• Title/Summary/Keyword: ONE-TIME

Search Result 31,293, Processing Time 0.056 seconds

Adjusting Transmission Power for Real-Time Communications in Wireless Sensor Networks

  • Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.1
    • /
    • pp.21-26
    • /
    • 2012
  • As the new requirements for wireless sensor networks are emerging, real-time communications is becoming a major research challenge because resource-constrained sensor nodes are not powerful enough to accommodate the complexity of the protocol. In addition, an efficient energy management scheme has naturally been a concern in wireless sensor networks for a long time. However, the existing schemes are limited to meeting one of these two requirements. To address the two factors together, we propose real-time communications with two approaches, a protocol for satisfied conditions and one for unsatisfied. Under the satisfied requirement, existing real-time protocol is employed. On the other hand, for the unsatisfied requirement, the newly developed scheme replaces the existing scheme by adjusting the transmission range of some surplus nodes. By expanding the transmission range, the end-to-end delay is shortened because the number of intermediate nodes decreases. These nodes conserve their energy for real-time communications by avoiding other activities such as sensing, forwarding, and computing. Finally, simulation results are given to demonstrate the feasibility of the proposed scheme in high traffic environments.

A Repair-Time Limit Replacement Model with Imperfect Repair (불완전 수리에서의 수리시간한계를 가진 교체모형)

  • Chung, Il Han;Yun, Won Young
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.4
    • /
    • pp.233-238
    • /
    • 2013
  • This article concerns a profit model in a repair limit replacement problem with imperfect repair. If a system fails, we should decide whether we repair the failed system (repair option) or replace it by new one (replacement option with a lead time). We assume that repair times are random variables and can be estimated before repair with estimation error. If the estimated repair time is less than the specified limit (repair time limit), the failed unit is repaired but the unit after repair is different from the new one (imperfect repair). Otherwise, we order a new unit to replace the failed unit. The long run average profit (expected profit rate) is used as an optimization criterion and the optimal repair time limit maximizes the expected profit rate. Some special cases are derived.

Timed-Transfer of Buses (동시환승(Timed-Transfer) 버스시스템)

  • 고승영
    • Journal of Korean Society of Transportation
    • /
    • v.13 no.4
    • /
    • pp.105-115
    • /
    • 1995
  • This paper deals with an operation concept of "time-transfer of buses", in which buses arrive a transfer center at the same time and allow passengers to transfer to other bus lines, so that passengerscan go anywhere all the timed-transfere buses operate with only one transfer. This timed-transfer bus system is known as an efficient operating technique which can be adopted in an area with sparsely distrubuted bus demand. A model of timed-transfer is estabilished in terms of vaious factors such as the expected(or average) arrival time, distribution of arrival time, timed-transfer cycle, shceduled departure time, etc. It is assumed that the objective of timed-transfer bus system is to minimize the total transfer waiting time. The optimal schedualed arrival time or buffer time(time required to arrive ealy in consideration of delay) is analyzed for a general case and various speicial cases. It was found that the optiaml buffer time is an inverse funcion of the timed-transfer cycl and increases with the cycle time, assumin g that there is a fixed scheduled departure time at the transfer cetner regardless of whether one or more buses fail to arrive before the scheduled departure time. If buses are to wait uhtil all the buses arrive at the transfer center, that is, the transfer departure time is vairable, the optimal scheduled arrival times can be obtained by a mathmatical programming.

  • PDF

Multiple Pipelined Hash Joins using Synchronization of Page Execution Time (페이지 실행시간 동기화를 이용한 다중 파이프라인 해쉬 결합)

  • Lee, Kyu-Ock;Weon, Young-Sun;Hong, Man-Pyo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.7
    • /
    • pp.639-649
    • /
    • 2000
  • In the relational database systems, the join operation is one of the most time-consuming query operations. Many parallel join algorithms have been developed to reduce the execution time. Multiple hash join algorithm using allocation tree is one of most efficient ones. However, it may have some delay on the processing each node of allocation tree, which is occurred in tuple-probing phase by the difference between one page reading time of outer relation and the processing time of already read one. In this paper, to solve the performance degrading problem by the delay, we develop a join algorithm using the concept of 'synchronization of page execution time' for multiple hash joins. We reduce the processing time of each nodes in the allocation tree and improve the total system performance. In addition, we analyze the performance by building the analytical cost model and verify the validity of it by various performance comparison with previous method.

  • PDF

A Location based Two-Factor L-OTP Protocol (위치기반 Two-Factor L-OTP 프로토콜)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.327-330
    • /
    • 2011
  • After releasing the smart phone equipping the strong computational capability compared to traditional mobil phone, a field of services, which is available on the personal computers, is expanded to smart phone. The development of technology reduces the limited service utilization on time and space but it has a venerability exposing an information to malicious user. Especially we need to more attention when using the financial services which communicate the user's private information. To solve the security problem, OTP(One Time Pad), which uses a private key for a session, is recommended. OTP techniques in smart phone having focused on traditional environments have been proposed and implemented. However, security over mobile environments is more vulnerable to attack and has restriction on resources than traditional system. For this reason, definition of proper conceptual OTP on smart phone is required. In the paper, we present the L-OTP(Location-OTP) protocol, using T-OTP(Time One Time Pad) technique with location information. Proposal generates the OTP using unique location information which is obtained in smart phone.

Improving an RFID Mutual Authentication Protocol using One-time Random Number (개선한 일회성 난수를 이용한 RFID 상호인증 프로토콜)

  • Yoon, Eun-Jun;Yoo, Kee-Young
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.2
    • /
    • pp.90-97
    • /
    • 2009
  • In 2008, Kim-Jun proposed a RFID mutual authentication protocol using one-time random number that can withstand malicious attacks by the leakage of important information and resolve the criminal abuse problems. Through the security analysis, they claimed that the proposed protocol can withstand various security attacks including the replay attack. However, this paper demonstrates that Kim-Jun' s RFID authentication protocol still insecure to the replay attack. In addition, this paper also proposes a simply improved RFID mutual authentication protocol using one-time random number which not only provides same computational efficiency, but also withstands the replay attack.

On a Enhanced Mobile OTP generator design using Transaction (이체정보를 활용한 강화된 모바일 OTP 생성기 설계)

  • Park, Beum-Su;Cho, Sang-Il;Kim, Tae-Yong;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.227-228
    • /
    • 2010
  • Generated One-Time Password (OTP) is used only once. This attributes is to safety than to repeated use the same password. Recently, Park's proposed on "Design of A One-time Password Generator on A Mobile Phone Providing An Additional Authentication for A Particular Transaction" use challenge-response based one-time password generator. However, Challenge exchange problem and currently OTP the same security level. In this paper, Park's proposed OTP generator design for us analysis. And then presents a resolution to the problem and new system logic. New system strong to Man-In-Middle attack and replay attack. In addition, OTP security level is higher.

  • PDF

Robust Deadbeat Current Control Method for Three-Phase Voltage-Source Active Power Filter

  • Nishida, Katsumi;Ahmed, Tarek;Nakaoka, Mutsuo
    • Journal of Power Electronics
    • /
    • v.4 no.2
    • /
    • pp.102-111
    • /
    • 2004
  • This paper is concerned with a deadbeat current control implementation of shunt-type three-phase active power filter (APF). Although the one-dimensional deadbeat control method can attain time-optimal response of APF compensating current, one sampling period is actually required fur its settling time. This delay is a serious drawback for this control technique. To cancel such a delay and one more delay caused by DSP execution time, the desired APF compensating current has to be predicted two sampling periods ahead. Therefore an adaptive predictor is adopted for the purpose of both predicting the control error of two sampling periods ahead and bringing the robustness to the deadbeat current control system. By adding the adaptive predictor output as an adjustment term to the reference value of half a source voltage period before, settling time is made short in a transient state. On the other hand, in a steady state, THD (total harmonic distortion) of the utility grid side AC source current can be reduced as much as possible, compared to the case that ideal identification of controlled system could be made.

Finite element formulation and analysis of Timoshenko beam excited by transversely fluctuating supports due to a real seismic wave

  • Kim, Yong-Woo;Cha, Seung Chan
    • Nuclear Engineering and Technology
    • /
    • v.50 no.6
    • /
    • pp.971-980
    • /
    • 2018
  • Using the concept of quasi-static decomposition and using three-noded isoparametric locking-free element, this article presents a formulation of the finite element method for Timoshenko beam subjected to spatially different time-dependent motions at supports. To verify the validity of the formulation, three fixed-hinged beams excited by the real seismic motions are examined; one is a slender beam, another is a stocky one, and the other is an intermediate one. The numerical results of time histories of motions of the three beams are compared with corresponding analytical solutions. The internal loads such as bending moment and shearing force at a specific time are also compared with analytic solutions. These comparisons show good agreements. The comparisons between static components of the internal loads and the corresponding total internal loads show that the static components predominate in the stocky beam, whereas the dynamic components predominate in the slender one. Thus, the total internal loads of the stocky beam, which is governed by static components, can be predicted simply by static analysis. Careful numerical experiments indicate that the fundamental frequency of a beam can be used as a parameter identifying such a stocky beam.

The Stability of Yin-Yang Temperament in Middle School Students (중학생에 있어서 음양 기질의 안정성)

  • Lee, Soo Jin;Chae, Han
    • Journal of Sasang Constitutional Medicine
    • /
    • v.31 no.1
    • /
    • pp.94-101
    • /
    • 2019
  • Objectives The Yin-Yang construct was shown to have stable internal reliability or consistency using Sasang Personality Questionnaire (SPQ) throughout the various ages, however the study of stability over specific period of time was only conducted using adults. The purpose of the study was to examine the stability across the time using middle school students whose physical and psychological characteristics were most rapidly changing. Methods The 122 middle school students (65 boys and 57 girls) completed the SPQ at 1st year and 2nd year with one-year time difference. Cronbach's ${\alpha}$ and Pearson's correlation analysis were employed in order to show the internal consistency and stability over one-year interval after considering sex difference. Results The internal consistency of SPQ-T, SPQ-B, SPQ-C, SPQ-E using Cronbach's ${\alpha}$ were .61, .72, .28, .28 in 2016 and .62, .72, .26, .46 in 2017. The one-year test-retest reliability of SPQ-T, SPQ-B, SPQ-C, SPQ-E using Pearson's correlation analysis were .56, .61, .31, .23 in boys and .58, .63, .64, .29 in girls. Conclusion The current study showed the stability of Yin-Yang temperament across the one-year time suggesting that the Yin-Yang temperament is quite stable and measurable concept and the SPQ would be considered as an objective and reliable personality assessment.