• Title/Summary/Keyword: Path extension

Search Result 154, Processing Time 0.021 seconds

An Energy-Efficient Clustering Protocol Based on The Cross-Layer Design in Wireless Sensor Networks (무선 센서 네트워크에서 크로스 레이어 기반의 에너지 효율적인 클러스터링 프로토콜)

  • Kim, Tae-Kon;Lee, Hyung-Keun
    • Journal of IKEEE
    • /
    • v.11 no.4
    • /
    • pp.165-170
    • /
    • 2007
  • The main goal of research concerning clustering protocols is to minimize the energy consumption of each node and maximize the network lifetime of wireless sensor networks. However, most existing clustering protocols mainly focused on the design and formation of clusters, leaving the consideration of communication between the cluster head and the sink behind. In this paper, we propose efficient multi path routing algorithm by using MAC-NET Cross-layering. multi path needed only one tiny packet from sink to setup. In addition proposed algorithm can be used for any cluster-based hierarchical inter-clustering routing algorithm. The simulation results demonstrate that proposed algorithm extended the overall survival time of the network by reducing the load of cluster heads. The performance of proposed algorithm is less affected by the extension of sensing field than other inter-clustering operation.

  • PDF

Design of a Fast Adder Using Robust QCA Design Guide (강건 QCA 설계 지침을 이용한 고속 가산기 설계)

  • Lee Eun-Choul;Kim Kyo-Sun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.43 no.4 s.346
    • /
    • pp.56-65
    • /
    • 2006
  • The Quantum-dot Cellular Automata (QCA) can be considered as a candidate for the next generation digital logic implementation technology due to their small feature sizes and ultra low power consumption. Up to now, several designs using Uh technology have been proposed. However, we found not all of the designs function properly. Furthermore, no general design guidelines have been proposed so far. A straightforward extension of a simple functional design pattern may fail. This makes designing a large scale circuits using QCA technology an extremely time-consuming process. In this paper, we show several critical vulnerabilities related to unbalanced input paths to QCA gates and sneak noise paths in QCA interconnect structures. In order to make up the vulnerabilities, a disciplinary guideline will be proposed. Also, we present a fast adder which has been designed by the discipline, and verified to be functional by the simulation.

An Energy-Efficient Ad-hoc Routing Protocol Based on DSDV (DSDV 기반의 에너지 효율적 Ad-hoc 라우팅 프로토콜)

  • Seong Jin-Kyu;Lee Won-Joo;Jeon Chang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.9
    • /
    • pp.677-683
    • /
    • 2006
  • If a node stops functioning in an ad-hoc wireless network, routing paths involving the node will also fail, when construction of replacement routes is required. A major cause of node failure is energy exhaustion, and route replacements may in turn lead to successive node failures by making more nodes consume their energy. The result could be performance degradation of networks. Therefore it is important to ensure that nodes with limited remaining energy are not included in route construction from the beginning. In this paper we propose a new routing protocol, which takes residue energy of nodes into account in order to prevent node failures resulting from energy shortage. Our routing protocol examines the smallest value of node residue energy ($E_{m}$) from each of all possible routing paths and selects the path which has the largest value of $E_{m}$. We prove, through simulation, that our routing protocol extends the lifetime of nodes which have limited amount of energy, reducing chances of path replacement. It is also shown that our proposed protocol helps alleviate network performance degradation.

Resilient Routing Protocol Scheme for 6LoWPAN (6LoWPAN에서 회복력 있는 라우팅 프로토콜 기법)

  • Woo, Yeon Kyung;Park, Jong Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.11
    • /
    • pp.141-149
    • /
    • 2013
  • IETF 6LoWPAN standard technique has been studied in IoT environment to support the IPv6 packet communication. 6LoWPAN protocol for transmission of packets mainly in the AODV routing protocol and a variety of extended techniques have been investigated. In particular, consisting of nodes with limited resources in a network error occurs when the 6LoWPAN reliable data transfer and fast routing method is needed. To this end, in this paper, we propose resilient routing protocol and extension of IETF LOAD algorithm, for optimal recovery path, More specifically, the optimal recovery path setup algorithm, signal flow, and detailed protocols for the verification of the reliability of packet transmission mathematical model is presented. The proposed protocol techniques to analyze the performance of the NS-3 performance through the simulation results that is end-to-end delay, throughput, packet delivery fraction and control packet overhead demonstrated excellence in comparison with existing LOAD.

Analysis of Interrelationship between Undrained Static and Cyclic Shear Behavior for Nak-Dong River Sand (낙동강 모래의 비배수 정적 및 반복 전단거동 상호관계 분석)

  • Kim, Dae-Man;Kim, Byung-Tak
    • Journal of the Korean Geotechnical Society
    • /
    • v.22 no.10
    • /
    • pp.151-163
    • /
    • 2006
  • This paper presents the interrelationship between undrained static and cyclic shear behavior. Laboratory works were performed through the undralned static and cyclic triaxial test using Nak-Dong River sand. And static triaxial test involved the triaxial extension test for comparison with cyclic shear behavior Cyclic triaxial test was performed with a variety of combination conditions of initial static shear stress $(q_{st})$ and cyclic stress $(q_{cy})$. In this result, the stress path of cyclic shear behavior was correspondent with static shear behavior passing the critical stress ratio (CSR) line because of the development of flow deformation. After that, a failure occurred according to failure line (FL) of static shear behavior. The stress path of cyclic shear behavior showed essentially the same with static shear behavior, although it appears a little different in test method.

Reliable Extension Scheme using Multiple Paths in Wireless Ad-hoc Networks (무선 애드-혹 네트워크의 다중 경로를 이용한 신뢰적인 확장 기법)

  • Kim, Moon-Jeong;Eom, Young-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.3
    • /
    • pp.218-225
    • /
    • 2007
  • As the research on home network technologies, sensor network technologies, and ubiquitous network technologies makes rapid progresses, wireless ad-hoc network have attracted a lot of attention. A wireless mobile ad-hoc network is a temporary network formed by a collection of wireless mobile nodes without the aid of any existing network infrastructure or centralized administration, and it is suitable for ubiquitous computing environments. In this paper, we suggest an extension scheme of a wireless mobile ad-hoc network based on limited multiple paths source routing protocol. This scheme reduces the overhead of route re-establishment and re-registration by maintaining link/node non-disjoint multiple paths between mobile hosts in a wireless mobile ad-hoc network or a mobile host in a wireless mobile ad-hoc network and a base station supporting fixed network services. By maintaining multiple paths, our scheme provides short end-to-end delay and is reliable extension scheme of a wireless mobile ad-hoc network to a fixed network. In this paper, our simulations show that our scheme outperforms existing schemes with regards to throughput and end-to-end delay. Also we show that our scheme outperforms multi-paths approach using disjoint routes with regards to routing overhead.

Progressive fracture analysis of concrete using finite elements with embedded displacement discontinuity

  • Song, Ha-Won;Shim, Byul;Woo, Seung-Min;Koo, Ja-Choon
    • Structural Engineering and Mechanics
    • /
    • v.11 no.6
    • /
    • pp.591-604
    • /
    • 2001
  • In this paper, a finite element with embedded displacement discontinuity which eliminates the need for remeshing of elements in the discrete crack approach is applied for the progressive fracture analysis of concrete structures. A finite element formulation is implemented with the extension of the principle of virtual work to a continuum which contains internal displacement discontinuity. By introducing a discontinuous displacement shape function into the finite element formulation, the displacement discontinuity is obtained within an element. By applying either a nonlinear or an idealized linear softening curve representing the fracture process zone (FPZ) of concrete as a constitutive equation to the displacement discontinuity, progressive fracture analysis of concrete structures is performed. In this analysis, localized progressive fracture simultaneous with crack closure in concrete structures under mixed mode loading is simulated by adopting the unloading path in the softening curve. Several examples demonstrate the capability of the analytical technique for the progressive fracture analysis of concrete structures.

A Study on Calculation of Protection Ratio for Frequency Coordination in Microwave Relay System Networks (M/W 중계 시스템 망의 주파수 조정을 위한 보호비 계산에 대한 연구)

  • Suh, Kyoung-Whoan;Lee, Joo-Hwan
    • Proceedings of the Korea Electromagnetic Engineering Society Conference
    • /
    • 2005.11a
    • /
    • pp.125-130
    • /
    • 2005
  • This paper suggests an efficient method of protection ratio calculation and shows some calculated results applicable to frequency coordination in microwave relay system networks, and the net filter discrimination (NFD) associated with Tx spectrum mask and overall Rx filter characteristics has been examined to obtain the adjacent channel protection ratio. The protection ratio comprises several factors such as C/N of modulation scheme, noise-to-interference ratio, multiple interference allowance, fade margins of multi-path and rain attenuation, and NFD. According to computed results for 6.7 GHz, 64-QAM, and 60 km at BER $10^{-6}$, fade margin and co-channel protection ratio are 41.1 and 75.2 dB, respectively, In addition, NFD for channel bandwidth of 40 MHz reveals 28.9 dB at the first adjacent channel, which results in adjacent channel protection ratio of 46.3 dB. The proposed method provides some merits of an easy calculation, systematic extension, and applying the same concept to frequency coordination in millimeter wave relay system networks.

  • PDF

On Minimum-Cost Rectilinear Steiner Distance-Preserving Tree (최소 비용 직각선분 Steiner 거리 유지 트리의 최적화)

  • Jo, Jun-Dong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1707-1718
    • /
    • 1996
  • Given a signal net N=s, 1,...,n to be the set of nodes, with s the source and the remaining nodes sinks, an MRDPT (minimum-cost rectilinear Steiner distance -preserving tree) has the property that the length of every source to sink path is equal to the rectilinear distance between the source and sink. The minimum- cost rectilinear Steiner distance-preserving tree minimizes the total wore length while maintaining minimal source to sink length. Recently, some heuristic algorithms have been proposed for the problem offending the MRDPT. In this paper, we investigate an optimal structure on the MRDPT and present a theoretical breakthrough which shows that the min-cost flow formulation leads to an efficient O(n2logm)2) time algorithm. A more practical extension is also in vestigated along with interesting open problems.

  • PDF

A study on a schedule-cost analysis model for defense R&D project planning (국방 R&D프로젝트의 일정-비용분석모델의 연구)

  • 황홍석;류정철;정덕길
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.04a
    • /
    • pp.213-216
    • /
    • 1996
  • R'||'&'||'D project management is a process of decisions concerned with the achievement of goals of objectives. Especially, defense R'||'&'||'D project planning is the key in the successfull management of defense development. The defense project managers are constantly having to perform "what if\ulcorner" exercise, such as what if the project is extended out for an additional cost\ulcorner In this reserch, we developed a schedule-cost analysis model based upon Critical Path Method(CPM) and Venture Evaluation and Review Technique(VERT) for schedule-cost trade off analysis defense R'||'&'||'D projects. In the first step, a deterministic model is developed as a heuristic which deterministic model is developed as a heuristic which determines the schedule extension and reduction cost as a function desired schedule. In the second step, a stochastic network simulation model is developed to analyse the project risk (sucess and failure). The expected time and cost can be determined for desired schedule under the assumptions of stochastic arc data (time and cost) with a various precedence relationships. This model provides the defense R'||'&'||'D managers with an estimated and expected cost for curtailing or extending a project a given amount of time. The effectiveness and efficiency of the proposed methods, a heuristic and stochastic networks simulations, have been demonstrated through examples.

  • PDF