• Title/Summary/Keyword: Power Consumption Information

Search Result 2,473, Processing Time 0.023 seconds

An Energy Efficient Cluster-Based Local Multi-hop Routing Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 에너지 효율적인 클러스터 기반 지역 멀티홉 라우팅 프로토콜)

  • Kim, Kyung-Tae;Youn, Hee-Yong
    • The KIPS Transactions:PartC
    • /
    • v.16C no.4
    • /
    • pp.495-504
    • /
    • 2009
  • Wireless sensor networks (WSN) consisting of a largenumber of sensors aims to gather data in a variety of environments and is beingused and applied in many different fields. The sensor nodes composing a sensornetwork operate on battery of limited power and as a result, high energyefficiency and long network lifetime are major goals of research in the WSN. Inthis paper we propose a novel cluster-based local multi-hop routing protocolthat enhances the overall energy efficiency and guarantees reliability in thesystem. The proposed protocol minimizes energy consumption for datatransmission among sensor nodes by forming a multi-hop in the cluster.Moreover, through local cluster head rotation scheme, it efficiently manageswaste of energy caused by frequent formation of clusters which was an issue inthe existing methods. Simulation results show that our scheme enhances energyefficiency and ensure longer network time in the sensor network as comparedwith existing schemes such as LEACH, LEACH-C and PEACH.

Efficient Packet Transmission Utilizing Vertical Handover in IoT Environment (IoT 환경에서 수직 핸드오버를 활용한 효율적인 패킷 전송)

  • Ju, Hyunwoo;Yoo, Younghwan
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.807-816
    • /
    • 2015
  • The Internet of Things (IoT) has recently been showered with much attention worldwide. Various kinds of devices, communicating with each other in the IoT, demand multiple communication technologies to coexist. In this environment, mobile devices may utilize the vertical handover between different wireless radio interfaces such as Wi-Fi and Bluetooth, for efficient data transfer. In this paper, an IoT broker is implemented to support the vertical handover, which can also support and manage heterogeneous devices and communication interfaces. The handover is activated based on RSSI, Link Quality values, and real time traffic. The experimental results show that the proposed handover system substantially improves QoS in Bluetooth and reduces power consumption in mobile devices as compared with a system using only Wi-Fi.

Parallelism-aware Request Scheduling for MEMS-based Storages (MEMS 기반 저장장치를 위한 병렬성 기반 스케줄링 기법)

  • Lee, So-Yoon;Bahn, Hyo-Kyung;Noh, Sam-H.
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.2
    • /
    • pp.49-56
    • /
    • 2007
  • MEMS-based storage is being developed as a new storage media. Due to its attractive features such as high-bandwidth, low-power consumption, high-density, and low cost, MEMS storage is anticipated to be used for a wide range of applications from storage for small handhold devices to high capacity mass storage servers. However, MEMS storage has vastly different physical characteristics compared to a traditional disk. First, MEMS storage has thousands of heads that can be activated simultaneously. Second, the media of MEMS storage is a square structure which is different from the platter structure of disks. This paper presents a new request scheduling algorithm for MEMS storage that makes use of the aforementioned characteristics. This new algorithm considers the parallelism of MEMS storage as well as the seek time of requests on the two dimensional square structure. We then extend this algorithm to consider the aging factor so that starvation resistance is improved. Simulation studies show that the proposed algorithms improve the performance of MEMS storage by up to 39.2% in terms of the average response time and 62.4% in terms of starvation resistance compared to the widely acknowledged SPTF (Shortest Positioning Time First) algorithm.

A Study on Promotion Policy of Korean Design (I) (한국 디자인 진흥정책에 관한 연구(1))

  • 윤태호
    • Archives of design research
    • /
    • v.6 no.1
    • /
    • pp.11-22
    • /
    • 1993
  • The purpose of this study was to provide basic information for establishment of a desirable design promotion policy drive by research and analysis of recognition to design by consumers (including students) and designers and their level, merchandise evaluation evaluation and obstructing factors in revitalization of designs. To implement such purpose as referred to hereinabove, research was made by introduction of questionaires which were distributed to 500 persons of consumers group and 350 individuals of registered designers in Seoul, and for analysis of the data, density and percentage (%) were obtained by use of SAS Package and the dispersed analysis and correlationship were added for necessary parts. The result of study is summarized as follows; (l)The consumers remind the design as costume (21%) and molding (20%), and the designers remind it as creativity (27%) & molding (14%) respectively and the reminding of design by the two groups was indicated very simi lar. (p < 0.001) (2)As per the recogni tion of roles by the designers the research has highly indicated as contribution to improving living standards or development of economy & industry, and also indicated that it creates excessive consumption with sti$$\mu$ative manner. (3)The design reacts as an important parameter in selecting cri teria of merchandises and deciding factors for purchasing and also, in enhancement of competitive power of merchandise impact of design (2.36) was regarded very high. (4)The Korean-made home appliances in image is assessed as vulnerable than that of Japanese products, and the product designing level is also shown difference from advanced countries (1.36), but has indicated as somewhat better than those competitive nations (0.51) (5)The satisfaction to design policy of the Gov't is very low (1.69) and they recommended for new establishment of Policy undertaking department within the Gov't and indicated reasearch & development of design as the major issue. In regard to the above I'd like to emphasize the design industry $$\mu$t be dealt with the national level as a whole in order to promote thereof.

  • PDF

Performance Analysis of Open Source Based Distributed Deduplication File System (오픈 소스 기반 데이터 분산 중복제거 파일 시스템의 성능 분석)

  • Jung, Sung-Ouk;Choi, Hoon
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.12
    • /
    • pp.623-631
    • /
    • 2014
  • Comparison of two representative deduplication file systems, LessFS and SDFS, shows that Lessfs is better in execution time and CPU utilization while SDFS is better in storage usage (around 1/8 less than general file systems). In this paper, a new system is proposed where the advantages of SDFS and Lessfs are combined. The new system uses multiple DFEs and one DSE to maintain the integrity and consistency of the data. An evaluation study to compare between Single DFE and Dual DFE indicates that the Dual DFE was better than the Single DFE. The Dual DFE reduced the CPU usage and provided fast deduplication time. This reveals that proposed system can be used to solve the problem of an increase in large data storage and power consumption.

A Study on the Hardware Complexity Reduction of Hilbert transformer by MAG algorithm (MAG 알고리즘에 의한 힐버트 변환기의 하드웨어 복잡도 감소에 관한 연구)

  • Kim, Young-Woong;Lee, Young-Seock
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.364-370
    • /
    • 2011
  • The Hilbert transform performs a role to transform band pass signals into low pass signals in wireless communication systems. The operation of Hilbert transform is based on a convolution process which is required adding and multiplying calculations. When the Hilbert transform is designed and hardware-implemented at gate level, the adding and multiplying operation requires a high power consumption and a occupation of wide area on a chip. So the results of adding and multiplying operation cause to degrade the performance of implemented system. In this paper, the new Hilbert transformer is proposed, which has a low hardware complexity by application of MAG(Minimum Adder Graph) algorithm. The proposed Hilbert transformer was simulated in ISE environment of Xilinx and showed the reduction of hardware complexity comparing with the number of gate in the conventional Hilbert transformer.

The efficient IR-UWB Radar System for Reflective Wave Removal in a Short Distance Environments (근거리 환경에서 반사파 제거를 위한 효율적인 IR-UWB Radar 시스템)

  • Kim, Sueng-Woo;Jeong, Won-Ho;Yeo, Bong-Gu;Kim, Kyung-Seok
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.64-71
    • /
    • 2017
  • In this paper, Kalman filter and RRWA algorithm are used to estimate the accurate target in IR-UWB (Impulse-Radio Ultra Wideband) radar system, which enables accurate location recognition of indoors and outdoors with low cost and low power consumption. In the signal reflected by the target, unnecessary signals exist in addition to the target signal. We have tried to remove unnecessary signals and to derive accurate target signals and improve performance. The location of the targets is estimated in real time with one transmitting antenna and one receiving antenna. The Kalman filter was used to remove the background noise and the RRWA algorithm was used to remove the reflected signal. In this paper, we think that it will be useful to study the accurate distance estimation and tracking in future target estimation.

An Efficient Logging Scheme based on Dynamic Block Allocation for Flash Memory-based DBMS (플래시 메모리 기반의 DBMS를 위한 동적 블록 할당에 기반한 효율적인 로깅 방법)

  • Ha, Ji-Hoon;Lee, Ki-Yong;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.36 no.5
    • /
    • pp.374-385
    • /
    • 2009
  • Flash memory becomes increasingly popular as data storage for various devices because of its versatile features such as non-volatility, light weight, low power consumption, and shock resistance. Flash memory, however, has some distinct characteristics that make today's disk-based database technology unsuitable, such as no in-place update and the asymmetric speed of read and write operations. As a result, most traditional disk-based database systems may not provide the best attainable performance on flash memory. To maximize the database performance on flash memory, some approaches have been proposed where only the changes made to the database, i.e., logs, are written to another empty place that has born erased in advance. In this paper, we propose an efficient log management scheme for flash-based database systems. Unlike the previous approaches, the proposed approach stores logs in specially allocated blocks, called log blocks. By evenly distributing logs across log blocks, the proposed approach can significantly reduce the number of write and erase operations. Our performance evaluation shows that the proposed approaches can improve the overall system performance by reducing the number of write and erase operation compared to the previous ones.

Preventing ELF(Executable and Linking Format)-File-Infecting Malware using Signature Verification for Embedded Linux (임베디드 리눅스에서 서명 검증 방식을 이용한 악성 프로그램 차단 시스템)

  • Lee, Jong-Seok;Jung, Ki-Young;Jung, Daniel;Kim, Tae-Hyung;Kim, Yu-Na;Kim, Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.6
    • /
    • pp.589-593
    • /
    • 2008
  • These days, as a side effect of the growth of the mobile devices, malwares for the mobile devices also tend to increase and become more dangerous. Because embedded Linux is one of the advanced OSes on mobile devices, a solution to preventing malwares from infecting and destroying embedded Linux will be needed. We present a scheme using signature verification for embedded Linux that prevents executallle-Infecting malwares. The proposed scheme works under collaboration between mobile devices and a server. Malware detection is delegated to the server. In a mobile device, only integrity of all executables and dynamic libraries is checked at kernel level every time by kernel modules using LSM hooks just prior to loading of executables and dynamic libraries. All procedures in the mobile devices are performed only at kernel level. In experiments with a mobile embedded device, we confirmed that the scheme is able to prevent all executable-Infecting malwares while minimizing damage caused by execution of malwares or infected files, power consumption and performance overheads caused by malware check routines.

RFFS : Design of a Reliable NAND Flash File System for Embedded system (임베디드 시스템을 위한 신뢰성 있는 NAND 플래시 파일 시스템의 설계)

  • Lee Tae-hoon;Park Song-hwa;Kim Tae-hoon;Lee Sang-gi;Lee Joo-Kyong;Chung Ki-Dong
    • The KIPS Transactions:PartA
    • /
    • v.12A no.7 s.97
    • /
    • pp.571-582
    • /
    • 2005
  • NAND flash memory has advantages of non-volatility, little power consumption and fast access time. However, it suffers from inability that dose not provide to update-in-place and the erase cycle is limited. Moreover, the unit of read and write operations is a page. A NAND flash file system called YAFFS has been proposed. But YAFFS has several problems to be addressed. In this paper, the Reliable Flash File System(RFFS) for NAND flash memory is designed and evaluated. In designing a file system the following four issues must be considered in particular for the design: (i) to minimize a repairing time when the system fault occurs, (ii) to balance the number of block erase operations by offering wear leveling policy, and (iii) to reduce turnaround time of memory operations by reducing the amount of data written. We demonstrate and evaluate the performance of the proposed schemes.