• Title/Summary/Keyword: Innovation Network

Search Result 928, Processing Time 0.023 seconds

The Research about a Control Data Duplication Transmission Technique (제어데이터 중복전송기법에 관한 연구)

  • Lee, Young-Ju;Kang, Soon-Duk
    • The Journal of Information Technology
    • /
    • v.9 no.4
    • /
    • pp.57-63
    • /
    • 2006
  • The intelligent elder brother groove network robot service the new broadband presence line is conversionce application service. Robot control data transmission hazard UDP packet of the remote control data which stands duplication necessary to transmit. TCP the error ratio to be high qualitative recording transmission pattern it of the transmission unit and is irregular the distance is distant to show and also the transmission lag is visible increases. The recording packet drop whose UDP degree error ratio will be high is frequent and does not arrive packet little by little increases is a possibility of knowing in the transmission unit. The technique which it proposes with traffic pattern of the transmission unit is visible the transfer characteristic of the same shape from 1% packet error ratio degree. The effective transmission technique of the robot control data which puts a base in UDP protocols was proposed from the present paper. Following research it leads and it follows the duplication transmission number of time in error rate of radio link and it was thought all that controls petty the research of the mechanism which progresses is necessary.

  • PDF

Design of a Camera Calibration System in a Smart Thermo-Sensor Based Network (스마트 열센서 네트워크의 카메라 미세조정을 위한 시스템 구축)

  • Moon Sang-Gook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.924-926
    • /
    • 2006
  • Sensor networks are an emerging area of mobile computing. Networked sensors represent a new design paradigm enabled by advances in micro electro-mechanical systems (MEMS) and low power technology. Created with integrated circuit (IC) technology and combined with computational logic, these 'smart' sensors have the benefit of small size, low cost and power consumption, and, the capability to perform on-board computation. Though this recent technological innovation has shown a significant promise in many application domains, it has also exposed several technical limitations that must be improved. In this paper, we discuss the system deploy issues for infrared thermo sensor camera calibration.

  • PDF

Vulnerability Evaluation Methodology for firewall Certification (침입차단시스템 제품 인증을 위한 취약성 평가 방법)

  • 김점구
    • The Journal of Information Technology
    • /
    • v.3 no.3
    • /
    • pp.27-37
    • /
    • 2000
  • Although an insurance criterion for reliance is unified, the difference in evaluation mechanism in every country is already ambiguity. In other words, the aspect of objectivity would be a little because it is true that the vulnerability evaluation include evaluator, scenario and tools (TSVES) applying in test, depth and scope of evaluation. But evaluation results can be difference in accordance with each evaluation elements. By using TSVES to evaluating network security vulnerability, first, we expected the evaluation results is impartiality, objectivity, repeatability, reproducibility, appropriateness and soundness of results. Second, it could be transferred manual ways into automation ways, and then expected easiness and safety of extension and modification in a quality of products as well as a dramatical reduction of waste of time and energy.

  • PDF

Future direction of Public e-Marketplaces focused the Evolution of Business IT (정보기술의 진화과정 측면에서 본 중개형 e-마켓플레이스의 발전방향)

  • Lee, Jae-Keun
    • The Journal of Information Technology
    • /
    • v.6 no.1
    • /
    • pp.49-63
    • /
    • 2003
  • In recent years, the number of public e-Marketplaces have grown according to the leap-frogging advancement of network technology based on open communication architecture named Internet. However, the transaction volume through public e-Marketplaces have been an immaterial increase, and some well-known sites closed their businesses. This study proposes the public e-Marketplace as an e-Business system which has been recognized the most strategic application of business information technologies (Barrett & Konsynski, 1982; Cash & Konsynski, 1985), and suggests some future strategic and technological direction which supports a firm's transaction infrastructure under internet architecture. For this purpose, it reviews evolution of business information technologies.

  • PDF

A Study on Feature Extraction of Partial Discharge Type Using Wavelet Transform (웨이블렛변환을 이용한 부분방전 종류의 특징추출에 관한 연구)

  • Park, Jae-Jun
    • The Journal of Information Technology
    • /
    • v.6 no.1
    • /
    • pp.65-70
    • /
    • 2003
  • In this papers, we proposed the new method in order to diagnosis partial discharge type of transformers. For wavelet transform, Daubechie's filter is used,, we can obtain wavelet coefficients which is used to extract featrue of statistical parameters(maximum value, average value, dispersion, skewness, kurtosis) about high frequency current signal per 3-electrode type(needle-plane electrode, IEC electrode and Void electrode). Also, these coefficients are used to identify signal of internal partial discharge in transformer. As a result, from compare of high frequency current signal amplitude and average value, we are obtained results of IEC electrode> Void electrode> Needle-Plane electrode. Otherwise, in case of skewness and kurtosis, we are obtained results of Void electrode> IEC electrode> Needle-Plane electrode. As improved method in order to diagnosis partial discharge type of transformers, we use neural network.

  • PDF

Receiver-centric Buffer Blocking-aware Multipath Data Distribution in MPTCP-based Heterogeneous Wireless Networks

  • Cao, Yuanlong;Liu, Qinghua;Zuo, Yi;Ke, Fenfen;Wang, Hao;Huang, Minghe
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4642-4660
    • /
    • 2016
  • One major concern of applying Multipath TCP (MPTCP) to data delivery in heterogeneous wireless networks is that the utilization of asymmetric paths with diverse networking-related parameters may cause severe packet reordering and receive buffer blocking (RB2LOC). Although many efforts are devoting to addressing MPTCP's packet reordering problems, their sender-controlled solutions do not consider balancing overhead between an MPTCP sender and receiver, and their fully MPTCP mode cannot make MPTCP achieve a desired performance. This paper proposes a novel receiver-centric buffer blocking-aware data scheduling strategy for MPTCP (dubbed MPTCP-rec) necessitating the following aims: (1) alleviating MPTCP's packet reordering and RB2LOC problems, (2) improving the MPTCP performance, and (3) balancing load between the MPTCP sender and receiver. Simulation results show that the proposed MPTCP-rec solution outperforms the existing MPTCP solutions in terms of data delivery performance in heterogeneous wireless networks.

Energy Efficiency Optimization for multiuser OFDM-based Cognitive Heterogeneous networks

  • Ning, Bing;Zhang, Aihua;Hao, Wanming;Li, Jianjun;Yang, Shouyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.2873-2892
    • /
    • 2019
  • Reducing the interference to the licensed mobile users and obtaining the energy efficiency are key issues in cognitive heterogeneous networks. A corresponding rate loss constraint is proposed to be used for the sensing-based spectrum sharing (SBSS) model in cognitive heterogeneous networks in this paper. Resource allocation optimization strategy is designed for the maximum energy efficiency under the proposed interference constraint together with average transmission power constraint. An efficiency algorithm is studied to maximize energy efficiency due to the nonconvex optimal problem. Furthermore, the relationship between the proposed protection criterion and the conventional interference constraint strategy under imperfect sensing condition for the SBSS model is also investigated, and we found that the conventional interference threshold can be regarded as the upper bound of the maximum rate loss that the primary user could tolerate. Simulation results have shown the effectiveness of the proposed protection criterion overcome the conventional interference power constraint.

Current status, challenges and the way forward for dairy goat production in Asia - conference summary of dairy goats in Asia

  • Liang, Juan Boo;Paengkoum, Pramote
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.32 no.8_spc
    • /
    • pp.1233-1243
    • /
    • 2019
  • Asia hosts more than half of the world's 1 billion goats and is also where domestication of wild goats began. Goats, including dairy goats, are adapted to a wide variety of harsh environments and thus play key roles as providers of nutrition, food security and socio-economic status to their human owners in many low-income Asian countries. In many countries in Southeast and East Asia, medium and large scale commercial dairy goat farming can be profitable enterprises because of the high price of goat milk, and good demand due to its health and medicinal properties. In some Asian countries, dairy goats play important roles in non-commercial activities, including use as educational animals in elementary schools in Japan and show animals in Indonesia. Dairy goat farmers in Asia are faced with numerous challenges, such as a shortage of high producing animals adapted to the local environment, lack of quality feeds during a prolonged dry season, many diseases and difficulty getting their product to market, however, the increasing demand for goat milk in the newly developed and developed economies in Asia provides an optimistic future for dairy goat production in this region.

Author Co-citation Analysis for Digital Twin Studies (디지털 트윈 연구의 저자 동시인용 분석)

  • Kim, Sumin;Suh, Chang-Kyo
    • The Journal of Information Systems
    • /
    • v.28 no.3
    • /
    • pp.39-58
    • /
    • 2019
  • Purpose A digital twin is a digital replication of a physical system. Gartner identified the digital twin as one of the Gartner Top 10 Strategic Technology Trend for three years from 2017. The rapid development of the digital twin market is expected to bring about innovation and change throughout society, and much research has been done recently in academia. In this research, we tried to explore the main research trends for digital twin research. Design/methodology/approach We collected the digital twin research from Web of Science, and analyzed 804 articles that was published during time span of 2010-2018. A total of 41 key authors were selected based on the frequency of citation. We created a co-citation matrix for the core authors, and performed multivariate analysis such as cluster analysis and multidimensional scaling. We also conducted social network analysis to find the influential researchers in digital twin research. Findings We identified four major sub- areas of digital twin research: "Infrastructure", "Prospects and Challenges", "Security", and "Smart Manufacturing". We also identified the most influential researchers in digital twin research: Lee EA, Rajkumar R, Wan J, Karnouskos S, Kim K, and Cardenas AA. Limitation and further research suggestion were also discussed as a concluding remarks.

A Study on the Types and Characteristics of Global Fashion Clusters (글로벌 패션 산업 클러스터의 유형과 특성에 대한 연구)

  • Yun, So Jung;Lee, Ha Kyung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.43 no.4
    • /
    • pp.491-505
    • /
    • 2019
  • This study analyzes global fashion clusters to provide insight for the domestic fashion market to form a competitive fashion cluster. We examine formation factors and operation types of the global fashion clusters to understand their characteristics. We also explore the effectiveness of each global fashion cluster by investigating the stage of development in fashion clusters. Fourteen cases of global fashion clusters are collected and analyzed. First, global fashion clusters show three types of formation and operation: self-formation, self-formation & government based development, and government, institute, and enterprise based formation & development. Second, the characteristics of global fashion clusters are based on functions related to space, learning, innovation, network, and knowledge. Third, there are four steps in the development stage of global fashion clusters: professional clusters, industrial clusters, learning clusters and innovative industrial clusters. In particular, innovative industrial clusters, the final stage of development, have high levels of effectiveness in terms of co-growth and collaboration among fashion-related businesses in fashion clusters. The results of this study can help guide the development of local fashion cluster in Korea.