• Title/Summary/Keyword: Integrated Information Network

Search Result 1,430, Processing Time 0.025 seconds

The Method of Creating the Road Network Database for an Integrated Road Management System (도로관리 종합정보 시스템을 위한 도로망 데이타베이스 구축방안)

  • 김충평;이강원;김경희
    • Spatial Information Research
    • /
    • v.3 no.1
    • /
    • pp.55-63
    • /
    • 1995
  • The database design, which logically sets the base structure and orga¬nization of the database, is performed by considering the users requirement, the relations between various data, and the relations between data and application field.The road network data must be created to have geometrical topological structure, because various data elements are needed to recognize the state of each section and to relate between data element. In this study, we propose a method of creating the road network database for an integrated road management system.

  • PDF

Handover Control for WCDMA Femtocell Networks

  • Chowdhury, Mostafa Zaman;Jang, Yeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.741-752
    • /
    • 2010
  • The ability to seamlessly switch between the macro networks and femtocell networks is a key driver for femtocell network deployment. The handover procedures for the integrated femtocell/macrocell networks differ from the existing handovers. Some modifications of existing network and protocol architecture for the integration of femtocell networks with the existing macrocell networks are also essential. These modifications change the signal flow for handover procedures due to different 2-tier cell (macrocell and femtocell) environment. The handover between two networks should be performed with minimum signaling. A frequent and unnecessary handover is another problem for hierarchical femtocell/macrocell network environment that must be minimized. This work studies the details mobility management schemes for small and medium scale femtocell network deployment. To do that, firstly we present two different network architectures for small scale and medium scale WCDMA femtocell deployment. The details handover call flow for these two network architectures and CAC scheme to minimize the unnecessary handovers are proposed for the integrated femtocell/macrocell networks. The numerical analysis for the proposed M/M/N/N queuing scheme and the simulation results of the proposed CAC scheme demonstrate the handover call control performances for femtocell environment.

Bandwidth Enhancement for a Proximity Coupled Microstrip patch Antenna with an Impedance Matching Network (임피던스 정합기를 이용한 근접 결합 급전 패치 안테나의 대역폭 확장)

  • Kwak, Eun-Hyuk;Kim, Boo-Gyoun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.2
    • /
    • pp.55-69
    • /
    • 2015
  • Bandwidth enhancement technique for a proximity coupled patch antenna is investigated. The bandwidth and radiation characteristics of a proximity coupled patch antenna with an integrated impedance matching network printed on substrates with various dielectric constants and thicknesses are compared to those of a proximity coupled patch antenna without an impedance matching network. The bandwidth of a proximity coupled patch antenna with an integrated impedance matching network is greatly increased than that of a proximity coupled patch antenna without an impedance matching network without the degradation of radiation characteristics.

Mechanism of Authentication Procedure between Ad Hoc Network and Sensor Network (에드 홉 네트워크와 개별 센서 네트워크 간의 인증 절차 메카니즘)

  • Kim, Seungmin;Yang, Jisoo;Kim, Hankyu;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.160-161
    • /
    • 2013
  • Extending mobile IP to ad hoc networks with the foreign agent acting as the bridge between the wired network and ad hoc networks can provide the global Internet connectivity for ad hoc hosts. The existing research in the area of the integrated wired and ad hoc network is carried out in a non-adversarial setting. This paper analysed an effective solution to solve the security related problems encountered in these integrated networks. This security protocol also excludes malicious nodes from performing the ad hoc network routing. This paper focuses on preventing ad hoc hosts from the attacks of anti-integrity.

  • PDF

A Study for the Designing and Efficiency Measuring Methods of Integrated Multi-level Network Security Domain Architecture (Multi-level 네트워크의 보안 도메인을 위한 통합 아키텍쳐 설계 및 효율성 측정방법 연구)

  • Na, Sang Yeob;Noh, Si Choon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.87-97
    • /
    • 2009
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. This study is based on analysis of diagnostic weakness structure in the network security domain. We propose an improved integrated multi-level protection domain for in the internal route of groupware. This paper's protection domain is designed to handle the malicious data traffic in the groupware and finally leads to lighten the load of data traffic and improve network security in the groupware. Infrastructure of protection domain is transformed into five-stage blocking domain from two or three-stage blocking. Filtering and protections are executed for the entire server at the gateway level and internet traffic route ensures differentiated protection by dividing into five-stage. Five-stage multi-level network security domain's malicious data traffic protection performance is better than former one. In this paper, we use a trust evaluation metric for measuring the security domain's performance and suggested algorithm.

Determinants of Writing Research According to International Standards in Web of Science Journals

  • Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.94-102
    • /
    • 2021
  • The study aimed to define all the main determinants of writing a research paper in an integrated manner within the requirements of the science network journals, by introducing scientific research and the steps of writing a research paper, starting from choosing the title to writing the abstract, identifying the research problem, questions, importance and objectives of the study, how to choose previous studies, research methodology and tools, discussion and results In addition to determining the acceptable percentage of plagiarism for science network journals, recommendations, choosing appropriate references and choosing the appropriate references, in addition to determining the acceptable percentage of plagiarism for the journals of the Network of Science, the researcher used the method of analytical investigative research to find out the axes of the study and analyze different reference citation methods to deal with different sources of information (articles-books-theses-conference works-reviews), In addition to studying the most important international programs for measuring plagiarism ratios that are accredited within the journals of the Science Network, and the study concluded that the researcher must present original and innovative results, add an integrated and logical work, take into account all the scientific conditions in the design of the research, its steps and ethics, and take into account the international standards in citing Reference, taking into account the rates of plagiarism within Web of Science journals.

An Integrated QoS Support Architecture of Wireless Home Network Based on IEEE 802.11 Wireless LAN for Multimedia Services (IEEE 802.11 무선랜을 기반으로 하는 무선 홈 네트워크 환경에서의 멀티미디어 서비스를 위한 통합적인 QoS 제공 구조)

  • Hong, Sung-Hwa;Kim, Byoung-Kug;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3B
    • /
    • pp.100-111
    • /
    • 2008
  • In this paper, to support a QoS level appropriate for the user in Wireless Home Network based Wireless LAN, we propose a QoS support architecture which includes Wired Network and Wireless Network. Actually, an important problem to support QoS in Wireless Home Network is approached not only on a MAC level in Wireless LAN but on a integrated method to combine Network layer with Datalink layer. Applying the integrated QoS support method. It is possible to provide QoS support architecture using a Wireless LAN terminal with a minimum changing, the proposed scheme has advantage of QoS support method, which is more superior than a existing scheme to support QoS in MAC level of Wireless LAN. Simulation results that overall performance of the proposed scheme can be improved.

Transistorized Two-line Four-line Connecting Network (능동소자로 구성한 2선식-4선식 접속회로)

  • 이영근
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.12 no.2
    • /
    • pp.28-30
    • /
    • 1975
  • In this paper a new network configuration for two-line four-line connection in telephone transmission system is proposed. It is proved that this network configuration is useful not only in an anti-sidatone circuit for telephone substation but also in a repeater station in the telephone system. It can ba realized in an integrated circuit.

  • PDF

Design and Simulation of Policy Based Integrated Server System Capable to Provide Real-time Internet Security Service (실시간 인터넷 보안 서비스 제공을 위한 정책기반 통합 서버 설계 및 시뮬레이션)

  • Kim, Gi-Yeong;An, Gae-Il;Jang, Jong-Su;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.565-572
    • /
    • 2001
  • Recently, due to the open architecture of the internet and wide spread of internet users, the cyber terror threatens to the network\`s weak point are tending grow. Until now, information security solutions are passive on security host and particular security system. This passive information security solution is weak from the attacks through the networks connected worldwide internet systems, and has limitation on the defense against cyber terror attacks. Therefore, network level integrated security function must be provided. In this paper, we consider technology limitations on the information security problems and its environment. Then we present the architecture and functions of policy-based information security services for network level active information security function. This paper also includes design of target system, which provide information security services. Finally, we discuss network level system deployment direction and discuss with Network Security Simulation.

  • PDF

A Study on the 3D-Puzzle Security Policy in Integrated Security System Network (통합보안 시스템 망 내 3차원-Puzzle 보안정책에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.425-434
    • /
    • 2010
  • This study shows a limit to attacks that the prevention system, which is used as the mutual third aggressive packet path between open heterogeneous networks and applies prevention techniques according to the trace like IP tracking and attack methods, can prevent. Therefore, the study aims to learn information of constant attack routing protocol and of the path in network, the target of attack and build a database by encapsulating networks information routing protocol operates in order to prevent source attack paths. In addition, the study is conducted to divide network routing protocols developed from the process of dividing the various attack characters and prevent various attacks. This study is meaningful in that it analyzes attack path network and attacks of each routing protocol and secure exact mechanism for prevention by means of 3D-Puzzle, Path, and Cube of the integrated security system which is an implementation method of integrated information protection for access network defense.