• Title/Summary/Keyword: Technology network analysis

Search Result 3,920, Processing Time 0.034 seconds

Evolution of Wireless Technologies: Exploring the Technology Trajectory in Competitive Wireless Industry (무선통신기술의 진화: 무선통신산업 경쟁하의 기술 경로 탐색)

  • Kim, Hak-J.
    • Information Systems Review
    • /
    • v.13 no.2
    • /
    • pp.43-54
    • /
    • 2011
  • The paper presents the technology trajectory of competitive wireless technologies in wireless industry. We attempt to trace the trajectory of wireless technologies with historical data, and then analyze its pattern. As a preliminary result, we find that there exists network effect and substitution effect in the trajectory. Our result can provide insight to wireless service providers where best to focus its efforts for maximizing overall gain in their networks as well as when to establish the transition strategy towards the next generation wireless network technologies.

A study on the degree of influence of technology by AHP and ANP (AHP와 ANP를 이용한 기술기여도에 관한 연구)

  • Hong, Du-Wha;Chung, Min-Yong
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.4
    • /
    • pp.167-180
    • /
    • 2006
  • The ANP(Analytic Network Process), though based on the AHP(Analytic Hierarchy Process), is a system for the analysis, synthesis, and justification of complex decisions with the capability to model non-linear relations between the elements. ANP allows the decision makers to leap beyond the traditional hierarchy to the interdependent environment of network modeling. The ANP is designed for problems characterized by the added complexity of interdependencies such as feedback and dependencies among problem elements. Using a network approach makes it possible to represent and analyze interactions, incorporate non-linear relations between the elements, and synthesize mutual effects by a single logical procedure. This study intends to evaluate the contribution of technology in intangible assets by the AHP and ANP.

Latency Analysis of AVB Network and Optimization Design for Automotive

  • An, Byoungman;Kim, YoungSeop
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.3
    • /
    • pp.127-132
    • /
    • 2019
  • This paper presents an overview of automotive communication technologies, including related technology developments. We describe the latency of Audio Video Bridge (AVB) network as well as purpose the optimized design of the Ethernet network system for automotive. Our design plays a significant role in reducing the delay between components. The proposed approach on realistic test cases showed that there was a delay reduction, approximately 49.4%. It is expected that the optimization method for the actual automotive environment can greatly shorten the time period in the design and development process. The results obtained from the experiments on the delay time present in each function are reliable because average values are obtained through repeated actual tests for several months. It will greatly benefit the industry since analyzing the latency between each function in a short period of time is very important.

Security Exposure of RTP packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.59-63
    • /
    • 2019
  • VoIP technology is a technology for exchanging voice or video data through IP network. Various protocols are used for this technique, in particular, RTP(Real-time Transport Protocol) protocol is used to exchange voice data. In recent years, with the development of communication technology, there has been an increasing tendency of services such as "Kakao Voice Talk" to exchange voice and video data through IP network. Most of these services provide a service with security guarantee by a user authentication process and an encryption process. However, RTP protocol does not require encryption when transmitting data. Therefore, there is an exposition risk in the voice data using RTP protocol. We will present the risk of the situation where packets are sniffed in VoIP(Voice over IP) communication using RTP protocol. To this end, we configured a VoIP telephone network, applied our own sniffing tool, and analyzed the sniffed packets to show the risk that users' data could be exposed unprotected.

Visual Analysis of Deep Q-network

  • Seng, Dewen;Zhang, Jiaming;Shi, Xiaoying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.853-873
    • /
    • 2021
  • In recent years, deep reinforcement learning (DRL) models are enjoying great interest as their success in a variety of challenging tasks. Deep Q-Network (DQN) is a widely used deep reinforcement learning model, which trains an intelligent agent that executes optimal actions while interacting with an environment. This model is well known for its ability to surpass skilled human players across many Atari 2600 games. Although DQN has achieved excellent performance in practice, there lacks a clear understanding of why the model works. In this paper, we present a visual analytics system for understanding deep Q-network in a non-blind matter. Based on the stored data generated from the training and testing process, four coordinated views are designed to expose the internal execution mechanism of DQN from different perspectives. We report the system performance and demonstrate its effectiveness through two case studies. By using our system, users can learn the relationship between states and Q-values, the function of convolutional layers, the strategies learned by DQN and the rationality of decisions made by the agent.

Privacy Inferences and Performance Analysis of Open Source IPS/IDS to Secure IoT-Based WBAN

  • Amjad, Ali;Maruf, Pasha;Rabbiah, Zaheer;Faiz, Jillani;Urooj, Pasha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.1-12
    • /
    • 2022
  • Besides unexpected growth perceived by IoT's, the variety and volume of threats have increased tremendously, making it a necessity to introduce intrusion detections systems for prevention and detection of such threats. But Intrusion Detection and Prevention System (IDPS) inside the IoT network yet introduces some unique challenges due to their unique characteristics, such as privacy inference, performance, and detection rate and their frequency in the dynamic networks. Our research is focused on the privacy inferences of existing intrusion prevention and detection system approaches. We also tackle the problem of providing unified a solution to implement the open-source IDPS in the IoT architecture for assessing the performance of IDS by calculating; usage consumption and detection rate. The proposed scheme is considered to help implement the human health monitoring system in IoT networks

Prediction of Error due to Eccentricity of Hole in Hole-Drilling Method Using Neural Network

  • Kim, Cheol;Yang, Won-Ho
    • Journal of Mechanical Science and Technology
    • /
    • v.16 no.11
    • /
    • pp.1359-1366
    • /
    • 2002
  • The measurement of residual stresses by the hole-drilling method has been used to evaluate residual stresses in structural members. In this method, eccentricity can usually occur between the hole center and rosette gage center. In this study, we obtained the magnitude of the error due to eccentricity of a hole through the finite element analysis. To predict the magnitude of the error due to eccentricity of a hole in the biaxial residual stress field, it could be learned through the back propagation neural network. The prediction results of the error using the trained neural network showed good agreement with FE analyzed results.

Performance analysis of the data link layer of IEC/ISA fieldbus system by simulation model (시뮬레이션 모델을 이용한 IEC/ISA 필드버스 시스템의 데이터 링크 계층 성능 분석)

  • Lee, Seong-Geun;Hong, Seung-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.2 no.3
    • /
    • pp.209-219
    • /
    • 1996
  • Fieldbus provides a real-time data communication among field devices in the process control and manufacturing automation systems. In this paper, a Petri Net model of the 1993 draft of IEC/ISA fieldbus which is proposed as an international standard of fieldbus network is developed. Based on the Petri Net model, discrete-event simulation model of IEC/ISA fieldbus network is developed. This paper evaluates the network induced delay in the data link layer of IEC/ISA fieldbus using the simulation model. In addition, an integrated discrete-event/continuous-time simulation model of fieldbus system and distributed control system is developed. This paper investigates the real-time data processing capability of IEC/ISA fieldbus and the effect of network-induced delay to the performance of control system.

  • PDF

A Universal Pricing Scheme for the WiMAX Services

  • Suk, Seung-Hak;Lee, Hoon;Lee, Kwang-Hui
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.334-343
    • /
    • 2008
  • In this work we propose a universal pricing machine, which incorporates a universal pricing framework for the future IEEE802.16 WiMAX service with multiple classes of service. A multimedia service is provided by a QoS provisioning scheme in the WiMAX network and universal pricing means that it can compute the price for any type of service in a unified framework. In the proposed pricing framework we incorporate multiple types of services such as the real time and nonreal time services that are supposed to be provided in the WiMAX network. To that purpose, let us first carry out an analysis on the current pricing scheme of Korean WiMAX service which incorporates only the data size. From that analysis we propose a new pricing scheme for the future WiMAX service that provides different service classes in the network. Via numerical experiment, we verify the implication of the work.

Buckling optimization of laminated composite plate with elliptical cutout using ANN and GA

  • Nicholas, P. Emmanuel;Padmanaban, K.P.;Vasudevan, D.
    • Structural Engineering and Mechanics
    • /
    • v.52 no.4
    • /
    • pp.815-827
    • /
    • 2014
  • Buckling optimization of laminated composite plates is significant as they fail because of buckling under in-plane compressive loading. The plate is usually modeled without cutout so that the buckling strength is found analytically using classical laminate plate theory (CLPT). However in real world applications, the composite plates are modeled with cutouts for getting them assembled and to offer the provisions like windows, doors and control system. Finite element analysis (FEA) is used to analyze the buckling strength of the plate with cutouts and it leads to high computational cost when the plate is optimized. In this article, a genetic algorithm based optimization technique is used to optimize the composite plate with cutout. The computational time is highly reduced by replacing FEA with artificial neural network (ANN). The effectiveness of the proposed method is explored with two numerical examples.