• Title/Summary/Keyword: information overload

Search Result 531, Processing Time 0.032 seconds

Network Topology Discovery with Load Balancing for IoT Environment (IoT환경에서의 부하 균형을 이룬 네트워크 토폴로지 탐색)

  • Park, Hyunsu;Kim, Jinsoo;Park, Moosung;Jeon, Youngbae;Yoon, Jiwon
    • Journal of KIISE
    • /
    • v.44 no.10
    • /
    • pp.1071-1080
    • /
    • 2017
  • With today's complex networks, asset identification of network devices is becoming an important issue in management and security. Because these assets are connected to the network, it is also important to identify the network structure and to verify the location and connection status of each asset. This can be used to identify vulnerabilities in the network architecture and find solutions to minimize these vulnerabilities. However, in an IoT(Internet of Things) network with a small amount of resources, the Traceroute packets sent by the monitors may overload the IoT devices to determine the network structure. In this paper, we describe how we improved the existing the well-known double-tree algorithm to effectively reduce the load on the network of IoT devices. To balance the load, this paper proposes a new destination-matching algorithm and attempts to search for the path that does not overlap the current search path statistically. This balances the load on the network and additionally balances the monitor's resource usage.

A Token Based Clustering Algorithm Considering Uniform Density Cluster in Wireless Sensor Networks (무선 센서 네트워크에서 균등한 클러스터 밀도를 고려한 토큰 기반의 클러스터링 알고리즘)

  • Lee, Hyun-Seok;Heo, Jeong-Seok
    • The KIPS Transactions:PartC
    • /
    • v.17C no.3
    • /
    • pp.291-298
    • /
    • 2010
  • In wireless sensor networks, energy is the most important consideration because the lifetime of the sensor node is limited by battery. The clustering is the one of methods used to manage network energy consumption efficiently and LEACH(Low-Energy Adaptive Clustering Hierarchy) is one of the most famous clustering algorithms. LEACH utilizes randomized rotation of cluster-head to evenly distribute the energy load among the sensor nodes in the network. The random selection method of cluster-head does not guarantee the number of cluster-heads produced in each round to be equal to expected optimal value. And, the cluster head in a high-density cluster has an overload condition. In this paper, we proposed both a token based cluster-head selection algorithm for guarantee the number of cluster-heads and a cluster selection algorithm for uniform-density cluster. Through simulation, it is shown that the proposed algorithm improve the network lifetime about 9.3% better than LEACH.

A Forward Speed Control of Head-feed Combine Using Continuously Variable V-belt Transmission -Combine Load Characteristics- (V-벨트 무단변속기(無斷變速機)를 이용(利用)한 자탈형(自脫型) 콤바인의 주행속도(走行速度) 제어(制御)(I))

  • Choi, K.H.;Ryu, K.H.;Cho, Y.K.;Park, P.K.
    • Journal of Biosystems Engineering
    • /
    • v.16 no.2
    • /
    • pp.124-132
    • /
    • 1991
  • This study was carried out to obtain the information needed in the development of forward speed control system and the improvement of combine performance. The effects of variety, grain moisture content and forward speed on the combine load characteristics were investigated through experiments. The results of this study are summarized as follows. 1. A data acquisition system was developed to measure the engine speed and the torques and speeds of the threshing cylinder, dean-grain auger and tailings-return auger. The system consisted of transducers, signal conditioner, interface board and microcomputer. The system accuracy is better than ${\pm}2.3%$ full scale. 2. Linear regression equations were obtained for the torque, speed and power requirement of threshing cylinder for different paddy varieties, grain moisture contents and feed rates. 3. The maximum value of relative frequency for threshing cylinder torque decreased as the increase in feed rate and moisture content. The range of torque fluctuation was 1.2~3.7 and 1.2~1.9 times the average and maximum torque, respectively. The maximum value of power spectrum density (PSD) appeared to be about 11 Hz regardless of paddy variety, grain moisture content and feed rate. 4. The speed of tailings return thrower decreased rapidly at below 900rpm, and it fell to near zero about 3 seconds after that time. When the travelling of combine harvester was stopped immediately after sensing the overload, it took about 7 seconds for a full recovery of the no-load speed of tailings return thrower.

  • PDF

Embedding Complete binary trees, Hypercube and Hyperpetersen Networks into Petersen-Torus(PT) Networks (정이진트리, 하이퍼큐브 및 하이퍼피터슨 네트워크를 피터슨-토러스(PT) 네트워크에 임베딩)

  • Seo, Jung-Hyun;Lee, Hyeong-Ok;Jang, Moon-Suk
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.8
    • /
    • pp.361-371
    • /
    • 2008
  • In this paper, the hypercube, hyperpetersen networks, whose degree is increasing in accordance with expansion of number of node and complete binary tree are one-to-one embedded into peterson-torus(PT) network which has fixed degree. The one-to-one embedding has less risk of overload or idle for the processor comparative to one-to-many and many-to-one embedding. For the algorithms which were developed on hypercube or hyperpetersen are used for PT network, it is one-to one embedded at expansion ${\doteqdot}1$, dilation 1.5n+2 and link congestion O(n) not to generate large numbers of idle processor. The complete binary tree is embedded into PT network with link congestion =1, expansion ${\doteqdot}5$ and dilation O(n) to avoid the bottleneck at the wormhole routing system which is not affected by the path length.

System Design of IDS for DDoS Detect and Defense (DDoS공격감지 및 방어를 위한 침입방지 시스템의 설계)

  • Hong, Seong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6845-6848
    • /
    • 2014
  • This paper proposes a system design of IDS for detecting and defending against DDoS attacks on a network. The proposed system has three parts; the Alert, Attack Analyzer and Defense agent. When the server resource was reduced too much by incoming traffic, the Alert Agent sends message and traffic information to the Attack Analyzer. The message and traffic to the Attack analyzer include only the sender & receiver address and packet numbers for minimizing the overload of Attack Analyzer. Message Received Attack Analyzer investigates the Message. If the pattern of traffic is the same as the DDoS Style, the Analyzer sends a message to the Defense Agent to block that traffic. In this system, at the serious state of the server-down, the Attack analyzer uncovers the DDoS Attacker and send a message to the Defense Agent to block that traffic. This works for server reactivation as soon as possible.

The neural mechanism of distributed and focused attention and their relation to statistical representation of visual displays (분산주의와 초점주의의 신경기제 및 시각 통계표상과의 관계)

  • Chong, Sang-Chul;Joo, Sung-Jun
    • Korean Journal of Cognitive Science
    • /
    • v.18 no.4
    • /
    • pp.399-415
    • /
    • 2007
  • Many objects are always present in a visual scene. Since the visual system has limited capacity to process multiple stimuli at a time, how to cope with this informational overload is one of the important problems to solve in visual perception. This study investigated the suppressive interactions among multiple stimuli when attention was directed to either one of the stimuli or all of them. The results indicate that suppressive interactions among multiple circles were reduced in V4 when subjects paid attention to one of the four locations, as compared to the unattended condition. However, suppressive interactions were not reduced when they paid attention to all four items as a set, in order to compute their mean size. These results suggest that whereas focused attention serves to later out irrelevant information, distributed attention provides an average representation of multiple stimuli.

  • PDF

An Analysis of Factors Influencing the Turnover Intension of IT Service Employees in SMEs : Focusing on the Moderating Effect of Congruity between Leadership-Organizational Culture (중소IT서비스기업 종사자의 이직의도에 미치는 영향요인에 관한 연구 : 리더십-문화 적합성의 조절효과를 중심으로)

  • Kim, Changkyu;Bae, Boktae
    • Journal of Information Technology Services
    • /
    • v.17 no.2
    • /
    • pp.1-16
    • /
    • 2018
  • Large corporations have the work and roles of employees clearly defined in accordance with their established internal structure whereas small and mid-sized firms may lack an official job specification or a written job description, causing ambiguity in the role of employees. In IT service companies, especially, there is a relatively large number of tasks requiring one person to play multiple roles and they are often highly dependent on few key players. In this reality where about 80% of the job seekers end up in SMEs, it is therefore necessary to look into how the turnover factors such as job strain and occupational burnout caused by the role ambiguity from extra work affect the turnover intentions of small and medium sized IT service firm employees. The outcome of this study is as follows. First, the relationship between job strain and turnover intention has been examined to find that a weak inverted U shaped relationship exists between role overload, which is a subset of job strain, and turnover intention. Second, the hypothesis based on the competing values framework has been tested that the fitness with organizational leadership and culture would moderate the relationship between job strain and turnover intention and it has been confirmed that the degree of relationship between role conflict and role ambiguity, the subsets of job strain, and turnover intention has changed. In conclusion, in order to discourage turnover intention, it is necessary to increase the fitness with the organization and leadership or generate a sufficient level of strain in case of an organization with low fitness.

The Method of Supporting QoS in B3G Environment (B3G 환경에서 QoS 보장 방안)

  • Lee, Jong-Chan
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.77-82
    • /
    • 2007
  • Supporting Quality of Service (QoS) for multimedia services in heterogeneous mobile networks is a part of key issue for Beyond Three Generation (B3G) development. In particular, if QoS degradation are occurred because cell overload and error late patterns of wireless links during the transmission of multimedia data, the efficient QoS management is necessary to maintain the same QoS of transmitted multimedia data because the QoS may be defected by some delay and information loss. This paper deals with QoS Degradation reason Intra-System Handover (D-ISHO) for handling QoS of multimedia services over heterogeneous mobile networks. For this aim, the function modules for supporting QoS of D-ISHO are proposed. The sequence diagram showing interaction between the modules is described and then a scenario for D-ISHO is considered. Simulation is focused on the average delay and packet loss rate. The proposed heterogeneous mobile system using the QoS-Guaranteed Resource Management (QGRM) provides a better performance than each different access system.

  • PDF

A hybrid study on self-generators based on system for high-efficiency (하이브리드형 고효율 자가 발전기를 위한 시스템에 관한 연구)

  • Jeong, Yang-Kwon;Um, Tae-Hyoun;Kim, Gi-Hoon;Hun, Whang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.897-902
    • /
    • 2011
  • This study incorporates a welder and a generator as needed while using the generator to be used as a welder is to configure the system. As such, in order to offer an integrated system to prevent the rapid charging process to manage the power state information, system configuration is the most important. Ideally, the random controls the flow of charge is ideal for that. When charging is good as long as possible, less current. However, In this study, the most ideal fusion welder and generator as required by the generator or welder can be used as a system is proposed. Specifically, the damage can be caused by carelessness, so short-circuit protection, overload protection, reverse polarity protection, automatic charging system is all about, including the ability to adjust.

SPIT Prevention Framework using Expanded White List (확장 화이트리스트 기법을 이용한 SPIT 대응 프레임워크)

  • Bae, Kwang-Yong;Chae, Kang-Suk;Kim, Young-Beom
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.95-102
    • /
    • 2010
  • This paper proposes a SPIT(Spam over IP Telephony) prevention framework which is using expanded white-list in real-time VoIP environment. The existing schemes are vulnerable to attack from spammers since they can continue to transfer SPIT upon changing their ID. And existing frameworks have experienced the time delay and overload as session initiates due to real-time operation. To solve these problems, the proposed scheme expands the scope of white lists by forming social networks using the white list, but it is to decide quickly whether pass a caller ID without searching the entire database. The proposed framework takes the three-stage architecture and the fast scoring system. The proposed framework minimize user's inconvenience and time delay for initiation of session, therefore, it is proper for real-time VoIP environment.