• Title/Summary/Keyword: 워크넷

Search Result 124, Processing Time 0.038 seconds

Analysis of Bluethooth Scatternet Formation Algorithm over Mobile Networks (모바일 환경에서 블루투스 스캐터넷 형성 알고리즘 분석)

  • 이대봉;장종욱
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.2
    • /
    • pp.201-207
    • /
    • 2003
  • A multi-hop ad-hoc network can be formed out of Bluetooth capable devices through the use of scatternets. Many topologies can be deployed for scatternet; the most commonly proposed topology in the literature are tree structure and ring structure. We analyze the performance between tree formation algorithm and ring formation algorithm. We then present quantative result that compare the expected traffic performance between Blutooth ring scatternet and Bluetooth tree scatternet. The simulation results showes that Ring structure of scatterent have good performance than Tree structure over mobile environments.

Performance Improvement of PVM by using Shared Memory and User Level Communication (공유 메모리와 사용자 수준 통신을 이용한 PVM 성능 개선)

  • 윤종원;심재홍;문경덕;최경희;김재훈;정기현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.139-141
    • /
    • 1998
  • 현재 PVM은 네트워크를 통해 워크스테이션을 연동시키는데 이용되는 미들 웨어이다. PVM의 로컬 태스크끼리의 메시지 교환 시에는 좋은 성능을 보이지만, 리모트 호스트사이에서의 메시지 교환에서의 성능은 로컬 태스크만큼 좋지 못하다. 이를 개선하기 위해서, PVM에서 한 워크스테이션내의 데몬 태스크와 일반 태스크, 네트워크 카드가 모두 공유하는 공유메모리와 고속 네트워크 카드인 미러넷 카드를 이용해, 다가올 초고속통신망에서 적용되기 위한 새로운 모델을 제시하고, 기존 모델과 비교한다.

  • PDF

A Framework for WordNet-based Word Sense Disambiguation (워드넷 기반의 단어 중의성 해소 프레임워크)

  • Ren, Chulan;Cho, Sehyeong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.4
    • /
    • pp.325-331
    • /
    • 2013
  • This paper a framework and method for resolving word sense disambiguation and present the results. In this work, WordNet is used for two different purposes: one as a dictionary and the other as an ontology, containing the hierarchical structure, representing hypernym-hyponym relations. The advantage of this approach is twofold. First, it provides a very simple method that is easily implemented. Second, we do not suffer from the lack of large corpus data which would have been necessary in a statistical method. In the future this can be extended to incorporate other relations, such as synonyms, meronyms, and antonyms.

Interpretation and Statistical Analysis of Ethereum Node Discovery Protocol (이더리움 노드 탐색 프로토콜 해석 및 통계 분석)

  • Kim, Jungyeon;Ju, Hongteak
    • KNOM Review
    • /
    • v.24 no.2
    • /
    • pp.48-55
    • /
    • 2021
  • Ethereum is an open software platform based on blockchain technology that enables the construction and distribution of distributed applications. Ethereum uses a fully distributed connection method in which all participating nodes participate in the network with equal authority and rights. Ethereum networks use Kademlia-based node discovery protocols to retrieve and store node information. Ethereum is striving to stabilize the entire network topology by implementing node discovery protocols, but systems for monitoring are insufficient. This paper develops a WireShark dissector that can receive packet information in the Ethereum node discovery process and provides network packet measurement results. It can be used as basic data for the research on network performance improvement and vulnerability by analyzing the Ethereum node discovery process.

An Analysis of Packet Collision Probability due to Inter-piconet Interference in the Bluetooth Low Energy Networks (저전력 블루투스 네트워크에서 피코넷 간 간섭으로 인한 패킷충돌 확률 분석)

  • Kim, Myoung Jin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.8
    • /
    • pp.3-11
    • /
    • 2017
  • Research and development are being conducted to apply low-power Bluetooth (BLE) technology to IoT (Internet of Things) applications. The characteristic of this application environment is that many piconets can operate in the same space. Therefore, interference between homogeneous networks is likely to occur. In the BLE data channel, adaptive frequency hopping (AFH) scheme is used among the 37 frequency channels, and the master and the slave communicate while changing the carrier frequency. If there are multiple BLE piconets in the same space, there is a risk of frequency collision and packet errors will occur. In this paper, we analyze the packet collision probability due to cochannel interference in multiple asynchronous BLE piconet environments. Specifically, we analyzed packet collision probability according to the number of concurrently operating BLE piconets with the ratio of connection interval to connection event length as the main parameters. The analysis result can be used to set connection event related parameters for a desired packet collision probability according to the number of users having BLE devices in a given space.

A Study on Efficient Mixnet Techniques for Low Power High Throughput Internet of Things (저전력 고속 사물 인터넷을 위한 효율적인 믹스넷 기술에 대한 연구)

  • Jeon, Ga-Hye;Hwang, Hye-jeong;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.246-248
    • /
    • 2021
  • Recently data has been transformed into a data economy and society that acts as a catalyst for the development of all industries and the creation of new value, and COVID-19 is accelerating digital transformation. In the upcoming intelligent Internet of Things era, the availability of decentralized systems such as blockchain and mixnet is emerging to solve the security problems of centralized systems that makes it difficult to utilize data safely and efficiently. Blockchain manages data in a transparent and decentralized manner and guarantees the reliability and integrity of the data through agreements between participants, but the transparency of the data threatens the privacy of users. On the other hand, mixed net technology for protecting privacy protects privacy in distributed networks, but due to inefficient power consumption efficiency and processing speed issues, low cost, light weight, low power consumption Internet Hard to use. In this paper, we analyze the limitations of conventional mixed-net technology and propose a mixed-net technology method for low power consumption, high speed, and the Internet of things.

  • PDF

Deep Learning based Estimation of Depth to Bearing Layer from In-situ Data (딥러닝 기반 국내 지반의 지지층 깊이 예측)

  • Jang, Young-Eun;Jung, Jaeho;Han, Jin-Tae;Yu, Yonggyun
    • Journal of the Korean Geotechnical Society
    • /
    • v.38 no.3
    • /
    • pp.35-42
    • /
    • 2022
  • The N-value from the Standard Penetration Test (SPT), which is one of the representative in-situ test, is an important index that provides basic geological information and the depth of the bearing layer for the design of geotechnical structures. In the aspect of time and cost-effectiveness, there is a need to carry out a representative sampling test. However, the various variability and uncertainty are existing in the soil layer, so it is difficult to grasp the characteristics of the entire field from the limited test results. Thus the spatial interpolation techniques such as Kriging and IDW (inverse distance weighted) have been used for predicting unknown point from existing data. Recently, in order to increase the accuracy of interpolation results, studies that combine the geotechnics and deep learning method have been conducted. In this study, based on the SPT results of about 22,000 holes of ground survey, a comparative study was conducted to predict the depth of the bearing layer using deep learning methods and IDW. The average error among the prediction results of the bearing layer of each analysis model was 3.01 m for IDW, 3.22 m and 2.46 m for fully connected network and PointNet, respectively. The standard deviation was 3.99 for IDW, 3.95 and 3.54 for fully connected network and PointNet. As a result, the point net deep learing algorithm showed improved results compared to IDW and other deep learning method.

Job-related analysis and visualization using big data distributed processing system (빅데이터를 활용한 직업관련 분석 및 시각화)

  • Choi, Dong-Cheol;Choi, Nakjin;Kim, Min-Seok;Park, Jun-wook;Lee, Jun-Dong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.249-251
    • /
    • 2020
  • 본 논문에서는 코로나바이러스감염증19 사태가 국내 취업시장에 어떠한 영향을 미쳤는지에 대해 알아보기 위하여 빅데이터를 활용한 직업 관련 분석 및 시각화를 수행하였다. 빅데이터를 위한 기본 자료는 통계청 자료와 워크넷 Open API를 활용하였으며, 빅데이터 처리 과정을 거쳐 결과값을 예측을 시도하였다. 2020년도 워크넷 Open API를 통해 고용수와 통계청 자료를 통해 비교 분석 및 시각화를 실시하였고, 08년~20년 취업자수를 통해 시계열 분석 및 예측을 진행해 앞으로의 횡보를 예상해보았다. 분석한 결과 19년, 20년도를 비교 분석했을 때에는 크게 차이가 나지 않았다. 추가적으로 시계열 분석기법을 활용해 보았을 때 매년 고용수는 전체적으로 증가하고 4월에는 감소, 7월에는 증가하는 추세가 나왔다. 코로나바이러스감염증19 사태로 인해 공공기관과 언택트 시대에 따른 화상회의나 재택근무로 인해 운수·통신 취업률은 상승한다는 결과값이 도출되었고, 자영업이나 서비스 직업 등은 다른 직종에 비해 큰 감소를 보여줬으나 국가 경제 활성화에 따른 고용수는 점차 증가할 것이라 예측된다.

  • PDF

A Secure Bluetooth Piconet using Non-Anonymous Group Keys (비익명성 그룹키를 이용한 안전한 블루투스 피코넷)

  • 서대희;이임영
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.222-232
    • /
    • 2003
  • In accordance with the changes in the wireless communication environment, there has been a great need to satisfy the demand for diverse modes of information exchange. Various types of short-distance wireless communication technology have been developed and studied to meet this demand. Among them, Bluetooth which has recently been acclaimed as the standard for short-distance wireless communication, has been the focus of many such studies. However, Bluetooth has weaknesses in its suuity features when its in security services are applied to Home networks. The purpose of this study is to propose a safe Bluetooth scenario with an upgraded suity feature. This paper first reviews the general characteristics and security features of Bluetooth together with an analysis of its weaknesses, and presents the formation and maintenance process of Bluetooth piconet what is created by using ECDSA and group key in the ACL(Asynchronous Connection-less Link) connection through a safe Bluetooth inquiry process.

Automatic Weblog Generation from Mobile Context using Bayesian Network and Petri Net (베이지안 네트워크와 페트리넷을 이용한 모바일 상황정보로부터의 블로그 자동 생성)

  • Lee, Young-Seol;Cho, Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.467-471
    • /
    • 2010
  • Weblog is one of the most spread web services. The content of the weblog includes daily events and emotions. If we collect personal information using mobile devices and create a weblog, user can create their own weblog easily. Some researchers already developed systems that created weblog in mobile environment. In this paper, user's activity is inferred from personal information in mobile device. The inferred activities and story generation engine are used to generate text for creating a weblog. Finally, the text, photographs and user's movement in Google Map are integrated into a weblog.