• 제목/요약/키워드: national protocols

검색결과 820건 처리시간 0.025초

A Study of Wireless Sensor Network Routing Protocols for Maintenance Access Hatch Condition Surveillance

  • Lee, Hoo-Rock;Chung, Kyung-Yul;Jhang, Kyoung-Son
    • Journal of Information Processing Systems
    • /
    • 제9권2호
    • /
    • pp.237-246
    • /
    • 2013
  • Maintenance Access Hatches are used to ensure urban safety and aesthetics while facilitating the management of power lines, telecommunication lines, and gas pipes. Such facilities necessitate affordable and effective surveillance. In this paper, we propose a FiCHS (Fixed Cluster head centralized Hierarchical Static clustering) routing protocol that is suitable for underground maintenance hatches using WSN (Wireless Sensor Network) technology. FiCHS is compared with three other protocols, LEACH, LEACH-C, and a simplified LEACH, based on an ns-2 simulation. FiCHS was observed to exhibit the highest levels of power and data transfer efficiency.

Interactive Multipath Routing Protocol for Improving the Routing Performance in Wireless Sensor Networks

  • Jung, Kwansoo
    • 디지털산업정보학회논문지
    • /
    • 제11권3호
    • /
    • pp.79-90
    • /
    • 2015
  • Multipath routing technique is recognized as one of the effective approaches to improve the reliability of data forwarding. However, the traditional multipath routing focuses only on how many paths are needed to ensure a desired reliability. For this purpose, the protocols construct additional paths and thus cause significant energy consumption. These problems have motivated the study for the energy-efficient and reliable data forwarding. Thus, this paper proposes an energy-efficient concurrent multipath routing protocol with a small number of paths based on interaction between paths. The interaction between paths helps to reinforce the multipath reliability by making efficient use of resources. The protocol selects several nodes located in the radio overlapped area between a pair of paths as bridge nodes for the path-interaction. In order to operate the bridge node efficiently, when the transmission failure has detected by overhearing at each path, it performs recovery transmission to recover the path failure. Simulation results show that proposed protocol is superior to the existing multipath protocols in terms of energy consumption and delivery reliability.

Clustering Scheme for (m,k)-Firm Streams in Wireless Sensor Networks

  • Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • 제14권2호
    • /
    • pp.84-88
    • /
    • 2016
  • As good example of potential application-specific requirement, (m,k)-firm real-time streams have been recently introduced to deliver multimedia data efficiently in wireless sensor networks. In addition to stream model, communication protocols to meet specific (m,k)-firm real-time streams have been newly developed or extended from existing protocols. However, since the existing schemes for an (m,k)-firm stream have been proposed under typical flat architecture, the scalability problem remains unsolved when the number of real-time flows increases in the networks. To solve this problem, in this paper, we propose a new clustering scheme for an (m,k)-firm stream. The two different clustering algorithms are performed according to either the (m,k)-firm requirement or the deadline. Simulation results are presented to demonstrate the suitability of the proposed scheme under hierarchical architecture by showing that its performance is acceptable irrespective of the increase in the number of flows.

Multiple-Packet Reception MAC Protocol Applying Pulse/Tone Exchange in MIMO Ad-Hoc Networks

  • Yoshida, Yuto;Komuro, Nobuyoshi;Ma, Jing;Sekiya, Hiroo
    • Journal of Multimedia Information System
    • /
    • 제3권4호
    • /
    • pp.141-148
    • /
    • 2016
  • This paper proposes a medium access control (MAC) protocol for multiple-input multiple-output (MIMO) ad-hoc networks. Multiple-packet receptions in MIMO systems have attracted as a key technique to achieve a high transmission rate. In the conventional protocols for multiple-packet receptions, timing offsets among multiple-frame transmissions cause frame collisions induced by hidden nodes, which degrades network performance. In the proposed protocol, transmission synchronization among hidden nodes can be achieved by applying pulse/tone exchanges. By applying the pulse/tone exchanges, multiple-packet receptions among hidden nodes can be achieved, which enhances network throughputs compared with the conventional protocol. Simulation results show effectiveness of the proposed protocol.

제한된 자원의 무선 단말기를 위한 종단간 보안을 제공하는 WTLSW 프로토콜 및 프록시 모델 (A WTLSW Protocol and a Proxy Model to Ensure End-to-End Security for Mobile Devices with Limited Resources)

  • 이헌길
    • 산업기술연구
    • /
    • 제29권B호
    • /
    • pp.33-39
    • /
    • 2009
  • The need for end-to-end security has been increased with the widespread use of mobile devices in wireless internet access applications such as mobile commerce. The WAP1.x has an end-to-end security problem that the message transmitted between the mobile device and the Web server is decrypted inside the gateway within a short time. To overcome this problem, several protocols including WAP2.0 has been proposed. These protocols require that the heavy modules such as TLS or data compression modules should be installed on the mobile device with limited resources. This paper proposes a new WTLSW(WTLS-TLS at Web server) protocol and a new WAP2.0 proxy model in order to ensure end-to-end security between the mobile device and the Web server and to be appropriate for mobile devices with limited resources.

  • PDF

스마트미터에 적용 가능한 양방향 통신방식 설계 및 실험 (Design and test of two-way communications technologies applicable to Smart meter)

  • 이상일
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.941-943
    • /
    • 2013
  • 스마트미터가 전력공급자와의 양방향 통신을 통하여 요금정보와 전기사용 상황을 서로 주고받기 위해서는 표준화된 통신 프로토콜이 필요하게 된다. 이 통신 프로토콜은 사용자의 인증과 보안을 해결하고 사용자측에서 소비되는 전기 사용량을 전기 공급자에게 전달하게 된다. 본 논문에서는 스마트미터의 국제통신 프로토콜이 적용된 양방향 통신 및 제어 기술, 전기 기기의 등록 및 해제를 위한 통신방식을 설계하였다.

  • PDF

임상가를 위한 특집 3 - Conventional loading, 여전히 임상적으로 유용한가? (Conventional loading, is the concept still useful?)

  • 여인성
    • 대한치과의사협회지
    • /
    • 제51권4호
    • /
    • pp.204-209
    • /
    • 2013
  • Implant-supported restorations were connected to commercially pure titanium endosteal implants 3 months in mandible and 6 months in maxilla after the implants were inserted into patient jaws. Modifications of titanium implant surfaces have reduced the waiting time for osseointegration, resulting in the development of the early loading concept, which is defined at present as a restoration in contact with the opposing dentition and placed at least 1 week after implant placement, but no later than 2 months afterward. Nowadays, immediate loading protocols have also been introduced, using the implants that are designed to enhance initial stability. Immediate loading eliminates the edentulous period of a patient. Although dentists widely accept these concepts of early and immediate loading, they agree the conventional loading concept is still necessary, which describes loading protocols later than 2 months after implant insertion. The timing of loading is determined mainly by the factors of a patient. This paper considers for what dental clinicians should be careful in implant-supported restoration procedures, considering the implant late failure.

myEvalSVC: an Integrated Simulation Framework for Evaluation of H.264/SVC Transmission

  • Ke, Chih-Heng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권1호
    • /
    • pp.379-394
    • /
    • 2012
  • The ever-increasing demand for H.264 scalable video coding (H.264/SVC) distribution motivates researchers to devise ways to enhance the quality of video delivered on the Internet. Furthermore, researchers and practitioners in general depend on computer simulators to analyze or evaluate their designed network architecture or proposed protocols. Therefore, a complete toolset, which is called myEvalSVC, for evaluating the delivered quality of H.264/SVC transmissions in a simulated environment is proposed to help the network and video coding research communities. The toolset is based on the H.264 Scalable Video coding streaming Evaluation Framework (SVEF) and extended to connect to the NS2 simulator. With this combination, people who work on video coding can simulate the effects of a more realistic network on video sequences resulting from their coding schemes, while people who work on network technology can evaluate the impact of real video streams on the proposed network architecture or protocols. To demonstrate the usefulness of the proposed new toolset, examples of H.264/SVC transmissions over 802.11 and 802.11e are provided.

Business Process Meta Model

  • Kim, Dong-Soo
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 2001년도 International Conference CALS/EC KOREA
    • /
    • pp.191-207
    • /
    • 2001
  • ■ The 1/sup st/ Driver: Electronic Documents ■ EDI via VAN ■ Limited use of electronic processing ■ The 2/sup nd/ Driver: Internet Infrastructure ■ Web/EDI, HTTP, FTP, MIME ■ Open network ■ The 3/sup rd/ Driver: XML ■ Enables the definition of platform-independent protocols for the exchange of data ■ Business Processes and Documents in XML format ■ XML/EDI ■ XML message exchange: SOAP(omitted)

  • PDF

Comparison of Abbreviated MRI and Full Diagnostic MRI in Distinguishing between Benign and Malignant Lesions Detected by Breast MRI: A Multireader Study

  • Eun Sil Kim;Nariya Cho;Soo-Yeon Kim;Bo Ra Kwon;Ann Yi;Su Min Ha;Su Hyun Lee;Jung Min Chang;Woo Kyung Moon
    • Korean Journal of Radiology
    • /
    • 제22권3호
    • /
    • pp.297-307
    • /
    • 2021
  • Objective: To compare the performance of simulated abbreviated breast MRI (AB-MRI) and full diagnostic (FD)-MRI in distinguishing between benign and malignant lesions detected by MRI and investigate the features of discrepant lesions of the two protocols. Materials and Methods: An AB-MRI set with single first postcontrast images was retrospectively obtained from an FD-MRI cohort of 111 lesions (34 malignant, 77 benign) detected by contralateral breast MRI in 111 women (mean age, 49.8. ± 9.8; range, 28-75 years) with recently diagnosed breast cancer. Five blinded readers independently classified the likelihood of malignancy using Breast Imaging Reporting and Data System assessments. McNemar tests and area under the receiver operating characteristic curve (AUC) analyses were performed. The imaging and pathologic features of the discrepant lesions of the two protocols were analyzed. Results: The sensitivity of AB-MRI for lesion characterization tended to be lower than that of FD-MRI for all readers (58.8-82.4% vs. 79.4-100%), although the findings of only two readers were significantly different (p < 0.05). The specificity of AB-MRI for lesion characterization was higher than that of FD-MRI for 80% of readers (39.0-74.0% vs. 19.5-45.5%, p ≤ 0.001). The AUC of AB-MRI was comparable to that of FD-MRI for all readers (p > 0.05). Fifteen percent (5/34) of the cancers were false-negatives on AB-MRI. More suspicious margins or internal enhancement on the delayed phase images were related to the discrepancies. Conclusion: The overall performance of AB-MRI was similar to that of FD-MRI in distinguishing between benign and malignant lesions. AB-MRI showed lower sensitivity and higher specificity than FD-MRI, as 15% of the cancers were misclassified compared to FD-MRI.