• Title/Summary/Keyword: Digital topology

Search Result 192, Processing Time 0.024 seconds

The Study of Hierarchical Intrusion Detection Based on Rules for MANET (MANET에서 규칙을 기반으로 한 계층형 침입 탐지에 관한 연구)

  • Jung, Hye Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.153-160
    • /
    • 2010
  • MANET composed mobile nodes without central concentration control like base station communicate through multi-hop route among nodes. Accordingly, it is hard to maintain stability of network because topology of network change at any time owing to movement of mobile nodes. MANET has security problems because of node mobility and needs intrusion detection system that can detect attack of malicious nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system based on rules in order to more accurate intrusion detection. Cluster head perform role of monitor node to raise monitor efficiency of packet. In order to evaluate performance of proposed method, we used jamming attack, selective forwarding attack, repetition attack.

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET (MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.

Digital Control of Secondary Active Clamp Phase-Shifted Full-Bridge Converters

  • Che, Yanbo;Ma, Yage;Ge, Shaoyun;Zhu, Dong
    • Journal of Power Electronics
    • /
    • v.14 no.3
    • /
    • pp.421-431
    • /
    • 2014
  • A DSP-based self-adaptive proportional-integral (PI) controller to control a DC-DC converter is proposed in this paper. The full-bridge topology is adopted here to obtain higher power output capability and higher conversion efficiency. The converter adopts the zero-voltage-switching (ZVS) technique to reduce the conduction losses. A parallel secondary active clamp circuit is added to deal with the voltage overshoot and ringing effect on the transformer's secondary side. A self-adaptive PI controller is proposed to replace the traditional PI controller. Moreover, the designed converter adopts the constant-current and constant-voltage (CC-CV) output control strategy. The secondary active clamp mechanism is discussed in detail. The effectiveness of the proposed converter was experimentally verified by an IGBT-based 10kW prototype.

A study about the digital control for the forward converter with synchronous rectifier (동기정류기형 포워드 컨버터의 디지털 제어에 관한 연구)

  • Ka, Dong-Hoon;Kim, Il-Nam;Park, Jong-Sung;Ahn, Tae-Young
    • Proceedings of the KIPE Conference
    • /
    • 2007.07a
    • /
    • pp.29-31
    • /
    • 2007
  • This is experimental result which is reported with use the dsPIC30F2020 16-Bit SMPS microprocessor of MicroChip company which composes a digital control circuit and it applies in switched-mode power supply unit. The basic topology consist of the synchronous rectifier in a two transistor forward converter. In a experiment, it is used from microprocessor to do with A/D conversion and it is embodied with PID controls in order to detect a over-current, over-voltage, over-temperature and output voltage.

  • PDF

Design of Secure Protocol based on trust model and trust values for Ubiquitous Sensor Networks (Ubiquitous Sensor Network에서 안전성 증가를 위한 신뢰모델과 신뢰값에 관한 프로토콜 설계)

  • Jang, Kun Won;Suh, Jang Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.9-18
    • /
    • 2008
  • Mobile devices do not need the fixed network infrastructure in ad-hoc network, these devices communicate each other through the distributed control. Accordingly, mobile devices can discover several services using dynamic searching method and provide safely public ownership of these services. Ad-hoc network needs the distributed control and topology of dynamic network because the limited power for processing and network communication. This paper is devoted to provide the secure protocol that provides efficient services discovery using SDP(Service Discovery Protocol) and considers the security requirements. Proposed protocol provides the distributed control based on PKI without central server, the discovery of trusted service, secure telecommunication, the identification among mobile devices, and service access control by user authority.

A New Half-bridge Resonant Inverter with Load-Freewheeling Modes

  • Yeon, Jae-Eul;Cho, Kyu-Min;Kim, Hee-Jun
    • Journal of Electrical Engineering and Technology
    • /
    • v.2 no.2
    • /
    • pp.249-256
    • /
    • 2007
  • This paper presents a new circuit topology and its digital control scheme for a half-bridge resonant inverter. As the proposed half-bridge inverter can be operated in load-freewheeling modes, the pulse-width modulation (PWM) method can be used for the output power control. The proposed half-bridge inverter is based on the resonant frequency-tracking algorithm with the goal of maintaining the unity of the output displacement factor of the load impedance even in varying conditions. In this paper, the operation principle, electrical characteristics, and detailed digital control scheme of the proposed half-bridge resonant inverter are described. The experimental results of the prototype experimental setup to verify the validity of the proposed half-bridge inverter are presented and discussed.

A Tetrahedral Decomposition Method for Computing Tangent Curves of 3D Vector Fields (3차원 벡터필드 탄젠트 곡선 계산을 위한 사면체 분해 방법)

  • Jung, Il-Hong
    • Journal of Digital Contents Society
    • /
    • v.16 no.4
    • /
    • pp.575-581
    • /
    • 2015
  • This paper presents the development of certain highly efficient and accurate method for computing tangent curves for three-dimensional vector fields. Unlike conventional methods, such as Runge-Kutta method, for computing tangent curves which produce only approximations, the method developed herein produces exact values on the tangent curves based upon piecewise linear variation over a tetrahedral domain in 3D. This new method assumes that the vector field is piecewise linearly defined over a tetrahedron in 3D domain. It is also required to decompose the hexahedral cell into five or six tetrahedral cells for three-dimensional vector fields. The critical points can be easily found by solving a simple linear system for each tetrahedron. This method is to find exit points by producing a sequence of points on the curve with the computation of each subsequent point based on the previous. Because points on the tangent curves are calculated by the explicit solution for each tetrahedron, this new method provides correct topology in visualizing 3D vector fields.

The Study for the Method of Network Security Domain Architecture Designing (네트워크 보안도메인 아키텍처 설계방법 연구)

  • Noh, Si-Choon
    • Journal of Digital Contents Society
    • /
    • v.8 no.2
    • /
    • pp.165-171
    • /
    • 2007
  • The penetration of malicious code and the function of security blocking are performed on the same course of traffic pathway. The security domain is the concept to distinguish the domain from the group handling with the traffic on the structure of network which is performed with the function of penetration and security. The security domain could be different from the criterion of its realm and function, which requires the development and the application of security mechanism for every domain. For the establishment of security domain it is needed to show what criterion of net work should be set up. This study is to research the criterion for topology factor, security domain. structure map selection, and blocking location and disinfection net. It is shown to increase the effective rate blocking the virus with the proposed method in this paper rather than the traditional network architecture. The purpose of this paper is to suggest the necessity of development of security mechanism and the distinguished blocking function according to the level of security domain.

  • PDF

Application of DMD for Phase Shifting in Moire Topology (DMD를 이용한 위상천이 모아레 3차원 형상 측정)

  • Jeong, Kyung-Seok;Jung, Yong-Sang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.6
    • /
    • pp.2457-2462
    • /
    • 2011
  • The need for rapid and accurate measurement of 3-dimensional objects is increasing due to the paradigmatic shift in manufacturing from mass production to small batch production. A three dimensional measurement technique which can provide the dimensional information of the object manufactured or to be manufactured has been developed. This method is based on phase shifting moire topology. Digital-Micromirror-Device (DMD) has been used in generating phase shifting moire fringes. And the mechanically moving optical components used for phase shifting, which might result in measurement errors, have been replaced by the DMD. Inherent $2\pi$-ambiguity problem, occurring in the calculation of phase from the light intensity distribution due to the nature of arctangent function, has been overcome by adapting the phase unwrapping method. The advantage of this technique is the easy change of the range and the resolution of the measurement by simply changing the computer generated grid pattern with the appropriate combination of projection lens of various focal length.

A Study on Algorithm for Computerization of Cadastral Maps (지적도면 전산화를 위한 알고리즘에 관한 연구)

  • 김충평;김감래
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.16 no.1
    • /
    • pp.111-118
    • /
    • 1998
  • Today Geo-Spatial Information System(GSIS) has developed and used more widely, and especially it has been more greatly asked for Land Information System as a part of GSIS. Now it has been planning and monitoring for remaking of cadastral maps by the Ministry of Government Administration and Home Affairs. But this is long term project because of the importance of itself. And then it has been needed to computerize cadastral maps for implementation of relative tasks and services. Cadastral maps have some problems; for example, map join in different scales, different administration boundary and so on. In this study General topology algorithm, Polygonization algorithm and Pseudo-topology algorithm was adapted in computerization of cadastral maps. This is called digital map. The area and shape of parcels do not change. As a result it was found that Polygonization algorithm is the best of 3 algorithm and General topology algorithm is the worst.

  • PDF