Simulation analysis may be the essential means to either evaluate performance of systems or optimize system parameters for new design. Including many variations for design and implementation, MANET (Mobile Ad-hoc NETwork) is one target area of such an analysis. Since every node, however, included in the network has mobility, one MANET could be overlapped or merged with another one which use a different transport protocol. In order to communicate among nodes in this case, the new merged network should configure paths and addresses in advance. Configuring paths and addresses generates much overheads which ultimately cause delay in communicating data. Performance analysis is required to improve the data transport performance by minimizing overheads. This paper proposes a sound address auto-configuration method which is based on an on-demand manner and then presents modeling and performance analysis of the method. NS-2 simulation results verify that the proposed method can not only alleviate overheads, which are inevitably generated for address auto-configuration processes, and but also decentralize them in time.
Byung chul In;Seong jun Yoo;Eum Han;Kyeongjin Lee;Sungho Park
The Journal of The Korea Institute of Intelligent Transport Systems
/
v.22
no.1
/
pp.126-142
/
2023
The purpose of this study is to develop unmanned traffic enforcement equipment and standard specifications for the prevention of traffic accidents and violations of the two-wheeled vehicle laws. To this end, we conducted a review of the problems and new technologies of the currently operating unmanned traffic enforcement equipment on two-wheeled vehicles. And through a survey, the feasibility of introducing unmanned traffic enforcement equipment for two-wheeled vehicles and the current status of technology were investigated. In addition, the two-wheeled vehicle enforcement function was implemented through field tests of the development equipment, and the addition of enforcement targets and the number recognition rate were improved through performance improvement. Based on the results of field experiments and performance evaluation, performance standards for unmanned two-wheeled vehicle traffic enforcement equipment were prepared, and in the communication protocol, two-wheeled vehicle-related matters were newly composed in the vehicle classification code and violation items to develop standards.
Recently, machine learning-based cyber attack detection and classification research has been actively conducted, achieving a high level of detection accuracy. However, low-spec IoT devices and large-scale network traffic make it difficult to apply machine learning-based detection models in IoT environment. Therefore, In this paper, we propose an efficient IoT attack detection and classification method through PCA(Principal Component Analysis) and LightGBM(Light Gradient Boosting Model) using datasets collected in a MQTT(Message Queuing Telementry Transport) IoT protocol environment that is also used in the defense field. As a result of the experiment, even though the original dataset was reduced to about 15%, the performance was almost similar to that of the original. It also showed the best performance in comparative evaluation with the four dimensional reduction techniques selected in this paper.
The myocardial nuclear medicine examination is widely performed to diagnose myocardium disease using various radionuclides. Although image quality according to radionuclides has improved, the radiation exposure for target organ as well as peripheral organs should be considered. Here, the aim of this study was to evaluate absorbed dose (Gy) for peripheral organs in myocardial nuclear medicine scan from myocardium according to various scan environments based on Monte Carlo simulation. The simulation environment was modeled 5 cases, which were considered by radionuclides, number of injections, and radiodosage. In addition, the each radionuclide simulation such as distribution fraction was considered by recommended standard protocol, and the mesh computational female phantom, which is provided by International Commission on Radiological Protection (ICRP) 145, was used using the particle and heavy ion transport code system (PHITS) version 3.33. Based on the results, the closer to the myocardium, the higher the absorbed dose values. In addition, application for dual injection for radionuclides leaded to high absorbed dose compared with single injection for radionuclide. Consequently, there is difference for absorbed dose according to radionuclides, number of injections, and radiodosage. To detect the accurate diseased area, acquisition for improved image quality is crucial process by injecting radionuclides, however, we need to consider absorbed dose both target and peripheral inner organs from radionuclides in terms radiation protection for patient.
Journal of the Institute of Electronics and Information Engineers
/
v.52
no.5
/
pp.3-9
/
2015
The wireless communication system adopts an appropriate retransmission scheme on each system protocol layer to improve reliability of data transmission. In each system protocol layer, the retransmission scheme operates in independently other layers and operates based on the parameters without reference to end-to-end performance of wireless communication system. For this reason, it is difficult to design the optimal system parameters that satisfy the QoS requirements for each service class. Thus, the performance analysis of wireless communication system is needed to design the optimal system parameters according to the end-to-end QoS requirements for each service class. In this paper, we derive the mathematical model to formulate the end-to-end performance of wireless communication system. We also evaluate the performance at the MAC and transport layers in terms of average spectral efficiency and average transmission delay. Based on the results of performance evaluations, we design the optimal system parameters according to the QoS requirements of service classes. From the results, the HARQ combined with AMC is appropriate for the delay-sensitive service and the ARQ combined with AMC is appropriate for a service that is insensitive to transmission delay. Also, the TCP can be applied for the delay-insensitive service only.
The concept of 'wilful misconduct" was initally used in article 25 of the Warsaw Convention of 1929. The concept was defined in the Hague Protocol, 1955, as having the following two differing concepts: i) "with the intent to cause damage" and ii) "recklessly and with the knowledge that damage would probably result." The concepts contained in the Hague Protocol were used in various international Conventions on carriage by sea, such as Article 2(e) and Article 3(4) of the Protocol adopted at Brussels on Feb. 23, 1968 to amend the International Convention for the Unification of Certain Rules of Law relating to Bills of Lading, signed at Brussels, Aug. 25, 1929(Hague-Visby Rules), Article 13 of the Athens Convention relating to the Carriage of Passengers and their Luggage by Sea, Dec. 13. 1974, Article 4 of the Convention on Limitation of Liability for Maritime Claims, 1976, Article 8(1) of the U.N. Convention on the Carriage of Goods by Sea, 1978(Hamburg Rules) and Article 21 (1) of the U.N. Convention on International Multimodal Transport of Goods, Geneva, 1980. The same concepts were also adopted in Article 746, 789-2(1), 789-3(2) of the Korean Maritime Commercial Law, revised in 1991. As of yet, the legal system of Korean Private Law recognizes only the concepts of "Vorsatz" and "grobe Nachlassigkeit", as is the case with German Private Law. The problem is that the concepts in the Convention do not coincide precisely with the concepts of "Vorsatz" and "grobe Nachlassigkeit". The author has conducted a comparative analysis of the treatment of the concepts of wilful misconduct and its varied interpretations, that is, "with the intent to cause damage" and "recklessly and with the knowledge that damage would probably result" in the Anglo-American law and in the continental European law in the following manner: 1. Background in which the concept of wilful misconduct was introduced in the Warsaw Convention. 2. The concept of "dol" in French private law. 3. The concepts of "Vorsatz" and "grobe Nachlassigkeit" in Korean private law. 4. Analysis of the concept of wilful misconduct in Anglo-American case law. 5. Analysis of the cases interpreting the concepts of "with intent to cause damage" and "recklessly and with knowledge that damage would probably result" in various jurisdictions. 6. The need to incorporate the concepts of "with the intent to cause damage" and "recklessly and with the knowledge that damage would probably result." 7. Faute inexcusable in French private law. Based upon the comparative analysis, the author points out the difference between the concepts of "wilful misconduct" or "with the intent to cause damage" and "Vorsatz", and between the concepts of "recklessly and with the knowledge that damage would probably result" and "grobe Nachlassigkeit" in the Convention and that of the Korean Private Law system. Additionally, the author emphasizes the importance of the unification in the interpretation of the provisions of the Conventions world wide.
Background: Monitoring and control of PM2.5 are being recognized as key to address health issues attributed to PM2.5. Availability of low-cost PM2.5 sensors made it possible to introduce a number of portable PM2.5 monitors based on light scattering to the consumer market at an affordable price. Accuracy of light scatteringe-based PM2.5 monitors significantly depends on the method of calibration. Static calibration curve is used as the most popular calibration method for low-cost PM2.5 sensors particularly because of ease of application. Drawback in this approach is, however, the lack of accuracy. Methods: This study discussed the calibration of a low-cost PM2.5-monitoring device (PMD) to improve the accuracy and reliability for practical use. The proposed method is based on construction of the PM2.5 sensor network using Message Queuing Telemetry Transport (MQTT) protocol and web query of reference measurement data available at government-authorized PM monitoring station (GAMS) in the republic of Korea. Four machine learning (ML) algorithms such as support vector machine, k-nearest neighbors, random forest, and extreme gradient boosting were used as regression models to calibrate the PMD measurements of PM2.5. Performance of each ML algorithm was evaluated using stratified K-fold cross-validation, and a linear regression model was used as a reference. Results: Based on the performance of ML algorithms used, regression of the output of the PMD to PM2.5 concentrations data available from the GAMS through web query was effective. The extreme gradient boosting algorithm showed the best performance with a mean coefficient of determination (R2) of 0.78 and standard error of 5.0 ㎍/㎥, corresponding to 8% increase in R2 and 12% decrease in root mean square error in comparison with the linear regression model. Minimum 100 hours of calibration period was found required to calibrate the PMD to its full capacity. Calibration method proposed poses a limitation on the location of the PMD being in the vicinity of the GAMS. As the number of the PMD participating in the sensor network increases, however, calibrated PMDs can be used as reference devices to nearby PMDs that require calibration, forming a calibration chain through MQTT protocol. Conclusions: Calibration of a low-cost PMD, which is based on construction of PM2.5 sensor network using MQTT protocol and web query of reference measurement data available at a GAMS, significantly improves the accuracy and reliability of a PMD, thereby making practical use of the low-cost PMD possible.
Many portable devices are coming to be commercially successful and provide useful services to mobile users. Mobile devices may request a variety of data types, including text and multimedia data, thanks to the rich content of the Internet. Different types of data and/or different classes of users may need to be treated with different qualities of service. The implementation of service differentiation in wireless networks is very difficult because of device mobility and wireless channel contention when the backoff algorithm is used to resolve contention. Modification of the t)mary exponential backoff algorithm is one possibility to allow the design of several classes of data traffic flows. We present a study of modifications to the backoff algorithm to support three classes of flows: sold, silver, and bronze. For example, the gold c]ass flows are the highest priority and should satisfy their required target bandwidth, whereas the silver class flows should receive reasonably high bandwidth compared to the bronze class flows. The mixture of the two different transport protocols, UDP and TCP, in ad hoc networks raises significant challenges when defining backoff algorithm modifications. Due to the different characteristics of UDP and TCP, different backoff algorithm modifications are applied to each class of packets from the two transport protocols. Nevertheless, we show by means of simulation that our approach of backoff algorithm modification clearly differentiates service between different flows of classes regardless of the type of transport protocol.
Journal of the Korea Institute of Information and Communication Engineering
/
v.19
no.6
/
pp.1462-1470
/
2015
The container BIC-code is a transport protocol for convenience in international shipping and combined transport environment. It is an identification code of a marine transport container which displays a wide variety of information including country's code. Recently, transportation through aircrafts and ships continues to rise. Thus fast and accurate processes are required in the ports to manage transportation. Accordingly, in this paper, we propose a BIC-code region extraction and recognition method using multiple thresholds. In the code recognition, applying a fixed threshold is not reasonable due to a variety of illumination conditions caused by change of weather, lightening, camera position, color of the container and so on. Thus, the proposed method selects the best recognition result at the final stage after applying multiple thresholds to recognition. For each threshold, we performs binarization, labeling, BIC-code pattern decision (horizontal or vertical pattern) by morphological close operation, and character separation from the BIC-code. Then, each characters is recognized by template matching. Finally we measure recognition confidence scores for all the thresholds and choose the best one. Experimental results show that the proposed method yields accurate recognition for the container BIC-code with robustness to illumination change.
The Journal of The Korea Institute of Intelligent Transport Systems
/
v.8
no.4
/
pp.53-64
/
2009
Inter-vehicular communication that propagates information without infrastructures has drawn a lot of interest. However, it is difficult to apply conventional ad-hoc routing protocols directly in inter-vehicular communication due to frequent changes in the network topology caused by high mobility of the vehicles. MMFP(Multi-hop MAC Forwarding) is a unicast forwarding protocol that transport packets based on the reachability information instead of path selection or position information. However, delivering public safety messages informing road conditions such as collision, obstacles and fog through inter-vehicular communication requires broadcast rather than unicast since these messages contain information valuable to most drivers within a close proximity. Flooding is one of the simplest methods for multi-hop broadcast, but it suffers from reduced packet delivery-ratio and high transmission delay due to an excessive number of duplicated packets. This paper presents two multi-hop broadcast protocols for inter-vehicular communication that extend the MMFP. UMHB(Unreliable Multi-Hop Broadcast) mitigates the duplicated packets of MMFP by limiting the number of nodes to rebroadcast packets. UMHB, however, still suffers from low delivery ratio. RMHB(Reliable Multi-Hop Broadcast) uses acknowledgement and retransmission in order to improve the reliability of UMHB at the cost of increase in transmission delay, which we show through simulation is within an acceptable range for collision avoidance application.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.