• Title/Summary/Keyword: Critical Node

Search Result 284, Processing Time 0.02 seconds

Machine-Part Grouping with Alternative Process Plan - An algorithm based on the self-organizing neural networks - (대체공정이 있는 기계-부품 그룹의 형성 - 자기조직화 신경망을 이용한 해법 -)

  • Jeon, Yong-Deok
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.3
    • /
    • pp.83-89
    • /
    • 2016
  • The group formation problem of the machine and part is a critical issue in the planning stage of cellular manufacturing systems. The machine-part grouping with alternative process plans means to form machine-part groupings in which a part may be processed not only by a specific process but by many alternative processes. For this problem, this study presents an algorithm based on self organizing neural networks, so called SOM (Self Organizing feature Map). The SOM, a special type of neural networks is an intelligent tool for grouping machines and parts in group formation problem of the machine and part. SOM can learn from complex, multi-dimensional data and transform them into visually decipherable clusters. In the proposed algorithm, output layer in SOM network had been set as one-dimensional structure and the number of output node has been set sufficiently large in order to spread out the input vectors in the order of similarity. In the first stage of the proposed algorithm, SOM has been applied twice to form an initial machine-process group. In the second stage, grouping efficacy is considered to transform the initial machine-process group into a final machine-process group and a final machine-part group. The proposed algorithm was tested on well-known machine-part grouping problems with alternative process plans. The results of this computational study demonstrate the superiority of the proposed algorithm. The proposed algorithm can be easily applied to the group formation problem compared to other meta-heuristic based algorithms. In addition, it can be used to solve large-scale group formation problems.

Hot spot DBC: Location based information diffusion for marketing strategy in mobile social networks (Hotspot DBC: 모바일 소셜 네트워크 상에서 마케팅 전략을 위한 위치 기반 정보 유포)

  • Ryu, Jegwang;Yang, Sung-Bong
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.2
    • /
    • pp.89-105
    • /
    • 2017
  • As the advances of technology in mobile networking and the popularity of online social networks (OSNs), the mobile social networks (MSNs) provide opportunities for marketing strategy. Therefore, understanding the information diffusion in the emerging MSNs is a critical issue. The information diffusion address a problem of how to find the proper initial nodes who can effectively propagate as widely as possible in the minimum amount of time. We propose a new diffusion scheme, called Hotspot DBC, which is to find k influential nodes considering each node's mobility behavior in the hotspot zones. Our experiments were conducted in the Opportunistic Network Environment (ONE) using real GPS trace, to show that the proposed scheme results. In addition, we demonstrate that our proposed scheme outperforms other existing algorithms.

Weaknesses and Improvement of User Authentication Scheme against Smart-Card Loss Attack (스마트 카드 분실 공격에 안전한 사용자 인증 스킴의 취약점 및 개선방안)

  • Choi, Younsung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.95-101
    • /
    • 2016
  • With the rapid development of Internet and communication network technology, various studies had proceeded to develop the technology of wireless sensor networks. Authentication schemes for user and sensor are critical and important security issue to use wireless sensors legally. First, Das introduce a user authentication scheme using smart card and password for wireless sensor networks, various studies had proceeded. Chem et al. suggested a secure user authentication scheme against smart card loss attack but Chen et al. scheme does not still resolve some security vulnerability such as perfect forward secrecy, session key exposure by gateway node, anonymity, and the password check. To resolve the problems, this paper proposes a security enhanced user authentication using the fuzzy extraction, elliptic curves cryptography and dynamic ID and analyzes the security.

Optimal Information Dispersal Scheme for Survivable Storage Systems (서바이벌 스토리지 시스템을 위한 최적 정보 분할 기법)

  • Song, Sung-Keun;Youn, Hee-Yong;Lee, Hyung-Soo;Lee, Kang-Shin
    • The KIPS Transactions:PartA
    • /
    • v.10A no.6
    • /
    • pp.657-664
    • /
    • 2003
  • Supporting the availability, integrity, and confidentiality of the information is crucial. The survivability storage systems require to encode and distribute data over multiple storage nodes or data base to survive failures and malicious attacks Information dispersal scheme is one of the most efficient schemes allowing high availability and security with reasonable overhead. In this paper, we propose an algorithm determining the optimal (m, n)-lDS in terms of availability, given a set of IDS's. The proposed algorithm will be very useful for designing a highly available and secure storage system since many factors such as node number, storage space, operation speed, etc. interact with each other and thereby finding an optimal information dispersal scheme is very difficult.

Analysis of Dynamics Characteristics of Water Injection Pump through the 2D Finite Element (2D 유한요소 해석을 통한 물 분사 펌프의 동특성 분석)

  • Lee, Jong-Myeong;Kim, Yong-Hwi;Kim, Jun-Ho;Choi, Hyeon-Cheol;Choi, Byeong Keun
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.24 no.6
    • /
    • pp.462-469
    • /
    • 2014
  • After drilling operations at the offshore plant, crude oil is producted under high pressure. After that time, oil recovery is reduced, because the pressure of the pipe inside is low during the secondary produce. At that time injection sea water at the pipe inside through water injection pump that the device increase to recovery. A variety of mathematical analysis during the detailed design analysis was not made through the dynamics characteristic at the domestic company. 2D model has reliability of analysis results for the uncomplicated model. Also element and the node the number of significantly less than in the 3D model. So, the temporal part is very effective. In addition, depending on the quality of mesh 3D is a real model and FEM model occurs error. So, user needs a lot of skill. In this paper, a 2D finite element analysis was performed through the dynamics analysis and the study model was validated.

IEEE 802.15.4a based Localization Algorithm for Location Accuracy Enhancement in the NLOS Environment (실내 NLOS환경에서 정밀도 향상을 위한 IEEE 802.15.4a 기반의 위치추정 알고리즘)

  • Cha, Jae-Young;Kong, Young-Bae;Choi, Jeung-Won;Ko, Jong-Hwan;Kwon, Young-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1789-1798
    • /
    • 2012
  • IEEE 802.15.4a standard can provide a variety of location-based services for ZigBee or wireless network applications by adapting the time-of-arrival (TOA) ranging technique. The non-line-of-sight (NLOS) condition is the critical problem in the IEEE 802.15.4a networks, and it can significantly degrade the performance of the TOA-based localization. To enhance the location accuracy due to the NLOS problem, this paper proposes an energy-efficient low complexity localization algorithm. The proposed approach performs the ranging with the multicast method, which can reduce the message overhead due to packet exchanges. By limiting the search region for the location of the node, the proposed approach can enhance the location accuracy. Experimental results show that the proposed algorithm outperforms previous algorithms in terms of the energy consumption and the localization accuracy.

An Energy-Efficient Access Control Scheme forWireless Sensor Networks based on Elliptic Curve Cryptography

  • Le, Xuan Hung;Lee, Sung-Young;Butun, Ismail;Khalid, Murad;Sankar, Ravi;Kim, Miso Hyoung-Il;Han, Man-Hyung;Lee, Young-Koo;Lee, Hee-Jo
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.599-606
    • /
    • 2009
  • For many mission-critical related wireless sensor network applications such as military and homeland security, user's access restriction is necessary to be enforced by access control mechanisms for different access rights. Public key-based access control schemes are more attractive than symmetric-key based approaches due to high scalability, low memory requirement, easy key-addition/revocation for a new node, and no key predistribution requirement. Although Wang et al. recently introduced a promising access control scheme based on elliptic curve cryptography (ECC), it is still burdensome for sensors and has several security limitations (it does not provide mutual authentication and is strictly vulnerable to denial-of-service (DoS) attacks). This paper presents an energy-efficient access control scheme based on ECC to overcome these problems and more importantly to provide dominant energy-efficiency. Through analysis and simulation based evaluations, we show that the proposed scheme overcomes the security problems and has far better energy-efficiency compared to current scheme proposed byWang et al.

Design of a High Performance Built-In Current Sensor using 0.8$\mu\textrm{m}$ CMOS Technology (0.8$\mu\textrm{m}$ CMOS 공정을 이용한 고성능 내장형 전류감지기의 구현)

  • 송근호;한석붕
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.12
    • /
    • pp.13-22
    • /
    • 1998
  • In this paper, we propose a high-performance BICS(built-in current sensor) which is fabricated in 0.8${\mu}{\textrm}{m}$ single-poly two-metal process for IDDQ testing of CMOS VLSI circuit. The CUT(circuit under test) is 4-bit full adder with a bridging fault. Using two nMOSs that have different size, two bridging faults that have different resistance values are injected in the CUT. And controlling a gate node, we experimented various fault effects. The proposed BICS detects the faulty current at the end of the clock period, therefore it can test a CUT that has a much longer critical propagation delay time and larger area than conventional BICSs. As expected in the HSPICE simulation, experimental results of fabricated chip demonstrated that the proposed BICS can exactly detect bridging faults in the circuit.

  • PDF

TAK1-dependent Activation of AP-1 and c-Jun N-terminal Kinase by Receptor Activator of NF-κB

  • Lee, Soo-Woong;Han, Sang-In;Kim, Hong-Hee;Lee, Zang-Hee
    • BMB Reports
    • /
    • v.35 no.4
    • /
    • pp.371-376
    • /
    • 2002
  • The receptor activator of nuclear factor kappa B (RANK) is a member of the tumor necrosis factor (TNF) receptor superfamily. It plays a critical role in osteoclast differentiaion, lymph node organogenesis, and mammary gland development. The stimulation of RANK causes the activation of transcription factors NF-${\kappa}B$ and activator protein 1 (AP1), and the mitogen activated protein kinase (MAPK) c-Jun N-terminal kinase (JNK). In the signal transduction of RANK, the recruitment of the adaptor molecules, TNF receptor-associated factors (TRAFs), is and initial cytoplasmic event. Recently, the association of the MAPK kinase kinase, transforming growth factor-$\beta$-activated kinase 1 (TAK1), with TRAF6 was shown to mediate the IL-1 signaling to NF-${\kappa}B$ and JNK. We investigated whether or not TAK1 plays a role in RANK signaling. A dominant-negative form of TAK1 was discovered to abolish the RANK-induced activation of AP1 and JNK. The AP1 activation by TRAF2, TRAF5, and TRAF6 was also greatly suppressed by the dominant-negative TAK1. the inhibitory effect of the TAK1 mutant on RANK-and TRAF-induced NF-${\kappa}B$ activation was also observed, but less efficiently. Our findings indicate that TAK1 is involved in the MAPK cascade and NF-${\kappa}B$ pathway that is activated by RANK.

The First Pediatric Case of Intrathoracic Tuberculosis Lymphadenitis Diagnosed by Endobronchial Ultrasound Guided Transbronchial Needle Aspiration (국내 소아에서 최초로 초음파기관지내시경-세침흡인술을 이용하여 진단된 흉곽 내 결핵 림프절염 증례)

  • Kim, Kwang Hoon;Lee, Kyung Jong;Kim, Yae-Jean
    • Pediatric Infection and Vaccine
    • /
    • v.20 no.3
    • /
    • pp.186-189
    • /
    • 2013
  • Endobronchial ultrasound guided transbronchial needle aspiration (EBUS-TBNA) now provides an important alternative diagnostic modality in patients with intrathoracic tuberculosis lymphadenopathy. The procedure is well tolerated in the outpatient setting, provides access to the mediastinal and hilar lymph node locations commonly in tuberculosis and also allows bronchial washing to be performed at the same procedure. However, there is no report of EBUS-TBNA applied to children to diagnose tuberculosis. We report a case of EBUS-TBNA applied to children who had intrathoracic tuberculosis lymphadenopathy.

  • PDF