• Title/Summary/Keyword: Distributed Communication Model

Search Result 435, Processing Time 0.027 seconds

Geometric Kernel Design of the Web-Viewer for the PDM Based Assembly DMU (PDM기반 조립체 DMU를 위한 웹뷰어 형상커널의 설계)

  • Song, In-Ho;Chung, Sung-Chong
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.31 no.2 s.257
    • /
    • pp.260-268
    • /
    • 2007
  • Demand for the use of 3D CAD DMU systems over the Internet environment has been increased. However, transmission of commercial 3D kernels has delayed the communication effectiveness due to the kernel size. Light weight CAD geometric kernel design methodology is required for rapid transmission in the distributed environment. In this paper, an assembly data structure suitable for the top-down and bottom-up assembly models has been constructed. Part features are stored without a hierarchy so that they are created and saved in no particular order. In particular, this paper proposes a new assembly representation model, called multi-level assembly representation (MAR), for the PDM based assembly DMU system. Since the geometric kernel retains assembly hierarchy and topological information, it is applied to the web-viewer for the PDM based DMU system. Effectiveness of the proposed geometric kernel is confirmed through various case studies.

Development of Distributed Interactive Stochastic Combat Simulation (DISCSIM) Model (확률적 전투모형과 분산 네트워크 적용)

  • Hong, Yoon-Gee;Kwon, Soon-Jong
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1999.10a
    • /
    • pp.210-216
    • /
    • 1999
  • Todays computer communication technology let people to do many unrealistic things possible and the use of those technologies is becoming increasingly prevalent throughout the military operation. Both DIS and ADS are welled defined computer aided military simulations. This study discusses a simulation of stochastic combat network modeling through Internet. We have developed two separate simulation models, one for clients and another for server, and validated for conducting studies with these two models. The object-oriented design was necessary to define the system entities and their relationship, to partition functionality into system entities, and to transform functional metrics into realizations derived from system component behaviors. Heterogeneous forces for each side are assumed at any battle node. The time trajectories for mean number of survivors at each node, some important combat measures, and relative difference computations between models were made. We observe and may conclude that the differences exist and some fo these are significant based on a limited number of experiments.

  • PDF

An Analysis of Effective Factors in Public Awareness Campaigns through Facebook: Focus on Fine Dust Issues

  • Nguyen, Thanh-Mai;Jo, Sam-sup
    • International Journal of Contents
    • /
    • v.17 no.4
    • /
    • pp.35-45
    • /
    • 2021
  • In this study, we analyzed the factors that affect public awareness campaigns on social media platforms and developed an integrated model for measuring the persuasiveness of environmental social media campaigns. A survey questionnaire was created and distributed on Facebook with the goal of reaching individuals in their 20s and 40s in Vietnam, and 395 valid replies were gathered. The findings showed that the STOPS was reconfirmed as a suitable theoretical framework for analyzing the public's behaviour intention to conduct information related to the issue of fine dust, especially on social media. Furthermore, it also showed that social media efficacy has a moderating effect on the relationship between public's situational recognition and informational behaviour intention. This suggested that through social media platforms, personal characteristics play a vital part in developing effective environmental campaigns. Implications for both theory and practice were discussed.

A DDoS attack Mitigation in IoT Communications Using Machine Learning

  • Hailye Tekleselase
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.170-178
    • /
    • 2024
  • Through the growth of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have appeared to wireless communication system, especially in cybersecurity. And IoT networks are gradually attractive stages for introduction of DDoS attacks due to integral frailer security and resource-constrained nature of IoT devices. This paper emphases on detecting DDoS attack in wireless networks by categorizing inward network packets on the transport layer as either "abnormal" or "normal" using the integration of machine learning algorithms knowledge-based system. In this paper, deep learning algorithms and CNN were autonomously trained for mitigating DDoS attacks. This paper lays importance on misuse based DDOS attacks which comprise TCP SYN-Flood and ICMP flood. The researcher uses CICIDS2017 and NSL-KDD dataset in training and testing the algorithms (model) while the experimentation phase. accuracy score is used to measure the classification performance of the four algorithms. the results display that the 99.93 performance is recorded.

On Cyclic Delay Diversity with Single Carrier OFDM Based Communication Network

  • A. Sathi Babu;M. Muni Chandrika;P. Sravani;M. Sindhu sowjanyarani;M. Dimpu Krishna
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.95-100
    • /
    • 2024
  • Cyclic Delay Diversity (CDD) is a diversity scheme used in OFDM-based telecommunication systems, transforming spatial diversity into frequency diversity and thus avoiding intersymbol interference without entailing the receiver to be aware of the transmission strategy making the signal more reliable achieving full diversity gain in cooperative systems. Here the analyzation of the influence of CDD-SC scheme in Cognitive Radio Network (CRN) is done with the challenge of overcoming the complication called channel estimation along with overhead in CNR. More specifically, the closed-form expressions for outage probability and symbol error rate are divided under different frequencies among independent and identically distributed (i.i.d.) frequency selective fading channel model i.e., the signal is divided into different frequencies and transmitted among several narrow band channels of different characteristics. It is useful in the reduction of interference and crosstalk. The results reveal the diversity order of the proposed system to be mainly affected by the number of multipath components that are available in the CNR.

A P2P-based Management Method for Dynamic AOI (동적 AOI를 위한 P2P 기반 관리기법)

  • Lim, Chae-Gyun;Rho, Kyung-Taeg
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.211-216
    • /
    • 2011
  • Networked virtual environments (NVEs) are distributed systems where geographically dispersed users interact with each other in virtual worlds by exchanging network messages. Massively Multiplayer Online Game (MMOG) is one of diverse applications where more than hundreds of users enjoy experiencing virtual worlds. A limited area called area of interest (AOI) in MMOG is reduced the load caused by message exchange between users. Voronoi-based Overlay Network (VON) is proposed to reduce the bandwidth consumption in P2P environments and Vorocast also is made using message forwarding in VON. We propose a dynamic AOI management method that solves problems such as a consistency and latency due to forwarding position updates to neighbor nodes from the message originator in forwarding scheme. Our scheme provides the consistency and reduces latency by combining direct connection scheme and Vorocast scheme compared to existing schemes. The communication between a user and users existing in center circle within AOI of the user is directly connected and the communication between the user and users existing outside the center area within AOI is using Vorocast scheme. The proposed model is evaluated through simulations.

Energy-Aware Traffic Engineering in Hybrid SDN/IP Backbone Networks

  • Wei, Yunkai;Zhang, Xiaoning;Xie, Lei;Leng, Supeng
    • Journal of Communications and Networks
    • /
    • v.18 no.4
    • /
    • pp.559-566
    • /
    • 2016
  • Software defined network (SDN) can effectively improve the performance of traffic engineering and will be widely used in backbone networks. Therefore, new energy-saving schemes must take SDN into consideration; this action is extremely important owing to the rapidly increasing energy consumption in telecom and Internet service provider (ISP) networks. Meanwhile, the introduction of SDN in current networks must be incremental in most cases, for technical and economic reasons. During this period, operators must manage hybrid networks in which SDN and traditional protocols coexist. In this study, we investigate the energy-efficient traffic engineering problem in hybrid SDN/Internet protocol (IP) networks. First, we formulate the mathematical optimization model considering the SDN/IP hybrid routing mode. The problem is NP-hard; therefore, we propose a fast heuristic algorithm named hybrid energy-aware traffic engineering (HEATE) as a solution. In our proposed HEATE algorithm, the IP routers perform shortest-path routing by using distributed open shortest path first (OSPF) link weight optimization. The SDNs perform multipath routing with traffic-flow splitting managed by the global SDN controller. The HEATE algorithm determines the optimal setting for the OSPF link weight and the splitting ratio of SDNs. Thus, the traffic flow is aggregated onto partial links, and the underutilized links can be turned off to save energy. Based on computer simulation results, we demonstrate that our algorithm achieves a significant improvement in energy efficiency in hybrid SDN/IP networks.

A Scalability based Energy Model for Sustainability of Blockchain Networks (블록체인 네트워크의 지속 가능성을 위한 확장성 기반 에너지 모델)

  • Seung Hyun Jeon;Bokrae Jung
    • Journal of Industrial Convergence
    • /
    • v.21 no.8
    • /
    • pp.51-58
    • /
    • 2023
  • Blockchains have recently struggled to design for the ideal distributed trust networks by solving scalability trilemma. However, local conflicts between some countries lead to imbalance on energy distribution. Besides, blockchain networks (e.g., Bitcoin) currently consume enormous energy for transaction and mining. The existing data volume based trust model evaluated an increasing blockchain size better than Lubin's trust model in scalability trilemma. In this paper, we propose a scalability based energy model to evaluate sustainability for blockchain networks, considering energy consumption for transaction, time duration, and the blockchain size of growing blockchain networks. Through the rigorous numerical analysis, we compare the proposed scalability based energy model with the existing model for the satisfaction and optimal blockchain size. Thus, the scalability based energy model will provide an assessment tool to choose the proper blockchain networks to solve scalability trilemma problem and prove sustainability.

Efficient Detction and Defence Model against IP Spoofing Attack through Cooperation of Trusted Hosts (신뢰 호스트 상호 협력을 통한 IP 스푸핑 공격의 효율적 탐지 및 방어 모델 설계)

  • Lee, Hae-Dong;Ha, Hyeon-Tae;Baek, Hyun-Chul;Kim, Chang-Gun;Kim, Sang-Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2649-2656
    • /
    • 2012
  • Today, many enterprises have invested heavily for the part of information security in order to protect the internal critical information assets and the business agility. However, there is a big problem that big budget and too many manpower are needed to set the internal corporate network up to the same high level of defense for all of part. On the distributed enterprise networks in this paper, a defense model for effective and rapid response on the IP spoofing attack was designed to protect the enterprise network through the exchange of information between the trust hosts when an attacker attacked any target system using other trusted host.

Certificate Management System of MANET for Stable Ubiquitous Service (안전한 유비쿼터스 서비스를 위한 MANET의 인증서 관리 시스템에 관한 연구)

  • Oh Suk-Sim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1558-1564
    • /
    • 2006
  • This study addressed security requirements for ad-hoc network environments, which lies at the hour of the ubiquitous computing revolution and proposed a partially-distributed certificate management system that can ensure security in mobile ad-hoc networks. The proposed model is characterized by ie ability to handle dynamic mobility of nodes, minimize routing load and enhance expandability of network by allowing participating nodes to authenticate each other without being interrupted by joining the cluster. The security, efficiency and robustness of the proposed model were evaluated through simulation.