• Title/Summary/Keyword: 상황 전파 네트워크

Search Result 56, Processing Time 0.027 seconds

Performance Comparison of Brain Wave Transmission Network Protocol using Multi-Robot Communication Network of Medical Center (의료센터의 다중로봇통신망을 이용한 뇌파전송망 프로토콜의 성능비교)

  • Jo, Jun-Mo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.1
    • /
    • pp.40-47
    • /
    • 2013
  • To verify the condition of patients moving in the medical center like hospital needs to be consider the various wireless communication network protocols and network components. Wireless communication protocols such as the 802.11a, 802.11g, and direct sequence has their specific characteristics, and the various components such as the number of mobile nodes or the distance of transmission range could affects the performance of the network. Especially, the network topologies are considered the characteristic of the brain wave(EEG) since the condition of patient is detected from it. Therefore, in this paper, various wireless communication networks are designed and simulated with Opnet simulator, then evaluated the performance to verify the wireless network that transmits the patient's EEG data efficiently. Overall, the 802.11g had the best performance for the wireless network environment that transmits the EEG data. However, there were minor difference on the performance result depends on the components of the topologies.

Efficient IoT data processing techniques based on deep learning for Edge Network Environments (에지 네트워크 환경을 위한 딥 러닝 기반의 효율적인 IoT 데이터 처리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.325-331
    • /
    • 2022
  • As IoT devices are used in various ways in an edge network environment, multiple studies are being conducted that utilizes the information collected from IoT devices in various applications. However, it is not easy to apply accurate IoT data immediately as IoT data collected according to network environment (interference, interference, etc.) are frequently missed or error occurs. In order to minimize mistakes in IoT data collected in an edge network environment, this paper proposes a management technique that ensures the reliability of IoT data by randomly generating signature values of IoT data and allocating only Security Information (SI) values to IoT data in bit form. The proposed technique binds IoT data into a blockchain by applying multiple hash chains to asymmetrically link and process data collected from IoT devices. In this case, the blockchainized IoT data uses a probability function to which a weight is applied according to a correlation index based on deep learning. In addition, the proposed technique can expand and operate grouped IoT data into an n-layer structure to lower the integrity and processing cost of IoT data.

영상정보용 공용데이터링크 표준화 발전방향

  • Jeong, Jong-Mun;Park, Gyu-Cheol;Won, Tae-Yeon;O, Ui-Hwan;Go, Dong-Cheol;Hong, Seok-Jun;Yun, Chang-Bae;Kim, Ho;Park, Ui-Yeong
    • Information and Communications Magazine
    • /
    • v.28 no.4
    • /
    • pp.41-50
    • /
    • 2011
  • 미래 전에서는 정보의 중요성이 더욱 부각되고 있으며 정보의 수집 및 전파, 정확한 지휘결심 및 전파, 기동타격체계의 통제 등으로 이어지는 지휘통제의 전 과정을 유기적으로 연결하여, 그 성능을 극대화시키는 것이 네트워크 중심전(NCW: Net-Centric Warfare)의 개념이다. NCW 실현을 위해 개발중인 여러 체계 중 주목 받고 있는 것이 무인기(UAV: Unmanned Aerial Vehicle) 이다. 무인기는 감시정찰, 고정밀 타격, 그리고 전투피해평가 기능 등을 수행하며, 전술적인 상황인식이 가능하게 한다. 무인기가 이러한 임무를 수행하기 위해서는 비행체의 상태정보, 비행체의 조종통제정보, 그리고 임무 탑재체가 획득한 정보의 간단없고 정확한 전달이 요구된다. 이러한 정보를 전송하기 위한 비행체와 지상체간의 제반 통신을 데이터 링크(Data Link)라 하며, NCW 구현에 있어서 가장 핵심이 되는 요소이다. 세계 각국은 영상정보 수집자산으로서 무인기와 데이터링크의 개발에 박차를 가하고 있는 실정이며, 우리 군도 전력화가 계획된 각 제대별 무인기의 통합운용을 위한 영상정보 공용데이터 링크 (MPI-CDL: Multi-Platform Image and Intelligence Commom Data Link)를 개발중에 있으며 지속적인 영상정보 수집자산의 소요증가에 따른 주파수 획득문제와 사업별 독자적인 데이터 링크의 개발을 지양하고 기존체계와의 상호운용 및 단절없는 통신을 보장을 위해 개발과 동시에 국가적 차원에서의 기술구조 표준화가 추진되어야 한다. 이러한 시점에서 본고에서는 먼저 선진국의 (CDL : Commom Data Link) 표준화 동향을 알아보고, 상호운용성과 연동을 위한 한국형 MPI-CDL 기술 표준화방향을 제시하고자 한다.

A Scalable Distributed Worm Detection and Prevention Model using Lightweight Agent (경량화 에이전트를 이용한 확장성 있는 분산 웜 탐지 및 방지 모델)

  • Park, Yeon-Hee;Kim, Jong-Uk;Lee, Seong-Uck;Kim, Chol-Min;Tariq, Usman;Hong, Man-Pyo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.5
    • /
    • pp.517-521
    • /
    • 2008
  • A worm is a malware that propagates quickly from host to host without any human intervention. Need of early worm detection has changed research paradigm from signature based worm detection to the behavioral based detection. To increase effectiveness of proposed solution, in this paper we present mechanism of detection and prevention of worm in distributed fashion. Furthermore, to minimize the worm destruction; upon worm detection we propagate the possible attack aleγt to neighboring nodes in secure and organized manner. Considering worm behavior, our proposed mechanism detects worm cycles and infection chains to detect the sudden change in network performance. And our model neither needs to maintain a huge database of signatures nor needs to have too much computing power, that is why it is very light and simple. So, our proposed scheme is suitable for the ubiquitous environment. Simulation results illustrate better detection and prevention which leads to the reduction of infection rate.

Aircraft Position Prediction and Shadow Zone Penetration Control Using Bezier Curve (베지에 곡선을 이용한 항공기 위치 예측 및 음영 지역 진입 제어 방법)

  • Jeong, Jae-Soon;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1011-1022
    • /
    • 2014
  • Currently, the wireless network environment of air node is constructed mainly of ground relay station. However, as the Korean Peninsula is composed of 70% mountainous region, there are multiple shadow zones. This is calling for effective measures to prevent aircraft from losing communication link during low-mid altitude missions. In this article we propose the utilization of Bezier Curve for estimation of aircraft flight path and control method for entering shadow zone. This method successfully estimated aircraft track, and analyzed the existence, disseminated the warning, and took measures to avoid the shadow zone before entering. This article, suggested after simulated experiments, proves that the method enables seamless communication during air operations.

Improvement of SWoT-Based Real Time Monitoring System (SWoT 기반 실시간 모니터링 시스템 개선)

  • Yu, Myung-han;Kim, Sangkyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.7
    • /
    • pp.227-234
    • /
    • 2015
  • USN-based real-time monitoring systems, which receive raw data from sensor nodes and store the processed information in traditional servers, recently get to be replaced by IoT(Internet of Things)/WoT(Web of Things)-based ones. Especially, Social Web of Things(SWoT) paradigm can make use of cloud storage over Social Network Service(SNS) and enable the possibility of integrated access, management and sharing. This paper proposes an improved SWoT-based real-time monitoring system which makes up for weak points of existing systems, and implements monitoring service integrating a legacy sensor network and commercial SNS without requiring additional servers. Especially, the proposed system can reduce emergency propagation time by employing PUSH messages.

스마트 사회의 보안위협과 정보보호 정책추진에 관한 제언

  • Lee, Gi-Ju
    • Information and Communications Magazine
    • /
    • v.30 no.1
    • /
    • pp.24-32
    • /
    • 2012
  • 우리는 지금 스마트 사회에 살아가고 있다. 언제 어디서든 스마트 디바이스를 통해 기존에 PC에서 하던 작업들을 손쉽게 하고 있다. 한편 스마트폰의 확산으로 이용자 수가 급증하고 있는 소셜네트워크 서비스(SNS)는 이용자들이 자신의 일상적인 이야기를 사이버공간에 게시함으로 인해 개인의 사생활 정보들이 노출되고, 그러한 정보들이 범죄에 악용되는 사례들이 눈에 띄게 증가하고 있다. 또한 SNS를 이용한 악성코드의 유포 및 빠른 전파 등도 새로운 보안위협으로 나타나고 있다. 그 밖에 스마트 기기를 대상으로 한 해킹 및 악성코드 감염 등 위협이 증가하고 있는 형편이다. 본고에서는 스마트 사회의 주요 보안위협을 살펴보고 미국, 유럽, 일본, 호주 등 선진국의 관련 정책 동향과 국내 정책과 실태를 분석하여 새로운 정보보호 정책 수립 방향을 제언하고자 한다. 스마트 사회 위험 요소로 가장 보편적으로 사용되고 있는 스마트폰과 스마트폰을 통해 이용되고 있는 소셜네트워크 서비스, 클라우드 서비스의 보안위협을 제기하고 최근 글로벌 이슈로 떠오르고 있는 빅 데이터 환경의 보안위협을 분석하였다. 스마트 사회의 위협을 대비하고 있는 주요국 정책을 살펴보면, 미국의 경우 사회적 합의를 바탕으로한 감시와 통제를 강화하는 정책을 추진 중에 있으며 유럽의 5개국 EU5(영국, 독일, 프랑스, 스페인, 이탈리아)는 스마트폰 위협을 중심으로 공동 대응 방안을 마련하고 있다. 일본은 스마트 워크중심의 보안대책을 강구하고 있으며 호주는 스마트 사회 보안위협에 대한 국민의 인식제고에 주력하고 있다. 국내의 경우도 스마트 사회의 보안위협에 선제적 대응을 위하여 "스마트 모바일 시큐리티 종합계획"을 수립하여 추진중에 있다. 하지만 보안 실태를 보면 스마트 사회 보안위협에 대한 이용자들의 우려는 높은 반면 기업의 보안 대책 마련에 대한 투자는 여전히 미흡한 상황이다. 향후 우리 사회가 디바이스간 융합을 넘어 모든 사물이 연결되는 초(超)연결(Hyper-Connectivity) 시대로 진화되어 가면 편리성이 증대되는 만큼 더 많은 위협에 우리의 일상이 노출되는 문제가 발생하게 될 것이다. 안전한 미래 사회로 진입하기 위해서는 보다 체계적이고 종합적인 정보보호 정책마련이 필요하다. 본고에서는 이를 위한 정책수립의 방향을 제언했다.

Real-Time Construction Resource Monitoring using RFID/USN Inter-working System (RFID/USN 연동 시스템을 활용한 건설자원 실시간 모니터링 시스템)

  • Ryu, Jeoung-Pil;Kim, Hyoung-Kwan;Kim, Chang-Yoon;Kim, Chang-Wan;Han, Seung-Heon;Kim, Moon-Kyum
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.90-94
    • /
    • 2007
  • Location tracking automation of resources in construction industry is one of the most important procedures to improve construction project performance and reduce the period of construction. Recently, location tracking technologies have proven to be effective in tracking construction materials and equipment in real time through the instrumentality of RFID (Radio Frequency Identification). By using wireless communication and inter-working system between RFID and USN, it is possible that construction engineers receive the location information of construction resources without additional efforts that move the RFID reader to read tags periodically. In the inter-working system, RFID reader delivers the acquired materials information to sensor node which is connected by serial interface. Then sensor node transmits the received data to the data aggregation terminal that is a sink node. The data aggregation terminal can transmit collected data to construction manager who is out of construction site using infrastructure such as CDMA(Code Division Multiple Access) network. The combination model of the two system and field test scenarios are presented in this paper.

  • PDF

Application for Measurement of Curing Temperature of Concrete in a Construction Site using a Wireless Sensor Network (무선센서네트워크에 의한 콘크리트 양생온도 계측에 관한 현장 적용성 연구)

  • Lee, Sung-Bok;Bae, Kee-Sun;Lee, Do-Heon
    • Journal of the Korea Institute of Building Construction
    • /
    • v.11 no.3
    • /
    • pp.283-291
    • /
    • 2011
  • As the construction industry has recently been transformed by the emergence of ubiquitous and intelligent technology, there have been major changes in the management methods employed. Specifically, next-generation construction management systems have been developed that collect and analyze many pieces of information in real time by using various wireless sensors and networks. The purpose of this study is to understand the current status of Ubiquitous Sensor Networks (USN) in the construction sector, and to gain fundamental data for a system of measuring concrete curing temperature in a construction site that employs a USN. By investigating the application status of USN, it was confirmed that USN has mainly been applied to the maintenance of facilities, safety management, and quality control. In addition, a field experiment in which the curing temperature of concrete was measured using a USN was carried out to evaluate two systems with wireless sensor networks, and the applicability of these systems on site was confirmed. However, it is estimated that the embedded wireless sensor type is affected by metal equipment on site, internal battery of sensor and concrete depth, and studies to provide more stable system by USN are thus required.

Hub Facilities in Vehicle Movement Network between Livestock Facilities (사회연결망 분석을 통한 축산시설 차량이동 네크워크의 허브시설 도출)

  • Lee, Gyoung-Ju;Park, Son-Il;Lee, Kwang-Nyeong;Kim, Han-Yee;Park, Jin-Ho;Hong, Sungjo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.137-146
    • /
    • 2018
  • The purpose of this study was to derive and analyze the hub facilities that occupy major positions in the vehicle movement networks of livestock facilities. For this purpose, this study used the KAHIS data provided by Animal and Plant Quarantine Agency. The hub facilities were derived from the degree centrality & betweenness centrality. The analysis results are summarized as follows. First, in a livestock facility's vehicle movement network, there are a small number of hub facilities with very high centrality indicator values compared to other facilities. Second, the hub facilities based on the degree centrality are the feed factory, the milk collecting center, slaughterhouse, slaughterhouse for chicken, and livestock markets. Third, the hub facilities based on the betweenness centrality are the livestock markets, the feed factory, and slaughterhouse. Fourth, hub facilities based on the degree centrality are concentrated in a particular area, but the hub facilities based on betweenness centrality are distributed relatively evenly.