• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.034 seconds

Sharing based Admission Control Scheme for Service Differentiation in Optical Burst Switching Networks (광 버스트 스위칭 네트워크에서 서비스 차별화를 제공하는 공유 기반의 허락 제어 방식)

  • Paik, Junghoon
    • Journal of Broadcast Engineering
    • /
    • v.20 no.5
    • /
    • pp.748-755
    • /
    • 2015
  • In this paper, sharing based admission control scheme is suggested for both service differentiation and improvement of wavelength utilization efficiency in burst switching networks. To provide service differentiation and high wavelength utilization efficiency, some of the wavelengths on a output link are shared with all classes and the others are used for the highest class exclusively. Markov based analysis is applied to the suggested scheme for the performance analysis and the numerical results are derived. The results are: The performance of lower traffic is more improved by the more number of shared wavelengths in case that the higher traffic or lower traffic is arrived equally or that the input rate of lower traffic is low. Another result is that the sharing effect of wavelengths is a little bit lowered when lower traffic passes the threshold.

Impact of the human body in wireless propagation of medical implants for tumor detection

  • Morocho-Cayamcela, Manuel Eugenio;Kim, Myung-Sik;Lim, Wansu
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.19-26
    • /
    • 2020
  • This paper analyses the feasibility of using implantable antennas to detect and monitor tumors. We analyze this setting according to the wireless propagation loss and signal fading produced by human bodies and their environment in an indoor scenario. The study is based on the ITU-R propagation recommendations and prediction models for the planning of indoor radio communication systems and radio local area networks in the frequency range of 300 MHz to 100 GHz. We conduct primary estimations on 915 MHz and 2.4 GHz operating frequencies. The path loss presented in most short-range wireless implant devices does not take into account the human body as a channel itself, which causes additional losses to wireless designs. In this paper, we examine the propagation through the human body, including losses taken from bones, muscles, fat, and clothes, which results in a more accurate characterization and estimation of the channel. The results obtained from our simulation indicates a variation of the return loss of the spiral antenna when a tumor is located near the implant. This knowledge can be applied in medical detection, and monitoring of early tumors, by analyzing the electromagnetic field behavior of the implant. The tumor was modeled under CST Microwave Studio, using Wisconsin Diagnosis Breast Cancer Dataset. Features like the radius, texture, perimeter, area, and smoothness of the tumor are included along with their label data to determine whether the external shape has malignant or benign physiognomies. An explanation of the feasibility of the system deployment and technical recommendations to avoid interference is also described.

Sensor Node Control Considering Energy-Efficiency in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율성을 고려한 센서 노드 제어)

  • Park, Hee-Dong
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.271-276
    • /
    • 2014
  • The life-time and performance of a wireless sensor network is closely related to energy-efficiency of sensor nodes. In this paper, to increase energy-efficiency, each sensor node operates in one of three operational modes which are normal, power-saving, and inactive. In normal mode sensor nodes sense and transmit data with normal period, whereas sensor nodes in power-saving mode have three-times longer period. In inactive mode, sensor nodes do not sense and transmit any data, which makes the energy consumption to be minimized. Plus, the proposed algorithm can avoid unnecessary energy consumption by preventing transmitting duplicate sensed data. We implemented and simulated the proposed algorithm using Tiny OS based ZigbeX platfom and NS-2, respectively. Performance evaluation results show that the proposed algorithm can prolong sensor networks' lifespan by efficiently reducing energy consumption and its standard deviation of all sensor nodes.

Cell Selection Method using Multi-Criteria Decision Making in Heterogeneous Networks (이종 망에서 퍼지 다기준 의사 결정을 이용한 셀 선정 방법)

  • Lee, Jong-Chan;Park, Sang-Joon
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.1-8
    • /
    • 2008
  • It is essential to maintain constant QoS despite of cell overload or erroneous wireless link during transmission because QoS of a multimedia service may be severely degraded by small delay or packet loss. This paper deals with a cell selection method for supporting the QoS of multimedia services over heterogeneous networks. The proposed scheme is based on Fuzzy Multi-Criteria Decision Making (FMCDM), in which uncertain parameters such as user system preference, the communication cost and cell load, and the transmission delay are used in the decision process using the aggregation function in fuzzy set theory. In this scheme, errors in the evaluation parameters impose milder changes on the total evaluation value than in binary logics. Simulation is focused on the average delay and packet loss rate, and the simulation results show that our proposed method provides mobile terminals the optimal performance.

  • PDF

The Fourth Industrial Revolution and Its Impact on Occupational Health and Safety, Worker's Compensation and Labor Conditions

  • Min, Jeehee;Kim, Yangwoo;Lee, Sujin;Jang, Tae-Won;Kim, Inah;Song, Jaechul
    • Safety and Health at Work
    • /
    • v.10 no.4
    • /
    • pp.400-408
    • /
    • 2019
  • The "fourth industrial revolution" (FIR) is an age of advanced technology based on information and communication. FIR has a more powerful impact on the economy than in the past. However, the prospects for the labor environment are uncertain. The purpose of this study is to anticipate and prepare for occupational health and safety (OHS) issues. In FIR, nonstandard employment will be common. As a result, it is difficult to receive OHS services and compensation. Excessive trust in new technologies can lead to large-scale or new forms of accidents. Global business networks will cause destruction of workers' biorhythms, some cancers, overwork, and task complexity. The social disconnection because of an independent work will be a risk for worker's mental health. The union bonds will weaken, and it will be difficult to apply standardized OHS regulations to multinational enterprises. To cope with the new OHS issues, we need to establish new concepts of "decent work" and standardize regulations, which apply to enterprises in each country, develop public health as an OHS service, monitor emerging OHS events and networks among independent workers, and nurture experts who are responsible for new OHS issues.

Spectrum Reuse Schemes with Power Control for Device-to-Device Communication in LTE-Advanced Cellular Network

  • Chhorn, Sok;Yoon, Seok-Ho;Seo, Si-O;Kim, Seung-Yeon;Cho, Choong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4819-4834
    • /
    • 2015
  • The spectral efficiency of cellular networks can be improved when proximate users engage in device-to-device (D2D) communications to communicate directly without going through a base station. However, D2D communications that are not properly designed may generate interference with existing cellular networks. In this paper, we study resource allocation and power control to minimize the probability of an outage and maximize the overall network throughput. We investigate three power control-based schemes: the Partial Co-channel based Overlap Resource Power Control (PC.OVER), Fractional Frequency Reuse based Overlap Resource Power Control (FFR.OVER) and Fractional Frequency Reuse based Adaptive Power Control (FFR.APC) and also compare their performance. In PC.OVER, a certain portion of the total bandwidth is dedicated to the D2D. The FFR.OVER and FFR.APC schemes combine the FFR techniques and the power control mechanism. In FFR, the entire frequency band is partitioned into two parts, including a central and edge sub-bands. Macrocell users (mUEs) transmit using uniform power in the inner and outer regions of the cell, and in all three schemes, the D2D receivers (D2DRs) transmit with low power when more than one D2DRs share a resource block (RB) with the macrocells. For PC.OVER and FFR.OVER, the power of the D2DRs is reduced to its minimum, and for the FFR.APC scheme, the transmission power of the D2DRs is iteratively adjusted to satisfy the signal to interference ratio (SIR) threshold. The three schemes exhibit a significant improvement in the overall system capacity as well as in the probability of a user outage when compared to a conventional scheme.

An LV-CAST algorithm for emergency message dissemination in vehicular networks (차량 망에서 긴급 메시지 전파를 위한 LV-CAST 알고리즘)

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.6
    • /
    • pp.1297-1307
    • /
    • 2013
  • Several multi-hop applications developed for vehicular ad hoc networks use broadcast as a means to either discover nearby neighbors or disseminate useful traffic information to othet vehicles located within a certain geographical area. However, the conventional broadcast mechanism may lead to the so-called broadcast storm problem, a scenario in which there is a high level of contention and collision at the link layer due to an excessive number of broadcast packets. To solve broadcast storm problem, we propose an RPB-MACn-based LV-CAST that is a vehicular broadcast algorithm for disseminating safety-related emergency message. The proposed LV-CAST identifies the last node within transmission range by computing the distance extending on 1 hop from the sending node of an emergency message to the next node of receiving node of the emergency message, and the last node only re-broadcasts the emergency message. The performance of LV-CAST is evaluated through simulation and compared with other message dissemination algorithms.

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

A Positioning Scheme Using Sensing Range Control in Wireless Sensor Networks (무선 센서 네트워크 환경에서 센싱 반경 조절을 이용한 위치 측정 기법)

  • Park, Hyuk;Hwang, Dongkyo;Park, Junho;Seong, Dong-Ook;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.2
    • /
    • pp.52-61
    • /
    • 2013
  • In wireless sensor networks, the geographical positioning scheme is one of core technologies for sensor applications such as disaster monitoring and environment monitoring. For this reason, studies on range-free positioning schemes have been actively progressing. The density probability scheme based on central limit theorem and normal distribution was proposed to improve the location accuracy in non-uniform sensor network environments. The density probability scheme measures the final positions of unknown nodes by estimating distance through the sensor node communication. However, it has a problem that all of the neighboring nodes have the same 1-hop distance. In this paper, we propose an efficient sensor positioning scheme that overcomes this problem. The proposed scheme performs the second positioning step through the sensing range control after estimating the 1-hop distance of each node in order to minimize the estimation error. Our experimental results show that our proposed scheme improves the accuracy of sensor positioning by about 9% over the density probability scheme and by about 48% over the DV-HOP scheme.

Intruder Detection System Based on Pyroelectric Infrared Sensor (PIR 센서 기반 침입감지 시스템)

  • Jeong, Yeon-Woo;Vo, Huynh Ngoc Bao;Cho, Seongwon;Cuhng, Sun-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.5
    • /
    • pp.361-367
    • /
    • 2016
  • The intruder detection system using digital PIR sensor has the problem that it can't recognize human correctly. In this paper, we suggest a new intruder detection system based on analog PIR sensor to get around the drawbacks of the digital PIR sensor. The analog type PIR sensor emits the voltage output at various levels whereas the output of the digitial PIR sensor is binary. The signal captured using analog PIR sensor is sampled, and its frequency feature is extracted using FFT or MFCC. The extracted features are used for the input of neural networks. After neural network is trained using various human and pet's intrusion data, it is used for classifying human and pet in the intrusion situation.