• Title/Summary/Keyword: Dynamic Route

Search Result 279, Processing Time 0.023 seconds

Self-Adaptive Location Checking Mechanism in Mobile Ad-hoc Networks (모바일 애드혹 네트워크에서 자가 적응형 위치 검증 기법)

  • Youn, Joo-Sang;Kim, Young-Hyun;Pack, Sang-Heon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.3
    • /
    • pp.281-290
    • /
    • 2010
  • In geographic forwarding algorithms, traditional route maintenance requires mobile nodes periodically exchange beacon messages with their neighbors. In beacon message based forwarding scheme, a longer interval reduces the number of beacons needed, but may result in significant location errors. Conversely, a shorter interval guarantees more accurate location information, but induces control overheads.Therefore, the fixed or dynamic interval scheme based forwarding schemes cannot adapt well to different mobility environments. Also, existing schemes result in the uncertainty of neighbor node's position in the forwarding table of mobile node. Therefore, this paper presents a self-adaptive location checking mechanism based proactive geo-routing algorithm for beacon-based geographic routing. Simulation results show that the proposed routing algorithm not only significantly increases the relay transmission rate but also guarantees the high end-to-end packet delivery in low and high mobility environments.

The Mediating Effect of Stress Management Format on Influence Over Post Traumatic Stress Disorder on Traumatic Case Experience of Police Officers (경찰관의 외상성 사건 경험이 외상후 스트레스 증상에 미치는 영향에 있어 스트레스 대처양식의 매개효과)

  • Yang, Kyoung-Mi;Oh, Chang-Hong;Park, Jung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.116-128
    • /
    • 2015
  • The purpose of research is to investigate mediating effect of stress management on influence over post traumatic stress disorder with traumatic case experience. In order to investigate, police officers from 4 police stations in Jeju were selected as subjects, 297 police officers. Data processing analysis of the research was verified by going through Baron & Kenny's regression analysis in 4 phases and Sobel Test was done to verify significance level on mediation effect. Through the research by confirming the manifestation route of post traumatic stress disorder symptom after traumatic case experience, assisted in setting up of appropriate post traumatic stress disorder intervention program and the purpose of research is to ultimately help police officers to break free from post traumatic stress and establish positive and dynamic work environment.

Improving Energy Consumption of Directed Diffusion with Mobile Sinks By Prefetching and Pruning (이동 싱크 환경에서 사전경로설정과 가지치기를 이용한 Directed Diffusion의 에너지 소모 개선)

  • Kim, Sung-Hoon;Lee, Sang-Mok;Yang, Hyun;Park, Chang-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.34-45
    • /
    • 2008
  • In dynamic wireless sensor networks where sources and sinks are moving or are created/died, control overheads for route establishment are increased and thus become one of the major factors for energy consumption. This study introduces prefetching and pruning for Directed Diffusion to remove redundant control messages. Prefetching collects path information for each event with "AnyEvent" in advance and gives quick responses without further flooding of requests. Pruning accumulates history information from previous requests and replies, and then stops forwarding a request towards where the event does not exist. Simulation results with ns show that it is possible to build implicit and soft infrastructures within a Directed Diffusion system through these active collection and passive accumulation and they improve energy consumption more as control overhead goes higher.

Candidate Path Selection Method for TCP Performance Improvement in Fixed Robust Routing

  • Fukushima, Yukinobu;Matsumura, Takashi;Urushibara, Kazutaka;Yokohira, Tokumi
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.6
    • /
    • pp.445-453
    • /
    • 2016
  • Fixed robust routing is attracting attention as routing that achieves high robustness against changes in traffic patterns without conducting traffic measurement and performing dynamic route changes. Fixed robust routing minimizes the worst-case maximum link load by distributing traffic of every source-destination (s-d) router pair onto multiple candidate paths (multipath routing). Multipath routing, however, can result in performance degradation of Transmission Control Protocol (TCP) because of frequent out-of-order packet arrivals. In this paper, we first investigate the influence of multipath routing on TCP performance under fixed robust routing with a simulation using ns-2. The simulation results clarify that TCP throughput greatly degrades with multipath routing. We next propose a candidate path selection method to improve TCP throughput while suppressing the worst-case maximum link load to less than the allowed level under fixed robust routing. The method selects a single candidate path for each of a predetermined ratio of s-d router pairs in order to avoid TCP performance degradation, and it selects multiple candidate paths for each of the other router pairs in order to suppress the worst-case maximum link load. Numerical examples show that, provided the worst-case maximum link load is less than 1.0, our proposed method achieves about six times the TCP throughput as the original fixed robust routing.

The Reduction Case of Occurrence of Abnormal Wearing of Rail in Compound Curve Part (복심곡선 레일이상마모 발생 저감 사례)

  • Kim, Wan-Sool
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.1097-1106
    • /
    • 2007
  • Rail provides running tract for train and broadly and widely conveys the weight of the train exerted from the train wheels that the rail directly supports onto the cross tie and roadbed, and supports the cross-sectional pressure exerted by centrifugal force at curvatures. That is, stationary rail provides surface on which dynamic train runs and guarantees cross-sectional resistance to enable the vertical snake motion of the train wheels as well as to maintain lateral force at curvatures. Rail provides running surface on which train wheels can run smoothly, and secures vertical and lateral force. However, it undergoes continuous destructive reactions (wearing and damages) and abrasion of the cladding by the train wheels. It is obvious that wearing will result when two metal parts act against each other. However, occurrence of abnormal wearing such as rapid wearing of the rail side due to complex generation of various mechanisms at the contact surface between the rail and train wheel flange. It is not easy to simply examine the causes of occurrence of abnormal wearing of rail and train wheel flange. Although countless number of academicians and specialists are conducting researches on abnormal wearing of rail and vertical wearing of train wheels, I believe it is too early to argue on pros and cons due to insufficiency of officially verified information on the issue. This review will be focusing on the examples of repairs that reduced the generation of abnormal wearing of rail by reviewing and improving characteristics of wearing and slack, speed of the train and cant as well as status of lubricator by choosing the compound curves present in the section between the $Anguk{\sim}Jongno3-ga$ Stations of the Route No. 3 among the compound curve tracks of the Seoul Metro Routes No. 3 & 4 at which abnormal wearing is generated continuously.

  • PDF

Electrical Resistivity and Mechanical Properties of Polypropylene Composites Containing Carbon Nanotubes and Stainless Steel Short Fibers (탄소나노튜브와 스테인레스강 단섬유를 함유한 폴리프로필렌 복합체의 전기저항 및 기계적 특성)

  • Jung, Jong Ki;Park, Kihun;Bang, Daesuk;Oh, Myunghoon;Kim, Bongseok;Lee, Jong Keun
    • Polymer(Korea)
    • /
    • v.38 no.2
    • /
    • pp.250-256
    • /
    • 2014
  • Polypropylene (PP) composites containing conductive multi-walled carbon nanotube (MWNT) and stainless steel short fiber (SSF) were manufactured using a twin screw extruder and characterized their surface resistivity and mechanical properties in this work. Surface resistivity measurements showed that the percolation threshold appeared at a lower MWNT loading when a small amount of SSF was added to PP/MWNT composites. Tensile modulus and strength of the composites increased but elongation-at-break decreased greatly compared to pure PP. Also, the effects of MWNT and SSF on storage modulus and tan ${\delta}$ from dynamic mechanical analysis for the composites were examined, and the morphologies of fractured surface and the fillers were observed using a scanning electron microscope.

Effective Test Case Generation for Various Types of Web-based Software (다양한 웹 기반 소프트웨어의 테스트를 위한 효율적인 테스트 케이스의 생성)

  • Kim, Hyun-Soo;Choi, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.12D no.4 s.100
    • /
    • pp.569-582
    • /
    • 2005
  • As information and business communication via Internet are growing up, web-based software is wide spread and more important on the viewpoint of software qualify than stand-alone. Research on verification of web content links and web-based Program was tried, but has short on covering various types of web based software and making experiments to be applied in real testing practice. This paper suggests a modeling technique to be applied to dynamic and various types of web-based software. First, it identifies each elements consisting of web-based software and then construct a model of Object Control Flow Graph and Object Relationship Diagram. We can generate test cases covering all test paths of ORD or invoking key points test route. Suggested modeling method and test case selection technique are verified by applying five types of web-based software and compared with other web-based test techniques.

Automatic Node Configuration Protocol for Small Sized Mobile Ad-Hoc Networks (소규모 이동 애드혹 네트워크에서의 자동 노드 설정 프로토콜)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.100-109
    • /
    • 2005
  • A Mobile Ad-Hoc Network (MANET) supports a multi-hop wireless network without any prepared base station (BS). The MANET is capable of building a mobile network automatically without any help from DHCP servers for address allocation or routers to forward or route messages. Many routing protocols have been proposed for the MANET, but these specify the most optimized or shortest path from a source to a destination, and they assume that nodes are pre-configured before communication. To make up for this, address allocation algorithms, such as MANETConf [1] and prophet address allocation algorithm [2], have been proposed. Especially, MANETConf proposes address allocation algorithm with duplication address check. In this paper, we present a dynamic node configuration protocol based on 2-tierd hierarchical network architecture for mobile ad-hoc network, modified from [1]. Especially, it reduces the number of broadcast message exchange between nodes when a new node somes into a network, which lessens network overhead, remarkably. This protocol is based on two-tired structure, and it ensures address allocation with simple duplication address defection mechanism.

A Study on Hacking E-Mail Detection using Indicators of Compromise (침해지표를 활용한 해킹 이메일 탐지에 관한 연구)

  • Lee, Hoo-Ki
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.21-28
    • /
    • 2020
  • In recent years, hacking and malware techniques have evolved and become sophisticated and complex, and numerous cyber-attacks are constantly occurring in various fields. Among them, the most widely used route for compromise incidents such as information leakage and system destruction was found to be E-Mails. In particular, it is still difficult to detect and identify E-Mail APT attacks that employ zero-day vulnerabilities and social engineering hacking techniques by detecting signatures and conducting dynamic analysis only. Thus, there has been an increased demand for indicators of compromise (IOC) to identify the causes of malicious activities and quickly respond to similar compromise incidents by sharing the information. In this study, we propose a method of extracting various forensic artifacts required for detecting and investigating Hacking E-Mails, which account for large portion of damages in security incidents. To achieve this, we employed a digital forensic indicator method that was previously utilized to collect information of client-side incidents.

Improved AntHocNet with Bidirectional Path Setup and Loop Avoidance (양방향 경로 설정 및 루프 방지를 통한 개선된 AntHocNet)

  • Rahman, Shams ur;Nam, Jae-Choong;Khan, Ajmal;Cho, You-Ze
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.64-76
    • /
    • 2017
  • Routing in mobile ad hoc networks (MANETs) is highly challenging because of the dynamic nature of network topology. AntHocNet is a bio-inspired routing protocol for MANETs that mimics the foraging behavior of ants. However, unlike many other MANET routing protocols, the paths constructed in AntHocNet are unidirectional, which requires a separate path setup if a route in the reverse direction is also required. Because most communication sessions are bidirectional, this unidirectional path setup approach is often inefficient. Moreover, AntHocNet suffers from looping problems because of its property of multiple paths and stochastic data routing. In this paper, we propose a modified path setup procedure that constructs bidirectional paths. We also propose solutions to some of the looping problems in AntHocNet. Simulation results show that performance is significantly enhanced in terms of overhead, end-to-end delay, and delivery ratio when loops are prevented. Performance is further improved, in terms of overhead, when bidirectional paths setup is employed.