• Title/Summary/Keyword: Battery Drain

Search Result 15, Processing Time 0.022 seconds

Route Selection Protocol based on Energy Drain Rates in Mobile Ad Hoc Networks (무선 Ad Hoc 통신망에서 에너지 소모율(Energy Drain Rate)에 기반한 경로선택 프로토콜)

  • Kim, Dong-Kyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7A
    • /
    • pp.451-466
    • /
    • 2003
  • Untethered nodes in mobile ad-hoc networks strongly depend on the efficient use of their batteries. In this paper, we propose a new metric, the drain rate, to forecast the lifetime of nodes according to current traffic conditions. This metric is combined with the value of the remaining battery capacity to determine which nodes can be part of an active route. We describe new route selection mechanisms for MANET routing protocols, which we call the Minimum Drain Rate (MDR) and the Conditional Minimum Drain Rate (CMDR). MDR extends nodal battery life and the duration of paths, while CMDR also minimizes the total transmission power consumed per packet. Using the ns-2 simulator and the dynamic source routing (DSR) protocol, we compare MDR and CMDR against prior proposals for power-aware routing and show that using the drain rate for power-aware route selection offers superior performance results.

Battery Lifetime Enhancement Technology Using Recovery Effect (회복효과를 이용한 배터리 사용시간 연장기술)

  • Jang, Yong-Ju;Lee, Seong-Soo
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.48 no.6
    • /
    • pp.33-38
    • /
    • 2011
  • In recent years, mobile devices and high-hearth because of the multi-functional, battery usage is increasing. But compared to the required computing power increases the battery's energy capacity of the research is going slowly. In this paper we use the battery discharge characteristics, can be used in battery research and to increase the effective capacity, wireless transmission of power from the system just by turning off the technology to extend battery life is explained. Experimental transmission of images through the standard battery drain intervals according to measuring battery life, and applications used in these experiments and heuristic to optimize battery run time was achieved.

Power Consumption Analysis and Minimization of Electronic Shelf Label System (전자가격표시시스템의 소모전력 분석 및 최소화 방안)

  • Woo, Rinara;Kim, Jungjoon;Seo, Dae-Wha
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.9 no.2
    • /
    • pp.75-80
    • /
    • 2014
  • Energy consumption of sensor nodes is minimized because it has limited energy generator in wireless sensor network. Electronic shelf label system is one of application fields using wireless sensor networks. Battery size of small apparatus for displaying price is restricted. Therefore its current consumption have to be minimized. Furthermore the method for minimization of peak current would be considered because life cycle of coin battery used to display or RF is vulnerable to intensity of drain current. In this paper, we analyze current consumption pattern of low-power electronic shelf label system. Then we propose the method for minimization of current consumption by modification of software and hardware. Current consumption of the system using proposed method are approximately 15 to 20 percent lower than existing system and the life cycle of the system is approximately 10 percent higher than existing system.

A Dynamic Routing Protocol for Energy Effectiveness in Wireless Sensor Networks (무선 센서 네트워크에서의 에너지 효율 개선을 위한 동적 라우팅 프로토콜)

  • Oh, Sei-Woong;Jun, Sung-Taeg
    • Journal of Information Technology Services
    • /
    • v.6 no.1
    • /
    • pp.141-149
    • /
    • 2007
  • Sensor node's mobility brings new challenges to data dissemination in large sensor networks. Frequent location updates of sensor nodes can lead to both excessive drain of sensor's limited battery supply and increased collisions in wireless transmissions. Conventional studies for routing protocols in wireless sensor networks are not enough to cover energy consumption and migration of sensor nodes. This study proposes a dynamic routing protocol based on the SPIN considering energy consumption and the migration, and also shows the effectiveness of the proposed routing protocol.

Wearable Device Security Threat Analysis and Response Plan (웨어러블 디바이스 보안 위협 및 대응 방안)

  • Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.55-61
    • /
    • 2024
  • With the development of IoT technology, wearable services have also developed rapidly. Wearable devices required for this service are used as sensors and controllers in the form of smart bands. Wearable devices implement very concise SWlogic for possible long-term use and use wireless communication protocols to improve convenience. However, because this wearable device aims to be lightweight, it is more vulnerable to security than terminals used for other information services. Many smart healthcare or smart medical services are passive or do not apply security technology. By exploiting this security environment, attackers can obtain or modify important information through access to wearable devices. In this study, we analyzed the technical operating environment of wearable services and identified authentication information reuse attacks, BIAS attacks, battery drain attacks and firmware attacks on wearable devices. And we analyzed the mechanism of each security threat and confirmed the attack effect. In this study, we presented a response plan to respond to the identified security threats. When developing wearable services, it is expected that safer services can be built if the response plan proposed in this study is considered.

Multicomponent wide band gap oxide semiconductors for thin film transistors

  • Fortunato, E.;Barquinha, P.;Pereira, L.;Goncalves, G.;Martins, R.
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.605-608
    • /
    • 2006
  • The recent application of wide band gap oxide semiconductors to transparent thin film transistors (TTFTs) is making a fast and growing (r)evolution on the contemporary solid-state electronics. In this paper we present some of the recent results we have obtained using wide band gap oxide semiconductors, like indium zinc oxide, produced by rf sputtering at room temperature. The devices work in the enhancement mode and exhibit excellent saturation drain currents. On-off ratios above $10^6$ are achieved. The optical transmittance data in the visible range reveals average transmittance higher than 80 %, including the glass substrate. Channel mobilities are also quite respectable, with some devices presenting values around $25\;cm^2/Vs$, even without any annealing or other post deposition improvement processes. The high performances presented by these TTFTs associated to a high electron mobility, at least two orders of magnitude higher than that of conventional amorphous silicon TFTs and a low threshold voltage, opens new doors for applications in flexible, wearable, disposable portable electronics as well as battery-powered applications.

  • PDF

THE ORIGIN OF LARGE SCALE GALACTIC MAGNETIC FIELDS

  • SUBRAMANIAN K.
    • Journal of The Korean Astronomical Society
    • /
    • v.29 no.spc1
    • /
    • pp.155-158
    • /
    • 1996
  • Magnetic fields correlated on several kiloparsec scales are seen in spiral galaxies. Their origin could be due to the winding up of a primordial cosmological field or due to amplification of a small seed field by a turbulent galactic dynamo. Both options have difficulties: There is no known battery mechanism for producing the required primordial field. Equally the turbulent dynamo may self destruct before being able to produce the large scale field, due to excess generation of small scale power. The current status of these difficulties is discussed. The resolution could depend on the nature of the saturated field produced by the small scale dynamo. We argue that the small scale fields do not fill most of the volume of the fluid and instead concentrate into intermittent ropes, with their peak value of order equipartition fields, and radii much smaller than their lengths. In this case these fields neither drain significant energy from the turbulence nor convert eddy motion of the turbulence on the outer scale to wave like motion. This preserves the diffusive effects needed for the large scale dynamo operation.

  • PDF

QoS-Aware Power Management of Mobile Games with High-Load Threads (CPU 부하가 큰 쓰레드를 가진 모바일 게임에서 QoS를 고려한 전력관리 기법)

  • Kim, Minsung;Kim, Jihong
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.5
    • /
    • pp.328-333
    • /
    • 2017
  • Mobile game apps, which are popular in various mobile devices, tend to be power-hungry and rapidly drain the device's battery. Since a long battery lifetime is a key design requirement of mobile devices, reducing the power consumption of mobile game apps has become an important research topic. In this paper, we investigate the power consumption characteristics of popular mobile games with multiple threads, focusing on the inter-thread. From our power measurement study of popular mobile game apps, we observed that some of these apps have abnormally high-load threads that barely affect the user's gaming experience, despite the high energy consumption. In order to reduce the wasted power from these abnormal threads, we propose a novel technique that detects such abnormal threads during run time and reduces their power consumption without degrading user experience. Our experimental results on an Android smartphone show that the proposed technique can reduce the energy consumption of mobile game apps by up to 58% without any negative impact on the user's gaming experience.

An efficient session management scheme for low-latency communications in 5G systems

  • Kim, Jae-Hyun;Kim, Seog-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.83-92
    • /
    • 2020
  • In this paper, we propose an efficient session management scheme for low-latency communications in 5G systems. The main idea of the proposed scheme is to prevent unnecessary reattempt signalling overhead when the session establishment for low-latency communications fails. Also, this method avoids network resource waste and battery drain of mobile devices. If a UE(User Equipment) fails to establish an Always-on PDU session for low-latency communications with the 5G systems because of network failure or resource unavailability, the proposed method prevents the UE's re-establishment of the Always-on PDU session by the specific information in the NAS(Non-Stratum) message from the 5G systems. Through simulation, we show that the proposed efficient session management scheme (ESMS) minimizes unnecessary signalling overhead and improves battery efficiency of mobile devices compared to existing legacy mechanism in 5G systems.

Trust-Based Filtering of False Data in Wireless Sensor Networks (신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이타 제거)

  • Hur, Jun-Beom;Lee, Youn-Ho;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.76-90
    • /
    • 2008
  • Wireless sensor networks are expected to play a vital role in the upcoming age of ubiquitous computing such as home environmental, industrial, and military applications. Compared with the vivid utilization of the sensor networks, however, security and privacy issues of the sensor networks are still in their infancy because unique challenges of the sensor networks make it difficult to adopt conventional security policies. Especially, node compromise is a critical threat because a compromised node can drain out the finite amount of energy resources in battery-powered sensor networks by launching various insider attacks such as a false data injection. Even cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the insider attack from a compromised node. In this paper, we propose a novel trust-based secure aggregation scheme which identifies trustworthiness of sensor nodes and filters out false data of compromised nodes to make resilient sensor networks. The proposed scheme suggests a defensible approach against the insider attack beyond conventional cryptographic solutions. The analysis and simulation results show that our aggregation scheme using trust evaluation is more resilient alternative to median.