• Title/Summary/Keyword: Open network

Search Result 1,733, Processing Time 0.026 seconds

Utilization of Open Access Repositories for Visibility of Academic Publications by Lecturers in South-East, Nigeria

  • Orsu, Nkem Emilia
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.9 no.4
    • /
    • pp.47-68
    • /
    • 2019
  • The study investigates the utilization of open access repositories for visibility of academic publications by lecturers in South-East, Nigeria. The specific objectives were to investigate the types of academic publications available, platforms used in self-archiving, level of satisfaction derived by lecturers with the contribution of open access repositories, challenges and strategies. It adopted descriptive survey design. Proportionate stratified sampling technique was used to draw a sample size of 418 from the total population of 4,187 lecturers. Questionnaire and observation check list were used for data collection. Frequency count, percentage, and mean score were used to analyze the data. The study revealed that there are enough academic publications available such as books, journals, projects, and thesis with the exception of handouts. It also revealed that Google Scholar, Research Gate and Open Access Journal were the main platforms lecturers use in self-archiving; while other platforms like Institutional Repositories, among others were minimally employed. Lecturers are less satisfied with the contribution of open access repositories. All the suggested challenges such as inadequate power supply, poor network, lack of awareness and inadequate research grants were all accepted. Similarly, all the suggested strategies for improving them were accepted. Recommendations were made based on the findings such as more awareness creation on importance of open access repositories; re-training of lecturers and provision of adequate ICT infrastructures that will improve the utilization of open access repositories by lecturers which could enhance the global visibility of academic publications from the Nigerian Universities.

Implementing a Flow Control Interface for OpenFlow-based Networking Experiments (OpenFlow 기반 네트워킹 실험을 위한 플로우 제어 인터페이스 구현)

  • Shin, Sungho;Kim, Namgon;Kim, JongWon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.95-98
    • /
    • 2010
  • OpenFlow 는 인터넷 스위치(라우터 포함)를 부분적으로 개선하여 연구자가 기존 네트워크의 정상적인 서비스를 간섭하지 않으면서 새로운 네트워킹 기술을 테스트할 수 있는 미래인터넷 (Future Internet) 연구를 위한 프로토콜이다. 하지만 OpenFlow 기반 테스트베드의 상태 정보를 확인하고 발생한 플로우들을 제어할 수 있는 도구(tool)가 부족하여, 연구자가 실험의 다양성을 제공 받기 어렵다. ENVI(Extensible Network Visualization & Control Framework)는 OpenFlow 네트워크 가시화를 위한 프레임워크로, 사용자의 목적에 맞는 인터페이스를 만들도록 제공해 준다. 본 논문에서는 OpenFlow 기반 테스트베드의 토폴로지 정보 및 플로우 상태를 쉽게 확인하고, 플로우 경로를 제어하는 OpenFlow 제어기 응용의 개발과 ENVI 의 확장을 설계하고 이를 구현을 통해 검증한다.

Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks (DDoS 공격 대응을 위한 Sinkhole 역추적 프로토콜 설계 및 구현)

  • Lee, Hyung-Woo;Kim, Tae-Su
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.85-98
    • /
    • 2010
  • An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhancing its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. Therefore, advanced traceback and network management mechanism also should be necessary on All-IP network environments against DDoS attacks. In this study, we studied and proposed a new IP traceback mechanism on All-IP network environments based on existing SPIE and Sinkhole routing model when diverse DDoS attacks would be happen. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Proposed mechanism uses simplified and optimized memory for storing and memorizing the packet's hash value on bloom filter, with which we can find and determine the attacker's real location on open network. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the traceback performance also can be enhanced compared with previously suggested mechanism.

Design and performance evaluation of a storage cloud service model over KREONET (KREONET 기반의 스토리지 클라우드 서비스 모델 설계 및 성능평가)

  • Hong, Wontaek;Chung, Jinwook
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.7
    • /
    • pp.29-37
    • /
    • 2017
  • Compared to the commercial networks, R&E networks have the strength such as flexible network engineering and design. Based on those features of R&E networks, we propose our storage cloud service model which supports general-purpose network users in a central region and experimental network users in distributed regions simultaneously. We prototype our service model utilizing multiple proxy controllers of OpenStack Swift service in order to deploy several regions via experimental backbone networks. Our experiments on the influence of the network latency and the size of data to be transmitted show that the bigger size of data is preferable to the smaller size of data in an experimental backbone network where the network latency increases within 10ms because the rate of throughput decline in the bigger object is comparatively small. It means that our service model is appropriate for experimental network users who directly access the service in order to move intermittently high volume of data as well as normal users in the central region who access the service frequently.

Generating and Controlling an Interlinking Network of Technical Terms to Enhance Data Utilization (데이터 활용률 제고를 위한 기술 용어의 상호 네트워크 생성과 통제)

  • Jeong, Do-Heon
    • Journal of the Korean Society for information Management
    • /
    • v.35 no.1
    • /
    • pp.157-182
    • /
    • 2018
  • As data management and processing techniques have been developed rapidly in the era of big data, nowadays a lot of business companies and researchers have been interested in long tail data which were ignored in the past. This study proposes methods for generating and controlling a network of technical terms based on text mining technique to enhance data utilization in the distribution of long tail theory. Especially, an edit distance technique of text mining has given us efficient methods to automatically create an interlinking network of technical terms in the scholarly field. We have also used linked open data system to gather experimental data to improve data utilization and proposed effective methods to use data of LOD systems and algorithm to recognize patterns of terms. Finally, the performance evaluation test of the network of technical terms has shown that the proposed methods were useful to enhance the rate of data utilization.

IP-Based Heterogeneous Network Interface Gateway for IoT Big Data Collection (IoT 빅데이터 수집을 위한 IP기반 이기종 네트워크 인터페이스 연동 게이트웨이)

  • Kang, Jiheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.173-178
    • /
    • 2019
  • Recently, the types and amount of data generated, collected, and measured in IoT such as smart home, security, and factory are increasing. The technologies for IoT service include sensor devices to measure desired data, embedded software to control the devices such as signal processing, wireless network protocol to transmit and receive the measured data, and big data and AI-based analysis. In this paper, we focused on developing a gateway for interfacing heterogeneous sensor network protocols that are used in various IoT devices and propose a heterogeneous network interface IoT gateway. We utilized a OpenWrt-based wireless routers and used 6LoWAN stack for IP-based communication via BLE and IEEE 802.15.4 adapters. We developed a software to convert Z-Wave and LoRa packets into IP packet using our Python-based middleware. We expect the IoT gateway to be used as an effective device for collecting IoT big data.

Analysis of a Departure Process on the Population Constrained Tandem Queueing Network with Constant Service Times (사용자수 제한과 상수 서비스시간을 갖는 개방형 대기행렬의 출력 프로세스에 관한 연구)

  • Young Rhee
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.25 no.1
    • /
    • pp.15-26
    • /
    • 2000
  • We consider an open tandem queueing network with population constraint and constant service times. The total number of customers that may be present in the network can not exceed a given value k. Customers arriving at the queueing network when there are more than k customers are forced to walt in an external queue. The arrival process to the queueing network is assumed to be arbitrary. It is known that the queueing network with population constrant and constant service times can be transformed into a simple network involving only two nodes. In this paper, the departure process from the queueing network is examined using this simple network. An approximation can be calculated with accuracy. Finally, validations against simulation data establish the tightness of these.

  • PDF

RELATIONSHIP BETWEEN QUEUE LENGTHS AND WAITING TIMES FOR QUEUEING NETWORK MODELS (대기네트웤에 있어서 대기자수와 대기시간사이의 관계)

  • Hong, Sung-Jo
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.20 no.3
    • /
    • pp.139-149
    • /
    • 1994
  • For general open queueing network models, the relationship between weak limits of queue lengths and waiting times at stations is investigated under heavy traffic situations. It is shown that under suitable normalization, weak convergence of queue lengths and arrival processes is a sufficient condition for that of waiting times, and is also necessary condition when the network is of feedforward type. Moreover, these weak limits for queue lengths and waiting times are shown to be simply related.

  • PDF

Visual Navigation by Neural Network Learning (신경망 학습에 의한 영상처리 네비게이션)

  • Shin, Suk-Young;Hoon Kang
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.12a
    • /
    • pp.263-266
    • /
    • 2001
  • It has been integrated into several navigation systems. This paper shows that system recognizes difficult indoor roads and open area without any specific mark such as painted guide line or tape. In this method, Robot navigates with visual sensors, which uses visual information to navigate itself along the road. An Artificial Neural Network System was used to decide where to move. It is designed with USB web camera as visual sensor.

  • PDF

A Cross-Layer Design for WiBro Distributed Network (휴대인터넷 분산 네트워크 환경 기반의 Cross-Layer 구조 설계)

  • Roh, Jae-Hoon;Ryoo, Kyoo-Tae
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.283-284
    • /
    • 2008
  • A cross-layer optimization is becoming a popular design methodology for the IP based next generation wireless network. We begin by investigating a cross-layer optimization scheme to enhance the system performance in wireless networks. By applying cross-layer optimization methodology to WiBro distributed network, the WiBro systems are expected to gain significant performance improvement and resource utilization enhanced. For further study we highlight some open challenges and new opportunities for cross-layer design.

  • PDF