• Title/Summary/Keyword: Computer Network Engineering

Search Result 6,632, Processing Time 0.034 seconds

Development of Network Management Database Tool (망 관리 데이터베이스 툴 개발)

  • Cho, Sung-Hoon;Yoon, Kyeong-Mo;Kim, Byung-Jae;Lee, Yong-Gi;Kim, Dong-Hyuk;Lee, Chan-Seob;Choi, Eui-In
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.27-30
    • /
    • 2002
  • 현재 광선로 데이터를 처리하기 위한 데이터베이스 툴이 존재하지만, 광선로의 특성을 적절히 수용하지 못한 상태에서 방 설계 작업 지원 기능을 포함하지 못하고 있다. 이러한 문제점을 해결하기 위해 본 연구에서는 방 설계 지원을 위한 땅 설계 체계를 제안하고, 광선로 특성에 기초한 땅 설계 및 관리툴을 개발하고자 한다.

  • PDF

Fire Detection Method Using IoT and Wireless Sensor Network

  • Park, Jung Kyu;Roh, Young Hwa;Nam, Ki hun;Seo, Hyung Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.131-136
    • /
    • 2019
  • A wireless sensor network (WSN) consists of several sensor nodes and usually one base station. In this paper, we propose a method to monitor topics using a wireless sensor network. Fire threatens people, animals, and plants, and it takes a lot of recovery time when a fire occurs. For this reason, it is necessary to use a fire monitoring system that is easy to configure and fast to avoid fire. In this paper, we propose a fast and easily reliable fire detection system using WSN. The wireless node of the WSN measures the temperature and brightness around the node. The measured information is transferred to the workstation and to the base station. The workstation analyzes current and historical data records to monitor the fire and notify the manager.

Home Network Control Protocol for Networked Home Appliances and Its Application

  • Lee Jae-Min;Myoung Kwan-Joo;Kim Dong-Sung;Kwon Wook-Hyun;Ko Beom-Seog;Kim Young-Man;Kim Yo-Hee
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.1 no.1
    • /
    • pp.26-39
    • /
    • 2002
  • This paper describes design and implementation of home network control protocol for networked home appliances. The proposed network protocol has four-layered protocol structure and device-modem interface structure for the flexibility of modems based on power line communication. The standard message set is specified to guarantee the interoperability between various home appliances The proposed protocol can be easily implemented because it has minimum network overhead.

  • PDF

A Study on the Operational Characteristics of a Squirrel-cage type Wind Turine Induction Generator (농형 풍력 유도발전기의 운전 특성에 관한 연구)

  • Jang, Sung-Il;Jeong, Jong-Chan;Choi, Jeong-Hwan;Park, Je-Young;Kim, Kwang-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2002.07b
    • /
    • pp.1309-1312
    • /
    • 2002
  • The electric power network paralleled with wind turbine generator may have the negative impacts on the protection, operation, and management caused by the operation of wind turbine generator. Therefore, it is necessary to investigate the operating characteristic of wind turbine generator. This paper describes model of a squirrel-cage type wind turbine induction generator and the soft cut-in connection method for reducing the transient state on power network, and simulates various cases of wind turbine operations. The radial distribution network of IEEE 13-bus are modeled and tested by PSCAD/EMTDC.

  • PDF

Comparative Analysis of Centralized Vs. Distributed Locality-based Repository over IoT-Enabled Big Data in Smart Grid Environment

  • Siddiqui, Isma Farah;Abbas, Asad;Lee, Scott Uk-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.75-78
    • /
    • 2017
  • This paper compares operational and network analysis of centralized and distributed repository for big data solutions in the IoT enabled Smart Grid environment. The comparative analysis clearly depicts that centralize repository consumes less memory consumption while distributed locality-based repository reduce network complexity issues than centralize repository in state-of-the-art Big Data Solution.

  • PDF

Implementing Firewall to Mitigate YOYO Attack on Multi Master Cluster Nodes Using Fail2Ban

  • Muhammad Faraz Hyder;Muhammad Umer Farooq;Mustafa Latif;Faizan Razi Khan;Abdul Hameed;Noor Qayyum Khan;M. Ahsan Siddiqui
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.126-132
    • /
    • 2023
  • Web technology is evolving with the passage of time, from a single node server to high availability and then in the form of Kubernetes. In recent years, the research community have been trying to provide high availability in the form of multi master cluster with a solid election algorithm. This is helpful in increasing the resources in the form of pods inside the worker node. There are new impact of known DDoS attack, which is utilizing the resources at its peak, known as Yoyo attack. It is kind of burst attack that can utilize CPU and memory to its limit and provide legit visitors with a bad experience. In this research, we tried to mitigate the Yoyo attack by introducing a firewall at load-balancer level to prevent the attack from going to the cluster network.

Handwritten Indic Digit Recognition using Deep Hybrid Capsule Network

  • Mohammad Reduanul Haque;Rubaiya Hafiz;Mohammad Zahidul Islam;Mohammad Shorif Uddin
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.89-94
    • /
    • 2024
  • Indian subcontinent is a birthplace of multilingual people where documents such as job application form, passport, number plate identification, and so forth is composed of text contents written in different languages/scripts. These scripts may be in the form of different indic numerals in a single document page. Due to this reason, building a generic recognizer that is capable of recognizing handwritten indic digits written by diverse writers is needed. Also, a lot of work has been done for various non-Indic numerals particularly, in case of Roman, but, in case of Indic digits, the research is limited. Moreover, most of the research focuses with only on MNIST datasets or with only single datasets, either because of time restraints or because the model is tailored to a specific task. In this work, a hybrid model is proposed to recognize all available indic handwritten digit images using the existing benchmark datasets. The proposed method bridges the automatically learnt features of Capsule Network with hand crafted Bag of Feature (BoF) extraction method. Along the way, we analyze (1) the successes (2) explore whether this method will perform well on more difficult conditions i.e. noise, color, affine transformations, intra-class variation, natural scenes. Experimental results show that the hybrid method gives better accuracy in comparison with Capsule Network.

A New Network Partition Technique using Marginal Cost Sensitivity Under Transmission Congestion (송전혼잡하에서 한계비용 민감도를 이용한 새로운 계통 분할 기법)

  • Jang, Si-Jin;Jeong, Hae-Seong;Park, Jong-Keun
    • Proceedings of the KIEE Conference
    • /
    • 2000.11a
    • /
    • pp.223-225
    • /
    • 2000
  • Network congestion is important problem that must be managed for active power contracts in deregulated power industry. Existing network partition technique is based on statistical method don't suggest clear network partition criterion. So in this paper we proposed a new network partition technique using the marginal cost sensitivity to fairly allocate congestion cost to network user.

  • PDF

Virtual Network for IPTV Service

  • Song, Biao;Hassan, Mohammad Mehedi;Huh, Eui-Nam
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.315-318
    • /
    • 2011
  • In this work, a VN-based IPTV service delivery network containing a novel VNT was designed, This VN-based IPTV service delivery network utilizes current resources that can be easily obtained by IPTV providers and organizes these resources in a more efficient manner, We also developed a three-stage VN allocation scheme to reduce the complexity of topology design and allocation.

Comparison of Convolutional Neural Network Models for Image Super Resolution

  • Jian, Chen;Yu, Songhyun;Jeong, Jechang
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2018.06a
    • /
    • pp.63-66
    • /
    • 2018
  • Recently, a convolutional neural network (CNN) models at single image super-resolution have been very successful. Residual learning improves training stability and network performance in CNN. In this paper, we compare four convolutional neural network models for super-resolution (SR) to learn nonlinear mapping from low-resolution (LR) input image to high-resolution (HR) target image. Four models include general CNN model, global residual learning CNN model, local residual learning CNN model, and the CNN model with global and local residual learning. Experiment results show that the results are greatly affected by how skip connections are connected at the basic CNN network, and network trained with only global residual learning generates highest performance among four models at objective and subjective evaluations.

  • PDF