• Title/Summary/Keyword: 확률적확산

Search Result 193, Processing Time 0.033 seconds

QoS Analysis of Wireless Sensor Network with ARQ Scheme (ARQ 방식을 적용한 무선 센서 네트워크의 QoS 해석)

  • Roh, Jae-Sung;Kim, Wan-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.1
    • /
    • pp.49-56
    • /
    • 2010
  • Severe energy constraints and the low power consumption require the significance of the energy efficient error control mechanisms in wireless sensor network (WSN). In this paper, an automatic repeat request (ARQ) methodology for the analysis of error control schemes in WSN is presented such that the effects of packet length, the modulation scheme and the interference effect of the wireless channel are investigated. Moreover, an analyis of ARQ error control is provided by considering two major architectures for wireless sensor network, i.e., Mica2 and MicaZ sensor nodes. And the throughput performance of WSN with asynchronous FSK signal and DSSS-OQPSK signal with selective repeat ARQ scheme are analyzed in multiple interference environment, and the probability of receiving a correct bit and packet from target node to sink node is evaluated as a function of the channel parameter, the number of wireless sensor node, and the spreading factor.

A Blind Hopping Phase Estimator in Hopped FM/BFSK Systems (도약 FM/BFSK 시스템에서 블라인드 도약 위상 추정기)

  • Seong, Jinsuk;Jeong, Min-A;Kim, Kyung-Ho;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.7
    • /
    • pp.573-581
    • /
    • 2014
  • We proposed a hopping phase estimator to demodulate the received signals without any hopping information in frequency hopping spread spectrum systems. The demodulation process in this paper is as follows: hopped frequency tracking is accomplished by choosing a frequency component with maximum amplitude after taking discrete Fourier transform and a hopping frequency estimator which estimates the phase generated by hopped frequency is established through difference product and down-sampling. We obtained the probability density function and variance performance of the proposed estimator and confirmed that the analysis and the simulation results were agreed with each other.

A Study on Low-Overhead Collision Warning Scheme using Vehicle-to-Vehicle Communications (차량 간 통신을 이용한 저비용 사고 위험 방지 기술에 관한 연구)

  • Lee, Ji-Hoon;Kim, Dae-Youb
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.10
    • /
    • pp.1221-1227
    • /
    • 2012
  • It is expected that the vehicle safety systems using vehicle-to-vehicle communication can reduce the possibility of vehicle collision and prevent the chain crash by promptly delivering the status of neighboring vehicles. Many IEEE 802.11 DCF based Flooding schemes have been proposed, but they may generally expose the problems that the transmission efficiency is sharply declined as the vehicle density has increased and then is related to the low possibility of the channel access. Therefore, this paper proposes a collision prevention scheme using adaptively controlling the frequency of the message exchanges based on the current status of neighboring vehicles. Moreover, it is shown from simulation that the proposed scheme provides the performance gains over the existing Flooding based scheme.

Research on Mobile Malicious Code Prediction Modeling Techniques Using Markov Chain (마코프 체인을 이용한 모바일 악성코드 예측 모델링 기법 연구)

  • Kim, JongMin;Kim, MinSu;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.19-26
    • /
    • 2014
  • Mobile malicious code is typically spread by the worm, and although modeling techniques to analyze the dispersion characteristics of the worms have been proposed, only macroscopic analysis was possible while there are limitations in predicting on certain viruses and malicious code. In this paper, prediction methods have been proposed which was based on Markov chain and is able to predict the occurrence of future malicious code by utilizing the past malicious code data. The average value of the malicious code to be applied to the prediction model of Markov chain model was applied by classifying into three categories of the total average, the last year average, and the recent average (6 months), and it was verified that malicious code prediction possibility could be increased by comparing the predicted values obtained through applying, and applying the recent average (6 months).

An Experimental Study on Flame Structure and Combustion Characteristics of Turbulent Diffusion Flame(I) (난류확산화염의 화염구조와 연소특성에 관한 실험적 연구)

  • Choe, Byeong-Ryun;Jang, In-Gap;Choe, Gyeong-Min
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.20 no.3
    • /
    • pp.1028-1039
    • /
    • 1996
  • This study was focused on the examination of the flame structure and the combustion characteristics of diffusion flame which was formed the turbulent shear flow of a double coaxial air jet system. The shear flow was formed by the difference velocity of surrounding air jet(U$\_$s/) and center air jet (U$\_$c/). So experimental condition was divided S-type flame (.lambda. > 1) and C-type flame (.lambda. < 1) by velocity ratio .lambda. (=U$\_$s//U$\_$c/). For examination of the flame structure and the combustion characteristics in diffusion flame, coherent structure was observed in flame by schlieren photograph method. We measured fluctuating temperature and ion current simultaneously and accomplished the statistical analysis of its. According to schlieren photograph, the flame was stabilized in the rim of the direction of lower velocity air jet, coherent eddy was produced and developed by higher velocity air jet. The statistical data of fluctuating temperature and ion current was indicated that reaction was dominated by higher velocity air jet. The mixing state of burnt gas and non-burnt gas was distributed the wide area at Z = 100 mm of C-type flame.

Grid-based Cloaking Area Creation Scheme supporting Continuous Location-Based Services (연속적인 위치기반 서비스를 지원하는 그리드 기반 Cloaking 영역 설정 기법)

  • Lee, Ah-Reum;Kim, Hyeong-Il;Chang, Jae-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.3
    • /
    • pp.19-30
    • /
    • 2009
  • Recent development in wireless communication technology and mobile equipment like PDA, cellular phone and GPS makes location-based services (LBSs) popular. However, because, in the LBSs, users continuously request a query to LBS servers by using their exact locations, privacy information could be in danger. Therefore, a mechanism for users' privacy protection is required for the safe and comfortable use of LBSs by mobile users. For this, this paper propose a grid-based cloaking area creation scheme supporting continuous LBSs. The proposed scheme creates a cloaking area rapidly by using grid-based cell expansion to efficiently support the continuous LBSs. In addition, to generate a cloaking area which makes the exposure probability of a mobile user to a minimum, we compute a privacy protection degree by granting weights to mobile users. Finally, we show from a performance analysis that our cloaking scheme outperforms the existing cloaking schemes, in terms of service time, privacy protection degree.

  • PDF

A Study on Detecting Selfish Nodes in Wireless LAN using Tsallis-Entropy Analysis (뜨살리스-엔트로피 분석을 통한 무선 랜의 이기적인 노드 탐지 기법)

  • Ryu, Byoung-Hyun;Seok, Seung-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.12-21
    • /
    • 2012
  • IEEE 802.11 MAC protocol standard, DCF(CSMA/CA), is originally designed to ensure the fair channel access between mobile nodes sharing the local wireless channel. It has been, however, revealed that some misbehavior nodes transmit more data than other nodes through artificial means in hot spot area spreaded rapidly. The misbehavior nodes may modify the internal process of their MAC protocol or interrupt the MAC procedure of normal nodes to achieve more data transmission. This problem has been referred to as a selfish node problem and almost literatures has proposed methods of analyzing the MAC procedures of all mobile nodes to detect the selfish nodes. However, these kinds of protocol analysis methods is not effective at detecting all kinds of selfish nodes enough. This paper address this problem of detecting selfish node using Tsallis-Entropy which is a kind of statistical method. Tsallis-Entropy is a criteria which can show how much is the density or deviation of a probability distribution. The proposed algorithm which operates at a AP node of wireless LAN extracts the probability distribution of data interval time for each node, then compares the one with a threshold value to detect the selfish nodes. To evaluate the performance of proposed algorithm, simulation experiments are performed in various wireless LAN environments (congestion level, how selfish node behaviors, threshold level) using ns2. The simulation results show that the proposed algorithm achieves higher successful detection rate.

Reliable Multicast MAC Protocol with Low Probability of Detection for Survivability in Tactical Ad-hoc Networks (생존성 향상을 위해 신뢰성 및 저피탐을 보장하는 멀티캐스팅 MAC 프로토콜 기법)

  • Kim, Jeong-Hun;Jung, Jun-Woo;Kim, Jung-Bin;Lim, Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1685-1695
    • /
    • 2010
  • In this paper, we propose a new reliable multicast MAC protocol over the IEEE 802.11-based tactical ad hoc networks. The major contribution compared to the previous reliable multicast schemes using consecutive CTSs/ACKs is that the proposed scheme can send multiple CTS/ACK messages concurrently assisted by MC-DS/CDMA mechanisms. When multiple receivers receive the RTS/DATA message from a sender, they respond with the CTS/ACK message spread with pre-assigned code in the same time interval. The proposed scheme can reduce the overhead of multiple CTSs/ACKs. It is also possible to alleviate the received signal strength at the enemy detector and thus it improves low probability of detection performance. Through simulations and analysis, the proposed scheme outperforms that of the multiple CTSs/ACks in terms of the throughput, transmission delay and low probability of detection.

Statistical testings for common stochastic trends in markets under recession (경기 침체기 시장의 공통확률추세 검정)

  • Cho, Joong-Jae;Lee, Seung-Eun;Kim, Tae-Ho
    • The Korean Journal of Applied Statistics
    • /
    • v.29 no.4
    • /
    • pp.559-569
    • /
    • 2016
  • A long-run relationship of stock, monetary, realty markets, and business conditions has been suggested to exist due to internal and external shocks. This study investigates whether such a relationship really exists and then performs statistical tests to discern features of the long-run adjustment processes from short-run discrepancies because it is difficult to find studies that examine the market relationship. The comovement relationship of the whole market does not appear to hold for the entire study period; however, it is found to exist for the period before the financial crisis. Estimated error correction models show consistently declining equilibrium errors each period that suggests a recovering process of the long-run equilibrium from short-run secessions.

Giving Behavior of Households - Effects of Asset, Income, and the Ratio of Income to Asset - (가구단위 기부행동에 관한 연구 - 자산, 소득, 자산 대비 소득의 효과 -)

  • Kang, Chul Hee;Choi, Jung Eun;Jang, Jae Hyuk
    • Korean Journal of Social Welfare
    • /
    • v.68 no.4
    • /
    • pp.53-74
    • /
    • 2016
  • In this study, to verify influence that economic situations of a household unit have on donation behavior, after economic situations of a household unit were measured with income and assets by type and income to assets, effect which each variable has on secular giving was verified. This study used 3-year panel data of a total of 4,938 households based on the fifth to seventh year data as investigation data from 2012 to 2014 among data of financial panel investigation of Korea Institute of Public Finance of National Survey of Tax and Benefit. As an analysis method, a random effect tobit model was used. At the analysis result, it appeared that as scales of financial assets, earned income, property income, and transfer income become larger, the amount of donation increased. Also, it was represented that rates of income to assets had negative influence on secular giving. In case of demographic variables, education levels of householders and sizes of houses had relation of a positive direction. In case of ages, it appeared that they had inverted U-type relation. This study has meanings in that understanding of donation behavior of a household unit can be increased and expanded more and also implications related to intervention strategies of a household unit to expand sharing culture can be extracted by verifying influence which economic factors of a household unit have on donation behavior based on panel data.

  • PDF