• Title/Summary/Keyword: Network life-time

Search Result 598, Processing Time 0.03 seconds

Node Incentive Mechanism in Selfish Opportunistic Network

  • WANG, Hao-tian;Chen, Zhi-gang;WU, Jia;WANG, Lei-lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1481-1501
    • /
    • 2019
  • In opportunistic network, the behavior of a node is autonomous and has social attributes such as selfishness.If a node wants to forward information to another node, it is bound to be limited by the node's own resources such as cache, power, and energy.Therefore, in the process of communication, some nodes do not help to forward information of other nodes because of their selfish behavior. This will lead to the inability to complete cooperation, greatly reduce the success rate of message transmission, increase network delay, and affect the overall network performance. This article proposes a hybrid incentive mechanism (Mim) based on the Reputation mechanism and the Credit mechanism.The selfishness model, energy model (The energy in the article exists in the form of electricity) and transaction model constitute our Mim mechanism. The Mim classifies the selfishness of nodes and constantly pay attention to changes in node energy, and manage the wealth of both sides of the node by introducing the Central Money Management Center. By calculating the selfishness of the node, the currency trading model is used to differentiate pricing of the node's services. Simulation results show that by using the Mim, the information delivery rate in the network and the fairness of node transactions are improved. At the same time, it also greatly increases the average life of the network.

Idle Mode for Deep Power Save in IEEE 802.11 WLANs

  • Jin, Sung-Geun;Han, Kwang-Hun;Choi, Sung-Hyun
    • Journal of Communications and Networks
    • /
    • v.12 no.5
    • /
    • pp.480-491
    • /
    • 2010
  • Along with the wide acceptance of IEEE 802.11 wireless local area network (WLAN), new applications such as Internet protocol (IP) telephony over WLAN are fast emerging today. For battery-powered IP phone devices, the life time extension is a key concern for the market acceptance while today's 802.11 is not optimized for snch an operation. In this paper, we propose a novel idle mode operation, which comprises paging, idle handoff, and delayed handoff. Under the idle mode operation, a mobile host(MH) without any active session does not need to perform handoff within a predefined paging area (PA). Only when it enters a new PA, an idle handoff is performed. The proposed idle mode allows an MH without traffic to extend its life time. We develop a new analytical model in order to comparatively evaluate our proposed scheme. The numerical resnlts demonstrate that the proposed scheme outperforms the existing schemes with respect to power consumption.

The Internet Use and Working Life of the Married Women - Focusing on Cases which have a Membership of the Women Portal Site - (인터넷과 기혼여성의 직업생활 - 여성전용 웹사이트 회원의 사례를 중심으로 -)

  • 차성란
    • Journal of Family Resource Management and Policy Review
    • /
    • v.6 no.1
    • /
    • pp.189-212
    • /
    • 2002
  • This study was purposed to explore how the information society effects on the working life of the married women. To answer the question, with theroetical background, 6 married women's cases which were selected through women's portal internet site were analysed. As results, these married women had contracting base, part-time jobs. Their jobs were chacterized by computerizing. They were different with traditional jobs in the industrial society. Internet sites were effectively used for work information network by them. So, in the future, many married women will be able to find working opportunity in a home-based part-time job through internet. And they presented aptitude for their work. Her children and husband were proud of her. They had confidence in their working ability Many women had a project publishing a book, owning a business, and making new products by her own's idea.

  • PDF

Quality of Service using Min-Max Data Size Scheduling in Wireless Sensor Networks

  • Revathi, A.;Santhi, S.G.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.327-333
    • /
    • 2022
  • Wireless Sensor Networks (WSNs) plays an important role in our everyday life. WSN is distributed in all the places. Nowadays WSN devices are developing our world as smart and easy to access and user-friendly. The sensor is connected to all the resources based on the uses of devices and the environment [1]. In WSN, Quality of Service is based on time synchronization and scheduling. Scheduling is important in WSN. The schedule is based on time synchronization. Min-Max data size scheduling is used in this proposed work. It is used to reduce the Delay & Energy. In this proposed work, Two-hop neighboring node is used to reduce energy consumption. Data Scheduling is used to identify the shortest path and transmit the data based on weightage. The data size is identified by three size of measurement Min, Max and Medium. The data transmission is based on time, energy, delivery, etc., the data are sent through the first level shortest path, then the data size medium, the second level shortest path is used to send the data, then the data size is small, it should be sent through the third level shortest path.

Securing Mobile IP Registration Messages in Residential Networks

  • Kim, Young-Bai;Han, Seung-Jo
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.77-82
    • /
    • 2010
  • Residential network is the hybrid technology of wireless, Ethernet, Bluetooth and RF to the internet via broadband connection at home to facilitate the convenient, safe and pleasant daily lives of home user with various home network services regardless of device, time and place. For ubiquitous development more devices will be wireless and most of them will be roaming. Since these roaming devices carry private information of daily life of residential users, the interaction among the roaming devices of residential network must be secure. This paper presents to secure registration of roaming devices using IP Security (IPSec) Protocol Suite without the need to trust foreign agents.

NDIR Multi-Gas Measurement System for Air Quality based on Wireless Sensor Network (무선센서네트워크 기반 공기질 측정을 위한 비분산적외선 복합가스측정시스템)

  • Paik, Seung Hyun;Lee, Jun Yeong;Jung, Sang Woo;Park, Hong Bae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.5
    • /
    • pp.299-304
    • /
    • 2016
  • As public interest in air quality and environment problem is increasing, many researches are being carried out the gas measurement system. Especially, Non-dispersive infrared (NDIR) measurements using Beer-Lambert gas sensing principle with very high selectivity and long life time are noted for reliable method. It is possible to detect various gases such as carbon dioxide (CO2), carbon monoxide (CO), and nitrogen dioxide (NO2), but many researches are mostly concentrated on CO2 sensor. The multi-gas measuring instrument is high price and unwieldy, therefore it is not suitable for wide area required numerous instrument. So we study the NDIR multi-gas measurement system for air quality based on wireless sensor network, and experiment the realized measurement system.

Hierarchical Routing Algorithm for Improving Survivability of WSAN

  • Cho, Ji-Yong;Choi, Seung-Kwon;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.2
    • /
    • pp.51-60
    • /
    • 2016
  • This paper proposes a hierarchical routing algorithm for enhancing survivability of sensor nodes on WSAN. Proposed algorithm has two important parts. The first is a clustering algorithm that uses distance between sensor and actor, and remaining energy of sensor nodes for selecting cluster head. It will induce uniform energy consumption, and this has a beneficial effect on network lifetime. The second is an enhanced routing algorithm that uses the shortest path tree. The energy efficient routing is very important in WSAN which has energy limitation. As a result, proposed algorithm extends network and nodes lifetime through consuming energy efficiently. Simulation results show that the proposed clustering algorithm outperforms conventional routing algorithms such as VDSPT in terms of node and network life time, delay, fairness, and data transmission ratio to BS.

Application of lattice probabilistic neural network for active response control of offshore structures

  • Kim, Dong Hyawn;Kim, Dookie;Chang, Seongkyu
    • Structural Engineering and Mechanics
    • /
    • v.31 no.2
    • /
    • pp.153-162
    • /
    • 2009
  • The reduction of the dynamic response of an offshore structure subjected to wind-generated random ocean waves is of extreme significance in the aspects of serviceability, fatigue life and safety of the structure. In this study, a new neuro-control scheme is applied to the vibration control of a fixed offshore platform under random wave loads to examine the applicability of the proposed method. It is called the Lattice Probabilistic Neural Network (LPNN), as it utilizes lattice pattern of state vectors as the training data of PNN. When control results of the LPNN are compared with those of the NN and PNN, LPNN showed better performance in effectively suppressing the structural responses in a shorter computational time.

Study on Improving Endpoint Security Technology (엔드포인트 공격대응을 위한 보안기법 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.19-25
    • /
    • 2018
  • Endpoint security is a method of ensuring network security by thoroughly protecting multiple individual devices connected to the network. In this study, we survey the functions and features of various commercial products of endpoint security. Also we emphasizes the importance of endpoint security to respond to the increasingly intelligent and sophisticated security threats against the cloud, mobile, artificial intelligence, and IoT based sur-connection era. and as a way to improve endpoint security, we suggest the ways to improve the life cycle of information security such as preemptive security policy implementation, real-time detection and filtering, detection and modification.

  • PDF

Lightweight CNN based Meter Digit Recognition

  • Sharma, Akshay Kumar;Kim, Kyung Ki
    • Journal of Sensor Science and Technology
    • /
    • v.30 no.1
    • /
    • pp.15-19
    • /
    • 2021
  • Image processing is one of the major techniques that are used for computer vision. Nowadays, researchers are using machine learning and deep learning for the aforementioned task. In recent years, digit recognition tasks, i.e., automatic meter recognition approach using electric or water meters, have been studied several times. However, two major issues arise when we talk about previous studies: first, the use of the deep learning technique, which includes a large number of parameters that increase the computational cost and consume more power; and second, recent studies are limited to the detection of digits and not storing or providing detected digits to a database or mobile applications. This paper proposes a system that can detect the digital number of meter readings using a lightweight deep neural network (DNN) for low power consumption and send those digits to an Android mobile application in real-time to store them and make life easy. The proposed lightweight DNN is computationally inexpensive and exhibits accuracy similar to those of conventional DNNs.