• Title/Summary/Keyword: Node reliability

Search Result 373, Processing Time 0.023 seconds

The Stochastic Finite Element Analysis and Reliability Analysis of the Cable Stayed Bridge Considered to Correlation of the Random Variable (확률변수의 상관성을 고려한 사장교의 확률유한요소해석 및 신뢰성해석)

  • Han, Sung Ho;Shin, Jae Chul
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.1A
    • /
    • pp.21-33
    • /
    • 2006
  • The reliability analysis can be conducted more effectively by formulating the stochastic finite element method suitable for the reliability theory about the cable stayed bridge. After conducting the initial equilibrium analysis of the cable stayed bridge, the program which can conduct the linear and nonlinear stochastic finite element analysis using the perturbation method and the reliability analysis considered to the correlation of the random variable is developed. Using the results of this program about the cable stayed bridge, the characteristic of the node displacement, element force and cable tension according to the correlation of the random variable is investigated quantitatively. Also the reliability index and the failure probability are examined by the compounding the correlation of the random variable.

Constrained Relay Node Deployment using an improved multi-objective Artificial Bee Colony in Wireless Sensor Networks

  • Yu, Wenjie;Li, Xunbo;Li, Xiang;Zeng, Zhi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.2889-2909
    • /
    • 2017
  • Wireless sensor networks (WSNs) have attracted lots of attention in recent years due to their potential for various applications. In this paper, we seek how to efficiently deploy relay nodes into traditional static WSNs with constrained locations, aiming to satisfy specific requirements of the industry, such as average energy consumption and average network reliability. This constrained relay node deployment problem (CRNDP) is known as NP-hard optimization problem in the literature. We consider addressing this multi-objective (MO) optimization problem with an improved Artificial Bee Colony (ABC) algorithm with a linear local search (MOABCLLS), which is an extension of an improved ABC and applies two strategies of MO optimization. In order to verify the effectiveness of the MOABCLLS, two versions of MO ABC, two additional standard genetic algorithms, NSGA-II and SPEA2, and two different MO trajectory algorithms are included for comparison. We employ these metaheuristics on a test data set obtained from the literature. For an in-depth analysis of the behavior of the MOABCLLS compared to traditional methodologies, a statistical procedure is utilized to analyze the results. After studying the results, it is concluded that constrained relay node deployment using the MOABCLLS outperforms the performance of the other algorithms, based on two MO quality metrics: hypervolume and coverage of two sets.

A Study on Making use of Multiple Interfaces with Mobile Node Simultaneously (이동 단말의 다중 인터페이스 동시 사용에 관한 고찰)

  • You Tae-wan;Lee Seung-yun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1412-1418
    • /
    • 2005
  • Recently, more and more portable terminals probably have multiple interfaces to be connected to different access technologies. Each technology has its specific characteristics in terms of coverage area, bandwidth, reliability, etc. For example, the mobile node is equipped with three heterogeneous interfaces; IEEE 802.1lb MLAM link, CDMA Cellular link, and 802.16 WiMAX link These mobile nodes may be reachable through different links at the same time or use each interface alternately depending on the network environment. As like this, the portable terminal equipped multiple interfaces can have many benefits; it should be connect to Internet through other interface in case of occurring to failure for currently activate interface, and it should share a mount of traffic efficiently per interface etc. This environment is called end node Multihoming. However, current most Internet protocols are designed originally with single interface in mind. So these potocols do not provide methods for supporting simultaneous diffentiated use of multiple access technologies. In this paper, firstly we have to refer technical consideration items to use multiple interfaces based on IPv6 simultaneously. And we should propose extended registration mechanism for multiple addresses being acquired from interfaces to support reliable accessibility and vertical handover.

A Study on Distributed Cooperation Intrusion Detection Technique based on Region (영역 기반 분산협력 침입탐지 기법에 관한 연구)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.53-58
    • /
    • 2014
  • MANET can quickly build a network because it is configured with only the mobile node and it is very popular today due to its various application range. However, MANET should solve vulnerable security problem that dynamic topology, limited resources of each nodes, and wireless communication by the frequent movement of nodes have. In this paper, we propose a domain-based distributed cooperative intrusion detection techniques that can perform accurate intrusion detection by reducing overhead. In the proposed intrusion detection techniques, the local detection and global detection is performed after network is divided into certain size. The local detection performs on all the nodes to detect abnormal behavior of the nodes and the global detection performs signature-based attack detection on gateway node. Signature DB managed by the gateway node accomplishes periodic update by configuring neighboring gateway node and honeynet and maintains the reliability of nodes in the domain by the trust management module. The excellent performance is confirmed through comparative experiments of a multi-layer cluster technique and proposed technique in order to confirm intrusion detection performance of the proposed technique.

The Pumping Node Architecture to Solve the Traffic Congestion Problem due to the Crowds of Mobile Nodes in Wireless Sensor Networks (고정 노드와 이동 노드가 상존하는 센서 네트워크에서 이동 노드 몰림 현상으로 인한 폭주 현상 해결을 위한 펌핑 노드 구조)

  • Lee, Dong-Kyu;Kim, Byung-Chul;Park, Sung-Ho;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.777-785
    • /
    • 2009
  • In recent wireless sensor networks, stationary nodes and mobile nodes co-exist to provide a diverse service. However, because there are multiple mobile nodes located in the wireless sensor network, there is a potential for the instability due to the frequent network reconfiguration and the traffic caused by densely concentration of mobile nodes while mobile nodes are switching locations. In order to solve this problem, we propose the pumping node architecture to solve this traffic congestion problem due to the crowds of mobile nodes. The pumping node can be reduced heavy traffic by pumping through the backbone network caused by the densely concentration of the mobile nodes. As a result, the architecture reduces the traffic in the sensor network with high reliability.

A Cooperative Communication System using Cross-Layer Coding Method base on Hybrid-ARQ (Cross-Layer 부호기법을 이용한 Hybrid-ARQ 기반의 협력통신 시스템 연구)

  • Park, Tae-Doo;Kim, Min-Hyuk;Kim, Chul-Seung;Jung, Ji-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11C
    • /
    • pp.889-895
    • /
    • 2010
  • MIMO system generally requires more than one antenna at the communication device. However, many wireless devices are limited by size, cost or hardware complexity to one antenna. To overcome such restrictions, we used a new technique, called cooperative communication. We propose a new cooperative transmission strategy system using cross-layer coding method base on H-ARQ for optimal communication. Proposed cooperative H-ARQ system that can improve the above problems and can get the better performance. In proposed cooperative system with H-ARQ method, if the received signal from source node is satisfied by the destination preferentially, the destination transmit ACK message to both relay node and source node, and then recovers the received signal. In addition, if ARQ message indicates NACK message, relay node operates selective retransmission. Based on the simulation results in aspect to BER performance and throughput, the proposed method which combined cooperative system with H-ARQ based on cross-layer coding can improve spectral efficiency reliability of system compared with that of general one by one system.

Design of r-Sensor Protocol and Hardware Implementation for Intelligent Home Service (지능형 홈서비스를 위한r-Sensor프로토콜설계 및 하드웨어 구현)

  • Kwak, Tae-Kil;Lee, Bum-Sung;Jung, Jin-Wook;Jin, Kyo-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2113-2119
    • /
    • 2006
  • In this paper, we design the r-Sensor protocol for reliable data transmission in the Intelligent Home Service based on the wireless sensor network environment. The r-Sensor protocol improve the reliability of data transmission and node fairness using simple routing algorithm, congestion control, and loss recovery method that minimize the load of relay node. Reposed routing algorithm find out upstream and downstream nodes using the Network Management packet. Meanwhile, loss recovery algorithm uses the Aggregated-Nack. To apply supposed algorithm, the IHS-AMR(Intelligent Home Service - Automatic Meter Reader) and sensor node are designed and implemented in hardware. The IHS-AMR provides remote metering service and also offers home safety service by internetworking with sensor network, mobile phone network and internet.

A Study on Intrusion Detection Method using Collaborative Technique (협업 기법을 이용한 침입탐지 탐지 방법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.121-127
    • /
    • 2021
  • MANET, which does not have any infrastructure other than wireless nodes, has the advantage of being able to construct a fast network. However, the movement of nodes and wireless media are also the causes of security vulnerabilities of MANET. In particular, the damage caused by the attacking nodes existing on the network is considerably greater than that of other networks. Therefore, it is necessary to detection technique for attacking nodes and techniques to reduce damage caused by attacks. In this paper, we proposed a hierarchical structure technique to increase the efficiency of intrusion detection and collaboration-based intrusion detection technique applying a P2P mesh network configuration technique to reduce damage caused by attacks. There was excluded the network participation of the attacking node in advance through the reliability evaluation of the nodes in the cluster. In addition, when an attack by an attacking node is detected, this paper was applied a method of minimizing the damage of the attacking node by transmitting quickly the attack node information to the global network through the P2P mesh network between cluster heads. The ns-2 simulator was used to evaluate the performance of the proposed technique, and the excellent performance of the proposed technique was confirmed through comparative experiments.

A Reliable Data Transfer Mechanism Using Directed Diffusion in Wireless Sensor Networks (무선 센서 네트워크에서 Directed Diffusion을 이용한 신뢰성 있는 데이터 전달 기법)

  • Choi Jae-Won;Lee Kwang-Hui
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.8 s.350
    • /
    • pp.77-83
    • /
    • 2006
  • In this paper, we have pesented a reliable data transfer mechanism using Directed Diffusion in WSNs (fireless Sensor Networks). This mechanism involves selecting a route with higher reachability and transferring data along the route chosen, which is based on the end-to-end reliability calculated by the dissemination procedure of Interest packets, while each node of a sensor network maintains the only information on its neighborhood. We performed various experiments changing the link error rates and the number of nodes and discovered that this proposed mechanism improves event-to-sink data transfer reliability in WSNs. We also found that this mechanism spreads traffic load over and reduces energy consumption, which in turn prolongs network lifetime.

Extension of ReInForM Protocol for (m,k)-firm Real-time Streams in Wireless Sensor Networks

  • Li, Bijun;Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.3
    • /
    • pp.231-236
    • /
    • 2012
  • For real-time wireless sensor network applications, it is essential to provide different levels of quality of service (QoS) such as reliability, low latency, and fault-tolerant traffic control. To meet these requirements, an (m,k)-firm based real-time routing protocol has been proposed in our prior work, including a novel local transmission status indicator called local DBP (L_DBP). In this paper, a fault recovery scheme for (m,k)-firm real-time streams is proposed to improve the performance of our prior work, by contributing a delay-aware forwarding candidates selection algorithm for providing restricted redundancy of packets on multipath with bounded delay in case of transmission failure. Each node can utilize the evaluated stream DBP (G_DBP) and L_DBP values as well as the deadline information of packets to dynamically define the forwarding candidate set. Simulation results show that for real-time service, it is possible to achieve both reliability and timeliness in the fault recovery process, which consequently avoids dynamic failure and guarantees meeting the end-to-end QoS requirement.