• Title/Summary/Keyword: 다중 충돌

Search Result 379, Processing Time 0.028 seconds

Routing with Maximum Edge Disjoint Paths and Wavelength Assignment with Path Conflict Graph (최대 EDP를 이용한 경로설정 및 경로 충돌 그래프를 이용한 파장할당 문제 해결 방안)

  • Kim Duk Hun;Chung Min Young;Lee Tae-Jin;Choo Hyunseung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7B
    • /
    • pp.417-426
    • /
    • 2005
  • Routing and wavelength assignment problem is one of the most important issues in optical transport networks based on wavelength division multiplexing(WDM) technique. In this paper, we propose a novel approach using path conflict graphs and an algorithm for finding all edge disjoint paths. And then we compare the performance of the proposed algorithm with that of bounded greedy approach for EDP(BGAforEDP). The proposed one outperforms up to about 20$\%$ in the fixed traditional topology(NSFNET) and about 32$\%$ in random topologies over the BGA for EDP algorithm.

Communication protocol for multi subscribers using radio equipments based on CSMA/CA (CSMA/CA 기반 무전기를 통한 다중가입자 통신 프로토콜)

  • Jang, Myung-Jin;Park, Seong-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2385-2390
    • /
    • 2010
  • The PRC-999K radio widely used in Korean Army is half-duplex and also has the broadcasting radio wave character that all subscribers listen when one subscriber speaks in time. The radio data communication system configures a 1:1 unicast network between a command post and network members in a military fire control system. The system also applies CSMA/CA technique to avoid data collision and additionally applies SDLC protocol for efficiency and fast communication. This paper shows that allocating address to network members in serial order can reduce data transmitting/receiving time, and thereby a command post needs to broadcast data only one time and the assigned members can reply in order without data collision. It is validated through an experimental test.

A Study on the Relationship between Impact Point of Vehicle and Throw Distance of Pedestrian (충격 지점과 보행자 전도 거리의 상관관계에 관한 연구)

  • Kang, Dae-Min;Ahn, Seung-Mo
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.6 no.3
    • /
    • pp.71-76
    • /
    • 2007
  • The fatalities of pedestrian account for about 40.0% of all fatalities in Korea 2005. Vehicle-Pedestrian accident generates trajectory of pedestrian. In pedestrian involved accident, the most important data to inspect accident is throw distance of pedestrian. The throw distance of pedestrian can be influenced by many variables. The variables that influence trajectory of pedestrian can be classified into vehicular factors, pedestrian factors, and road factors. Vehicular factors are the frontal shape of vehicle, impact speed of vehicle, the offset of impact point. Many studies have been done about the relation between impact speed and throw distance of pedestrian. But the influence of the offset of impact point was neglected. The influence of the offset of impact point was analyzed by Working Model, and the trajectory of pedestrian, dynamic characteristics of multi-body were analyzed by PC-CRASH, a kinetic analysis program for a traffic accident. Based on the results, the increase of offset reduced the throw distance of pedestrian. However box type vehicle just like bus, the offset of impact point did not influence the throw distance of pedestrian considerably.

  • PDF

A Numerical Study on the Heat Transfer Characteristics of the Multiple Slot Impinging Jet (다양한 노즐 수 변화에 따른 충돌 제트의 열전달 특성에 관한 수치적 연구)

  • Kim, Sang-Keun;Ha, Man-Yeong;Son, Chang-Min
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.23 no.11
    • /
    • pp.754-761
    • /
    • 2011
  • The present study numerically investigates two-dimensional flow and heat transfer in the multiple confined impinging slot jet. Numerical simulations are performed for the different Reynolds numbers(Re=100 and 200) in the range of nozzles from 1 to 9 and height ratios(H/D) from 2 to 5, where H/D is the ratio of the channel height to the slot width. The vector plots of velocity profile, stagnation and averaged Nusselt number distributions are presented in this paper. The dependency of thermal fields on the Reynolds number, nozzle number and height ratio can be clarified by observing the Nusselt number as heat transfer characteristic at the stagnation point and impingement surface. The Nusselt number at the stagnation point of the central slot shows unsteadiness at H/D=3 and Re=200. The value of Nusselt number at the stagnation point of the central slot decreases with higher Reynolds number and number of nozzle although overall area averaged Nusselt number increases. Hence careful selection of geometrical parameters and number of nozzle are necessary for optimization of the heat transfer performance of multiple slot impinging jet.

Multicast Scheduling Scheme in Dense WLAN Systems (밀집 무선랜 시스템에서의 멀티캐스트 전송 스케줄링 기법)

  • Kim, Namyeong;Kim, Wonjung;Pack, Sangheon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.441-450
    • /
    • 2015
  • Nowadays, many WLAN access points (APs) are deployed in hotspot areas such as shopping malls and stations. As the number of WLAN APs deployed increases, how to manage densely deployed APs in an efficient manner becomes one of the most important issues in WLANs. In this environment, uncoordinated multicast services can lead to frequent collisions due to simultaneous transmissions among APs. In this paper, we propose a multicast scheduling algorithm that can exploit simultaneous transmissions in multiple sectors and avoid redundant transmissions in dense networks. Simulation results demonstrate that the proposed scheme can reduce the multicast transmission latency compared to comparison scheduling schemes.

Request Two-Phase Locking Method for Series Sequence Re-adjustment of Concurrency Control in Multi-Level Secure DBMS (다단계 보안 데이터베이스 시스템에서 병행수행 제어의 직렬화 순서를 재조정하기 위한 요청 2단계 로킹기법)

  • Lee, Seungsoo;Cho, Jinsung;Jeong, Byungsoo
    • Annual Conference of KIPS
    • /
    • 2004.05a
    • /
    • pp.105-108
    • /
    • 2004
  • 다단계 보안데이터베이스 시스템에서 기본적인 병행수행 제어 기법들은 비밀채널과 교착상태등과 같은 문제들이 발생하였다. 이에 직렬화 순서를 동적으로 재조정함으로서 해결하려는 방안이 있었지만, 알고리즘의 복잡성으로 인해 오버 헤드와 많은 수행시간이 필요하게 되었고, 이에 따라 많은 양의 시스템 자원과 높은 사양의 시스템을 요구하게 되었다. 또한 이러한 방법은 다중 버전을 사용함으로서 추가적인 관리비용이 높게 되었고, 각각의 트랜잭션이 지연 및 재수행이란 불필요한 과정을 반복하게 되었다. 따라서 본 논문에서는 제안한 알고리즘은 데이터베이스의 용도에 맞게 직렬화 순서를 보장하여 스케줄을 관리하는 요청 2단계 로킹기법(Request Two-phase Locking)으로서 이는 2단계 로킹기법의 기본원리에 요청로크를 사용함으로 보다 효율적으로 병행제어를 할 수 있다. 여기서 요청로크는 각각의 트랜잭션 스케줄에 로크획득 및 해제를 병행수행제어의 필요에 따라 유동적으로 할 수 있으며, 읽기로크, 쓰기로크, 요청로크라는 3가지 로킹모드를 통해 대처방안을 마련함으로서, 충돌을 방지하며, 충돌연산의 특성에 따라 직렬화 순서를 동적으로 조정함으로 블록킹을 막는 병행제어를 응용하여 병렬성을 유지한다.

  • PDF

A Control System for Avoiding Collisions between Autonomous Warfare Vehicles and Infantry (군용 무인차량과 보병의 충돌방지를 위한 제어시스템)

  • Nam, Sea-Hyeon;Chung, You-Chung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.3
    • /
    • pp.74-82
    • /
    • 2011
  • This paper describes a control system for positioning the real-time locations of the autonomous warfare vehicles and infantry, and for avoiding collisions between them. The control system utilizes the low-cost RSSI (Received Signal Strength Indication) for positioning the locations of the wireless devices. The mathematical mean filtering processes are applied to the calculation of the RSS matrix to improve the performance for positioning the wireless devices in the multi-path propagation environment. A fuzzy rule is proposed to recover and replace the broken packets occurring in the wireless communication. The gradient and geometric triangulation algorithms are proposed to trace the real-time locations of wireless devices, based on the distances between them. The estimated location results of the geometric triangulation algorithm are compared with the results of the GPS and the gradient algorithm.

Multiple Access Scheme by Dynamically Applying the Power Increasing Method in the UHF RFID System (UHF대역 RFID system에서 전력상승기법을 동적으로 적용한 다중접속방법)

  • Yim, You-Seok;Hwang, Jae-Ho;Sohn, Sung-Hwan;Kim, Jae-Moung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.5
    • /
    • pp.12-20
    • /
    • 2008
  • RFID(Radio frequency indentification) technology, that the reader detect the tag information attached on the objects without contact, is considered the kernel of realizing tile Ubiquitous Sensor Network. Particularly, because there are lots of tags(which the reader have to detect) in the UHF RFID system(that is applied at the Logistic & Distribution industry). In the UHF RFID system the negative effects, we called the tag-collision, may occur and we should solve these effects. So, in the EPCglobal Gen2 protocol they present the Slotted Random Anti-collision algorithm to prevent the tag-collision effect. In this paper, in order to minimize the tag-collision effect and bring on the system efficiency, we propose the Power Increasing Method that controls the transmission power of the reader depending on the environment and verily the improved performance.

Power consumption estimation of active RFID system using simulation (시뮬레이션을 이용한 능동형 RFID 시스템의 소비 전력 예측)

  • Lee, Moon-Hyoung;Lee, Hyun-Kyo;Lim, Kyoung-Hee;Lee, Kang-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1569-1580
    • /
    • 2016
  • For the 2.4 GHz active RFID to be successful in the market, one of the requirements is the increased battery life. However, currently we do not have any accurate power consumption estimation method. In this study we develop a simulation model, which can be used to estimate power consumption of tag accurately. Six different simulation models are proposed depending on collision algorithm and query command method. To improve estimation accuracy, we classify tag operating modes as the wake-up receive, UHF receive, sleep timer, tag response, and sleep modes. Power consumption and operating time are identified according to the tag operating mode. Query command for simplifying collection and ack command procedure and newly developed collision control algorithm are used in the simulation. Other performance measures such as throughput, recognition time for multi-tags, tag recognition rate including power consumption are compared with those from the current standard ISO/IEC 18000-7.

An Efficient Flooding Scheme using Clusters in Mobile Ad-Hoc Networks (애드 혹 네트워크에서 클러스터를 이용한 효율적인 플러딩 방안)

  • Wang Gi-cheol;Kim Tae-yeon;Cho Gi-hwan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.696-704
    • /
    • 2005
  • Flooding is usually utilized to find a multi hop route toward the destination which is not within transmission range in Ad Hoc networks. However, existing flooding schemes deteriorate the network performance because of periodic message exchanges, frequent occurrence of collisions, and redundant packet transmission. To resolve this, a flooding scheme using on demand cluster formation is proposed in this paper. The scheme employs ongoing Packets for constructing a cluster architecture as the existing on demand clustering scheme. Unlike to the existing on demand clustering scheme, the scheme makes use of unicast packet transmission to reduce the number of collisions and to find the flooding candidates easily. As a result, the proposed scheme yields fewer flooding nodes than other schemes. Simulation results proved that the proposed scheme reduces the number of transmissions and collisions than those of two other schemes.