• Title/Summary/Keyword: 수학 게이트웨이

Search Result 9, Processing Time 0.021 seconds

Algorithm and Rules for the Optimal Positiion of Two Gateways in Grid Topology Networks (격자구조망에서 두 개의 게이트웨어 최적 위치 설정을 위한 알고리즘 및 원리)

  • Go, Jong-Ha;Yang, Yeong-Nim;Sin, Ho-Gan;Lee, Jeong-Gyu
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.2
    • /
    • pp.223-231
    • /
    • 1999
  • 본 논문은 두 개의게이트웨이를 사용한 격자구저망에서 최적의 게이트웨이 위치 설정을 위한 알고리즘을 제안하고 원리를 유도하였다. 최적의 게이트웨이 위치란 격자구조망내 각 노드에서 게이트웨이까지의 평균 최소 링크 수를 가지는 위치로 정의한다. 두 개의 게이트웨이르 사용함으로써 망내의 신뢰도 향상 효과를 가져오며, 우회 경로로 인한 호차단 확률(call blocking probability)과 호설정시간(call setup time)을 최소화한다. 따라서 본 논문에서는 망의 성능을 향상시키기 위하여 두 개의 게이트웨이의 최적의 위치를 결정하는 Grid-Traverse 알고리즘을 제안하고 설정원리들을 유도하여 , 수학적 귀납법으로 이 원리들을 증명하였다.

Math Science Digital Library (수리과학 디지털 도서관 : Math Science Digital Library)

  • Lee, Sang-Gu
    • Communications of Mathematical Education
    • /
    • v.20 no.4 s.28
    • /
    • pp.537-549
    • /
    • 2006
  • MAA Digital library Workshop, October 6-8, 2006 was held at the newly completed Carriage House Conference Center at MAA Headquarters. This workshop is designed to inform participants about the Mathematical Sciences Digital Library (MathDL), the new MAA Math Gateway project, and the National Science Digital Library (NSDL) and to enable participants to conduct short sessions publicizing these online resources at MAA Section Meetings. The workshop was conducted by Lang Moore, David Smith, and Eileen McIlvain. Major support is being provided by the National Science Foundation through the National Science Digital Library Program. We introduce what was in there and how we properly use and publicize them and add what we could do.

  • PDF

VPN Traversal Scheme in Hierarchical MIPv4 environment (계층적 이동 IPv4 환경에서 VPN 운영 방안)

  • Sung, Su-Lyun;Kang, Jung-Ho;Shin, Young-Tae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.519-526
    • /
    • 2004
  • This paper presents an efficient interoperation scheme of a VPN(Virtual Private Network) and Mobile IP using a hierarchical structure of a FA(Foreign Agent). In the proposed scheme, the GFA(Gateway Foreign Agent) plays a role of VPN gateway on behalf of the MN(Mobile Node). When the MN moves in the same GFA domain, because the GFA has already an IPsec security association with a VPN gateway in the home network of the MN, the MN does not need an IPsec re-negotiaion. In this way, our mechanism reduces a message overhead and a delay resulted from an IPsec negotiation. And a MN can send a data to a correspondent node without a packet leakage. We show a performance of our scheme by using a discrete analytical model. Analytical results demonstrated that the total processing cost calculated by a registration update cost and a packet delivery cost is significantly reduced through our proposed scheme.

LC-GM2: Low-Cost Global Mobility Management Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 저비용의 글로벌 이동성관리 기법)

  • Kim, Jongyoun;Park, Jongsun;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.3
    • /
    • pp.193-204
    • /
    • 2012
  • This paper specifies a low-cost global mobility management architecture and protocol procedure called LC-$GM^2$, which is based on Proxy Mobile IPv6. In LC-$GM^2$, mobility management is performed by the network entity. The benefit is the elimination of the wireless link data delivery tunnel overhead between a mobile node and the access router. To compare with the well-known Hierarchical Mobile IPv6 mobility management protocol and GPMIP, the location update, packet delivery, and total cost functions generated by a mobile node during its average domain residence time are formulated for each protocol based on Fluid-flow mobility model. Then, the impacts of various system parameters on the cost functions are analyzed. The analytical results indicate that the proposed global mobility management protocol can guarantee lower total costs.

Fast Mobility Management Using Multi-casting Tunneling in Vehicular Networks (차량 네트워크에서 멀티 캐스팅 터널링을 이용한 고속 이동성 관리 방법)

  • Chun, Seung-Man;Nah, Jae-Wook;Park, Jong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11C
    • /
    • pp.877-884
    • /
    • 2010
  • This paper presents a fast IP mobility management scheme in vehicular networks where multiple wireless network interfaces are used to perform the fast handover without packet loss and handover latency. In order to do that, the IETF standard HMIPv6 has been extended, where multiple simultaneous tunnels between the HMIPv6 MAP and the mobile gateway are dynamically constructed. The architecture for supporting multiple tunnels has been designed and both mathematical analysis and simulation using NS-2 have been done for performance evaluation.

A Study of Monitoring and Operation for PEM Water Electrolysis and PEM Fuel Cell Through the Convergence of IoT in Smart Energy Campus Microgrid (스마트에너지캠퍼스 마이크로그리드에서 사물인터넷 융합 PEM 전기분해와 PEM 연료전지 모니터링 및 운영 연구)

  • Chang, Hui Il;Thapa, Prakash
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.13-21
    • /
    • 2016
  • In this paper we are trying to explain the effect of temperature on polymer membrane exchange water electrolysis (PEMWE) and polymer membrane exchange fuel cell (PEMFC) simultaneously. A comprehensive studying approach is proposed and applied to a 50Watt PEM fuel cell system in the laboratory. The monitoring process is carried out through wireless LoRa node and gateway network concept. In this experiment, temperature sensor measure the temperature level of electrolyzer, fuel cell stack and $H_2$ storage tank and transmitted the measured value of data to the management control unit (MCU) through the individual node and gateway of each PEMWE and PEMFC. In MCU we can monitor the temperature and its effect on the performance of the fuel cell system and control it to keep the lower heating value to increase the efficiency of the fuel cell system. And we also proposed a mathematical model and operation algorithm for PEMWE and PEMFC. In this model, PEMWE gives higher efficiency at lower heating level where as PEMFC gives higher efficiency at higher heating value. In order to increase the performance of the fuel cell system, we are going to monitor, communicate and control the temperature and pressure of PEMWE and PEMFC by installing these systems in a building of university which is located in the southern part of Korea.

Designing a Path Management Method in Large-scale Multiple Sensor Networks (대규모 다중 센서 네트워크에서 효과적인 경로 관리 기법)

  • Lim, Yu-Jin;Park, Jae-Sung;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.205-212
    • /
    • 2008
  • In the environment with multiple heterogeneous wireless sensor networks with a single point of sensed data collection or a gateway (GW), relay points (RPs) may be required for the energy efficient delivery of sensed data from static or mobile sinks to the GW. The optimal placement of RPs becomes an even more difficult problem if static sinks are dynamically added or the trajectory of mobile sinks can not be known in advance. In order to resolve this problem, we propose a mechanism to deploy RPs in a grid pattern and to use the tree-based relaying network for reducing the cost of the RP and for reducing the control overhead incurred by the route setup from sinks to the GW. For the performance evaluation of our proposed mechanism, we have carried out a numerical analysis on a single route setup from a sink to the GW and, for more general performance evaluations, ns-2 based simulations have been carried out. According to the performance evaluation results, our tree-based relaying network mechanism outperforms that based on AODV in terms of the data delivery time, the network service time and the control overhead.

A Study on the Effect of Teachers' Recognition and Application of 2015 Revised National Curriculum on Their Educational Information Needs: Focusing on High School Common Subjects (교과 교사의 2015 개정 교육과정 적용과 인식이 교육정보요구에 미치는 영향: 고등학교 공통 과목을 중심으로)

  • Gye, Minjeong;Kim, Giyeong
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.1
    • /
    • pp.169-190
    • /
    • 2019
  • This study aims to identify the effects of teachers' recognition and application of 2015 revised national curriculum on their educational information needs in high schools. Several in-depth interviews and a questionnaire survey with the teachers, who were in charge of teaching common courses, such as Korean language, mathematics, English, social studies, and science, in general public high schools in Incheon, were executed for the purpose. As a result, the teachers' recognition and application affected their educational information needs in part. Especially, new demands on small sized copies and learning information sources were identified which were related to the application of 2015 revised national curriculum. Based on the results, we proposed several improvements of school library operations, such as small sized local consortium for sharing resources and providing referral services, in order to strengthen the gateway role of school libraries.

Medical Image Encryption based on C-MLCA and 1D CAT (C-MLCA와 1차원 CAT를 이용한 의료 영상 암호화)

  • Jeong, Hyun-Soo;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.439-446
    • /
    • 2019
  • In this paper, we propose a encryption method using C-MLCA and 1D CAT to secure medical image for efficiently. First, we generate a state transition matrix using a Wolfram rule and create a sequence of maximum length. By operating the complemented vector, it converts an existing sequence to a more complex sequence. Then, we multiply the two sequences by rows and columns to generate C-MLCA basis images of the original image size and go through a XOR operation. Finally, we will get the encrypted image to operate the 1D CAT basis function created by setting the gateway values and the image which is calculated by transform coefficients. By comparing the encrypted image with the original image, we evaluate to analyze the histogram and PSNR. Also, by analyzing NPCR and key space, we confirmed that the proposed encryption method has a high level of stability and security.