• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.031 seconds

An Adaptive Clustering Algorithm of Wireless Sensor Networks for Energy Efficiency (에너지 효율을 위한 무선센서 네트워크의 적응형 클러스터링 알고리즘)

  • Cho, Young-bok;Lee, Sang-ho;Woo, Sung-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.99-106
    • /
    • 2017
  • In the WSN environment, the sensor node is selected as the cluster header and consumes a lot of energy. Therefore, we proposed a method to automatically select a cluster algorithm using the sensor field environment that can improve the reliability of the whole network by applying an energy efficient clustering algorithm based on already deployed sensor field. Experimental results show that FDN is extended about 3 times by using the proposed algorithm. In addition, the network energy is extended by up to 30% compared to the conventional method, thereby improving the reliability of the sensor network.

Per-transaction Shared Key Scheme to Improve Security on Smart Payment System

  • Ahmad, Fawad;Jung, Younchan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.7-18
    • /
    • 2016
  • Several authentication methods have been developed to make use of tokens in the mobile networks and smart payment systems. Token used in smart payment system is genearated in place of Primary Account Number. The use of token in each payment transaction is advantageous because the token authentication prevents enemy from intercepting credit card number over the network. Existing token authentication methods work together with the cryptogram, which is computed using the shared key that is provisioned by the token service provider. Long lifetime and repeated use of shared key cause potential brawback related to its vulnerability against the brute-force attack. This paper proposes a per-transaction shared key mechanism, where the per-transaction key is agreed between the mobile device and token service provider for each smart payment transaction. From server viewpoint, per-transaction key list is easy to handle because the per-transaction key has short lifetime below a couple of seconds and the server does not need to maintain the state for the mobile device. We analyze the optimum size of the per-transaction shared key which satisfy the requirements for transaction latency and security strength for secure payment transactions.

Design and Simulation of ARM Processor with Floating Point Instructions (부동소수점 명령어를 지원하는 ARM 프로세서의 설계 및 모의실행)

  • Lee, Jongbok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.187-193
    • /
    • 2020
  • Floating point arithmetic in microprocessor is the computation of addition, subtraction, multiplication, and division of floating point data to improve accuracy. In general, when designing a processor, floating point instructions are often excluded because of its complexity and only integer instructions are provided. However, in order to carry out the computations for not only engineering and technical operations but also artificial intelligence and neural networks that are in the spotlight today, floating point operations must be included. In this paper, we design a 32-bit ARMv4 family of processors with floating-point arithmetic instructions using VHDL and verify with ModelSim. As a result, ARM's floating point instructions are successfully executed.

A SPICE-based 3-dimensional circuit model for Light-Emitting Diode (SPICE 기반의 발광 다이오드 3차원 회로 모델)

  • Eom, Hae-Yong;Yu, Soon-Jae;Seo, Jong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.2
    • /
    • pp.7-12
    • /
    • 2007
  • A SPICE-based 3-dimensional circuit model of LED(Light-Emitting Diode) was developed for the design optimization and analysis of high-brightness LEDs. An LED is represented as an array of pixel LEDs with small preassigned areas, and each of the pixel LEDs is composed of circuit networks representing the thin-film layers(n-metal, n- and p-type semiconductor layers, and p-metal), ohmic contacts, and pn-junctions. Each of the thin-film layers and contact resistances is modeled by a resistance network, and the pn-junction is modeled by a conventional pn-junction diode. It has been found that the simulation results using the model and the corresponding parameters precisely fit the measured LED characteristics.

Resource Allocation based on Hybrid Sharing Mode for Heterogeneous Services of Cognitive Radio OFDM Systems

  • Lei, Qun;Chen, Yueyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.149-168
    • /
    • 2015
  • In cognitive radio networks (CRNs), hybrid overlay and underlay sharing transmission mode is an effective technique for improving the efficiency of radio spectrum. Unlike existing works in the literature, where only one secondary user (SU) uses overlay and underlay modes, the different transmission modes should be allocated to different SUs, according to their different quality of services (QoS), to achieve the maximal efficiency of radio spectrum. However, hybrid sharing mode allocation for heterogeneous services is still a challenge in CRNs. In this paper, we propose a new resource allocation method for hybrid sharing transmission mode of overlay and underlay (HySOU), to achieve more potential resources for SUs to access the spectrum without interfering with the primary users. We formulate the HySOU resource allocation as a mixed-integer programming problem to optimize the total system throughput, satisfying heterogeneous QoS. To decrease the algorithm complexity, we divide the problem into two sub-problems: subchannel allocation and power allocation. Cutset is used to achieve the optimal subchannel allocation, and the optimal power allocation is obtained by Lagrangian dual function decomposition and subgradient algorithm. Simulation results show that the proposed algorithm further improves spectrum utilization with a simultaneous fairness guarantee, and the achieved HySOU diversity gain is a satisfactory improvement.

Scientific Technical Development of Traffic Accident Investigation (교통사고 조사의 과학화 기술개발)

  • Hong, YouSik;Lee, ChaeWoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.35-42
    • /
    • 2008
  • In order to reduce a recent traffic accident, the traffic accident research has been studied using IT technique. But, when running away traffic accident it occurs, it is difficult to find the assault vehicle. In this paper, to solve these problems, if traffic accident will happen, The RFID reader will be able to recognize a license plate number automatically. Moreover, when the traffic accident occurs from the Internet base which uses the PDA the driver traffic accident site data and driver human fact it will be able to transmit in the police station or the insurance company. From the simulation result, it confirms that when passage vehicle speed is low speed above 70% it will be able to recognize the license plate number.

  • PDF

Performance analysis on wireless sensor network using LDPC codes over node-to-node interference (노드 간 간섭 시 LDPC부호를 이용한 무선 센서 네트워크의 성능 분석)

  • Choi Sang-Min;Moon Byung-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.1 s.343
    • /
    • pp.19-24
    • /
    • 2006
  • Wireless sensor networks(WSN) technology has various applications such as surveillance and information gathering in the uncontrollable area of human. One of major issues in WSN is the research for reducing the energy consumption and reliability of data. A system with forward error correction(FEC) can provide an objective reliability while using less transmission power than a system without FEC. In this paper, we propose to use LDPC codes of various code rate(0.53, 0.81, 0.91) for FEC for WSN. Also, we considered node-to-node interference in addition to AWGN channel. The proposed system has not only high reliable data transmission at low SNR, but also reduced transmission power usage.

Effective real-time identification using Bayesian statistical methods gaze Network (베이지안 통계적 방안 네트워크를 이용한 효과적인 실시간 시선 식별)

  • Kim, Sung-Hong;Seok, Gyeong-Hyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.3
    • /
    • pp.331-338
    • /
    • 2016
  • In this paper, we propose a GRNN(: Generalized Regression Neural Network) algorithms for new eyes and face recognition identification system to solve the points that need corrective action in accordance with the existing problems of facial movements gaze upon it difficult to identify the user and. Using a Kalman filter structural information elements of a face feature to determine the authenticity of the face was estimated future location using the location information of the current head and the treatment time is relatively fast horizontal and vertical elements of the face using a histogram analysis the detected. And the light obtained by configuring the infrared illuminator pupil effects in real-time detection of the pupil, the pupil tracking was - to extract the text print vector.

Transmission Performance of VoIP Traffics over MANETs under Multi Intrusions (다중침해가 있는 MANET에서 VoIP 트래픽의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.257-262
    • /
    • 2012
  • In this paper, transmission performance for serval VoIP traffics is meaured and analysised over MANET(Mobile Ad-hoc Networks) under some types of intrusions. VoIP simulator based on NS-2 is used for performance measure. In the simulation, MOS, network delay, packet loss rate and call connection rate is measured for transmission performance. With analysis of measued data, characteristics of each traffics for transmission performance parameters is showed on MANET under multi intrusions, As a results of this paper, some recommendation condtion for codec selection and blackhole intrusion is suggested to implement VoIP services on MANET under multi intrusions like as DDoS and blockhole intrusions.

M2M Gateway based on CoAP in SG Environment (SG 환경에서 CoAP 기반 M2M 게이트웨이)

  • Shin, In-Jae;Park, Jee-Won;Lee, Sang-Hoon;Song, Byung-Kwen
    • Proceedings of the KIEE Conference
    • /
    • 2015.07a
    • /
    • pp.47-48
    • /
    • 2015
  • As the power system develops rapidly into a smarter and more flexible state, so must the communication technologies that support it. Machine to machine (M2M) communication in Smart Grid environment has been discussed in European Telecommunications Standards Institute (ETSI). The power system is not easily replaceable, due to system replacement cost. The M2M gateway is required in other to improve interoperability in M2M environment. The Distributed Network Protocol 3.0 (DNP3.0) is the most important standard in the SCADA systems for the power. It has been used for device data collection/control in Substation Systems, Distribution Automation System. If the DNP3.0 data model is combined with a set of contemporary web protocols, it can result in a major shift. We selected Constrained Application Protocol (CoAP) based on RESTful as M2M protocol. It is a specialized web transfer protocol for use with constrained nodes and constrained networks. We have used the OPNET Modeler 17.1 in order to verity the SOAP versus CoAP. In this paper, we propose the CoAP-based M2M Gateway to Distribution Automation system using DNP3.0 in Smart Grid Environment.

  • PDF