• Title/Summary/Keyword: Re-transmission

Search Result 350, Processing Time 0.018 seconds

A Study on the RRA(Retrogression and Reaging) treatment of 7050 Al alloy (7050 Al 합금의 RRA 처리에 관한 연구)

  • Choi, Joong-Whoan;Kim, Jang-Ryang;Lee, Sang-Lae;Kim, In-Bae
    • Korean Journal of Materials Research
    • /
    • v.10 no.7
    • /
    • pp.493-498
    • /
    • 2000
  • The effects of RRA treatment on the microstructures and mechanical properties of 7050 Al alloy were investigated by differential scanning calolimetry, transmission electron microscopy, microhardness measurement and electrical conductivity. The hardness of 2nd-step aged specimen at $175^{\circ}C$ was decreased to mimimum value and increased to a peak hardness, and then re-decreased with retrogression treatment. It was found that the hardness of 2nd-step aged specimen was further increased by 3rd step aging treatment($120^{\circ}C$x24h). The initial decrease in hardness during 2nd-step aging was due to the partial dissolution of pre-existing GP zone, the major precipitation hardening phase at T6 condition. It was confirmed that the major precipitation hardening phase at 3rd-step aging was GP zone and η' phase. The electrical conductivity increased continually through 2nd-step and 3rd-step aging treatment. It was conclude that the optium 2nd-step aging condition was at $175^{\circ}C$ for 50min by considering the hardness and electrical conductivity.

  • PDF

A Reliable Group Key Re-transmission Mechanism in Ad-hoc Environment (Ad-hoc 환경에서 신뢰적인 그룹 키 재전송 기법)

  • Hong, Suk-Hyung;Kim, Kyung-Min;Lee, Kwang-Kyum;Sin, Young-Tae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.370-374
    • /
    • 2006
  • Ad-hoc 환경의 응용은 재난구조나 회의실 또는 강의실에서의 정보 교환과 같은 그룹 통에서 이용된다. Ad-hoc 환경은 무선 채널을 이용하므로 상대적인 낮은 대역폭과 높은 오류 발생률을 가지게 된다. 따라서 Ad-hoc 네트워크에서는 신뢰적인 전송이 요구된다. 이동 노드는 상대적으로 낮은 성능과 에너지의 제한으로 인해 유선 환경과 같은 신뢰적인 전송 기법을 Ad-hoc 환경에 적용하기에는 문제가 발생한다. Ad-hoc 환경의 무선 채널이 가지는 보안적인 취약성과 높은 에러율을 극복하는 신뢰적인 그룹 키 전송을 위한 재전송 기법을 제안한다. 신뢰적인 트리 형성하기 위해 n차 트리 구조를 이용한다. 손실 감지를 위한 ACK 메시지를 이용하고 손실 복구를 위한 재전송 기법에 대해 연구를 한다. 제안한 신뢰적인 그룹 키 전송을 위한 재전송 기법은 트리의 깊이의 차수가 루트 관리 노드, 서브 관리 노드와 로컬 멤버 노드로 구성되기 때문에 손실 감지와 손실 복구에 대한 연산의 오버헤드가 적다. 루트 관리 노드는 멤버 노드로부터 받은 개인키 정보를 이용하여 그룹 키를 생성하고 그룹 키 부분 정보를 서브 관리 노드에게 전송하고 서브 관리 노드에 대한 신뢰성을 책임진다. 서브 관리 노드는 루트 관리 노드로부터 받은 그룹 키 부분 정보를 로컬 멤버 노드에게 전송하고 로컬 멤버 노드에 대한 신뢰성을 책임진다. 루트 관리 노드와 서브 관리 노드를 관리 노드라 한다. 관리 노드가 신뢰적인 전송을 위해 관리하는 멤버 노드는 전체 그룹에 독립적으로 유지 가능하므로 확장성 및 효율성이 좋다. 관리 노드는 동적인 그룹에 따른 타이머를 설정함으로써 손실 감지에 대한 시간을 줄임으로써 효율적인 손실 감지 및 손실 복구를 한다. 임계값 설정으로 인한 중복 수신에 대한 오버헤드를 줄일 수 있다.신뢰성을 향상 시킬 수 있는 Load Balancing System을 제안한다.할 때 가장 효과적인 라우팅 프로토콜이라고 할 수 있다.iRNA 상의 의존관계를 분석할 수 있었다.수안보 등 지역에서 나타난다 이러한 이상대 주변에는 대개 온천이 발달되어 있었거나 새로 개발되어 있는 곳이다. 온천에 이용하고 있는 시추공의 자료는 배제하였으나 온천이응으로 직접적으로 영향을 받지 않은 시추공의 자료는 사용하였다 이러한 온천 주변 지역이라 하더라도 실제는 온천의 pumping 으로 인한 대류현상으로 주변 일대의 온도를 올려놓았기 때문에 비교적 높은 지열류량 값을 보인다. 한편 한반도 남동부 일대는 이번 추가된 자료에 의해 새로운 지열류량 분포 변화가 나타났다 강원 북부 오색온천지역 부근에서 높은 지열류량 분포를 보이며 또한 우리나라 대단층 중의 하나인 양산단층과 같은 방향으로 발달한 밀양단층, 모량단층, 동래단층 등 주변부로 NNE-SSW 방향의 지열류량 이상대가 발달한다. 이것으로 볼 때 지열류량은 지질구조와 무관하지 않음을 파악할 수 있다. 특히 이러한 단층대 주변은 지열수의 순환이 깊은 심도까지 가능하므로 이러한 대류현상으로 지표부근까지 높은 지온 전달이 되어 나타나는 것으로 판단된다.의 안정된 방사성표지효율을 보였다. $^{99m}Tc$-transferrin을 이용한 감염영상을 성공적으로 얻을 수 있었으며, $^{67}Ga$-citrate 영상과 비교하여 더 빠른 시간 안에 우수한 영상을 얻을 수 있었다. 그러므로 $^{99m}Tc$-transierrin이 감염 병소의 영상진단에 사용될 수 있을 것으로 기대된다.리를 정량화 하였다. 특히 선조체에서의 도파민 유리에 의한 수용체 결합능의 감소는 흡연에 의한 혈중 니코틴의 축

  • PDF

Multi-hop Routing Protocol based on Neighbor Conditions in Multichannel Ad-hoc Cognitive Radio Networks (인지 무선 애드혹 네트워크에서의 주변 상황을 고려한 협력적 멀티홉 라우팅 방법)

  • Park, Goon-Woo;Choi, Jae-Kark;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4A
    • /
    • pp.369-379
    • /
    • 2011
  • During the routing process between nodes on the CR(Cognitive Radio) network conducting for efficient use of limited frequency resources, spectrum handover process due to the appearance of the PU occupies most of the routing latency, and also decreases the reliability of the path. In this paper, a cooperative routing protocol in a multi-channel environment is proposed. The source node broadcasts a message with available channel lists and probability of PU appearance during its route guidance. The intermediate nodes re-transmit the message, received from the source node, and update and maintain the information, status table of the path. The destination node determines the optimal path and sends a reply message to the selected path after it receives the messages from the intermediate nodes. The average probability of the PU appearance and the average time of the PU appearance are updated while transferring data. During data transmission the channel with the lowest probability of appearance of the PU is selected dynamically and if a PU appears on the current channel partial repairment is performed. It is examined that reliability of the selected path considerably is improved and the routing cost is reduced significantly compared to traditional routing methods.

Effect of Variety and Shading Material on Growth Characteristics and Ginsenoside Contents of 2-Year-Old Ginseng (Panax ginseng C. A. Meyer) Grown in Imperfectly Drained Paddy Soil (배수약간불량 논토양에서 품종 및 해가림 피복물 종류가 2년생 인삼의 생육과 진세노사이드 함량에 미치는 영향)

  • Lee, Sung-Woo;Yeon, Byeong-Yeol;Kim, Chung-Guk;Shin, Yoo-Su;Hyun, Dong-Yun;Kang, Seung-Won;Cha, Seon-Woo
    • Korean Journal of Medicinal Crop Science
    • /
    • v.16 no.6
    • /
    • pp.434-438
    • /
    • 2008
  • To selection of optimal shading material, two-year-old ginseng (Panax ginseng C. A. Meyer) of new cultivar, 'Cheonpoong' (CP), and native species 'Hwangsookjong' (HS) were cultured under three kinds of shading materials such as three-layered blue and a one-layered black PE (polyethylene) net (TBSB), blue PE sheet (BS), and aluminium coated PE sheet (AS) in imperfectly drained paddy soil. Growth characteristics, yield and ginsenoside contents were investigated under three shading materials. Yield and ginsenoside contents of ginseng were distinctly affected by intensity and quality of sunlight penetrated through shading materials. Light transmission ratio, air and soil temperature according to shading materials were higher in order of BS, AS, and TBSB. However, ratio of aerial phase and porosity of the soil were higher in order of AS, BS, and TBSB, respectively. There was no significantly difference in the ratio of rusty colored root by shading materials. CP showed higher stem length, leaf area, and root weight than that of HS, while the former showed distinctly lower discolored leaf ratio than that the other. Eight kinds of ginsenosides content of CP were higher than that of HS in $Rg_1$, Re, Rf, $Rb_1$ and Rc except $Rg_2$, $Rb_2$, and $Rb_3$. Total ginsenoside contents of CP was distinctly higher than that of HS. Total ginsenoside contents as affected by shading materials was higher in order of BS, TBSB, and AS in CP, while TBSB, BS, and AS in HS.

Design of Dynamic Buffer Assignment and Message model for Large-scale Process Monitoring of Personalized Health Data (개인화된 건강 데이터의 대량 처리 모니터링을 위한 메시지 모델 및 동적 버퍼 할당 설계)

  • Jeon, Young-Jun;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.187-193
    • /
    • 2015
  • The ICT healing platform sets a couple of goals including preventing chronic diseases and sending out early disease warnings based on personal information such as bio-signals and life habits. The 2-step open system(TOS) had a relay designed between the healing platform and the storage of personal health data. It also took into account a publish/subscribe(pub/sub) service based on large-scale connections to transmit(monitor) the data processing process in real time. In the early design of TOS pub/sub, however, the same buffers were allocated regardless of connection idling and type of message in order to encode connection messages into a deflate algorithm. Proposed in this study, the dynamic buffer allocation was performed as follows: the message transmission type of each connection was first put to queuing; each queue was extracted for its feature, computed, and converted into vector through tf-idf, then being entered into a k-means cluster and forming a cluster; connections categorized under a certain cluster would re-allocate the resources according to the resource table of the cluster; the centroid of each cluster would select a queuing pattern to represent the cluster in advance and present it as a resource reference table(encoding efficiency by the buffer sizes); and the proposed design would perform trade-off between the calculation resources and the network bandwidth for cluster and feature calculations to efficiently allocate the encoding buffer resources of TOS to the network connections, thus contributing to the increased tps(number of real-time data processing and monitoring connections per unit hour) of TOS.

A mechanism for end-to-end secure communication in heterogeneous tactical networks (이기종 전술통신망 종단간 암호화 통신을 위한 메커니즘)

  • Park, Cheol-Yong;Kim, Ki-Hong;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.625-634
    • /
    • 2014
  • Tactical networks is being operated in configuration that consisting of a variety of characteristics communication equipments and heterogeneous networks. In this configurations, end-to-end communication can be achieved using interworking gateway for converting the data format of the network and using encryption algorithm of the networks. The use of mechanism results in a problem that secure data cannot be transferred directly, reprocessing and processing delay of communication in heterogeneous tactical networks. That is, for encoding and decoding of data, the decryption of encrypted data and re-encryption processing must be required at the gateway between different networks. In this paper proposes to mechanism for end-to-end secure communication in heterogeneous tactical networks. Using the proposed method, end-to-end secure communication between heterogeneous tactical networks(PSTN-UHF networks) which removes the necessity of a gateway for converting data into data formats suitable for network to remove a transmission delay factor and enable real-time voice and data communication and achieve end-to-end security for heterogeneous tactical networks. we propose a novel mechanism for end-to-end secure communication over PSTN and UHF networks and evaluate against the performance of conventional mechanism. Our proposal is confirmed removal of security vulnerabilities, end-to-end secure communication in heterogeneous tactical networks.

Design and Implementation of Geographical Handoff System Using GPS Information (GPS정보를 이용한 위치기반 핸드오프 시스템의 설계 및 구현)

  • Han, Seung-Ho;Yang, Seung-Chur;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.33-43
    • /
    • 2010
  • Recently, users want to use real-time multimedia services, such as internet, VoIP, etc., using their IEEE 802.11 wireless lan mobile stations. In order to provide such services, a handoff among access points is essential to support the mobility of a node, in such an wide area. However, the legacy handoff methods of IEEE 802.11 technology are easy to lose connections. Also, the recognition of a disconnection and channel re-searching time make the major delay of the next AP to connect. In addition, because IEEE 802.11 decides the selection of an AP depending only on received signal strength, regardless of a node direction, position, etc., it cannot guarantee a stable bandwidth for communication. Therefore, in order to provide a real-time multimedia service, a node must reduce the disconnection time and needs an appropriate algorithm to support a sufficient communication bandwidth. In this paper, we suggest an algorithm which predicts a handoff point of a moving node by using GPS location information, and guarantees a high transmission bandwidth according to the signal strength and the distance. We implemented the suggested algorithm, and confirmed the superiority of our algorithm by reducing around 3.7ms of the layer-2 disconnection time, and guaranteed 24.8% of the communication bandwidth.

Improvement of Flexible Zerotree Coder by Efficient Transmission of Wavelet Coefficients (웨이블렛 계수의 효율적인 전송에 따른 가변제로트리코더의 성능개선)

  • Joo, Sang-Hyun;Shin, Jae-Ho
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.9
    • /
    • pp.76-84
    • /
    • 1999
  • EZW proposed by Shapiro is based on a zerotree constructed in a way that a parent coefficient in a subband is related to four child coefficients in the next finer subband of similar orientation. This fixed treeing based on 1-to-4 parent-child is suitable to exploti hierachical correlations among subbands but not to exploit spatial correlations within a subband. A new treeing by Joo, et al. is suggested to simulatneously exploit those two correlatins by extending parent-child relationship in a flexible way. The flexible treeing leads to increasing the number of symbols and lowering entorpy comparing to the fixed treeing, and therefore a better compression can be resulted. In this paper, we suggest two techniques to suppress the increasing of symbols. First, a probing bit is generated to avoid redundant scan for insignivicant coefficients. Second, since all subbands do not always require the same kind of symbol-set, produced symbols are re-symbolized into binary codes according to a pre-defined procedure. Owing to those techniques, all symbols are generated as binary codes. The binary symbols can be entropy-coded by an adaptive arithmetic coding. Moerover, the binary symbol stream can give comparatively good performances without help of additional entropy coding. Our proposed coding scheme is suggested in two modes: binary coding mode and arithmetic coding mode. We evaluate the effectivenessof our modifications by comparing with the original EZW.

  • PDF

ZigBee Service Gateway Enabling Dynamic Reconfiguration (동적 설정 가능한 지그비 서비스 게이트웨이 구조)

  • Kim, Seong-Hoon;Kang, Jeong-Seok;Baeg, Sung-Ho;Park, Jae-Han;Park, Hong-Seong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10B
    • /
    • pp.644-654
    • /
    • 2007
  • ZigBee is one of wireless communication standards and many applications based on Zigbee have been developing for commercial applications. Most of those applications require links to Internet like Zigbee service gateways. However, ZigBee service gateway should provides following functions to be effectively utilized itself: translation of messages between diverse ZigBee application profiles and message formats used in Internet, addition/removal of a new ZigBee service without stopping existing services according to addition/removal of a Zigbee node, and no transmission of unwanted packets to ZigBee network. Therefore, this paper proposes a new type of ZigBee Service Gateway, called ZiGate to provide the functions. The proposed ZiGate is capable of re-configurating message translation modules required in case of addition/removal of nodes and doesn't transmit unnecessary packets to the ZigBee networks by synchronizing itself with ZigBee network. And ZiGate provides translation modules between messages defined in Zigbee application profiles and both text-based and binary-based messages used in Internet. In this paper we implements the ZiGate and evaluates it on the test bed. This evaluations show that the proposed ZiGate works efficiently.

Performance Analysis of Docker Container Migration Using Secure Copy in Mobile Edge Computing (모바일 엣지 컴퓨팅 환경에서 안전 복사를 활용한 도커 컨테이너 마이그레이션 성능 분석)

  • Byeon, Wonjun;Lim, Han-wool;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.901-909
    • /
    • 2021
  • Since mobile devices have limited computational resources, it tends to use the cloud to compute or store data. As real-time becomes more important due to 5G, many studies have been conducted on edge clouds that computes at locations closer to users than central clouds. The farther the user's physical distance from the edge cloud connected to base station is, the slower the network transmits. So applications should be migrated and re-run to nearby edge cloud for smooth service use. We run applications in docker containers, which is independent of the host operating system and has a relatively light images size compared to the virtual machine. Existing migration studies have been experimented by using network simulators. It uses fixed values, so it is different from the results in the real-world environment. In addition, the method of migrating images through shared storage was used, which poses a risk of packet content exposure. In this paper, Containers are migrated with Secure CoPy(SCP) method, a data encryption transmission, by establishing an edge computing environment in a real-world environment. It compares migration time with Network File System, one of the shared storage methods, and analyzes network packets to verify safety.