• 제목/요약/키워드: Smart Packet

검색결과 140건 처리시간 0.022초

Piezo-activated guided wave propagation and interaction with damage in tubular structures

  • Lu, Ye;Ye, Lin;Wang, Dong;Zhou, Limin;Cheng, Li
    • Smart Structures and Systems
    • /
    • 제6권7호
    • /
    • pp.835-849
    • /
    • 2010
  • This study investigated propagation characteristics of piezo-activated guided waves in an aluminium rectangular-section tube for the purpose of damage identification. Changes in propagating velocity and amplitude of the first wave packet in acquired signals were observed in the frequency range from 50 to 250 kHz. The difference in guided wave propagation between rectangular- and circular-section tubes was examined using finite element simulation, demonstrating a great challenge in interpretation of guided wave signals in rectangular-section tubes. An active sensor network, consisting of nine PZT elements bonded on different surfaces of the tube, was configured to collect the wave signals scattered from through-thickness holes of different diameters. It was found that guided waves were capable of propagating across the sharp tube curvatures while retaining sensitivity to damage, even that not located on the surfaces where actuators/sensors were attached. Signal correlation between the intact and damaged structures was evaluated with the assistance of a concept of digital damage fingerprints (DDFs). The probability of the presence of damage on the unfolded tube surface was thus obtained, by which means the position of damage was identified with good accuracy.

MAC Layer Based Certificate Authentication for Multiple Certification Authority in MANET

  • Sekhar, J. Chandra;Prasad, Ramineni Sivarama
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제3권5호
    • /
    • pp.298-305
    • /
    • 2014
  • In this study, a novel Randomly Shifted Certification Authority Authentication protocol was used in ad hoc networks to provide authentication by considering the MAC layer characteristics. The nodes achieve authentication through the use of public key certificates issued by a CA, which assures the certificate's ownership. As a part of providing key management, the active CA node transfers the image of the stored public keys to other idle CA nodes. Finally the current active CA randomly selects the ID of the available idle CA and shifts the CA ownership by transferring it. Revoking is done if any counterfeit or duplicate non CA node ID is found. Authentication and integrity is provided by preventing MAC control packets, and Enhanced Hash Message Authentication Code (EHMAC) can be used. Here EHMAC with various outputs is introduced in all control packets. When a node transmits a packet to a node with EHMAC, verification is conducted and the node replies with the transmitter address and EHMAC in the acknowledgement.

무선랜 환경에서 스마트 단말기의 불필요한 패킷들 (Unnecessary Packets for Smart Terminals in Wireless LAN Environment)

  • 김현수;김은기
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2012년도 춘계학술대회
    • /
    • pp.581-583
    • /
    • 2012
  • 본 논문에서는 리눅스 기반의 무선 단말기가 AP(Access Point)로부터 수신하는 패킷들을 분석하였다. 무선 단말기는 AP로부터 불필요한 패킷들을 다수 수신하였고 수신된 불필요한 패킷들은 해당하는 계층으로 전송되어 버려진다. 무선 단말기는 AP로부터 불필요한 패킷들을 수신할 때마다 비효율적인 작업을 반복적으로 수행하는 것을 확인하였다.

  • PDF

Whole Frame Error Concealment with an Adaptive PU-based Motion Vector Extrapolation for HEVC

  • Kim, Seounghwi;Lee, Dongkyu;Oh, Seoung-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제4권1호
    • /
    • pp.16-21
    • /
    • 2015
  • Most video services are transmitted in wireless networks. In a network environment, a packet of video is likely to be lost during transmission. For this reason, numerous error concealment (EC) algorithms have been proposed to combat channel errors. On the other hand, most existing algorithms cannot conceal the whole missing frame effectively. To resolve this problem, this paper proposes a new Adaptive Prediction Unit-based Motion Vector Extrapolation (APMVE) algorithm to restore the entire missing frame encoded by High Efficiency Video Coding (HEVC). In each missing HEVC frame, it uses the prediction unit (PU) information of the previous frame to adaptively decide the size of a basic unit for error concealment and to provide a more accurate estimation for the motion vector in that basic unit than can be achieved by any other conventional method. The simulation results showed that it is highly effective and significantly outperforms other existing frame recovery methods in terms of both objective and subjective quality.

Time of Arrival range Based Wireless Sensor Localization in Precision Agriculture

  • Lee, Sang-Hyun;Moon, Kyung-Il
    • International journal of advanced smart convergence
    • /
    • 제3권2호
    • /
    • pp.14-17
    • /
    • 2014
  • Precision agriculture relies on information technology, whose precondition is providing real-time and accurate information. It depends on various kinds of advanced sensors, such as environmental temperature and humidity, wind speed, light intensity, and other types of sensors. Currently, it is a hot topic how to collect accurate information, the main raw data for agricultural experts, monitored by these sensors timely. Most existing work in WSNs addresses their fundamental challenges, including power supply, limited memory, processing power and communication bandwidth and focuses entirely on their operating system and networking protocol design and implementation. However, it is not easy to find the self-localization capability of wireless sensor networks. Because of constraints on the cost and size of sensors, energy consumption, implementation environment and the deployment of sensors, most sensors do not know their locations. This paper provides maximum likelihood estimators for sensor location estimation when observations are time-of arrival (TOA) range measurement.

A Hybrid Upstream Bandwidth Allocation Method for Multimedia Communications in EPONs

  • Baek, Jinsuk;Kwak, Min Gyung;Fisher, Paul S.
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제1권1호
    • /
    • pp.27-33
    • /
    • 2012
  • The Ethernet Passive Optical Network (EPON) has been considered to be one of the most promising solutions for the implementation of the Fiber To The Home (FTTH) technology designed to ameliorate the "last mile" bandwidth bottleneck. In the EPON network, an efficient and fair bandwidth allocation is a very important issue, since multiple optical network units (ONUs) share a common upstream channel for packet transmission. To increase bandwidth utilization, an EPON system must provide a way to adaptively allocate the upstream bandwidth among multiple ONUs in accordance to their bandwidth demands and requirements. We present a new hybrid method that satisfies these requirements. The advantage of our method comes from the consideration of application-specific bandwidth allocation and the minimization of the idle bandwidth. Our simulation results show that our proposed method outperforms existing dynamic bandwidth allocation methods in terms of bandwidth utilization.

  • PDF

Image recognition technology in rotating machinery fault diagnosis based on artificial immune

  • Zhu, Dachang;Feng, Yanping;Chen, Qiang;Cai, Jinbao
    • Smart Structures and Systems
    • /
    • 제6권4호
    • /
    • pp.389-403
    • /
    • 2010
  • By using image recognition technology, this paper presents a new fault diagnosis method for rotating machinery with artificial immune algorithm. This method focuses on the vibration state parameter image. The main contribution of this paper is as follows: firstly, 3-D spectrum is created with raw vibrating signals. Secondly, feature information in the state parameter image of rotating machinery is extracted by using Wavelet Packet transformation. Finally, artificial immune algorithm is adopted to diagnose rotating machinery fault. On the modeling of 600MW turbine experimental bench, rotor's normal rate, fault of unbalance, misalignment and bearing pedestal looseness are being examined. It's demonstrated from the diagnosis example of rotating machinery that the proposed method can improve the accuracy rate and diagnosis system robust quality effectively.

액티브 네트워크 환경에서의 에이전트 기반 침입탐지 시스템 (Agent-based IDS in the Active Network Environment)

  • 최진우;우종우
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2003년도 춘계학술발표논문집 (하)
    • /
    • pp.2213-2216
    • /
    • 2003
  • 단일 호스트 환경에 특화되어 설계되어온 기존 침입탐지 시스템(Intrusion Detection System: IDS)은 침입 시 도메인의 보호만을 그 목적으로 하는 수동적인 성격으로써, 새로운 공격 기법에 대한 탐지 및 대응, 그리고 보다 그 규모가 큰 네트워크로의 확장 면에서 구조적인 결함을 가지고 있다. 이러한 IDS의 구조적 문제점의 해결방안으로 액티브 네트워크 기반의 IDS 에 관한 연구가 진행되고 있다. 액티브 네트워크(Active network)란 패킷 스위칭 네트워크 상에 프로그램 가능한 라우터 등인 액티브 노드들을 배치하고, 사용자의 요구에 상응하는 적절한 연산을 위한 데이터와 프로그램으로 구성된 스마트 패킷(smart packet)에 대하여 수행 가능하게 하는 접근 방법이다. 본 논문에서는 이를 기반으로 자율적이며 지능적인 에이전트로 구성된 멀티 에이전트 기술을 액티브 노드에 적용함으로써 기존 IDS 보안메커니즘에서 보다 러 진보된 능동적이고 적극적인 대응을 위한 보안 메커니즘을 제공하여 네트워크 공격에 의한 피해 최소화와 신속한 대응이 가능한 멀티 에이전트 기반 공격 대응 메커니즘을 제시하고, 이를 적용 가능한 액티브 네트워크 기반 프레임 설계를 제안한다.

  • PDF

Implementation of Extracting Specific Information by Sniffing Voice Packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International journal of advanced smart convergence
    • /
    • 제9권4호
    • /
    • pp.209-214
    • /
    • 2020
  • VoIP technology has been widely used for exchanging voice or image data through IP networks. VoIP technology, often called Internet Telephony, sends and receives voice data over the RTP protocol during the session. However, there is an exposition risk in the voice data in VoIP using the RTP protocol, where the RTP protocol does not have a specification for encryption of the original data. We implement programs that can extract meaningful information from the user's dialogue. The meaningful information means the information that the program user wants to obtain. In order to do that, our implementation has two parts. One is the client part, which inputs the keyword of the information that the user wants to obtain, and the other is the server part, which sniffs and performs the speech recognition process. We use the Google Speech API from Google Cloud, which uses machine learning in the speech recognition process. Finally, we discuss the usability and the limitations of the implementation with the example.

Modified PSO Based Reactive Routing for Improved Network Lifetime in WBAN

  • Sathya, G.;Evanjaline, D.J.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.139-144
    • /
    • 2022
  • Technological advancements taken the health care industry by a storm by embedding sensors in human body to measure their vitals. These smart solutions provide better and flexible health care to patients, and also easy monitoring for the medical practitioners. However, these innovative solutions provide their own set of challenges. The major challenge faced by embedding sensors in body is the issue of lack of infinite energy source. This work presents a meta-heuristic based routing model using modified PSO, and adopts an energy harvesting scheme to improve the network lifetime. The routing process is governed by modifying the fitness function of PSO to include charge, temperature and other vital factors required for node selection. A reactive routing model is adopted to ensure reliable packet delivery. Experiments have been performed and comparisons indicate that the proposed Energy Harvesting and Modified PSO (EHMP) model demonstrates low overhead, higher network lifetime and better network stability.