• Title/Summary/Keyword: Network Protocols

Search Result 1,531, Processing Time 0.029 seconds

Performance Improvement Scheme based on Proactive Transmission for Reliable Multicast in Wireless LANs (무선 랜에서 신뢰성 있는 멀티캐스트를 위한 능동적 전송 기반의 성능 향상 방법)

  • Kim, Sun-Myeng;Kim, Si-Gwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.5
    • /
    • pp.16-24
    • /
    • 2011
  • The IEEE 802.11 wireless LAN (Local Area Network) is widely used for wireless access due to its easy deployment and low cost. Multicast in wireless LANs is very useful for transmitting data to multiple receivers compared to unicast to each receiver. In the IEEE 802.11 wireless LAN, multicast transmissions are unreliable since multicast data packets are transmitted without any feedback from receivers. Recently, various protocols have been proposed to enhance the reliability of multicast transmissions. They still have serious problems in reliability and efficiency due to the excessive control overhead by the use of a large number of control packets in the error recovery process, and due to a large number of retransmissions to satisfy all receivers. In this paper, we propose an effective scheme called PTRM(Proactive Transmission based Reliable Multicast). The proposed scheme uses a block erasure code to generate parity packets and to reduce the impact of independent packet error among receivers. After generating parity packets, the PTRM transmits data packets as many as receivers need to recover error, and then requests feedback from them. The simulation results show that the proposed scheme provides reliable multicast while minimizing the feedback overhead.

Power Consumption Analysis of Routing Protocols using Sensor Network Simulator (센서 네트워크 시뮬레이터를 이용한 라우팅 프로토콜의 전력소모량 분석)

  • Kim, Bang-Hyun;Jung, Yong-Doc;Kim, Tea-Kyu;Kim, Jong-Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.414-418
    • /
    • 2006
  • 유비쿼터스 컴퓨팅의 인프라가 되는 센서 네트워크는 매우 작은 하드웨어로 이루어지는 많은 수의 센서 노드들로 구성된다. 이 네트워크의 토폴로지와 라우팅 방식은 그 목적에 따라 결정되어야 하며, 하드웨어 및 소프트웨어도 필요한 경우에는 변경되어야 한다. 따라서 그러한 네트워크를 최적으로 설계하기 위해서는 시스템 동작을 확인하고 성능을 예측할 수 있는 센서 네트워크 시뮬레이터가 필요하다. 현존하는 몇몇 센서 네트워크 시뮬레이터들은 특정 하드웨어나 운영체제에 맞추어 개발되었기 때문에, 그러한 특정 시스템들을 위해서만 사용될 수 있다. 그리고 시스템 설계 상의 주요 이슈가 되는 전력 소모량 및 프로그램 실행 시간을 추정하기 위한 어떤 수단도 지원하지 못하고 있다. 이 연구에서는 기존의 센서 네트워크 시뮬레이터들이 갖고 있는 문제점을 해결한 시뮬레이터를 개발하고, 센서 네트워크의 계층적 라우팅 프로토콜인 LEACH, TEEN, APTEEN의 전력소모량을 시뮬레이션을 이용하여 분석하였다. 시뮬레이션의 작업부하인 명령어 트레이스로는 ATmega128L 마이크로컨트롤러용 크로스컴파일러에 의해 생성된 실행 이미지를 사용하였다. 따라서 각각의 라우팅 프로토콜을 실제 센서 보드에서 동작하는 응용 프로그램으로 구현하고, 컴파일된 실행 이미지를 작업부하로 사용하여 시뮬레이션 하였다. 라우팅 프로그램들은 ETRI의 센서 네트워크 운영체제인 Nano-Q+ 1.6.1을 기반으로 구현되었으며, 하드웨어 플랫폼은 옥타컴의 센서 보드인 Nano-24이다. 시뮬레이션 결과에 따르면, 센서 네트워크는 그 사용 목적에 따라 라우팅 프로토콜을 적절히 선택해야 한다는 것을 알 수 있다. 즉, LEACH는 주기적으로 네트워크의 상황을 체크해야 하는 경우에 적합하고, TEEN은 환경의 변화를 수시로 감지해야 하는 경우에 적합하다. 그리고 APTEEN은 전력소모량과 기능 측면을 모두 고려할 때 가장 효과적인 라우팅 프로토콜이라고 할 수 있다.iRNA 상의 의존관계를 분석할 수 있었다.수안보 등 지역에서 나타난다 이러한 이상대 주변에는 대개 온천이 발달되어 있었거나 새로 개발되어 있는 곳이다. 온천에 이용하고 있는 시추공의 자료는 배제하였으나 온천이응으로 직접적으로 영향을 받지 않은 시추공의 자료는 사용하였다 이러한 온천 주변 지역이라 하더라도 실제는 온천의 pumping 으로 인한 대류현상으로 주변 일대의 온도를 올려놓았기 때문에 비교적 높은 지열류량 값을 보인다. 한편 한반도 남동부 일대는 이번 추가된 자료에 의해 새로운 지열류량 분포 변화가 나타났다 강원 북부 오색온천지역 부근에서 높은 지열류량 분포를 보이며 또한 우리나라 대단층 중의 하나인 양산단층과 같은 방향으로 발달한 밀양단층, 모량단층, 동래단층 등 주변부로 NNE-SSW 방향의 지열류량 이상대가 발달한다. 이것으로 볼 때 지열류량은 지질구조와 무관하지 않음을 파악할 수 있다. 특히 이러한 단층대 주변은 지열수의 순환이 깊은 심도까지 가능하므로 이러한 대류현상으로 지표부근까지 높은 지온 전달이 되어 나타나는 것으로 판단된다.의 안정된 방사성표지효율을 보였다. $^{99m}Tc$-transferrin을 이용한 감염영상을 성공적으로 얻을 수 있었으며, $^{67}Ga$-citrate 영상과 비교하여 더 빠른 시간 안에 우수한 영상을 얻을 수 있었다. 그러므로 $^{99m}Tc$-transierrin이 감염 병소의 영상진단에 사용될 수 있을 것으로 기대된다.리를 정량화 하였다. 특히 선조체에서의 도파민 유리에 의한 수용체 결합능의 감소는 흡연에 의한 혈중 니코틴의 축적 농도와 양의 상관관계를 보였다(rho=0.9, p=0.04). 결론: $[^{11}C]raclopride$ PET을 이용하여 비흡연 정상인에서 흡연에 의한 도파민 유리를 영상화 및 정량화 하였고, 흡연에 의한 선조체내 도파민 유리는 흡연시 흡수된

  • PDF

An Enhanced WLAN MAC Protocol for Directional Broadcast (지향성 브로드캐스트를 위한 무선 LAN MAC 프로토콜)

  • Cha, Woo-Suk;Cho, Gi-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.16-27
    • /
    • 2006
  • The wireless transmission medium inherently broadcasts a signal to all neighbor nodes in the transmission range. Existing asynchronous MAC protocols do not provide a concrete solution for reliable broadcast in link layer. This mainly comes from that an omni-directional broadcasting causes to reduce the network performance due to the explosive collisions and contentions. This paper proposes a reliable broadcast protocol in link taller based on directional antennas, named MDB(MAC protocol for Directional Broadcasting). This protocol makes use of DAST(Directional Antennas Statement Table) information and D-MACA(Directional Multiple Access and Collision Avoidance) scheme through 4-way handshake to resolve the many collision problem wit]1 omni-directional antenna. To analyze its performance, MDB protocol is compared with IEEE 802.11 DCF protocol [9] and the protocol 2 of reference [3], in terms of the success rate of broadcast and the collision rate. As a result of performance analysis through simulation, it was confirmed that the collision rate of the MDB protocol is lower than those of IEEE 802.11 and the protocol 2 of reference [3], and that the completion rate of broadcast of MDB protocol is higher than those of IEEE 802.11 and the protocol 2 of reference [3].

eRPL : An Enhanced RPL Based Light-Weight Routing Protocol in a IoT Capable Infra-Less Wireless Networks (사물 인터넷 기반 기기 간 통신 무선 환경에서 향상된 RPL 기반 경량화 라우팅 프로토콜)

  • Oh, Hayoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.357-364
    • /
    • 2014
  • The first mission for the IoT based hyper-connectivity communication is developing a device-to-device communication technique in infra-less low-power and lossy networks. In a low-power and lossy wireless network, IoT devices and routers cannot keep the original path toward the destination since they have the limited memory. Different from the previous light-weight routing protocols focusing on the reduction of the control messages, the proposed scheme provides the light-weight IPv6 address auto-configuration, IPv6 neighbor discovery and routing protocol in a IoT capable infra-less wireless networks with the bloom filer and enhanced rank concepts. And for the first time we evaluate our proposed scheme based on the modeling of various probability distributions in the IoT environments with the lossy wireless link. Specifically, the proposed enhanced RPL based light-weight routing protocol improves the robustness with the multi-paths locally established based on the enhanced rank concepts even though lossy wireless links are existed. We showed the improvements of the proposed scheme up to 40% than the RPL based protocol.

Location Trigger System for the Application of Context-Awareness based Location services

  • Lee, Yon-Sik;Jang, Min-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.149-157
    • /
    • 2019
  • Recent research has been actively carried out on systems that want to optimize resource utilization by analyzing the intended behavior and pattern of behavior of objects (users, consumers). A service system that applies information about an object's location or behavior must include a location trigger processing system for tracking an object's real-time location. In this paper, we analyze design problems for the implementation of a context-awareness based location trigger system, and present system models based on analysis details. For this purpose, this paper introduces the concept of location trigger for intelligent location tracking techniques about moving situations of objects, and suggests a mobile agent system with active rules that can perform monitoring and appropriate actions based on sensing information and location context information, and uses them to design and implement the location trigger system for context-awareness based location services. The proposed system is verified by implementing location trigger processing scenarios and trigger service and action service protocols. In addition, through experiments on mobile agents with active rules, it is suggested that the proposed system can optimize the role and function of the application system by using rules appropriate to the service characteristics and that it is scalable and effective for location-based service systems. This paper is a preliminary study for the establishment of an optimization system for utilizing resources (equipment, power, manpower, etc.) through the active characteristics of systems such as real-time remote autonomous control and exception handling over consumption patterns and behavior changes of power users. The proposed system can be used in system configurations that induce optimization of resource utilization through intelligent warning and action based on location of objects, and can be effectively applied to the development of various location service systems.

A Multi-Dimensional Node Pairing Scheme for NOMA in Underwater Acoustic Sensor Networks (수중 음향 센서 네트워크에서 비직교 다중 접속을 위한 다차원 노드 페어링 기법)

  • Cheon, Jinyong;Cho, Ho-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.1-10
    • /
    • 2021
  • The interest in underwater acoustic sensor networks (UWASNs), along with the rapid development of underwater industries, has increased. To operate UWASNs efficiently, it is important to adopt well-designed medium access control (MAC) protocols that prevent collisions and allow the sharing of resources between nodes efficiently. On the other hand, underwater channels suffer from a narrow bandwidth, long propagation delay, and low data rate, so existing terrestrial node pairing schemes for non orthogonal multiple access (NOMA) cannot be applied directly to underwater environments. Therefore, a multi-dimensional node pairing scheme is proposed to consider the unique underwater channel in UWASNs. Conventional NOMA schemes have considered the channel quality only in node pairing. Unlike previous schemes, the proposed scheme considers the channel gain and many other features, such as node fairness, traffic load, and the age of data packets to find the best node-pair. In addition, the sender employs a list of candidates for node-pairs rather than path loss to reduce the computational complexity. The simulation results showed that the proposed scheme outperforms the conventional scheme by considering the fairness factor with 23.8% increases in throughput, 28% decreases in latency, and 5.7% improvements in fairness at best.

The Current Research Status of Complementary and Integrative Medicine in Practice-Based Research Networks: A Systematic Review (개원의중심연구망에서 수행된 보완통합의학 관련 연구 현황: 체계적 문헌고찰)

  • Won, Jiyoon;Han, Gajin;Kim, Yejin;Park, Jae Rang;Noh, Eunyoung;Ji, Yu-jin;Adams, Jon;Lee, Hyangsook
    • Korean Journal of Acupuncture
    • /
    • v.37 no.4
    • /
    • pp.209-230
    • /
    • 2020
  • Objectives : Practice-Based Research Networks (PBRNs), collaborations of practitioners and academic researchers, have provided platforms for conducting research to address clinical questions generated from daily routine care. This review aimed to critically analyse articles from PBRNs that are related to complementary and integrative medicine (CIM) and to suggest future directions for a PBRN which is appropriate for Korean Medicine (KM). Methods : PubMed, PBRN registries in Agency for Healthcare Research and Quality and relevant PBRN websites were searched up to November 2019 for research articles from PBRNs that focused on CIM regardless of study design. Methodological quality of the included studies was assessed. The included studies were read in full, classified and summarised according to their topics. Results : A total of 51 articles published from 1998 through 2020 were included in this review. They were categorised into three principal themes based on research questions and findings: health services research (embracing researches examining characteristics of patients and CIM practitioners/practices, and communication between patients and practitioners); effectiveness and safety of CIM practices/interventions; and feasibility studies of instruments and interventions in PBRN settings. The study designs varied including surveys (n=30), prospective observational studies (n=6), 2ndary analyses of existing studies (n=7), protocols (n=7), retrospective chart review (n=1) and qualitative study (n=1). Quality of the included studies greatly varied. Conclusions : PBRNs can serve as a feasible platform for conducting practice-relevant research on KM and CIM. Considering growing demands on evidence-base for routine practice of KM amid various stakeholders, a PBRN in KM community and further researches nested within PBRN designs are warranted.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

Deep Learning-Based Computed Tomography Image Standardization to Improve Generalizability of Deep Learning-Based Hepatic Segmentation

  • Seul Bi Lee;Youngtaek Hong;Yeon Jin Cho;Dawun Jeong;Jina Lee;Soon Ho Yoon;Seunghyun Lee;Young Hun Choi;Jung-Eun Cheon
    • Korean Journal of Radiology
    • /
    • v.24 no.4
    • /
    • pp.294-304
    • /
    • 2023
  • Objective: We aimed to investigate whether image standardization using deep learning-based computed tomography (CT) image conversion would improve the performance of deep learning-based automated hepatic segmentation across various reconstruction methods. Materials and Methods: We collected contrast-enhanced dual-energy CT of the abdomen that was obtained using various reconstruction methods, including filtered back projection, iterative reconstruction, optimum contrast, and monoenergetic images with 40, 60, and 80 keV. A deep learning based image conversion algorithm was developed to standardize the CT images using 142 CT examinations (128 for training and 14 for tuning). A separate set of 43 CT examinations from 42 patients (mean age, 10.1 years) was used as the test data. A commercial software program (MEDIP PRO v2.0.0.0, MEDICALIP Co. Ltd.) based on 2D U-NET was used to create liver segmentation masks with liver volume. The original 80 keV images were used as the ground truth. We used the paired t-test to compare the segmentation performance in the Dice similarity coefficient (DSC) and difference ratio of the liver volume relative to the ground truth volume before and after image standardization. The concordance correlation coefficient (CCC) was used to assess the agreement between the segmented liver volume and ground-truth volume. Results: The original CT images showed variable and poor segmentation performances. The standardized images achieved significantly higher DSCs for liver segmentation than the original images (DSC [original, 5.40%-91.27%] vs. [standardized, 93.16%-96.74%], all P < 0.001). The difference ratio of liver volume also decreased significantly after image conversion (original, 9.84%-91.37% vs. standardized, 1.99%-4.41%). In all protocols, CCCs improved after image conversion (original, -0.006-0.964 vs. standardized, 0.990-0.998). Conclusion: Deep learning-based CT image standardization can improve the performance of automated hepatic segmentation using CT images reconstructed using various methods. Deep learning-based CT image conversion may have the potential to improve the generalizability of the segmentation network.

Generative Adversarial Network-Based Image Conversion Among Different Computed Tomography Protocols and Vendors: Effects on Accuracy and Variability in Quantifying Regional Disease Patterns of Interstitial Lung Disease

  • Hye Jeon Hwang;Hyunjong Kim;Joon Beom Seo;Jong Chul Ye;Gyutaek Oh;Sang Min Lee;Ryoungwoo Jang;Jihye Yun;Namkug Kim;Hee Jun Park;Ho Yun Lee;Soon Ho Yoon;Kyung Eun Shin;Jae Wook Lee;Woocheol Kwon;Joo Sung Sun;Seulgi You;Myung Hee Chung;Bo Mi Gil;Jae-Kwang Lim;Youkyung Lee;Su Jin Hong;Yo Won Choi
    • Korean Journal of Radiology
    • /
    • v.24 no.8
    • /
    • pp.807-820
    • /
    • 2023
  • Objective: To assess whether computed tomography (CT) conversion across different scan parameters and manufacturers using a routable generative adversarial network (RouteGAN) can improve the accuracy and variability in quantifying interstitial lung disease (ILD) using a deep learning-based automated software. Materials and Methods: This study included patients with ILD who underwent thin-section CT. Unmatched CT images obtained using scanners from four manufacturers (vendors A-D), standard- or low-radiation doses, and sharp or medium kernels were classified into groups 1-7 according to acquisition conditions. CT images in groups 2-7 were converted into the target CT style (Group 1: vendor A, standard dose, and sharp kernel) using a RouteGAN. ILD was quantified on original and converted CT images using a deep learning-based software (Aview, Coreline Soft). The accuracy of quantification was analyzed using the dice similarity coefficient (DSC) and pixel-wise overlap accuracy metrics against manual quantification by a radiologist. Five radiologists evaluated quantification accuracy using a 10-point visual scoring system. Results: Three hundred and fifty CT slices from 150 patients (mean age: 67.6 ± 10.7 years; 56 females) were included. The overlap accuracies for quantifying total abnormalities in groups 2-7 improved after CT conversion (original vs. converted: 0.63 vs. 0.68 for DSC, 0.66 vs. 0.70 for pixel-wise recall, and 0.68 vs. 0.73 for pixel-wise precision; P < 0.002 for all). The DSCs of fibrosis score, honeycombing, and reticulation significantly increased after CT conversion (0.32 vs. 0.64, 0.19 vs. 0.47, and 0.23 vs. 0.54, P < 0.002 for all), whereas those of ground-glass opacity, consolidation, and emphysema did not change significantly or decreased slightly. The radiologists' scores were significantly higher (P < 0.001) and less variable on converted CT. Conclusion: CT conversion using a RouteGAN can improve the accuracy and variability of CT images obtained using different scan parameters and manufacturers in deep learning-based quantification of ILD.