• Title/Summary/Keyword: Data Transmission Processing

Search Result 901, Processing Time 0.022 seconds

Performance Improvement of Cert-Validation of Certification based on FM Subcarrier Broadcasting (FM방식을 이용한 인증서 유효성 검증의 성능 향상)

  • 장홍종;이성은;이정현
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.3-13
    • /
    • 2002
  • There are cases that revoke the certification because of disclosure of private key, deprivation of qualification and the expiration of a term of validity on PKI. So, a user has to confirm the public key whether valid or invalid in the certification. There are many methods such as CRL, Delta-CRL, OCSP for the cert-validation of certification. But these methods have many problems, which cause overload traffic on network and the CRL server because of realtime processing for cert-validation of certification. In this paper we proposed cert-validation of certification improvement method based on FM Subcarrier Broadcasting, which solved problems that are data integrity by different time between transmission and receiving for CRL, and overload traffic on network and the CRL server the realtime management.

Underwater Multi-media Communication Network based on Star Topology and a Fragmentation Technique (성형망 기반의 수중 다중매체 통신 네트워크와 단편화 기법)

  • Lim, DongHyun;Kim, Seung-Geun;Kim, Changhwa
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.11
    • /
    • pp.1526-1537
    • /
    • 2021
  • Due to the difference between the underwater communication environment and the terrestrial communication environment, the radio communication mainly used on the ground cannot be used in underwater. For this reason, in the underwater communication environment, various communication media such as acoustic waves, infrared rays, light and so on has been studied, but there exist several difficulties in operating them individually due to their physical limitations. The concept for overcoming these difficulties is the very underwater multi-media communication, a method to select a communication medium best suitable for the current underwater environment among underwater communication multimedia whenever there occurs underwater communication failure. In this paper, we present an underwater multi-media communication network based on star topology and a fragmentation and reassembly technique to solve the problems caused by the different MTU (Maximum Transmission Unit) sizes among different underwater communication media. We also present the estimations and analysis on processing times in each of fragmentation and reassembly and the total data amount for transmitting fragments in our proposed underwater multi-media communication network.

Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Network

  • Zhang, Kenan;Li, Xingqian;Ding, Kai;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.241-247
    • /
    • 2022
  • Ad hoc network is self-organized network powered by battery. The reliability of virtual user identification and channel security are reduced when SNR is low due to limited user energy. In order to solve this problem, a joint virtual user identification and channel security en/decoding method is proposed in this paper. Transmitter-receiver-based virtual user identification code is generated by executing XOR operation between orthogonal address code of transmitter and pseudo random address code of receiver and encrypted by channel security code to acquire orthogonal random security sequence so as to improve channel security. In order to spread spectrum as well as improve transmission efficiency, data packet is divided into 6-bit symbols, each symbol is mapped with an orthogonal random security sequence. Subspace-based method is adopted by receiver to process received signal firstly, and then a judgment model is established to identify virtual users according to the previous processing results. Simulation results indicate that the proposed method obtains 1.6dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

Control of Electromagnetic Accelermeter with Digital PWM Technique (서오보형 가속도계의 PMW 제어)

  • Kim, Jung-Han;Oh, Jun-Ho;Che, Woo-Seong
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.13 no.8
    • /
    • pp.112-119
    • /
    • 1996
  • Among the various type of accelerometer, the servo rebalancing type accelermoter can be suitable for Inertial Navigation System, because of its high sensitivity and good response in low frequency. In this paper, we proposed a new technology to control inductive tuype accelerometer utilizing digital PWM method. The new developed digital PWM control has special design scheme for transmitting measurement value to outer device in its servo ollp. So it has no quantized error of transforming outputs of sensors to digital domain. The quantized error may make serious problem in INS system, because outputs of sensor are integrated once or twice by digital computer and it happens every sensor reading times. Therefore, in order to get the accurate information such as displacement, it is necessary to measure accurately the input current. In addition, Digital Signal Processing needs digital data transmission, digital PWM method is adaptive for this purpose. We realized a practical circuit for digital PWM control, analyzed the stability of the circuit, and designed the controller etc. In this study, we solved many practical problem for this application, and got out good results.

  • PDF

Evaluation of Multivariate Stream Data Reduction Techniques (다변량 스트림 데이터 축소 기법 평가)

  • Jung, Hung-Jo;Seo, Sung-Bo;Cheol, Kyung-Joo;Park, Jeong-Seok;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.889-900
    • /
    • 2006
  • Even though sensor networks are different in user requests and data characteristics depending on each application area, the existing researches on stream data transmission problem focus on the performance improvement of their methods rather than considering the original characteristic of stream data. In this paper, we introduce a hierarchical or distributed sensor network architecture and data model, and then evaluate the multivariate data reduction methods suitable for user requirements and data features so as to apply reduction methods alternatively. To assess the relative performance of the proposed multivariate data reduction methods, we used the conventional techniques, such as Wavelet, HCL(Hierarchical Clustering), Sampling and SVD (Singular Value Decomposition) as well as the experimental data sets, such as multivariate time series, synthetic data and robot execution failure data. The experimental results shows that SVD and Sampling method are superior to Wavelet and HCL ia respect to the relative error ratio and execution time. Especially, since relative error ratio of each data reduction method is different according to data characteristic, it shows a good performance using the selective data reduction method for the experimental data set. The findings reported in this paper can serve as a useful guideline for sensor network application design and construction including multivariate stream data.

Design and Implementation of XML based Global Peer-to-Peer Engine (XML기반 전역 Peer-to-Peer 엔진 설계 및 구현)

  • Kwon Tae-suk;Lee Il-su;Lee Sung-young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1B
    • /
    • pp.73-85
    • /
    • 2004
  • SIn this paper, we introduce our experience for designing and implementing new concept of a global XML-based Peer-to-Peer (P2P) engine to support various P2P applications, and interconnection among PC, Web and mobile computing environments. The proposed P2P engine can support to heterogeneous data exchanges and web interconnection by facilitating with the text-base XML while message exchange are necessary. It is also to provide multi-level security functions as well as to apply different types of security algorithms. The system consist of four modules; a message dispatcher to scheduling and filtering the message, a SecureNet to providing security services and data transmission, a Discovery Manager to constructing peer-to-peer networking, and a Repository Manager to processing data management including XML documents. As a feasibility test, we implement various P2P services such as chatting as a communication service, white-board as an authoring tool set during collaborative working, and a file system as a file sharing service. We also compared the proposed system to a Gnutella in order to measure performance of the systems.

S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1436-1457
    • /
    • 2018
  • Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially in mission critical fields such as the military and in medical applications. Additionally, they play a vital role in the current and future Internet of Things (IoT) services. Lightness and efficiency of a routing protocol are not the only requirements that guarantee success; security assurance also needs to be enforced. This paper proposes a Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs. S-FEAR applies a security model to an existing energy efficient FEAR protocol. As part of this research, the S-FEAR protocol has been analyzed in terms of the communication and processing costs associated with building and applying this model, regardless of the security techniques used. Moreover, the Qualnet network simulator was used to implement both FEAR and S-FEAR after carefully selecting the following security techniques to achieve both authentication and data integrity: the Cipher Block Chaining-Message Authentication Code (CBC-MAC) and the Elliptic Curve Digital Signature Algorithm (ECDSA). The performance of both protocols was assessed in terms of complexity and energy consumption. The results reveal that achieving authentication and data integrity successfully excluded all attackers from the network topology regardless of the percentage of attackers. Consequently, the constructed topology is secure and thus, safe data transmission over the network is ensured. Simulation results show that using CBC-MAC for example, costs 0.00064% of network energy while ECDSA costs about 0.0091%. On the other hand, attacks cost the network about 4.7 times the cost of applying these techniques.

Performance Analysis of Dualrate MC-CDMA Systems Based on Code Grouping (코드그룹화에 의한 이중전송률 MC-CDMA 시스템의 성능분석)

  • Kim, Nam-Sun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.4
    • /
    • pp.112-120
    • /
    • 2006
  • Multicarrier code division multiple access(MC-CDMA) system that combines multicarrier modulation with CDMA offers robustness to frequency selective fading and can support higher rate data transmission with higher spectral efficiency. A new asynchronous MC-CDMA system to implement multiple data rate communications is proposed in this paper. In a W-CDMA downlink the orthogonal variable spreading factor(OVSF) code is used for variable spreading factor for various multimedia traffic. Proposed system utilizes the OVSF code that generated by generation property for spreading. The proposed MC-CDMA system use different lengths of OVSF code as a spreading code according to their data rate. The groupwise processing is accomplished by code grouping in OVSF code generation tree. For the analysis of average BER performance, numerical method and computer simulation were used. We also compare the system performance with that of a single rate MC-CDMA system used orthogonal code as a spreading code.

  • PDF

A Feedback Buffer Control Algorithm for H.264 Video Coding (H.264 동영상 부호기를 위한 Feedback 버퍼 제어 방식)

  • Son Nam Rye;Lee Guee Sang
    • The KIPS Transactions:PartB
    • /
    • v.11B no.6
    • /
    • pp.625-632
    • /
    • 2004
  • Since the H.264 encoding adopts both forward prediction and hi-direction prediction modes and exploits Variable Length Coding(VLC), the amount of data generated from video encoder varies as Flaying time goes by. The fixed bit rate encoding system which has limited transmission channel capacity uses a buffer to control output bitstream It's necessary to control the bitstream to maintain within manageable range so as to protect buffer from overflow or underflow. With existing bit amount control algorithms, the $\lambda_{MODE}$ which is relationship between distortion value and quantization parameter often excesses normal value to end up with video error. This paper proposes an algorithm to protect buffer from overflow or underflow by introducing a new quantization parameter against distortion value of H.264 video data. The test results of 6 exemplary data show that the proposed algorithm has the same PSNR as and up to 8% reduced bit rate against existing algorithms.

Multi-functional Automated Cultivation for House Melon;Development of Tele-robotic System (시설멜론용 다기능 재배생력화 시스템;원격 로봇작업 시스템 개발)

  • Im, D.H.;Kim, S.C.;Cho, S.I.;Chung, S.C.;Hwang, H.
    • Journal of Biosystems Engineering
    • /
    • v.33 no.3
    • /
    • pp.186-195
    • /
    • 2008
  • In this paper, a prototype tele-operative system with a mobile base was developed in order to automate cultivation of house melon. A man-machine interactive hybrid decision-making system via tele-operative task interface was proposed to overcome limitations of computer image recognition. Identifying house melon including position data from the field image was critical to automate cultivation. And it was not simple especially when melon is covered partly by leaves and stems. The developed system was composed of 5 major modules: (a) main remote monitoring and task control module, (b) wireless remote image acquisition and data transmission module, (c) three-wheel mobile base mounted with a 4 dof articulated type robot manipulator (d) exchangeable modular type end tools, and (e) melon storage module. The system was operated through the graphic user interface using touch screen monitor and wireless data communication among operator, computer, and machine. Once task was selected from the task control and monitoring module, the analog signal of the color image of the field was captured and transmitted to the host computer using R.F. module by wireless. A sequence of algorithms to identify location and size of a melon was performed based on the local image processing. Laboratory experiment showed the developed prototype system showed the practical feasibility of automating various cultivating tasks of house melon.