• Title/Summary/Keyword: 랜덤워크

Search Result 198, Processing Time 0.024 seconds

Balanced mobility pattern generation using Random Mean Degree modification in Gauss Markov model for Mobile network (이동 네트워크를 위한 가우스 마코프 모델에서 평균 이동각도 조절을 통한 균형잡힌 이동 패턴 생성)

  • 노재환;이병직;류정필;하남구;한기준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.502-504
    • /
    • 2004
  • 이동성이 중요시되는 네트워크에서 특정 프로토콜의 성능 평가를 위해서는 노드의 이동패턴을 정확하게 표현할 수 있는 Mobility Model이 필요하다. 노드의 연속적인 이동패턴을 필요로 하는 Mobile Ad-hoc 네트워크를 위해선 Markov process 기반의 Gauss-Markov Mobility Model이 적절하다. 그러나 맵의 엣지 부근에서 노드 이동의 부적절한 처리로 인해, 기존의 Gauss-Markov Model은 편중된 이동 패턴을 야기한다. 본 논문은 엣지 부근의 평균 이동각도를 랜덤하게 조정함으로써 기존의 모델이 가진 문제를 해결하고, 시뮬레이션을 통해서 이를 검증한다.

  • PDF

Cosponsorship networks in the 17th National Assembly of Republic of Korea (17대 국회의 공동법안발의에 관한 네트워크 분석)

  • Park, Chanmoo;Jang, Woncheol
    • The Korean Journal of Applied Statistics
    • /
    • v.30 no.3
    • /
    • pp.403-415
    • /
    • 2017
  • In this paper, we investigate cosponsorship networks found in the 17th National Assembly of Republic of Korea. New legislation should be sponsored by at least 10 legislators including one main sponsor. Cosponsorship networks can be constructed, using directional links from cosponsors of legislation to its main sponsor; subsequently, these networks indicate the social relationships among the legislators. We apply Exponential Random Graph Model (ERGM) for valued networks to capture structural properties and the covariate effects of networks. We find the effect of the same party has the greatest influence on the composition of the network. Mutuality also plays an important role in the cosponsorship network; in addition, the effect of the number of elections won by a legislator has a small but significant influence.

A Distributed Peer Selection Method for Supporting Scalable Peer-to-Peer Services (확장성 있는 Peer-to-Peer 서비스 제공을 위한 분산적 피어 선택 기법)

  • Park, Jaesung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.471-474
    • /
    • 2013
  • In this paper, we propose a distributed parent peer selection method to construct an efficient peer-to-peer(P2P) network topology by considering the capacity of a peer and the hop distance from a data source to the peer. To achieve this goal, we propose a method to combine the two performance metrics to calculate the probability that a peer becomes a parent peer. Using the probability, we propose a method to select a parent peer stochastically by making use of the state information of the neighboring peers that each peer maintains. Through simulation studies, we show that the proposed method drives high capacity peers to support more children peers and makes the diameter of the P2P network shorter than the other methods.

Transmission Performance of Lattice Structure Ad-Hoc Network under Intrusions (침해가 있는 격자구조 애드-혹 네트워크의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.7
    • /
    • pp.767-772
    • /
    • 2014
  • As temporary network, ad-hoc network has been effected by structures and implemented environments of networks. In this paper, transmission performance of lattice structure ad-hoc network, which is expected to use in sensor network and IoT(Internet of Things), is analyzed in point of intrusions and countermeasure for intrusion is suggested. In this paper, computer simulation based on NS-2 is used for performance analysis, VoIP(Voice over Internet Protocol) as a widely used service is chosen for performance measure. MOS(Mean Opinion Score) and call connection rate is used as performance parameter. As results of performance analysis, it is shown that for MOS, random network is better then lattice network at intrusion environments, but for call connection rate, lattice network is better then random network.

Which country's end devices are most sharing vulnerabilities in East Asia? (거시적인 관점에서 바라본 취약점 공유 정도를 측정하는 방법에 대한 연구)

  • Kim, Kwangwon;Won, Yoon Ji
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1281-1291
    • /
    • 2015
  • Compared to the past, people can control end devices via open channel. Although this open channel provides convenience to users, it frequently turns into a security hole. In this paper, we propose a new human-centered security risk analysis method that puts weight on the relationship between end devices. The measure derives from the concept of entropy rate, which is known as the uncertainty per a node in a network. As there are some limitations to use entropy rate as a measure in comparing different size of networks, we divide the entropy rate of a network by the maximum entropy rate of the network. Also, we show how to avoid the violation of irreducible, which is a precondition of the entropy rate of a random walk on a graph.

The Effects of Feedback Loops on the Network Robustness by using a Random Boolean Network Model (랜덤 불리언 네트워크 모델을 이용한 되먹임 루프가 네트워크 강건성에 미치는 영향)

  • Kwon, Yung-Keun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.3
    • /
    • pp.138-146
    • /
    • 2010
  • It is well known that many biological networks are very robust against various types of perturbations, but we still do not know the mechanism of robustness. In this paper, we find that there exist a number of feedback loops in a real biological network compared to randomly generated networks. Moreover, we investigate how the topological property affects network robustness. To this end, we properly define the notion of robustness based on a Boolean network model. Through extensive simulations, we show that the Boolean networks create a nearly constant number of fixed-point attractors, while they create a smaller number of limit-cycle attractors as they contain a larger number of feedback loops. In addition, we elucidate that a considerably large basin of a fixed-point attractor is generated in the networks with a large number of feedback loops. All these results imply that the existence of a large number of feedback loops in biological networks can be a critical factor for their robust behaviors.

Recommending Personalized POI Considering Time and User Activity in Location Based Social Networks (위치기반 소셜 네트워크에서 시간과 사용자 활동을 고려한 개인화된 POI 추천)

  • Lee, Kyunam;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.1
    • /
    • pp.64-75
    • /
    • 2018
  • With the development of location-aware technologies and the activation of smart phones, location based social networks(LBSN) have been activated to allow people to easily share their location. In particular, studies on recommending the location of user interests by using the user check-in function in LBSN have been actively conducted. In this paper, we propose a location recommendation scheme considering time and user activities in LBSN. The proposed scheme considers user preference changes over time, local experts, and user interest in rare places. In other words, it uses the check-in history over time and distinguishes the user activity area to identify local experts. It also considers a rare place to give a weight to the user preferred place. It is shown through various performance evaluations that the proposed scheme outperforms the existing schemes.

Efficient Usage of Wi-Fi Ad-hoc Network with 3G (3G와 Wi-Fi 애드혹 네트워크의 효율적인 사용)

  • Yoon, Ji-Hyun;Yoo, Myoung-Jin;Yoon, Mi-Sun;Yang, Sung-Bong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.643-646
    • /
    • 2011
  • 스마트 폰의 보급과 함께, 무선 네트워크에서의 데이터 사용량이 급격하게 증가하고 있다. 이로 인해 발생하는 서버의 과부하와 그로 인한 속도 저하를 해결하기 위하여, 본 논문에서는 Wi-Fi 에드혹 네트워크를 이용한 통신을 3G 통신망에 효율적으로 접목하는 기법을 제안한다. 본 논문에서는 하나의 파일을 다수의 파일 블록으로 나누어 받는 방식을 이용하며, Wi-Fi 애드혹 네트워크를 이용해 주변에 있는 다른 이용자에게 파일 블록을 요청함과 동시에 자신이 가진 파일 블록 테이블을 다른 이용자에게 전달해주는 기법을 제안한다. 이를 이용하여 상대가 가지고 있을 것이라고 추측되는 파일 블록을 알아내어, 요청할 수 있다. 그 결과, 제안된 알고리즘이 3G와 Wi-Fi 에드혹 네트워크를 랜덤으로 이용하는 방법 대비 73%의 속도 향상과 43%의 3G 사용량 감소 효과를 보임을 확인할 수 있었다.

A Greedy Algorithm for Minimum Power Broadcast in Wireless Networks (무선 네트워크에서 최소전력 브로드캐스트를 위한 탐욕 알고리즘)

  • Lee, Dong-ho;Jang, Kil-woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.641-644
    • /
    • 2016
  • Unlike wired networks, broadcasting in wireless networks can transmit data at once to several nodes with a single transmission. For omnidirectional broadcast to a node in wireless networks, all adjacent nodes receive the data at the same time. In this paper, we propose a greedy algorithm to solve the minimum power broadcasting problem of minimizing the total transmit power on broadcasting in wireless networks. We apply two matrices to the proposed algorithm: one is a distance matrix that represents the distance between each node, the other is an adjacency matrix having the number of adjacency nodes. Among the nodes that receive the data, a node that has the greatest number of the adjacent node transmits data to neighbor preferential. We compare the performance of the proposed algorithm with random method through computer simulation in terms of transmitting power of nodes. Experiment results show that the proposed algorithm outperforms better than the random method.

  • PDF