• Title/Summary/Keyword: Low Power Protocol

Search Result 341, Processing Time 0.029 seconds

Sensitization of Periodontitis Disease Causing Bacteria by Low Power He-Ne Laser Radiation

  • Satsangi, Akash Tripathi;Mathur, Manish;Saxena, Parul;Prasad, Guru;Shrivastava, Jitendra Nath;Shrivastava, Jenendra Nath;Roy, Sukhdev
    • Journal of Photoscience
    • /
    • v.11 no.32
    • /
    • pp.55-59
    • /
    • 2004
  • The present investigation is an attempt to create an optimized protocol for a bactericidal modality of different powers of He-Ne laser radiation to eliminate periodontitis disease causing bacteria from dental plaques. Periodontitis is most prevalent infectious disease of men and caused by a limited number of Gram negative oral bacteria. Porphyromonas gingivalis and Streptococcus sanguis are the important bacteria responsible for periodontitis diseases. Effect on periodontitis disease causing bacteria were produced by the exposure of different powers of He-Ne laser light i.e. 9 mW, 17 mW and 26 mW of red colour of wavelength 632.8 nm in two different periods of time i.e. 10 min. and 20 min. in the presence of dye Methylene blue (MB) used as a photosensitizer. The results have been shown in terms of percentage inhibition of colony forming units (cfu.) of bacteria. This study has shown that maximum inhibition of cfu. were observed in Laser+MB-20 min. exposure time. This inhibition was followed by Laser+MB-10 min., but minimum inhibition was seen in Laser only at 10 min. exposure. In case of effect of methylene alone on the cfu. of bacteria, it was seen that MB have not shown more inhibition of cfu. and it had shown that the no. of cfu. are very similar to that of control. The above observation of the present study was seen in case of every 3 different type of used powers of laser for both the bacteria. Maximum percentage inhibition of cfu. were seen in case of 26mW powers of He-Ne laser, which was 67. 28% to 61.42% for Porphyromonas gingivalis and Streptococcus sanguis respectively. So, increasing the power of laser (safe range for dentistry is 3-30 mW) under conditions shows an increased percentage inhibition of cfu. Thus the present investigation may be a useful adjunct with mechanical debridement in the prevention of recolonization of subgingival lesions by pathogenic microorganisms which are harmful and drug resistant.

  • PDF

Implementation and Measurement of Spectrum Sensing for Cognitive Radio Networks Based on LoRa and GNU Radio

  • Tendeng, Rene;Lee, YoungDoo;Koo, Insoo
    • International journal of advanced smart convergence
    • /
    • v.7 no.3
    • /
    • pp.23-36
    • /
    • 2018
  • In wireless communication, efficient spectrum usage is an issue that has been an attractive research area for many technologies. Recently new technologies innovations allow compact radios to transmit with power efficient communication over very long distances. For example, Low-Power Wide Area Networks (LPWANs) are an attractive emerging platform to connect the Internet-of-Things (IoT). Especially, LoRa is one of LPWAN technologies and considered as an infrastructure solution for IoT. End-devices use LoRa protocol across a single wireless hop to communicate to gateway(s) connected to the internet which acts as a bridge and relays message between these LoRa end-devices to a central network server. The use of the (ISM) spectrum sharing for such long-range networking motivates us to implement spectrum sensing testbed for cognitive radio network based on LoRa and GNU radio. In cognitive radio (CR), secondary users (SUs) are able to sense and use this information to opportunistically access the licensed spectrum band in absence of the primary users (PUs). In general, PUs have not been very receptive of the idea of opportunistic spectrum sharing. That is, CR will harmfully interfere with operations of PUs. Subsequently, there is a need for experimenting with different techniques in a real system. In this paper, we implemented spectrum sensing for cognitive radio networks based on LoRa and GNU Radio, and further analyzed corresponding performances of the implemented systems. The implementation is done using Microchip LoRa evolution kits, USRPs, and GNU radio.

Advanced Key Management Architecture Based on Tree Structure for Secure SCADA Communications (안전한 SCADA 통신을 위한 트리 기반의 효율적인 키 관리 구조)

  • Choi, Dong-Hyun;Lee, Sung-Jin;Jeong, Han-Jae;Kang, Dong-Joo;Kim, Hak-Man;Kim, Kyung-Sin;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.37-50
    • /
    • 2009
  • The SCADA(Supervisory Control And Data Acquisition) system is a control system for infrastructure of nation. In the past, the SCADA system was designed without security function because of its closed operating environment. However, the security of the SCADA system has become an issue with connection to the open network caused by improved technology. In this paper we review the constraints and security requirements for SCADA system and propose advanced key management architecture for secure SCADA communications. The contributions of the present work are that our scheme support both message broadcasting and secure communications, while the existing key management schemes for SCADA system don't support message broadcasting. Moreover, by evenly spreading much of the total amount of computation across high power nodes (MTU or SUB-MTU), our protocol avoids any potential performance bottleneck of the system while keeping the burden on low power (RTU) nodes at minimal.

A Study on Characteristic of Image Quality according to CT Table Height in Computed Tomography (컴퓨터단층촬영 검사 시 테이블 높이에 따른 화질 특성에 관한 연구)

  • Ki-Won Kim;Jung-Whan Min;Sang-Sun Lee;Young-Bong Lee;Ki-Jong Lee;Han-Sol Park;Joo-Young Oh
    • Journal of radiological science and technology
    • /
    • v.46 no.4
    • /
    • pp.295-301
    • /
    • 2023
  • In addition to protocol adjustments during CT examinations, the height of the CT table can also affect image quality. Therefore, this study aimed to investigate the change in image quality depending on the height of the table in brain CT, which accounts for a large proportion of CT examinations, by measuring signal to contrast to noise ratio (CNR) and noise power spectrum (NPS) using the head phantom and evaluating them. The head phantom images were acquired using Philips Brilliance iCT 256. When the image was acquired, the table height was adjusted to 815, 865, 915, 965, 1015, and 1030 mm, respectively, and each scan was performed 3 times for each height. The CNR result showed the highest value at 965 mm, which is the height adjacent to the center of the head phantom. NPS showed the lowest NPS at 915 mm, the center of the head phantom in the low frequency region. From these results, it can be seen that the height of the table in CT examination is closely related to the image quality, and it can be seen the characteristics of image quality according to CT table through quantitative evaluation methods such as CNR and NPS.

A Design and Implementation of WML Compiler for WAP Gateway for Wireless Internet Services (무선 인터넷 서비스를 위한 WAP 게이트웨이용 WML 컴파일러의 설계 및 구현)

  • Choi, Eun-Jeong;Han, Dong-Won;Lim, Kyung-Shik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.2
    • /
    • pp.165-182
    • /
    • 2001
  • In this paper, we describe a design and implementation of the Wireless Markup Language(WML) compiler to deploy wireless Internet services effectively. The WML compiler translates textual WML decks into binary ones in order to reduce the traffic on wireless links that have relatively low bandwidth to wireline links and mitigate the processing overhead of WML decks on, wireless terminals that have relatively low processing power to fixed workstations. In addition, it takes over the overhead of eXtensible Markup Language(XML) well-formedness and validation processes. The WML compiler consists of the lexical analyzer and parser modules. The granunar for the WML parser module is LALR(1) context-free grammar that is designed based on XML 1.0 and WML 1.2 DTD(Document Type Definition) with the consideration of the Wireless Application Protocol Binary XML grammar. The grammar description is converted into a C program to parse that grammar by using parser generator. Even though the tags in WML will be extended or WML DTD will be upgraded, this approach has the advantage of flexibility because the program is generated by modifying just the changed parts. We have verified the functionality of the WML compiler by using a WML decompiler in the public domain and by using the Nokia WAP Toolkit as a WAP client. To measurethe compressibility gain of the WML compiler, we have tested a large number of textual WML decks and obtained a maximum 85 %. As the effect of compression is reduced when the portion of general textual strings increases relative to one of the tags and attributes in a WML deck, an extended encoding method might be needed for specific applications such as compiling of the WML decks to which the Hyper Text Markup Language document is translated dynamically.

  • PDF

Grid-Based Key Pre-Distribution for Factory Equipment Monitoring (공장 설비 모니터링을 위한 그리드 기반 키 선분배 기법)

  • Cho, YangHui;Park, JaePyo;Yang, SeungMin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.147-152
    • /
    • 2016
  • Wireless sensor networks that are easy to deploy and install are ideal for building a system that monitors the condition of the equipment in a factory environment where wiring is difficult. The ZigBee has characteristics of low price and low power compared with other wireless communication protocols and is suitable for a monitoring system requiring a plurality of nodes. ZigBee communication requires encryption security between devices because all protocol layers are based on OTM trusted by each other. In the communication between nodes, node authentication must be guaranteed and exposure of confidential information managed by each node should be minimized. The facilities of the factory are regular and stationary in distribution location. In order to protect the information gathered from the sensor in the factory environment and the actuator control information connected to the sensor node, we propose a cryptosystem based on the two - dimensional grid - based key distribution method similar to the distribution environment of the facility.

Self-contained LED lantern Control system with BLE functions (BLE 기능을 갖는 일체형 LED 등명기 제어시스템)

  • Ye, Seong-hyeon;Park, Jeong-Seon;Han, Soonhee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.1005-1012
    • /
    • 2016
  • LED beacons operated on an isolated marine area are mostly employing the solar power supply system, and this system is well known for increasing the cost of management and maintenance. Recently, a number of researches and demonstrations on self-contained LED beacon is actively conducted to solve this issue. In this work, we propose an self-contained LED beacon with Bluetooth Low Energy function for an effective management of LED beacon. Firstly, control program structure is designed by expanding the status protocol of self-contained LED beacon, and then it is implemented into the form which administrator can easily understand. The control system visualizes the status and control data of self-contained LED beacon, and this enables the rapid decision-making of administrator. Also, minimizing electricity consumption of the beacon, it can transfer and update the status or light information of self-contained LED beacons with smart phone.

Clustering Algorithm for Extending Lifetime of Wireless Sensor Networks (무선 센서 네트워크의 수명연장을 위한 클러스터링 알고리즘)

  • Kim, Sun-Chol;Choi, Seung-Kwon;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.4
    • /
    • pp.77-85
    • /
    • 2015
  • Recently, wireless sensor network(WSN) have been used in various fields to implement ubiquitous computing environment. WSN uses small, low cost and low power sensors in order to collect information from the sensor field. This paper proposes a clustering algorithm for energy efficiency of sensor nodes. The proposed algorithm is based on conventional LEACH, the representative clustering protocol for WSN and it prolongs network and nodes life time using sleep technique and changable transmission mode. The nodes of the proposed algorithm first calculate their clustering participation value based on the distance to the neighbor nodes. The nodes located in high density area will have clustering participation value and it can turn to sleep mode. Besides, proposed algorithm can change transmission method from conventional single-hop transmission to multi-hop transmission according to the energy level of cluster head. Simulation results show that the proposed clustering algorithm outperforms conventional LEACH, especially non-uniformly deployed network.

An Implementation of CAN Communication Interface using the Embedded Processor System based on FPGA (FPGA 기반의 임베디드 프로세서 시스템을 이용한 CAN 통신 인터페이스 구현)

  • Koo, Tae-Mook;Park, Young-Seak
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.1
    • /
    • pp.53-62
    • /
    • 2010
  • Recently, various industrial embedded systems including vehicles controlled electronically are evolving to distributed multi-micro controller system. Accordingly, there is a need for standard CAN(Controller Area Network) protocol that ensures high stability and reliability of communication and is simple to construct object-oriented system with high control efficiency. CAN communication interface used general-purpose processor doesn't have many limitations in various application development because of fixed hardware architecture. This paper design and implement a CAN communication interface system based on FPGA. It is verified function and performance of system through monitoring communication with existing AT90CAN128 controller. Implemented CAN communication interface can be reused in development of application systems based on FPGA. And it provides low-cost, small-size and low-power design advantages.

New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography

  • Su, Pin-Chang;Tsai, Chien-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5537-5555
    • /
    • 2017
  • Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures are widely used for privacy-related applications such as electronic cash, electronic voting and electronic auction systems where to maintain the anonymity of the participants. Among these applications, the blinded message is needed for a certain purpose by which users delegate signing operation and communicate with each other in a trusted manner. This application leads to the need of proxy blind signature schemes. Proxy blind signature is an important type of cryptographic primitive to realize the properties of both blind signature and proxy signature. Over the past years, many proxy blind signature algorithms have been adopted to fulfill such task based on the discrete logarithm problem (DLP) and the elliptic curve discrete log problem (ECDLP), and most of the existing studies mainly aim to provide effective models to satisfy the security requirements concerning a single blinded message. Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography (ECC). This innovative method thus has a higher level of security to achieve the security goals of both blind signature and proxy signature. Moreover, the evaluation results show that this proposed protocol is more efficient, consuming low communication overhead while increasing the volume of digital messages compared to the performance from other solutions. Due to these features, this design is able to be implemented in small low-power intelligent devices and very suitable and easily adoptable for e-system applications in pervasive mobile computing environment.