• Title/Summary/Keyword: CA simulation

Search Result 278, Processing Time 0.024 seconds

Tuning Backoff Period for Enhancing System Throughput with Estimating Number of Devices in IEEE 802.15.4 Slotted CSMA/CA (IEEE 802.15.4 슬롯 기반 CSMA/CA에서 시스템 처리율 향상을 위한 단말 수 추정을 통한 백오프 기간 튜닝 기법)

  • Lee, Won Hyoung;Hwang, Ho Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.9
    • /
    • pp.1243-1249
    • /
    • 2018
  • In this paper, we propose a scheme that tunes the backoff period for enhancing the system throughput with estimating the number of devices in IEEE 802.15.4 slotted carrier sense multiple access with collision avoidance (CSMA/CA) networks. Since each device does not sense the channel always in IEEE 802.15.4 slotted CSMA/CA networks, a personal area network (PAN) coordinator is used to estimate the number of active devices. The PAN coordinator broadcasts an optimal backoff period for the estimated number of devices through a beacon frame. In order to estimate the number of devices in run time, a simple moving average filter is utilized. We show the performance of our proposed scheme in terms of the estimated number of devices and the system throughput. The simulation results show that our proposed scheme can obtain higher system throughput than the IEEE 802.15.4 standard.

Modeling and Simulation of Nanorobotic Manipulation with an AFM probe

  • Kim, Deok-Ho;Park, Jungyul;Kim, Byungkyu;Kim, Kyunghwan
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.108.6-108
    • /
    • 2002
  • It is greatly important to understand the mechanics of AFM-based nanorobotic manipulation for efficient and reliable handling of nanoparticles. Robust motion control of an AFM-based nanorobotic manipulation is much challenging due to uncertain mechanics in tip-sample interaction dominated by surface and intermolecular force and limitations in force and visual sensing capability to observe environment. This paper investigates a nanomechanic modeling which enables simulation for AFM-based nanorobotic manipulation , and its application to motion planning of an AFM-based nanorobot. Based on the modeling of intermolecular and adhesion force in AFM-based nanomanipulation, the behaviors of an AFM ca...

  • PDF

A Novel Approach to Controlling CaCO3 Crystalline Assembly by Changing the Concentration of Poly(aspartic acid)

  • Zhou, Hongjian;Gao, Yanmin;Hwang, Sun-Gu;Lee, Dong-Yun;Park, Jung-Youn;Lee, Jae-Beom
    • Bulletin of the Korean Chemical Society
    • /
    • v.32 no.11
    • /
    • pp.4027-4034
    • /
    • 2011
  • $CaCO_3$ crystalline structures having novel assemblies were in situ fabricated as analogs of naturally occurring proteins and polysaccharides for biomineralization. The calcite crystal was mineralized in a poly(vinyl alcohol)-$Ca^{2+}$ complex film immersed in a $Na_2CO_3$ solution containing poly(aspartic acid). The morphology and size of the $CaCO_3$ crystals were tuned by varying the concentration of poly(aspartic acid). The mechanisms of their nucleation orientation and formation were investigated experimentally and through molecular dynamics (MD) simulations in order to obtain a better understanding of the interactions between the polymers and the crystal at the molecular level. Both the MD results and experimental results indicate that the interaction between PVA and calcite mainly depends on the concentration of the polymer. The novel approach proposed herein for the fabrication of inorganic crystalline assembly structures can be used to fabricate precise crystalline structures.

Performance Analysis of Directional CSMA/CA for IEEE 802.15.3c under Saturation Environments

  • Kim, Mee-Joung;Kim, Yong-Sang;Lee, Woo-Yong
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.24-34
    • /
    • 2012
  • In this paper, the directional carrier sense multiple access/collision avoidance (CSMA/CA) protocol in the immediate acknowledgement mode for IEEE 802.15.3c is analyzed under saturation environments. For the analysis, a sensing region and an exclusive region with a directional antenna are computed probabilistically and a Markov chain model in which the features of IEEE 802.15.3c and the effects of using directional antennas are incorporated is analyzed. An algorithm to find the maximal number of concurrently transmittable frames is proposed. The system throughput and the average transmission delay are obtained in closed forms. The numerical results show the impact of directional antennas on the CSMA/CA media access control (MAC) protocol. For instance, the throughput with a small beamwidth of antenna is more than ten times larger than that for an omnidirectional antenna. The overall analysis is verified by a simulation. The obtained results will be helpful in developing an MAC protocol for enhancing the performance of mmWave wireless personal area networks.

Implementation of Crowd Behavior of Pedestrain based AB and CA mathematical model in Intelligent Game Environment (게임환경에서 AB 와 CA 수학모델을 이용한 보행자들의 집단행동 구현)

  • Kim, Seongdong;Kim, Jonghyun
    • Journal of Korea Game Society
    • /
    • v.19 no.6
    • /
    • pp.5-14
    • /
    • 2019
  • In this paper, we propose a modeling and simulation of group behavioral movement of pedestrians using Agent based and Cellular Automata model in intelligent game environment. The social behaviors of the crowds are complex and important, and based on this, the prototype game-model was implemented to show the crowd interaction on AB and CA in the game environment. Our experiment revealed the promise of group behaviour as a cost-efficient, yet accurate platform for researching crowd behaviour in risk situations with real models.

Code Acquisition with Receive Diversity and Constant False Alarm Rate Schemes: 1. Homogeneous Fading Circumstance (수신기 다양성과 일정 오경보 확률 방법을 쓴 부호획득: 1. 균질 감쇄 환경)

  • Kwon Hyoung-Moon;Oh Jong-Ho;Song Iick-Ho;Lee Ju-Mi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4C
    • /
    • pp.371-380
    • /
    • 2006
  • The performance characteristics of the cell averaging(CA), greatest of(GO), and smallest of(SO) constant false alarm rate(CFAR) processors in homogeneous environment are obtained and compared when receiving antenna diversity is employed in the pseudonoise code acquisition of direct-sequence code division multiple access (DS/CDMA) systems. From the simulation results, it is observed that the CA CFAR scheme has the best performance and the GO CFAR scheme has almost the same performance as the CA CFAR scheme in homogeneous environment. In Part 2 of this paper, the CA, GO, and SO CFAR processors for code acquisition in nonhomogeneous environment are addressed.

Channel Allocation Strategies for Interference-Free Multicast in Multi-Channel Multi-Radio Wireless Mesh Networks

  • Yang, Wen-Lin;Hong, Wan-Ting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.629-648
    • /
    • 2012
  • Given a video stream delivering system deployed on a multicast tree, which is embedded in a multi-channel multi-radio wireless mesh network, our problem is concerned about how to allocate interference-free channels to tree links and maximize the number of serviced mesh clients at the same time. In this paper, we propose a channel allocation heuristic algorithm based on best-first search and backtracking techniques. The experimental results show that our BFB based CA algorithm outperforms previous methods such as DFS and BFS based CA methods. This superiority is due to the backtracking technique used in BFB approach. It allows previous channel-allocated links to have feasibility to select the other eligible channels when no conflict-free channel can be found for the current link during the CA process. In addition to that, we also propose a tree refinement method to enhance the quality of channel-allocated trees by adding uncovered destinations at the cost of deletion of some covered destinations. Our aim of this refinement is to increase the number of serviced mesh clients. According to our simulation results, it is proved to be an effective method for improving multicast trees produced by BFB, BFS and DFS CA algorithms.

Simulation of ATP Metabolism in Cardiac Excitation - Contraction Coupling

  • Matsuoka, Satoshi;Sarai, Nobuaki;Jo, Hikari;Noma, Akinori
    • Proceedings of the Korean Biophysical Society Conference
    • /
    • 2003.06a
    • /
    • pp.19-19
    • /
    • 2003
  • We have developed a cardiac cell model (Kyoto Model) for the sinoatrial node and ventricle, which is composed of a common set of kinetic equations of membrane ionic currents, Ca$\^$2+/dynamics of sarcoplasmic reticulum and contractile protein. To expand this model by including metabolic pathways, the intracellular ATP metabolism, which is pivotal in cardiac excitation - contraction coupling, was incorporated. ATP consumption by the sarcolemmal Na$\^$+/ pump and the Ca pump in the sarcoplasmic reticulum were calculated with stoichiometry of 3Na:2K:1ATP and 2Ca:1ATP, respectively. ATP consumption by contraction was estimated according to experimental data. Dependence of contraction on ATP and inorganic phosphate was modeled, based on data of skinned cardiac fiber. in production by mitochondrial oxidative phosphorylation was modified from Korzeniewski '||'&'||' Zoladz (2001), and creatine kinase and adenylate kinase reactions were incorporated. ATP dependence of ATP-sensitive K channel and L type Ca channel were also included.

  • PDF

An Energy Efficient Clustering Algorithm in Mobile Adhoc Network Using Ticket Id Based Clustering Manager

  • Venkatasubramanian, S.;Suhasini, A.;Vennila, C.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.341-349
    • /
    • 2021
  • Many emerging mobile ad-hoc network application communications are group-oriented. Multicast supports group-oriented applications efficiently, particularly in a mobile environment that has a limited bandwidth and limited power. Energy effectiveness along with safety are 2 key problem in MANET design. Within this paper, MANET is presented with a stable, energy-efficient clustering technique. In this proposed work advanced clustering in the networks with ticket ID cluster manager (TID-CMGR) has formed in MANET. The proposed routing scheme makes secure networking the shortest route possible. In this article, we propose a Cluster manager approach based on TICKET-ID to address energy consumption issues and reduce CH workload. TID-CMGR includes two mechanism including ticket ID controller, ticketing pool, route planning and other components. The CA (cluster agent) shall control and supervise the functions of nodes and inform to TID-CMGR. The CH conducts and transfers packets to the network nodes. As the CH energy level is depleted, CA elects the corresponding node with elevated energy values, and all new and old operations are simultaneously stored by CA at this time. A simulation trial for 20 to 100 nodes was performed to show the proposed scheme performance. The suggested approach is used to do experimental work using the NS- simulator. TIDCMGR is compared with TID BRM and PSO to calculate the utility of the work proposed. The assessment shows that the proposed TICKET-ID scheme achieves 90 percent more than other current systems.

Distributed Certificate Authority under the GRID-Location Aided Routing Protocol (Ad hoc 네트워크에서 GRID-Location Aided Routing 프로토콜을 이용한 분산 CA 구성)

  • Lim, Ji-Hyung;Kang, Jeon-Il;Koh, Jae-Young;Han, Kwang-Taek;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.59-69
    • /
    • 2005
  • Ad hoc network is the network which can be considered without a pre-constructed infrastructure, and a mobile node can join the network freely. However, the participation of the mobile nodes to the ad hoc network brings up much burden of re-computation for new routes, because it leads to losing the connection frequently. And, also, it causes serious security problem to be broadcasted wrong information by the malicious user. Therefore, it needs authentication against the mobile nodes. To make that Possible, we have two methods: single CA and distributed CA. In the case of CA method, the wireless network can be collapsed owing to expose the CA, but still the distributed CA method is a little more safe than previous one because it needs attacks toward a lot of CAs to collapse the network We can consider Secret Share scheme as the method that constructs the distributed CA system, but it is weak when the network size is too large. In this paper, we suggest hierarchical structure for the authentication method to solve this problem, and we will show the results of simulation for this suggestion.