• Title/Summary/Keyword: node cooperation

Search Result 163, Processing Time 0.02 seconds

Anonymous Blockchain Voting Model using the Master Node Network (마스터 노드 네트워크를 사용한 블록체인 익명 투표 모델)

  • Cho, Jae-Han;Lee, Lee-Sub;Choi, Chang-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.394-402
    • /
    • 2021
  • Electronic voting systems have been widely used in many countries around the world since the mid-1990s. In recent years, studies have applied blockchain to existing electronic voting systems in order to provide reliability, fairness, and transparency for voters. This approach is highly useful as a technology that promotes decentralized citizen participation. However, the existing electronic voting systems using blockchain have not sufficiently considered anonymity. Lack of anonymity acts as an important constraint in cases of small- and medium-sized voting, which is often required in decentralized citizen participation. In this study, we propose a model that provides anonymity to a voting system using blockchain by applying the concept of the master node in Dash cryptocurrency. First, we define the differences in the requirements of the transfer and voting systems in blockchain. We propose a parallel and autonomous model and algorithm to provide anonymity in the blockchain-that is, a decentralized development environment. In addition, a discussion of security and the environment for the proposed model is described.

Layer Selective Cooperation Using Superposition Coding for Reduction of Expected Distortion (평균 왜곡 감소를 위한 중첩 부호화 기반 레이어 선택적 협력 전송)

  • Wang, Jin-Soo;Park, Jin-Bae;Kim, Yun-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.7B
    • /
    • pp.517-527
    • /
    • 2012
  • This paper considers a cooperative communication system with a single relay node, where two-layer superposition coding and successive decoding is employed to reduce the expected distortion of a Gaussian source delivered. For the system, we propose a relay scheme which forwards an appropriate relay signal at the relay node, based on the local decoding result of layers and the decoding result of layers at the destination node fed back to the relay node. In the scheme, the relay signal is designed not only by applying decode-and-forward but also by applying amplify-and-forward to reduce the outage probability in final decoding of each layer. The performance of the proposed scheme is evaluated numerically in terms of the expected distortion at various relay locations using outage probabilities derived. The results show that the proposed scheme outperforms the conventional schemes in most cases of the relay location and the gain gets larger when the relay node is closer to the source node in particular.

Device-to-Device assisted user clustering for Multiple Access in MIMO WLAN

  • Hongyi, Zhao;Weimin, Wu;li, Lu;Yingzhuang, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2972-2991
    • /
    • 2016
  • WLAN is the best choice in the place where complex network is hard to set up. Intelligent terminals are more and more assembled in some areas now. However, according to IEEE 802.11n/802.11ac, the access-point (AP) can only serve one user at a single frequency channel. The spectrum efficiency urgently needs to be improved. In theory, AP with multi-antenna can serve multiple users if these users do not interfere with each other. In this paper, we propose a user clustering scheme that could achieve multi-user selection through the mutual cooperation among users. We focus on two points, one is to achieve multi-user communication with multiple antennas technique at a single frequency channel, and the other one is to use a way of distributed users' collaboration to determine the multi-user selection for user clustering. Firstly, we use the CSMA/CA protocol to select the first user, and then we set this user as a source node using users' cooperation to search other proper users. With the help of the users' broadcast cooperation, we can search and select other appropriate user (while the number of access users is limited by the number of antennas in AP) to access AP with the first user simultaneously. In the network node searching, we propose a maximum degree energy routing searching algorithm, which uses the shortest time and traverses as many users as possible. We carried out the necessary analysis and simulation to prove the feasibility of the scheme. We hope this work may provide a new idea for the solution of the multiple access problem.

A Study on the memory management techniques using Sensing Data Filtering of Wireless sensor nodes (무선센서노드의 센싱 데이터 필터링을 사용한 메모리 관리 기법에 대한 연구)

  • Kang, Yeon-I;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1633-1639
    • /
    • 2010
  • Recently Wireless sensor networks have been used for many purposes and is active for this study. The various methods to reduce energy consumption, which are actively being studied Wireless sensor network to reduce energy consumption, leading to improve transport efficiency, Cluster can be viewed using the research methods. Cluster method researches consists of a sensor node to the cluster and in among those they take out the Cluster head node and Cluster head node is having collects sensing information of circumferential nodes sensing to sink node transmits. Selected as cluster head sensor nodes so a lot of the energy consumption is used as a cluster head sensor nodes is lose a shorter life span have to be replaced by another sensor node. In this paper, to complement the disadvantages of a cluster-mesh method, proposes to manage memory efficiently about filtering method for sensing data. Filtering method to store the same data sensing unlike traditional methods of data filtering system sensing first sent directly by the hashing algorithm to calculate the hash table to store addresses and Sensing to store data on the calculated address in a manner to avoid duplication occurred later, and sensing data is not duplicated by filtering data to be stored in the hash table is a way.

Immunological Change of the Lymph Node and Lymph Follicles, Stimulated LPS in the Popliteal Lymph Node of the Early Postnatal Mice (Lipopolysaccharide 항원에 노출된 발생초기의 림프절내 B 및 T 림프구의 면역학적 변화)

  • Ahn, Keum-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.775-782
    • /
    • 2011
  • This study was designed to clarify the morphometrical change of lymph node, deep cortex and lymph follicles in draining lymph nodes of young mice in response to local injection of lipopolysaccharide(LPS). 1. In the group stimulated with LPS, aged 0 day and 3 days, the number of lymph follicles were not significantly different from those of control group. 2. In the group two to four weeks after injection with LPS, aged five days and one week, the number of lymph follicles were significantly increased from those of control group. 3. In the group one to four weeks after injection with LPS, aged 0 day, three days, five days and one week, the area of lymph node and deep cortex increased about 1.5-3 times more than that of the control group. 4. In the group two to four weeks after injection with LPS, aged three days, five days and one week, the lymph follicles(the area: larger than 0.1 mm2) were increased from those of control group. 5. In the group two to four weeks after injection with LPS, aged five days and one week, the lymph follicles(the area: smaller than 0.01 mm2) were increased from those of control group. In view of these experimental findings, the formation of lymph follicles were induced by LPS stimulation from 5 days to one week after birth. The newley formed lymph follicles area in response to LPS may be less than $0.01mm^2$.

Lightweight Multicast Routing Based on Stable Core for MANETs

  • Al-Hemyari, Abdulmalek;Ismail, Mahamod;Hassan, Rosilah;Saeed, Sabri
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4411-4431
    • /
    • 2014
  • Mobile ad hoc networks (MANETs) have recently gained increased interest due to the widespread use of smart mobile devices. Group communication applications, serving for better cooperation between subsets of business members, become more significant in the context of MANETs. Multicast routing mechanisms are very useful communication techniques for such group-oriented applications. This paper deals with multicast routing problems in terms of stability and scalability, using the concept of stable core. We propose LMRSC (Lightweight Multicast Routing Based on Stable Core), a lightweight multicast routing technique for MANETs, in order to avoid periodic flooding of the source messages throughout the network, and to increase the duration of multicast routes. LMRSC establishes and maintains mesh architecture for each multicast group member by dividing the network into several zones, where each zone elects the most stable node as its core. Node residual energy and node velocity are used to calculate the node stability factor. The proposed algorithm is simulated by using NS-2 simulation, and is compared with other multicast routing mechanisms: ODMRP and PUMA. Packet delivery ratio, multicast route lifetime, and control packet overhead are used as performance metrics. These metrics are measured by gradual increase of the node mobility, the number of sources, the group size and the number of groups. The simulation performance results indicate that the proposed algorithm outperforms other mechanisms in terms of routes stability and network density.

Efficient Method for Improving Data Accessibility in VANET (VANET환경에서의 효율적인 데이터 접근성 향상기법)

  • Shim, Kyu-Sun;Lee, Myong-Soo;Lee, Sang-Keun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.1
    • /
    • pp.65-75
    • /
    • 2009
  • A Vehicular Ad-Hoc Network (VANET) is a form of Mobile ad-hoc network, to provide temporary communications among nearby vehicles. Mobile node of VANET consumes energy and resource with participating in the member of network. Some node tends to have a selfishness to place one's own profits above cooperation with others. As result of selfish node, it reduces data accessibility and the efficiency of networks. In this paper, we propose noble method, Friendship-VaR that excludes selfish nodes from a group of VANET. Friendship-VaR enables to improve data accessibility by eliminating selfish nodes and sharing data among reliable nodes. Friendship-VaR determines selfishness of nodes by simple data exchange. The experiments shows proposed method outperform existing method in terms of data accessibility.

  • PDF

Design of IEC 61850 Logical Nodes for Modeling Protective Elements of Selective-Breaking Integrated Protective Relay for DC Traction Power Supply System (DC 급전계통 선택차단형 통합보호계전기 보호요소 IEC 61850 Logical Node 설계)

  • Yun, Jun-Seok;Kim, In-Woong;Kim, Jin-Ho;An, Tae-Pung;Jung, Ho-Sung;Jung, Tae-Young
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.3
    • /
    • pp.491-496
    • /
    • 2012
  • There are several protective relays used to protect DC traction power supply system for DC railway. These relays, however, are made by different manufactures and they have different ways for their operations. Therefore, there are difficulties for cooperation between the devices or the devices and an upper system. In order to increase interoperability and stability of the system composed of devices made by different manufactures, IEC 61850 international standards are applied to design logical nodes for modeling protective elements used in protective relays.

An Implementation of Sensing Data Management System based on Embedded System (임베디드 시스템 기반의 센싱 데이터 관리 시스템 구현)

  • Lim, Ji-Eon;Choi, Shin-Hyeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3441-3445
    • /
    • 2010
  • In the modern information society, computational tasks such as business processes in addition to numerous amounts of information from various sensor devices exist. In this paper, an embedded system based on sensing data management system which can collect and store sensing data from sensor node is developed. Berkeley DB and the query processor is installed in the main system, by using this we can send the more accurate information to the host server and can increase the reliability of sensor information.

Analysis of Security Effectiveness in according to DS-MAC attack (DS-MAC 공격에 따른 보안 영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.10
    • /
    • pp.4606-4611
    • /
    • 2011
  • In this paper, it is reviewed vulnerability of security in DS-MAC communication protocol of sensor network, and analyzed in the respect of security effectiveness, which is consumed at each stage of communication procedure in according to vulnerability of denial of service and modification attack. In this paper, we present about the respect of security effectiveness of transmission and reception in case of operation mode with or without authentication scheme between sensor node.