• Title/Summary/Keyword: Time-expanded network

Search Result 126, Processing Time 0.027 seconds

Research trends in the field of multicultural education Network analysis:Focusing on Time series analysis of Co-word (다문화교육 분야의 연구동향에 대한 네트워크 분석: 동시출현단어의 시계열 분석중심으로)

  • Bae, Kyungim
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.159-170
    • /
    • 2021
  • The purpose of this study was to understand the knowledge structure through keyword network analysis for the purpose of identifying research trends in the research field of multicultural education. To this end, the research trends and intellectual structure of multicultural education were identified through network analysis of words that appeared more than 6 times in the keywords of the papers registered in the KCI (Korean Journal of Citation Index) from 2002 to 2020. Study changes were analyzed by analysis. As a result of the analysis, the first period (2002-2010) focused on multicultural society and multiculturalism, while the second period (2011-2015) additionally introduced multicultural families, globalization, and teacher education, and the third period (2016-2020), multicultural receptivity, multicultural sensitivity, and multicultural efficacy were newly revealed. The research trend of multicultural education in Korean society over the past 19 years has been confirmed that the research topic has changed from theoretical research to empirical research, and the content of multicultural education has also been specified and expanded by field and subject.

A Dynamic assignment model for Dynamic Traffic Management in AM Peak (오전 첨두시의 동적 교통관리를 위한 동적 통행배정모형에 관한 연구)

  • 박준식;박창호;전경수
    • Journal of Korean Society of Transportation
    • /
    • v.19 no.4
    • /
    • pp.97-108
    • /
    • 2001
  • A dynamic transportation management should be applied specially in AM peak because AM peak is more critical than PM peak in traffic volume and demand. AM peak trip can be characterized by commuting and schooling. which have the high level of usage on public transportation, and constraint on arrival time. So transportation management applied in AM peak could deal with a mode choice and an arrival time constrain. Researchers were involved in the dynamic transportation assignment models for management of congested traffic network. But, there were no models which considered a mode choice and an arrival time constrain should be included in management of AM peak. So there are limits to use exist models to control and analyze AM peak traffic. In this study, it is proposed the combined dynamic transportation model, considering a mode choice and the start time selection with arrival time constrains, based on Ran and Boyce's model. The proposed model is verified the compatibility by applying to the newly designed time space expanded network. The result shows that proposed model consistent with dynamic user optimal travel pattern. From this we certificate the applicability of the proposed model to control and analyze AM peak traffic.

  • PDF

Estimating Internal Transfer Trips Considering Subway Express Line - Focusing on Smart Card Data Based Network - (지하철 급행노선을 고려한 내부환승 추정방안 - 스마트카드 자료기반 네트워크를 중심으로 -)

  • Lee, Mee Young
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.39 no.5
    • /
    • pp.613-621
    • /
    • 2019
  • In general, transfer in subway stations is defined as transfer between lines and station transfer. In transfer between lines, passengers change from one subway line to another by utilizing horizontal pedestrian facilities such as transfer passages and pedestrian way. Station transfer appears in the situation that subway lines of enter and exit gate terminals differs from those of boarding and alighting trains and passenger trips utilize both vertical pedestrian facilities such as stair and escalator and horizontal facilities. The hypothesis on these two transfers presupposes that all subway lines are operated by either local train or express in subway network. This means that in a transfer case both local and express trains are operated in the same subway line, as a case of Seoul Metro Line 9, has not been studied. This research proposes a methodology of finding the same line transfer in the Seoul metropolitan subway network built based on the smart card network data by suggesting expanded network concept and a model that passengers choose a theirs minimum time routes.

A Study on RFID System Design and Expanded EPCIS Model for Manufacturing Systems (제조 시스템의 RFID System 설계 및 EPCIS 확장모형 연구)

  • Choi, Weon-Yong;Lee, Jong-Tae
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.6
    • /
    • pp.123-135
    • /
    • 2007
  • In the recent years, the companies have manually recorded a production status in a work diary or have mainly used a bar code in order to collect each process's progress status, production performance and quality information in the production and logistics process in real time. But, it requires an additional work because the worker's record must be daily checked or the worker must read it with the bar code scanner. At this time, data's accuracy is decreased owing to the worker's intention or mistake, and it causes the problem of the system's reliability. Accordingly, in order to solve such problem, the companies have introduced RFID which comes into the spotlight in the latest automatic identification field. In order to introduce the RFID technology, the process flow must be analyzed, but the ASME sign used by most manufacturing companies has the difficult problem when the aggregation event occurs. Hence, in this study, the RFID logistic flow analysis Modeling Notation was proposed as the signature which can analyze the manufacturing logistic flow amicably, and the manufacturing logistic flow by industry type was analyzed by using the proposed RFID logistic flow analysis signature. Also, to monitor real-time information through EPCglobal network, EPCISEvent template by industry was proposed, and it was utilized as the benchmarking case of companies for RFID introduction. This study suggested to ensure the decision-making on real-time information through EPCglobal network. This study is intended to suggest the Modeling Notation suitable for RFID characteristics, and the study is intended to establish the business step and to present the vocabulary.

A Study on DDS (Data Distribution Service) Application for Real-time Monitoring and Control in Operation Console of the Railway Safety Control Platform (철도 안전관제 통합콘솔에서의 실시간 감시 및 통제를 위한 DDS 적용방안 연구)

  • So, Jaegeol;Shin, Kwang-Ho;Ahn, Jin
    • Journal of The Korean Society For Urban Railway
    • /
    • v.6 no.4
    • /
    • pp.279-286
    • /
    • 2018
  • Recently, a safety control platform to monitor the safety of train operation in real time and prevent accidents and risks through control is under study. In the initial design, DDS communication method supporting distributed network is adopted for real-time processing of large amount of data according to the integration of existing distributed safety data. However, communication between server and console inside the safety control platform is applied to existing TCP socket communication. In the case of TCP socket communication, it is possible to process data for a small system of a safety control test bed by one-to-one communication. However, if the data is expanded all over the country in the future, it becomes difficult to cope with a case where communication traffic occurs due to vast amount of data. In this paper, we propose DDS communication method to support distributed network between server and console of security control platform, and demonstrate TCP socket and DDS method, and compare throughput and speed. As a result, we have found that the scalability and flexibility are improved in case of applying DDS communication to future systems.

Modeling Geographical Anycasting Routing in Vehicular Networks

  • Amirshahi, Alireza;Romoozi, Morteza;Raayatpanah, Mohammad Ali;Asghari, Seyyed Amir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1624-1647
    • /
    • 2020
  • Vehicular network is one of the most important subjects for researchers in recent years. Anycast routing protocols have many applications in vehicular ad hoc networks. The aim of an anycast protocol is sending packets to at least one of the receivers among candidate receivers. Studies done on anycast protocols over vehicular networks, however, have capability of implementation on some applications; they are partial, and application specific. No need to say that the lack of a comprehensive study, having a strong analytical background, is felt. Mathematical modeling in vehicular networks is difficult because the topology of these networks is dynamic. In this paper, it has been demonstrated that vehicular networks can be modeled based on time-expanded networks. The focus of this article is on geographical anycast. Three different scenarios were proposed including sending geographic anycast packet to exactly-one-destination, to at-least-one-destination, and to K-anycast destination, which can cover important applications of geographical anycast routing protocols. As the proposed model is of MILP type, a decentralized heuristic algorithm was presented. The evaluation process of this study includes the production of numerical results by Branch and Bound algorithm in general algebraic modeling system (GAMS) software and simulation of the proposed protocol in OMNET++ simulator. The comprehension of the result of proposed protocol and model shows that the applicability of this proposed protocol and its reactive conformity with the presented models based on presented metrics.

An Efficient Resource Discovery Mechanism based on Distributed Location Information in Pure P2P Environments (순수 P2P 환경에서 분산된 위치 정보를 이용한 자원 검색 기법)

  • Kim In-suk;Kang Yong-hyeog;Eom Young Ik
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.573-581
    • /
    • 2004
  • Recently, the rapid growth of Internet technology and the deployment of high speed networks make many kinds of multimedia services possible. Preexisting multimedia services are designed based on the client/server model which has the problems such as the network failure and the low speed communication due to the high load on the central server. In order to solve these problems, peer-to-peer networks are introduced and expanded through Internet environments. In this paper, we propose a pure peer-to-peer network based resource discovery mechanism for multimedia services. In the proposed scheme, each host maintains the location information of resources which are recently requested by other hosts as well as that oi the replicas of local resources. The proposed scheme has the faster response time and incurs the smaller traffic than the preexisting discovery schemes in pure peer-to-peer network environments. Also, by decentralizing the location information and differentiating the reply path, our proposed scheme can solve the search result loss problem that occurs when the network is unsettled.

A Low-Power Mutual Authentication Protocol in Ubiquitous Sensor Networks (유비쿼티스 센서 네트웨크에서의 저전력 상호인증 프로토클)

  • Cho Young-Bok;Jung Youn-Su;Kim Dong-Myung;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.187-197
    • /
    • 2005
  • All sensors in Ubiquitous sensor network have to communicate with limited battery If we adopt current authentication, there are difficulties to keep sensor network because heavy calculation in each sensor needs more power and lifetime of sensor could be short relatively because of the effect. This paper suggests network structure which is using RM(RegisterManarer) and AM(AuthenticationManager) to solve power Problem on authentication, and su99ests mutual-authentication protocol with low Power which supports a session key by mutual-authentication. RM and AM manage algorithm with fast calculation to keep the safety by doing key generation. encryption/decryption. authentication instead of each sensor node . Processing time to authenticate sensor node is 2.96$\%$ fast in the same subnet, and 12.91$\%$ fast in different subnet. Therefore. the suggested way Provides expanded lifetime of censor node and is more effective as sensor network size is bigger and bigger.

  • PDF

Design of agent intrusion detection system applying data mining (데이터 마이닝을 적용한 에이전트 침입 탐지 시스템 설계)

  • Jeong Jong Kun;Lee Sung Tae;Kim Yong Ho;Lee Yun Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.676-679
    • /
    • 2001
  • As network security is coning up with significant problem after the major Internet sites were hacked nowadays, IDS(Intrusion Detection System) is considered as a next generation security solution for more reliable network and system security rather than firewall. In this paper, we propose the new IDS model which tan detect intrusion in different systems as well as which ran make real-time detection of intrusion in the expanded distributed environment in host level of drawback of existing IDS. We implement its prototype and verify its validity. We use pattern extraction agent so that we can extract automatically audit file needed in distributed intrusion detection even in other platforms.

  • PDF

A Study on the Performance Analysis of the transition mechanism for Evolving into Next Generation Internet (차세대 인터넷 도입을 위한 전이 메커니즘의 성능 분석에 관한 연구)

  • 황성호;이수욱;임해진
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.289-294
    • /
    • 2004
  • The IPv6(Internet Protocol version 6), a next generation Internet protocol. was standardized to solve the problems of the IPv4(Internet Protocol version 4). However, the IPv4 could not be actually converted to the IPv6 at one time. Therefore, the transition mechanism is thought to be very much important to be compatible with the IPv4 naturally and convert to the IPv6 network gradually. Despite of the development of various kinds of the transition mechanism, the IPv6 network was not expanded. The research was mainly made not for current system environment but for technical purposes. This paper investigated the performances through the transition mechanism and examined proper ways being applicable to current environment.