• Title/Summary/Keyword: One-Way Transmission

Search Result 260, Processing Time 0.028 seconds

An energy efficient clustering scheme by adjusting group size in zigbee environment (Zigbee 환경에서 그룹 크기 조정에 의한 에너지 효율적인 클러스터링 기법)

  • Park, Jong-Il;Lee, Kyoung-Hwa;Shin, Yong-Tae
    • Journal of Sensor Science and Technology
    • /
    • v.19 no.5
    • /
    • pp.342-348
    • /
    • 2010
  • The wireless sensor networks have been extensively researched. One of the issues in wireless sensor networks is a developing energy-efficient clustering protocol. Clustering algorithm provides an effective way to extend the lifetime of a wireless sensor networks. In this paper, we proposed an energy efficient clustering scheme by adjusting group size. In sensor network, the power consumption in data transmission between sensor nodes is strongly influenced by the distance of two nodes. And cluster size, that is the number of cluster member nodes, is also effected on energy consumption. Therefore we proposed the clustering scheme for high energy efficiency of entire sensor network by controlling cluster size according to the distance between cluster header and sink.

A Study on Efficient Friendly Forces Location Data Sharing on Battalion and Below

  • Kim, Hyung-Seok;Shin, Sang-Heon;Kim, Yong-Cheol;Lee, Jeong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.95-101
    • /
    • 2018
  • In this paper, we propose an efficient friendly forces location data sharing algorithm in a troops using a low bandwidth radio. The future battlefield is a 'Network Centric Warfare' with a concept of identifying the position and power of the enemy and friendly forces and leading the battlefield to victory through proper links at the time of our need. One of the basic elements in the 'Network Centric Warfare' is to share friendly forces location data. The bandwidth and transmission rates of radio used in battalion are low. Nevertheless, we should share our locations data almost in real time for effective fighting in a war situation. This paper describes the efficient method of friendly forces location data sharing based on low bandwidth radio. In particular, the concept of 'network-centered warfare' is reflected in the troop below the battalion to present an integrated and efficient way to shared location data of friendly forces.

Authentication Protocol for Inter-Vehicle Communication in Vehicular Ad Hoc Networks (VANET 상에서의 차량간 통신을 위한 인증 프로토콜)

  • Park, Young-Ho;Na, Jin-Han;Moon, Sang-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.2
    • /
    • pp.81-85
    • /
    • 2009
  • In VANET, it is required one-way broadcast transmission because vehicles move at high speed and warning messages need to broadcast. our protocol employs digital signatures to authenticate nodes along the path. this prevents impersonation attacks and message modification attacks. our protocol also employs the node list to recognize intermediate nodes of the path. The node list, the time, and the nonce can prevent replay attacks.

Trends and Development Prospects in Broadcasting Technology (방송 기술 동향 및 발전 전망)

  • J.S. Um;B.M. Lim;H.Y. Jung;S.K. Ahn;H.J. Yim;J.H. Seo
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.2
    • /
    • pp.43-53
    • /
    • 2024
  • The media environment is rapidly evolving to be tailored to viewers using personal mobile devices in accordance with technological evolution and changes in social structures. Broadcast media technology is also advancing to enable new services, including data casting, in various reception environments beyond the existing fixed environment and one-way audio/video content services. In addition, technologies to increase the transmission capacity to accommodate next-generation large-capacity media content as well as communication network utilization and convergence technologies are being developed to facilitate interactive services and expand the broadcasting coverage. We discuss the current status and future prospects in broadcasting technology for terrestrial and mobile communication systems and analyze broadcasting technology elements for upcoming media environments relying on generative artificial intelligence.

A New Emergency-Handling Mechanism based on IEEE 802.15.4 for Health-Monitoring Applications

  • Ranjit, Jay Shree;Pudasaini, Subodh;Shin, Seokjoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.406-423
    • /
    • 2014
  • The recent advances in wireless communication systems and semiconductor technologies are paving the way for new applications over wireless sensor networks. Health-monitoring application (HMA) is one such emerging technology that is focused on sensing and reporting human vital signs through the communication network comprising sensor devices in the vicinity of the human body. The sensed vital signs can be divided into two categories based on the importance and the frequency of occurrence: occasional emergency signs and regular normal signs. The occasional emergency signs are critical, so they have to be delivered by the specified deadlines, whereas the regular normal signs are non-critical and are only required to be delivered with best effort. Handling the occasional emergency sign is one of the most important attributes in HMA because a human life may depend on correct handling of the situation. That is why the underlying network protocol suite for HMA should ensure that the emergency signs will be reported in a timely manner. However, HMA based on IEEE 802.15.4 might not be able to do so owing to the lack of an appropriate emergency-handling mechanism. Hence, in this paper, we propose a new emergency-handling mechanism to reduce the emergency reporting delay in IEEE 802.15.4 through the modified superframe structure. A fraction of an inactive period is modified into three new periods called the emergency reporting period, emergency beacon period, and emergency transmission period, which are used opportunistically only for immediate emergency reporting and reliable data transmission. Extensive simulation is performed to evaluate the performance of the proposed scheme. The results reveal that the proposed scheme achieves improved latency and higher emergency packets delivery ratio compared with the conventional IEEE 802.15.4 MAC.

The Effect of Hydrogen on Mechanical Properties of Gas Pipeline Material: I Tensile property (가스배관 재료의 기계적특성에 미치는 수소의 영향: I 인장특성)

  • Kim, Woo-Sik;Jang, Jae-Il
    • Journal of the Korean Institute of Gas
    • /
    • v.15 no.3
    • /
    • pp.67-73
    • /
    • 2011
  • One of the important topics to prepare the up-coming era of so-called ‘hydrogen economy’ is hydrogen transmission. Pipeline is conceivably the most economic way to consistently and safely transport a large amount of hydrogen over a long distance, which may be strongly requested in hydrogen economy era. As a good starting point for the purpose, one might wonder whether conventional API pipeline steels as designed for natural gas transmission can be used as the hydrogen pipeline materials or not. To answer the question, here we performed a series of micro-/nano-indentations together with tensile tests on the hydrogen-charged API X65, X70 and X100 steels having different strength level. In this paper, from the results of tensile tests, the hydrogen effects on the mechanical behavior in the API steels are systematically evaluated.

Burst Assembly Scheme based on SCM for Avoidance of Burst Collision in Optical Burst-Switched Networks (OBS 망에서 버스트 충돌 회피를 위한 SCM 기반의 버스트 생성 기법)

  • 이해정;김영천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6B
    • /
    • pp.538-547
    • /
    • 2004
  • Optical Burst Switched (OBS) networks usually employ one-way reservation by sending a burst control packet (BCP) with a specific offset time, before transmitting each data burst frame (BDF). Therefore, The quality of service may be degraded because contentions may lead to loss of BDFs. Especially, this phenomenon becomes more serious when burst size is longer. This necessitates an effective method of prevention to avoid burst collision in nodes. OBS networks can employ several methods to avoid such burst losses. One is that burst size is cut short to reduce burst loss probability during scheduling time. In this paper, we evaluate the burst generation and transmission using Sub-Carrier Multiplexting (SCM) in OBS networks. We propose an appropriate burst assembly architecture and transmission scheme based on SCM in OBS networks. The performance of SCM in OBS networks is examined in terms of number of Sub-Carriers per wavelength, burst loss probability, throughput, and total bandwidth of an optical fiber.

Prohibiting internal data leakage to mass storage device in mobile device (모바일 단말에서 외부 저장 매체로의 불법 데이터 유출 방지 기법)

  • Chung, Bo-Heung;Kim, Jung-Nyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.125-133
    • /
    • 2011
  • According to proliferation of mobile devices, security threats have been continuously increased such as illegal or unintentional file transmission of important data to an external mass-storage device. Therefore, we propose a protection method to prohibit an illegal outflow to this device and implement this method. This method extracts signatures from random locations of important file and uses them to detect and block illegal file transmission. To get signatures, a target file is divided by extracting window size and more than one signatures are extracted in this area. To effective signature sampling, various extraction ways such as full, binomial distribution-based and dynamic sampling are implemented and evaluated. The proposed method has some advantages. The one is that an attacker cannot easily predict the signature and its extraction location. The other is that it doesn't need to modify original data to protect it. With the help of these advantages, we can say that this method can increase efficiency of easy-to-use and it is a proper way leakage prevention in a mobile device.

Neuroendocrine Control of Gonadotropin Secretion during the Menstrual Cycle

  • Ryu, Kyung-Za
    • The Korean Journal of Pharmacology
    • /
    • v.23 no.2
    • /
    • pp.57-75
    • /
    • 1987
  • Two modalities of gonadotropin secretion, pulsatile gonadotropin and preovulatory gonadotropin surge, have been identified in the mammals. Pulsatile gonadotropin secretion is modulated by the pulsatile pattern of GnRH release and complex ovarian steroid feedback actions. The neural mechansim that regulates the pulsatile release of GnRH in the hypothalamus is called "GnRH pulse generator". Ovarian steroids, estradiol and progesterone, appear to exert thier feedback effects both directly on the pituitary to modulate gonadotropin release and on a hypothalamic site to modulate GnRH release; estradiol primarily affects the amplitude while progesterone decreases the frequency of the pulsatile GnRH. Steroid hormones are known to affect catecholamine transmission in brain. MBH-POA is richly innervated by NE systems and close apposition of NE terminals and GnRH cell bodies occurs in the MBH as well as in the POA. NE normally facilitates pulsatile LH release by acting through ${\alpha}-receptor$ mechanism. However, precise nature of facilitative role of NE transmission in maintaining pulsatile LH has not been clearly understood. Close apposition of DA and GnRH terminals in ME might permit DA to influence GnRH release. Action of DA transmission probably is mediated by axo-axonic contacts between GnRH and DA fibers in the ME. Dopamine transmission does not normally regulate pulsatile LH release, but under certain conditions, increased DA transmission inhibit LH pulse. Endogenous opioid acts to suppress the secretion of GnRH into hypophysial portal circulation, thereby inhibiting gonadotropin secretion. However, an interaction between endogenenous opioid peptides and gonadotropin release is a complex one which involves ovarian hormones as well. LH secretion appears to be most suppressed by endogenenous opioids during the luteal phase, at a time of elevated progesterone secretion. The arcuate nucleus contains not only cell bodies for GnRH and ${\beta}-endorphin$ but also a dense aborization of fibers suggesting that GnRH release is changed by the interactions between GnRH and ${\beta}-endorphin$ cell bodies within the arcuate nucleus. The frequency and amplitude of pulsatile LH release seem to be increased during the preovulatory gonadotropin surge. Estradiol exerts positive feedback action on the hypothalamo-pituitary axis to trigger preovulatory LH surge. GnRH is also crucial hormonal stimulus for preovulatory LH surge. It is unlikely, however, that increased secretion of GnRH during the preovulatory gonadotropin surge represents an obligatory neural signal for generation of the LH discharge in primates including human. Modulation of preovulatory LH surge by catecholamines has been studied almost exclusively in rats. NE and E may be involved in distinct way to accumulate GnRH in the MBH and its release into the hypophysial portal system during the critical period for LH surge on proestrus in rats. However, the mechanisms whereby augmented adrenergic transmission may facilitate the formation and accumulation of GnRH in the ME-ARC nerve terminals before the LH surge have not been clearly understood.

  • PDF

A Study of Definition of Security Requirements on Encryption and Audit Logging (암호화와 감사 로깅에서 보안 요건 정의 연구)

  • Shin, Seong-Yoon;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.85-91
    • /
    • 2014
  • Encryption is a method to convert information to no-sense code in order to prevent data from being lost or altered by use of illegal means. Audit logging creates audit log of users' activities, exceptions, and information security events, and then conserves it for a certain period for investigation and access-control auditing. Our paper suggests that confidentiality and integrity of information should be guaranteed when transmitting and storing important information in encryption. Encryption should consider both one-way encryption and two-way one and that encryption key should assure security. Also, all history related to electronic financial transactions should be logged and kept. And, it should be considered to check the details of application access log and major information. In this paper, we take a real example of encryption and log audit for safe data transmission and periodic check.