• Title/Summary/Keyword: Protocol-Based Approach

Search Result 435, Processing Time 0.026 seconds

Intrusion Detection for Black Hole and Gray Hole in MANETs

  • She, Chundong;Yi, Ping;Wang, Junfeng;Yang, Hongshen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1721-1736
    • /
    • 2013
  • Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrate an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decrease the false positive rate.

A Systems Thinking Approach for the Success of IPTV Business (시스템 사고 접근 방식을 통한 IPTV 사업 활성화 방안 탐색)

  • Kim, Min-Ju;Lee, Sun-Gyu;Kim, Hee-Woong
    • Knowledge Management Research
    • /
    • v.16 no.2
    • /
    • pp.173-192
    • /
    • 2015
  • Domestic paid broadcasting market is largely classified into cable TV, satellite broadcasting and IPTV. Latest starter IPTV began its commercial service in 2009 and reached 10 million subscribers in August 2014 after 6 years of service. It has been growing rapidly by increasing more than 500 thousand subscribers every quarter and has taken its place firmly as one of core domestic paid broadcasting platforms, second only to cable TV. Even with this quantitative growth, 3 major IPTV companies are still running deficit, attracting attention to issue of the vitalization of IPTV business based on qualitative growth. This study draws out revitalizing and hindering factors of Korean IPTV industry through a case study on 'A' corporation which is leading domestic IPTV market and exploratory study based on interviews with experts and, by developing influencing factors into Causal Loop Diagram through system dynamics research methodology, draws out core issues in vitalization of domestic IPTV industry and suggests alternatives. Therefore, it is expected that this study will provide more diverse practical implications than preceding studies which drew out one-dimensional issues and alternatives and help vitalize Korean IPTV industry by minimizing negative effects and maximizing positive ones.

An Experimental Evaluation of Active Bandwidth Allocation Model for DiffServ Support in MPLS Networks (MPLS망에서 차등화 서비스 지원을 위한 동적 대역폭 할당 모델의 실험적 평가)

  • Kim Sung-Chan;Chang Kun-Won;Oh Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.807-814
    • /
    • 2004
  • This paper researches and evaluates a bandwidth reallocation mechanism for efficient DiffServ QoS support in MPLS networks by monitoring the network traffic status and reallocating unused bandwidth. While the Differentiated Services in MPLS Networks architecture provides QoS management through the RSVP resource reservation, this mechanism is based on a static provisioning of resource. But this approach can lead to waste bandwidth in some service classes or, leave some service classes' resource starved. This paper presents the bandwidth reallocation dynamically based on network traffic status for bandwidth usage maximization.

A Modified Random Early Detection Algorithm: Fuzzy Logic Based Approach

  • Yaghmaee Mohammad Hossein
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.337-352
    • /
    • 2005
  • In this paper, a fuzzy logic implementation of the random early detection (RED) mechanism [1] is presented. The main objective of the proposed fuzzy controller is to reduce the loss probability of the RED mechanism without any change in channel utilization. Based on previous studies, it is clear that the performance of RED algorithm is extremely related to the traffic load as well as to its parameters setting. Using fuzzy logic capabilities, we try to dynamically tune the loss probability of the RED gateway. To achieve this goal, a two-input-single-output fuzzy controller is used. To achieve a low packet loss probability, the proposed fuzzy controller is responsible to control the $max_{p}$ parameter of the RED gateway. The inputs of the proposed fuzzy controller are 1) the difference between average queue size and a target point, and 2) the difference between the estimated value of incoming data rate and the target link capacity. To evaluate the performance of the proposed fuzzy mechanism, several trials with file transfer protocol (FTP) and burst traffic were performed. In this study, the ns-2 simulator [2] has been used to generate the experimental data. All simulation results indicate that the proposed fuzzy mechanism out performs remarkably both the traditional RED and Adaptive RED (ARED) mechanisms [3]-[5].

A Face Robot Actuated With Artificial Muscle Based on Dielectric Elastomer

  • Kwak Jong Won;Chi Ho June;Jung Kwang Mok;Koo Ja Choon;Jeon Jae Wook;Lee Youngkwan;Nam Jae-do;Ryew Youngsun;Choi Hyouk Ryeol
    • Journal of Mechanical Science and Technology
    • /
    • v.19 no.2
    • /
    • pp.578-588
    • /
    • 2005
  • Face robots capable of expressing their emotional status, can be adopted as an efficient tool for friendly communication between the human and the machine. In this paper, we present a face robot actuated with artificial muscle based on dielectric elastomer. By exploiting the properties of dielectric elastomer, it is possible to actuate the covering skin, eyes as well as provide human-like expressivity without employing complicated mechanisms. The robot is driven by seven actuator modules such eye, eyebrow, eyelid, brow, cheek, jaw and neck module corresponding to movements of facial muscles. Although they are only part of the whole set of facial motions, our approach is sufficient to generate six fundamental facial expressions such as surprise, fear, angry, disgust, sadness, and happiness. In the robot, each module communicates with the others via CAN communication protocol and according to the desired emotional expressions, the facial motions are generated by combining the motions of each actuator module. A prototype of the robot has been developed and several experiments have been conducted to validate its feasibility.

Connection of PDM System and Web-Based CAE Supporting System for Small and Medium Enterprises (중소기업을 위한 제품정보관리 시스템과 웹기반 CAE 지원 시스템의 연동)

  • Bang, Je-Sung;Lee, Jai-Kyung;Han, Seung-Ho;Park, Seong-Whan;Lee, Tae-Hee
    • Korean Journal of Computational Design and Engineering
    • /
    • v.13 no.6
    • /
    • pp.459-468
    • /
    • 2008
  • A web-based Computer-Aided Engineering (CAE) supporting system is connected with a Product Data Management (PDM) system for Small and Medium Enterprises (SMEs) suffering from the lack of building hardware, software and related experts. An analysis of current business models and worksite requirements provides an improved process model and data to be shared between the PDM system and the CAE supporting system. Since all engineering tasks such as geometric modeling, mesh generation, static stress and modal analysis, and fatigue durability analysis are automated in the CAE supporting system, the user in charge of the CAE have only to configure the concerned values of design variables and result data through the web page. The existing Change Management module of the PDM system is modified for seamless data exchange, i.e. sending the Engineering Change Order (ECO) data to the CAE supporting system and receiving the CAE result data bark. The hi-directional data transfers between the PDM system and the CAE supporting system is made possible by adaptors bused on the Simple Object Access Protocol (SOAP). The current approach will be very helpful for SMEs that only have the PDM system and have no adequate infrastructure for CAE.

Study on Development of Subroutine based on TRNSYS for Unglazed Transpired Air Collector System (TRNSYS 기반 무창기공형 공기식 집열 시스템 부프로그램 개발에 관한 연구)

  • Park, J.U.;Lee, E.J.;Chung, M.
    • Journal of the Korean Solar Energy Society
    • /
    • v.23 no.2
    • /
    • pp.81-90
    • /
    • 2003
  • UTAC(unglazed transpired air collector) system has unique advantage for space heating and tempering ventilation air over the conventional collector system such as flat plate and vacuum collector. UTAC can improve radiative and convective loss due to nonglazed component and enhanced plate surface configuration. and heating energy and its equivalent green house emission performance can be improved from the use of this like collector in building application. The Option D Calibration simulation approach of IPMVP(International Performance Measurement and Verification Protocol) in ESCO businesses has been recommended to use of the calibrated computer modules like these Energy-10. DOE2.1E and TRNSYS(transient system simulation). This study is to develop subroutine type-203 of TRNSYS15.2 program and appraise thermal performance of UTAC. With newely addeded subroutine type-203. 1) Thermal performance of unglazed transpired collector could be possible based on dimensionless variables such as efficiency and heat exchanger effectiveness. and 2) Assessement of energy consists of solar useful and insulation saving for UTAC could be possible.

Design of IoT Gateway for Storing Sensor Data using Ardulink based MQTT (Ardulink 기반 MQTT를 이용한 센서 데이터 저장을위한 IoT 게이트웨이 설계)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.744-747
    • /
    • 2017
  • The Internet of things (IoT) needs to be an event-driven approach for efficient real time response and processing. An IoT gateway is sometimes employed to provide the connection and translation between devices and the cloud. Storing data in the local database, and then forwarding it on the cloud is a task to be relegated to a gateway device In this paper, we propose the design of the IoT gateway with Fog computing for storing data from sensors into a local database. In the procedure of designing storing tasks, we propose to use the interfacing software known as Ardulink MQTT bridge. MQTT is a protocol for sensors to publish data to the clients. When it comes to needing historical data, MQTT connector can push MQTT data into SQL database. We write an MQTT client and based on the message topic insert the values into a SQL Database The design of IoT gateway with Fog computing adds value because it provides processing of the data across multiple devices before it sends to the cloud.

  • PDF

Performance Evaluation for a Unicast Vehicular Delay Tolerant Routing Protocol Networks

  • Abdalla, Ahmed Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.167-174
    • /
    • 2022
  • Vehicular Ad hoc Networks are considered as special kind of Mobile Ad Hoc Networks. VANETs are a new emerging recently developed, advanced technology that allows a wide set of applications related to providing more safety on roads, more convenience for passengers, self-driven vehicles, and intelligent transportation systems (ITS). Delay Tolerant Networks (DTN) are networks that allow communication in the event of connection problems, such as delays, intermittent connections, high error rates, and so on. Moreover, these are used in areas that may not have end-to-end connectivity. The expansion from DTN to VANET resulted in Vehicle Delay Tolerant Networks (VDTN). In this approach, a vehicle stores and carries a message in its buffer, and when the opportunity arises, it forwards the message to another node. Carry-store-forward mechanisms, packets in VDTNs can be delivered to the destination without clear connection between the transmitter and the receiver. The primary goals of routing protocols in VDTNs is to maximize the probability of delivery ratio to the destination node, while minimizing the total end-to-end delay. DTNs are used in a variety of operating environments, including those that are subject to failures and interruptions, and those with high delay, such as vehicle ad hoc networks (VANETs). This paper discusses DTN routing protocols belonging to unicast delay tolerant position based. The comparison was implemented using the NS2 simulator. Simulation of the three DTN routing protocols GeOpps, GeoSpray, and MaxProp is recorded, and the results are presented.

Transition Substitution of Desired Bases in Human Pluripotent Stem Cells with Base Editors: A Step-by-Step Guide

  • Ju-Chan Park;Keun-Tae Kim;Hyeon-Ki Jang;Hyuk-Jin Cha
    • International Journal of Stem Cells
    • /
    • v.16 no.2
    • /
    • pp.234-243
    • /
    • 2023
  • The recent advances in human pluripotent stem cells (hPSCs) enable to precisely edit the desired bases in hPSCs to be used for the establishment of isogenic disease models and autologous ex vivo cell therapy. The knock-in approach based on the homologous directed repair with Cas9 endonuclease, causing DNA double-strand breaks (DSBs), produces not only insertion and deletion (indel) mutations but also deleterious large deletions. On the contrary, due to the lack of Cas9 endonuclease activity, base editors (BEs) such as adenine base editor (ABE) and cytosine base editor (CBE) allow precise base substitution by conjugated deaminase activity, free from DSB formation. Despite the limitation of BEs in transition substitution, precise base editing by BEs with no massive off-targets is suggested to be a prospective alternative in hPSCs for clinical applications. Considering the unique cellular characteristics of hPSCs, a few points should be considered. Herein, we describe an updated and optimized protocol for base editing in hPSCs. We also describe an improved methodology for CBE-based C to T substitutions, which are generally lower than A to G substitutions in hPSCs.