• Title/Summary/Keyword: protocol Analysis

Search Result 2,519, Processing Time 0.034 seconds

Routing protocol Analysis in Low Power Sensor Network For Energy Efficiency (에너지 효율성을 고려한 저 전력 센서 네트워크에서의 라우팅 프로토콜 분석)

  • Kim, Dong-il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.777-780
    • /
    • 2014
  • The sensor network technology for core technology of ubiquitous computing is in the spotlight recently, the research on sensor network is proceeding actively which is composed many different sensor node. The major traffic patterns of plenty of sensor networks are composed of collecting types of single directional data, which is transmitting packets from several sensor nodes to sink node. One of the important condition for design of sensor node is to extend for network life which is to minimize power-consumption under the limited resources of sensor network. In this work, we analysis adapted routing protocols using the network simulation that was used exiting network and network provider needs will be able to solve the problem.

  • PDF

Design Considerations for KPS Navigation Message

  • Noh, Jae Hee;Lim, Deok Won;Heo, Moon Beom;Jo, Gwang Hee;Lee, Sang Jeong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.9 no.4
    • /
    • pp.305-317
    • /
    • 2020
  • The navigation message is composed of the information contained in the message and the structure for transmitting this information. In order to design a navigation message, considerations in terms of message content and message structure must be elicited. For designing a Korea Positioning System (KPS) navigation message, this paper explains performance indicators in terms of message structure and message content. Most of the performance analysis of GNSS navigation messages already in operation was performed only for Time-to-first-fix-Data (TTFFD). However, in the navigation message, the message content is composed of Clock-Ephemeris Data (CED) and additional information. So, this paper proposes a new performance indicator R_(Non-CED) that can be analyzed from the viewpoint of receiving additional information along with an explanation of TTFFD focusing on the CED reception time. This paper analyze the performance in terms of message structure using these two performance indicators. The message structures used for analysis are the packetized message protocol like GPS CNAV and the packetized and fixed pattern message protocol like GPS CNAV-2. From the results, it is possible to proffer how KPS navigation messages can have better performance than GPS navigation messages. And, these two performance indicators, TTFFD and RNon-CED, can help to design the minimum TTFF required performance of KPS navigation messages.

Exploring the Contextual Elements of Book Use to Improve Book Recommender Systems (도서추천 시스템 개선을 위한 도서이용 맥락 요소 탐색)

  • Shim, Jiyoung
    • Journal of the Korean Society for information Management
    • /
    • v.39 no.2
    • /
    • pp.299-324
    • /
    • 2022
  • In this study, in order to explore the contextual elements of book use that were overlooked in the existing book recommender system research, for 15 avid readers with various book search backgrounds, the contents generated in 6 book search situations were collected through the think-aloud protocol. By using content analysis from the collected book use contents, not only the internal and external appeal factors affecting book use, based on the 'appeal factor', the theoretical concept of the readers' advisory service, but also information sources and search methods regarding book use were identified and categorized. The results of this study can be used to extract and reflect meaningful attribute data in the future book recommender system design process.

Technical Procedure for Identifying the Source of Nitrate in Water using Nitrogen and Oxygen Stable Isotope Ratios (질소 및 산소 안정동위원소 활용 수계 질산성 질소 오염원 판별을 위한 기술 절차 제안)

  • Kim, Kibeum;Chung, Jaeshik;Lee, Seunghak
    • Journal of Soil and Groundwater Environment
    • /
    • v.27 no.2
    • /
    • pp.87-98
    • /
    • 2022
  • This study aims to prepare a technical protocol for identifying the source of nitrate in water using nitrogen (δ15N) and oxygen (δ18O) stable isotope ratios. The technical processes for nitrate sources identification are composed of site investigation, sample collection and analysis, isotope analysis, source identification using isotope characteristics, and source apportionment for multiple potential sources with the Bayesian isotope mixing model. Characteristics of various nitrate potential sources are reviewed, and their typical ranges of δ15N and δ18O are comparatively analyzed and summarized. This study also summarizes the current knowledge on the dual-isotope approach and how to correlate the field-relevant information such as land use and hydrochemical data to the nitrate source identification.

Developing a Analysis Tool of Canopen Over EtherCat Protocol (Canopen over EtherCAT 프로토콜 분석 도구 개발)

  • Youn, Seung-Hui;Lee, Hyo-Rim;Choi, Guk-Choel;Lee, Chang-Hong;Kim, Dong-Hyun;Kim, Jong-Deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.434-437
    • /
    • 2021
  • Canopen over EtherCAT(CoE) is a Canopen protocol that operates based on EtherCAT in industrial sites. In order to analyze a CoE network system and a performance through packet sniffing and reversing, it is necessary to know Data Objects structure and changes of its value. However, since Data Objects in Canopen is dependent on the devices, there is a limitation by using an existing packet analysis program like a Wireshark. Therefore, we designed and developed a system that infers Data Objects structure and system configuration.

  • PDF

Extention of Kailar Accountability Logic for Symmetric Key Digital Signature and Accountavility Analysis of an Electronic Payment Potocol (대칭키 전자서명을 위한 Kailar 책임 로직 (Accountability Logic)의 확장 및 전자지불 프로토콜의 책임분석)

  • Kim, Yeong-Dal;Han, Seon-Yeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3046-3059
    • /
    • 1999
  • Kailar Accountability Logic proposed for the accountability analysis of communication protocols that require accountability and use asymmetric key digital signature is extended for protocols that use symmetric key digital signature. A proposed electronic micropayment protocol that uses symmetric key digital signature is analyzed to illustrate the use of the extend logic in detecting its lack f accountability and suggesting changes to enhance its accountability.

  • PDF

Performance Analysis of a Timer-Controlled Network Protocol with an Immediate Response Scheme (즉시 응답 기능이 있는 타이머 제어형 통신망의 성능 해석)

  • 문상용;박홍성권욱현
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.247-250
    • /
    • 1998
  • In this paper, a special kind of timer-controlled network is analyzed. A timer-controlled network with an immediate response scheme is modeled and analyzed. It is assumed that each station on the network has single buffer and individual finite number of maximum retransmission limit. The physical meanings of derived results are briefly explained, which prove that the results completely coincide with the physical operations of that kind of network. It is also shown by computer simulations that derived analysis results are valid.

  • PDF

A Study on the Development of Intelligent Decision Systems Using Influence Diagram

  • Kim, Jae-Kyeong
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.20 no.3
    • /
    • pp.77-104
    • /
    • 1995
  • Intelligent Decision System support the decision analysis process in the managerial problems with decision analytic knowledge as well as domain specific knowledge. Influence Diagram has been one of the major knowledge representation in the intelligent decision system. In the development of intelligent decision system, knowledge acquisition is also known to be difficult. This paper suggests a developing tool using an influence diagram and Verbal Protocol Analysis which facilitates knowledge acquision for intelligent decision system. An ennvironmental decision making problem is used as an illustrative example and validation of the suggested developing tool is discussed. The suggested tool is very flexible to be expanded or applied to similar problems.

  • PDF

Analysis of Business Overview and use of 'C'group's Internet phone of National Information and Communication Services (국가정보통신서비스의 'C'그룹 인터넷전화 사업현황과 이용 분석)

  • Shin, Jin;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2391-2398
    • /
    • 2011
  • National Information and Communication Services of Public Administration and Security organized by the 'A 'group (Line service network), 'B' group (IP service network), 'C' Group (Voice over Internet protocol(VoIP) service, IP application services) are provided by constructing the infrastructure. National Information and Communications Services 'C' group, providers are providing VoIP services. In this paper, national information and communications service 'C' group, providers of domestic calls, international calls, including calls to move we will study the basic telephone service. And text messaging, video telephony, IP-Centrex services, etc. we will study the seven value-added services. In addition, national information and communication service providers on the status of the project based on the analysis of national information and communication Internet telephone network using Internet telephony is the type of analysis. In this study, national information and communications services industry, will serve as the basis for the development.

Use and Business Analysis of the 'C'Group Internet Phone on National Information and Communication Service (국가정보통신서비스의 'C'그룹 인터넷전화 사업현황과 이용 분석)

  • Shin, Jin;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.249-252
    • /
    • 2011
  • National Information and Communication Services of Public Administration and Security organized by the 'A' group (Line service network), 'B' group (IP service network), 'C'Group (Voice over Internet protocol(VoIP) service, IP application services) are provided by constructing the infrastructure. National Information and Communications Services 'C' group, providers are providing VoIP services. In this paper, national information and communications service 'C' group, providers of domestic calls, international calls, including calls to move we will study the basic telephone service. And text messaging, video telephony, IP-Centrex services, etc. we will study the seven value-added services. In addition, national information and communication service providers on the status of the project based on the analysis of national information and communication Internet telephone network using Internet telephony is the type of analysis. In this study, national information and communications services industry, will serve as the basis for the development.

  • PDF