• Title/Summary/Keyword: Information network

Search Result 31,247, Processing Time 0.052 seconds

Development of an Obstacle Avoidance Algorithm for a Network-based Autonomous Mobile Robot (네트워크 기반 자율이동로봇을 위한 장애물 회피 알고리즘 개발)

  • Kim Hongryeol;Kim Dae Won;Kim Hong-Seok;Sohn SooKyung
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.5
    • /
    • pp.291-299
    • /
    • 2005
  • An obstacle avoidance algorithm for a network-based autonomous mobile robot is proposed in this paper. The obstacle avoidance algorithm is based on the VFH(Vector Field Histogram) algorithm and two delay compensation methods with the VFH algorithm are proposed for a network-based robot with distributed environmental sensors, mobile actuators, and the VFH controller. Firstly, the environmental sensor information is compensated by prospection with acquired environmental sensor information, measured network delays, and the kinematic model of the robot. The compensated environmental sensor information is used for building polar histogram with the VFH algorithm. Secondly, a sensor fusion algorithm for localization of the robot is proposed to compensate the delay of odometry sensor information and the delay of environmental sensor information. Through some simulation tests, the performance enhancement of the proposed algorithm in the viewpoint of efficient path generation and accurate goal positioning is shown here.

Coexistence of OSCR-Based IR-UWB System with IEEE 802.11a WLAN

  • Wu, Weiwei;Huang, Han;Yin, Huarin;Wang, Weidong;Wang, Dong-Jin
    • ETRI Journal
    • /
    • v.28 no.1
    • /
    • pp.91-94
    • /
    • 2006
  • Impulse radio (IR) is a competitive candidate for ultra-wideband (UWB) systems. In this letter, we evaluated the coexistence of an IR-UWB system based on an orthogonal sinusoidal correlation receiver (OSCR) with an IEEE 802.11a WLAN through a detailed simulation. The coexistence performance of the two systems is characterized in terms of the receiver's bit-error rates. Then, some approaches to interference mitigation are discussed.

  • PDF

Estimating Qualitative Intimacy among Users in Social Networks (Social Networks 사용자간의 친밀도 산정)

  • Oh, Jung-Woon;Yoon, Soung-Woong;Lee, Sang-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06c
    • /
    • pp.31-35
    • /
    • 2008
  • Social Network는 웹 환경에서 개인을 중심으로 뻗어 나가는 연결로서 사용자별 프로필을 탐색하고 새로운 연결 및 정보의 소통을 지원한다. 이러한 상호신뢰를 바탕으로 구축된 Social Network 환경 내 구성원들이 가지고 있는 속성(Feature)을 이용하여 사용자간 친밀도를 산정한다면 친구 및 동호회 추천 등 Social Network 내부의 효율 향상 뿐만 아니라 웹 검색 등 다양한 사용자간의 공통 활동에도 응용할 수 있다. 본 논문에서는 Social Network 사용자간 친밀도를 산정하기 위한 방법을 제시한다. 기존의 친밀도가 없이 구성되어 있는 사용자간의 관계를 사용자의 속성(Feature)에 내재된 정보를 이용하여 주제의 유사성과 접근성을 이용하여 산정하였으며, 이는 Social Network 성격의 규명과 사용자의 정보 요구에 대한 판단의 척도로 사용될 수 있다.

  • PDF

MFSC: Mean-Field-Theory and Spreading-Coefficient Based Degree Distribution Analysis in Social Network

  • Lin, Chongze;Zheng, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3630-3656
    • /
    • 2018
  • Degree distribution can provide basic information for structural characteristics and internal relationship in social network. It is a critical procedure for social network topology analysis. In this paper, based on the mean-field theory, we study a special type of social network with exponential distribution of time intervals. First of all, in order to improve the accuracy of analysis, we propose a spreading coefficient algorithm based on intimate relationship, which determines the number of the joined members through the intimacy among members. Then, simulation show that the degree distribution of follows the power-law distribution and has small-world characteristics. Finally, we compare the performance of our algorithm with the existing algorithms, and find that our algorithm improves the accuracy of degree distribution as well as reducing the time complexity significantly, which can complete 29.04% higher precision and 40.94% lower implementation time.

An Log Visualization Method of Network Security Equipment for Private Information Security (개인정보 보호를 위한 네트워크 보안장비의 로그 가시화 방법 연구)

  • Sim, Hee-Youn;Kim, Hyung-Jong
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.31-40
    • /
    • 2008
  • Recently, network forensic research which analyzes intrusion-related information for tracing of attackers, has been becoming more popular than disk forensic which analyzes remaining evidences in a system. Analysis and correlation of logs from firewall, IDS(Intrusion Detect System) and web server are important part in network forensic procedures. This work suggests integrated graphical user interface of network forensic for private information leakage detection. This paper shows the necessity of various log information for network forensic and a design of graphical user interface for security managers who need to monitor the leakage of private information.

  • PDF

Differentiated Charging for Elastic Traffic

  • Lee, Hoon;Yoon Uh;Eom, Jong-Hoon;Hwang, Min-Tae;Lee, Yong-Gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12C
    • /
    • pp.190-198
    • /
    • 2001
  • In this paper, the authors propose methods for determining the differentiated price for elastic traffic in IP (Internet Protocol) network. First, we investigate the behavior in the consumption of bandwidth of elastic traffic in IP network. Next, we propose a method to relate the bandwidth usage with the pricing for the elastic traffic, which is based partially or fully on the usage rate of the network bandwidth. After that, we propose a charging function for elastic traffic, which is based on the de facto usage of the bandwidth. Finally, we will illustrate the implication of the work via simple numerical experiments.

  • PDF

Database Security System for Information Protection in Network Environment

  • Jung, Myung-Jin;Lee, Chung-Yung;Bae, Sang-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.211-215
    • /
    • 2003
  • Network security should be first considered in a distributed computing environment with frequent information interchange through internet. Clear classification is needed for information users should protect and for information open outside. Basically proper encrypted database system should be constructed for information security, and security policy should be planned for each site. This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

  • PDF

Comparison Analysis of Co-authorship Network and Citation Based Network for Author Research Similarity Exploration

  • Jeeyoung, Yoon;Min, Song
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.4
    • /
    • pp.269-284
    • /
    • 2022
  • Exploring research similarity of researchers offers insight on research communities and potential interactions among scholars. While co-authorship is a popular measure for studying research similarity of researchers, it cannot provide insight on authors who have not collaborated yet. In this work, we present novel approach to capture research similarity of authors using citation information. Extensive study is conducted on DATA & KNOWLEDGE ENGINEERING (DKE) publications to demonstrate and compare suggested approach with co-authorship based approach. Analysis result shows that proposed approach distinguishes author relationships that is not shown in co-authorship network.

Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network

  • Zhou, Jingxian;Wang, Zengqi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1773-1795
    • /
    • 2020
  • Unmanned aerial vehicles (UAVs) network are a very vibrant research area nowadays. They have many military and civil applications. Limited bandwidth, the high mobility and secure communication of micro UAVs represent their three main problems. In this paper, we try to address these problems by means of secure clustering, and a security clustering algorithm based on integrated trust value for UAVs network is proposed. First, an improved the k-means++ algorithm is presented to determine the optimal number of clusters by the network bandwidth parameter, which ensures the optimal use of network bandwidth. Second, we considered variables representing the link expiration time to improve node clustering, and used the integrated trust value to rapidly detect malicious nodes and establish a head list. Node clustering reduce impact of high mobility and head list enhance the security of clustering algorithm. Finally, combined the remaining energy ratio, relative mobility, and the relative degrees of the nodes to select the best cluster head. The results of a simulation showed that the proposed clustering algorithm incurred a smaller computational load and higher network security.

A Framework for implementing Knowledge Network using Social Network Analysis

  • Hwang, Hyun-Seok;Kim, Su-Yeon
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.139-142
    • /
    • 2005
  • Recently research interest in Knowledge Management (KM) has grown rapidly. Companies regard intellectual capital as important asset and strive to deploy KM in an organization to gain a competitive edge. Many organizations currently engage in knowledge management in order to leverage knowledge both within their organization and externally to their shareholders and customers. Most of the previous research related to KM are dedicated to investigate the role of information technology in extracting, capturing, sharing, coverting organizational knowledge. Knowledge workers, however, are paid less attention though they are the key players in KM activities such as knowledge creation, dissemination, capture and conversion. We regard knowledge workers as a major component of KM and starting point of understanding organizational knowledge activities. Therefore we adopt a method to understand and analyze knowldge workers' social relationships. In this paper we investigate Social Network Analysis (SNA) as a tool for analyzing knowledge network. We introduce the basic concept of SNA and suggest a framework for implementing knowledge network by explaining how SNA can be used for analyzing knowledge network. We also propose a numerical method for identifying knowledge workers using SNA after classifying knowledge workers. The suggested method is expected to help understanding key knowledge players within an organization.

  • PDF