• Title/Summary/Keyword: 충돌 제어 알고리즘

Search Result 196, Processing Time 0.03 seconds

Method for Read-only Transactions in Mobile Computing Environments (이동 컴퓨팅 환경에서 읽기 전용 트랜잭션의 스케줄링 알고리즘)

  • 김성석;이상근;정순영;황종선
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10b
    • /
    • pp.60-62
    • /
    • 1998
  • 무선 통신 기술이 발달함에 따라 이동 컴퓨팅 환경의 새로운 속성 및 조건들을 고려할 수 있는 새로운 알고리즘이 필요하게 되었다. 이 논문에서는 이동 컴퓨팅 환경에서 읽기 전용 트랜잭션의 직렬화가능한(serializable) 수행을 위한 스케쥴링 기법을 제안한다. 제안하는 기법에서는 이동 컴퓨터가 지역 캐쉬를 이용하여 읽기 연산을 수행하며, 서버와 특별한 제어 정보의 교환 없이 완료 혹은 철회되도록 한다. 이러한 연산의 수행을 위하여 충돌 연산의 순서를 데이터의 의미를 고려하여 재순서화 한다. 그리고 이동 컴퓨터는 서버의 주기적인 브로드캐스팅 정보를 이용하여 캐쉬 데이터의 유용성 검사를 수행한다.

An Adaptive Back-off Algorithm in Beacon-Enabled LR-WPAN (비콘 기반 저속 WPAN에서의 적응적 백오프 알고리즘)

  • Park, Sung-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.8
    • /
    • pp.735-742
    • /
    • 2016
  • The Low-Rate WPAN is a short range wireless networking technology characterized by low-rate, low-power, low complexity and low-cost. The LR-WPAN controls wireless channel access among network devices based on the contention-based CSMA/CA algorithm. Therefore, frame collisions may take place at any time, leading to the severe degradation of network performance. This paper proposes a new algorithm that changes back-off periods adaptively in the CSMA/CA process depending on network conditions, resulting in the reduction of frame collisions. Throughout extensive simulations, it turns out that varying the back-off periods dynamically shows better performance than maintaining the fixed back-off periods.

Analysis of MIMD Backoff Algorithm for IEEE 802.11 DCF (IEEE 802.11 DCF를 위한 MIMD 백오프 알고리즘 분석)

  • Lim, Seog-Ku
    • Journal of Digital Contents Society
    • /
    • v.12 no.3
    • /
    • pp.299-307
    • /
    • 2011
  • The MAC of IEEE 802.11 WLAN to control data transmission uses two control methods called DCF and PCF. The DCF controls the transmission based on CSMA/CA The BEB backoff algorithm of DCF shows relatively excellent performance in situation that the number of competing station is less, but has a problem that performance of throughput and delay is degraded in situation that the number of competing station is increased. This paper mathematically analyzes an MIMD backoff algorithm considering retry limit that increases the CW to doubled after collision and decreases smoothly the CW to halves after successful transmission in order to reduce the collision probability. To prove efficiency of the MIMD backoff algorithm, lots of simulations are conducted and analyzed.

Analysis of Backoff Algorithm for Performance Improvement in WLAN (무선랜에서 성능 향상을 위한 Backoff 알고리즘 분석)

  • Lim, seog-ku
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.564-568
    • /
    • 2008
  • In this paper, MAC(Medium Access Control) algorithm for the IEEE 802.11 DCF(Distributed Coordination Function) improving the performance is proposed and analyzed mathematically. The MAC of IEEE 802.11 WLAN to control data transmission uses two control methods called DCF and PCF(Point Coordination Function). The DCF controls the transmission based on CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance). The DCF shows excellent performance relatively in situation that competition station is less but has a problem that performance is fallen from throughput and delay viewpoint in situation that competition station is increased. This paper proposes an enhanced DCF algorithm that increases the CW to maximal CW after collision and decreases the CW smoothly after successful transmission in order to reduce the collision probability by utilizing the current status information of WLAN. To prove efficiency of proposed algorithm, a lots of simulations are conducted and analyzed.

  • PDF

A Study on Side and Rear-Side Collision Warning System of Vehicle using Fuzzy Control Algorithms (퍼지 제어 알고리즘을 이용한 차량 후측방 충돌 경보 시스템)

  • 김병기;이화조
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.939-943
    • /
    • 2004
  • The side and rear-side collision warning system using fuzzy control algorithms is discussed in this paper. Common rearside warning system has many problems. For example if target vehicle comes into the warning area, it must unconditionally warn. Drivers could be interrupted by it. To solve the problem, I divided measuring area into two sections. One section is blind area of vehicle and the other rear-side area. For blind area, obtained data was filtered inefficient warning signal by using relative velocity method. For rear-side area, a fuzzy logic algorithm is used to recognition of obstacles. According to our experiment relative velocity method and fuzzy logic algorithms were very efficient.

  • PDF

A Study on Rear Lateral Collision Warning System of Vehicle using Fuzzy Control Algorithms (퍼지 제어 알고리즘을 이용한 차량 후측방 충돌 경보 시스템)

  • Kim, Byung-Ki;Han, Seung-Chul;Yi, Hwa-Cho
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.24 no.2 s.191
    • /
    • pp.73-85
    • /
    • 2007
  • The rear lateral collision warning system using fuzzy control algorithms is discussed in this paper. Common rear lateral warning system has many problems. For example if target vehicle comes into the warning area, it must unconditionally warn. Drivers could be interrupted by it. To solve the problem, I divided measuring area into two sections. One section is blind area of vehicle and the other rear lateral area. For blind area, obtained data was filtered inefficient warning signal by using relative velocity method. For rear lateral area, a fuzzy logic algorithm is used to recognition of obstacles. According to our experiment relative velocity method and fuzzy logic algorithms were very efficient.

Analysis of WLAN Performance Depending on ARF Scheme with TCP and UDP Protocols (TCP와 UDP 프로토콜 상에서 ARF 기법에 따른 무선랜 성능 분석)

  • Kim Namgi;Lee Min;Yoon Hyunsoo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.395-400
    • /
    • 2005
  • The IEEE 802.11b WLAN supports multiple transmission rates and the rate is chosen in an adaptive manner by an auto rate control algorithm. This auto rate control algorithm deeply affects the total system performance of the IEEE 802.11b WLAN. In this paper, we examine the WLAN performance with regard to the auto rate control algorithm especially the ARF scheme. The experimental results indicate that the ARF scheme works well in the face of signal noise due to node location. However, the ARF scheme severely degrades system performance when multiple nodes contend to obtain the wireless channel and the packet is lost due to signal collision. In addition, TCP prevent the performance degradation due to ARF scheme by retaining number of active nodes. However, some applications, such as transporting multimedia data, adopt the UDP. Therefore, the TCP cannot be an optimal solution for all WLAN applications.

Formation Motion Control for Swarm Robot (군집 로봇의 포메이션 이동 제어)

  • La, Byung-Ho;Tak, Myung-Hwan;Joo, Young-Hoon;Park, Jin-Bae
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.1886-1887
    • /
    • 2011
  • 본 논문은 군집 로봇 포메이션 이동 제어를 위한 방법을 제안한다. Potential field method 알고리즘을 이용하여 Leader-Bot의 장애물 회피와 이동 경로를 계획한다. Leader-bot을 기준으로 하는 Follewer-bot의 포메이션 형성을 위해 Formation generated function을 사용한다. Leader-bot과 Follower-bot들 간에 충돌회피와 Follower-bot들의 장애물 회피를 위해 Potential function을 적용한다. 제안한 방법은 시뮬레이션을 통하여 실제 운용 가능성을 검증한다.

  • PDF

A study on path planning and avoidance of obstacle for mobile robot by using genetic algorithm (유전알고리즘을 이용한 이동로봇의 경로계획 및 충돌회피에 관한 연구)

  • 김진수;이영진;이권순
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1193-1196
    • /
    • 1996
  • Genetic algorithm(GA) is useful to find optimal solution without any special mathematical modeling. This study presents to search optimal path of Autonomous Mobile Robot(AMR) by using GA without encoding and decoding procedure. Therefore, this paper shows that the proposed algorithm using GA can reduce the computation time to search the optimal path.

  • PDF

Effective Methodology for Collecting Contextual Factors and Information that Affects The XACML Policy Evaluation (XACML 정책 평가에 영향을 미치는 문맥적 요소 및 추가 정보의 효과적인 수집 방안)

  • Ahn, Youn-geun;Lee, Gichan;Lee, Scott Uk-Jin
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.2
    • /
    • pp.82-87
    • /
    • 2018
  • In the field of access control, policy conflicts must be solved and various related solutions are being researched and developed. In order to resolve the policy conflict problem, it is necessary to first identify the cause of the conflict, and as a minimum condition, it is necessary to detect the contextual elements of the policy that have influenced the policy evaluation decision. Although the XACML policy language specification provides a way to define this, the policy creator currently has limitations in not clearly describing the causes of conflicts in every contextual elements. In addition, in order to identify the causes of the policy conflict, it is necessary to acquire additional information such as other policy combination algorithms, in addition to these contextual factors. In this paper, we propose an effective method to identify contextual factors, as well as to locate additional information that cause policy conflicts.