• Title/Summary/Keyword: Efficient Use

Search Result 7,016, Processing Time 0.038 seconds

Interactive Multipath Routing Protocol for Improving the Routing Performance in Wireless Sensor Networks

  • Jung, Kwansoo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.79-90
    • /
    • 2015
  • Multipath routing technique is recognized as one of the effective approaches to improve the reliability of data forwarding. However, the traditional multipath routing focuses only on how many paths are needed to ensure a desired reliability. For this purpose, the protocols construct additional paths and thus cause significant energy consumption. These problems have motivated the study for the energy-efficient and reliable data forwarding. Thus, this paper proposes an energy-efficient concurrent multipath routing protocol with a small number of paths based on interaction between paths. The interaction between paths helps to reinforce the multipath reliability by making efficient use of resources. The protocol selects several nodes located in the radio overlapped area between a pair of paths as bridge nodes for the path-interaction. In order to operate the bridge node efficiently, when the transmission failure has detected by overhearing at each path, it performs recovery transmission to recover the path failure. Simulation results show that proposed protocol is superior to the existing multipath protocols in terms of energy consumption and delivery reliability.

Design of GE subgroup based User Authentication Protocol For efficient Electric Commerce (효율적 전자상거래를 위한 유한체 서브그룹 기반의 사용자 인증 프로토콜 설계)

  • 정경숙;홍석미;정태충
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.1
    • /
    • pp.209-220
    • /
    • 2004
  • If protocol has fast operations and short key length, it can be efficient user authentication protocol. Lenstra and Verheul proposed XTR. XTR have short key length and fast computing speed. Therefore, this can be used usefully in complex arithmetic. In this paper, to design efficient user authentication protocol we used a subgroup of Galois Field to problem domain. Proposed protocol does not use GF(p/sup 6/) that is existent finite field, and uses GF(p²) that is subgroup and solves problem. XTR-ElGamal based user authentication protocol reduced bit number that is required when exchange key by doing with upside. Also, proposed protocol provided easy calculation and execution by reducing required overhead when calculate. In this paper, we designed authentication protocol with y/sub i/ = g/sup b.p/sup 2(i-1)//ㆍv mol q, 1(equation omitted) 3 that is required to do user authentication.

  • PDF

An Efficient Algorithm for Mining Frequent Closed Itemsets Using Transaction Link Structure (트랜잭션 연결 구조를 이용한 빈발 Closed 항목집합 마이닝 알고리즘)

  • Han, Kyong Rok;Kim, Jae Yearn
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.32 no.3
    • /
    • pp.242-252
    • /
    • 2006
  • Data mining is the exploration and analysis of huge amounts of data to discover meaningful patterns. One of the most important data mining problems is association rule mining. Recent studies of mining association rules have proposed a closure mechanism. It is no longer necessary to mine the set of all of the frequent itemsets and their association rules. Rather, it is sufficient to mine the frequent closed itemsets and their corresponding rules. In the past, a number of algorithms for mining frequent closed itemsets have been based on items. In this paper, we use the transaction itself for mining frequent closed itemsets. An efficient algorithm is proposed that is based on a link structure between transactions. Our experimental results show that our algorithm is faster than previously proposed methods. Furthermore, our approach is significantly more efficient for dense databases.

SEC Approach for Detecting Node Replication Attacks in Static Wireless Sensor Networks

  • Sujihelen, L.;Jayakumar, C.;Senthilsingh, C.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.6
    • /
    • pp.2447-2455
    • /
    • 2018
  • Security is more important in many sensor applications. The node replication attack is a major issue on sensor networks. The replicated node can capture all node details. Node Replication attacks use its secret cryptographic key to successfully produce the networks with clone nodes and also it creates duplicate nodes to build up various attacks. The replication attacks will affect in routing, more energy consumption, packet loss, misbehavior detection, etc. In this paper, a Secure-Efficient Centralized approach is proposed for detecting a Node Replication Attacks in Wireless Sensor Networks for Static Networks. The proposed system easily detects the replication attacks in an effective manner. In this approach Secure Cluster Election is used to prevent from node replication attack and Secure Efficient Centralized Approach is used to detect if any replicated node present in the network. When comparing with the existing approach the detection ratio, energy consumption performs better.

Path Planning for Parking using Multi-dimensional Path Grid Map (다차원 경로격자지도를 이용한 주차 경로계획 알고리즘)

  • Choi, Jong-An;Song, Jae-Bok
    • The Journal of Korea Robotics Society
    • /
    • v.12 no.2
    • /
    • pp.152-160
    • /
    • 2017
  • Recent studies on automatic parking have actively adopted the technology developed for mobile robots. Among them, the path planning scheme plans a route for a vehicle to reach a target parking position while satisfying the kinematic constraints of the vehicle. However, previous methods require a large amount of computation and/or cannot be easily applied to different environmental conditions. Therefore, there is a need for a path planning scheme that is fast, efficient, and versatile. In this study, we use a multi-dimensional path grid map to solve the above problem. This multi-dimensional path grid map contains a route which has taken a vehicle's kinematic constraints into account; it can be used with the $A^*$ algorithm to plan an efficient path. The proposed method was verified using Prescan which is a simulation program based on MATLAB. It is shown that the proposed scheme can successfully be applied to both parallel and vertical parking in an efficient manner.

Efficient Data Transmission Method for UPnP Based Robot Middleware (UPnP 기반 로봇 미들웨어의 효율적 데이터 전송)

  • Kim, Kyung-San;Ahn, Sang-Chul;Kwon, Yong-Moo;Ko, Hee-Dong;Kim, Hyoung-Gon
    • The Journal of Korea Robotics Society
    • /
    • v.4 no.1
    • /
    • pp.68-73
    • /
    • 2009
  • The UPnP is middleware architecture that supports dynamic distributed computing environment. It has many good features for possible use as middleware in robot system integration. There is a need for bulky binary data transmission between distributed robot S/W components. Since the UPnP utilizes SOAP protocol for message transmission, however, it is not efficient to send bulky binary data. In order to overcome this weak point, this paper proposes UPnP-MTOM, MTOM (Message Transmission Optimization Mechanism) implementation over UPnP, as an efficient way for bulky binary data transmission with UPnP messages. This paper presents our implementation method and experimental results of the UPnP-MTOM implementation.

  • PDF

A Study on the efficient Performance Appraisal System of Hotels (호텔의 효율적 인사고과제도에 관한 연구)

  • 신혜숙
    • Journal of Applied Tourism Food and Beverage Management and Research
    • /
    • v.8
    • /
    • pp.145-162
    • /
    • 1997
  • Performance appraisal system is to evaluate employee' work performance, work ability and work attitude. It becomes a important foundation of personnel management. This system's goal is to accomplish employee ability development. The purpose of this study is to make some contributions in order to efficient performance appraisal system of hotels by analyzing the problems of current performance appraisal system. The suggestions for efficient performance appraisal system are as follows: 1. Performance appraisal by job analysis. 2. Though evaluators' training for objective assessment. 3. The assistance system of appraisal results for employees. 4. Magnifying use of appraisal results. 5. Object management strategy by using self-rating.

  • PDF

An Efficient Requantization for Transcoding of MPEG Video

  • Hwang, Hee-Chul;Kim, Duk-Gyoo
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1023-1026
    • /
    • 2002
  • In this paper, we propose an efficient transcoding of MPEG video. Transcoding is the process of converting a compressed video format to another different compressed video format. We propose an simple and efficient transcoding by requantization in which MPEG coded video at high bit-rate is converted into MPEG bitstream at lower bit-rate. To reduce a image quality degradation, we use HVS(Human Visual System) that is the effect that visibility of noise is less in high activity regions than in low activity regions. By using the effect, the part of image in high activity region is coarsely quantized without seriously degrading the image quality. Experimental results show that the proposed method can provide good performance.

  • PDF

Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information Systems

  • Jung, Jaewook;Moon, Jongho;Won, Dongho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3720-3746
    • /
    • 2017
  • At present, numerous hospitals and medical institutes have implemented Telecare Medicine Information Systems (TMIS) with authentication protocols to enable secure, efficient electronic transactions for e-medicine. Numerous studies have investigated the use of authentication protocols to construct efficient, robust health care services, and recently, Liu et al. presented an authenticated key agreement mechanism for TMIS. They argued that their mechanism can prevent various types of attacks and preserve a secure environment. However, we discovered that Liu et al.'s mechanism presents some vulnerabilities. First, their mechanism uses an improper identification process for user biometrics; second, the mechanism is not guaranteed to protect against server spoofing attacks; third, there is no session key verification process in the authentication process. As such, we describe how the above-mentioned attacks operate and suggest an upgraded security mechanism for TMIS. We analyze the security and performance of our method to show that it improves security relative to comparable schemes and also operates in an efficient manner.

Implementation of Integrated CPU-GPU for Efficient Uniform Memory Access Method and Verification System (CPU-GPU간 긴밀성을 위한 효율적인 공유메모리 접근 방법과 검증 시스템 구현)

  • Park, Hyun-moon;Kwon, Jinsan;Hwang, Tae-ho;Kim, Dong-Sun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.2
    • /
    • pp.57-65
    • /
    • 2016
  • In this paper, we propose a system for efficient use of shared memory between CPU and GPU. The system, called Fusion Architecture, assures consistency of the shared memory and minimizes cache misses that frequently occurs on Heterogeneous System Architecture or Unified Virtual Memory based systems. It also maximizes the performance for memory intensive jobs by efficient allocation of GPU cores. To test between architectures on various scenarios, we introduce the Fusion Architecture Analyzer, which compares OpenMP, OpenCL, CUDA, and the proposed architecture in terms of memory overhead and process time. As a result, Proposed fusion architectures show that the Fusion Architecture runs benchmarks 55% faster and reduces memory overheads by 220% in average.