• 제목/요약/키워드: Multi-protocol

Search Result 1,152, Processing Time 0.029 seconds

Link Energy Efficiency Routing Strategy for Optimizing Energy Consumption of WBAN (WBAN의 에너지 소비 최적화를 위한 링크 에너지 효율 라우팅 전략)

  • Lee, Jung-jae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.1-7
    • /
    • 2022
  • IoT technology that utilizes wireless body area networks (WBAN) and biosensors is an important field in the health industry to minimize resources and monitor patients. In order to integrate IoT and WBAN, a cooperative protocol that constitutes WBAN's limited sensor nodes and rapid routing for efficient data transmission is required. In this paper we propose an we propose an energy efficient and cooperative link energy-efficient routing strategy(LEERS) to solve the problems of redundant data transmission detection and limited network sensor lifetime extention. The proposed scheme considers the hop count node congestion level towards the residual energy sink and bandwidth and parameters. In addition, by determining the path cost function and providing effective multi-hop routing, it is shown that the existing method is improved in terms of residual energy and throughput

Determination of Scattered Radiation to the Thyroid Gland in Dental Cone Beam Computed Tomography

  • Wilson Hrangkhawl;Winniecia Dkhar;T.S. Madhavan;S. Sharath;R. Vineetha;Yogesh Chhaparwal
    • Journal of Radiation Protection and Research
    • /
    • v.48 no.1
    • /
    • pp.15-19
    • /
    • 2023
  • Background: Cone beam computed tomography (CBCT) is a specialized medical equipment and plays a significant role in the diagnosis of oral and maxillofacial diseases and abnormalities; however, it is attributed to risk of exposure of ionizing radiation. The aim of the study was to estimate and determine the amount of scattered radiation dose to the thyroid gland in dental CBCT during maxilla and mandible scan. Materials and Methods: The average scattered radiation dose for i-CAT 17-19 Platinum CBCT (Imaging Sciences International) was measured using a Multi-O-Meter (Unfors Instruments), placed at the patient's neck on the skin surface of the thyroid cartilage, with an exposure parameter of 120 kVp and 37.07 mAs. The surface entrance dose was noted using the Multi-O-Meter, which was placed at the time of the scan at the level of the thyroid gland on the anterior surface of the neck. Results and Discussion: The surface entrance dose to the thyroid from both jaws scans was 191.491±78.486 µGy for 0.25 mm voxel and 26.9 seconds, and 153.670±74.041 µGy from the mandible scan, whereas from the maxilla scan the surface entrance dose was 5.259±10.691 µGy. Conclusion: The surface entrance doses to the thyroid gland from imaging of both the jaws, and also from imaging of the maxilla and mandible alone were within the threshold limit. The surface entrance dose and effective dose in CBCT were dependent on the exposure parameters (kVp and mAs), scan length, and field of view. To further reduce the radiation dose, care should be taken in selecting an appropriate protocol as well as the provision of providing shielding to the thyroid gland.

Stability Analysis of Multi-motor Controller based on Hierarchical Network (계층적 네트워크 기반 다중 모터 제어기의 안정도 분석)

  • Chanwoo Moon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.677-682
    • /
    • 2023
  • A large number of motors and sensors are used to drive a humanoid robot. In order to solve the wiring problem that occurs when connecting multiple actuators, a controller based on a communication network has been used, and CAN, which is advantageous in terms of cost and a highly reliable communication protocol, was mainly used. In terms of the structure of the controller, a torque control type structure that is easy to implement an advanced algorithm into the upper controller is preferred. In this case, the low communication bandwidth of CAN becomes a problem, and in order to obtain sufficient communication bandwidth, a communication network is configured by separating into a plurality of CAN networks. In this study, a stability analysis on transmission time delay is performed for a multi-motor control system in which high-speed FlexRay and low-speed CAN communication networks are hierarchically connected in order to obtain a high communication bandwidth, and sensor information and driving signals are delivered within the allowed transmission time. The proposed hierarchical network-based control system is expected to improve control performance because it can implement multiple motor control systems with a single network.

Phase Jitter Analysis of Overlapped Signals for All-to-All TWSTFT Operation

  • Juhyun Lee;Ju-Ik Oh;Joon Hyo Rhee;Gyeong Won Choi;Young Kyu Lee;Jong Koo Lee;Sung-hoon Yang
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.3
    • /
    • pp.245-255
    • /
    • 2023
  • Time comparison techniques are necessary for generating and keeping Coordinated Universal Time (UTC) and distributing standard time clocks. Global Navigation Satellite System (GNSS) Common View, GNSS All-in-View, Two-Way Satellite Time and Frequency Transfer (TWSTFT), Very Long Baseline Interferometry (VLBI), optical fiber, and Network Time Protocol (NTP) based methods have been used for time comparison. In these methods, GNSS based time comparison techniques are widely used for time synchronization in critical national infrastructures and in common areas of application such as finance, military, and wireless communication. However, GNSS-based time comparison techniques are vulnerable to jamming or interference environments and it is difficult to respond to GNSS signal disconnection according to the international situation. In response, in this paper, Code-Division Multiple Access (CDMA) based All-to-All TWSTFT operation method is proposed. A software-based simulation platform also was designed for performance analysis in multi-TWSTFT signal environments. Furthermore, code and carrier measurement jitters were calculated in multi-signal environments using the designed simulation platform. By using the technique proposed in this paper, it is anticipated that the TWSTFT-based time comparison method will be used in various fields and satisfy high-performance requirements such as those of a GNSS master station and power plant network reference station.

A Study on Safety Impact Assessment of a Multiple Hydrogen Refueling Station (다차종 동시 충전을 위한 수소 스테이션의 안전 영향 평가 연구)

  • Boo-Seung Kim;Kyu-Jin Han;Seung-Taek Hong;Youngbo Choi
    • Journal of the Korean Institute of Gas
    • /
    • v.28 no.1
    • /
    • pp.85-99
    • /
    • 2024
  • As the proliferation of hydrogen electric vehicles accelerates, there is observed diversification in hydrogen refueling station models. This diversification raises safety concerns for different types of stations. This study conducted a quantitative risk assessment of a multi-vehicle hydrogen station, capable of simultaneously refueling cars, buses, and trucks. Utilizing Gexcon's Effects&Riskcurves Software, scenarios of fire and explosion due to hydrogen leaks were assessed. The study calculated the impact distances from radiative heat and explosion overpressure, and measured risks to nearby buildings and populations. The largest impact distance was from fires and explosions at dispensers and high-pressure storage units. High-pressure storage contributes most significantly to personal and societal risk. The study suggests that conservative safety distances and proper protective measures for these facilities can minimize human and material damage in the event of a hydrogen leak.

PRESSURE BASED ROUTING PROTOCOL FOR UNDERWATER WIRELESS SENSOR NETWORKS: A SURVEY

  • Khasawneh, Ahmad;Bin Abd Latiff, Muhammad Shafie;Chizari, Hassan;Tariq, MoeenUddin;Bamatraf, Abdullah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.504-527
    • /
    • 2015
  • Underwater wireless sensor networks (UWSNs) are similar to the terrestrial sensor networks. Nevertheless, there are different characteristics among them such as low battery power, limited bandwidth and high variable propagation delay. One of the common major problems in UWSNs is determining an efficient and reliable routing between the source node and the destination node. Therefore, researchers tend to design efficient protocols with consideration of the different characteristics of underwater communication. Furthermore, many routing protocols have been proposed and these protocols may be classified as location-based and location-free routing protocols. Pressure-based routing protocols are a subcategory of the location-free routing protocols. This paper focuses on reviewing the pressure-based routing protocols that may further be classified into non-void avoidance protocols and void avoidance protocols. Moreover, non-void avoidance protocols have been classified into single factor based and multi factor based routing protocols. Finally, this paper provides a comparison between these protocols based on their features, performance and simulation parameters and the paper concludes with some future works on which further study can be conducted.

A Performance Comparison of Flooding Schemes in Wireless Sensor Networks (무선센서네트워크에서 플러딩 기법의 성능평가)

  • Kim, Kwan-Woong;Cho, Juphil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.153-158
    • /
    • 2016
  • Broadcasting in multi-hop wireless sensor networks is a basic operation that supports many applications such as route search, setting up addresses and sending messages from the sink to sensor nodes. The broadcasting using flooding causes problems that can be mentioned as a broadcasting storm such as redundancy, contention and collision. A variety of broadcasting schemes using wireless sensor networks have been proposed to achieve superior performance rather than simple flooding scheme. Broadcasting algorithms in wireless sensor networks can be classified into six subcategories: flooding scheme, probabilistic scheme, counter-based scheme, distance-based scheme, location-based schemes, and neighbor knowledge-based scheme. This study analyzes a simple flooding scheme, probabilistic scheme, counter-based scheme, distance-based scheme, and neighbor knowledge-based scheme, and compares the performance and efficiency of each scheme through network simulation.

Deterministic Private Matching with Perfect Correctness (정확성을 보장하는 결정적 Private Matching)

  • Hong, Jeong-Dae;Kim, Jin-Il;Cheon, Jung-Hee;Park, Kun-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.10
    • /
    • pp.502-510
    • /
    • 2007
  • Private Matching is a problem of computing the intersection of private datasets of two parties. One could envision the usage of private matching for Insurance fraud detection system, Do-not-fly list, medical databases, and many other applications. In 2004, Freedman et at. [1] introduced a probabilistic solution for this problem, and they extended it to malicious adversary model and multi-party computation. In this paper, we propose a new deterministic protocol for private matching with perfect correctness. We apply this technique to adversary models, achieving more reliable and higher speed computation.

Hop-by-Hop Priority Increasing Scheme for Improving End-to-end Throughput in Multi-Hop OBS Networks (다중 홉 광 버스트 교환망에서 종단간 수율 향상을 위한 홉 단위 우선 순위 증가 기법)

  • 김병철;조유제
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.10
    • /
    • pp.35-42
    • /
    • 2003
  • In this paper, we classified the wavelength reservation mechanisms of optical burst switching (OBS), and investigated the path length priority effect of the offset time/delayed reservation (OT/DR)-based scheme like the just-enough-time (JET) protocol. And, we showed that the fiber delay line (FDL)-based scheme can avoid the path length priority effect in multiple hop network environments. Also, we proposed a novel FDL/DR with hop-by-hop priority increasing (HPI) scheme which can improve the end-to-end throughput by increasing the priority of bursts hop-by-hop using the input FDLs at each node. The simulation results showed that the proposed FDL/DR with HPI scheme could avoid the path length priority effect and enhance the end-to-end throughput in multiple hop network environments.