that of the other studies.

  • PDF

A Study on Curing Behaviors and Structures of Chiral Liquid Crystal-Polymer composite films (키랄네마틱액정-고분자 복합막의 경화거동과 내부구조에 관한 연구)

  • 남수용;김종원;김용욱
    • Journal of the Korean Graphic Arts Communication Society
    • /
    • v.16 no.3
    • /
    • pp.15-27
    • /
    • 1998
  • Several aspects of polymer dispersed liquid crystal(PDLC) film properties make them interesting for display application. Most versions of PDLC materials are able to modulate light without the use of polarizers, which offers advantages in optical throughput(brightness) and viewing angle compared to polarizer-based display. In this papers, we attemped to doe minimum of remaining liquid crystals at polymer network for the liquid crystal-polymer composite (LCPC) films. In results, best phase separation behaviors turned out liquid crystal/monomer/oligomer mixture system.

  • PDF

Secure Data Transmission Scheme between Network for Building Facilities Control System (빌딩시설 제어시스템용 안전한 망간 자료전송 방안)

  • Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.8
    • /
    • pp.102-108
    • /
    • 2018
  • The existing data transmission technology applied between the non-secure external internet and the secure internal business network has various problems when applied to the building facility management SCADA system control network. Traditional inter-network data transfer technologies involve high complexity and high costs because blacklist-based security techniques are applied to all data. However, whitelist-based security techniques can be applied to data distributed in Building Facility Management SCADA control systems because a small number of structured control data are repeatable and periodic. This simplifies the security technology applied to inter-network data transmission, enabling building facility management SCADA system control network deployment at low cost. In this paper, we proposed building control networks specialized in building facility management SCADA control systems by providing solutions to address and address these problems.

A Network-based Locator-Identifier Separation Scheme using DHT in SDN (SDN환경에서 DHT를 이용한 네트워크 기반 위치자-식별자 분리 기술)

  • Lee, Chan-Haeng;Min, Sung-Gi;Choi, Chang-Won
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.2
    • /
    • pp.37-49
    • /
    • 2016
  • An IP address is used as a host identifier and a locator to bind hosts and applications to their location in existing Internet. Several protocols are proposed to eliminate this binding. Most of these protocols use IPv6-based host identifiers to maintain compatibility with existing Internet, but these identifiers cannot be handled by standard IPv6 routers because such identifiers are unroutable. Therefore, host identifiers need to be usually converted to locators at hosts, and the standard IPv6 protocol should be modified to interoperate with these protocols. In this paper, we propose a network-based host identifier locator separating scheme in software-defined networking. The proposed scheme separates the underlying network into Host Identity and IP domains in order to directly forward unroutable identifiers. The Host Identity domain operates as an overlaid network over IP domain, and it makes the unroutable identifiers to be routable using distributed hash table based routing strategy. For the evaluation, we compared the proposed scheme with the previous scheme using signaling costs and packet delivery costs. The result shows that the proposed scheme is more suitable in the recent mobile-based environments.

Deterministic Data Communication Architecture for Safety-Critical Networks in Nuclear Power Plants (원전 안전통신망을 위한 결정론적 데이터 통신 구조)

  • Park, Sung-Woo;Kim, Dong-Hoon
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.5
    • /
    • pp.199-204
    • /
    • 2006
  • To develop a safety-critical network in nuclear power plants that puts more stringent requirements than the competitive commercial ones do, we establish four design criteria - deterministic communication, explicit separation/isolation structure, reliability, verification & validation. According to those design criteria, the fundamental design elements are chosen as follows - a star topology, point-to-point physical link, connection-oriented link control and fixed allocation access control. After analyzing the design elements, we also build a communication architecture with TDM (Time Division Multiplexing) bus switching scheme. Finally, We develop a DDCNet (Deterministic Data Communication Network) based on the established architecture. The DDCNet is composed of 64 nodes and guarantees the transmission bandwidth of 10Mbps and the delay of 10 msec for each node. It turns out that the DDCNet satisfies the aforementioned design criteria and can be adequately utilized for our purpose.

Implementation and Experimental Evaluation of Bandwidth Allocation Scheme on PROFIBUS (PROFIBUS에서 대역폭 할당 기법 구현 및 실험적 평가)

  • Hong, Seung-Ho;Kim, Yu-Chul;Kim, Ji-Yong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.11
    • /
    • pp.943-954
    • /
    • 2000
  • Fieldbus is the lowest level industrial network in the communication hierarchy of factory automation and distributed process control systems. Data generated from field devices are largely divided into three categories : time-critical, periodic and time-available data. Because these data share one fieldbus medium, it needs a method that allocates these data to the bandwidth-limited fieldbus medium. This paper introduces an implementation method of bandwidth allocation scheme on PROFIBUS. In order to implement bandwidth allocation scheme on PROFIBUS, the following functions need to be supplemented on the FDL(Fieldbus Datalink Layer) protocol: (i) separation of medium bandwidth into periodic and non-periodic intervals, (ii) synchronization of node timers over a local link. In order to examine the validity of bandwidth allocation scheme on PROFIBUS, this paper develops an experimental model of a network system. The results obtained from the experimental model show that the bandwidth allocation scheme satisfies the performance requirement of time-critical, periodic and time-available data.

  • PDF