• Title/Summary/Keyword: Cooperate Communication

Search Result 112, Processing Time 0.028 seconds

Design Learning Environment based on Affordance Concept for Convergent Design Education

  • Kim, Sunyoung
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.199-206
    • /
    • 2020
  • I suggested the design learning environment based on affordance concept approach for supporting and improving learners' behavior and outcome for convergent design education in this study. The design learning space should be applied teaching and learning activity, especially learners' behavior, physical space condition to support the design thinking process. The design learning space needs openness, individuality and connectivity to support the learners' behavioral to immerse, participate, cooperate, understand, think and fulfill the design thinking process. The composition principles of the learning environment for convergent design education supports communication and collaboration among members for independence and interaction. The spaces for design research and teaching needs high privacy while facilitating visual communications through special materials and wall structure design. Also, for connectivity to improve the learners' physical and visual contact, the environment of the classrooms requires flexibility and mobility by providing an open space integrating unit cells for realizing learning purpose. These are provided by formed of an open structure for inducing visual communication and physical contact to involve the design activities and the mutual interchange.

Distributed Restoration System based on Multi-Agent for Improving Restoration in Distribution Automation System (배전자동화 시스템의 복구기능 향상을 위한 Multi-Agent 기반의 분산형 정전복구 시스템)

  • Lim, Seong-Il;Lim, Il-Hyung;Lee, Seung-Jae;Kwon, Sung-Chul;Ha, Bok-Nam;Choi, Myeon-Song
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.4
    • /
    • pp.660-668
    • /
    • 2007
  • In order to improve the efficiency of service restoration function in the current Distribution Automation System (DAS), in this paper it is proposed a more advanced and efficient service restoration approach using Multi-Agent technique based on distributed networks. In the current DAS, communication networks or protocol structures are centralized with communications between the central station and FRTU through 1:1 connection. In order to maintain the current systems and enhance the proposed Multi-Agent based service restoration scheme, a device of communication and intelligence, named MASX, is newly developed to make a FRTU as an agent to cooperate each others. the proposed system applied in a demo system for an distribution automation system and shows 8 times reduction of restoration time in restoration of blackouts.

Implementation of a Flexible Peer-to-Peer Internet Telephony Service Using an Underlying DHT (유연성을 갖는 분산 해쉬 테이블 기반의 피어 투 피어 인터넷 텔레포니 서비스의 구현)

  • Lee, Ju-Ho;Kim, Jae-Bong;Jeong, Choong-Kyo
    • Journal of Industrial Technology
    • /
    • v.26 no.B
    • /
    • pp.199-206
    • /
    • 2006
  • Internet telephony provides voice communication services with added flexibility for multimedia extension at a lower cost compared to traditional telephone systems. We implemented an internet telephony system as an overlay network without a centralized server, using a distributed hash table (DHT). Compared to the current server-based internet telephony system, our system is fault-tolerant, scalable, and can be flexible extended to various services and advanced to integrated service. To demonstrate the high flexibility of our DHT-based internet telephony system, we made our system cooperate with web servers. Web users can check up others' online stales and establish voice communication sessions to online users at a mouse click. This technology can be applied to more complex services such as multimedia messaging or video conference service.

  • PDF

A Study on Real time Multiple Fault Diagnosis Control Methods (실시간 다중고장진단 제어기법에 관한 연구)

  • 배용환;배태용;이석희
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1995.04b
    • /
    • pp.457-462
    • /
    • 1995
  • This paper describes diagnosis strategy of the Flexible Multiple Fault Diagnosis Module for forecasting faults in system and deciding current machine state form sensor information. Most studydeal with diagnosis control stategy about single fault in a system, this studies deal with multiple fault diagnosis. This strategy is consist of diagnosis control module such as backward tracking expert system shell, various neural network, numerical model to predict machine state and communication module for information exchange and cooperate between each model. This models are used to describe structure, function and behavior of subsystem, complex component and total system. Hierarchical structure is very efficient to represent structural, functional and behavioral knowledge. FT(Fault Tree). ST(Symptom Tree), FCD(Fault Consequence Diagrapy), SGM(State Graph Model) and FFM(Functional Flow Model) are used to represent hierachical structure. In this study, IA(Intelligent Agent) concept is introduced to match FT component and event symbol in diagnosed system and to transfer message between each event process. Proposed diagnosis control module is made of IPC(Inter Process Communication) method under UNIX operating system.

  • PDF

Stateful Virtual Proxy for SIP Message Flooding Attack Detection

  • Yun, Ha-Na;Hong, Sung-Chan;Lee, Hyung-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.3
    • /
    • pp.251-265
    • /
    • 2009
  • VoIP service is the transmission of voice data using SIP protocol on an IP-based network. The SIP protocol has many advantages, such as providing IP-based voice communication and multimedia service with low communication cost. Therefore, the SIP protocol disseminated quickly. However, SIP protocol exposes new forms of vulnerabilities to malicious attacks, such as message flooding attack. It also incurs threats from many existing vulnerabilities as occurs for IP-based protocol. In this paper, we propose a new virtual proxy to cooperate with the existing Proxy Server to provide state monitoring and detect SIP message flooding attack with IP/MAC authentication. Based on a proposed virtual proxy, the proposed system enhances SIP attack detection performance with minimal latency of SIP packet transmission.

Hierarchical VPN Configuration Method using SCG(Secure Communication Group) and Its Characteristics (SCG(Secure Communication Group)을 이용한 계층적 VPN(Virtual Private Network) 구성 및 특성)

  • Park, Chan-Woo;Han, Chi-Moon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.11
    • /
    • pp.9-18
    • /
    • 2001
  • Currently most of VPNs within internet has only capability to protect cooperate data. Recently, various types of VPNs are being studied based on the concept of SCG(Secure Communication Group). This paper analyses the problems of path-definition method and area-definition method of VPNs using SCG technology, and discusses the possible models among VPNs using SCG technology. This paper proposes the hierarchal VPN configuration method using SCG number and internet based area definition method, and analyze the characteristics of the proposed VPN model on the point of the authentication frequency and the number of managements keys.

  • PDF

Method for Hybrid Cooperative Sharing applied Automatic Request Protocol (자동 반복 프로토콜을 적용한 하이브리드 협력 공유 기법)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.105-110
    • /
    • 2015
  • In cognitive radio networks, when the signal-to-noise ratio (SNR) of the link between a primary transmitter and receiver is sufficiently high, the primary transmission does not frequently demand cooperation because direct transmission of the primary communication is usually successful. Therefore, there are few opportunities for a secondary transmitter to cooperate with the primary user system in exchange for an opportunity to share the spectrum. This article proposes a scheme in which the secondary system can deliberately degrade the SNR of the primary transmission, making it so that the primary system needs cooperation from the secondary nodes, and thereby increases opportunities for spectrum sharing.

Bluetooth Network for Distributed Autonomous Robotic System

  • Whang, Se-Hee;Sim, Kwee-Bo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2346-2349
    • /
    • 2005
  • Distributed Autonomous Robotic System (DARS) is defined as a system that independent autonomous robots in the restricted environments infer their status from pre-assigned conditions and operate their jobs through the cooperation with each other. In the DARS, a robot contains sensor part to percept the situation around themselves, communication part to exchange information, and actuator part to do a work. Especially, in order to cooperate with other robots, communicating with other robots is one of the essential elements. Because Bluetooth has many advantages such as low power consumption, small size module package, and various standard protocols, Bluetooth is rated as one of the efficient communicating technologies which can apply to small-sized robot system. In this paper, we will develop Bluetooth communicating system for autonomous robots such as DARS robots. For this purpose, The Bluetooth communication system must have several features. The first, this system should be separated from other robot parts and operate spontaneously and independently. In other words, this communication system should have the ability to organize and maintain and reorganize a network scheme. The next, this system had better support any kinds of standard interfaces in order to guarantee flexible applicability to other embedded system. We will discuss how to construct and what kind of procedure to develop the network system.

  • PDF

A Study on the Prototyping for Developing Computer Game (컴퓨터게임 제작을 위한 프로토타입에 관한 연구)

  • Tak, Hwa-Eun;Kim, Sung-Kon
    • Archives of design research
    • /
    • v.17 no.4
    • /
    • pp.129-140
    • /
    • 2004
  • The process of game development is contained of many steps that is hard to forecast success or failure. In order to develop successful game, the development period should be shorter, which could reduce development cost. In order to reduce development period and cost, it is needed to make a communication among planners, programmers, graphic designers and investors lively with a prototype as a communication tool. In this study, the concrete examples are demonstrated how to use prototypes as a tool for communication and feedback of team members, in the process of game development. This paper explains the characteristics of various types of prototypes according to types of game contents. This paper demonstrated two types of prototype according to development stage, one type is a prototype to gather feedback in the planning stage, the other is a prototype to make team members cooperate and communicate in the stage of production stage.

  • PDF

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.