• Title/Summary/Keyword: key point

Search Result 1,857, Processing Time 0.025 seconds

Point In Triangle Testing Based Trilateration Localization Algorithm In Wireless Sensor Networks

  • Zhang, Aiqing;Ye, Xinrong;Hu, Haifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2567-2586
    • /
    • 2012
  • Localization of sensor nodes is a key technology in Wireless Sensor Networks(WSNs). Trilateration is an important position determination strategy. To further improve the localization accuracy, a novel Trilateration based on Point In Triangle testing Localization (TPITL)algorithm is proposed in the paper. Unlike the traditional trilateration localization algorithm which randomly selects three neighbor anchors, the proposed TPITL algorithm selects three special neighbor anchors of the unknown node for trilateration. The three anchors construct the smallest anchor triangle which encloses the unknown node. To choose the optimized anchors, we propose Point In Triangle testing based on Distance(PITD) method, which applies the estimated distances for trilateration to reduce the PIT testing errors. Simulation results show that the PIT testing errors of PITD are much lower than Approximation PIT(APIT) method and the proposed TPITL algorithm significantly improves the localization accuracy.

STUDY ON THE VISUAL COGNITIVE CHARACTERISTICS BY THE FIXATION POINT ANALYSIS USING THE EYE MARK RECORDER

  • Yamanoto, Satoshi;Yamaoka, Toshiki;Matsunobe, Takuo
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2001.05a
    • /
    • pp.20-25
    • /
    • 2001
  • In recent years, the concern about a user center design in increasing, and it's needed to task a user's visual cognitive characteristics for information presentation. Then this study aims to grasp user's cognitive characteristics about the information presentation by analyzing the fixation points. In the experiment, actually subject operated a copy machine. Recorded the fixation point movement of the operation panel by the eye mark recorder. Analysis examined the screen interface of the operation panel from the field of a fixation point trace. The top down type fixation oder by experience or the context became clear as a result. Furthermore, the difference of the fixation order by skill level was also examined. In this study, it was assumed that to grasp the visual cognitive characteristics becomes the key of efficient information.

  • PDF

On the Interference of Ultra Wide Band Systems on Point to Point Links and Fixed Wireless Access Systems

  • Giuliano, Romeo;Guidoni, Gianluca;Mazzenga, Franco
    • Journal of Communications and Networks
    • /
    • v.6 no.2
    • /
    • pp.163-172
    • /
    • 2004
  • Ultra Wide Bandwidth (UWB) spread-spectrum techniques will playa key role in short range wireless connectivity supporting high bit rates availability and low power consumption. UWB can be used in the design of wireless local and personal area networks providing advanced integrated multimedia services to nomadic users within hot-spot areas. Thus the assessment of the possible interference caused by UWB devices on already existing narrowband and wideband systems is fundamental to ensure nonconflicting coexistence and, therefore, to guarantee acceptance of UWB technology worldwide. In this paper, we study the coexistence issues between an indoor UWB-based system (hot-spot) and outdoor point to point (PP) links and Fixed Wireless Access (FWA) systems operating in the 3.5 - 5.0 GHz frequency range. We consider a realistic UWB master/slave system architecture and we show through computer simulation, that in all practical cases UWB system can coexist with PP and FWA without causing any dangerous interference.

Impacts of Reward Accrual Effort on Redemption Behavior in a Multi-Vendor Loyalty Program

  • Kim, Ji Yoon;Lee, Janghyuk;Kim, Sang Yong
    • Asia Marketing Journal
    • /
    • v.18 no.4
    • /
    • pp.77-98
    • /
    • 2017
  • This research explores two key facets of behavior (reward point accrual and redemption) that consist of a loyalty program. It focuses on assessing the impact of accrual effort level on three types of redemption behavior: speed, unit size, and hedonic preference at the individual level by using large scale transaction data from a multi-vendor loyalty program providing flexible environment for point accrual and redemption. Findings from this research demonstrate that customers tend 1) to speed up point redemption, 2) to enlarge the size of redeemed points, and 3) to prefer utilitarian rewards as the level of effort at the accrual stage of reward point increases.

Study on fracture mechanics of granite specimens with different precast notch depths based on DIC method

  • Shuwen Cao;Hao Shu
    • Geomechanics and Engineering
    • /
    • v.33 no.4
    • /
    • pp.393-400
    • /
    • 2023
  • Displacements near crack and stress intensity factor (SIF) are key parameters to solve rock failure issue when using fracture mechanics. In order to study the horizontal displacement and stress intensity factor of the mode I fracture, a series of three-point bending tests of granite specimens with central notch were carried out. The evolution of horizontal displacements of precast notch and crack tip opening displacements (CTOD) were analyzed based on the digital image correlation (DIC) method. Stress intensity factors for three-point bending beams with arbitrary span-to-width ratios(S/W) were calculated by using the WU-Carlsson analytical weight function for edge-crack finite width plate and the analytical solution of un-cracked stress by Filon. The present study provides a high efficient and accurate method for fracture mechanics analysis of the three-point bending granite beams.

Experimental and numerical investigation of the effect of sample shapes on point load index

  • Haeri, Hadi;Sarfarazi, Vahab;Shemirani, Alireza Bagher;Hosseini, Seyed Shahin
    • Geomechanics and Engineering
    • /
    • v.13 no.6
    • /
    • pp.1045-1055
    • /
    • 2017
  • Tensile strength is considered key properties for characterizing rock material in engineering project. It is determined by direct and indirect methods. Point load test is a useful testing method to estimate the tensile strengths of rocks. In this paper, the effects of rock shape on the point load index of gypsum are investigated by PFC2D simulation. For PFC simulating, initially calibration of PFC was performed with respect to the Brazilian experimental data to ensure the conformity of the simulated numerical models response. In second step, nineteen models with different shape were prepared and tested under point load test. According to the obtained results, as the size of the models increases, the point load strength index increases. It is also found that the shape of particles has no major effect on its tensile strength. Our findings show that the dominant failure pattern for numerical models is breaking the model into two pieces. Also a criterion was rendered numerically for determination of tensile strength of gypsum. The proposed criteria were cross checked with the results of experimental point load test.

Process of the Encryption key using a Physical Information in the U-Healthcare Service (원격의료서비스에서 생체정보를 이용한 암호화키 생성방법 연구)

  • Song, Chung-Geon;Lee, Keun-Ho;Ryu, Gab-Sang
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.573-578
    • /
    • 2014
  • Recently as we enter into the world of an aging society, the U-Healthcare service is newly spotlighted. In order to secure this U-Healthcare, a development of security solution that is suitable for the U-Healthcare environment is required. But the U-Healthcare environment is difficult to apply the existing security solution with the lack of standards, a security solution with high completeness was not developed. At this point, in order to structure the safe U-Healthcare environment, a generating method of an encryption key using the body information that helps the effective key management and ensuring the confidentiality of the data is proposed.

APSI : A user Authentication Protocol using Smart phone in Immobilizer System (이모빌라이저 시스템에서 스마트폰을 이용한 인증 프로토콜)

  • Shin, Miyea;Jeong, Yoonsu;Bae, Woosik;Lee, Sangho
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.1
    • /
    • pp.41-45
    • /
    • 2014
  • Only if the secret key stored in the engine ECU matches car key stored in the car, immobilizer system is a car anti-theft system that automobile engine takes. To take an action as soon in case of losing car key or being stolen, the ASPI protocol is proposed for assigning a new password after finishing user authentication by the smart phone etc. The shortcoming point of that directly bring the car to a service center in case of losing key can be complemented by the proposed protocol. In case of the car and key both are theft together, the car can be stopped soon.

  • PDF

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

Enhanced Simulated Annealing-based Global MPPT for Different PV Systems in Mismatched Conditions

  • Wang, Feng;Zhu, Tianhua;Zhuo, Fang;Yi, Hao;Fan, Yusen
    • Journal of Power Electronics
    • /
    • v.17 no.5
    • /
    • pp.1327-1337
    • /
    • 2017
  • Photovoltaic (PV) systems are influenced by disproportionate impacts on energy production caused by frequent mismatch cases. The occurrence of multiple maximum power points (MPPs) adds complexity to the tracking process in various PV systems. However, current maximum-power point tracking (MPPT) techniques exhibit limited performance. This paper introduces an enhanced simulated annealing (ESA)-based GMPPT technique against multiple MPP issues in P-V curve with different PV system structures. The proposed technique not only distinguishes global and local MPPs but also performs rapid convergence speed and high tracking accuracy of irradiance changing and restart capability detection. Moreover, the proposed global maximum power tracking algorithm can be applied in the central converter of DMPPT and hybrid PV system to meet various application scenarios. Its effectiveness is verified by simulation and test results.