• Title/Summary/Keyword: Hierarchical Transmission

Search Result 215, Processing Time 0.024 seconds

Facile in situ Formation of CuO/ZnO p-n Heterojunction for Improved H2S-sensing Applications

  • Shanmugasundaram, Arunkumar;Kim, Dong-Su;Hou, Tian Feng;Lee, Dong Weon
    • Journal of Sensor Science and Technology
    • /
    • v.29 no.3
    • /
    • pp.156-161
    • /
    • 2020
  • In this study, hierarchical mesoporous CuO spheres, ZnO flowers, and heterojunction CuO/ZnO nanostructures were fabricated via a facile hydrothermal method. The as-prepared materials were characterized in detail using various analytical methods such as powder X-ray diffraction, micro Raman spectroscopy, X-ray photoelectron spectroscopy, field-emission scanning electron microscopy, and transmission electron microscopy. The obtained results are consistent with each other. The H2S-sensing characteristics of the sensors fabricated based on the CuO spheres, ZnO flowers, and CuO/ZnO heterojunction were investigated at different temperatures and gas concentrations. The sensor based on ZnO flowers showed a maximum response of ~141 at 225 ℃. The sensor based on CuO spheres exhibited a maximum response of 218 at 175 ℃, whereas the sensor based on the CuO/ZnO nano-heterostructure composite showed a maximum response of 344 at 150 ℃. The detection limit (DL) of the sensor based on the CuO/ZnO heterojunction was ~120 ppb at 150 ℃. The CuO/ZnO sensor showed the maximum response to H2S compared with other interfering gases such as ethanol, methanol, and CO, indicating its high selectivity.

User Authentication Mechanism of Ad-hoc Network (Ad Hoc망의 사용자 인증 메커니즘)

  • Lee, Cheol-Seung;Park, Do-Jun;Shin, Myung-Suk;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.713-716
    • /
    • 2004
  • In this paper we challenge the user Authentication using Kerberos V5 authentication protocol in Ad-hoc network environment. Ad-hoc network is a collection of wireless mobile nodes without the support of a stationary infrastructure. and DSR routing protocol, which is one of famous mobile ad-hoc routing protocols, has the following network path problem. this paper is the security structure that defined in a mobile network and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses Ad-hoc based structure and transmission hierarchical security back of a mobile network, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal.

  • PDF

A SES Alarmed Link Encryption Synchronization Method for High-speed Video Data Encryption (고속 영상데이터 암호화에 적합한 SES Alarmed 링크 암호동기 방식)

  • Kim, HyeongRag;Lee, HoonJae;Kwon, DaeHoon;Pak, UiYoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2891-2898
    • /
    • 2013
  • CCSDS Standard is widely used in international space telecommunication area. In this standard, Encryption is realized using a unique hierarchical encryption protocol and satisfied security requirements of communication channels. For synchronization, encryption sync is attached in the beginning of encrypted data. But exceptional case(timing jittering, abnormal system shutdown, etc.) is occurred, receiving equipment cannot decrypt received data. In this paper, we propose a SES Alarmed link encryption synchronization method for sending warning signal to the transmitter when some problems have been occurred during the transmission and we also suggest optimum conditions for SES Alarm signal through performance analysis.

Design and Implementation of a Universal System Control Strategy Applicable to VSC-HVDC Systems

  • Zhao, Yue;Shi, Li-bao;Ni, Yi-xin;Xu, Zheng;Yao, Liang-zhong
    • Journal of Power Electronics
    • /
    • v.18 no.1
    • /
    • pp.225-233
    • /
    • 2018
  • This paper proposes a universal system control strategy for voltage source converter (VSC) based high voltage direct current (HVDC) systems. The framework of the designed control strategy consists of five layer structures considering the topology and control characteristics of the VSC-HVDC system. The control commands sent from the topmost layer can be transmitted to the next layer based on the existing communication system. When the commands are sent to each substation, the following transmission of commands between the four lower layers are realized using the internal communication system while ignoring the communication delay. This hierarchical control strategy can be easily applied to any VSC-HVDC system with any topology. Furthermore, an integrated controller for each converter is designed and implemented considering all of the possible operating states. The modular-designed integrated controller makes it quite easy to extend its operating states if necessary, and it is available for any kind of VSC. A detailed model of a VSC-HVDC system containing a DC hub is built in the PSCAD/EMTDC environment. Simulation results based on three operating conditions (the start-up process, the voltage margin control method and the master-slave control method) demonstrate the flexibility and validity of the proposed control strategy.

Implementation of Efficient Network Selection System for Mobile IPTV (Mobile IPTV를 위한 효율적 네트워크 선택 시스템 구현)

  • Jeon, Min-Ho;Kang, Chul-Gyu;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.996-1001
    • /
    • 2010
  • In this paper, network selection algorithm for services of mobile IPTV(internet protocol television) and implementation of a hierarchical processing system for reducing overload by terminal with low speed is proposed. This algorithm selects the network according to the following priorities derived from formulas; value that uses remaining bandwidth, network cost, signal strength. If terminal has a low processing power for using selected network and TV service, quality of service declines due to the system overloading. Hence, we implemented system which processes selected network and TV services accomplished by layer divided. Through experiments results, the method of direct user network selection waits for bandwidth assignment. However, on the one hand, that waiting time in exhausted situation will be very long. On the other hand, if we consider the priority plot of used networks, we should select the network with the best state. Therefore, data transmission rate will keep on average and the waiting time will be low.

A Study on the Application of Block Chain to Ensure Data Integrity in MANET Environment (MANET 환경에서 데이터 무결성 보장을 위한 블록체인 적용에 관한 연구)

  • Yang, Hwanseok;Choi, Daesoo
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.53-58
    • /
    • 2018
  • MANET transmits data by hop-by-hop method because it is composed of mobile nodes without support of any infrastructure. Its structure is very similar to a block chain. However, it is exposed to various threats such as data tampering or destruction by malicious nodes because of transmission method. So, ensuring the integrity of transmitted data is an important complement to MANET. In this paper, we propose a method to apply the block chain technique in order to protect the reliability value of the nodes consisting the network from malicious nodes. For this, hierarchical structure of a cluster type is used. Only cluster head stores the reliability information of the nodes in a block and then, this can be spread. In addition, we applied block generation difficulty automatic setting technique using the number of nodes selecting cluster head and the reliability of cluster head to prevent the spread of wrong blocks. This can prevent block generation and spread by malicious nodes. The superior performance of the proposed technique can be verified by comparing experiments with the SAODV technique.

  • PDF

A Bio-inspired Hybrid Cross-Layer Routing Protocol for Energy Preservation in WSN-Assisted IoT

  • Tandon, Aditya;Kumar, Pramod;Rishiwal, Vinay;Yadav, Mano;Yadav, Preeti
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1317-1341
    • /
    • 2021
  • Nowadays, the Internet of Things (IoT) is adopted to enable effective and smooth communication among different networks. In some specific application, the Wireless Sensor Networks (WSN) are used in IoT to gather peculiar data without the interaction of human. The WSNs are self-organizing in nature, so it mostly prefer multi-hop data forwarding. Thus to achieve better communication, a cross-layer routing strategy is preferred. In the cross-layer routing strategy, the routing processed through three layers such as transport, data link, and physical layer. Even though effective communication achieved via a cross-layer routing strategy, energy is another constraint in WSN assisted IoT. Cluster-based communication is one of the most used strategies for effectively preserving energy in WSN routing. This paper proposes a Bio-inspired cross-layer routing (BiHCLR) protocol to achieve effective and energy preserving routing in WSN assisted IoT. Initially, the deployed sensor nodes are arranged in the form of a grid as per the grid-based routing strategy. Then to enable energy preservation in BiHCLR, the fuzzy logic approach is executed to select the Cluster Head (CH) for every cell of the grid. Then a hybrid bio-inspired algorithm is used to select the routing path. The hybrid algorithm combines moth search and Salp Swarm optimization techniques. The performance of the proposed BiHCLR is evaluated based on the Quality of Service (QoS) analysis in terms of Packet loss, error bit rate, transmission delay, lifetime of network, buffer occupancy and throughput. Then these performances are validated based on comparison with conventional routing strategies like Fuzzy-rule-based Energy Efficient Clustering and Immune-Inspired Routing (FEEC-IIR), Neuro-Fuzzy- Emperor Penguin Optimization (NF-EPO), Fuzzy Reinforcement Learning-based Data Gathering (FRLDG) and Hierarchical Energy Efficient Data gathering (HEED). Ultimately the performance of the proposed BiHCLR outperforms all other conventional techniques.

Research on the deformation characteristics and support methods of the cross-mining roadway floor influence by right-angle trapezoidal stope

  • Zhaoyi Zhang;Wei Zhang
    • Geomechanics and Engineering
    • /
    • v.37 no.3
    • /
    • pp.293-306
    • /
    • 2024
  • Influenced by the alternating effects of dynamic and static pressure during the mining process of close range coal seams, the surrounding rock support of cross mining roadway is difficult and the deformation mechanism is complex, which has become an important problem affecting the safe and efficient production of coal mines. The paper takes the inclined longwall mining of the 10304 working face of Zhongheng coal mine as the engineering background, analyzes the key strata fracture mechanism of the large inclined right-angle trapezoidal mining field, explores the stress distribution characteristics and transmission law of the surrounding rock of the roadway affected by the mining of the inclined coal seam, and proposes a segmented and hierarchical support method for the cross mining roadway affected by the mining of the close range coal seam group. The research results indicate that based on the derived expressions for shear and tensile fracture of key strata, the ultimate pushing distance and ultimate suspended area of a right angle trapezoidal mining area can be calculated and obtained. Within the cross mining section, along the horizontal direction of the coal wall of the working face, the peak shear stress is located near the middle of the boundary. The cracks on the floor of the cross mining roadway gradually develop in an elliptical funnel shape from the shallow to the deep. The dual coupling support system composed of active anchor rod support and passive U-shaped steel shed support proposed in this article achieves effective control of the stability of cross mining roadways, which achieves effective control of floor by coupling active support and preventive passive support to improve the strength of the surrounding rock itself. The research results are of great significance for guiding the layout, support control, and safe mining of cross mining roadways, and to some extent, can further enrich and improve the relevant theories of roof movement and control.

Smart-Coord: Enhancing Healthcare IoT-based Security by Blockchain Coordinate Systems

  • Talal Saad Albalawi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.32-42
    • /
    • 2024
  • The Internet of Things (IoT) is set to transform patient care by enhancing data collection, analysis, and management through medical sensors and wearable devices. However, the convergence of IoT device vulnerabilities and the sensitivity of healthcare data raises significant data integrity and privacy concerns. In response, this research introduces the Smart-Coord system, a practical and affordable solution for securing healthcare IoT. Smart-Coord leverages blockchain technology and coordinate-based access management to fortify healthcare IoT. It employs IPFS for immutable data storage and intelligent Solidity Ethereum contracts for data integrity and confidentiality, creating a hierarchical, AES-CBC-secured data transmission protocol from IoT devices to blockchain repositories. Our technique uses a unique coordinate system to embed confidentiality and integrity regulations into a single access control model, dictating data access and transfer based on subject-object pairings in a coordinate plane. This dual enforcement technique governs and secures the flow of healthcare IoT information. With its implementation on the Matic network, the Smart-Coord system's computational efficiency and cost-effectiveness are unparalleled. Smart-Coord boasts significantly lower transaction costs and data operation processing times than other blockchain networks, making it a practical and affordable solution. Smart-Coord holds the promise of enhancing IoT-based healthcare system security by managing sensitive health data in a scalable, efficient, and secure manner. The Smart-Coord framework heralds a new era in healthcare IoT adoption, expertly managing data integrity, confidentiality, and accessibility to ensure a secure, reliable digital environment for patient data management.

The Design Group Communications Management for Groupware Environment (공동작업환경을위한 그룹통신관리방식 설계)

  • Gung, Sang-Hwan;Gu, Yeon-Seol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.1
    • /
    • pp.127-143
    • /
    • 1996
  • Advanced countries are very active in deploying the National Information I infrastructure which provides universal service to promise fruitful quality of futuree life. Even in the distributed environment, we can closely converse, work together, and share information in a very convenient way. This is actually enabled with the help of groupware technology, which are currently focused and researched in a larger popularity. The aim of this study is to design a portable pack for group communications management to support the development of groupware application. In the paper we begin with technical survey, continue to build our own model for group communications man agement, and design its architecture and procedure. We also suggest group addressing mechanism under Internet environment such as how to create IP multicast address and IP port number dynamically and as a globally unique value for the communication session, with the help of the hierarchical and distributed address managers. We also indicate the reliable data transmission services to remedy the unreliable feature of the UDP multicast services, and finally the architecture/ applied to support the practical applications is briefly discussed for verification of the designed concept.

  • PDF