• Title/Summary/Keyword: 능동 네트워크

Search Result 501, Processing Time 0.025 seconds

Open Innovation Model using Problem Solving Process and Facilitator for SMEs (개방형 혁신체계 구축을 위한 퍼실리테이터를 활용한 중소기업 집단문제해결 모형에 대한 연구)

  • Park, Sang Hyeok;Kim, Changone;Oh, Seunghee
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.5
    • /
    • pp.43-52
    • /
    • 2014
  • It becomes to be essential for firms to build up collaboration ecosystem with diverse entities and to be common for firms to absorb knowledge from external environment for their innovation. Companies try to transfer technological or knowledge asset to other firms through open innovation. The purpose of this research is to suggest the role of universities in University-Industry Collaborations besides research collaboration and we focus on the role of university to strengthen the regional business ecosystem network. For this research, we analyze a specific UIC(University Industry Collaboration) program called as "Business Clinic Day" which provides a consulting service for firms, especially, SMEs with a specific problem by a group of consultants including CEOs, professors, and heads of regional public or private service providers. Then we studied how the business network has changed after the program with network analysis. Also, we try to find out the main pattern of network structure extension of business ecosystem with interview. This study illustrates that changing types of network are formed between university and SMEs by clinic day. The result shows that not only new role as a network promoter, but also the partner as a technology-provider in the regional business ecosystem.

  • PDF

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

The Development of Real-time Feedback Vibration Control System Using Wireless Sensor Networks (무선 센서 네트워크를 이용한 실시간 Feedback 진동제어 시스템 개발)

  • Heo, Gwang Hee;Kim, Chung Gil;Ahn, Ui Jong
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.16 no.3
    • /
    • pp.60-66
    • /
    • 2012
  • This paper aims to constitute a feedback vibration control system using wireless sensor networks and experiment it on a model structure to verify its effectiveness. For the purpose, we set up a feedback vibration control system composed of a wireless input/output(I/O) sensor node based on bluetooth, a home-made shear type MR damper, a shaker which generates a constant size of sine wave, and a simple beam model structure. The vibration control experiment was performed by shaking the 1/4 point of beam with a shaker. At the moment of shaking, we controled the vibration with MR damper which was placed vertically on the center of beam. Simultaneously, by acquiring acceleration response at the 2/4 point of beam, we evaluated the effectiveness of control capability. The control command was set to send a voltage signal to MR damper when the acceleration response, acquired from the wireless I/O sensor node placed at the center of beam, was more than a certain amount. Although the realtime feedback vibration control system constituted in this paper is effective only within a limited command system, it has been proven that the system was able to effectively decrease the vibration of structure by generating a control command aimed for realtime purpose. The system also showed a possibility to be used as a structural response control system adapting a variety of semi-active control algorithm.

The Change of a Network Structure in the Regional Business Ecosystem through RIS (지역연고사업(RIS)을 통한 지역 중소기업 생태계의 네트워크 구조변화 연구)

  • Shin, Yong-Wook;Park, Sang Hyeok
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.3
    • /
    • pp.77-84
    • /
    • 2013
  • In this paper, we focus the changing role of universities of University-Industry Collaboration (UIC) for enriching the regional business ecosystem network. For this research, we analyze 'Regional Innovation System(RIS)' - a specific UIC program- which provides a marketing service for firms, especially, SMEs with a specific problem by a group of consultants including CEOs, professors, and heads of regional public or private service providers. Then we have analyzed using network analysis how the business network was changed from RIS. Moreover, we will interview the participants in the important position of the network and investigate the reason for bringing a change in the network structure by using this program. This study illustrates that various types of network are formed between university and SMEs. Furthermore, the networks surrounding SMEs are extended to the other people connected to them. This means that the business network of SMEs had been diversified via the facilitation of university. This study throws new highlights on the new role for the university as a network promoter in addition to the partner as a technology-provider in the regional business ecosystem. Moreover, the network analysis between before-and-after can be used for the evaluation of the effectiveness of the various UIC programs.

  • PDF

A Study on Survivability of Node using Response Mechanism in Active Network Environment (액티브 네트워크 환경에서 대응 메커니즘을 이용한 노드 생존성에 관한 연구)

  • Yang, Jin-Seok;Lee, Ho-Jae;Chang, Beom-Hwan;Kim, Hyoun-Ku;Han, Young-Ju;Chung, Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.799-808
    • /
    • 2003
  • Existing security solutions such as Firewell and IDS (Intrusion Detection System) have a trouble in getting accurate detection rate about new attack and can not block interior attack. That is, existing securuty solutions have various shortcomings. Shortcomings of these security solutions can be supplemented with mechanism which guarantees an availability of systems. The mechanism which guarantees the survivability of node is various, we approachintrusion telerance using real time response mechanism. The monitoring code monitors related resources of system for survivability of vulnerable systm continuously. When realted resources exceed threshold, monitoring and response code is deployed to run. These mechanism guarantees the availability of system. We propose control mathod about resource monitoring. The monitoring code operates with this method. The response code may be resident in active node for availability or execute a job when a request is occurred. We suggest the node survivability mechanism that integrates the intrusion tolerance mechanism that complements the problems of existing security solutions. The mechanism takes asvantage of the automated service distribution supported by Active Network infrastructure instead of passive solutions. The mechanism takes advantage of the automated service distribution supported by Active Network infrastructure instead of passive system reconfiguration and patch.

Active Transmission Scheme to Achieve Maximum Throughput Over Two-way Relay Channel (양방향 중계채널에서 최대 전송률을 위한 동적 전송 기법)

  • Park, Ji-Hwan;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.31-37
    • /
    • 2009
  • In the two-way relay channel, the relay employ Amplify-and-Forward (AF) or Decode-and-Forward (DF) protocol, and broadcast the network-coded signal to both user. In the system, DF protocol provides maximum throughput at low signal to noise ratio(SNR). On the other hand, at high SNR, AF protocol provides maximum throughput. The paper propose active transmission scheme which employ Amplify-and-Forward or Decode-and-Forward protocol based on received SNR at the relay over Two-way relay channel. The optimal threshold is investigated numerically for switching the protocol. Through numerical results, we confirm that the proposed scheme outperforms conventional schemes over two-way relay channel.

  • PDF

A Method of Frequent Structure Detection Based on Active Sliding Window (능동적 슬라이딩 윈도우 기반 빈발구조 탐색 기법)

  • Hwang, Jeong-Hee
    • Journal of Digital Contents Society
    • /
    • v.13 no.1
    • /
    • pp.21-29
    • /
    • 2012
  • In ubiquitous computing environment, rising large scale data exchange through sensor network with sharply growing the internet, the processing of the continuous stream data is required. Therefore there are some mining researches related to the extracting of frequent structures and the efficient query processing of XML stream data. In this paper, we propose a mining method to extract frequent structures of XML stream data in recent window based on the active window sliding using trigger rule. The proposed method is a basic research to control the stream data flow for data mining and continuous query by trigger rules.

Game Theoretic MAP Load Balancing Scheme in HMIPv6 (HMIPv6에서 게임 이론을 이용한 MAP 부하 분산 기법)

  • Ki, Bum-Do;Kim, Sung-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7B
    • /
    • pp.991-1000
    • /
    • 2010
  • The Hierarchical Mobile IPv6 (HMIPv6) has been proposed to accommodate frequent mobility of the Mobile Node. HMIPv6 can effectively reduce the signaling overhead and latency. However, it has a problem that the registration of a mobile node concentrates on the furthest MAP(Mobility Anchor Point) when the mobile node enters into a new domain. This paper proposes a new load distribution mechanism by using the concept of Nash Bargaining Solution. The main advantage of the proposed scheme can prevent load concentration from being registered to the specified MAP based on the weight value according to the available resource-ratio of a MAP. With a simulation study, the proposed scheme can improve network performance under widely diverse traffic load intensities.

Study on Logistics System based on Physical Layer Information and Relay Cooperative Communication MAC Protocol (물리계층 정보와 릴레이 협력통신에 적용된 MAC 프로토콜 기반 물류 시스템연구)

  • Jeon, Dong-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1803-1810
    • /
    • 2013
  • In a warehouse, because there exist frequent changes of stock status and the quality of some contents are influenced by the environment such as temperature, fast and accurate management of the warehouse's environment is very important for Warehouse Management Systems. However, due to the absence of a unified standard for the communication protocol between RFID nodes and centralized MAC schemes for RFID communications in previous studies have severe problems. Therefore, in this paper, we propose a WiMedia MAC based RFID cooperative relay transmission scheme for warehouse management system applications.

A Quantitative Assessment Modeling Technique for Survivality Improvement of Ubiquitous Computing System (유비쿼터스 컴퓨팅 시스템의 생존성 개선을 위한 정량적 분석 모델링 기법)

  • Choi, Chang-Yeol;Kim, Sung-Soo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.633-642
    • /
    • 2005
  • Ubiquitous computing system is about networked processors, which is constructed with one or more computers interconnected by the networks. However, traditional security solution lacks a Proactive maintenance technique because of its focusing on developing the qualitative detection and countermeasure after attack. Thus, in this paper, we propose a quantitative assessment modeling technique, by which the general infrastructure can be improved and the attacks on a specific infrastructure be detected and protected. First of all, we develop the definition of survivality and modeling technique for quantitative assessment modeling with the static information on the system random information, and attack-type modeling. in addition, the survivality analysis on TCP-SYN attack and code-Red worm attack is performed for validating the proposed technique.