• 제목/요약/키워드: Internet Connectivity

검색결과 335건 처리시간 0.03초

A Development for Web -based Name-plate Production System by using Image Processing

  • Kim, Gibom;Youn, Cho-Jin
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.60.2-60
    • /
    • 2001
  • In this paper, manufacturing system and Internet are combined and NC milling machine engraves image and text on nameplate. Image and text are input through Internet. And NC tool path is obtained by thinning algorithm and NC part program is generated. Thinning algorithm detects center lines from image and text by using connectivity and tool path is obtained along the center line. Actually experiments are performed and thinning algorithm and G-code generation module are verified.

  • PDF

Internet Worm Propagation Model Using Centrality Theory

  • Kwon, Su-Kyung;Choi, Yoon-Ho;Baek, Hunki
    • Kyungpook Mathematical Journal
    • /
    • 제56권4호
    • /
    • pp.1191-1205
    • /
    • 2016
  • The emergence of various Internet worms, including the stand-alone Code Red worm that caused a distributed denial of service (DDoS), has prompted many studies on their propagation speed to minimize potential damages. Many studies, however, assume the same probabilities for initially infected nodes to infect each node during their propagation, which do not reflect accurate Internet worm propagation modelling. Thus, this paper analyzes how Internet worm propagation speed varies according to the number of vulnerable hosts directly connected to infected hosts as well as the link costs between infected and vulnerable hosts. A mathematical model based on centrality theory is proposed to analyze and simulate the effects of degree centrality values and closeness centrality values representing the connectivity of nodes in a large-scale network environment on Internet worm propagation speed.

소셜 사물인터넷에서 소셜 관계를 이용한 사물 추천 기법 (Things Recommendation Method using Social Relationship in Social Internet of Things)

  • 김성림;권준희
    • 디지털산업정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.49-59
    • /
    • 2014
  • The Internet of Things(IoT) is a new promising technology made from a variety of technology. The IoT links the objects or people, then enabling anytime, anywhere connectivity for anything and not only for anyone. Social networking services have changed the way people communicate. Recently, new research challenges in many areas of Internet of things and social networking services are fired. In this paper, we propose things recommendation method using social relationship in social Internet of Things. We study previous researches about social network service, IoT, and social IoT. We proposed SIoT_FW(Social IoT Friendship Weight) using static and a dynamic social friendship weight. Also, our method considers four social relationships (Ownership Object Relationship, Co-Location Object Relationship, Social Object Relationship, Parental Object Relationship). We presents a music device scenario using our proposed method.

On Inferring and Characterizing Internet Routing Policies

  • Wang, Feng;Gao, Lixin
    • Journal of Communications and Networks
    • /
    • 제9권4호
    • /
    • pp.350-355
    • /
    • 2007
  • Border gateway protocol allows autonomous systems(ASes) to apply diverse routing policies for selecting routes and for propagating reachability information to other ASes. Although a significant number of studies have been focused on the Internet topology, little is known about what routing policies network operators employ to configure their networks. In this paper, we infer and characterize routing policies employed in the Internet. We find that routes learned from customers are preferred over those from peers and providers, and those from peers are typically preferred over those from providers. We present an algorithm for inferring and characterizing export policies. We show that ASes announce their prefixes to a selected subset of providers to perform traffic engineering for incoming traffic. We find that the selective announcement routing policies imply that there are much less available paths in the Internet than shown in the AS connectivity graph, and can make the Internet extremely sensitive to failure events. We hope that our findings will help network operators in designing routing policies.

Low Rate VLC Receiver Design Using NCP302 Voltage Detector for IoT/IoL Connected Smart Homes

  • Lee, Beomhee;Mariappan, Vinayagam;Khudaybergenov, Timur;Han, Jungdo;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • 제7권4호
    • /
    • pp.50-56
    • /
    • 2018
  • The Internet of Things (IoT) and Visible Light Communication (VLC) is opening up new services in lighting industry by integrating sensory network features in addition to standard illumination functionality. In this progressive developments, the next generation lighting devices for smart homes are capable to sense the environmental conditions and transfer the captured data through lights to gateway controller to access remotely. The smart home environmental sensor information's are few kbps only so VLC systems need to built-in with low rate light connectivity to transfer data to the gateway. To provide error free communication, the quality of a received light signal is important to be considered when designing an VLC receiver. Therefore, this paper proposes the design of robust low rate IoL receiver design using NCP302 voltage detector for micro controller to adapt the IoT/IoL front end module for system integration. To evaluate the proposed system performance, the Arduino UNO based IoT/IoL controller designed with lighting, sensors and lights connectivity interfaces. The experimental result shows that the robust interference rejection is feasible on proposed VOL receiver and possible to have an error-free communication up to 10 kbps at a low SNR using OOK modulation.

사물인터넷환경에서 바라 본 인도와 서양의 융합: 무갈 회화와 기독교 성화(聖畫)의 만남 (The Convergence of India and West in the IoT Environment: Mughal and Christian Paintings)

  • 이춘호
    • 사물인터넷융복합논문지
    • /
    • 제8권2호
    • /
    • pp.61-70
    • /
    • 2022
  • '연결'과 '지식'은 사물인터넷의 주요 키워드이다. 본 논문에서 기독교와 이슬람이라는 두 문명이 무갈 회화를 매개체로 하여 어떤 방식으로 연결되었고, 지식의 전파를 낳았는지 무갈회화를 중심으로 분석하였다. 이를 위해 당시 문헌과 그림들을 비교 분석하였다. 서양 회화는 주제적 측면에서, 기독교 이미지와 상징은 무갈 황제의 왕권을 강화하는 수단으로 이용되었다. 양식적 측면에서, 서양 르네상스 시대 원근법과 명암법 등이 무갈 회화에 사용되기 시작하였다. 서양 기법의 단순한 활용에서 시작된 융합은 후에 서양 기독교 아이콘이나 상징을 무갈 회화에 채용하기 시작했다. 나중에는 기독교 상징이나 주제를 절대 권력 왕권과 연결시켰고, 이를 더 활용하여 왕권=영성=신성의 개념으로 발전시켜 세계회화사에 유래없는 독창적인 예술 양식을 창조했다. 사물인터넷에서 '연결'과 '지식'이라는 측면에서 이질적인 두 문화의 연결과 지식을 분석해 봄으로써 이 연구가 향후 사물인터넷에 대한 인문학 연구를 위한 하나의 플랫폼의 역할을 할 수 있을 것이다.

Improvement of Wireless Connectivity and Efficiency in E-Healthcare Service System Using a Proxy in Body Area Device

  • Kim, Sang Kon;Kim, Tae Kon;Koh, Jinhwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권3호
    • /
    • pp.991-1013
    • /
    • 2020
  • E-health services have provided interoperability between personal health devices in personal area network, based the ISO/IEEE 11073 standard. In the healthcare system, the manager handles most agents concurrently through wireless communication. However, due to the distance limitation and the increased number of agents, it may be difficult to provide continuous connectivity. Recently, body area devices have been equipped with various applicable agents, which can even handle agents on behalf of the manager. A BAD may act as an intermediary device to increase system efficiency and performance. In this study, a device called "proxy", which can be installed as software on BAD devices, is proposed. The data measured by an agent can be sent to the proxy first, and subsequently be sent to the manager again. Agents and the manager are not aware of the proxy existence and work normally without the proxy. Furthermore, a new smart proxy and modified manager are proposed. The smart proxy acts as one agent handling measurement data from several agents, which can transmit a significant amount of data at once. The proxy and smart proxy maintain compatibility with existing devices that conform to the 20601 standard. The proposed schemes are verified and the complexities of devices are analyzed. The analysis shows no significant difference among the proxy, smart proxy, and manager. Simulations exhibit that the proposed schemes can improve the system performance.

A Novel Multi-Path Routing Algorithm Based on Clustering for Wireless Mesh Networks

  • Liu, Chun-Xiao;Zhang, Yan;Xu, E;Yang, Yu-Qiang;Zhao, Xu-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권4호
    • /
    • pp.1256-1275
    • /
    • 2014
  • As one of the new self-organizing and self-configuration broadband networks, wireless mesh networks are being increasingly attractive. In order to solve the load balancing problem in wireless mesh networks, this paper proposes a novel multi-path routing algorithm based on clustering (Cluster_MMesh) for wireless mesh networks. In the clustering stage, on the basis of the maximum connectivity clustering algorithm and k-hop clustering algorithm, according to the idea of maximum connectivity, a new concept of node connectivity degree is proposed in this paper, which can make the selection of cluster head more simple and reasonable. While clustering, the node which has less expected load in the candidate border gateway node set will be selected as the border gateway node. In the multi-path routing establishment stage, we use the intra-clustering multi-path routing algorithm and inter-clustering multi-path routing algorithm to establish multi-path routing from the source node to the destination node. At last, in the traffic allocation stage, we will use the virtual disjoint multi-path model (Vdmp) to allocate the network traffic. Simulation results show that the Cluster_MMesh routing algorithm can help increase the packet delivery rate, reduce the average end to end delay, and improve the network performance.

Modeling and SINR Analysis of Dual Connectivity in Downlink Heterogeneous Cellular Networks

  • Wang, Xianling;Xiao, Min;Zhang, Hongyi;Song, Sida
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권11호
    • /
    • pp.5301-5323
    • /
    • 2017
  • Small cell deployment offers a low-cost solution for the boosted traffic demand in heterogeneous cellular networks (HCNs). Besides improved spatial spectrum efficiency and energy efficiency, future HCNs are also featured with the trend of network architecture convergence and feasibility for flexible mobile applications. To achieve these goals, dual connectivity (DC) is playing a more and more important role to support control/user-plane splitting, which enables maintaining fixed control channel connections for reliability. In this paper, we develop a tractable framework for the downlink SINR analysis of DC assisted HCN. Based on stochastic geometry model, the data-control joint coverage probabilities under multi-frequency and single-frequency tiering are derived, which involve quick integrals and admit simple closed-forms in special cases. Monte Carlo simulations confirm the accuracy of the expressions. It is observed that the increase in mobility robustness of DC is at the price of control channel SINR degradation. This degradation severely worsens the joint coverage performance under single-frequency tiering, proving multi-frequency tiering a more feasible networking scheme to utilize the advantage of DC effectively. Moreover, the joint coverage probability can be maximized by adjusting the density ratio of small cell and macro cell eNBs under multi-frequency tiering, though changing cell association bias has little impact on the level of the maximal coverage performance.

국방 상용보안제품 도입을 위한 CSfC(Commercial Solutions for Classified Program) 네트워크 보안 아키텍처 분석 (CSfC Network Security Architecture Analysis for the Assurance of Commercial Security Solutions in Defense Area)

  • 이용준;박세준;박연출
    • 인터넷정보학회논문지
    • /
    • 제22권6호
    • /
    • pp.91-97
    • /
    • 2021
  • 미국은 CSfC(Commercial Solutions for Classified Program) 제도를 통해 진화하는 사이버공격에 대응하기 위해 국가기관이 민간 상용보안제품을 신속히 국가관에 도입할 수 있도록 공인된 안전성 평가 및 인증을 수행하고 있다. CSfC 프로세스에 등록된 상용보안제품은 신속한 승인 프로세스를 거쳐 국방기관에서 사용할 수 있으며 중복된 평가 없이 상용보안제품을 승인한다. 승인된 보안제품은 국방정보시스템 구현에 필요한 시간, 비용, 승인 프로세스로 인한 비용을 절감할 수 있다. 본 연구는 국방에 도입하기 위해 미국 NSA(National Security Agency)에서 제시한 네트워크 보안 아키텍처 MSC(Multi-Site Connectivity), MA(Mobile Access), Campus WLAN, DAR(Data at Rest) 4종에 대한 보안통제 항목을 분석하였다.