• Title/Summary/Keyword: message rate

Search Result 326, Processing Time 0.029 seconds

Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare (유헬스케어의 무선환경에 적합한 WiMAX 보안 측정 및 분석)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.279-284
    • /
    • 2013
  • Wireless access network section needs strong security which supports high data rate and mobility not to invade patient's privacy by exposing patient's sensitive biometric from automatic implantable device that is adapted to u-healthcare service. This paper builds test bed and performs assessment and measurement of security ability of WiMAX network to transmit and receive mobile patient's biometric by building WiMAX network in wireless access network not to expose paitne's biometirc at wireless access network section to the third person. Specially, this paper compares and assesses data security, MAC control message security, handover conection delay, and frame loss and bandwidth of ECDH at the layer of WiMAX security compliance, WiMAX MAC IPSec, and MAC.

Intrabed Networks in a Patient Monitoring System (환자 모니터링 시스템에서의 통신 방식(I) : 인트라베드 통신망)

  • 우응제;박승훈;김경수;최근호;김승태;이희철;서재준;김형진
    • Journal of Biomedical Engineering Research
    • /
    • v.18 no.4
    • /
    • pp.373-380
    • /
    • 1997
  • In this paper, we describe the intrabed network in a patient monitoring system we developed The intrabed network handles data communication between the main unit of a bedside patient monitor and parameter modules plugged in it. We designed the intrabed network based on RS-485 and HDLC protocol with 1 Mbps data rate. Message exchanges are implemented based on three data structures of packet frame. and stream. We present the specification and the performance of the data communication network for the developed patient monitor.

  • PDF

Development of an Extended EDS Algorithm for CAN-based Real-Time System (CAN기반 실시간 시스템을 위한 확장된 EDS 알고리즘 개발)

  • Lee, Byong-Hoon;Kim, Dae-Won;Kim, Hong-Ryeol
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2369-2373
    • /
    • 2001
  • Usually the static scheduling algorithms such as DMS (Deadline Monotonic Scheduling) or RMS(Rate Monotonic Scheduling) are used for CAN scheduling due to its ease with implementation. However, due to their inherently low utilization of network media, some dynamic scheduling approaches have been studied to enhance the utilization. In case of dynamic scheduling algorithms, two considerations are needed. The one is a priority inversion due to rough deadline encoding into stricted arbitration fields of CAN. The other is an arbitration delay due to the non-preemptive feature of CAN. In this paper, an extended algorithm is proposed from an existing EDS(Earliest Deadline Scheduling) approach of CAN scheduling algorithm haying a solution to the priority inversion. In the proposed algorithm, the available bandwidth of network media can be checked dynamically by all nodes. Through the algorithm, arbitration delay causing the miss of their deadline can be avoided in advance. Also non real-time messages can be processed with their bandwidth allocation. The proposed algorithm can achieve full network utilization and enhance aperiodic responsiveness, still guaranteeing the transmission of periodic messages.

  • PDF

Analysis of Message Receiving Rate for LEO-Satellite AIS (저궤도 위성 AIS의 메시지 수신확률 분석)

  • Kim, Byung-Ok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.237-240
    • /
    • 2010
  • AIS(Automatic Identification System)는 선박과 육상 및 선박 상호간에 선박의 항행관련 정보를 상호 교환함으로써 안전항해를 제고하기 위하여 도입된 무선설비로서 그 활용도가 매우 높아지고 있으며 AIS 탑재 선박도 증가하고 있다. 그러나 AIS에서 사용하고 있는 초단파의 전파 특성으로 인하여 비교적 근거리 통신만 가능하고 장거리 선박추적 관리를 위한 용도로 활용하는 데는 어려움이 있었다. 이러한 통신권의 한계를 극복하기 위한 방안으로 저궤도 위성을 사용하는 위성 AIS의 도입에 대한 연구가 주요 선진국을 중심으로 추진되고 있으며, 성능을 제고하기 위한 기술 기준 연구도 진행되고 있다. 본 연구에서는 저궤도 위성을 사용한 AIS의 문제점인 메시지 수신확률을 분석하기 위하여 현재 사용 중인 지상파 AIS의 특성 및 저궤도 위성 AIS의 문제점을 분석하고 메시지 수신확률에 대한 시뮬레이션을 수행하여 그 결과를 분석하였다. 분석결과 위성 AIS는 지상파 AIS에 비하여 통신권이 크게 확대되는 반면 채널 용량의 한계 및 채널간 간섭으로 인하여 AIS 메시지 충돌이 심하게 발생하고 메시지 수신 확률이 매우 낮음을 알 수 있었다. 따라서 현재의 지상파 AIS 표준을 적용한 위성 AIS의 실시간 정보 교환은 사실상 불가능하며 위성 AIS의 메시지 수신 확률을 제고하기 위해서는 위성 AIS를 위한 별도의 표준을 제정할 필요가 있음을 알 수 있다.

  • PDF

JXTA based P2P Framework using Mobile Agents (모바일 에이전트를 이용한 JXTA 기반의 P2P 프레임워크)

  • Min, Su-Hong;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.384-387
    • /
    • 2003
  • In this paper, we have designed the integrated wire and wireless P2P framework using mobile agents to share efficiently resources as media file. Most of the P2P applications are used on the wire network. We propose the integrated wire and wireless P2P framework. Proposed P2P platform is based on JXTA of Sun Microsystems. But JXTA is pure peer-to-peer network model, so it sends message other peers as broadcast style to request resources. In this way, there are some problems as massage overload, bandwidth loss, etc. In order to solve this problem, we propose a hybrid peer-to-peer network model using mobile agent. Proposed scheme also solve existing hybrid pEp model's flaws which have the delay and low rate due to concentrated server. In proposed scheme, mobile agents that have autonomy and mobility are used to search the location of resources. Besides, mobile agents could solve the loss problem of the search result. To improve P2P QoS(Quality of Service), we could monitor peer's state information using PIP(Peer Information Protocol) of JXTA.

  • PDF

A Virtual Address Mapping Method for Interconnection between Terrestrial Communication Network and Underwater Acoustic Communication Network (지상 통신 네트워크와 수중음파 통신 네트워크의 상호연결을 위한 가상 주소 매핑 방법)

  • Kim, Changhwa
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.4
    • /
    • pp.27-45
    • /
    • 2018
  • The terrestrial communication network and the underwater acoustic communication network have very different communication characteristics each other in operational environments, communication media, propagation delay, frequency bandwidth, transmission speed, bit error rate, and so on. These different characteristics cause some different address schemes and different maximum transmission units and, as a result, these differences must form certainly obstacles to the intercommunication between a terrestrial communication network and an underwater acoustic communication network. In this paper, we presents a method to use the virtual addresses to resolve the interconnection problem caused by different address schemes between a terrestrial communication network and an underwater acoustic communication network, and, through a mathematical modeling, we analyze the performance on the message transceiving delay time in the underwater environment.

Effects of LED on Emotion-Like Feedback of a Single-Eyed Spherical Robot

  • Onchi, Eiji;Cornet, Natanya;Lee, SeungHee
    • Science of Emotion and Sensibility
    • /
    • v.24 no.3
    • /
    • pp.115-124
    • /
    • 2021
  • Non-verbal communication is important in human interaction. It provides a layer of information that complements the message being transmitted. This type of information is not limited to human speakers. In human-robot communication, increasing the animacy of the robotic agent-by using non-verbal cues-can aid the expression of abstract concepts such as emotions. Considering the physical limitations of artificial agents, robots can use light and movement to express equivalent emotional feedback. This study analyzes the effects of LED and motion animation of a spherical robot on the emotion being expressed by the robot. A within-subjects experiment was conducted at the University of Tsukuba where participants were asked to rate 28 video samples of a robot interacting with a person. The robot displayed different motions with and without light animations. The results indicated that adding LED animations changes the emotional impression of the robot for valence, arousal, and dominance dimensions. Furthermore, people associated various situations according to the robot's behavior. These stimuli can be used to modulate the intensity of the emotion being expressed and enhance the interaction experience. This paper facilitates the possibility of designing more affective robots in the future, using simple feedback.

A Watermarking Method Based on the Trellis Code with Multi-layer (다층구조를 갖는 trellis부호를 이용한 워터마킹)

  • Lee, Jeong Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.949-952
    • /
    • 2009
  • In this paper, a watermarking method based on the trellis code with multi-layer is proposed. An image is divided $8{\times}8$ block with no overlapping, and compute the discrete cosine transform(DCT) of each block, and the 12 medium-frequency AC terms from each block are extracted. Next it is compared with gaussian random vectors with zero mean and unit variance. As these processing, the embedding vectors with minimum linear correlation can be obtained by Viterbi algorithm at each layer of trellis coding. To evaluate the performance of proposed method, the average bit error rate of watermark message is calculated from different several images.

  • PDF

Random Early Beacon Broadcast (REB2) for Cooperative Vehicle Safety Applications (차량안전 응용을 위한 임의 조기 비컨방송)

  • Jeong, Han-You;Nguyen, Hoa-Hung
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.1017-1021
    • /
    • 2020
  • In the V2X communications, each vehicle periodically broadcasts a message, called a beacon, so that its neighbor vehicles can accurately predict the near-future positions of the sending vehicle. In particular, the mobility-adaptive beacon broadcast (MAB2) scheme keeps the tracking error of a sending vehicle below a fixed threshold within a few consecutive beacon losses. In this paper, we present a random-early beacon broadcast (REB2) scheme that addresses the beacon aging problem of the MAB2 scheme. The simulation results show that, for a neighbor vehicle within 100 m distance, the tracking failure probability of REB2 scheme can be reduced to less than 1/10 of that of MAB2 scheme.

Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server

  • Sinha, Keshav;Paul, Partha;Amritanjali, Amritanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4508-4530
    • /
    • 2021
  • Today distributed data storage service are being widely used. However lack of proper means of security makes the user data vulnerable. In this work, we propose a Randomized Block Size (RBS) model for secure data storage in distributed environments. The model work with multifold block sizes encrypted with the Chinese Remainder Theorem-based RSA (C-RSA) technique for end-to-end security of multimedia data. The proposed RBS model has a key generation phase (KGP) for constructing asymmetric keys, and a rand generation phase (RGP) for applying optimal asymmetric encryption padding (OAEP) to the original message. The experimental results obtained with text and image files show that the post encryption file size is not much affected, and data is efficiently encrypted while storing at the distributed storage server (DSS). The parameters such as ciphertext size, encryption time, and throughput have been considered for performance evaluation, whereas statistical analysis like similarity measurement, correlation coefficient, histogram, and entropy analysis uses to check image pixels deviation. The number of pixels change rate (NPCR) and unified averaged changed intensity (UACI) were used to check the strength of the proposed encryption technique. The proposed model is robust with high resilience against eavesdropping, insider attack, and chosen-plaintext attack.