• Title/Summary/Keyword: Information transmission way

Search Result 420, Processing Time 0.025 seconds

Power Transmission Line Routing Using GIS (지리정보시스템을 이용한 송전선로 경과지선정)

  • Min, Kyu-Ho;Park, Byoung-Won;Roh, Jae-Deok;Oh, Chol-Ho
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.5 no.1 s.9
    • /
    • pp.119-128
    • /
    • 1997
  • With the rapid socioeconomic change the siting of SOC is getting more difficult due to so-called NIMBY syndrome. The objective methodology using GIS was かid as a case study to solve the complexity of the power transmission line routing. We anticipated that the new optimization of transmission routing would be the efficient and reasonable way in getting the public acceptance and settling the public complaints from transmission construction project in our country.

  • PDF

SD-ICN: Toward Wide Area Deployable Software Defined Information Centric Networking

  • Xing, Changyou;Ding, Ke;Hu, Chao;Chen, Ming;Xu, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2267-2285
    • /
    • 2016
  • Information Centric Networking that uses content name instead of IP address as routing identifier can handle challenges such as traffic explosion and user mobility, but it also suffers from scalability and incompatibility problems. In this paper by combining the concept of software defined networking and Internet end to end arguments, we propose a wide area deployable software defined information centric networking service model named SD-ICN. SD-ICN employs a dual space structure that separates edge service network and core transmission network. The enhanced SDN techniques are used in edge service network in order to implement intelligent data routing and caching, while traditional IP technique is reserved in core transmission network so as to provide wide area high speed data transmission. Besides, a distributed name resolution system based on the cooperation of different controllers is also presented. The prototype experiments in our campus network show that SD-ICN can be deployed in a scalable and incremental way with no modification of the core network, and can support typical communication modes such as multicast, mobility, multihoming, load balancing, and multipath data transmission effectively.

Efficient Aggregation and Routing Algorithm using Local ID in Multi-hop Cluster Sensor Network (다중 홉 클러스터 센서 네트워크에서 속성 기반 ID를 이용한 효율적인 융합과 라우팅 알고리즘)

  • 이보형;이태진
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.135-139
    • /
    • 2003
  • Sensor networks consist of sensor nodes with small-size, low-cost, low-power, and multi-functions to sense, to process and to communicate. Minimizing power consumption of sensors is an important issue in sensor networks due to limited power in sensor networks. Clustering is an efficient way to reduce data flow in sensor networks and to maintain less routing information. In this paper, we propose a multi-hop clustering mechanism using global and local ID to reduce transmission power consumption and an efficient routing method for improved data fusion and transmission.

  • PDF

Compensation for Distorted Signals by using Optimal Pump Light Power in WDM Systems with Non-midway Optical Phase Conjugator

  • Lee Seong-Real
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7A
    • /
    • pp.542-549
    • /
    • 2005
  • In this paper, the optimal pump light power of optical phase conjugator (OPC) and the compensation characteristics of distorted WDM channel signals are numerically investigated, when the OPC with highly-nonlinear dispersion shifted fiber (HNL-DSF) not be placed at the mid-way of total transmission length. The total dispersion of former half section and latter half section is assumed to be same each other in this approach. It is confirmed that, in WDM transmission systems with OPC deviated from the mid-way, the pump light power for best compensation must be flexible selected depending on the OPC position. This optimal pump light power is gradually increased as the OPC is gradually closer to the receiver. Consequently, it is possible to establish the compensation system independent on the OPC position by setting optimal pump light power connected with the OPC position.

Improving Channel Capacity in Bidirectional Cooperative MIMO Relay Network

  • Niyizamwiyitira, Christine;Kang, Chul-Gyu;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.956-958
    • /
    • 2010
  • The paper considers MIMO two-way scheme to optimize the end to end capacity in local wireless mesh network. The basic idea is to perform data transmission via intermediate cooperative nodes and cooperative relay therefore higher throughput can be achieved. Each node is equipped with multiple antennas, and has two time slots one for transmission (Tx) and the other is reception (Rx), which are arranged alternatively in the network. In the conventional SISO network, it takes at least four time slots to accomplish the function of two-way relay. Moreover, cooperative technique is used in order to enhance multiplexing of forward and backward streams.

  • PDF

A Study on Leakage of Critical Information via the Power Analysis of Power Lines (전원선의 전력분석을 이용한 주요정보 유출 가능성에 관한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.11
    • /
    • pp.1571-1574
    • /
    • 2014
  • In this paper, we propose a unidirectional transmission of critical information obtained by keyboard hacking or kernel and keyboard driver hacking even though the computer is not connected to the external network. We show the hacking can be attempted in the proposed method to show the way preventing such attempts in advance. Firewalls and other various methods are used to prevent the hacking from the external network but the hacking is also attempted in various ways to detour the firewall. One of the most effective way preventing from the hacking attack is physically disconnect the internal intranet systems from the external internet and most of the government systems, military systems and big corporate systems are using this way as on one of the protection method. In this paper, we show the feasibility of transmission of security codes, etc via the short message to the external network on the assumption that a hacking program such as Trojan Horse is installed on the computer systems separated from the external network. Previous studies showed that the letters on the monitor can be hijacked by electromagnetic analysis on the computer to obtain the information even though the system is not connected ti the network. Other studies showed that the security code hint can obtained by analyzing the power consumption distribution of CPU. In this paper, the power consumption distribution of externally accessible power line is analyzed to obtain the information and the information can be transmitted to the external network. Software controlling the CPU and GPU usage is designed to control the power supply of computer. The sensors such as the Rogowski coils can be used on the external power line to collect the data of power consumption change rates. To transmit the user password by short message, due to the capacitive components and the obstacle from other power supply, A very slow protocol are used.

An efficient Channel Estimation Technique of OFDM-Base Space-Time Coded Wireless LAN Systems

  • Kim, Dong-Ok
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.2
    • /
    • pp.61-66
    • /
    • 2004
  • This paper presents a way to maximize transmission efficiency and reception ability through transmission diversity technology, which can be adapted to wireless multimedia Wireless LAN system. The presented method is a comparative analysis between a case where parameter a for time average is 0.3.1 with consideration of channel presumption with two types of rms delayed spread, which is 50nsec. 150nsec, for the performance analysis of STTC (Space-Time Trellis Code) adopting time-space ciphering method appropriate for MIMO channel, and performance in the case where presumed channel value from long training column section is applied to according frame in a single frame. The result showed that BER brought SNR improvement of l.0dB in $10^{-3}$ when a was 0.3 than adopting only the long training column, and showed increase of general performance improvement for the sake of time average rather than the case without.

A Propulsion Device Control using Communication Networks (통신망을 이용한 추진장치의 제어)

  • 이현두;정만규;고영철;방이석
    • Proceedings of the KIPE Conference
    • /
    • 1999.07a
    • /
    • pp.270-273
    • /
    • 1999
  • This paper describes the characteristics of two methods about providing information needed for propulsion device control in train. The one is to use new way using the communication network for transmission of control information, the other is traditional way using hardwire connection. And this paper describes the communication interface technique between TCMS(Train Control and Monitoring System) and VVVF inverter system with LonWorks network adapted to SMG line 6 which has been developed. With this technique, an inertia load test carried out for the traction control environment and it is expecting a field test at SMG line 6.

  • PDF

Power Tracing Method for Transmission Usage Allocation Considering Reactive Power

  • Han Choong-Kyo;Park Jong-Keun;Jung Hae-Sung
    • KIEE International Transactions on Power Engineering
    • /
    • v.5A no.1
    • /
    • pp.79-84
    • /
    • 2005
  • In many countries, the electric power industry is undergoing significant changes known as deregulation and restructuring. These alterations introduce competition in generation and retail and require open access to the transmission network. The competition of the electric power industry causes many issues to surface. Among them, unbundling of the transmission service is probably the most complicated as it is a single and integrated sector and the transmission revenue requirement must be allocated to market participants in a fair way. In these situations, it is valuable to research the methodologies to allocate transmission usage. The power tracing method offers useful information such as which generators supply a particular load or how much each generator (load) uses a particular transmission line. With this information, we can allocate required transmission revenue to market participants. Recently, several algorithms were proposed for tracing power flow but there is no dominant power tracing method. This paper proposes a power tracing method based on graph theory and complex-current distribution. For practicability, the proposed method for transmission usage allocation is applied to IEEE 30 buses and compared with the method proposed by Felix F.Wu.

Design Process Systematization of Transmission-Lever Using the DSM (DSM(Design Structure Matrix)을 이용한 Transmission-Lever 설계과정의 체계화)

  • 천준원;박지형;김태수
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.10a
    • /
    • pp.763-767
    • /
    • 2002
  • This paper explores a structuring method for solid modeling processes of an automobile automatic transmission-lever design. The aim of this work is to establish standard procedures to minimize iterations and trial and errors during the product development process to increase development time and costs. The design of the transmission-lever is periodically required to be changed with the model change of an automobile. The transmission-lever design process has mainly depended on the designer's experience. It causes to make difficulties to handle the dependency of components. The design process can be improved by resolving the dependency problem using the DSM. The process of applying the DSM provides a systematic way for the solid modeling of transmission-lever by the consideration of geometry dependency.

  • PDF