• Title/Summary/Keyword: link connectivity

Search Result 110, Processing Time 0.021 seconds

A Data Mining Technique for Customer Behavior Association Analysis in Cyber Shopping Malls (가상상점에서 고객 행위 연관성 분석을 위한 데이터 마이닝 기법)

  • 김종우;이병헌;이경미;한재룡;강태근;유관종
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.21-36
    • /
    • 1999
  • Using user monitoring techniques on web, marketing decision makers in cyber shopping malls can gather customer behavior data as well as sales transaction data and customer profiles. In this paper, we present a marketing rule extraction technique for customer behavior analysis in cyber shopping malls, The technique is an application of market basket analysis which is a representative data mining technique for extracting association rules. The market basket analysis technique is applied on a customer behavior log table, which provide association rules about web pages in a cyber shopping mall. The extracted association rules can be used for mall layout design, product packaging, web page link design, and product recommendation. A prototype cyber shopping mall with customer monitoring features and a customer behavior analysis algorithm is implemented using Java Web Server, Servlet, JDBC(Java Database Connectivity), and relational database on windows NT.

  • PDF

A Design for a Zigbee Security System in the Customer Side Environment of Jeju Smart Grid Field Test (제주 스마트그리드 실증단지 수용가 환경에서 Zigbee 보안 체계 설계)

  • Lee, Myung-Hoon;Son, Sung-Yong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.8
    • /
    • pp.1186-1192
    • /
    • 2012
  • In Jeju Smart Grid field test, Zigbee technology is being used as one of customer side solutions for AMI. Although Zigbee networks that provides effective connectivity and control among devices are advantages in ease of implementation and use, the data can be exposed to cyber attacks such as eavesdrop, unauthorized data dissemination and forgery. Currently authentication and confidentiality services are provided with the network and link keys generated based on public key pairs that are pre-installed in offline. However, the network is vulnerable once a hacker intrudes into a local network because operation and management policies for the generated keys are not well-established yet. In this paper, the vulnerability of the Zigbee security system in the customer side environment of Jeju Smart Grid field test is analyzed. Then, two-way authentication with the unique identifiers of devices and user-specific group management policies are proposed to resolve the vulnerability.

Research on Commercialization of IP-based CDMA Mobile Communication Systems (IP 기반의 CDMA 이동통신 시스템 상용화 사례 연구)

  • Yi, Seung-Hee
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.350-354
    • /
    • 2008
  • IP-based mobile communication system is one of the key research items in the mobile networks for a long time. But, due to some technical issues and no need of markets, it is still not full-fledged. Recently, CDMA and WCDMA service providers want to introduce IP-based network connectivity. Even though their efforts, the main network intra-structure depends on ATM or HDLC technology. This article describes a good example of commercialization of IP-based mobile communication systems. Our research is not experimental system but a in-service system - replacing the existing equipments with new IP-based systems. In this paper, we introduce IP related technologies used in our research such as IP-based ATCA(Advanced Telecommunications Computing Architecture) platform, HA(High Availability) redundancy, IP multicast, network redundancy techniques, multi-link bundling and IP header compression. These are already well-known to internet domain. We mix them with mobile communication systems concretely.

  • PDF

EdgeCPS Technology Trend for Massive Autonomous Things (대규모 디바이스의 자율제어를 위한 EdgeCPS 기술 동향)

  • Chun, I.G.;Kang, S.J.;Na, G.J.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.1
    • /
    • pp.32-41
    • /
    • 2022
  • With the development of computing technology, the convergence of ICT with existing traditional industries is being attempted. In particular, with the recent advent of 5G, connectivity with numerous AuT (autonomous Things) in the real world as well as simple mobile terminals has increased. As more devices are deployed in the real world, the need for technology for devices to learn and act autonomously to communicate with humans has begun to emerge. This article introduces "Device to the Edge," a new computing paradigm that enables various devices in smart spaces (e.g., factories, metaverse, shipyards, and city centers) to perform ultra-reliable, low-latency and high-speed processing regardless of the limitations of capability and performance. The proposed technology, referred to as EdgeCPS, can link devices to augmented virtual resources of edge servers to support complex artificial intelligence tasks and ultra-proximity services from low-specification/low-resource devices to high-performance devices.

Ontology BIM-based Knowledge Service Framework Architecture Development (온톨로지 BIM 기반 지식 서비스 프레임웍 아키텍처 개발)

  • Kang, Tae-Wook
    • Journal of KIBIM
    • /
    • v.12 no.4
    • /
    • pp.52-60
    • /
    • 2022
  • Recently, the demand for connection between various heterogeneous dataset and BIM as a construction data model hub is increasing. In the past, in order to connect model between BIM and heterogeneous dataset, related dataset was stored in the RDBMS, and the service was provided by programming a method to link with the BIM object. This approach causes problems such as the need to modify the database schema and business logic, and the migration of existing data when requirements change. This problem adversely affects the scalability, reusability, and maintainability of model information. This study proposes an ontology BIM-based knowledge service framework considering the connectivity and scalability between BIM and heterogeneous dataset. Through the proposed framework, ontology BIM mapping, semantic information query method for linking between knowledge-expressing dataset and BIM are presented. In addition, to identify the effectiveness of the proposed method, the prototype is developed. Also, the effectiveness and considerations of the ontology BIM-based knowledge service framework are derived.

An Efficient E-learning and Internet Service Provision for Rural Areas Using High-Altitude Platforms during COVID-19 Pan-Demic

  • Sameer Alsharif;Rashid A. Saeed;Yasser Albagory
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.71-82
    • /
    • 2024
  • This paper proposes a new communication system for e-learning applications to mitigate the negative impacts of COVID-19 where the online massive demands impact the current commu-nications systems infrastructures and capabilities. The proposed system utilizes high-altitude platforms (HAPs) for fast and efficient connectivity provision to bridge the communication in-frastructure gap in the current pandemic. The system model is investigated, and its performance is analyzed using adaptive antenna arrays to achieve high quality and high transmission data rates at the student premises. In addition, the single beam and multibeam HAP radio coverage scenarios are examined using tapered uniform concentric circular arrays to achieve feasible communication link requirements.

Mobility Information based Routing for Delay and Disruption Tolerant Network (이동성 정보를 이용한 DTN 네트워크 라우팅 프로토콜)

  • Chang, Duk-Hyun;Shim, Yoon-Bo;Kim, Gil-Soo;Choi, Nak-Jung;Ryu, Ji-Ho;Kwon, Tae-Kyoung;Choi, Yang-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.2
    • /
    • pp.130-136
    • /
    • 2009
  • Delay and Disruption Tolerant Network (DTN) employs message delivery based on a store-and-forward method to conquer no guarantee of continuous end-to-end connectivity. Different from general networks, it is hard for the existing TCP/IP-based routing protocols to correctly work, due to the characteristics such as large latency and unstable link connectivity. Thus, many recent studies focus on routing protocols for DTN. In this paper, we propose a novel routing protocol for DTN with efficient message delivery utilizing mobility information such as direction or destination of mobile nodes. And this protocol is enhanced in terms of delivery ratio, decreases latency and overhead compared to the previously proposed solutions. Simulation results prove its superiority.

Statistical Analysis for Path Break-Up Time of Mobile Wireless Networks (이동 무선망의 경로 붕괴시간에 대한 통계적 분석)

  • Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.113-118
    • /
    • 2015
  • Mobile wireless networks have received a lot of attention as a future wireless network due to its rapid deployment without communication infrastructure. In these networks communication path between two arbitrary nodes break down because some links in the path are beyond transmission range($r_0$) due to the mobility of the nodes. The set of total path break down time(${\bigcup}T_i$), which is the union of path break down time of every node pair, can be a good measure of the connectivity of the dynamic mobile wireless network. In this paper we show that the distribution of the total path break down time can be approximated as a exponential probability density function and confirms it through experimental data. Statistical knowledge of break down time enables quantitative prediction of delay, packet loss between two nodes, thus provides confidence in the simulation results of mobile wireless networks.

Robust Acknowledgement Transmission for Long Range Internet of Things (장거리 사물 인터넷 기기를 위한 간섭에 강인한 ACK 기술)

  • Lee, Il-Gu
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.47-52
    • /
    • 2018
  • Wi-Fi enabled Internet of Things (IoTs) had a substantial impact on society, economy and industry. However wireless connectivity technologies in unlicensed band such as Wi-Fi are vulnerable to interferences. They also face difficulty providing wireless connectivity over long range in dense networks due to the dynamically changed interference effect and asymmetric interference conditions. In this paper, robust acknowledgement transmission scheme is proposed for long range IoTs. According to the proposed scheme, it is possible to control the transmission rate of the transmission success rate of the response frame by adjusting the transmission rate of the response frame when the interference is present asymmetrically. It is also possible to use higher data rate when high quality link is guaranteed. The evaluation results demonstrated the proposed scheme improves the aggregate throughput by at most 9 Mbps when 20 MHz bandwidth transmission mode was adopted.

Message Delivery and Energy Consumption Analysis on Pocket Switched Network Routing Protocols (Pocket Witched Network 라우팅 프로토콜의 메시지 전송 및 에너지 소비 분석)

  • Cabacas, Regin;Ra, In-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.6
    • /
    • pp.571-576
    • /
    • 2013
  • Despite the development of the Internet, both in terms of technology and coverage, there are still remote areas and scenarios where connectivity is very difficult to achieve. Pocket Switched Network is a network paradigm that takes the advantage of human mobility to disseminate data. Factors such as mobility of nodes, link failures, discharged batteries, are among the challenges that may compromise connectivity in these networks. This paper presents a performance analysis of existing routing schemes for PSN in terms of delivery probability, overhead ratio, average latency and average residual energy when the number of nodes is increased. We seek to identify a scheme that maximizes data delivery while minimizing communication overhead and thus extending the network lifetime.