• Title/Summary/Keyword: message rate

Search Result 326, Processing Time 0.025 seconds

Opportunistic Broadcast Protocol for Frequent Topology Changes in Vehicular Ad-hoc Networks (차량 애드혹 네트워크의 빈번한 토폴로지 변경에 적합한 기회적 브로드캐스트 프로토콜)

  • Cha, Si-Ho;Ryu, Minwoo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.2
    • /
    • pp.1-8
    • /
    • 2022
  • The message propagation between vehicles must be efficiently performed to quickly transmit information between vehicles in vehicle ad hoc networks (VANETs). Broadcasting can be the most effective solution for propagating these messages. However, broadcasting can cause broadcast storm problems, which can reduce the performance of the overall network. Therefore, rapid information delivery in VANET requires a method that can propagate messages quickly without causing the broadcast storm problems. This paper proposes a lightweight and opportunistic broadcast (LOB) protocol that leverages the features of opportunistic routing to propagate messages quickly while minimizing the load on the network in VANETs where the network topology changes frequently. LOB does not require any routing information like greedy forwarding scheme, and neighboring nodes at the farthest distance within the range of transmission nodes are likely to be selected as forwarding nodes, and multiple forwarding candidate nodes like opportunistic routing scheme can increase packet transmission rates. Simulation results using ns-2 showed that LOB outperformed existing broadcast protocols in terms of packet rate and packet delay.

Design of Multipath Adaptive BISMO-Algorithm in the Underwater Communication (수중 통신시 다중경로 적응 BISMO (Bi-Switch Modulation)알고리즘 설계)

  • Im, Byung-Ook;Shim, Tae-Bo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.27 no.7
    • /
    • pp.342-349
    • /
    • 2008
  • Multipath makes clear message transfer difficult in the underwater communication. To solve this problem, we propose a new method producing proper MFSP (Modulation Frequency Shift Period) which could be obtained by calculating time delay caused by different path from a transmitter to a receiver. At the transmitter end, messages were divided according to the size of the MFSP and transmitted accordingly alternating Frequency. At the receiver end, the received messages were demodulated in order to recover the original message by the adaptive BISMO algorithm which is constructed at the algorithm design stage. Adaptive MFSP and estimated BER (Bit Error Rate) were calculated through simulation test.

A Comparative Study on the Performance of SVM and an Artificial Neural Network in Intrusion Detection (SVM과 인공 신경망을 이용한 침입탐지 효과 비교 연구)

  • Jo, Seongrae;Sung, Haengnam;Ahn, Byung-Hyuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.2
    • /
    • pp.703-711
    • /
    • 2016
  • IDS (Intrusion Detection System) is used to detect network attacks through network data analysis. The system requires a high accuracy and detection rate, and low false alarm rate. In addition, the system uses a range of techniques, such as expert system, data mining, and state transition analysis to analyze the network data. The purpose of this study was to compare the performance of two data mining methods for detecting network attacks. They are Support Vector Machine (SVM) and a neural network called Forward Additive Neural Network (FANN). The well-known KDD Cup 99 training and test data set were used to compare the performance of the two algorithms. The accuracy, detection rate, and false alarm rate were calculated. The FANN showed a slightly higher false alarm rate than the SVM, but showed a much higher accuracy and detection rate than the SVM. Considering that treating a real attack as a normal message is much riskier than treating a normal message as an attack, it is concluded that the FANN is more effective in intrusion detection than the SVM.

A study on the receiving rate of the data of the hybrid communication system using data transfer methods for controller system of navigational aids (데이터 전송방식에 따른 항로표지 관리용 하이브리드 통신 시스템의 수신율 분석에 관한 연구)

  • Jeon, Joong Sung
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.1
    • /
    • pp.78-85
    • /
    • 2014
  • The Mu-communication board supported by hybrid communication is designed with Cortex M3, which is a low power energy consumption 32-bit microcontroller. The Cortex M3 microcontroller has UART(Universal asynchronous receiver/transmitter) ports which can set appropriately using the command line interpreter (CLI) program with each port. URAT ports are used for hybrid communication modems, GPS modules, etc. When the socket type was compared with the short message service type, the socket type was proven to be better. By improving the receiving performance in the control and management system of the AtoN, data loss was minimized. During the testing of the socket and SMS, data was collected from each buoy for 12 hours every 1 minute and the receiving rate of the data was found to be more than 98.58 % and 99.42 % respectively.

Experimental Verification of the Versatility of SPAM-based Image Steganalysis (SPAM 기반 영상 스테그아날리시스의 범용성에 대한 실험적 검증)

  • Kim, Jaeyoung;Park, Hanhoon;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.23 no.4
    • /
    • pp.526-535
    • /
    • 2018
  • Many steganography algorithms have been studied, and steganalysis for detecting stego images which steganography is applied to has also been studied in parallel. Especially, in the case of the image steganalysis, the features such as ALE, SPAM, and SRMQ are extracted from the statistical characteristics of the image, and stego images are classified by learning the classifier using various machine learning algorithms. However, these studies did not consider the effect of image size, aspect ratio, or message-embedding rate, and thus the features might not function normally for images with conditions different from those used in the their studies. In this paper, we analyze the classification rate of the SPAM-based image stegnalysis against variety image sizes aspect ratios and message-embedding rates and verify its versatility.

A Mechanism for Handling Selfish Nodes using Credit in Sensor Networks (센서 네트워크에서 크레딧을 이용한 이기적인 노드 처리 방안)

  • Choe, Jong-Won;Yoo, Dong-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.120-129
    • /
    • 2008
  • The purpose of sensor network is gathering the information from sensor nodes. If there are selfish node that deliberately avoid packet forwarding to save their own energy, the sensor network has trouble to collect information smoothly. To solve this problem we suggest a mechanism which uses credit payment schema according to the amount of forwarding packets. Sensor nodes use credits to send their own message and they forward packets of other sensor nodes to get credits. To offer authenticity we combined the roles of sink node and server, also we used piggybacking not to send additional report message. The packet trace route is almost fixed because sensor node doesn't have mobility. In this case, it happens that some sensor nodes which don't receive forwarding packets therefore they can't get credit. So, we suggested the way to give more credits to these sensor nodes. Finally, we simulated the suggested mechanism to evaluate performance with ns2(network simulator). As a result, packet transmission rate was kept on a high rate and the number of arrival packets to sink node was increased. Also, we could verify that more sensor nodes live longer due to deceasing the energy consumption of sensor nodes.

Packet Data Performance Measurement in D-TRS Wireless Network Environment (D-TRS 무선망 환경에서의 패킷 데이터 성능 측정)

  • Song, Byung-Kwen;Jin, Myung-Suk
    • Journal of the Korean Society for Railway
    • /
    • v.12 no.6
    • /
    • pp.902-908
    • /
    • 2009
  • TETRA is the standard of Digital Trunked Radio System developed by the ETSI (European Telecommunications Standards Institute). It is currently adopted as Electric Power IT Wireless Backbone Network in Korea, and a national enterprise is going on for versatile utilization of TETRA. To use TETRA wireless network, TETRA modem is very necessary such that performance measurements are very crucial for each TETRA modem by various manufacturers. In this paper, PED (Protocol Evaluation Data) is suggested for PD performance measurement in D-TRS wireless network environment. The performance measurements for different data lengths and transmission intervals are done using TG (Traffic Generator) on Test Bed. The data size is increased by 10 bytes from 10-byte to 400-byte, and it is measured 1,000 times for each transmission interval of 0.5, 1.0, and 1.5 seconds. Based on the transmission time measured, average transmission speed and MER (Message Error Rate) are derived for TETRA Modem performance measurement. Two TMR880i's of EADS are used for TETRA modem, and SwMI (Switching and Management Infrastructure) of EADS is used for switching system in this paper.

Workflow-based Usability Evaluation of Mobile Phone Messaging Functions (작업흐름도 기반 휴대전화 메시지 기능 사용성 평가)

  • Choi, Jae-Hyun;Kong, Yong-Ku;Jung, Myung-Chul
    • Journal of the Ergonomics Society of Korea
    • /
    • v.26 no.4
    • /
    • pp.65-73
    • /
    • 2007
  • This study evaluated the short message service (SMS) and multimedia message service (MMS) usability of mobile phones and wireless internet services by performance failure rates and flowcharts that adopted the concept of state diagrams. Forty-eight participants who had an experience of using mobile phones were recruited by posting an advertisement on websites for the experiment. They carried out both SMS and MMS tasks with the mobile phones of LG Cyon and Samsung Anycall as well as the wireless internet services of LGT ez-i, KTF magicN, and SKT NATE. In general, Cyon had the lower performance failure rate than Anycall for SMS, and ez-i had the lowest performance failure rate than the other services for MMS. More specifically through the workflow analysis, most participants used hot keys to take 7-8 steps to send a SMS including a symbol and had a difficulty in typing the symbol. They also took 10-11 steps to send a MMS after taking and attaching two pictures. Anycall, magicN, and NATE had significantly large error and failure rates due to the limited option of the menu paths that users could take and poor compatibilities of menu names and between menu and navigation keys. This study showed the possibility of use of flowcharts for systematic and specific usability evaluation methods and found the causes of performance errors and failures with mobile phones and wireless internet services to provide insight into their design.

Maximizing Secrecy Rate and Performance Analysis of Relay Selection for Cooperative Diversity Networks in Presence of an Eavesdropper (도청자가 존재하는 무선 협력 네트워크의 전달 단말 선택을 통한 보안 전송률 최대 전송기술 및 성능분석)

  • Ju, MinChul;Kwon, Tai-Gil;Cho, Jin-Woong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.4
    • /
    • pp.533-540
    • /
    • 2015
  • We study relay selection in decode-and-forward (DF)-based relay networks consisting of a source, a destination, an eavesdropper, and multiple relays, where each terminal has a single antenna and operates in a half-duplex mode. In these networks, it is desirable to protect the confidential message from the source to the destination against the eavesdropper with the help of a single selected relay. Specifically, we begin by investigating DF-based networks for the scenario instantaneous signal-to-noise ratios (SNRs) related to the eavesdropper are available. For the scenario, we propose relay selection to maximize the secrecy rate of DF-based networks with and without direct-paths, and we derive the exact secrecy outage probabilities in closed-form.

A Sensor Network Security Protocol for Monitoring the State of Bridge (교량감시를 위한 센서 네트워크 보안프로토콜)

  • Lim, Hwa-Jung;Jeon, Jin-Soon;Lee, Heon-Guil
    • Journal of Industrial Technology
    • /
    • v.25 no.B
    • /
    • pp.211-220
    • /
    • 2005
  • The wireless sensor network consists of a number of sensor nodes which have physical constraints. Each sensor node senses surrounding environments and sends the sensed information to Sink. The inherent vulnerability in security of the sensor nodes has promoted the needs for the lightweight security protocol. In this paper, we propose a non-hierarchical sensor network and a security protocol that is suitable for monitoring the man-made objects such as bridges. Furthermore, we present the efficient way of setting the routing path by storing IDs, MAC(message authentication code) and the location information of the nodes, and taking advantage of the two node states, Sleep and Awake. This also will result in the reduced energy consuming rate.

  • PDF