• Title/Summary/Keyword: electronic communication networks

Search Result 672, Processing Time 0.024 seconds

The Implementation of Communication Protocol for Semiconductor Equipments using Directed Diffusion (직접 확산 방식을 이용한 반도체 장비 통신 프로토콜 구현)

  • Kim, Doo Yong;Cho, Hyun Chan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.12 no.2
    • /
    • pp.39-43
    • /
    • 2013
  • The semiconductor equipments generate necessary data through communication networks for the effective manufacturing processes and automation of semiconductor equipments. For transferring data between semiconductor equipments and sending data to monitor equipments, several standards for communication protocols have been proposed. Communication networks in semiconductor manufacturing systems will transmit a lot of data traffic, which can be vulnerable in data delay and network failure. Therefore, it is required that data traffic need to be distributed. To accomplish this objective, we recommend the use of a redundant and valuable communication path which is constructed by a wireless sensor network. In this paper, the directed diffusion method for wireless sensor networking is suggested for networking semiconductor equipments. It is shown that how the directed diffusion is employed to connect semiconductor equipments. Also, we show how to implement the SECS of semiconductor equipments communication protocols based on the directed diffusion.

Combined time bound optimization of control, communication, and data processing for FSO-based 6G UAV aerial networks

  • Seo, Seungwoo;Ko, Da-Eun;Chung, Jong-Moon
    • ETRI Journal
    • /
    • v.42 no.5
    • /
    • pp.700-711
    • /
    • 2020
  • Because of the rapid increase of mobile traffic, flexible broadband supportive unmanned aerial vehicle (UAV)-based 6G mobile networks using free space optical (FSO) links have been recently proposed. Considering the advancements made in UAVs, big data processing, and artificial intelligence precision control technologies, the formation of an additional wireless network based on UAV aerial platforms to assist the existing fixed base stations of the mobile radio access network is considered a highly viable option in the near future. In this paper, a combined time bound optimization scheme is proposed that can adaptively satisfy the control and communication time constraints as well as the processing time constraints in FSO-based 6G UAV aerial networks. The proposed scheme controls the relation between the number of data flows, input data rate, number of worker nodes considering the time bounds, and the errors that occur during communication and data processing. The simulation results show that the proposed scheme is very effective in satisfying the time constraints for UAV control and radio access network services, even when errors in communication and data processing may occur.

Routing Protocol for Energy Balancing in Energy Harvesting Wireless Sensor network (에너지 하베스팅 무선 센서네트워크에서 에너지균형을 위한 라우팅프로토콜)

  • Kang, Min-Seung;Park, Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.5
    • /
    • pp.666-669
    • /
    • 2020
  • Energy harvesting sensor networks have the ability to collect energy from the environment to overcome the power limitations of traditional sensor networks. The sensor network, which has a limited transmission range, delivers data to the destination node through a multi-hop method. The routing protocol should consider the power situation of nodes, which is determined by the residual power and energy harvesting rate. At this time, if only considering the magnitude of the power, power imbalance can occur among nodes and it can induce instantaneous power shortages and reduction of network lifetime. In this paper, we designed a routing protocol that considers the balance of power as well as the residual power and energy harvesting rate.

Analysis on Communication Channels for Magnetic Induction Based Underwater Wireless Communication Networks (자기 유도 기반 수중 통신 네트워크를 위한 통신 채널 분석)

  • Wu, Shanai;Shin, Yoan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.985-988
    • /
    • 2017
  • Magnetic induction (MI) based communication is one of the near-field communication techniques, which makes use of induced magnetic fields. In order to develop the MI based underwater communication networks, we evaluate and compare the loss performance between direct-MI and MI-waveguide in underwater environment.

Sound Event Detection based on Deep Neural Networks (딥 뉴럴네트워크 기반의 소리 이벤트 검출)

  • Chung, Suk-Hwan;Chung, Yong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.389-396
    • /
    • 2019
  • In this paper, various architectures of deep neural networks were applied for sound event detection and their performances were compared using a common audio database. The FNN, CNN, RNN and CRNN were implemented using hyper-parameters optimized for the database as well as the architecture of each neural network. Among the implemented deep neural networks, CRNN performed best at all testing conditions and CNN followed CRNN in performance. Although RNN has a merit in tracking the time-correlations in audio signals, it showed poor performance compared with CNN and CRNN.

A Study of Authentication Algorithm in Electronic Commerce (전자상거래에서의 인증 알고리즘에 관한 연구)

  • Kim Young-Sun
    • Management & Information Systems Review
    • /
    • v.6
    • /
    • pp.1-19
    • /
    • 2001
  • Partial transactions which use computer networks are formed in the cyberspace due to rapid progress of communication and computer technology. Electronic business transactions have security problems according to the special quality of opening networks, while it can be approached easily by anyone without being tied to time and places through Internets. To revitalize the electronic business transactions, security technology which can establish its security and trust is the prior task and both safe information communication and better information security service offer are essential factors. The method to exchange information through Internets must be made after confirming one another's exact connection in the mutual identity certification to prevent a lot of threat which can occur in the use of password techniques. To satisfy these electronic business transactions, we intend to increase understanding of authentication algorithm provided with authentication function of messages and users as well to plan safety and trust of business information and contents in the electronic business transactions.

  • PDF

Blind Signal Processing for Wireless Sensor Networks

  • Kim, Namyong;Byun, Hyung-Gi
    • Journal of Sensor Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.158-164
    • /
    • 2014
  • In indoor sensor networks equalization algorithms based on the minimization of Euclidean distance (MED) for the distributions of constant modulus error (CME) have yielded superior performance in compensating for signal distortions induced from optical fiber links, wireless-links and for impulsive noise problems. One main drawback of MED-CME algorithms is a heavy computational burden hindering its implementation. In this paper, a recursive gradient estimation for weight updates of the MED-CME algorithm is proposed for reducing the operations $O(N^2)$ of the conventional MED-CME to O(N) at each iteration time for N data-block size. From the simulation results of the proposed recursive method producing exactly the same results as the conventional method, the proposed estimation method can be considered to be a reliable candidate for implementation of efficient receivers in indoor sensor networks.

Effect of Relay Location in Cooperative Networks with Partially Differential Modulation Scheme (부분차등변조 방식을 이용한 협력네트워크에서의 중계기 위치의 영향)

  • Cho, Woong;Cho, Han-Byeog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.6
    • /
    • pp.671-676
    • /
    • 2015
  • Cooperative networks eliminate shadow area using relay and enhance communication performance by creating virtual multi input multi output (MIMO) system. In this paper, we analyze the performance of cooperative networks which use coherent modulation scheme in source-relay nodes and differential modulation scheme in relay-destination nodes depending on the relay location. We consider the performance analysis of systems with and without the direct transmission between source and destination node where the direct transmission adopts differential modulation scheme. In addition, the performance of the system with fully differential modulation scheme is compared with the system using partially differential modulation scheme. The performance of system is based on the symbol error rate between source and destination node.

A Novel Shared Segment Protection Algorithm for Multicast Sessions in Mesh WDM Networks

  • Lu, Cai;Luo, Hongbin;Wang, Sheng;Li, Lemin
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.329-336
    • /
    • 2006
  • This paper investigates the problem of protecting multicast sessions in mesh wavelength-division multiplexing (WDM) networks against single link failures, for example, a fiber cut in optical networks. First, we study the two characteristics of multicast sessions in mesh WDM networks with sparse light splitter configuration. Traditionally, a multicast tree does not contain any circles, and the first characteristic is that a multicast tree has better performance if it contains some circles. Note that a multicast tree has several branches. If a path is added between the leave nodes on different branches, the segment between them on the multicast tree is protected. Based the two characteristics, the survivable multicast sessions routing problem is formulated into an Integer Linear Programming (ILP). Then, a heuristic algorithm, named the adaptive shared segment protection (ASSP) algorithm, is proposed for multicast sessions. The ASSP algorithm need not previously identify the segments for a multicast tree. The segments are determined during the algorithm process. Comparisons are made between the ASSP and two other reported schemes, link disjoint trees (LDT) and shared disjoint paths (SDP), in terms of blocking probability and resource cost on CERNET and USNET topologies. Simulations show that the ASSP algorithm has better performance than other existing schemes.

  • PDF

Effect of Chaos and Instability of Brillouin-Active Fiber Based on Optical Communication Networks

  • Kim, Yong-Kab
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.6 no.4
    • /
    • pp.272-277
    • /
    • 2013
  • In this paper the effect of instability and chaos in optical fiber networks based on the Internet is described. Nonlinear optical fiber effect especially Brillouin scattering in networks has emerged as the essential means for the construction of active optical devices used for all-optic in-line switching, channel selection, amplification, oscillation in optical communications and a host of other applications. The inherent optical feedback by the back-scattered Stokes wave in optical networks also leads to instabilities in the form of optical chaos. This paradigm of optical chaos in fiber Internet serves as a test for fundamental study of chaos and its suppression and exploitation in practical application in optical fiber communication. This paper attempts to present a survey and some of our research findings on the nature of Brillouin chaotic effect on Internet based optical communication.