• Title/Summary/Keyword: 싱크

Search Result 751, Processing Time 0.028 seconds

A Study on the memory management techniques using Sensing Data Filtering of Wireless sensor nodes (무선센서노드의 센싱 데이터 필터링을 사용한 메모리 관리 기법에 대한 연구)

  • Kang, Yeon-I;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1633-1639
    • /
    • 2010
  • Recently Wireless sensor networks have been used for many purposes and is active for this study. The various methods to reduce energy consumption, which are actively being studied Wireless sensor network to reduce energy consumption, leading to improve transport efficiency, Cluster can be viewed using the research methods. Cluster method researches consists of a sensor node to the cluster and in among those they take out the Cluster head node and Cluster head node is having collects sensing information of circumferential nodes sensing to sink node transmits. Selected as cluster head sensor nodes so a lot of the energy consumption is used as a cluster head sensor nodes is lose a shorter life span have to be replaced by another sensor node. In this paper, to complement the disadvantages of a cluster-mesh method, proposes to manage memory efficiently about filtering method for sensing data. Filtering method to store the same data sensing unlike traditional methods of data filtering system sensing first sent directly by the hashing algorithm to calculate the hash table to store addresses and Sensing to store data on the calculated address in a manner to avoid duplication occurred later, and sensing data is not duplicated by filtering data to be stored in the hash table is a way.

A Robust Disjoint Multipath Scheme based on Geographic Routing in Irregular Wireless Sensor Networks (불규칙적 무선센서네트워크에 강한 위치기반 다중경로 제공 방안)

  • Kim, Sung-Hwi;Park, Ho-Sung;Lee, Jeong-Cheol;Oh, Seung-Min;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1B
    • /
    • pp.21-30
    • /
    • 2012
  • Sensor networks are composed of a great number of sensor nodes with constrained battery. Disjoint multipath scheme based flooding method has a merit that efficiently construct multipath in irregular networks, but causes lots of energy consumption in networks. Flooding method is not a suitable technology in wireless sensor networks with constrained battery. We introduce energy-efficient geographic routing scheme considered as an efficient, simple, and scalable routing protocol for wireless sensor networks. The geographic routing scheme on multipath generates a problem with a congestion. So we introduce the concept of multipath pipeline as a congestion avoidance strategy. But multipath pipelines have a big problem on the boundary of holes under irregular networks. We propose a novel disjoint multipath scheme as combined method with geographic routing scheme and hole detouring algorithm on multipath. A novel disjoint multipath scheme constructs disjoint multipath pipelines efficiently for reliability without a collision in irregular wireless sensor networks. Simulation results are provided to validate the claims.

A Distributed address allocation scheme based on three-dimensional coordinate for efficient routing in WBAN (WBAN 환경에서 효율적인 라우팅을 위한 3차원 좌표 주소할당 기법의 적용)

  • Lee, Jun-Hyuk
    • Journal of Digital Contents Society
    • /
    • v.15 no.6
    • /
    • pp.663-673
    • /
    • 2014
  • The WBAN technology means a short distance wireless network which provides each device interactive communication by connecting devices inside and outside of body. Standardization on the physical layer, data link layer, network layer and application layer is in progress by IEEE 802.15.6 TG BAN. Wireless body area network is usually configured in energy efficient using sensor and zigbee device due to the power limitation and the characteristics of human body. Wireless sensor network consist of sensor field and sink node. Sensor field are composed a lot of sensor node and sink node collect sensing data. Wireless sensor network has capacity of the self constitution by protocol where placed in large area without fixed position. In this paper, we proposed the efficient addressing scheme for improving the performance of routing algorithm by using ZigBee in WBAN environment. A distributed address allocation scheme used an existing algorithm that has wasted in address space. Therefore proposing x, y and z coordinate axes from divided address space of 16 bit to solve this problems. Each node was reduced not only bitwise but also multi hop using the coordinate axes while routing than Cskip algorithm. I compared the performance between the standard and the proposed mechanism through the numerical analysis. Simulation verified performance about decrease averaging multi hop count that compare proposing algorithm and another. The numerical analysis results show that proposed algorithm reduced the multi hop better than ZigBee distributed address assignment

A Hole Self-Organization Real-Time Routing Protocol for Irregular Wireless Sensor Networks (비정형적인 무선 센서 네트워크에서 음영지역 자가 구성 실시간 라우팅 프로토콜)

  • Kim, Sangdae;Kim, Cheonyong;Cho, Hyunchong;Yim, Yongbin;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.281-290
    • /
    • 2014
  • The real-time data dissemination schemes exploit the spatiotemporal commuication approach which forwards data at the delivery speed calculated with the desired time deadline and the end-to-end distance in wireless sensor networks (WSNs). In practical environments, however, the performance of the real-time data dissemination might be degraded by additional and inevitable delay due to some holes. Namely, the holes lengthen the data delivery path and the spatiotemporal approach could not estimate a distance of the data delivery path. To deal with this, we propose A Hole Self-Organization Real-time Routing Protocol for Irregular Wireless Sensor Networks. In proposed protocol, nodes around holes could detect them at deploying phase. A hole is represented as a circle with center point and radius. This hole information is processed and provided as a form of location service. When a source queries a destination location, location provider replies certain points for avoiding holes as well as destination location. Thus, the source could set desired speed toward the destination via the points. Performance evaluation shows that provides better real-time service in practical environments.

Analysis of Correlation Coefficient Between Movements of Thoracoabdominal Tumors and External Respiration Using Image Guided Radiotherapy(IGRT) (영상유도 방사선치료장치(IGRT)를 이용한 흉·복부 종양의 움직임과 외부호흡과의 상관관계 분석)

  • Kim, Gha-Jung;Hong, Ju-Youn;Han, Sang-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.362-370
    • /
    • 2014
  • This study measured and analyzed the correlation coefficient between movements of thoracoabdominal tumors and external respiration in a free-breathing state, using cyberknife image guided radiotherapy(IGRT). This study subjects included a total of 30 patients with lung tumors(n=10), liver tumors(n=10) and pancreatic tumor(n=10) who underwent radiotherapy, and the movements of tumors were analyzed using converted log data of the tumor motion tracking system(MTS). In a free-breathing state, In relation to Peason's correlation coefficient between external respiration and lung tumors in the entire treatment process, the correlation coefficient was 0.646(p<0.05) in the cranio-caudal direction, 0.365(p<0.088) in the left and right direction and 0.196(p<0.115) in the antero-posterior direction. The correlation coefficient of liver tumors was 0.841(p<0.000) in the cranio-caudal direction, 0.346 (p<0.179) in the left and right direction and 0.691(p<0.001) in the antero-posterior direction. The correlation coefficient of Pancreatic tumors was 0.683(p<0.000) in the cranio-caudal direction, 0.397(p<0.006) in the left and right direction and 0.268(p<0.127) in the antero-posterior direction. In conclusion, the measurement findings of thoracoabdominal tumor movement using IGRT would be helpful in determining an accurate target volume. Moreover, the analysis of correlation between external respiration and movements of internal tumors would provide important information to correct movements of tumors for diverse radiotherapy techniques.

Analysis of the Work Breakdown Structure and Cost-Rate for Small Interior Works in Apartment (아파트 소규모 인테리어공사의 공종별 분류와 보할의 분석)

  • Kim, Chae-Yong;Lee, Jong-Gyu;Lee, Jae-Yong;Lee, Soo-Yong
    • Journal of the Korea Institute of Building Construction
    • /
    • v.10 no.1
    • /
    • pp.213-219
    • /
    • 2010
  • The research, based on 200 cases of small interior works in6 different floor area types of apartment in Busan, intended to compare the architectural work with the breakdown structure and analyze the cost of general small-scale interior work, by work type. The outcome of the research is outlined as follows. (1) Given the cost of small interior works for apartmentsranges from 10 million to 15 million won, which correspond to apartments ranging in size from $79.2m^2$ (24PY) to $105.6m^2$, it is necessary to implement a cost analysis for material cost and labor cost for these two types. (2) Given that small interior work for apartments comprises mostly finishing work, unlike the categoriesof general architectural work, it is more reasonable to classify the works into 9 categories,which include embellishment, wood, tile, paint, metal, toilet, sink & furniture, electric & mechanical and other works, instead of the 22 divisions stipulated in the Korean Architectural Standard Specification. (3) After reviewing the average cost of small interior work and rate by floor area, it was found thatthe average cost of 24PY was 10.5 million won, of which metal work accounts for 12.8%, embellishment work 17.8%, and toilet 19.7%, while sink & furniture appeared to be the highest with 22.1%, while for 32PY, average cost was 12.5 million won,which comprises 7.4% wood work, sink & furniture 20.2%, toilet 23.4% and embellishment work the highest at 28.6%, indicating that embellishment work accounts for the greater portion.

A Study on Consistency of Numerical Solutions for Wave Equation (파동방정식 수치해의 일관성에 관한 연구)

  • Pyun, Sukjoon;Park, Yunhui
    • Geophysics and Geophysical Exploration
    • /
    • v.19 no.3
    • /
    • pp.136-144
    • /
    • 2016
  • Since seismic inversion is based on the wave equation, it is important to calculate the solution of wave equation exactly. In particular, full waveform inversion would produce reliable results only when the forward modeling is accurately performed because it uses full waveform. When we use finite-difference or finite-element method to solve the wave equation, the convergence of numerical scheme should be guaranteed. Although the general proof of convergence is provided theoretically, the consistency and stability of numerical schemes should be verified for practical applications. The implementation of source function is the most crucial factor for the consistency of modeling schemes. While we have to use the sinc function normalized by grid spacing to correctly describe the Dirac delta function in the finite-difference method, we can simply use the value of basis function, regardless of grid spacing, to implement the Dirac delta function in the finite-element method. If we use frequency-domain wave equation, we need to use a conservative criterion to determine both sampling interval and maximum frequency for the source wavelet generation. In addition, the source wavelet should be attenuated before applying it for modeling in order to make it obey damped wave equation in case of using complex angular frequency. With these conditions satisfied, we can develop reliable inversion algorithms.

Bayes Stopping Rule for MAC Scheme Wireless Sensor Networks (무선 센서 망에서 MAC 방식을 위한 Bayes 중지 규칙)

  • Park, Jin-Kyung;Choi, Cheon-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.7
    • /
    • pp.53-61
    • /
    • 2008
  • Consider a typical wireless sensor network in which stem nodes form the backbone network of mesh topology while each stem node together with leaf nodes in its vicinity forms a subnetwork of star topology. In such a wireless sensor network, we must heed the following when we design a MAC scheme supporting the packet delivery from a leaf node to a stem node. First, leaf nodes are usually battery-powered and it is difficult to change or recharge their batteries. Secondly, a wireless sensor network is often deployed to collect and update data periodically. Late delivery of a data segment by a sensor node causes the sink node to defer data processing and the data segment itself to be obsolete. Thirdly, extensive signaling is extremely limited and complex computation is hardly supported. Taking account of these facts, a MAC scheme must be able to save energy and support timeliness in packet delivery while being simple and robust as well. In this paper, we propose a version of ALOHA as a MAC scheme for a wireless sensor network. While conserving the simplicity and robustness of the original version of ALOHA, the proposed version of ALOHA possesses a distinctive feature that a sensor node decides between stop and continuation prior to each delivery attempt for a packet. Such a decision needs a stopping rule and we suggest a Bayes stopping rule. Note that a Bayes stopping rule minimizes the Bayes risk which reflects the energy, timeliness and throughput losses. Also, a Bayes stopping rule is practical since a sensor node makes a decision only using its own history of delivery attempt results and the prior information about the failure in delivery attempt. Numerical examples confirm that the proposed version of ALOHA employing a Bayes stopping rule is a useful MAC scheme in the severe environment of wireless sensor network.

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.

A Design of Wireless Sensor Node Using Embedded System (임베디드 시스템을 활용한 무선 센서 노드설계)

  • Cha, Jin-Man;Lee, Young-Ra;Park, Yeon-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.623-628
    • /
    • 2009
  • The emergence of compact and low-power wireless communication sensors and actuators in the technology supporting the ongoing miniaturization of processing and storage allows for entirely the new kinds of embedded systems. These systems are distributed and deployed in environments where they may have been designed into a particular control method, and are often very dynamic. Collection of devices can communicate to achieve a higher level of coordinated behavior. Wireless sensor nodes deposited in various places provide light, temperature, and activity measurements. Wireless sensor nodes attached to circuits or appliances sense the current or control the usage. Together they form a dynamic and multi-hop routing network connecting each node to more powerful networks and processing resources. Wireless sensor networks are a specific-application and therefore they have to involve both software and hardware. They also use protocols that relate to both applications and the wireless network. Wireless sensor networks are consumer devices supporting multimedia applications such as personal digital assistants, network computers, and mobile communication devices. Wireless sensor networks are becoming an important part of industrial and military applications. The characteristics of modem embedded systems are the capable of communicating adapting the different operating environments. In this paper, We designed and implemented sensor network system which shows through host PC sensing temperature and humidity data transmitted for wireless sensor nodes composed wireless temperature and humidity sensor and designs sensor nodes using embedded system with the intention of studying USN.