• Title/Summary/Keyword: competitive protocol

Search Result 48, Processing Time 0.027 seconds

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.

Weighted Competitive Update Protocol for DSM Systems (DSM 시스템에서 통신 부하의 가중치를 고려한 경쟁적인 갱신 프로토콜)

  • Im, Seong-Hwa;Baek, Sang-Hyeon;Kim, Jae-Hun;Kim, Seong-Su
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2245-2252
    • /
    • 1999
  • Since DSM provides a user a simple shared memory abstraction, the user does not have to be concerned with data movement between hosts. Each node in DSM systems has processor, memory, and connection to a network. Memory is divided into pages, and a page can have multiple copies in different nodes. To maintain data consistency between nodes, two conventional protocols are used : write-update protocol and invalidate protocol. The performance of these protocols depends on the system parameters and the memory access patterns. for adapting to memory access patterns, competitive update protocol updates those copies of a page that are expected to be used in the near future, while selectively invalidating other copies. We present weighted competitive update protocols that consider different communication bandwidth for each connection a of two nodes. Test result by simulation show that the weighted competitive update protocol improves performance.

  • PDF

A Study on the Model of Competitive Electricity Market Considering Emission Trading (온실가스 배출권 거래제도를 고려한 경쟁적 전력시장 모형 연구)

  • Kim, Sang-Hoon;Lee, Kwang-Ho;Kim, Wook
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.8
    • /
    • pp.1496-1503
    • /
    • 2009
  • The United Nations Framework Convention on Climate Change (UNFCCC) is an international environmental treaty to stabilize greenhouse gas concentrations in the atmosphere. In order to fulfil the commitments of the countries in an economically efficient way, the UNFCCC adapted the emission trading scheme in the Kyoto Protocol. If the UNFCCC's scheme is enforced in the country, considerable changes in electric power industry are expected due to the imposed greenhouse gas emission reduction. This paper proposes a game theoretic model of the case when generation companies participate in both competitive electricity market and emission market simultaneously. The model is designed such that generation companies select strategically between power quantity and greenhouse gas reduction to maximize their profits in both markets. Demand function and Environmental Welfare of emission trading market is proposed in this model. From the simulation results using the proposed model the impact of the emission trading on generation companies seems very severe in case that the emission prices are significantly high.

Protocol Testing Methodology of DAVIC Standard (DAVIC 표준의 프로토콜 시험 방안 연구)

  • O, Haeng-Seok;Park, Gi-Sik;Lee, Sang-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.203-215
    • /
    • 1999
  • Recently with the rapid development of data communication products and service industry, the system on behalf of users for multimedia services such as VoD(Video on Demand), Teleshopping are at the height of development, However, if the new style products and services do not conform to the international standard, the products will come to lose the competitive power in the market. Therefore, it is essential to have conformance testing considered the properties of related protocol for the interoperability of the products and services. As a systematic and efficient conformance testing method of new products in respect of the main protocol of DAVIC(Digital Audio Visual Council) standard, this paper presents the protocol test methodology and architecture ; a single protocol stack an the related protocol stacks testing.

  • PDF

A Tree-Based Approach for the Internet Connectivity of Mobile Ad Hoc Networks

  • Oh, Ro-An
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.261-270
    • /
    • 2009
  • We propose a tree-based integration of infrastructure networks and MANETs (TUM) to efficiently extend the scope of mobile Internet protocol to mobile ad hoc networks and devise a tree-based routing protocol (TBRP) that is suitable for the TUM architecture. Infrastructure networks have a number of fixed Internet Gateways that connect two heterogeneous networks. Mobile nodes form a number of small trees named pMANETs, each of them growing from anchor node which can communicate directly with an Internet Gateway. A new node registers with foreign agent and home agent along the tree path without resorting to an inefficient flooding. Furthermore, the TBRP sets up a routing path efficiently by exploiting the tree information without relying on flooding. We show by resorting to simulation that our approach is competitive against the conventional AODV based approach.

Ankuk Fire & Marine Insurance's Use of Electronic Data Interchange on Cargo Insurance Processing (안국화재해상보험의 적하보험 EDI 활용)

  • Gang, Yeong-Mu
    • Asia pacific journal of information systems
    • /
    • v.1 no.1
    • /
    • pp.147-163
    • /
    • 1991
  • The insurance industry is highly competitive since it is difficult to differentiate one company's service from another. This paper examines how Ankuk Fire & Marine Insurance has differentiated its service and improved its competitive edge against others by using electronic data interchange (EDI). In order to improve its service level, Ankuk Fire Insurance has significantly reduced paper work by transmitting information electronically to its customers. This was possible with standardized product codes and databases which were installed both on the Ankuk and customer premises. Ankuk Fire Insurance transmits its customer's insurance information to the customer's database instead of hand-carrying or mailing it. The main benefits of this has been: (1) fewer errors as data does not need to be re-entered, (2) faster customer service with electronic data delivery, and (3) better quality customer service due to highly structured relationships with customers. EDI will soon be available to all insurance companies due to the goverment's aggressive promotion of a KTNet plan. Ankuk Insurance, therefore, needs to adopt the standardized protocol recommended by KTNet and develop new products which will give them a competitive edge and minimize the possibilities of losing their clients to other insurance firms.

  • PDF

Development of Patients Environmental Sustainability Performance in Healthcare Sector: A Conceptual Framework and Further Research Directions

  • KIM, Eunsung
    • Journal of Distribution Science
    • /
    • v.17 no.7
    • /
    • pp.99-109
    • /
    • 2019
  • Purpose - The purpose of this development the business model of the healthcare sector in order to promote patents satisfaction towards medical sector services improvement for the medical business model innovation to possess a competitive advantage in the medical and pharmaceutical industry. Research design, data, and methodology - Safety standard protocol from existing multidisciplinary literature is a process of theorization, which uses grounded theory methodology rather than a description of the data and the targeted phenomenon by using Jabareen (2009). The first task is to map the spectrum of food safety literature regarding the phenomenon in safety management. This process includes developing the implementation factors and other sources such as existing business models and practices into the protocol design. Results - The study suggests the conceptual framework to improve the safety management for patients' environmental sustainability performance. Conclusion - The business model may support the beneficial aspect to healthcare government's policymakers, hospital employees, and medical specialist who can apply the practical perspective of its value regarding an educational protocol. Originality/value - This study contributes to and extends our understanding of environmental sustainability performance, identifying the rationale for safety standards performance in the healthcare industry with suggested hybrid safety standards market consumer interconnector.

A Secure Location-Based Service Reservation Protocol in Pervasive Computing Environment

  • Konidala M. Divyan;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.669-685
    • /
    • 2003
  • Nowadays mobile phones and PDAs are part and parcel of our lives. By carrying a portable mobile device with us all the time we are already living in partial Pervasive Computing Environment (PCE) that is waiting to be exploited very soon. One of the advantages of pervasive computing is that it strongly supports the deployment of Location-Based Service(s) (LBSs). In PCE, there would be many competitive service providers (SPs) trying to sell different or similar LBSs to users. In order to reserve a particular service, it becomes very difficult for a low-computing and resource-poor mobile device to handle many such SPs at a time, and to identify and securely communicate with only genuine ones. Our paper establishes a convincing trust model through which secure job delegation is accomplished. Secure Job delegation and cost effective cryptographic techniques largely help in reducing the burden on the mobile device to securely communicate with trusted SPs. Our protocol also provides users privacy protection, replay protection, entity authentication, and message authentication, integrity, and confidentiality. This paper explains our protocol by suggesting one of the LBSs namely“Secure Automated Taxi Calling Service”.

  • PDF

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

Web Based rSPC System Supporting XML Protocol (XML 프로토콜을 지원하는 웹기반 rSPC 시스템)

  • Oh, Kyoung-Je;Han, Sang-Yong
    • The KIPS Transactions:PartA
    • /
    • v.10A no.1
    • /
    • pp.69-74
    • /
    • 2003
  • Accurate process control in the manufacturing industry is essential to survive in the competitive market. Statistical process control (SPC) system has been widely used to satisfy the ever-increasing quality control requirements. However, most commercial products in the market are not flexible, semi-automatic, and difficult to interface with other tools. In this paper, we propose an advanced rSPC (Real-Time SPC) system which is based on the web and supports XML protocol. We also provide a powerful graphic facility and an efficient file system to handle the data in real time. Even though the idea can be applied to any manufacturing system, our system is optimized to the semi-conductor industry and TFT/LCD industry. The system is implemented in C++ and COM/DCOM, and shows a good result.