• Title/Summary/Keyword: Transport Protocol

Search Result 560, Processing Time 0.026 seconds

Performance Analysis of an Address Auto-configuration Method Applying to Mobile Ad hoc Network Using NS-2 (NS-2를 이용한 MANET의 주소 자동설정 기법의 성능분석 연구)

  • Kim, Sun-Hwa;Go, Bin;Lee, Kyou-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.3
    • /
    • pp.1-6
    • /
    • 2010
  • Simulation analysis may be the essential means to either evaluate performance of systems or optimize system parameters for new design. Including many variations for design and implementation, MANET (Mobile Ad-hoc NETwork) is one target area of such an analysis. Since every node, however, included in the network has mobility, one MANET could be overlapped or merged with another one which use a different transport protocol. In order to communicate among nodes in this case, the new merged network should configure paths and addresses in advance. Configuring paths and addresses generates much overheads which ultimately cause delay in communicating data. Performance analysis is required to improve the data transport performance by minimizing overheads. This paper proposes a sound address auto-configuration method which is based on an on-demand manner and then presents modeling and performance analysis of the method. NS-2 simulation results verify that the proposed method can not only alleviate overheads, which are inevitably generated for address auto-configuration processes, and but also decentralize them in time.

A Study on the Development and Standard Specification of Unmanned Traffic Enforcement Equipment for Two-Wheeled Vehicles (이륜차 무인교통단속장비 개발 및 표준규격 연구)

  • Byung chul In;Seong jun Yoo;Eum Han;Kyeongjin Lee;Sungho Park
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.1
    • /
    • pp.126-142
    • /
    • 2023
  • The purpose of this study is to develop unmanned traffic enforcement equipment and standard specifications for the prevention of traffic accidents and violations of the two-wheeled vehicle laws. To this end, we conducted a review of the problems and new technologies of the currently operating unmanned traffic enforcement equipment on two-wheeled vehicles. And through a survey, the feasibility of introducing unmanned traffic enforcement equipment for two-wheeled vehicles and the current status of technology were investigated. In addition, the two-wheeled vehicle enforcement function was implemented through field tests of the development equipment, and the addition of enforcement targets and the number recognition rate were improved through performance improvement. Based on the results of field experiments and performance evaluation, performance standards for unmanned two-wheeled vehicle traffic enforcement equipment were prepared, and in the communication protocol, two-wheeled vehicle-related matters were newly composed in the vehicle classification code and violation items to develop standards.

Attack Detection and Classification Method Using PCA and LightGBM in MQTT-based IoT Environment (MQTT 기반 IoT 환경에서의 PCA와 LightGBM을 이용한 공격 탐지 및 분류 방안)

  • Lee Ji Gu;Lee Soo Jin;Kim Young Won
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.17-24
    • /
    • 2022
  • Recently, machine learning-based cyber attack detection and classification research has been actively conducted, achieving a high level of detection accuracy. However, low-spec IoT devices and large-scale network traffic make it difficult to apply machine learning-based detection models in IoT environment. Therefore, In this paper, we propose an efficient IoT attack detection and classification method through PCA(Principal Component Analysis) and LightGBM(Light Gradient Boosting Model) using datasets collected in a MQTT(Message Queuing Telementry Transport) IoT protocol environment that is also used in the defense field. As a result of the experiment, even though the original dataset was reduced to about 15%, the performance was almost similar to that of the original. It also showed the best performance in comparative evaluation with the four dimensional reduction techniques selected in this paper.

Evaluation of Internal Dosimetry according to Various Radionuclides Conditions in Nuclear Medicine Myocardial Scan: Monte Carlo Simulation (심근 핵의학 검사에서 다양한 방사성핵종 조건에 따른 내부피폭선량 평가: 몬테카를로 시뮬레이션)

  • Min-Gwan Lee;Chanrok Park
    • Journal of radiological science and technology
    • /
    • v.47 no.3
    • /
    • pp.213-218
    • /
    • 2024
  • The myocardial nuclear medicine examination is widely performed to diagnose myocardium disease using various radionuclides. Although image quality according to radionuclides has improved, the radiation exposure for target organ as well as peripheral organs should be considered. Here, the aim of this study was to evaluate absorbed dose (Gy) for peripheral organs in myocardial nuclear medicine scan from myocardium according to various scan environments based on Monte Carlo simulation. The simulation environment was modeled 5 cases, which were considered by radionuclides, number of injections, and radiodosage. In addition, the each radionuclide simulation such as distribution fraction was considered by recommended standard protocol, and the mesh computational female phantom, which is provided by International Commission on Radiological Protection (ICRP) 145, was used using the particle and heavy ion transport code system (PHITS) version 3.33. Based on the results, the closer to the myocardium, the higher the absorbed dose values. In addition, application for dual injection for radionuclides leaded to high absorbed dose compared with single injection for radionuclide. Consequently, there is difference for absorbed dose according to radionuclides, number of injections, and radiodosage. To detect the accurate diseased area, acquisition for improved image quality is crucial process by injecting radionuclides, however, we need to consider absorbed dose both target and peripheral inner organs from radionuclides in terms radiation protection for patient.

Selection of Cross-layered Retransmission Schemes based on Service Characteristics (서비스 특성을 고려한 다 계층 재전송 방식 선택)

  • Go, Kwang-Chun;Kim, Jae-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.5
    • /
    • pp.3-9
    • /
    • 2015
  • The wireless communication system adopts an appropriate retransmission scheme on each system protocol layer to improve reliability of data transmission. In each system protocol layer, the retransmission scheme operates in independently other layers and operates based on the parameters without reference to end-to-end performance of wireless communication system. For this reason, it is difficult to design the optimal system parameters that satisfy the QoS requirements for each service class. Thus, the performance analysis of wireless communication system is needed to design the optimal system parameters according to the end-to-end QoS requirements for each service class. In this paper, we derive the mathematical model to formulate the end-to-end performance of wireless communication system. We also evaluate the performance at the MAC and transport layers in terms of average spectral efficiency and average transmission delay. Based on the results of performance evaluations, we design the optimal system parameters according to the QoS requirements of service classes. From the results, the HARQ combined with AMC is appropriate for the delay-sensitive service and the ARQ combined with AMC is appropriate for a service that is insensitive to transmission delay. Also, the TCP can be applied for the delay-insensitive service only.

The Role of the ICAO in Implementing the FANS and its Applications in Air and space Law (바르샤바협약상(協約上) Wilful Misconduct의 개념(槪念))

  • Choi, June-Sun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.6
    • /
    • pp.191-215
    • /
    • 1994
  • The concept of 'wilful misconduct" was initally used in article 25 of the Warsaw Convention of 1929. The concept was defined in the Hague Protocol, 1955, as having the following two differing concepts: i) "with the intent to cause damage" and ii) "recklessly and with the knowledge that damage would probably result." The concepts contained in the Hague Protocol were used in various international Conventions on carriage by sea, such as Article 2(e) and Article 3(4) of the Protocol adopted at Brussels on Feb. 23, 1968 to amend the International Convention for the Unification of Certain Rules of Law relating to Bills of Lading, signed at Brussels, Aug. 25, 1929(Hague-Visby Rules), Article 13 of the Athens Convention relating to the Carriage of Passengers and their Luggage by Sea, Dec. 13. 1974, Article 4 of the Convention on Limitation of Liability for Maritime Claims, 1976, Article 8(1) of the U.N. Convention on the Carriage of Goods by Sea, 1978(Hamburg Rules) and Article 21 (1) of the U.N. Convention on International Multimodal Transport of Goods, Geneva, 1980. The same concepts were also adopted in Article 746, 789-2(1), 789-3(2) of the Korean Maritime Commercial Law, revised in 1991. As of yet, the legal system of Korean Private Law recognizes only the concepts of "Vorsatz" and "grobe Nachlassigkeit", as is the case with German Private Law. The problem is that the concepts in the Convention do not coincide precisely with the concepts of "Vorsatz" and "grobe Nachlassigkeit". The author has conducted a comparative analysis of the treatment of the concepts of wilful misconduct and its varied interpretations, that is, "with the intent to cause damage" and "recklessly and with the knowledge that damage would probably result" in the Anglo-American law and in the continental European law in the following manner: 1. Background in which the concept of wilful misconduct was introduced in the Warsaw Convention. 2. The concept of "dol" in French private law. 3. The concepts of "Vorsatz" and "grobe Nachlassigkeit" in Korean private law. 4. Analysis of the concept of wilful misconduct in Anglo-American case law. 5. Analysis of the cases interpreting the concepts of "with intent to cause damage" and "recklessly and with knowledge that damage would probably result" in various jurisdictions. 6. The need to incorporate the concepts of "with the intent to cause damage" and "recklessly and with the knowledge that damage would probably result." 7. Faute inexcusable in French private law. Based upon the comparative analysis, the author points out the difference between the concepts of "wilful misconduct" or "with the intent to cause damage" and "Vorsatz", and between the concepts of "recklessly and with the knowledge that damage would probably result" and "grobe Nachlassigkeit" in the Convention and that of the Korean Private Law system. Additionally, the author emphasizes the importance of the unification in the interpretation of the provisions of the Conventions world wide.

  • PDF

Calibration of Portable Particulate Mattere-Monitoring Device using Web Query and Machine Learning

  • Loh, Byoung Gook;Choi, Gi Heung
    • Safety and Health at Work
    • /
    • v.10 no.4
    • /
    • pp.452-460
    • /
    • 2019
  • Background: Monitoring and control of PM2.5 are being recognized as key to address health issues attributed to PM2.5. Availability of low-cost PM2.5 sensors made it possible to introduce a number of portable PM2.5 monitors based on light scattering to the consumer market at an affordable price. Accuracy of light scatteringe-based PM2.5 monitors significantly depends on the method of calibration. Static calibration curve is used as the most popular calibration method for low-cost PM2.5 sensors particularly because of ease of application. Drawback in this approach is, however, the lack of accuracy. Methods: This study discussed the calibration of a low-cost PM2.5-monitoring device (PMD) to improve the accuracy and reliability for practical use. The proposed method is based on construction of the PM2.5 sensor network using Message Queuing Telemetry Transport (MQTT) protocol and web query of reference measurement data available at government-authorized PM monitoring station (GAMS) in the republic of Korea. Four machine learning (ML) algorithms such as support vector machine, k-nearest neighbors, random forest, and extreme gradient boosting were used as regression models to calibrate the PMD measurements of PM2.5. Performance of each ML algorithm was evaluated using stratified K-fold cross-validation, and a linear regression model was used as a reference. Results: Based on the performance of ML algorithms used, regression of the output of the PMD to PM2.5 concentrations data available from the GAMS through web query was effective. The extreme gradient boosting algorithm showed the best performance with a mean coefficient of determination (R2) of 0.78 and standard error of 5.0 ㎍/㎥, corresponding to 8% increase in R2 and 12% decrease in root mean square error in comparison with the linear regression model. Minimum 100 hours of calibration period was found required to calibrate the PMD to its full capacity. Calibration method proposed poses a limitation on the location of the PMD being in the vicinity of the GAMS. As the number of the PMD participating in the sensor network increases, however, calibrated PMDs can be used as reference devices to nearby PMDs that require calibration, forming a calibration chain through MQTT protocol. Conclusions: Calibration of a low-cost PMD, which is based on construction of PM2.5 sensor network using MQTT protocol and web query of reference measurement data available at a GAMS, significantly improves the accuracy and reliability of a PMD, thereby making practical use of the low-cost PMD possible.

Service Differentiation in Ad Hoc Networks by a Modified Backoff Algorithm (애드혹 네트워크 상에서 backoff 알고리즘 수정에 의한 서비스 차별화)

  • Seoung-Seok Kang;Jin Kim
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.414-428
    • /
    • 2004
  • Many portable devices are coming to be commercially successful and provide useful services to mobile users. Mobile devices may request a variety of data types, including text and multimedia data, thanks to the rich content of the Internet. Different types of data and/or different classes of users may need to be treated with different qualities of service. The implementation of service differentiation in wireless networks is very difficult because of device mobility and wireless channel contention when the backoff algorithm is used to resolve contention. Modification of the t)mary exponential backoff algorithm is one possibility to allow the design of several classes of data traffic flows. We present a study of modifications to the backoff algorithm to support three classes of flows: sold, silver, and bronze. For example, the gold c]ass flows are the highest priority and should satisfy their required target bandwidth, whereas the silver class flows should receive reasonably high bandwidth compared to the bronze class flows. The mixture of the two different transport protocols, UDP and TCP, in ad hoc networks raises significant challenges when defining backoff algorithm modifications. Due to the different characteristics of UDP and TCP, different backoff algorithm modifications are applied to each class of packets from the two transport protocols. Nevertheless, we show by means of simulation that our approach of backoff algorithm modification clearly differentiates service between different flows of classes regardless of the type of transport protocol.

Container BIC-code region extraction and recognition method using multiple thresholding (다중 이진화를 이용한 컨테이너 BIC 부호 영역 추출 및 인식 방법)

  • Song, Jae-wook;Jung, Na-ra;Kang, Hyun-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1462-1470
    • /
    • 2015
  • The container BIC-code is a transport protocol for convenience in international shipping and combined transport environment. It is an identification code of a marine transport container which displays a wide variety of information including country's code. Recently, transportation through aircrafts and ships continues to rise. Thus fast and accurate processes are required in the ports to manage transportation. Accordingly, in this paper, we propose a BIC-code region extraction and recognition method using multiple thresholds. In the code recognition, applying a fixed threshold is not reasonable due to a variety of illumination conditions caused by change of weather, lightening, camera position, color of the container and so on. Thus, the proposed method selects the best recognition result at the final stage after applying multiple thresholds to recognition. For each threshold, we performs binarization, labeling, BIC-code pattern decision (horizontal or vertical pattern) by morphological close operation, and character separation from the BIC-code. Then, each characters is recognized by template matching. Finally we measure recognition confidence scores for all the thresholds and choose the best one. Experimental results show that the proposed method yields accurate recognition for the container BIC-code with robustness to illumination change.

Vehicle-to-Vehicle Broadcast Protocols Based on Wireless Multi-hop Communication (무선 멀티 홉 통신 기반의 차량간 브로드캐스트 프로토콜)

  • Han, Yong-Hyun;Lee, Hyuk-Joon;Choi, Yong-Hoon;Chung, Young-Uk
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.4
    • /
    • pp.53-64
    • /
    • 2009
  • Inter-vehicular communication that propagates information without infrastructures has drawn a lot of interest. However, it is difficult to apply conventional ad-hoc routing protocols directly in inter-vehicular communication due to frequent changes in the network topology caused by high mobility of the vehicles. MMFP(Multi-hop MAC Forwarding) is a unicast forwarding protocol that transport packets based on the reachability information instead of path selection or position information. However, delivering public safety messages informing road conditions such as collision, obstacles and fog through inter-vehicular communication requires broadcast rather than unicast since these messages contain information valuable to most drivers within a close proximity. Flooding is one of the simplest methods for multi-hop broadcast, but it suffers from reduced packet delivery-ratio and high transmission delay due to an excessive number of duplicated packets. This paper presents two multi-hop broadcast protocols for inter-vehicular communication that extend the MMFP. UMHB(Unreliable Multi-Hop Broadcast) mitigates the duplicated packets of MMFP by limiting the number of nodes to rebroadcast packets. UMHB, however, still suffers from low delivery ratio. RMHB(Reliable Multi-Hop Broadcast) uses acknowledgement and retransmission in order to improve the reliability of UMHB at the cost of increase in transmission delay, which we show through simulation is within an acceptable range for collision avoidance application.

  • PDF