• Title/Summary/Keyword: 2-mode 네트워크

Search Result 147, Processing Time 0.026 seconds

Design and Implementation of Stream Cipher based on SHACAL-2 Superior in the Confidentiality and Integrity (기밀성과 무결성이 우수한 SHACAL-2 기반 스트림 암호 설계 및 구현)

  • Kim, Gil Ho;Cho, Gyeong Yeon
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.12
    • /
    • pp.1427-1438
    • /
    • 2013
  • We have developed a 128-bit stream cipher algorithm composed of the 5-stage pipeline, capable of real-time processing, confidentiality and integrity. The developed stream cipher is a stream cipher algorithm that makes the final 128-bit ciphers through a whitening process after making the ASR 277 bit and SHACAL-2 and applying them to the CFB mode. We have verified the hardware performance of the proposed stream cipher algorithm with Modelsim 6.5d and Quartus II 12.0, and the result shows that the hardware runs at 33.34Mhz(4.27Gbps) at worst case. According to the result, the new cipher algorithm has fully satisfied the speed requirement of wireless Internet and sensor networks, and DRM environment. Therefore, the proposed algorithm with satisfaction of both confidentiality and integrity provides a very useful ideas.

International industrial logistics complex logistics network design (국제산업물류단지 물류네트워크 설계)

  • Shin, Jae Young;Kim, Woong-Sub
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.06a
    • /
    • pp.221-222
    • /
    • 2014
  • Companies are facing challenges to have high competitiveness because of continuous oil price rising and CO2 emissions regulations. Thus, companies are trying hard to construct effective logistics and operation system to achieve high customer service quality and saving cost. Also the ec-friendly idustrial complex is needed. Busan is in process to construct GILC(Global Industry Logistics City) in west Busan province to achieve high competitiveness and support lack of industrial complex. To construct this kind of logistics industrial complex, it needs logistics system through proper policy and freight transportation co-operation. Especially, efficient management through logistics hierarchy construction in industrial complex is very important for low cost and eco-friendly point of view. Therefore, this paper aims to analyze logistics system and suggest operation model to present logistics complex construction base data.

  • PDF

WIVA : WSN Monitoring Framework based on 3D Visualization and Augmented Reality in Mobile Devices (모바일 기기의 3차원 시각화와 증강현실에 기반한 센서네트워크 모니터링 프레임워크)

  • Koo, Bon-Hyun;Choi, Hyo-Hyun;Shon, Tae-Shik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.106-113
    • /
    • 2009
  • Recently, due to many industrial accidents at construction sites, a variety of researches for structural health monitoring (SHM) of buildings are progressing. For real site application of SHM, one of the advanced technologies has blown as wireless sensor networks (WSN). In this paper, we proposed WIVA(WSN Monitoring framework based on 3D Visualization and Augmented Reality in Mobile Devices) system that applies 3D visualization and AR technology to mobile devices with camera based on WSN in order to expand the extent of information can observe. Moreover, we performed experiments to validate effectiveness in 3D and AR mode that utilize WSN data based on IEEE 802.15.4. In real implementation scenario, we demonstrated a fire occurrence test in 3-story building miniature.

Analytical Model of Isochronous MAC Protocol for MANET (모바일 애드혹 네트워크를 위한 Isochronous MAC 프로토콜의 분석적 모델 연구)

  • Heo, Ung;Choi, Jae-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.2
    • /
    • pp.111-118
    • /
    • 2008
  • In this paper a novel medium access control mechanism is investigated as a means to support real-time services. The primary goal is to provide constant-bit-rate voice call services to pairs of autonomous mobile nodes operating in ad hoc networks. Here, a time-slot reservation based MAC is considered to provide real-time voice calls and a new MAC called the time-slot reservation coordination function(TRCF) is presented. In addition to this isochronous type MAC protocol development, the proposed protocol is modeled using a Markov chain in order to predict its behavior. The performance of TRCF is analytically derived and the performance measures such as average wait time taken for a call connection and throughput are obtained.

Optimal CW Synchronization Scheme in IEEE 802.11 WLANs (IEEE 802.11 WLAN 환경에서 최적의 CW 공유 방안)

  • Lee, Jin-Lee;Lee, Su-Bin;Kyung, Yeunwoong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.15-19
    • /
    • 2020
  • In this paper, we propose a optimal CW(Conention Window) synchronization scheme in IEEE 802.11 WLANs. IEEE 802.11 WLANs support DCF(Distributed Coordination Function) mode for the MAC(Medium Access Control) operation. In DCF, the CW increases exponentially according to the collisions and becomes minimum CW according to the success of data transmissions. However, since the base minimum CW value is hardware or standard specific, the number of active stations and network status are not considered to determine the CW value. Even though the researches on optimal CW have beend conducted, they do not consider the optimal CW synchronization among mobile stations which occur network performance degradation. Therefore, this paper calculates the optimal CW value and shares it with mobile stations in the network.

3D Adjacency Spatial Query using 3D Topological Network Data Model (3차원 네트워크 기반 위상학적 데이터 모델을 이용한 3차원 인접성 공간질의)

  • Lee, Seok-Ho;Park, Se-Ho;Lee, Ji-Yeong
    • Spatial Information Research
    • /
    • v.18 no.5
    • /
    • pp.93-105
    • /
    • 2010
  • Spatial neighborhoods are spaces which are relate to target space. A 3D spatial query which is a function for searching spatial neighborhoods is a significant function in spatial analysis. Various methodologies have been proposed in related these studies, this study suggests an adjacent based methodology. The methodology of this paper implements topological data for represent a adjacency via using network based topological data model, then apply modifiable Dijkstra's algorithm to each topological data. Results of ordering analysis about an adjacent space from a target space were visualized and considered ways to take advantage of. Object of this paper is to implement a 3D spatial query for searching a target space with a adjacent relationship in 3D space. And purposes of this study are to 1)generate adjacency based 3D network data via network based topological data model and to 2)implement a 3D spatial query for searching spatial neighborhoods by applying Dijkstra's algorithms to these data.

Research Trends in Science Gifted Education from 2011 to 2015: Literature Analysis vs Social Network Analysis (2010년부터 2015년까지 국내 과학영재교육의 연구동향 분석 : 문헌분석 대 사회네트워크분석)

  • Yoon, Jin A;Seo, Hae-Ae
    • Journal of Science Education
    • /
    • v.40 no.3
    • /
    • pp.267-286
    • /
    • 2016
  • The study aimed to investigate a research trend in science gifted education of six years from 2010 to 2015 by utilizing literature analysis and Social Network Analysis (SNA) methods. In this study, 275 papers published in eight major academic journals of science education and gifted education were selected as research subjects. First, through the literature analysis, it was found that the most frequent research topics were cognitive characteristics (25.8%), curriculum/programs (22.6%), and social and emotional characteristics (20.2%). For the research method employed in research papers, the survey research (46.5%) was appeared as the most frequently employed method, and followed by experimental (18.8%), program development (10.6%), correlation (10.3%), and qualitative (6.4%) research methods. The most frequent research subject was appeared as middle school students (33.7%) and followed by elementary school (30.6%), and high school (12.7%) students. Second, the SNA method was utilized for producing keyword frequency, degree centrality and network analyses. It was appeared that the most common keywords over six years included 'science gifted', 'gifted education', and 'creativity' and frequent keywords were science gifted, gifted education, gifted, creativity, science inquiry, perception, (creative) problem solving, science high school, scientific attitude, and STEAM. Third, through 2-mode network analysis, it was found that the research papers about cognitive characteristics were mainly related to perceptions, thinking ability, scientific argumentation, science inquiry and so on. It was also found that the research papers about social and emotional characteristics were related to correlation, motivation, creativity-character, self-efficiency and so on. It was concluded that the SNA method can be performed with literature analysis together for better understandings and interpretations of the research trend of science gifted education in-depth.

A Proposal of the Security System for the next Generation Mobile Telecommunication System

  • Park, Young-Ho;Lee, Hoon-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.4
    • /
    • pp.149-153
    • /
    • 1999
  • This paper proposes a new security system for the next generation mobile telecommunication system The system is based on the network domain security of the 3GPP. The system provides confidentiality and integrity services in the RLC layer, the second layer of 3GPP. Our system has merits in that it can provide security services without any modification to the 3GPP protocol and has low transmission voerhead. Security algorithm and mode are controlled by the RRC layer, the third layer of 3GPP.

  • PDF

Efficient scalable method of H.264 video coding for network transport (네트워크 전송을 위한 H.264 비디오의 효율적인 계층화 방법)

  • Hwang, Jeong-Taek;Park, Seung-Ho;Suh, Doug-Young
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.192-194
    • /
    • 2005
  • Acceptance of the international standards for video compression, such as H.261, MPEG-1 and MPEG-2, along with the developments in video codec hardware, has created an explosion of application. Among these, the long time quest for long-distance digital video transmission causes an increasing interest in transporting compressed video over networks which are nontraditional for this purpose, including asynchronous transfer mode networks, the Internet, and cellular and wireless channels. Transmission of compression video over packet network is improved for error resilience. And layered video coding techniques improves error resilience. We present a efficient method of scalable video coding for low bandwidth.

  • PDF

Virtual Arrival Mechanism for IEEE 802.15.4 beacon enabled networks (비콘을 사용하는 IEEE 802.15.4 네트워크를 위한 가상 도착 메커니즘)

  • Ha, Jae-Yeol;Lee, Jong-Wook;Kwon, Wook-Hyun;Kim, Jung-Joon;Kim, Yong-Ho;Shim, Young-Hee
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.67-73
    • /
    • 2005
  • For power constrained applications, IEEE 802.15.4 networks may be operated in beacon enabled mode with inactive period. In this paper, we propose the Virtual Arrival Mechanism (VAM) to avoid the congestion at the beginning of each contention access period (CAP). Virtual Arrival Mechanism (VAM) is a kind of traffic shaping that spread the traffics congested at the beginning of CAP into the whole CAP. By using VAM, collisions and energy consumption can be reduced. Finally, we evaluate the performance enhancement of VAM using NS-2 simulator.

  • PDF