• Title/Summary/Keyword: Selective scheme

Search Result 413, Processing Time 0.023 seconds

Transaction Signing-based Authentication Scheme for Protecting Sinkhole Attack in Directed Diffusion based Wireless Sensor Networks (디렉티드 디퓨젼 기반의 무선 센서 네트워크에서의 싱크홀 공격을 막기 위한 트랜잭션 서명기법에 관한 연구)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.31-36
    • /
    • 2010
  • In this paper, We propose a transaction signing-based authentication scheme for protecting sinkhole attacks in wireless sensor networks. Sinkhole attack makes packets that flow network pass through attacker. So, Sinkhole attack can be extended to various kind of attacks such as denial of service attacks, selective delivery or data tamper etc. We analyze sinkhole attack methods in directed diffusion based wireless sensor networks. For the purpose of response to attack method, Transaction signing-based authentication scheme is proposed. This scheme can work for those sensor networks which use directed diffusion based wireless sensor networks. The validity of proposed scheme is provided by BAN logic.

I/E Selective Activation based Knowledge Reconfiguration mechanism and Reasoning

  • Shim, JeongYon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.338-344
    • /
    • 2014
  • As the role of information collection becomes increasingly important in the enormous data environment, there is growing demand for more intelligent information technologies for managing complex data. On the other hand, it is difficult to find a solution because of the data complexity and big scaled amount. Accordingly, there is a need for a special intelligent knowledge base frame that can be operated by itself flexibly. In this paper, by adopting switching function for signal transmission in the synapse of the human brain, I/E selective activation based knowledge reconfiguring mechanism is proposed for building more intelligent information management system. In particular, knowledge network design, a special knowledge node structure, Type definition, I/E gauge definition and I/E matching scheme are provided. Using these concepts, the proposed system makes the functions of activation by I/E Gauge, selection and reconfiguration. In a more efficient manner, the routing and reasoning process was performed based on the knowledge reconfiguration network. In the experiments, the process of selection by I/E matching, knowledge reconfiguration and routing & reasoning results are described.

Peak-to-Average Power Ratio Reduction Using N-tuple Selective Mapping Method for MC-CDMA

  • Ali, Sajjad;Chen, Zhe;Yin, Fuliang
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.338-347
    • /
    • 2015
  • The multi-carrier transmission signal in Multi-Carrier Code Division Multiple Access (MC-CDMA) has a high peak-to-average power ratio (PAPR), which results in nonlinear distortion and deteriorative system performance. An n-tuple selective mapping method is proposed to reduce the PAPR, in this paper. This method generates $2^n$ sequences of an original data sequence by adding n-tuple of n PAPR control bits to it followed by an interleaver and error-control code (ECC) to reduce its PAPR. The convolutional, Golay, and Hamming codes are used as ECCs in the proposed scheme. The proposed method uses different numbers of the n PAPR control bits to accomplish a noteworthy PAPR reduction and also avoids the need for a side-information transmission. The simulation results authenticate the effectiveness of the proposed method.

Selective Redo recovery scheme for fine-Granularity Locking in Database Management (데이터베이스 관리 시스템에서 섬세 입자 잠금기법을 위한 선택적 재수행 회복기법)

  • 이상희
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.27-33
    • /
    • 2001
  • In this thesis, we present a simple and efficient recovery method, called ARIES/SR(ARIES/Selective Redo) which is based on ARIES(Algorithm for Recovery and Isolation Exploiting Semantics) ARIES performs redo for all updates done by either nonloser transaction or loser transaction, and thus significant overhead appears during restart after a system failure. To reduce this overhead, we propose ARIES/SR recovery algorithm. In this algorithm, to reduce the redo operations, redo is performed, using log record for updates done by only nonloser transaction. Also selective undo is performed. using log record for update done by only loser transaction for reducing recovery operation.

Performance Evaluation of On-Demand Routing Protocol using Look-ahead Selective Flooding in Ad-hoc Network (Ad-hoc 네트워크에서 Look-ahead Selective Flooding을 이용한 On-Demand 라우팅 프로토콜 성능 개선)

  • Yo-chan Ahn
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.2
    • /
    • pp.61-71
    • /
    • 2003
  • Ad-hoc networks are characterized by multi-hop wireless links, frequently changing network topology and the need for efficient dynamic routing protocols. In an Ad-hoc network, each host assumes the role of a router and relays packets toward final destinations Because a packet is broadcast to all neighboring nodes, the optimality criteria of wireless network routing is different from that of wired network routing. tn this paper 1 point out the more important cost factor than the number of links in the Ad-hoc network. A class routing protocols called on-demand protocols has recently found attention because of their low routing overhead since it performs a blind flooding to look for a path. In this paper, 1 propose the method which reduces overhead by using the information of neighboring nodes and doing a selective flooding. Simulation results demonstrate better reduction of routing overheads with this scheme.

  • PDF

Development of a Structural Shape Optimization Scheme Using Selective Element Method (선택적 요소방법을 이용한 구조 형상최적 설계기법의 개발)

  • 심진욱;박경진
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.27 no.12
    • /
    • pp.2101-2109
    • /
    • 2003
  • Structural shape optimization offers engineers with numerous advantages in designing shapes of structures. However, excessive relocation of nodes often cause distortion of elements and eventually result in degrade of accuracy and even halts of processes. To overcome these problems, an effective method, Selective Element Method(SEM), has been developed. This paper describes the basic concept of SEM and processes to implement into real-world problem. 2-D and 3-D shape optimization problems have been chosen to show the performance of the method. Though some limitations have been found, it was concluded that SEM can be useful in general shape optimization and even in some special cases such as decision of optimal weld line location.

Total Synthesis of Hepatoprotective Isowogonin and a Synthetic Approach to Wogonin (간보호 효과를 나타내는 Isowogonin의 전합성 및 Wogonin 합성을 위한 반응조건 탐색)

  • Kim, Kwang-Sik;Kim, Hak-Sung
    • YAKHAK HOEJI
    • /
    • v.53 no.6
    • /
    • pp.377-381
    • /
    • 2009
  • Isowogonin, 5,8-dihydroxy-7-methoxyflavone, is a flavonoid isolated from the root of Scutellaria baicalensis Georgi, a medicinal plant traditionally used since the ancient time. It was thought to possess a variety of biological activities, such as antioxidation, anti-inflammation and hepatoprotective effect. But a quantity of isowogonin obtained from Scutellaria baicalensis Georgi is not that enough for in vivo test. There have been no appropriate approaches available for a facile synthesis of isowogonin. So we describe a concise and efficient scheme for synthesis of isowogonin from a commercial available 2,4,6-trimethoxyphenol, which includes the Fries rearrangement and selective demethylation as key steps.

Selective Encryption of Canonical Huffman code (정규 허프만 코드의 선택적 암호화)

  • Park, Sang-ho
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.1163-1167
    • /
    • 2018
  • The selective encryption scheme for canonical Huffman codes using the inversion of bit values is proposed. The symbols are divided into blocks of a certain size, and each symbol in the block is compressed by canonical Huffman coding. Blocks are determined to be sent in the original code or encrypted form. The encryption block inverts the values of the whole bits, and bits of block that do not encrypt are not inverted. Those compressed data are transmitted with the encryption information. It is possible to decrypt the compressed data on the receiving side using the encryption information and compressed data.

STBC SC-FDE based on LS-Algorithm for Fixed Broadband Wireless Access System

  • Kim Han Kyong;Hwang Ho Seon;Baik Heung Ki
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.596-599
    • /
    • 2004
  • We propose an Alamouti-like scheme for combining space-time block coding with single-carrier frequency-domain equalization(SC-FDE) in fixed broadband wireless access environment. With two transmit antennas, the scheme is shown to achieve significant diversity gains at low complexity over frequency-selective fading channels

  • PDF

Analog Delay Locked Loop with Wide Locking Range

  • Yoo, Changsik
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.1 no.3
    • /
    • pp.193-196
    • /
    • 2001
  • For wide locking range, an analog delay locked loop (DLL) was designed with the selective phase inversion scheme and the variable number of delay elements. The number of delay elements was determined adaptively depending on the clock cycle time. During the analog fine locking stage, a self-initializing 3-state phase detector was used to avoid the initial state problem associated with the conventional 3-state phase detector. With these schemes, the locking range of analog DLL was increased by four times compared to the conventional scheme according to the simulation results.

  • PDF