• Title/Summary/Keyword: 매체 신뢰도

Search Result 257, Processing Time 0.026 seconds

Design of Adaptive DCF algorithm for TCP Performance Enhancement in IEEE 802.11 based Mobile Ad-hoc Networks (IEEE 802.11 기반 이동 ad-hoc 망에서 TCP 성능 향상을 위한 적응적 DCF 알고리즘 설계)

  • Kim, Han-Jib;Lee, Gi-Ra;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.79-89
    • /
    • 2006
  • TCP is the most widely used transport protocol in Internet applications that guarantees a reliable data transfer. But, in the wireless multi-hop networks, TCP performance is degraded because it is designed for wired networks. The main reasons of TCP performance degradation are contention for wireless medium at the MAC layer, hidden terminal problem, exposed terminal problem, packet losses in the link layer, unfairness problem, reordering problem caused by path disconnection, bandwidth waste caused by exponential backoff of retransmission timer due to node's mobility and so on. Specially, in the mobile ad-hoc networks, discrepancy between a station's transmission range and interference range produces hidden terminal problem that decreases TCP performance greatly by limiting simultaneous transmission at a time. In this paper, we propose a new MAC algorithm for mobile ad-hoc networks to solve the problem that a node can not transmit and just increase CW by hidden terminal. In the IEEE 802.11 MAC DCF, a node increases CW exponentially when it fails to transmit, but the proposed algorithm, changes CW adaptively according to the reason of failure so we get a TCP performance enhancement. We show by ns-2 simulation that the proposed algorithm enhances the TCP performance by fairly distributing the transmission opportunity to the failed nodes by hidden terminal problems.

Attrition and Heat Transfer Characteristics of Fluidized Bed Materials for a Solar Hybrid Process (태양열 하이브리드 공정을 위한 유동층 입자들의 마모 및 열전달 특성 연구)

  • Kim, Hyung Woo;Lee, Doyeon;Nam, Hyungseok;Hong, Young Wan;Seo, Su Been;Go, Eun Sol;Kang, Seo Yeong;Lee, See Hoon
    • Clean Technology
    • /
    • v.26 no.1
    • /
    • pp.65-71
    • /
    • 2020
  • Various solar hybrid energy conversion processes, which have both the advantages of renewable energy sources and fossil energy sources, have been developed in the world because stable and predictable energy supplies, such as electricity and natural gas, are necessary for modern societies. In particular, a solar hybrid energy conversion process based on a dual fluidized bed process concept has been expected as the promising solution for sustainable energy supply via thermochemical conversions, such as pyrolysis, combustion, gasification, and so on, because solar thermal energy could be captured and stored in fluidized bed materials. Therefore, the attrition and heat transfer characteristics of silicon carbide and alumina particles used for fluidized bed materials for the solar hybrid energy conversion process were studied in an ASTM D5757 reactor and a bubbling fluidized bed reactor with 0.14m diameter and 2m height. These characteristics of novel fluidized bed materials were compared with those of sand particles which have widely been used as a fluidized bed material in various commercial fluidized bed reactors. The attrition resistances of silicon carbide and alumina particles were higher than those of sand particles while the average values of heat transfer coefficient in the bubbling fluidized bed reactor were in the range of 125 ~ 152 W m-2K-1.

One-dimensional Analytical Solutions for Diffusion from a Low-permeability Layer (1차원 해석해를 이용한 저투수성 매체에서의 확산에 관한 연구)

  • Jang, Seonggan;Yang, Minjune
    • Economic and Environmental Geology
    • /
    • v.53 no.1
    • /
    • pp.11-21
    • /
    • 2020
  • One-dimensional analytical solutions were used for forward and back diffusion of trichloroethylene (TCE) and tetrachloroethylene (PCE) in a single system with high- and low-permeability layers. Concentration profiles in a low-permeability layer, diffusive fluxes at the interface between the high- and low-permeability layers, and contaminant persistence in the high-permeability layer due to back diffusion were simulated with a comparison of semi-infinite and finite analytical solutions. In order to validate the analytical solutions used in this study, the results of one-dimensional analytical solutions developed by Yang et al. (2015) were compared with Nash-Sutcliffe model efficiency coefficient (NSE). When compared with Yang et al. (2015), the analytical solutions used in this study showed good agreements (NSE = 0.99). When compared with semi-infinite analytical solutions, TCE and PCE concentration profiles in the low-permeability layer, the diffusive fluxes, and the contaminant tailings of the high-permeability layer were underestimated. In order to determine the appropriate analytical solutions based on the effective diffusion coefficient, the thickness of the low-permeability layer, and the diffusion time in the TCE and PCE contaminated site, a term of dimensionless diffusion length (Zd) was used. If the Zd is less than 0.7, the semi-infinite solutions can be used to simulate accurate concentration profiles in low-permeability layers. If the Zd is greater than 0.7, the reliability of simulations may be improved by using the finite solutions.

Measurement of Tensile Properties for Thin Aluminium Film by Using White Light Interferometer (백색광간섭계를 이용한 알루미늄 박막의 인장 물성 측정)

  • Kim, Sang-Kyo;Oh, Chung-Seog;Lee, Hak-Joo
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.30 no.5
    • /
    • pp.471-478
    • /
    • 2010
  • Thin films play an important role in many technological applications including microelectronic devices, magnetic storage media, MEMS and surface coatings. It is well known that a thin film's material properties can be very different from the corresponding bulk properties and thus there has been a strong need for the development of a reliable test method to measure the mechanical properties of a thin film. We have developed an alternative and convenient test method to overcome the limitations of previous membrane deflection experiment and uniaxial tensile test by adopting a white light interferometer having sub-nanometer out-of-plane displacement resolution. The freestanding aluminium specimens are tested to verity the effectiveness of the test method developed and get the tensile properties. The specimens are 0.5 rum wide, $1{\mu}m$ thick and fabricated through MEMS processes including sputtering. 1 to 5 specimens are fabricated on Si dies. The membrane deflection experiments are carried out by using a homemade tester consisted of a motor-driven loading tip, a load cell, and 6 DOF alignment stages. The test system is compact enough to set it up beneath a commercial white light interferometric microscope. The white light fringes are utilized to align a specimen with the tester. The Young's modulus and yield point stress of the aluminium film are 62 GPa and 247 MPa, respectively.

Job Analysis for IT Security Workers in Defense Industry through DACUM Process (DACUM 기법을 이용한 방위산업체 정보통신보안실무자 직무분석)

  • Woo, Kwang Jea;Song, Hae-Deok
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.73-84
    • /
    • 2014
  • As the society turns into more of an information an technology centric society, the importance of information security is being increased these days. Recently, as the number of leaking accidents of personal information and valuable industrial technology is on the rise, every field of industry endeavors to come up with a security solution. In particular, since defense industry is a field where it establishes national defense power that is essential of national security, it requires higher standards of security solutions than any other ordinary fields of industry. According to Defense Industry Security Work Instructions, defense industry firms from security organizations and employ a security worker corresponding to the firm's scale and conditions. In an environment where essential information and technology are stored and managed in information and communication system or storing media, the duty and role of IT security workers are crucial. However, there is a shortage of systematic analysis on the work of IT security workers and development of curriculum to enhance their professionalism. Thus DACUM process, a job analysis technique, was used to identify IT Security workers' duties and responsibilities and verify the validity and credibility of the deducted results from the survey. The findings of this study will help in development of IT security duty in defense industry and can be used as baseline data for the development of curriculum and amendments of related regulations.

Analysis of the relationship between e-brand personalities and visual attributes (웹페이지 디자인의 이브랜드 개성 구축을 위한 시각조형특성 분석)

  • Park Su-E
    • Archives of design research
    • /
    • v.19 no.4 s.66
    • /
    • pp.187-204
    • /
    • 2006
  • The brand personality of online products and services is know as its e-brand personality. Although, in the competitive conditions of online markets, e-brand personality is agreed to be an important factor, few studies have suggested how to establish e-brand personality through the visual design of web sites. This study identifies and verifies causal relationships between the visual attributes of web pages and e-brand personalities. The first identifies four major dimensions of e-brand personality on diverse web sites. The second uses 52 experimental home pages to identify key visual attributes associated with those four personality dimensions. The third is a confirmatory study with 16 experimental web sites that verifies causal relationships between visual attributes and e-brand personalities. The results show that two visual attributes, 'simplicity' and 'cohesion,' help to establish a 'bold' personality. Three attributes, 'contrast,' 'density,' and 'regularity,' affect whether a site has an 'analytical' personality. 'Contrast,' 'cohesion,' 'density,' and 'regularity' all influence whether a web site is perceived to have a 'friendly' personality. 'Regularity' and 'balance' were expected to affect the 'sophisticated' personality dimension, but no such impact was observed. The paper concludes with a discussion of implications, limitations, and future research directions.

  • PDF

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

Performance Evaluation of MAC Protocols Considering Various Input Traffic in WDM Metro Ring Networks (WDM 메트로 링 망에서 다양한 입력 트래픽을 고려한 MAC 프로토콜의 성능분석)

  • Lee, Kyu-Jeong;So, Won-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.24-29
    • /
    • 2006
  • 본 논문에서는 광대역 통신 방송 융합 서비스 제공을 고려한 WDM 메트로 링 망을 위한 매체 접근 제어(Medium Access Control; MAC) 프로토콜의 성능을 분석한다. 현재 인터넷은 통신 방송 융합 망으로 진화하고 있으며 다양한 트래픽 특성을 갖는 서비스가 액세스 망에서 메트로 망으로 유입되고 있다. 그러나 기존 메트로 망의 MAC 프로토콜은 이러한 망 환경 변화를 고려하지 않고 단순하고 동일한 트래픽만을 고려하여 성능을 분석하였다. 따라서 본 논문에서는 메트로 링에 연결된 액세스 노드의 입력 트래픽을 Self-Similar와 Poisson 트래픽으로 분류하여 기존 MAC 프로토콜의 성능을 분석하고 평가한다. 메트로 링 망에 연결된 액세스 노드는 이 두 종류의 트래픽 중에서 하나를 망에 유입하며 채널을 공유하는 노드 수에 따라서 다양한 트래픽 환경이 고려된다. WDM 메트로 링망의 기본 MAC 프로토콜은 CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance)이며, 패킷을 빈 슬롯에 전송하고 송신지에서 패킷을 제거하는 SS (Source-Stripping) 기반으로 운용된다. 본 논문에서는 SS 방식으로 생성된 빈 슬롯을 바로 패킷 전송에 이용하는 방식과 그렇지 않은 방식을 각각 1-Persistent와 non-Persistent로 분류하고 MAC 프로토콜을 분석하여 기존 방식의 장 단점을 비교한다. 또한 전송 공정성과 처리율을 같이 고려하여 적용할 수 있는 확률 기반 p-Persistent MAC 프로토콜도 분석하였으며 시뮬레이션을 통하여 각 프로토콜을 노드 처리율, 전송 지연, 패킷 손실률, 전송 공정성 관점에서 비교하고 평가한다.y 수행을 여러 서버로 분산처리하게 함으로써 성능에 대한 신뢰성을 향상 시킬 수 있는 Load Balancing System을 제안한다.할 때 가장 효과적인 라우팅 프로토콜이라고 할 수 있다.iRNA 상의 의존관계를 분석할 수 있었다.수안보 등 지역에서 나타난다 이러한 이상대 주변에는 대개 온천이 발달되어 있었거나 새로 개발되어 있는 곳이다. 온천에 이용하고 있는 시추공의 자료는 배제하였으나 온천이응으로 직접적으로 영향을 받지 않은 시추공의 자료는 사용하였다 이러한 온천 주변 지역이라 하더라도 실제는 온천의 pumping 으로 인한 대류현상으로 주변 일대의 온도를 올려놓았기 때문에 비교적 높은 지열류량 값을 보인다. 한편 한반도 남동부 일대는 이번 추가된 자료에 의해 새로운 지열류량 분포 변화가 나타났다 강원 북부 오색온천지역 부근에서 높은 지열류량 분포를 보이며 또한 우리나라 대단층 중의 하나인 양산단층과 같은 방향으로 발달한 밀양단층, 모량단층, 동래단층 등 주변부로 NNE-SSW 방향의 지열류량 이상대가 발달한다. 이것으로 볼 때 지열류량은 지질구조와 무관하지 않음을 파악할 수 있다. 특히 이러한 단층대 주변은 지열수의 순환이 깊은 심도까지 가능하므로 이러한 대류현상으로 지표부근까지 높은 지온 전달이 되어 나타나는 것으로 판단된다.의 안정된 방사성표지효율을 보였다. $^{99m}Tc$-transferrin을 이용한 감염영상을 성공적으로 얻을 수 있었으며, $^{67}Ga$-citrate 영상과 비교하여 더 빠른 시간 안에 우수한 영상을 얻을 수 있었다. 그러므로 $^{99m}Tc$-transierrin이 감염 병소의 영상진단에 사용될 수 있을 것으로 기대된

  • PDF

Improvement of Traffic Information Contents of Portal Site focused on User's Satisfaction (이용자 만족도 중심의 인터넷포탈 교통정보 콘텐츠 개선방안)

  • Park, Bum-Jin;Eo, Hyo-Kyoung
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.9
    • /
    • pp.500-511
    • /
    • 2012
  • Recently, use frequency for traffic information which provides shortest paths and traffic condition is increasing. Specially, in the survey, it is shown that users prefer internet portal sites which can be used the most easily among traffic information media. But, there are not many verification systems for traffic information contents of internet portal sites which collect and provide information than traffic information contents which are provided by public service. The purpose of this study is to investigate real accuracy and accuracy felt by users about information provided by portal sites. Therefore, in this research we verified accuracy of information by portal site with real field data and investigate real usage about contents and experienced accuracy by users through survey. Also, users' expectation and satisfaction were surveyed and the contents to be improved were selected by using IPA technique. By the result of accuracy verification by field data using portable DSRC(Dedicated Short Range Communication) devices, it is shown that average error was 14~32% and sometimes very high rate. Also, it is shown that 28.3 % of total respondents prefers the information by portal sites and 50 % of total respondents felt that contents of traffic information by portal sites are not accurate. Real-time traffic condition was selected as the most inaccurate one among all contents of traffic information and it was analyzed that intensive efforts for improving information about real-time traffic condition are needed.

Voting Behavior for the 19th President Elections and Audience Analysis for Political Campaigns & Political Advertising: Focused on In-depth Interview (제 19대 대통령 선거의 유권자 투표행태와 정치캠페인 및 정치광고에 대한 수용자 분석: 심층인터뷰를 중심으로)

  • Cha, Young-Ran
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.385-398
    • /
    • 2018
  • This study aims to explore implications by analyzing voters' behaviors and attitudes of political campaigns & political advertising audience in the 19th presidential election. For this purpose, in-depth interviews with 59 voters who voted in the last election were conducted, and interviewees were allocated by their gender and age. As a result, the motivation to ballot for a candidate was based on the candidates' political affiliations to a party, political inclinations, and election pledges. Voters also determined whom they would vote for after watching the final TV debate. The biggest issue of this election was to create jobs in the public sector, an economical issue. TV was the most trusted medium among the voters, and TV debates had the greatest influence in changing the minds of the voters. Voters thought that Shim, Sang Jung was the best on TV debates and that An, Chul Soo was the worst. Also, voters recalled An, Chul Soo the most among all election posters, but they recalled Moon, Jae In the most out of other political advertisement methods. Therefore, the results elucidated the voters' behaviors and the audience's attitudes in political advertising, and this study provided theoretical and practical implications to be utilized in future presidential election campaigns and political advertising endeavors.