• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.03 seconds

Performance Evaluation of MAC Protocols with Application to MANET Routing for Distributed Cognitive Radio Networks (분산 무선 인지 네트워크를 위한 MAC 프로토콜의 MANET 라우팅 적용 성능 분석)

  • Kwon, Sehoon;Kim, Hakwon;Kim, Bosung;Roh, Byeong-Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.4
    • /
    • pp.97-106
    • /
    • 2014
  • In this paper, we propose a design method to extend certain cognitive radio (CR) MAC protocols originally proposed only for the one hop applications in distributed CR networks to MANET routing protocols. Among several CR MAC protocols, the opportunistic MAC (called O-MAC) and the opportunistic period MAC (called OP-MAC) are considered, and AODV as MANET routing protocol is used. We implement the protocols using OPNET network simulator, and compare the performances in both MAC and AODV routing environments. With the experiments, we analyze the relationship between MAC and routing performances of the CR protocols.

The Propose of Optimal Flow Data Acquisition by Error Rate Analysis of Flow Data (유량 데이터 오차율 분석을 통한 최적의 유량데이터 취득방안 제안)

  • Kim, Yunha;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.31 no.3
    • /
    • pp.249-256
    • /
    • 2017
  • Recently, application areas based on M2M (Machine-to-Machine communications) and IoT (Internet of Things) technologies are expanding rapidly. Accordingly, water flow and water quality management improvements are being pursued by applying this technology to water and sewage facilities. Especially, water management will collect and store accurate data based on various ICT technologies, and then will expand its service range to remote meter-reading service using smart metering system. For this, the error in flow rate data transmitting should be minimized to obtain credibility on related additional service system such as real time water flow rate analysis and billing. In this study, we have identified the structural problems in transmitting process and protocol to minimize errors in flow rate data transmission and its handling process which is essential to water supply pipeline management. The result confirmed that data acquisition via communication system is better than via analogue current values and pulse, and for communication method case, applying the industrial standard protocol is better for minimizing errors during data acquisition versus applying user assigned method.

Distributed Information Extraction in Wireless Sensor Networks using Multiple Software Agents with Dynamic Itineraries

  • Gupta, Govind P.;Misra, Manoj;Garg, Kumkum
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.123-144
    • /
    • 2014
  • Wireless sensor networks are generally deployed for specific applications to accomplish certain objectives over a period of time. To fulfill these objectives, it is crucial that the sensor network continues to function for a long time, even if some of its nodes become faulty. Energy efficiency and fault tolerance are undoubtedly the most crucial requirements for the design of an information extraction protocol for any sensor network application. However, most existing software agent based information extraction protocols are incapable of satisfying these requirements because of static agent itineraries and large agent sizes. This paper proposes an Information Extraction protocol based on Multiple software Agents with Dynamic Itineraries (IEMADI), where multiple software agents are dispatched in parallel to perform tasks based on the query assigned to them. IEMADI decides the itinerary for an agent dynamically at each hop using local information. Through mathematical analysis and simulation, we compare the performance of IEMADI with a well known static itinerary based protocol with respect to energy consumption and response time. The results show that IEMADI provides better performance than the static itinerary based protocols.

Implementation of Automatic Power Management System using the Arduino and Beacons (아두이노와 비콘을 활용한 자동 전원 관리 시스템의 구현)

  • Kang, Bong-Gu;Yeo, Junki;Shim, Jaechang
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1471-1478
    • /
    • 2016
  • In this study, the system to manage the power automatically was implemented by using Arduino, Raspberry pi, and Beacon technologies. Before the research, pre-research was carried out with the analysis on the existing power management systems in the market in order to find a solution to reduce burdens from standby power and power waste with the increase of electric charges. The system is designed to be able to deliver and receive data through IEEE 802.15.4 wireless protocol, by using Xbee module. Arduino was tested to verify whether it is able to control SSR(Solid State Relay), and it was found that there is no problem. Meanwhile, it was also tested whether it is possible to organize a star topology network through Arduino and Raspberry Pi, and it was confirmed that normal wireless communication is possible through IEEE 802.15.4 wireless protocol. It is designed that the signal from Android smartphone application is to be delivered to Raspberry Pi and then, to be delivered to Arduino through Xbee so that Arduino could control SSR. In addition to this, wireless protocol required to control Arduino with Raspberry Pi is also designed and applied to this research.

Conditionally Traceable Pseudonym Protocol based on Oblivious Transfer (OT(Oblivious Transfer) 기반의 조건부 추적이 가능한 가명 프로토콜)

  • Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.33-42
    • /
    • 2009
  • Recently, there have been many researches about anonymous credential systems for supporting the user anonymity. However, these systems only hold a high security level, even though they must be able to be applied to various application that might require access control, conditional traceability, etc. As new challenges to these systems, some researches that several entities store the link information that associates identities and pseudonyms each other have been performed. In this paper, based on the oblivious transfer, we suggest a new pseudonym protocol that solves the pseudonym exhaustion problem which the original pseudonym retrieval protocol suffers from. By using the universal re-encryption and one-way function, we can also archive other requirements like the pseudonym unlinkability from the outside.

Effects of Linear and Nonlinear Shear Deformation on Measurement for Stickiness of Cosmetics Using Rotational Rheometer

  • Bae, Jung-Eun;Ryoo, Joo-Yeon;Kang, Nae-Gyu
    • Korea Journal of Cosmetic Science
    • /
    • v.2 no.1
    • /
    • pp.33-46
    • /
    • 2020
  • Cosmetics are representative complex fluids, and there have been many studies focusing on the correlation between the rheological properties and sensory attributes. Various instrumental measurements have been suggested to evaluate the sensory attributes, and one of the most common instruments is Texture Analyzer (TA). Although it is reported that the adhesiveness measured by TA is related to the stickiness of cosmetics, there exists reproducibility problem because measurements with TA are sensitive to application conditions. In this study, an instrumental protocol using rotational rheometer has been set up to measure the stickiness of cosmetics. This protocol consists of two steps. The first step is a preconditioning step, and various types of shear deformations are applied to the samples. The next step is the extensional flow and the axial force is measured. When the amplitude of the shear flow corresponded to the linear viscoelastic region, the axial force is the same as those without preconditioning. On the other hand, an axial force decreases as variation nonlinearity increases. It is because the effects of microstructure changes caused by nonlinear deformation affects the extensional flow. It is worth noting that a new protocol facilitates to evaluate the stickiness of cosmetics in a more systematic way.

Development of an effective dissociation protocol for isolating mesenchymal stem cells from bovine intermuscular adipose tissues

  • Jeong Min Lee;Hyun Lee;Seung Tae Lee
    • Journal of Animal Reproduction and Biotechnology
    • /
    • v.38 no.1
    • /
    • pp.10-16
    • /
    • 2023
  • Intermuscular fat is essential for enhancing the flavor and texture of cultured meat. Mesenchymal stem cells derived from intermuscular adipose tissues are a source of intermuscular fat. Therefore, as a step towards developing a platform to derive intermuscular fat from mesenchymal stem cells (MSCs) for insertion between myofibrils in cultured beef, an advanced protocol of intermuscular adipose tissue dissociation effective to the isolation of MSCs from intermuscular adipose tissues was developed in cattle. To accomplish this, physical steps were added to the enzymatic dissociation of intermuscular adipose tissues, and the MSCs were established from primary cells dissociated with physical step-free and step-added enzymatic dissociation protocols. The application of a physical step (intensive shaking up) at 5 minutes intervals during enzymatic dissociation resulted in the greatest number of primary cells derived from intermuscular adipose tissues, showed effective formation of colony forming units-fibroblasts (CFU-Fs) from the retrieved primary cells, and generated MSCs with no increase in doubling time. Thus, this protocol will contribute to the stable supply of good quality adipose-derived mesenchymal stem cells (ADMSCs) as a fat source for the production of marbled cultured beef.

Fingernail electron paramagnetic resonance dosimetry protocol for localized hand exposure accident

  • Jae Seok Kim;Byeong Ryong Park;Minsu Cho;Won Il Jang;Yong Kyun Kim
    • Nuclear Engineering and Technology
    • /
    • v.55 no.1
    • /
    • pp.270-277
    • /
    • 2023
  • Exposure to ionizing radiation induces free radicals in human nails. These free radicals generate a radiation-induced signal (RIS) in electron paramagnetic resonance (EPR) spectroscopy. Compared with the RIS of tooth enamel samples, that in human nails is more affected by moisture and heat, but has the advantages of being sensitive to radiation and easy to collect. The fingernail as a biological sample is applicable in retrospective dosimetry in cases of localized hand exposure accidents. In this study, the dosimetric characteristics of fingernails were analyzed in fingernail clippings collected from Korean donors. The dose response, fading of radiation-induced and mechanically induced signals, treatment method for evaluation of background signal, minimum detectable dose, and minimum detectable mass were investigated to propose a fingernail-EPR dosimetry protocol. In addition, to validate the practicality of the protocol, blind and field experiments were performed in the laboratory and a non-destructive testing facility. The relative biases in the dose assessment result of the blind and field experiments were 8.43% and 21.68% on average between the reference and reconstructed doses. The results of this study suggest that fingernail-EPR dosimetry can be a useful method for the application of retrospective dosimetry in cases of radiological accidents.

Data Urgency Based Routing Scheme in Wireless Sensor Networks (무선 센서네트워크에서 데이터 긴급성에 기반한 라우팅기법)

  • Kang, Min-Seung;Park, Hyung-Kun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.516-517
    • /
    • 2021
  • When designing a routing protocol in a wireless sensor network, power efficiency and power balance must be considered above all for the life of the network. However, in application services such as environmental monitoring, the urgency and speed of data are more importantly required. In this paper, a routing protocol is proposed to satisfy different requirements for transmission of normal data and emergency data. In the case of general data, it is designed to minimize the power imbalance so that the network life can be extended. In the case of emergency data, the delay is minimized by controlling the power according to the power situation of the node.

  • PDF

Pattern-based Signature Generation for Identification of HTTP Applications (HTTP 응용들의 식별을 위한 패턴 기반의 시그니쳐 생성)

  • Jin, Chang-Gyu;Choi, Mi-Jung
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.1
    • /
    • pp.101-111
    • /
    • 2013
  • Internet traffic volume has been increasing rapidly due to popularization of various smart devices and Internet development. In particular, HTTP-based traffic volume of smart devices is increasing rapidly in addition to desktop traffic volume. The increased mobile traffic can cause serious problems such as network overload, web security, and QoS. In order to solve these problems of the Internet overload and security, it is necessary to accurately detect applications. Traditionally, well-known port based method is utilized in traffic classification. However, this method shows low accuracy since P2P applications exploit a TCP/80 port, which is used for the HTTP protocol; to avoid firewall or IDS. Signature-based method is proposed to solve the lower accuracy problem. This method shows higher analysis rate but it has overhead of signature generation. Also, previous signature-based study only analyzes applications in HTTP protocol-level not application-level. That is, it is difficult to identify application name. Therefore, previous study only performs protocol-level analysis. In this paper, we propose a signature generation method to classify HTTP-based traffics in application-level using the characteristics of typical semi HTTP header. By applying our proposed method to campus network traffic, we validate feasibility of our method.