• Title/Summary/Keyword: in-network join

Search Result 156, Processing Time 0.027 seconds

A Method to Measure Damage Areas on Railway Accidents by the HAZMATs types using GIS Spatial Analysis (GIS 공간 분석기법을 활용한 위험물질별 철도사고 피해규모 자동추출방안에 관한 연구)

  • Park, Min-Kyu;Kim, Si-Gon;Lee, Won-Tae
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.1
    • /
    • pp.35-42
    • /
    • 2010
  • Due to the industrialization and urbanization, the transport of hazardous materials increases, which rises possibilities in occurring prospective accidents in terms of hazardous material transport as well. This study applied the model developed from the previous research to analyze the scale of damage areas from the accidents related to hazardous material accidents, as well as suggested a method to measure automatically the scale of accident including casualties and environmental damage based on the guideline which suggests the quantities of hazardous materials exposed from an accident and was defined in the study of standardization for hazardous material classification. A buffering analysis technique of Geographic Information System (GIS) was applied for that. To apply the model which evaluates the scale of population and exposure to environment on each link, rail network, zones, rail accident data, rail freight trips, and locations of rivers etc were complied as a database for GIS analysis. In conclusion, a method to measure damage areas by the types of hazardous materials was introduced using a Clip and a Special Join technique for overlay analysis.

Design and Implementation of a Hybrid-type Video Conference System using SIP Protocol (SIP 프로토콜을 이용한 하이브리드형 화상회의 시스템의 설계 및 구현)

  • Jung TaeUn;Kim YoungHan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.51-59
    • /
    • 2005
  • In this paper, we propose and implement a hybrid-type video conference system using SIP protocol proposed in IEFT. This conference system, all signaling is controled by the server, while the media communication can be managed either by UAs or by the server. as a result, the complexity of its routing and user state management is reduced and it is applicable to the mobile environment of the ad-hoc models. The implemented server is scale enough to be used in a large conference because it only takes charge of signaling part. And also we see that UAs are only suitable in the small conference where less than ten people can join.

Service Scheduling in Cloud Computing based on Queuing Game Model

  • Lin, Fuhong;Zhou, Xianwei;Huang, Daochao;Song, Wei;Han, Dongsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1554-1566
    • /
    • 2014
  • Cloud Computing allows application providers seamlessly scaling their services and enables users scaling their usage according to their needs. In this paper, using queuing game model, we present service scheduling schemes which are used in software as a service (SaaS). The object is maximizing the Cloud Computing platform's (CCP's) payoff via controlling the service requests whether to join or balk, and controlling the value of CCP's admission fee. Firstly, we treat the CCP as one virtual machine (VM) and analyze the optimal queue length with a fixed admission fee distribution. If the position number of a new service request is bigger than the optimal queue length, it balks. Otherwise, it joins in. Under this scheme, the CCP's payoff can be maximized. Secondly, we extend this achievement to the multiple VMs situation. A big difference between single VM and multiple VMs is that the latter one needs to decide which VM the service requests turn to for service. We use a corresponding algorithm solve it. Simulation results demonstrate the good performance of our schemes.

Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity

  • Lee, Jung-San;Wei, Kuo-Jui;Chen, Ying-Chin;Sun, Yun-Hsiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5616-5642
    • /
    • 2016
  • Different from traditional auctions, electronic auctions provide a platform to allow bidders and auctioneers merchandise to each other over network anytime and anywhere. Auctioneers can publish information of goods, and bidders can choose the interested targets through this bidding platform. To ensure the fairness and security of electronic auctions, Li et al. have proposed a practical electronic auction scheme which can confirm the requirement of strong anonymity, bidding privacy, and secret bidding price. However, we have found out that Li et al.'s scheme may lurk the risk of the denial-of-service attack during the bidding phase in a sealed-bid auction. Thus, we propose a brand-new sealed-bid auction mechanism, in which the essentials of e-auction can be firmly preserved. In particular, each bidder only needs to register at the center once and then can join to multiple plays launched by different auctioneers. Moreover, the correctness of mutual authentication is confirmed according to the BAN logic model.

A Design of P2P Cloud System Using The Super P2P

  • Jung, Yean-Woo;Cho, Seongsoo;Lee, Jong-Yong;Jeong, KyeDong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.42-48
    • /
    • 2015
  • Generally, the current commercial cloud system is hosted by the centralization large datacenter. However, the other clouding forms existed and one of them is the P2P cloud. The P2P Cloud is a distributed systems, is freedom to join and leave and is possible to provide the IaaS. Commonly, P2P Cloud System is based on Pure-P2P System. Since a number of connection paths exist, it has a high reliability and easily scalability of the network. However, there are disadvantages of the slow rate of route because of looking up the all peers in order to search for the peer. In this paper, it proposes the P2P cloud system based on super-peer P2P. Super-peer P2P system has fast routing time, because of searching for cluster unit and it also can has high reliability and high scalability. We designs the super Peer cloud service and proposes the system model and Resource Allocation Algorithm for IaaS in Super peer P2P environment.

On the Study of Key Management in Mobile Ad Hoc Networks (이동 임시무선망에서의 키 관리 기법에 관한 연구)

  • Kim Si-Gwan;Shin Yoon-Shik;Lim Eun-Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.4
    • /
    • pp.90-98
    • /
    • 2004
  • This paper covers the issue of securing ad hoc networks. Such networks exhibit a number of characteristics that make such a task challenging. One of the major challenges is that ad hoc networks typically lack a fixed infrastructure both in form of physical infrastructure such as routers, servers, and stable communication links and in the form of an organizational or administrative infrastructure. Another difficulty lies in the highly dynamic nature of ad hoc networks since new nodes can join and leave the network at any time. The major problem in providing security services in such infrastructure less networks is how to manage the cryptographic keys that are needed. In order to design practical and efficient key management systems it is necessary to understand the characteristics of ad hoc networks and why traditional key management systems cannot be used. These issues are covered and we also present a new efficient key management solutions. Finally we show that the proposed method is more efficient than the previous works through simulations.

  • PDF

Decision-Making Method of Priority Welding Process (용접법의 우선순위 결정 방법)

  • Kim, Jong-Do;Kim, Kwang-heui;Yoon, Moon-Chul
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.15 no.5
    • /
    • pp.39-47
    • /
    • 2016
  • Nowadays, several welding processes are generally used to join parts together, and the materials are generally steel, aluminum, copper, stainless steel, and other difficult-to-weld materials. If a proper welding process is chosen, it is helpful for welding parts. However, there is no desirable technique for appropriately deciding on the welding process in the industry. Therefore, an appropriate method of selecting a welding process is needed for the novice worker in the industry. In this sense, a new analytic network process (ANP) technique is used for effective decision making in welding. By considering several criteria in ANP, a selection method is suggested to decide on the proper welding process. In the study, several criteria were considered for the proper welding of parts. By considering a matrix of prior interdependence effects among various welding processes, a decision-making method based on an ANP is accomplished using a weighting matrix, which is supposed to select an appropriate welding process. In addition, for appropriate decision criteria of the welding process, several factors, such as material, shape, precision, economics, and equipment, are used to accomplish the ANP algorithm. Moreover, the final weighting matrix is calculated following its ANP strategy. Furthermore, this decision-making technique is applied to both stainless razor spot joining and thick steel pipe joining. The results show its reliability and practicality, and the novice engineer and manager can use this technique to determine the best welding process.

An Efficient Key Distribution for Broadcast Encryption at Embedded Computing Environment (임베디드 컴퓨팅 환경에서 브로드캐스트 암호화를 위한 효율적인 키 분배)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.34-45
    • /
    • 2008
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. User acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. The temporary conference environment base structure against an each mobile device wild gap. Without the transmission possible, it follows infrequent location change and with the quality where the key information change flow. Thus, in this paper, in order to apply to the embedded computing environment and the key generation and the efficient key renewal are done when the mobile device is used of the specify space it proposes.

  • PDF

An Extended FA-based Multicast Routing for Mobile IP-based Multicasting (Mobile IP 기반의 멀티캐스트 지원을 위한 확장된 FA 기반 멀티캐스트 라우팅)

  • Kang, Pil-Yong;Shin, Yong-Tae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3490-3499
    • /
    • 2000
  • There are two approaches, HA(Home Agent)-based and FA(Froegn Agent)-based mulicasting in mobile computing environments based on mobile IP. If we consider efficiency of routing and bandwidth the FA-based model is better than the HA-based model. But in the case of a MH(Mobile Host) moves frequently it shows bad connection durability because of join and graph delays. To overcome this and to support effective mobile multicasting we propose an extended FA-based multicast routing. In our model previous FA for wards multicast packets to MH. while new FA processes a jion request from MH. That is in general case our model supports FA-based multicasting for efficiency but it provides unicast-based mulicasting for connection durability when MH moves to new FN(Roreign Network). To evaluate our model, we analyze connecction durability, bandwidth, overheads and routing sosts in many situations and compare with previous works.

  • PDF

An Mechanism to Support IP Multicast over ATM Network (ATM망에서의 IP 멀티캐스트 지원 메커니즘)

  • 안광수
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.117-125
    • /
    • 2003
  • The proposed mechanism has an group management server, which manages the information about both the receivers and the senders. Any receiver can dynamically join/leave the multicast VC. The signaling overload due to group membership changes is not concentrated on the sender, but it is distributed to many receivers for the scalability improvement. The associated signaling messages propagates from the receivers to the ATM switch dedicated to the multicast VC, and hence no signaling overload exists in the shared links there is no latency for the receiver to wait. Our proposed scheme is superior in the view of scalability, the efficiency and the latency to other schemes.

  • PDF