• Title/Summary/Keyword: Complete network

Search Result 516, Processing Time 0.029 seconds

Certificate Revocation Scheme using MOT Protocol over T-DMB Infrastructure

  • Kim, Hyun-Gon;Kim, Min-Soo;Jung, Seok-Won;Seo, Jae-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.12
    • /
    • pp.1583-1590
    • /
    • 2011
  • A Certificate Revocation List(CRL) should be distributed quickly to all the vehicles for vehicular communications to protect them from malicious users and malfunctioning equipment as well as to increase the overall security and safety of vehicular networks. Thus, a major challenge in vehicular networks is how to efficiently distribute CRLs. This paper proposes a Multimedia Object Transfer(MOT) protocol based on CRL distribution scheme over T-DMB infrastructure. To complete the proposed scheme, a handoff method, CRL encoding rules based on the MOT protocol, and relative comparison are presented. The scheme can broaden breadth of network coverage and can get real-time delivery with enhanced transmission reliability. Even if road side units are sparsely deployed or, even not deployed, vehicles can obtain recent CRLs from T-DMB infrastructure effectively.

A STUDY ON NON-MONOTONIC REASONING SYSTEM (비단조 논리를 이용한 추론 범위 확장에 관한 연구)

  • Lee, Kang-Heuy;Cha, Kuk-Chan;Choi, Jong-Soo
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.1038-1041
    • /
    • 1987
  • Non-monotonic logic is one in which the introduction of new axioms can eliminate old theorems. Such logic is very important in modeling the beliefs of the systems which, in the presence of complete information, must make and subsequently revise assumptions in light of new observations. In the present paper, we suggest that the formal systems, such as Reiter's default logic could be the useful implement for the specification and description of non-monotonic systems. WE develop a theory of inheritance network in order to illustrate the benefits of this theory.

  • PDF

Development of Geographical Information System for the Realtime Environmental Radioactivity Monitoring (환경방사능 데이터 분석을 위한 실시간 환경 감시차량 관제 시스템 구축)

  • Shon, HoWoong;Kim, InHyun;Lee, Yun;Kim, YoungWoo
    • Journal of the Korean Geophysical Society
    • /
    • v.7 no.1
    • /
    • pp.61-72
    • /
    • 2004
  • In this project, under the server-client environment, GIS for the radiological emergency and control system of the vehicles for the environmental radioactivity monitoring was complete. This system is able to display environmental radioactivity data and vehicle's locations through wireless network on real time. Furthermore, it supports not only static analysis function with the collected data regarding nuclear type, collecting time period and vehicle's location but also a documents printing out function.

  • PDF

Design of Simple Neuro-controller for Global Transient Control and Voltage Regulation of Power Systems

  • Jalili-Kharaajoo Mahdi;Mohammadi-Milasi Rasoul
    • International Journal of Control, Automation, and Systems
    • /
    • v.3 no.spc2
    • /
    • pp.302-307
    • /
    • 2005
  • A novel neuro controller based simple neuro-structure with modified error function is introduced in this paper. This controller consists of two independent controllers, known as the voltage regulator and the angular controller. The voltage regulator is used to modify terminal voltage for the purpose of tracking a reference voltage. The angular controller is utilized to guarantee the stability of the system. In this structure each neuron uses a linear hard limit activation function that depends on the controlled variable and its derivatives. There is no need for parameter identification or any off-line training data. Two proposed controllers are merged by a smooth switch to build a complete controller. The effectiveness of the proposed novel control action is demonstrated through some computer simulations on a Single-Machine Infinite-Bus (SMIB) power system.

An SDN based hopping multicast communication against DoS attack

  • Zhao, Zheng;Liu, Fenlin;Gong, Daofu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2196-2218
    • /
    • 2017
  • Multicast communication has been widely used in the Internet. However, multicast communication is vulnerable to DoS attack due to static router configuration. In this paper, HMC, a hopping multicast communication method based on SDN, is proposed to tackle this problem. HMC changes the multicast tree periodically and makes it difficult for the attackers to launch an accurate attack. It also decreases the probability of multicast communication being attacked by DoS and in the meanwhile, the QoS constrains are not violated. In this research, the routing problem of HMC is proven to be NP-complete and a heuristic algorithm is proposed to solve it. Experiments show that HMC has the ability to resist DoS attack on multicast route effectively. Theoretically, the multicast compromised probability can drop more than 0.6 when HMC is adopt. In addition, experiments demonstrate that HMC achieves shorter average multicast delay and better robustness compared with traditional method, and more importantly, it better defends DoS attack.

Neurocontrol architecture for the dynamic control of a robot arm (로보트 팔의 동력학적제어를 위한 신경제어구조)

  • 문영주;오세영
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.280-285
    • /
    • 1991
  • Neural network control has many innovative potentials for fast, accurate and intelligent adaptive control. In this paper, a learning control architecture for the dynamic control of a robot manipulator is developed using inverse dynamic neurocontroller and linear neurocontroher. The inverse dynamic neurocontrouer consists of a MLP (multi-layer perceptron) and the linear neurocontroller consists of SLPs (single layer perceptron). Compared with the previous type of neurocontroller which is using an inverse dynamic neurocontroller and a fixed PD gain controller, proposed architecture shows the superior performance over the previous type of neurocontroller because linear neurocontroller can adapt its gain according to the applied task. This superior performance is tested and verified through the control of PUMA 560. Without any knowledge on the dynamic model, its parameters of a robot , (The robot is treated as a complete black box), the neurocontroller, through practice, gradually and implicitly learns the robot's dynamic properties which is essential for fast and accurate control.

  • PDF

Developing a decision support system for designing distributed databases on a local area network

  • Lee, Heeseok;Park, Young-Ki
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.10a
    • /
    • pp.225-228
    • /
    • 1996
  • This paper proposes a design methodology for distributed databases connected by a LAN. Two primary objectives of the methodology are (i) to allocate data files and workload among heterogeneous servers and (ii) to determine the number of servers to satisfy the response time required for processing each transaction. The file and workload allocation decision is formulated as a nonlinear zero-one integer programming problem. This problem is proven to be NP-complete. A heuristic is developed to solve this problem effectively. A decision support system is implemented and an example is solved to illustrate the practical usefulness of the system.

  • PDF

Full angle range pressure coefficient maps of five-hole probe and new calibration coefficients (5공프로브의 전 각도 범위 압력계수 지도와 새로운 보정계수)

  • Kim, Jin-Gwon;Gang, Sin-Hyeong
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.21 no.11
    • /
    • pp.1437-1448
    • /
    • 1997
  • Pressures of a five-hole probe were measured for a full range of yaw and pitch angles and complete pressure coefficient maps were obtained. Based on these maps, various features of five-hole probe pressures were revealed and new five-hole probe calibration coefficients were devised. The new calibration coefficients show non-diverging characteristics for any flow direction and one-to-one correspondence for a wide range of flow angles. These calibration coefficients expand the valid flow angle range of five-hole probe calibration by .+-.10 degrees and complement a critical defect of five-hole probe zone-division calibration method which has not been known yet. Moreover new non-diverging calibration coefficients have advantages in nulling methods, too.

The Design of NPC Encryption Algorithms for Electronic Commerce (전자상거래를 위한 NPC 암호 알고리즘 설계)

  • 김재각;전문석
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.2
    • /
    • pp.159-166
    • /
    • 2001
  • EC(Electronic Commerce) is increasing with high speed based on the expansion of Internet. EC which is done through Internet has strong point like independence from time and space, On the contrary, it also has weak point like security problem because anybody can access easily to the system due to open network attribute of Internet. Therefore, we need the solutions that protect the security problem for safe and useful U activity, One of these solutions is the implementation of strong cipher algorithm. NPC(Non-Polynomial Complete) cipher algorithm proposed in this paper is good for the security and it overcome the limit of current 64bits cipher algorithm using 256bits key for input output and encryption key, Moreover, it is designed for the increase of calculation complexity and probability calculation by adapting more complex design for subkey generation regarded as one of important element effected to encryption.

  • PDF

A Study on Web Security using NC Cipher System (NC 암호시스템을 이용한 웹 보안에 관한 연구)

  • 서장원;전문석
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.55-58
    • /
    • 2000
  • EC, which is done the virtual space through Web, has weakly like security problem because anybody can easily access to the system due to open network attribute of Web. Therefore, we need the solutions that protect the Web security for safe and useful EC. One of these solutions is the implementation of a strong cipher system. NC(Nonpolynomial Complete) cipher system proposed in this paper is advantage for the Web security and it overcomes the limit of the 64 bits cipher system using 128 bits key length for input, output, encryption key and 16 rounds. Moreover, it is designed for the increase of time complexity by adapted more complex design for key scheduling regarded as one of the important element effected to encryption.

  • PDF