• Title/Summary/Keyword: Hop

Search Result 1,600, Processing Time 0.025 seconds

Development of Multipoint Simultaneous Full-duplex Team Communication Module for SCBA (SCBA 면체용 다자간 동시 양방향 팀 통신모듈 개발)

  • Kim, Si-Kuk;Choi, Su-Gil;Lim, Woo-Sub;Han, Yong-Taek
    • Fire Science and Engineering
    • /
    • v.33 no.6
    • /
    • pp.165-172
    • /
    • 2019
  • This study presents the design and manufacture of a self-contained breathing apparatus SCBA wireless communication module with a multipoint simultaneous full-duplex communication system to enable communication between team members wearing the SCBA system. It is necessary for fire-fighters to wear the SCBA system during extinguishing and rescue work at the fire site. Evaluation of the team communication module confirmed the feasibility of communication over more than 500 m in the test condition based on the line of sight. By implementing the Ad-hoc function, it was confirmed that the communication distance could be extended to 128 m by automatic routing up to 3 hoc. The vertical distance inside the building for successful communication was up to the 5th floor in the open staircase and up to the 3rd floor in the partitioned staircase. Furthermore, the performance testing of the communication module assuming a fire situation, confirmed that five team members correctly recognized the standard abbreviation of fire and wireless communication without a separate PTT key operation. In addition, the flame resistance was verified by exposing the module to a flame at 950 ± 50 ℃ for 5 s and then immediately extinguishing the flame.

Efficient Broadcasting Scheme of Emergency Message based on VANET and IP Gateway (VANET과 IP 게이트웨이에 기반한 긴급메시지의 효율적 방송 방법)

  • Kim, Dongwon;Park, Mi-Ryong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.31-40
    • /
    • 2016
  • In vehicular ad-hoc networks (VANETs), vehicles sense information on emergency incidents (e.g., accidents, unexpected road conditions, etc.) and propagate this information to following vehicles and a server to share the information. However, this process of emergency message propagation is based on multiple broadcast messages and can lead to broadcast storms. To address this issue, in this work, we use a novel approach to detect the vehicles that are farthest away but within communication range of the transmitting vehicle. Specifically, we discuss a signal-to-noise ratio (SNR)-based linear back-off (SLB) scheme where vehicles implicitly detect their relative locations to the transmitter with respect to the SNR of the received packets. Once the relative locations are detected, nodes that are farther away will set a relatively shorter back-off to prioritize its forwarding process so that other vehicles can suppress their transmissions based on packet overhearing. We evaluate SLB using a realistic simulation environment which consists of a NS-3 VANET simulation environment, a software-based WiFi-IP gateway, and an ITS server operating on a separate machine. Comparisons with other broadcasting-based schemes indicate that SLB successfully propagates emergency messages with latencies and hop counts that is close to the experimental optimal while reducing the number of transmissions by as much as 1/20.

Reuse Partitioning for Throughput and Fairness Improvement in OFDMA Based Relay System (OFDMA기반 Relay시스템에서 Throughput과 Fairness성능 향상을 위한 Reuse Partitioning기법)

  • Shim, Min-Kyu;Choi, Ho-Young;Hong, Dae-Hyoung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.9
    • /
    • pp.17-24
    • /
    • 2007
  • In this paper, we propose the sub-cell reuse partitioning among relays as an efficient resource reuse scheme in the relay-based OFDMA systems. If the frequency resource is reused among relays aggressively, we can increase the cell throughput. However, the interferences due to the frequency reuse may cause the fairness decrease due to the SINR degradation especially at the edge of RS sub-cells. In this paper, to make the cell throughput and fairness performance improved at the same time, we propose a sub-cell reuse partitioning scheme that divides a relay sub-cell into inner zone for aggressive reuse and outer zone for sparse reuse. The performance of the proposed scheme has been analyzed by computer simulation. We also applied a scheduling algorithm that can work together with the proposed sub-cell reuse partitioning scheme. Simulation results show that the proposed scheme can improve both the throughput and the fairness performances. In particular, when the scheduling is applied for the improvement of fairness, it is shown that the throughput performance can be enhanced more efficiently by the proposed scheme.

Novel Balance Tests for Assessing Functional Ankle Instability: Relationships with BMI and Gender (기능적 족관절 불안정성을 평가할 수 있는 새로운 균형 평가법: 체질량 지수와 성별과의 연관성)

  • Patankar, Harshad P.;Yeo, Eui-Dong;Kim, Seung-Joo;Lim, Hong-Chul;Hwang, Myong-Hoi;Park, Se-Hyun;Kim, Hak-Jun
    • Journal of Korean Foot and Ankle Society
    • /
    • v.16 no.2
    • /
    • pp.128-134
    • /
    • 2012
  • Purpose: To design novel balance tests to assess FAI and evaluate whether these tests are affected by BMI or gender, with the goal of developing reliable FAI assessment tests that are not influenced by these factors. Materials and Methods: Participants included 20 young, healthy volunteers, 12 males and 8 females, with a mean age of $24{\pm}4$ years and a mean BMI of $23{\pm}2.28$. None of the subjects had known ankle instability. The following tests were assessed in each participant: single leg balance (SLB), percentage of leg press (PLP), single leg cycling (SLC), one leg squat (OLS), multiple direction reach-front/back/side (MDR-F/B/S), single leg hop (SLH), two leg jump (TLJ) and side step (SS). Data were analyzed using the SPSS 12.0 software program with ANOVA and t-test used. Results: When grouped by BMI, we found that despite differences in BMI, the performances of all subjects were equivalent except for the one-leg-squat test, for which the mean ratios for underweight ($1.69{\pm}0$), normal weight ($1.05{\pm}0.19$), and overweight ($0.93{\pm}0.30$) individuals were significantly different (p=0.02); ratios for SLB (p=0.273), SLC (p=0.903), PLP (p=0.664), MDR-F/B/S (p=0.498, 0.908, and 0.503, respectively), SLH (p=0.332) were not significantly different. When calculated according to gender, we found that the OLS (p=0.013) and MDRS (p=0.034) were significantly different, while parameters for all the remaining tests were not affected. Conclusion: We found that the SLB, PLP, SLC, MDR-F/B, and SLH ratios were unaffected by BMI or sex and, therefore, are reliable parameters for assessing ankle instability.

Analysis of the Bogus Routing Information Attacks in Sensor Networks (센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석)

  • Lee, Myung-Jin;Kim, Mi-Hui;Chae, Ki-Joon;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.229-238
    • /
    • 2007
  • Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.

Location Privacy Enhanced Routing for Sensor Networks in the Presence of Dormant Sources (휴면 소오스들이 존재하는 환경의 센서 네트워크를 위한 위치 보호 강화 라우팅)

  • Yang, Gi-Won;Lim, Hwa-Jung;Tscha, Yeong-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.1
    • /
    • pp.12-23
    • /
    • 2009
  • Sensor networks deployed in battlefields to support military operations or deployed in natural habitats to monitor the rare wildlifes must take account of protection of the location of valuable assets(i.e., soldiers or wildlifes) from an adversary or malicious tracing as well as the security of messages in transit. In this paper we propose a routing protocol GSLP(GPSR-based Source-Location Privacy) that is capable of enhancing the location privacy of an active source node(i.e., message-originating node) in the presence of multiple dormant sources(i.e., nodes lying nearby an asset whose location needs to be secured). Extended is a simple, yet scalable, routing scheme GPSR(greedy perimeter stateless routing) to select randomly a next-hop node with a certain probability for randomizing paths and to perform perimeter routing for detouring dormant sources so that the privacy strength of the active source, defined as safety period, keeps enhanced. The simulation results obtained by increasing the number of dormant sources up to 1.0% of the total number of nodes show that GSLP yields increased and nearly invariant safety periods, while those of PR-SP(Phantom Routing, Single Path), a notable existing protocol for source-location privacy, rapidly drop off as the number of dormant sources increases. It turns out that delivery latencies of GSLP are roughly less than two-fold of the shortest path length between the active source and the destination.

Distributed Construction of the Recrystallization Topology and Efficient Searching in the Unstructured Peer-to-Peer Network (재결정 위상의 분산적 구성과 비구조적 피어투피어 망에서의 효율적 검색)

  • Park, Jae-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.251-267
    • /
    • 2008
  • In this paper, we present a distributed topology control algorithm for constructing an optimized topology having a minimal search-time in unstructured peer-to-peer network. According to the proposed algorithm, each node selects the best nodes having higher hit-ratio than other nodes as many as the number being exponentially proportional to the hit-ratio of the node itself, and then it connects to them. The ensemble behavior of the proposed algorithm is very similar to the recrystrallizing phenomenon that is observed in nature. There is a partial order relationship among the hit-ratios of most nodes of constructed topology. Therefore once query message visits a node, it has a higher hit-ratio than the node that was visited last by the message. The query message even sent from freeloader can escape to the node having high hit-ratio by one hop forwarding, and it never revisits any freeloader again. Thus the search can be completed within a limited search time. We also propose the Chain-reactive search scheme using the constructed topology. Such a controlled multicasting reduces the query messages by 43 percent compared to that of the naive Gnutella using broadcasting, while it saves the search time by 94 percent. The search success rate of the proposed scheme is 99 percent.

Improved Real-time Transmission Scheme using Temporal Gain in Wireless Sensor Networks (무선 센서 망에서 시간적 이득을 활용한 향상된 실시간 전송 방안)

  • Yang, Taehun;Cho, Hyunchong;Kim, Sangdae;Kim, Cheonyong;Kim, Sang-Ha
    • Journal of KIISE
    • /
    • v.44 no.10
    • /
    • pp.1062-1070
    • /
    • 2017
  • Real-time transmission studies in wireless sensor networks propose a mechanism that exploits a node that has a higher delivery speed than the desired delivery speed in order to satisfy real-time requirement. The desired delivery speed cannot guarantee real-time transmission in a congested area in which none of the nodes satisfy the requirement in one hop because the desired delivery speed is fixed until the packet reaches the sink. The feature of this mechanism means that the packet delivery speed increases more than the desired delivery speed as the packet approaches closer to the sink node. That is, the packet can reach the sink node earlier than the desired time. This paper proposes an improved real-time transmission by controlling the delivery speed using the temporal gain which occurs on the packet delivery process. Using the received data from a previous node, a sending node calculates the speed to select the next delivery node. The node then sends a packet to a node that has a higher delivery speed than the recalculated speed. Simulation results show that the proposed mechanism in terms of the real-time transmission success ratio is superior to the existing mechanisms.

Proximity-based Overlay Network Routing for Service Discovery in Mobile Ad-Hoc Network (이동 애드혹 망에서의 서비스 검색을 위한 근접성 기반 오버레이 네트워크 라우팅)

  • Yoon Hyeon-Ju;Lee Eunju;Jeong Hyunku;Kim Jin-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.643-658
    • /
    • 2004
  • Mobile ad hoc networks(MANET) have recently attrarted a lot of attention in the research community as well as in industry. Although the previous research mainly focused on the various problems of MANET in data link and network layers, we consider, in this paper, how to efficiently support applications such as service discovery on top of MANET. Peer-to-Peer(P2P) overlay network can be adopted to service discovery mechanism because P2P and MANET share certain similarities, primarily the fact that both arc instances of self-organizing decentralized systems. Especially, distributed hash table(DHT) systems used for r2r overlay network can be effective in reducing the communication overhead in service discovery. However, since overlay network is independent of physical network topology and existing topology-aware mechanisms are based on the wired network, they are inefficient in MANET. We propose a proximity-based overlay network routing to overcome the inefficiency of routing in overlay network. In the proximity-based overlay network routing, each node collects information of physically close nodes by using one hop broadcast and routes messages to the logically closest node to destination. In a detailed ns-2 simulation study, we show that the proximity-based overlay network routing reduces the number of physical hops comparable to the flooding-based mechanism with low communication overhead. We also find that the proposed scheme works well in the mobile environment.

A Tuber Lectin from Arisaema jacquemontii Blume with Anti-insect and Anti-proliferative Properties

  • Kaur, Manpreet;Singh, Kuljinder;Rup, Pushpinder Jai;Kamboj, Sukhdev Singh;Saxena, Ajit Kumar;Sharma, Madhunika;Bhagat, Madhulika;Sood, Sarvesh Kumar;Singh, Jatinder
    • BMB Reports
    • /
    • v.39 no.4
    • /
    • pp.432-440
    • /
    • 2006
  • A tuber lectin from Arisaema jacquemontii Blume belonging to family Araceae was purified by employing a single step affinity chromatography using column of asialofetuin-linked amino activated silica beads and the bound lectin was eluted with 100 mM glycine-HCl buffer pH 2.5. The purified A. jacquemontii lectin (AJL) showed a single protein band with an apparent molecular mass of 13.4 kDa when submitted to SDS-polyacrylamide gel electrophoresis under reducing as well as non-reducing conditions. The native molecular mass of AJL determined by gel filtration on a Biogel P-200 column was 52 kDa and its carbohydrate content was estimated to be 3.40%. Thus AJL is a tetrameric glycoprotein. The purified lectin agglutinated erythrocytes from rabbit but not from human. Its activity was not inhibited by any of the mono- and disaccharides tested except N-acetyl-D-lactosamine having minimal inhibitory sugar concentration (MIC) 25 mM. Among the glycoproteins tested only asialofetuin was found to be inhibitory (MIC $125\;{\mu}g/mL$). A single band was obtained in native PAGE at pH 4.5 while PAGE at pH 8.3 showed two bands. Isoelectric focusing of AJL gave multiple bands in the pI range of 4.6-5.5. When incorporated in artificial diet AJL significantly affected the development of Bactrocera cucurbitae (Coquillett) larvae indicating the possibility of using this lectin in a biotechnological strategy for insect management of cucurbits. Larvae fed on artificial diet containing sub-lethal dose of AJL showed a significant decrease in acid phosphatase and alkaline phosphatase activity while esterase activity markedly increased as compared to larvae fed on diet without lectin. Out of various human cancer cell lines employed in sulphorhodamine B (SRB) assay, this lectin was found to have appreciable inhibitory effect on the in vitro proliferation of HCT-15, HOP-62, SW-620, HT-29, IMR-32, SKOV-3, Colo-205, PC-3, HEP-2 and A-549 cancer cell lines by 82, 77, 73, 70, 41, 41, 37, 29, 21 and 21% respectively.