• Title/Summary/Keyword: asymmetric networks.

Search Result 111, Processing Time 0.03 seconds

Stability Analysis of Limit Cycles on Continuous-time Cyclic Connection Neural Networks (연속시간 모델 순환결합형 신경회로망에서의 리미트사이클의 안정성 해석)

  • Park, Cheol-Young
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.2
    • /
    • pp.179-184
    • /
    • 2006
  • An intuitive understanding of the dynamic pattern generation in asymmetric networks may be considered an essential component in developing models for the dynamic information processing. It has been reported that the neural network with cyclic connections generates multiple limit cycles. The dynamics of discrete time network with cyclic connections has been investigated intensively. However, the dynamics of a cyclic connection neural network in continuous-time has not been well-known due to the considerable complexity involved in its calculation. In this paper, the dynamic behavior of a continuous-time cyclic connection neural network, in which each neuron is connected only to its nearest neurons with binary synaptic weights of ${\pm}1$, has been investigated. Furthermore, the dynamics and stability of the network have been analyzed using a piece-wise linear approximation.

QoS Routing Protocol using multi path in Unidirectional Mobile Ad Hoc Networks (단방향 이동 Ad Hoc 망에서의 다중경로를 이용한 QoS 라우팅 프로토콜)

  • Kang, Kyeong-In;Park, Kyong-Bae;Yoo, Choong-Yul;Jung, Chan-Hyeok;Lee, Kwang-Bae;Kim, Hyun-Ug
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.935-944
    • /
    • 2002
  • It is the Mobile Ad Hoc Networks that constituted with serveral mobile node that can communicate with other mobile nodes. Until now, there were no routing protocols considering such as Multimediadata, VOD (Video On Demand), which is required of lots of bandwidth in Mobile Ad Hoc Network, io we are in the need of QoS (Quality of Service)routing protocol to transmit the data packets faster and more accurate. Also, there are an unidirectional links due to asymmetric property of mobile terminals or current wireless environments on practical mobile ad hoc networks. However, at present, the existing mobile ad hoc routing protocols are implemented to support only bidirectional links. In this paper, we propose the Advanced Routing routing protocol in order to implement a new routing protocol, which is fit to mobile ad hoc networks containing unidirectional links and to support QoS service. For the performance evaluation, we use NS-2 simulator of U.C. Berkeley. We could get not only increased received data rate and decreased average route discovery time, but also network load decreases with compared Best effort service.

Knowledge-Based Unmanned Automation and Control Systems for the Wastewater Treatment Processes (하.폐수 처리장의 원격 모니터링 및 지식 기반 무인 자동화 시스템)

  • Bae, Hyeon;Jung, Jae-Ryong;Seo, Hyun-Yong;Kim, Sung-Shin;Kim, Chang-Won
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.12a
    • /
    • pp.56-59
    • /
    • 2001
  • In this paper, unmaned fully automation systems are applied for the CSTR(Continuously Stirred Tank Reactor) and, SBR (Sequencing Batch Reactor) wastewater treatment pilot plant. This plant is constructed in the country side which is little far from a main city. So networks and wireless modules are employed for the data transmission. The SBR plant has a local control and monitoring system which is contained communication parts which consist of one ADSL (Asymmetric Digital Subscriber Line) network and one CDMA (Code Division Multiple Access) module. Remote control and monitoring systems are constructed at a laboratory in a metropolis.

  • PDF

A Selective Control Mechanism for Fairness of DQDB in Client-Server Traffic (클라이언트-서버 트래픽에서 DQDB 공정성을 위한 선택제어 방식)

  • 김정홍;황하응
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.1
    • /
    • pp.128-135
    • /
    • 2003
  • A fairness control method for Distributed-Queue Dual-Bus(DQDB) has been studied under specific traffic types such as equal probability traffic, symmetric traffic and asymmetric traffic. To distribute DQDB network bandwidth fairly to all stations under general traffic such as a client-server traffic that differs from specific traffic types, we propose an effective fairness control method. Based on an access limit, the proposed mechanism applies two bandwidth control mechanisms to DQDB networks. One is the mechanism that is called APS(Access Protection Scheme) for servers. And another is the mechanism that controls the allocation of bandwidth only using an access limit lot clients. Simulation results show that it outperforms other mechanisms.

  • PDF

The Design of Electronic Payment Protocol Using Dual Signature based on Cardholder's Secret Number (카드사용자의 비밀번호 기반 이중서명을 이용한 전자 지불 프로토콜의 설계)

  • 김성열;이옥빈;배용근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.411-420
    • /
    • 1999
  • The topic of electronic commerce is a hot issue in computer technology. There are many kinds of risks associated with electronic commerce which performs financial transactions by exchanging electronic information over public networks. Therefore, security factors such as confidentiality, integrity, authentication and non-repudiation should be required to construct secure electronic commerce systems. In this paper, the credit card-based payment protocol applying dual signature is presented. It provides payment information to the bank a cardholder pays to, but conceals ordering information. It also offers ordering information to a merchant, but hides payment information including the card number. Thus, cardholder's private information can be protected. In order to accomplish this, dual signature is performed employing both symmetric method utilizing cardholder's secret number as an encryption key and asymmetric method.

  • PDF

Design and Implementation of Cable Data Subscriber Network Management System for High Speed Internet Service (초고속 인터넷서비스를 위한 케이블 데이터 가입자 망관리 시스템 설계 및 구현)

  • Yun Byeonh-Soo;Ha Eun-Ju
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.87-98
    • /
    • 2004
  • There are several types of distributed subscribers network using Asymmetric Digital Subscriber Line (ADSL), Very high-bit rate Digital Subscriber Line (VDSL), and Data Over Cable Service Interface Specifications (DOCSIS), The efficient and concentrated network management of those several distributed subscribers networks and resources require the general information model of network, which has abstract and conceptional managed objects independent of type of network and its equipment to manage the integrated subscriber network, This paper presents the general Internet subscribers network modeling framework using RM-ODP (Reference Model Open Distributed Processing) to manage that network In the form of integrated hierarchy, This paper adopts the object-oriented development methodology with UML (Unified Modeling Language) and designs and implements the HFC network of DOCSIS as an example of the subscriber network.

  • PDF

Efficient key generation leveraging wireless channel reciprocity and discrete cosine transform

  • Zhan, Furui;Yao, Nianmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2701-2722
    • /
    • 2017
  • Key generation is essential for protecting wireless networks. Based on wireless channel reciprocity, transceivers can generate shared secret keys by measuring their communicating channels. However, due to non-simultaneous measurements, asymmetric noises and other interferences, channel measurements collected by different transceivers are highly correlated but not identical and thus might have some discrepancies. Further, these discrepancies might lead to mismatches of bit sequences after quantization. The referred mismatches significantly affect the efficiency of key generation. In this paper, an efficient key generation scheme leveraging wireless channel reciprocity is proposed. To reduce the bit mismatch rate and enhance the efficiency of key generation, the involved transceivers separately apply discrete cosine transform (DCT) and inverse discrete cosine transform (IDCT) to pre-process their measurements. Then, the outputs of IDCT are quantified and encoded to establish the bit sequence. With the implementations of information reconciliation and privacy amplification, the shared secret key can be generated. Several experiments in real environments are conducted to evaluate the proposed scheme. During each experiment, the shared key is established from the received signal strength (RSS) of heterogeneous devices. The results of experiments demonstrate that the proposed scheme can efficiently generate shared secret keys between transceivers.

Performance Analysis for Optimizing Threshold Level Control of a Receiver in Asynchronous 2.5 Gbps/1.2 Gbps Optical Subscriber Network with Inverse Return to Zero(RZ) Coded Downstream and NRZ Upstream Re-modulation

  • Park, Sang-Jo;Kim, Bong-Kyu
    • Journal of the Optical Society of Korea
    • /
    • v.13 no.3
    • /
    • pp.361-366
    • /
    • 2009
  • We propose the performance enhancing method optimization of an asynchronous 2.5 Gbps/1.25 Gbps optical subscriber network with inverse RZ (Return to Zero) coded downstream and NRZ (Non Return to Zero) upstream re-modulation by adjusting threshold level control of a receiver. We theoretically analyze the BER (Bit Error Rate) performance by modeling the occurrence of BER by simulation with MATLAB according to the types of downstream data. The results have shown that the normalized threshold level in an optical receiver could be saturated at 1/3 as the SNR (Signal to Noise Ratio) increases. The needed SNR for obtaining the BER $10^{-9}$ can be reduced by $\sim$5 dB by optimizing the normalized threshold level at 1/3 instead of by using the conventional receiver with threshold level of 0.5. The proposed system can be a useful technology for asynchronous optical access networks with asymmetric upstream and downstream data rates, because the improved minimum receiving power could replace a light source with a source with lower power and lower cost in an OLT (Optical Line Termination).

Effects of Link Failures on Performance of Packet Scatter Schemes in Fat-Trees (Fat-Tree에서 링크 장애가 패킷분산방식의 성능에 미치는 영향)

  • Lim, Chansook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.9-15
    • /
    • 2013
  • Most of recent studies on data center networks are based on the assumption of symmetrical multi-rooted tree topologies such as a Fat-Tree. While packet scatter schemes are very effective for such a network topology, it is known that various failures can result in an asymmetric topology which degrades TCP performance. In this paper, we reexamine the effects of link failures on packet scatter schemes in Fat-Trees. Our simulation results show that in case of a single link failure in a large-scale Fat-Tree, packet reordering does not occur enough to degrade TCP performance. This implies that we do not necessarily need a complex scheme to make packet schemes robust to link failures.

Knowledge-Based Unmanned Automation and Control Systems for the Wastewater Treatment Processes (하.폐수 처리장의 원격 모니터링 및 지식 기반 무인 자동화 시스템)

  • Bae, Hyeon;Jung, Jae-Ryong;Seo, Hyun-Yong;Kim, Sung-Shin;Kim, Chang-Won
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.9
    • /
    • pp.844-848
    • /
    • 2001
  • This paper introduces unmaned fully automation systems, which are applied for the CSTR(Continuously Stirred Tank Reactor) and SBR (Sequencing Batch Reactor) wastewater treatment system. The pilot plant is constructed in the country side which is little far from a main city. So networks and wireless modules are employed for the data transmission. The SBR plant has a local control and the remote monitoring system which is contained communication parts which consist of ADSL (Asymmetric Digital Subscriber Line) network and CDMA (Code Division Multiple Access) Wireless module. Remote control and monitoring systems are constructed at laboratory in a metropolis.

  • PDF