• Title/Summary/Keyword: science network

Search Result 13,182, Processing Time 0.041 seconds

Design and Implementation of User-Oriented Virtual Dedicate Network System Based on Software-Defined Wide Area Network (SD-WAN 기반의 사용자 중심 가상 전용 네트워크 시스템 설계 및 구현)

  • Kim, Yong-hwan;Kim, Dongkyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1081-1094
    • /
    • 2016
  • KREONET is a principal national R&E network running by KISTI in Korea. It uniquely provides production research network services for around 200 non-profit research and educational organizations, based on hybrid (IP and non-IP) network infrastructure. However, KREONET is limited to meet various needs of new network services for advanced Science & Technology (S&T) users because its infrastructure is inherently derived form classical hardware-based, fixed and closed environments. So, KREONET-S is designed to provide advanced S&T services to catch up with time-to-research and time-to-collaboration. In this paper, we present a system architecture of KREONET-S based on network infrastructure that consists of data and control planes separately. Furthermore, we propose and describe VDN service which is capable of building a virtual dedicate & bandwidth-guaranteed network for S&T group dynamically. we implement VDN application on KREONET-S and then perform performance analysis for proving that KREONET-S system and VDN application can be a good solutions to cope with new network paradigms for various advanced S&T applications and users.

Robustness Evaluation of Tactical Network based on SNA

  • Park, Ji-Hye;Yoon, Soung-woong;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.205-213
    • /
    • 2019
  • Network robustness is one of the most important characteristics needed as the network. Over the military tactical communication network, robustness is a key function for maintaining attack phase constantly. Tactical Information Communication Network, called TICN, has mixed characteristics of lattice- and tree-type network topology, which looks somewhat weak in the viewpoint of network robustness. In this paper, we search articulation points and bridges in a current Tactical Information Communication Network using graph theory. To improve the weak points empirically searched, we try to add links to create the concrete network and then observe the change of network-based verification values through diminishing nodes. With these themes, we evaluate the generated networks through SNA techniques. Experimental results show that the generated networks' robustness is improved compared with current network structure.

Robust Extraction of Lean Tissue Contour From Beef Cut Surface Image

  • Heon Hwang;Lee, Y.K.;Y.r. Chen
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 1996.06c
    • /
    • pp.780-791
    • /
    • 1996
  • A hybrid image processing system which automatically distinguished lean tissues in the image of a complex beef cut surface and generated the lean tissue contour has been developed. Because of the in homegeneous distribution and fuzzy pattern of fat and lean tissue on the beef cut, conventional image segmentation and contour generation algorithm suffer from a heavy computing requirement, algorithm complexity and poor robustness. The proposed system utilizes an artificial neural network enhance the robustness of processing. The system is composed of pre-network , network and post-network processing stages. At the pre-network stage, gray level images of beef cuts were segmented and resized to be adequate to the network input. Features such as fat and bone were enhanced and the enhanced input image was converted tot he grid pattern image, whose grid was formed as 4 X4 pixel size. at the network stage, the normalized gray value of each grid image was taken as the network input. Th pre-trained network generated the grid image output of the isolated lean tissue. A training scheme of the network and the separating performance were presented and analyzed. The developed hybrid system showed the feasibility of the human like robust object segmentation and contour generation for the complex , fuzzy and irregular image.

  • PDF

The Investigation of the Leased Line Modem Usability in the Wireless Internet Protocol Network (무선 IP 네트워크에서 전용선 모뎀 사용가능성 검증)

  • PARK, MINHO;Baek, Hae Hyeon;Kum, Dong Won;Choi, Hyungseok;Lee, Jong Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.423-431
    • /
    • 2015
  • A leased line modem usability was evaluated and investigated in the wireless internet protocol(IP) network. The signal of the modem in the circuit switching network was translated to IP packet by using several voice codecs (PCM, G.711A, $G.711{\mu}$, and etc.) and transmitted through the wireless IP network. The wireless IP network was simulated by the Tactical information and communication network Modeling and simulation Software(TMS). The performance and usability of the leased line modem are simulated using the system-in-the-loop(SITL) function of TMS with respect to packet delay, jitter, packet discard ratio, codecs, and wireless link BER.

A Network Coding-Aware Routing Mechanism for Time-Sensitive Data Delivery in Multi-Hop Wireless Networks

  • Jeong, Minho;Ahn, Sanghyun
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1544-1553
    • /
    • 2017
  • The network coding mechanism has attracted much attention because of its advantage of enhanced network throughput which is a desirable characteristic especially in a multi-hop wireless network with limited link capacity such as the device-to-device (D2D) communication network of 5G. COPE proposes to use the XOR-based network coding in the two-hop wireless network topology. For multi-hop wireless networks, the Distributed Coding-Aware Routing (DCAR) mechanism was proposed, in which the coding conditions for two flows intersecting at an intermediate node are defined and the routing metric to improve the coding opportunity by preferring those routes with longer queues is designed. Because the routes with longer queues may increase the delay, DCAR is inefficient in delivering real-time multimedia traffic flows. In this paper, we propose a network coding-aware routing protocol for multi-hop wireless networks that enhances DCAR by considering traffic load distribution and link quality. From this, we can achieve higher network throughput and lower end-to-end delay at the same time for the proper delivery of time-sensitive data flow. The Qualnet-based simulation results show that our proposed scheme outperforms DCAR in terms of throughput and delay.

Development of Sustainable Home-Network Security Tool

  • Hamid, Erman;Hasbullah, M. Syafiq E.;Harum, Norharyati;Anawar, Syarulnaziah;Ayop, Zakiah;Zakaria, Nurul Azma;Shah, Wahidah Md
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.257-265
    • /
    • 2021
  • Home networking and its security issues are directly related. Previous studies have shown that home-network and understanding the security of it is a problem for non-technical users. The existing network management tools or ISP adapter tools are far too technical and difficult to be understood by ordinary home-network users. Its interface is not non-technical user-directed and does not address the home user's needs in securing their network. This paper presents an interactive security monitoring tool, which emphasizes support features for home-network users. The tool combines an interactive visual appearance with a persuasive approach that supports sustainability. It is not only an easy-to-use tool for all categories of home-network users but also acts as a monitoring feature for the user to secure their home-network.

A Novel Active User Identification Method for Space based Constellation Network

  • Kenan, Zhang;Xingqian, Li;Kai, Ding;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.212-216
    • /
    • 2022
  • Space based constellation network is a kind of ad hoc network in which users are self-organized without center node. In space based constellation network, users are allowed to enter or leave the network at any given time. Thus, the number of active users is an unknown and time-varying parameter, and the performance of the network depends on how accurately this parameter is estimated. The so-called problem of active user identification, which consists of determining the number and identities of users transmitting in space based constellation network is discussed and a novel active user identification method is proposed in this paper. Active user identification code generated by transmitter address code and receiver address code is used to spread spectrum. Subspace-based method is used to process received signal and judgment model is established to identify active users according to the processing results. The proposed method is simulated under AWGN channel, Rician channel and Rayleigh channel respectively. Numerical results indicate that the proposed method obtains at least 1.16dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

A Study on the Collaboration Network Analysis of Document Delivery Service in Science and Technology (과학기술분야 원문제공서비스의 협력 네트워크 분석)

  • Kim, Ji-Young;Lee, Seon-Hee
    • Journal of Korean Library and Information Science Society
    • /
    • v.44 no.4
    • /
    • pp.443-463
    • /
    • 2013
  • Korea Institute of Science and Technology Information(KISTI) provides domestic researchers with science and technology information through NDSL Information Document Service(NIDS) network to improve research productivity in Korea. University libraries and information centers of research institutes are playing a major role in the NIDS collaboration network. In this study, we examined the relationship among the participating organizations for document delivery service using the social network analysis(SNA) method. Centrality of each organization in the NIDS network was analyzed with the indexes such as degree centrality, closeness centrality, betweenness centrality, and eigenvector centrality. The research results show that KISTI, KAIST, POSTECH, and FRIC are located at the center of the NIDS network. Based on the research results, this paper suggests several directions for improvement of document delivery service.

Examining the Knowledge Structure in the Communication Field: Author Cocitation Analysis for the Editorial Board of the Journal of Communication, 2008 and 2011 (Journal of Communication의 편집위원회에 대한 저자동시인용분석을 이용한 언론학 분야의 지적구조와 사회적 배경 분석: 2008년과 2011년 비교)

  • Kim, Hyun-Jung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.2
    • /
    • pp.109-132
    • /
    • 2012
  • This study examines the social network of scholars in the field of communication by using author cocitation data. A matrix containing the number of cocited documents between pairs of authors is created for social network analysis of scholars who are on the editorial board of Journal of Communication, and the networked map of the scholars is used to visualize the knowledge structure of the field by identifying groups of authors who are more central than others. In addition, the study compares the previous analysis performed in 2008 and the current analysis on the editorial board of the journal, which increased from 146 to 254 scholars in numbers. Author cocitation data was collected using Social Science Citation Index (SSCI) through the Web of Science database, and UCInet was used to create and visualize the author cocitation network and to analyze the correlation between the cocitation network and the factors that may have affected the structure of the cocitation network.

Opportunity Coefficient for Cluster-Head Selection in LEACH Protocol

  • Soh, Ben;AlZain, Mohammed;Lozano-Claros, Diego;Adhikari, Basanta
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.6-11
    • /
    • 2021
  • Routing protocols play a pivotal role in the energy management and lifespan of any Wireless Sensor Network. Lower network lifetime has been one of the biggest concerns in LEACH protocol due to dead nodes. The LEACH protocol suffers from uneven energy distribution problem due to random selection of a cluster head. The cluster head has much greater responsibility compared to other non- cluster head nodes and consumes greater energy for its roles. This results in early dead nodes due to energy lost for the role of cluster- head. This study proposes an approach to balance the energy consumption of the LEACH protocol by using a semi-deterministic opportunity coefficient to select the cluster head. This is calculated in each node with the battery energy level and node ID. Ultimately, based on the opportunity cost, cluster head will be selected and broadcasted for which other nodes with higher opportunity cost will agree. It minimizes the chances of nodes with lower battery level being elected as cluster head. Our simulation experiments demonstrate that cluster heads chosen using our proposed algorithm perform better than those using the legacy LEACH protocol.