• Title/Summary/Keyword: 노드 중심성

Search Result 241, Processing Time 0.025 seconds

A Scheduling Algorithm of AP for Alleviating Unfairness Property of Upstream-Downstream TCP Flows in Wireless LAN (무선 랜에서의 상.하향 TCP 플로우 공평성 제고를 위한 AP의 스케쥴링 알고리즘 연구)

  • Lim, Do-Hyun;Seok, Seung-Joon
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.11
    • /
    • pp.1521-1529
    • /
    • 2009
  • There is a serious unfairness problem between upstream and downstream flows of AP in IEEE 802.11 Wireless LAN. This problem is because Wireless LAN's DCF MAC protocol provides AP with equal channel access priority to mobile noded. Also, it makes this problem worse that the TCP's Data segment loss is more effective on throughput than the TCP's ACK segment. In this paper, we first make several simulations to analysis the unfairness in the various point of view and to find reasons of the unfairness. Also, this paper presents AP's scheduling scheme to alleviate the unfairness problem and evaluate the scheme through ns2 simulator.

  • PDF

An Energy Efficient and Low Latency MAC Protocol Using RTS Aggregation Scheme for Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율성과 낮은 지면을 위한 RTS Aggregation 기법)

  • Lee, Dong-Ho;Song, Byung-Hun;Chung, Kwang-Sue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.276-280
    • /
    • 2008
  • 무선 센서 네트워크의 연구는 이벤트 기반과 주기적 모니터링 기반미라는 두 가지 응용의 형태에 맞추어 진행되었다. 두 가지 응용의 핵심적인 요구 사항은 다르지만 안정적인 운용을 위해 공동적으로 낮은 전송 자연의 요구가 존재한다. 하지만 기존의 무선 센서 네트워크의 프로토콜은 에너지 효율성을 중심으로 연구가 진행되었기 때문에 전송 자연에 대한 고려가 부족하였다. 본 논문에서는 무선 센서 네트워크의 MAC 프로토콜인 RA-MAC(RTS Aggregation-Media Access Control) 프로토콜을 제안하였다. RA-MAC 프로토콜은 새로운 채널 접근 기법 및 RTS Aggregation 기법에 의해 에너지 효율성과 낯은 전송 자연을 이룰 수 있고 수신 노드의 전송 스케줄링에 의해 이벤트 기반과 주기적 모니터링 기반 응용의 요구 사항을 동시에 만족시킬 수 있다. 실험을 통해 RA-MAC 프로토콜은 기존에 제안된 에너지 효율적인 MAC 프로토콜과 비슷한 에너지 효율을 보이면서 좀 더 낮은 전송 지연을 이루고 전송률을 향상시킬 수 있음을 확인하였다.

  • PDF

A Study of Precise Indoor Positioning Algorithm For Energy Efficiency Based on BLE Finger Printing (에너지 효율을 고려한 BLE 핑거프린팅 기반의 정밀 실내 측위 알고리즘 연구)

  • Lee, Dohee;Seo, Hyo-Seung;Lee, Joon beom;Jo, Ju-Yeon;Son, Bong-Ki;Song, Je-Min;Lee, Jae-Kwon;Lee, Jaeho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.88-91
    • /
    • 2016
  • 최근 스마트 기기의 활용 요구 증가로 인한 실내 위치 인식 시스템 수요가 급증함에 따라, BLE(Bluetooth Low Energy) 비콘을 이용한 실내 측위 시스템이 각광받고 있다. 본 논문은 BLE 비콘 기반에 중심을 두고 RSSI 신호를 이용하여 거시적인 삼변 측량 기법을 이용하여 산출한다. 그 결과값을 근사치 위치에만 Fingerprinting을 적용하여 위치 측위 기본 연산량을 줄임과 동시에 에너지 효율을 증대시킨다. 또한 선정된 Fingerprinting Cell 주위의 노드만을 이용하여 사용자의 단말 위치의 정밀성을 보장하는 정밀 삼변 측량 연산을 수행하여 에너지 효율을 고려한 BLE 핑거프린팅 기반의 정밀 실내 측위 알고리즘을 제안한다.

Analysis of the Spread of Issues Related to COVID-19 Vaccine on Twitter: Focusing on Issue Salience (코로나19 백신 관련 트위터 상의 이슈 확산 양상 분석: 이슈 현저성을 중심으로)

  • Hong, Juhyun;Lee, Mina
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.613-621
    • /
    • 2021
  • This study conducted a network analysis to determine how COVID-19 vaccine-related issue spread on Twitter during the introduction stage of the COVID-19. Issue diffusion tendency is analyzed according to the time period: phase 1 (initiation of vaccine introduction: March 7 - April 3, 2021), phase 2 (stagnant period of vaccination: April 4 - April 22, 2021), and phase 3 (increase of vaccination: April 23 - May 5, 2021). NodeXL was used for data collection and analysis. Daily Twitter network data were collected by entering search terms highly related to the COVID-19 vaccine. This study found that side effects-related opinions were repeatedly formed throughout the analysis period. As the vaccination rate increased and death cases were reported on media, death-related issues also emerged on Twitter. On the other hand, vaccine safety did not receive much attention on Twitter. The results of this study highlight the role of social media as a channel of issue diffusion when a national disaster strikes. We emphasize the need for the government to monitor public opinions on social media and reflect them in crisis communication strategies.

Dynamic Remote User Trust Evaluation Scheme for Social Network Service (소셜 네트워크에서 원거리 노드를 고려한 동적 사용자 신뢰도 평가 스킴)

  • Kim, Youngwoong;Choi, Younsung;Kwon, Keun;Jeon, Woongryul;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.373-384
    • /
    • 2014
  • The social network service is the bidirectional media that many users can build relations not only friends but also other people. However, a process to approach in the social network is so simple that untrustable information, which malignant users make, is spreaded rapidly in many the social network uses. This causes many users to suffer material or psychological damages. Because of openness in the social network, there will be higher risk of the privacy invasion. Therefore, sensitive information should be transferred or provided only to reliable users. In general, because many users exchange among one hops, many researches have focused on one hop's trust evaluation. However, exchanges between users happen not only one joint bridege but also far nodes more than two nodes on account of dense network and openness. In this paper we propose the efficient scheme combining transitivity and composability for remote users.

A Study on the Liner Shipping Network of the Container Port (세계 주요 정기선사의 항만네트워크에 관한 연구)

  • Kang, Dongjoon;Bang, Heeseok;Woo, Suhan
    • Journal of Korea Port Economic Association
    • /
    • v.30 no.1
    • /
    • pp.73-96
    • /
    • 2014
  • Competitiveness of container ports has been traditionally evaluated by capability of individual ports to provide services to customers or their service quality. However, since container ports are connected by container shipping networks to varying degrees, the status of the ports in liner shipping service networks also determines competitiveness of the ports. Sometimes same ports may play different roles in different forms of shipping networks. Shipping network connections that formulate in container ports therefore have more significant impact on their performance than service capabilities they have. This study aims to explore how the shipping and port network has been structured and changed in the past and to examine the network characteristics of ports using Social Network Analysis(SNA). In this SNA study, nodes in the network are the ports-of-call of the liner shipping services and links in the network are connections realized by vessel movements, such that the liner shipping networks determine the port networks. This study, therefore, investigates the liner shipping networks and through its results demonstrates the network characteristics of the ports that are represented by the four centrality indices. This provides port authorities and terminal operating companies with managerial implications to enhance competitiveness from customers' perspectives.

Study of Mobile Code Security Service in Active Network Environment (액티브 네트워크 환경에서의 이동코드 보안서비스 제공에 관한 연구)

  • 한인성;김진묵;유황빈
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.29-34
    • /
    • 2004
  • As the number of internet users grows rapidly, the services which users required becomes various. However, for fulfilling these various user requirements, the existing passive network should be standardized for a long time. To resolve the delay on providing services, active network as a new technology was suggested. Its router or switch with DARPA as center has the program running ability, so user oriented network can be composed. However, active network's architecture can resolve the user required service using mobile code on the network node, but it is more complex, easy-to-attack, various than the passive network. Many researchers have tried to resolve this problem. So, this paper studied the mobile code security service in active network environment to provide user's convenience and accommodation, and introduced ANASP system as an alternative.

  • PDF

A Study on the Characteristics of Tourism Flow of Independent Tourists from China to South Korea Based on Tourists' Digital Footprint (디지털 여행기록 기반 중국 개별 관광객의 한국 관광경로 특성 분석)

  • Wang, Chun-Yan;Jang, Phil-sik;Kim, Hyung-Ho
    • Journal of Digital Convergence
    • /
    • v.18 no.1
    • /
    • pp.111-119
    • /
    • 2020
  • This study takes Chinese independent tourists to South Korea as the research object, mines the data of tourists' digital footprints from online travel notes, and analyzes the characteristics of the tourism flow of Chinese independent tourists to South Korea by using the method of quantitative statistics and social network analysis(SNA). The results show that Seoul, Jeju Island, Busan and Daegu are the important tourist destinations for Chinese independent tourists entering South Korea. In addition, Qingdao, Tianjin, Shenyang, Hong Kong, Foshan and Macao are crucial hubs for Chinese independent tourists to visit South Korea. In future studies, the number of sample data should be increased. The time span of data collection should be extended for studying the annual variation characteristics of tourism flow and the trend of tourism hot spots.

Development of the Data Communication based Future Air Base Defence Operation Model (데이터통신 기반 차세대 기지방어작전 모델 개발)

  • Pyo, Sang-Ho;Kim, Ki-Hyung;Lee, Tae-Gong
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.157-173
    • /
    • 2014
  • As Air Base Defence, Anti-Aircraft Defence and Nuclear-Biological-Chemical Protection model considered as ground operation models in Republic of Korea Air Force are designed as the voice-centered system between participant nodes, there is a problem communicating accurately. In recent years, the military is developing a command and control capability using data communication technology to solve the problem. Therefore, this paper proposes new model to maximize efficiency of performance improvement through the Data Communication-based Future Air Base Defence Model. We refer to a research paper that is related existing and developed new model. and then we really experimented under WiBro Network that is constructed to Air Base for maintenance control. Based on the analysis and the test result of new Air Base Defence Model, we have concluded that the performance improvement effect is reached.

Novel System Modeling and Design by using Eclectic Vehicle Charging Infrastructure based on Data-centric Analysis (전기차 충전인프라 및 데이터 연계 분석에 의한 시스템 모델링 및 실증 설계)

  • Kim, Hangsub;Park, Homin;Jeong, Taikyeong;Lee, Woongjae
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.51-59
    • /
    • 2019
  • In this paper, we analyzed the relationship between charging operation system and electricity charges connected with charging infrastructure among data of many demonstration projects focused on electric vehicles recently. At this point in time, due to the rapid increase in demand for the electric charging infrastructure that will take place in the future, we can prepare for an upcoming era in the sense of forecasting the demand value. At the same time, demonstrating and modeling optimized system modeling centering on sites is a prerequisite. The modeling based on the existing small - scale simulation and the design of the operating system are based on the data linkage analysis. In this paper, we implemented a new optimized system modeling and introduced it as a standard format to analyze time - dependent time - divisional data for each vehicle and user in each point and node. In order to verify the efficiency of the optimization based on the data linkage analysis for the actual implemented electric car charging infrastructure and operation system.