• Title/Summary/Keyword: Network Translate

Search Result 41, Processing Time 0.031 seconds

A Network Secure Translate System Using CCN (CCN을 활용한 네트워크 보안 변환 시스템)

  • Park, Jae-kyung;Lee, Hyung-Su
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.330-333
    • /
    • 2017
  • 본 논문에서는 기존 인터넷 체계의 문제점을 보완하고 근본적인 대안을 제시하기 위해 CCN개념을 이용한 보안 강화 기법을 제안하고 이를 통해 네트워크의 안전한 전송 시스템을 제안한다. 또한 기존의 복잡한 구조와 사이버 공격 및 해킹에 쉽게 노출되는 TCP/IP 체계의 현재 인터넷 구조에서 네트워크 시스템구조를 단순화하고 획기적 성능 향상과 더불어 사이버 공격에 대응할 수 있는 기술을 제안하고 이를 프로토타입으로 설계하여 증명하고자 한다. 본 논문에서는 파일롯 시스템의 실험을 통하여 제안하는 CCN개념을 이용한 네트워크 보안 변환 시스템 기법의 우수함을 보인다.

  • PDF

Common Command-Scripting Language for network-based Robots (CCSLR) and Translator System Architecture (네트워크 기반 로봇을 조종하기 위한 공통 명령 프로그래밍 언어(CCSLR)와 번역 시스템 구조)

  • Lee, Il-Gu;Nguyen, Dong To;Kim, Do-Ik
    • The Journal of Korea Robotics Society
    • /
    • v.2 no.1
    • /
    • pp.48-54
    • /
    • 2007
  • A network-based robot [1] is a robot that explores service servers in the network environment for analyzing sensor data and making decision. Since network-based robot architecture was proposed, it's possible to reduce costs of robots. We hope robots would be all around at home environment. Therefore, normal users who are not experts need to be able to control those robots by using easy commands. We developed a scripting language, named CCSLR, to help users and developers who control various robots in ubiquitous environment. We focused on how to design the common language for various robots and how to translate a CCSLR script into a sequence of low-level commands of the target robot. In this paper, we propose scripting methods, with three layers. The CCSLR system reads the profile information from the knowledge representation database. Users don't have to know all about kinematical and mechanical details of a robot. Then again, the CCSLR system will use the profile information to translate the script into separated executable library commands. The CCSLR system manages robot's changing state every time a robot executes a command.

  • PDF

The Mapping Method by Equation for Adding Disks for Striping System (스트라이핑 시스템에서 디스크 추가를 위한 계산에 의한 매핑 방법)

  • 박유현;김창수;강동재;김영호;신범주
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.1
    • /
    • pp.15-27
    • /
    • 2003
  • Recently, the volume of data is increasing rapidly in server for multimedia service, according to development of multimedia application environment. In recent research for storage technology the technology like of the SAN(Storage Area Network) advantages in scalibility of storage devices, and can read data from multiple disk arrays through RAID 0, 5. The RAID 0 and 5 translate to logical address to physical address using equation, but in case of adding disks at the system with equation -based mapping, the problem that we must rearrange the whole data in the previous disks happens. We use the mapping table to solve this problem in recent, but we can not load the whole mapping table in main memory because it occupies too large space. Therefore the extra I/Os are demanded to evaluate real physical address of data, so total performance of the system is degraded. In this paper, we propose the mapping method that supports the scalibility in RAID 0 or 5 system. The proposing method applies small metadata, so- called SZIT and simple equation, so it is possible that we make translate logical address to physical address rapidly and it is scalable in disk extending simultaneously Our suggesting method, if we add disks to the striping system for expanding of storage capacity, has an advantage of never stop service. So, SZlT-based mapping method can do online-disk-expanding in real-time service.

  • PDF

P2P Streaming Media Node Selection Strategy Based on Greedy Algorithm

  • Gui, Yiqi;Ju, Shuangshuang;Choi, Hwangkyu
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.570-577
    • /
    • 2018
  • With the increasing number of network nodes, traditional client/server node selection mechanisms are under tremendous pressure. In order to select efficient cooperative nodes in a highly dynamic P2P network topology, this article uses greedy algorithm to translate the overall optimization into multiple local optimal problems, and to quickly select service nodes. Therefore, the service node with the largest comprehensive capacity is selected to reduce the transmission delay and improve the throughput of the service node. The final simulation results show that the node selection strategy based on greedy algorithm can effectively improve the overall performance of P2P streaming media system.

The Improved Method of the Translation Speed of the TDM/FDM Transmultiplexer (TDM/FDM 다중통신 시스템의 상호 변환속도에 대한 개선방법)

  • Park, Chong-Yeun
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.24 no.2
    • /
    • pp.190-195
    • /
    • 1987
  • This approach to the transmultiplexer is for the 12-channel TDM/FDM translation system with the polyphase network and the FDCT. For the reduction of the conversion time the 14-point FDCT algorithm is used and the polyphase network which translate the protorype filter into the channel filtrs required in each channel is designed. The prototype filters is designed by the IIR/FIR hybrid filter. The number of numerator terms of the hybrid filter is very large compaired to the denomiator terms. Because of symmetrical properties for numerator terms, required multiplication rate is 0.11396x10**6M/sec.ch. and reduced to 25%-45% of the rate required in the other papers. The proposed system is simulated with the computer and by the results it is proved that the proposed conversion method is valid.

  • PDF

퍼지 신경회로망을 이용한 선박의 제어 ( On the Control of Ship's Steering System by Introducing the Fuzzy Neutral Network )

  • Choi, H.K.;Lee, C.Y.
    • Journal of Korean Port Research
    • /
    • v.6 no.2
    • /
    • pp.3-24
    • /
    • 1992
  • In the fuzzy control of shop the qualitative knowledge and information that the ship's operators have acquired through their experience can be logically described by the Linguistic control Rule (LCR). The algorithm of the control is made of the LCR and the control of the shop is performed by processing this algorithm implementing a computer. The problem in the fuzzy control is that it is very difficult to describe qualitative human knowledge in the LCR correctly. To tackle this difficulty a Fuzzy Neural Network (FNN) was introduced in this paper. The characteristics of the multi-layer FNN control system applied to the ship's steering system is investigated through the computer simulation, and the results were compared with those of the ordinary fuzzy control system of a ship. The results showed that the FNN method is a very effective to translate human knowledge into the LCR.

  • PDF

Speech Generation Using Kinect Devices Using NLP

  • D. Suganthi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.25-30
    • /
    • 2024
  • Various new technologies and aiding instruments are always being introduced for the betterment of the challenged. This project focuses on aiding the mute in expressing their views and ideas in a much efficient and effective manner thereby creating their own place in this world. The proposed system focuses on using various gestures traced into texts which could in turn be transformed into speech. The gesture identification and mapping is performed by the Kinect device, which is found to cost effective and reliable. A suitable text to speech convertor is used to translate the texts generated from Kinect into a speech. The proposed system though cannot be applied to man-to-man conversation owing to the hardware complexities, but could find itself very much of use under addressing environments such as auditoriums, classrooms, etc

A Study on Weld Pattern Analysis and Weld Quality Recognition using Neural Network (신경회로망을 이용한 용접현상 해석 및 용접 품질판단에 관한 연구)

  • Lee, Jun-Hee;Kim, Ha-Na;Shin, Dong-Suk;Kang, Sung-In;Kim, Gwan-Hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.345-348
    • /
    • 2008
  • Recently, in Weld Processing field, unmanned and automatic system construction has experienced the rapid growth, and diverse signal processing has been employed in order to translate the exact weld pattern. It this paper, We will suggest the effective neural network which can deride the weld quality in arc weld and monitoring system in real time. In addition, We will present the pre-processing for selecting the study data, and the method to evaluate the wave of weld more precisely and accurately through known Neural Network.

  • PDF

A Study on Weld Pattern Analysis and Weld Quality Recognition using Neural Network (신경회로망을 이용한 용접현상해석 및 용접 품질판단에 관한 연구)

  • Lee, Jun-Hee;Choi, Sung-Wook;Shin, Dong-Suk;Kang, Sung-In;Kim, Gwan-Hyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.407-412
    • /
    • 2009
  • Recently, in Weld Processing field, unmanned and automatic system construction has experienced the rapid growth, and diverse signal processing has been employed in order to translate the exact weld pattern. In this paper, We will suggest the effective neural network which can decide the weld quality in arc weld and monitoring system in real time. In addition, We will present the pre-processing for selecting the study data, and the method to evaluate the wave of weld more precisely and accurately through known Neural Network.

A design and implementation of the Wireless Firewall (무선 방화벽의 설계 및 구현에 관한 연구)

  • 박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.44-50
    • /
    • 2003
  • When Mobile terminal user want to contact inner-network information sever, wireless information security need for Protect hacking. For the security, Mobile terminal user could have contact to wireless network through the gateway of Wireless Firewall. In this paper, I present a design scheme of Wireless Firewall that included major function of Packet Filtering, NAT, Authentication, and auditing reports services. I would implement to Wireless Firewall that included major function of Packet Filtering, NAT, Authentication, Integrity, and auditing reports services. I would conclude that the suggest will be useful for research and development on Korean Wireless Firewall System.

  • PDF