• Title/Summary/Keyword: Evaluation Scheme

Search Result 1,521, Processing Time 0.026 seconds

Cross-Layer Cooperative Scheduling Scheme for Multi-channel Hybrid Ubiquitous Sensor Networks

  • Zhong, Yingji;Yang, Qinghai;Kwak, Kyung-Sup;Yuan, Dongfeng
    • ETRI Journal
    • /
    • v.30 no.5
    • /
    • pp.663-673
    • /
    • 2008
  • The multi-scenario topology of multi-channel hybrid ubiquitous sensor networks (USNs) is studied and a novel link auto-diversity cross-layer cooperative scheduling scheme is proposed in this paper. The proposed scheme integrates the attributes of the new performance evaluation link auto-diversity air-time metric and the topology space in the given multi-scenario. The proposed scheme is compared with other schemes, and its superiority is demonstrated through simulations. The simulation results show that relative energy consumption, link reception probability, and end-to-end blocking probability are improved. The addressing ratio of success with unchanged parameters and external information can be increased. The network can tolerate more hops to support reliable transportation when the proposed scheme is implemented. Moreover, the scheme can make the network stable. Therefore, the proposed scheme can enhance the average rate performance of the hybrid USN and stabilize the outage probability.

  • PDF

Adaptive Filtering Scheme for Defense of Energy Consumption Attacks against Wireless Computing Devices

  • Lee, Wan Yeon
    • International journal of advanced smart convergence
    • /
    • v.7 no.3
    • /
    • pp.101-109
    • /
    • 2018
  • In this paper, we propose an adaptive filtering scheme of connection requests for the defense of malicious energy consumption attacks against wireless computing devices with limited energy budget. The energy consumption attack tries to consume the battery energy of a wireless device with repeated connection requests and shut down the wireless device by exhausting its energy budget. The proposed scheme blocks a connection request of the energy consumption attack in the middle, if the same connection request is repeated and its request result is failed continuously. In order to avoid the blocking of innocuous mistakes of normal users, the scheme gives another chance to allow connection request after a fixed blocking time. The scheme changes the blocking time adaptively by comparing the message arriving ate during non-blocking period and that during blocking period. Evaluation shows that the proposed defense scheme saves up to 94% energy consumption compared to the non-defense case.

Performance Evaluation of a New Cooperative MAC Protocol with a Helper Node Selection Scheme in Ad Hoc Networks

  • Jang, Jaeshin
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.199-207
    • /
    • 2014
  • A new cooperative MAC protocol called the busy tone cooperative medium access control (BT-COMAC) protocol is proposed to overcome the drawbacks and maximize the advantages of existing schemes. This scheme uses a new metric called decibel power to decide an appropriate helper node. Using received power strength is more efficient in selecting an appropriate helper node, especially in a densely populated network, than the effective transmission rates used in conventional schemes. All communication nodes in a communication service area are assumed to move independently. Two performance metrics are used: System throughput and channel access delay. A performance evaluation of the BT-COMAC protocol is conducted using a computer simulation over a slow fading wireless channel, and its performance results are compared with those of four existing schemes. The numerical results show that the BT-COMAC protocol improves the system throughput by approximately 15% as compared to the best existing scheme.

Construction of rapid earthquake damage evaluation system - Real-time two-dimensional visualization of ground motion (지진신속피해평가시스템 구축 - 실시간 지진동의 2차원적 영상화)

  • 지헌철;전정수;이희일;박정호;임인섭
    • Proceedings of the Earthquake Engineering Society of Korea Conference
    • /
    • 2002.09a
    • /
    • pp.51-60
    • /
    • 2002
  • In this study we developed the visualization scheme of spatial ground-motion measurements in real time by using DSS data. Even though this scheme itself is useful for national earthquake mitigation plans, this scheme could be served as the crucial core for constructing rapid earthquake damage evaluation system. DSS is the abbreviation of Data Subscription Service and this is the pre-assigned request for the seismic stations to send very limited brief data with high priority and negligible transmission load. In addition to visualize the damage area with intensity, the corresponding epicenter can be estimated roughly for quick event alarm. For the interpolation of spatially irregular PGA data, the program, named as surface. of GMT was used with NetCDF grid file format. Since the grid file is similar to a postscript file, the program, called as shading, was coded with C language by using Matpak library in order to convert grid files into image files.

  • PDF

Parallel Procedure and Evaluation of Parallel Performance of Impact Simulation Based on Two-Step Eulerian Scheme (Two-Step Eulerian 기법에 기반 한 충돌 해석의 병렬처리 및 병렬효율 평가)

  • Kim Seung-Jo;Lee Min-Hyung;Paik Seung-Hoon
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.30 no.10 s.253
    • /
    • pp.1320-1327
    • /
    • 2006
  • Parallel procedure and performance of two-step Eulerian code have not been reported sufficiently yet even though it was developed and utilized widely in the impact simulation. In this study, parallel strategy of two-step Eulerian code was proposed and described in detail. The performance was evaluated in the self-made linux cluster computer. Compared with commercial code, a relatively good performance is achieved. Through the performance evaluation of each computation stage, remap is turned out to be the most time consuming part among the other part such as FE processing, communication, time marching etc.

Communication Scheme Availability Evaluation for Hand off Scheme in Mobile Communication Networks (핸드오프 구조를 갖는 이동통신망에서의 통신 구조 가용도 계정)

  • Lee, Jun-Hyuk;Oh, Young-Hwan
    • Journal of Applied Reliability
    • /
    • v.8 no.4
    • /
    • pp.193-204
    • /
    • 2008
  • In this paper, we proposed availability evaluation of network in mobile communication network that have hand off structure. Radio mobile communication network is essential hand off action to keep communication that is no discontinuance by transfer of terminal. Part by state and hand off state ago hand off by transfer of terminal and communication network is estimated performance according to the hand off rate and hand off completion rate of system. we applied MS, SM, MM communication structure in radio CORBA for network availability evaluate. System availability in mobile communication network that can repair that propose in this study uses the hand off rate and hand off completion rate of system by transfer of terminal and availability of whole system did evaluate.

  • PDF

An Evaluation Scheme of Torsional Irregularity for Seismic Design of Hanok (한옥의 내진설계를 위한 비틀림비정형 평가 방안)

  • Kim, Yeong-Min
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.35 no.10
    • /
    • pp.191-198
    • /
    • 2019
  • In this paper the evaluation scheme for determining torsional irregularity of Hanok has been proposed. The proposed method can evaluate torsional irregularity of Hanok easily only with characteristics of Hanok shapes, arrangement of lateral load resisting frames and their lateral stiffness without time consuming and complicate 3-dimensional structural analysis. The proposed formula is expressed as allowable maximum eccentricity, and torsional irregularity is evaluated by comparing this value with actual eccentricity. The applicability of the proposed scheme was evaluated by applying it to the line shape plan Hanok with two symmetrically arranged walls and the result was expressed by formula and graph. The results showed that the allowable maximum eccentricity is 10% of plan dimension perpendicular to the seismic load when the walls are placed at the extreme end. The proposed formula was expressed as a generalized formula so it can be applied generally to the various plan shape and wall arrangement of Hanok.

A Study on the Evaluation for the Safety of Passing Vessel in the Vicinity of the Seasands Gathering Area By Marine Traffic Safety Diagnostic Scheme (해상교통안전진단제도에 따른 바다모래채취 주변수역에서의 통항선박 안전성 평가에 관한 연구)

  • Kim, Se-Won;Park, Young-Soo;Lee, Yoon-Suk
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.25 no.3
    • /
    • pp.677-689
    • /
    • 2013
  • Recently, the supplying of basic materials for construction of building as sand is big issues due to lack of shoreside supply. For solving this problem, many suppliers attempt to gather aggregate from the sea bottom of the EEZ & west coastal area of Korea. In this regard, the 'Jangantoe' which exists in the westside of the Daesan port is worth noticing as good seasand supplying areas. The Chungnam Aggregate Association have plan to gather of seasand from 'Gaduckdo 5 regions & Igok 3 regions' which lies westside about 6 miles off from the Jangantoe areas. This designated area also locates upper parts of the Gadaeam TSS(Traffic Separation Scheme) which is very useful passing routes for the sailing vessels of Inchon & Daesan ports. In this study, the evaluation of the safety for passing vessels in the vicinity of the seasand gathering area was performed by various methods of radar observations & GICOMS AIS data for marine traffics and vessel traffic-flow simulation of the 'Marine Traffic Safety Diagnostic Scheme'. By the results of this evaluation, I suggested comprehensive countermeasures for the safety of passing vessels in the near the seasand gathering area.

Assessment of a Low Power Offset BPSK Component for Spreading Code Authentication

  • Maier, Daniel S.;Pany, Thomas
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.9 no.2
    • /
    • pp.43-50
    • /
    • 2020
  • In this paper a low power Spreading Code Authentication (SCA) sequence with a BPSK(1) modulation at a frequency offset of +7.161 MHz is tested for authentication purposes, the Galileo E1OS is used as base signal. The tested signals comprise a Galileo constellation with 5 satellites including the Galileo OS Navigation Message Authentication (OSNMA) and a low power offset BPSK (OBPSK(7,1)) as SCA component. The signals are generated with the software based MuSNAT-Signal-Generator. The generated signals were transmitted Over-The-Air (OTA) using a Software-Defined-Radio (SDR) as pseudolite. With a real-environment-testbed the performance of the SCA in real channel conditions (fading and multipath) was tested. A new SCA evaluation scheme is proposed and was implemented. Under real channel conditions we derive experimental threshold values for the new SCA evaluation scheme which allow a robust authentication. A Security Code Estimation and Replay (SCER) spoofing attack was mimicked on the real-environment-testbed and analyzed with the SCA evaluation scheme. It was shown that the usage of an OBPSK is feasible as an authentication method and can be used in combination with the OSNMA to improve the authentication robustness against Security SCER attacks.

Ant Colony Optimization for Feature Selection in Pattern Recognition (패턴 인식에서 특징 선택을 위한 개미 군락 최적화)

  • Oh, Il-Seok;Lee, Jin-Seon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.1-9
    • /
    • 2010
  • This paper propose a novel scheme called selective evaluation to improve convergence of ACO (ant colony optimization) for feature selection. The scheme cutdown the computational load by excluding the evaluation of unnecessary or less promising candidate solutions. The scheme is realizable in ACO due to the valuable information, pheromone trail which helps identify those solutions. With the aim of checking applicability of algorithms according to problem size, we analyze the timing requirements of three popular feature selection algorithms, greedy algorithm, genetic algorithm, and ant colony optimization. For a rigorous timing analysis, we adopt the concept of atomic operation. Experimental results showed that the ACO with selective evaluation was promising both in timing requirement and recognition performance.