• Title/Summary/Keyword: Message Control Algorithm

Search Result 138, Processing Time 0.027 seconds

Impact of Delayed Control Message in AODV Protocol

  • Miao, Haoran;Lee, Ye-Eun;Kim, Ki-Il
    • Annual Conference of KIPS
    • /
    • 2022.05a
    • /
    • pp.82-83
    • /
    • 2022
  • Ad-hoc On-demand Distance Vector (AODV), is one of well-designed routing protocols in mobile ad hoc networks. It supports the functionality of node mobility modules through multiple control messages to create and maintain paths for data transfer. Even though a number of studies have been conducted to achieve rapid discovery of paths across the network, but few have focused on impact of control messages. This paper proposes a method to adjust the transmission time of messages used in path recovery according to their individual characteristics. Simulation results show the improved performance of the proposed algorithm rather than traditional AODV routing protocol.

TPC Algorithm for Fault Diagnosis of CAN-Based Multiple Sensor Network System (CAN 기반 다중센서 네트워크 시스템의 고장진단을 위한 TPC알고리즘)

  • Ha, Hwimyeong;Hwang, Yuseop;Jung, Kyungsuk;Kim, Hyunjun;Lee, Bongjin;Lee, Jangmyung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.22 no.2
    • /
    • pp.147-152
    • /
    • 2016
  • This paper proposes a new TPC (Transmission Priority Change) algorithm which is used to diagnose failures of a CAN (Controller Area Network) based network system for the oil tank monitoring. The TPC algorithm is aimed to increase the total amount of data transmission and to minimize the latency for an urgent message by changing transmission priority. The urgency of the data transmission has been determined by the conditions of sensors. There are multiple sensors inside of the oil tank, such as temperature, valve, pressure and level sensors. When the sensors operate normally, the sensory data can be collected through the CAN network by the monitoring system. However when there is a dangerous situation or failure situation happened at a sensor, the data need to be handled quickly by the monitoring system, which is implemented by using the TPC algorithm. The effectiveness of the TPC algorithm has been verified by the real experiments. In addition, this paper introduces a method that people can figure out the condition of oil tanks and also can perform the fault diagnosis in real-time by using transmitted packet data. By applying this TPC algorithm to various industries, the convenience and reliability of multiple sensors network system can be improved.

MAXIMUM TOLERABLE ERROR BOUND IN DISTRIBUTED SIMULATED ANNEALING

  • Hong, Chul-Eui;McMillin, Bruce M.;Ahn, Hee-Il
    • ETRI Journal
    • /
    • v.15 no.3
    • /
    • pp.1-26
    • /
    • 1994
  • Simulated annealing is an attractive, but expensive, heuristic method for approximating the solution to combinatorial optimization problems. Attempts to parallel simulated annealing, particularly on distributed memory multicomputers, are hampered by the algorithm's requirement of a globally consistent system state. In a multicomputer, maintaining the global state S involves explicit message traffic and is a critical performance bottleneck. To mitigate this bottleneck, it becomes necessary to amortize the overhead of these state updates over as many parallel state changes as possible. By using this technique, errors in the actual cost C(S) of a particular state S will be introduced into the annealing process. This paper places analytically derived bounds on this error in order to assure convergence to the correct optimal result. The resulting parallel simulated annealing algorithm dynamically changes the frequency of global updates as a function of the annealing control parameter, i.e. temperature. Implementation results on an Intel iPSC/2 are reported.

  • PDF

Implementation of Optimal User Interface based on the Voice Output Embedded System for People with Profound Communication Disorder (중증언어장애자를 위한 음성 출력 임베디드 시스템을 기반으로 한 최적의 사용자 인터페이스 구현)

  • Yoo, Byung-Hyuk;Lee, Sang-Hun;Seo, Hee-Don
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.885-886
    • /
    • 2006
  • The purpose of this study is to develop the optimal system(AAC device), which helps a person with a profound communication disorder to communicate with other people. Therefore, this system includes the user interface enhancement that is the user adaptation mode algorithm. The symbol is made with a text and an icon which is converted into Korean. The message contiol operates scanning and adjusts rate control of row-column scanning and linear scanning. This embedded system includes voice input/output and voice recording as well suggested method that could apply optimal device access algorithm from clinical environment. Therefore, we are experting that even the current system itself will be able to improve the life quality of people who need to communicate with the help of devices.

  • PDF

Bit-Level Systolic Array for Modular Multiplication (모듈러 곱셈연산을 위한 비트레벨 시스토릭 어레이)

  • 최성욱
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.163-172
    • /
    • 1995
  • In this paper, the bit-level 1-dimensionl systolic array for modular multiplication are designed. First of all, the parallel algorithms and data dependence graphs from Walter's Iwamura's methods based on Montgomery Algorithm for modular multiplication are derived and compared. Since Walter's method has the smaller computational index points in data dependence graph than Iwamura's, it is selected as the base algorithm. By the systematic procedure for systolic array design, four 1-dimensional systolic arrays ale obtained and then are evaluated by various criteria. Modifying the array derived from 〔0,1〕 projection direction by adding a control logic and serializing the communication paths of data A, optimal 1-dimensional systolic array is designed. It has constant I/O channels for modular expandable and is good for fault tolerance due to unidirectional paths. And so, it is suitable for RSA Cryptosystem which deals with the large size and many consecutive message blocks.

  • PDF

Bit-level 1-dimensional systolic modular multiplication (비트 레벨 일차원 시스톨릭 모듈러 승산)

  • 최성욱;우종호
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.9
    • /
    • pp.62-69
    • /
    • 1996
  • In this paper, the bit-level 1-dimensional systolic array for modular multiplication is designed. First of all, the parallel algorithm and data dependence graph from walter's method based on montgomery algorithm suitable for array design for modular multiplication is derived. By the systematic procedure for systolic array design, four 1-dimensional systolic arrays are obtained and then are evaluated by various criteria. As it is modified the array which is derived form [0,1] projection direction by adding a control logic and it is serialized the communication paths of data A, optimal 1-dimensional systolic array is designed. It has constant I/O channels for expansile module and it is easy for fault tolerance due to unidirectional paths. It is suitable for RSA cryptosystem which deals iwth the large size and many consecutive message blocks.

  • PDF

Real-Time Transmission Method of wireless Control Network Using Zigbee Networks (지그비 망 기반의 무선 제어망 설계를 위한 실시간 전송 기법에 대한 연구)

  • Lee, Jung-Il;Jung, Ji-Won;Kim, Dong-Sung
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.39-40
    • /
    • 2007
  • In this Paper a transmission algorithm based on Zigbee Networks is proposed. The superframe of IEEE 802. 15.4 is applied to the transmission method of real-time mixed data (periodic data, sporadic data, and non real-time message). The simulation results show the real-time performance of sporadic data is improved by using the proposed transmission algorithm.

  • PDF

TF-CPABE: An efficient and secure data communication with policy updating in wireless body area networks

  • Chandrasekaran, Balaji;Balakrishnan, Ramadoss;Nogami, Yasuyuki
    • ETRI Journal
    • /
    • v.41 no.4
    • /
    • pp.465-472
    • /
    • 2019
  • The major challenge in wireless body area networks (WBAN) is setting up a protected communication between data consumers and a body area network controller while meeting the security and privacy requirements. This paper proposes efficient and secure data communication in WBANs using a Twofish symmetric algorithm and ciphertext-policy attribute-based encryption with constant size ciphertext; in addition, the proposed scheme incorporates policy updating to update access policies. To the best of the author's knowledge, policy updating in WBAN has not been studied in earlier works. The proposed scheme is evaluated in terms of message size, energy consumption, and computation cost, and the results are compared with those of existing schemes. The result shows that the proposed method can achieve higher efficiency than conventional methods.

CFP Scheduling for Real-Time Service and Energy Efficiency in the Industrial Applications of IEEE 802.15.4

  • Ding, Yuemin;Hong, Seung Ho
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.87-101
    • /
    • 2013
  • In industrial applications, sensor networks have to satisfy specified time requirements of exchanged messages. IEEE 802.15.4 defines the communication protocol of the physical and medium access control layers for wireless sensor networks, which support real-time transmission through guaranteed time slots (GTSs). In order to improve the performance of IEEE 802.15.4 in industrial applications, this paper proposes a new traffic scheduling algorithm for GTS. This algorithm concentrates on time-critical industrial periodic messages and determines the values of network and node parameters for GTS. It guarantees real-time requirements of periodic messages for industrial automation systems up to the order of tens to hundreds of milliseconds depending on the traffic condition of the network system. A series of simulation results are obtained to examine the validity of the scheduling algorithm proposed in this study. The simulation results show that this scheduling algorithm not only guarantees real-time requirements for periodic message but also improves the scalability, bandwidth utilization, and energy efficiency of the network with a slight modification of the existing IEEE 802.15.4 protocol.

Performance Comparison of MISP-based MANET Strong DAD Protocol

  • Kim, Sang-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3449-3467
    • /
    • 2015
  • A broadcast operation is the fundamental transmission technique in mobile ad-hoc networks (MANETs). Because a broadcast operation can cause a broadcast storm, only selected forwarding nodes have the right to rebroadcast a broadcast message among the one-hop and two-hop neighboring nodes of a sender. This paper proposes the maximum intersection self-pruning (MISP) algorithm to minimize broadcasting redundancy. Herein, an example is given to help describe the main concept of MISP and upper bounds of forward node have been derived based on induction. A simulation conducted demonstrated that when conventional blind flooding (BF), self-pruning (SP), an optimized link state routing (OLSR) multipoint relay (MPR) set, and dominant pruning (DP), are replaced with the MISP in executing Strong duplicate address detection (DAD), the performances in terms of the energy consumption, upper bounds of the number of forward nodes, and message complexity have been improved. In addition, to evaluate the performance in reference to the link error probability, Pe, an enhancement was achieved by computing a proposed retransmission limit, S, for error recovery based on this probability. Retransmission limit control is critical for efficient energy consumption of MANET nodes operating with limited portable energy where Strong DAD reacts differently to link errors based on the operational procedures.