• Title/Summary/Keyword: Battery Lifetime

Search Result 215, Processing Time 0.024 seconds

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

Economic analysis of Frequency Regulation Battery Energy Storage System for Czech combined heat & power plant (체코 열병합발전소 주파수조정용 배터리에너지저장장치 경제성 분석)

  • KIM, YuTack;Cha, DongMin;Jung, SooAn;Son, SangHak
    • Journal of Energy Engineering
    • /
    • v.29 no.2
    • /
    • pp.68-78
    • /
    • 2020
  • According to the new climate change agreement, technology development to reduce greenhouse gases is actively conducted worldwide, and research on energy efficiency improvement in the field of power generation and transmission and distribution is underway [1,2]. Economic analysis of the operation method of storing and supplying surplus electricity using energy storage devices, and using energy storage devices as a frequency adjustment reserve power in regional cogeneration plants has been reported as the most profitable operation method [3-7]. Therefore, this study conducted an economic analysis for the installation of energy storage devices in the combined heat and power plant in the Czech Republic. The most important factor in evaluating the economics of battery energy storage devices is the lifespan, and the warranty life is generally 10 to 15 years, based on charging and discharging once a day. For the simulation, the ratio of battery and PCS was designed as 1: 1 and 1: 2. In general, the primary frequency control is designed as 1: 4, but considering the characteristics of the cogeneration plant, it is set at a ratio of up to 1: 2, and the capacity is simulated at 1MW to 10MW and 2MWh to 20MWh according to each ratio. Therefore, life was evaluated based on the number of cycles per year. In the case of installing a battery energy storage system in a combined heat and power plant in the Czech Republic, the payback period of 3MW / 3MWh is more favorable than 5MW / 5MWh, considering the local infrastructure and power market. It is estimated to be about 3 years or 5 years from the simple payback period considering the estimated purchase price without subsidies. If you lower the purchase price by 50%, the purchase cost is an important part of the cost for the entire lifetime, so the payback period is about half as short. It can be, but it is impossible to secure profitability through the economy at the scale of 3MWh and 5MWh. If the price of the electricity market falls by 50%, the payback period will be three years longer in P1 mode and two years longer in P2 and P3 modes.

Dynamic ATIM Power Saving Mechanism(DAPSM) in 802.11 Ad-Hoc Networks (802.11 Ad-Hoc 네트웍에서 Power Save Mechanism을 개선한 DAPSM 알고리즘)

  • Park, Jae-Hyun;Lee, Jang-Su;Kim, Sung-Chun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.475-480
    • /
    • 2007
  • Recently, wireless networking devices that depend on the limited Battery and power-saving of wireless hosts became important issue. Batteries can provide a finite amount of energy, therefore, to increase battery lifetime, it is important to design techniques to reduce energy consumption by wireless hosts. This paper improved power saying mechanism in Distributed Coordination Function(DCF) of IEEE 802.11. In the IEEE 802.11 power saving mechanism specified for DCF, time is divided into so-called beacon intervals. At the start of each beacon interval, each node in the power saving mode periodically wakes up during duration called the ATIM Window. The nodes are required to be synchronized to ensure that all nodes wake up at the same time. During the ATIM window, the nodes exchange control packets to determine whether they need to stay awake for the rest of the beacon interval. The size of the ATIM window has considerably affected power-saving. This paper can provide more power-saving than IEEE 802.11 power saving mode because ATIM window size is efficiently increased or decreased.

QoS-Aware Power Management of Mobile Games with High-Load Threads (CPU 부하가 큰 쓰레드를 가진 모바일 게임에서 QoS를 고려한 전력관리 기법)

  • Kim, Minsung;Kim, Jihong
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.5
    • /
    • pp.328-333
    • /
    • 2017
  • Mobile game apps, which are popular in various mobile devices, tend to be power-hungry and rapidly drain the device's battery. Since a long battery lifetime is a key design requirement of mobile devices, reducing the power consumption of mobile game apps has become an important research topic. In this paper, we investigate the power consumption characteristics of popular mobile games with multiple threads, focusing on the inter-thread. From our power measurement study of popular mobile game apps, we observed that some of these apps have abnormally high-load threads that barely affect the user's gaming experience, despite the high energy consumption. In order to reduce the wasted power from these abnormal threads, we propose a novel technique that detects such abnormal threads during run time and reduces their power consumption without degrading user experience. Our experimental results on an Android smartphone show that the proposed technique can reduce the energy consumption of mobile game apps by up to 58% without any negative impact on the user's gaming experience.

An Energy Efficient Routing Protocol using MAC-layer resources in Mobile Ad Hoc Networks (이동 애드혹 네트워크에서 MAC 계층 자원을 이용한 에너지 효율 라우팅 프로토콜)

  • Yoo, Dae-Hun;Choi, Woong-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.219-228
    • /
    • 2007
  • End-to-end path setup and maintenance are very important for mobile ad-hoc wireless communications, because of the mobility and the limited battery capacity of the nodes in the networks. the AODV routing protocol is the one of mary proposed protocols. However, there are route failure problem with the Proposed protocols between intermediate nodes due to such mobility and exhausted battery characteristics, and this is because only the shortest hop count is considered for the route setup. If route failure happens. Problem such as the waste of bandwidth and the increment of the energy consumption occur because of the discarding data packets in the intermediate nodes and the path re-setup process required by the source node. In addition, it obviously causes the network lifetime to be shortened. This paper proposes a routing protocol based on the AODV routing protocol that it makes use of the remaining energy, signal strength and SNR of the MAC layer resources to setup a path.

  • PDF

A Thermoelectric Energy Harvesting Circuit For a Wearable Application

  • Pham, Khoa Van;Truong, Son Ngoc;Yang, Wonsun;Min, Kyeong-Sik
    • Journal of IKEEE
    • /
    • v.21 no.1
    • /
    • pp.66-69
    • /
    • 2017
  • In recent year, energy harvesting technologies from the ambient environments such as light, motion, wireless waves, and temperature again a lot of attraction form research community [1-5] due to its efficient solution in order to substitute for conventional power delivery methods, especially in wearable together with on-body applications. The drawbacks of battery-powered characteristic used in commodity applications lead to self-powered, long-lifetime circuit design. Thermoelectric generator, a solid-state sensor, is useful compared to the harvesting devices in order to enable self-sustained low-power applications. TEG based on the Seebeck effect is utilized to transfer thermal energy which is available with a temperature gradient into useful electrical energy. Depending on the temperature difference between two sides, amount of output power will be proportionally delivered. In this work, we illustrated a low-input voltage energy harvesting circuit applied discontinuous conduction mode (DCM) method for getting an adequate amount of energy from thermoelectric generator (TEG) for a specific wearable application. With a small temperature gradient harvested from human skin, the input voltage from the transducer is as low as 60mV, the proposed circuit, fabricated in a $0.6{\mu}m$ CMOS process, is capable of generating a regulated output voltage of 4.2V with an output power reaching to $40{\mu}W$. The proposed circuit is useful for powering energy to battery-less systems, such as wearable application devices.

A Design of Lightweight Mutual Authentication Based on Trust Model (신용모델 기반의 경량 상호인증 설계)

  • Kim Hong-Seop;Cho Jin-Ki;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.237-247
    • /
    • 2005
  • Ubiquitous Sensor Network(USN) is the very core of a technology for the Ubiquitous environments. There is the weakness from various security attacks such that tapping of sensor informations, flowing of abnormal packets, data modification and Denial of Service(DoS) etc. And it's required counterplan with them. Especially it's restricted by the capacity of battery and computing. By reasons of theses. positively, USN security technology needs the lightweighted design for the low electric energy and the minimum computing. In this paper, we propose lightweight USN mutual authentication methology based on trust model to solve above problems. The proposed authentication model can minimize the measure of computing because it authenticates the sensor nodes based on trust information represented by subjective logic model. So it can economize battery consumption and resultingly increse the lifetime of sensor nodes.

  • PDF

Energy Efficient Cluster Head Selection and Routing Algorithm using Hybrid Firefly Glow-Worm Swarm Optimization in WSN

  • Bharathiraja S;Selvamuthukumaran S;Balaji V
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2140-2156
    • /
    • 2023
  • The Wireless Sensor Network (WSN), is constructed out of teeny-tiny sensor nodes that are very low-cost, have a low impact on the environment in terms of the amount of power they consume, and are able to successfully transmit data to the base station. The primary challenges that are presented by WSN are those that are posed by the distance between nodes, the amount of energy that is consumed, and the delay in time. The sensor node's source of power supply is a battery, and this particular battery is not capable of being recharged. In this scenario, the amount of energy that is consumed rises in direct proportion to the distance that separates the nodes. Here, we present a Hybrid Firefly Glow-Worm Swarm Optimization (HF-GSO) guided routing strategy for preserving WSNs' low power footprint. An efficient fitness function based on firefly optimization is used to select the Cluster Head (CH) in this procedure. It aids in minimising power consumption and the occurrence of dead sensor nodes. After a cluster head (CH) has been chosen, the Glow-Worm Swarm Optimization (GSO) algorithm is used to figure out the best path for sending data to the sink node. Power consumption, throughput, packet delivery ratio, and network lifetime are just some of the metrics measured and compared between the proposed method and methods that are conceptually similar to those already in use. Simulation results showed that the proposed method significantly reduced energy consumption compared to the state-of-the-art methods, while simultaneously increasing the number of functioning sensor nodes by 2.4%. Proposed method produces superior outcomes compared to alternative optimization-based methods.

A study on the low back pain and its associated factors of the staffs in a university (일부 사립대학 교직원의 요통 관련인자에 관한 연구)

  • Ryu, So-Yeon;Lee, Chul-Gab;Park, Jong;Kim, Ki-Soon;Kim, Yang-Ok
    • Journal of Preventive Medicine and Public Health
    • /
    • v.29 no.3 s.54
    • /
    • pp.679-692
    • /
    • 1996
  • This study was performed to find the prevalence and the associated risk factors with low back pain(LBP) of the staffs in a university at Kwang-ju city. The data were collected by a questionnaire including SDS(self - rating depression Scale) battery from September 1st to October 15th, 1996. The results were as follows; 1. The prevalence rate of LBP during lifetime was 73.1%, 53.1% for the last one year, and 23.6% for the last one week. 2. Statistically significant factors related to LBP during lifetime were sex and satisfaction with job. Sex, smoking, alcohol drinking, occupation, work posture, forward bending of trunk and satisfaction with job were selected as significant factors related to LBP during the last one year. The significant determinants related with LBP during the last one week were sex, smoking, alcohol drinking, occupation, forward bending of trunk and satisfaction with job. 3. Through the analysis of self - rating depression scores according to LBP, respondents with LBP had the significantly higher value of physiological disturbances and lower value of psychomotor activities than those without LBP. 4. Through the multivariate logistic regression, significantly associated factors with LBP during lifetime were selected to be female(OR=2.63, 95% CI : $1.08\sim6.40$), dissatisfaction with job(OR=2.16, 95% CI : $1.16\sim4.15$), those for the last one year were chosen to be female(OR=2.30, 95% CI : $1.03\sim5.12$), forward bending of trunk(OR=2.18, 95% CI : $1.26\sim3.79$), dissatisfaction with job(OR=1.84, 95% CI : $1.06\sim3.21$), and those for the last one week were female(OR=3.00, 95% CI : $1.17\sim7.69$), forward bending of trunk(OR=2.85, 95% CI : $1.38\sim5.88$). In conclusion, for effective prevention of the LBP at work site, appropriate improvement of work posture and various psychological factors should be considered.

  • PDF

Energy-Efficient Mobility Management Schemes in HMIPv6 (HMIPv6환경에서 에너지 효율적인 이동성 관리 기법)

  • Yang Sun Ok;Kim SungSuk;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.615-624
    • /
    • 2005
  • In Mobile IP, several types of messages - binding update, binding request and binding acknowledgement - are used to support user mobility. It is necessary to exchange those messages frequently for seamless mobility but it incurs both the increase of network overhead and poor usage of mobile node battery power Thus, we need a mechanism that the server detects users location and also copes with the problems effectively, which is our main concern in this paper Each user records all moving logs locally and periodically makes out profile based on them in HMIPv6. By using profile, estimated resident time can be computed whenever he enters an area and the time is set up as the binding update message lifetime. Of course, the more correct lifetime nay be obtained IP arrival time as well as average resident time Is considered in profile. Through extensive experiments, we measure the bandwidth usage for binding update messages by comparing the proposed schemes with that in HMIPv6. From the results, Gain gets over $80\%$ when mobile node stays more than 13 minutes in a subnet. Namely, we come to know that our schemes improve network usage and energy usage in mobile node by decreasing the number of messages while they also manage users locations like that in HMIPv6.