• Title/Summary/Keyword: Chain topology

Search Result 58, Processing Time 0.022 seconds

A-PEGASIS : Advanced Power Efficient GAthering in Sensor Information Systems (개선된 센서 라우팅 방식 : A-PEGASIS)

  • Suh, Chang-Jin;Yang, Jin-Ung
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.6
    • /
    • pp.458-465
    • /
    • 2007
  • Wireless Sensor Network(WSN) is a special network that collects measured data by sensor nodes in the predefined sensor field and forwards them to the base station in a distance using their own routing scheme. WSN requires routing techniques to maximize energy efficiency because sensor nodes have non-rechargeable and thus limited energy. Characteristics of WSN are various according to applications, many of routing algorithms have been proposed. This paper proposes an algorithm called A-PEGASIS that basically bases on PEGASIS and enhances in two aspects - an elegant chain generation algorithm and periodical update of chains. We compare performance of the previous algorithm of LEACH, PEGASIS, PEDAP and PEDAP-PA with ours through simulation. It confirms that the A-PEGASIS is most superior in terms of average WSN lifetime and high probability of node survival rate during WSN life time.

A Study on Secure Routing Technique using Trust Value and Key in MANET (신뢰도와 키를 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.69-77
    • /
    • 2015
  • MANET is composed of only the mobile nodes have a limited transmission range. The dynamic topology by the frequent movement of nodes makes routing difficult and is also cause exposed to security vulnerabilities. In this paper, we propose the security routing technique consisted of mechanism of two steps in order to respond effectively to attack by the modification of the routing information and transmit secure data. The hierarchical structure is used and the authentication node that issues the key of the nodes within each cluster is elected in this proposed method. The authentication node manages key issues and issued information for encrypting the routing information from the source node. The reliability value for each node is managed to routing trust table in order to secure data transmission. In the first step, the route discovery is performed using this after the routing information is encrypted using the key issued by the authentication node. In the second step, the average reliability value of the node in the found path is calculated. And the safety of the data transmission is improved after the average reliability value selects the highest path. The improved performance of the proposed method in this paper was confirmed through comparative experiments with CBSR and SEER. It was confirmed a better performance in the transmission delay, the amount of the control packet, and the packet transmission success ratio.

A GENERALIZATION OF THE PRIME RADICAL OF IDEALS IN COMMUTATIVE RINGS

  • Harehdashti, Javad Bagheri;Moghimi, Hosein Fazaeli
    • Communications of the Korean Mathematical Society
    • /
    • v.32 no.3
    • /
    • pp.543-552
    • /
    • 2017
  • Let R be a commutative ring with identity, and ${\phi}:{\mathfrak{I}}(R){\rightarrow}{\mathfrak{I}}(R){\cup}\{{\varnothing}\}$ be a function where ${\mathfrak{I}}(R)$ is the set of all ideals of R. Following [2], a proper ideal P of R is called a ${\phi}$-prime ideal if $x,y{\in}R$ with $xy{\in}P-{\phi}(P)$ implies $x{\in}P$ or $y{\in}P$. For an ideal I of R, we define the ${\phi}$-radical ${\sqrt[{\phi}]{I}}$ to be the intersection of all ${\phi}$-prime ideals of R containing I, and show that this notion inherits most of the essential properties of the usual notion of radical of an ideal. We also investigate when the set of all ${\phi}$-prime ideals of R, denoted $Spec_{\phi}(R)$, has a Zariski topology analogous to that of the prime spectrum Spec(R), and show that this topological space is Noetherian if and only if ${\phi}$-radical ideals of R satisfy the ascending chain condition.

An Optimal Power-Throughput Tradeoff Study for MIMO Fading Ad-Hoc Networks

  • Yousefi'zadeh, Homayoun;Jafarkhani, Hamid
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.334-345
    • /
    • 2010
  • In this paper, we study optimal tradeoffs of achievable throughput versus consumed power in wireless ad-hoc networks formed by a collection of multiple antenna nodes. Relying on adaptive modulation and/or dynamic channel coding rate allocation techniques for multiple antenna systems, we examine the maximization of throughput under power constraints as well as the minimization of transmission power under throughput constraints. In our examination, we also consider the impacts of enforcing quality of service requirements expressed in the form of channel coding block loss constraints. In order to properly model temporally correlated loss observed in fading wireless channels, we propose the use of finite-state Markov chains. Details of fading statistics of signal-to-interference-noise ratio, an important indicator of transmission quality, are presented. Further, we objectively inspect complexity versus accuracy tradeoff of solving our proposed optimization problems at a global as oppose to a local topology level. Our numerical simulations profile and compare the performance of a variety of scenarios for a number of sample network topologies.

Development of a Transport Method to use Continuous Cableway System for Transmission Line Construction Work (송전선로 건설공사 연삭 삭도공법 개발)

  • Baik, Seung-Do;Min, Byeong-Wook;Kim, Sang-Duk;Choi, Jin-Sung;Kim, Do-Hwa
    • Proceedings of the KIEE Conference
    • /
    • 2005.07a
    • /
    • pp.679-681
    • /
    • 2005
  • The materials for transmission line construction were transported by road which opened in mountainous areas until the mid 1990s, However, from the mid 1990s, as social interest in the environment standard increases, a cable way and helicopter transport methods of construction have been applied to minimize damage to the environment and to build an environmental friendly system. The current cable way method is a single cable way system which has a lower section base to load materials into a carriage and carry them to the tower construction site by use of an engine and a main rope. Then the carriage lowers itself via a slope between the tower construction site and the lower section base. The single cable way system has the demerits of site acquisition for the lower section base, forest felling when installing the wire rope, and it is not applicable to a even topology Also it has to be installed separately at each tower site. Accordingly, to carry materials without forest felling and regardless of slope, the chain cable way system was developed to provide materials for more than two towers consecutively by use of an engine carriage and winch.

  • PDF

Molecular Characterization and Expression Pattern of Na+-K+-2Cl- Cotransporter 2 (NKCC2) in the Intestine of Starry Flounder Platichthys stellatus after Bacterial Challenge

  • Kim, Yi Kyung;Nam, Yoon Kwon
    • Fisheries and Aquatic Sciences
    • /
    • v.18 no.2
    • /
    • pp.173-181
    • /
    • 2015
  • We identified the $Na^+-K^+-2Cl^-$ cotransporter 2 (NKCC2) cDNA isoform from starry flounder, Platichthys stellate. The NKCC2 cDNA encoded a polypeptide of 1,043 amino acids representing 12 putative transmembrane domains based on the bioinformatic topology prediction. In addition, starry flounder NKCC2 possessed highly conserved residues within transmembrane domain 4, known as an essential site for its function. End-point reverse transcription-polymerase chain reaction analysis revealed that the NKCC2 transcript was moderately expressed only in the anterior and posterior intestines and the rectum. The NKCC2 mRNA level in the rectum, but not in other segments, was significantly induced 3 days post Streptococcus parauberis challenge, indicating that excess salt may be transported into the rectum. Taken together, our data indicate that an S. parauberis infection could tip the intestinal fluid balance in favor of fluid accumulation, indicating that bacterial pathogens can interfere with intestinal osmotic balance and normal mucosal immune homeostasis.

Two Phase Clocked Adiabatic Static CMOS Logic and its Logic Family

  • Anuar, Nazrul;Takahashi, Yasuhiro;Sekine, Toshikazu
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.10 no.1
    • /
    • pp.1-10
    • /
    • 2010
  • This paper proposes a two-phase clocked adiabatic static CMOS logic (2PASCL) circuit that utilizes the principles of adiabatic switching and energy recovery. The low-power 2PASCL circuit uses two complementary split-level sinusoidal power supply clocks whose height is equal to $V_{dd}$. It can be directly derived from static CMOS circuits. By removing the diode from the charging path, higher output amplitude is achieved and the power consumption of the diode is eliminated. 2PASCL has switching activity that is lower than dynamic logic. We also design and simulate NOT, NAND, NOR, and XOR logic gates on the basis of the 2PASCL topology. From the simulation results, we find that 2PASCL 4-inverter chain logic can save up to 79% of dissipated energy as compared to that with a static CMOS logic at transition frequencies of 1 to 100 MHz. The results indicate that 2PASCL technology can be advantageously applied to low power digital devices operated at low frequencies, such as radio-frequency identifications (RFIDs), smart cards, and sensors.

Fast Component Placement with Optimized Long-Stroke Passive Gravity Compensation Integrated in a Cylindrical/Tubular PM Actuator

  • Paulides, J.J.H.;Encica, L.;Meessen, K.J.;Lomonova, E.A.
    • Journal of international Conference on Electrical Machines and Systems
    • /
    • v.2 no.3
    • /
    • pp.275-282
    • /
    • 2013
  • Applications such as vibration isolation, gravity compensation, pick-and-place machines, etc., would benefit from (long-stroke) cylindrical/tubular permanent magnet (PM) actuators with integrated passive gravity compensation to minimize the power consumption. As an example, in component placing (pick-and-place) machines on printed circuit boards, passive devices allow the powerless counteraction of translator including nozzles or tooling bits. In these applications, an increasing demand is arising for high-speed actuation with high precision and bandwidth capability mainly due to the placement head being at the foundation of the motion chain, hence, a large mass of this device will result in high force/power requirements for the driving mechanism (i.e. an H-bridge with three linear permanent magnet motors placed in an H-configuration). This paper investigates a tubular actuator topology combined with passive gravity compensation. These two functionalities are separately introduced, where the combination is verified using comprehensive three dimensional (3D) finite element analyses.

Blockchain-Based Mobile Cryptocurrency Wallet

  • Yeom, Gwyduk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.59-66
    • /
    • 2019
  • As the monetary value of cryptocurrency increases, the security measures for cryptocurrency becomes more important. A limitation of the existing cryptocurrency exchanges is their vulnerability to threats of hacking due to their centralized manner of management. In order to overcome such limitation, blockchain technology is increasingly adopted. The blockchain technology enables decentralization and Peer-to-Peer(P2P) transactions, in which blocks of information are linked in chain topology, and each node participating in the blockchain shares a distributed ledger. In this paper, we propose and implement a mobile electronic wallet that can safely store, send and receive cryptocurrencies. The proposed mobile cryptocurrency wallet connects to the network only when the wallet actively is used. Wallet owner manages his or her private key offline, which is advantageous in terms of security. JavaScript based wallet apps were implemented to respectively run on Android and iOS mobile phones. I demonstrate the process of transferring Ethereum cryptocurrency from an account to another account through Ropsten, a test net for Ethereum. Hardware wallets, such as Ledger Nano S, provide a slightly higher level of security, yet have the disadvantages of added burden of carrying additional physical devices and high costs (about 80$).

Molecular dynamics simulation of short peptide in DPC micelle using explicit water solvent parameters

  • Kim, Ji-Hun;Yi, Jong-Jae;Won, Hyung-Sik;Son, Woo Sung
    • Journal of the Korean Magnetic Resonance Society
    • /
    • v.22 no.4
    • /
    • pp.139-143
    • /
    • 2018
  • Short antimicrobial peptide, A4W, have been studied by molecular dynamics (MD) simulation in an explicit dodecylphosphocholine (DPC) micelle. Peptide was aligned with DPC micelle and transferred new peptide-micelle coordinates within the same solvent box using specific micelle topology parameters. After initial energy minimization and equilibration, the conformation and orientation of the peptide were analyzed from trajectories obtained from the RMD (restrained molecular dynamics) or the subsequent free MD. Also, the information of solvation in the backbone and the side chain of the peptide, hydrogen bonding, and the properties of the dynamics were obtained. The results showed that the backbone residues of peptide are either solvated using water or in other case, they relate to hydrogen bonding. These properties could be a critical factor against the insertion mode of interaction. Most of the peptide-micelle interactions come from the hydrophobic interaction between the side chains of peptide and the structural interior of micelle system. The interaction of peptide-micelle, electrostatic potential and hydrogen bonding, between the terminal residues of peptide and the headgroups in micelle were observed. These interactions could be effect on the structure and flexibility of the peptide terminus.