• Title/Summary/Keyword: collision Avoidance

Search Result 837, Processing Time 0.021 seconds

Modeling and Performance Analysis of MAC Protocol for WBAN with Finite Buffer

  • Shu, Minglei;Yuan, Dongfeng;Chen, Changfang;Wang, Yinglong;Zhang, Chongqing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4436-4452
    • /
    • 2015
  • The IEEE 802.15.6 standard is introduced to satisfy all the requirements for monitoring systems operating in, on, or around the human body. In this paper, analytical models are developed for evaluating the performance of the IEEE 802.15.6 CSMA/CA-based medium access control protocol for wireless body area networks (WBAN) under unsaturation condition. We employ a three-dimensional Markov chain to model the backoff procedure, and an M/G/1/K queuing system to describe the packet queues in the buffer. The throughput and delay performances of WBAN operating in the beacon mode are analyzed in heterogeneous network comprised of different user priorities. Simulation results are included to demonstrate the accuracy of the proposed analytical model.

Maneuverability of a DWT 8,000-ton oil/chemical tanker by real sea trials - A comparison between the semi-balanced rudder and the flap rudder - (실선시험에 의한 DWT 8,000톤 선박의 조종성능 - Semi-balanced rudder and flap rudder -)

  • An, Young-Su;Lee, Hyeong-Geun;Park, Byung-Soo;Jang, Choong-Sik
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.51 no.2
    • /
    • pp.257-264
    • /
    • 2015
  • This study is intended to provide navigator with specific information necessary to assist the avoidance of collision and the operation of ships to evaluate the maneuverability of dead weight tonnage 8,000 tons Oil/Chemical tanker. The actual maneuvering characteristics of ship can be adequately judged from the results of typical ship trials. Author carried out sea trials based full scale for turning test, Z" maneuvering test, man overboard rescue maneuver test, inertia stopping test. Consequently, $2^{st}$ Overshoot yaw angle of the semi balanced rudder and flap rudder in ${\pm}20^{\circ}$ zig-zag test showed $22.2^{\circ}$ and $18.0^{\circ}$, respectively. The maneuverability of the vessel was good in the flap rudder. The man overboard rescue maneuver maneuverability test was most favorable in the flap rudder and the full load condition. The results from tests could be compared directly with the standards of maneuverability of IMO and consequently the maneuvering qualities of the ship is full satisfied with its.

A study on the turning ability of a DWT 8,000-ton oil/chemical tanker by real sea trials - A comparison between the semi-balanced rudder and the flap rudder - (실선시험에 의한 DWT 8,000톤 선박의 선회성능 - Semi-balanced rudder and flap rudder -)

  • Lee, Hyeong-Geun;An, Young-Su;Park, Byung-Soo;Jang, Choong-Sik
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.51 no.2
    • /
    • pp.245-256
    • /
    • 2015
  • This study is intended to provide navigator with specific information necessary to assist the avoidance of collision and the operation of ships to evaluate the maneuverability of dead weight tonnage 8,000 tons Oil/Chemical tanker. The actual maneuvering characteristics of ship can be adequately judged from the results of typical ship trials. Author carried out sea trials based full scale for turning test in ballast condition and full load condition, semi balanced rudder and flap rudder. The turning circle maneuvering were performed on the starboard and port sides with $35^{\circ}$ rudder angle at the normal continuous rating. The results from tests could be compared directly with the standards of maneuverability of IMO and consequently the maneuvering qualities of the ship is full satisfied with its.

Beacon Collision Avoidance Mechanism for IEEE 802.15.4 Inter-PAN Communication (IEEE 802.15.4의 Inter-PAN 통신을 위한 비콘 충돌 회피 기법)

  • Lee, Woo-June;Lee, Hyuk-Joon;Park, In;Shim, Eung-Bo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.6-9
    • /
    • 2006
  • IEEE 802.15.4는 저전력 무선 개인 네트워크 기술의 표준으로서 USN(ubiquitous sensor network)의 핵심 무선 통신 기술로 각광을 받고 있다. 그러나 IEEE 802.15.4는 제한된 RF 전송범위와 스타 토폴로지를 기반으로 하는 통신 기법만을 제공하고 있으며, 인접한 PAN 간(inter-PAN)의 통신 기술은 정의되어 있지 않다. 이러한 기술상의 제약으로 IEEE 802.15.4는 통신 영역이 매우 제한적이며, 이에 따라 통신시 음영지역이 발생하는 문제점을 가지고 있다. 현재까지 통신영역 확장을 위한 주요 기술적 사항인 효율적인 토폴로지 형성방법, 주소할당 및 라우팅 방법, 인접 네트워크 간의 비콘 충돌 회피 기법 등에 대한 활발한 연구가 진행되어 왔다. 이중 인접한 네트워크간의 비콘 충돌 방지 기법은 IEEE 802.15.4의 네트워크가 비콘에 의해서 관리된다는 점을 고려하였을 때 데이터 전송 및 네트워크 유지를 위해 우선적으로 해결되어야 할 사항이다. 본 연구에서는 제안된 비콘 충돌 회피 기법을 분석하고, 이중 비활성 구간(inactive portion)을 활용한 기법에 대한 구체적인 구현 방안을 제시 하였다. 또한 상용 임베디드 장치인 Nano-24에 설계한 비콘 충돌 회피 기법을 구현하여 동작을 검증, 분석하였다.

  • PDF

An Experimental Study on the Transient Behavior of Vehicle Rollover (차량 롤전복의 과도거동에 관한 시험적 연구)

  • Lee, Myung-Su;Kim, Sang-Sup
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.19 no.3
    • /
    • pp.113-121
    • /
    • 2011
  • Rollover accident is one of the serious traffic accident and rollover accident takes high portion of all accident. The most common type of rollover is a tripped rollover which occupy 95% of all type of single-vehicle rollover. Tripped rollover occurs when a vehicle leaves normal road way and tripped by loose gravel, soil of fixed object such as guard rail, curbs and ditches. And the rest of the type of rollover is un-tripped rollover. An un-tripped rollovers that occurs during high-speed collision avoidance maneuvers. In this paper, presents the explanation of the un-tripped rollover test method and procedure, additionally this paper deals with various occurrence in the un-tripped test such as occurring excessive tire camber in the un-tripped test, tire side-wall contact with road surface and roll oscillation. And this paper analyzes the analysis of the roll rate amplitude in specific frequency through the FFT (Fast Fourier Transform) and the roll angle at the steering reverse timing which is the Fishhook test roll rate feedback time. Finally, this paper analyzes the relations between the estimated steady state roll gain and rollover stability.

A Model for Analyzing the Performance of Wireless Multi-Hop Networks using a Contention-based CSMA/CA Strategy

  • Sheikh, Sajid M.;Wolhuter, Riaan;Engelbrecht, Herman A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2499-2522
    • /
    • 2017
  • Multi-hop networks are a low-setup-cost solution for enlarging an area of network coverage through multi-hop routing. Carrier sense multiple access with collision avoidance (CSMA/CA) is frequently used in multi-hop networks. Multi-hop networks face multiple problems, such as a rise in contention for the medium, and packet loss under heavy-load, saturated conditions, which consumes more bandwidth due to re-transmissions. The number of re-transmissions carried out in a multi-hop network plays a major role in the achievable quality of service (QoS). This paper presents a statistical, analytical model for the end-to-end delay of contention-based medium access control (MAC) strategies. These strategies schedule a packet before performing the back-off contention for both differentiated heterogeneous data and homogeneous data under saturation conditions. The analytical model is an application of Markov chain theory and queuing theory. The M/M/1 model is used to derive access queue waiting times, and an absorbing Markov chain is used to determine the expected number of re-transmissions in a multi-hop scenario. This is then used to calculate the expected end-to-end delay. The prediction by the proposed model is compared to the simulation results, and shows close correlation for the different test cases with different arrival rates.

Design of 24GHz Voltage-Controlled Oscillator for Automotive Collision Avoidance Radar (차량 추돌 예방 레이더용 24GHz 전압제어발진기 설계)

  • Sung, Myeong-U;Choi, Seong-Kyu;Lee, Jae-Hwan;Kim, Sung-Woo;Ryu, Jee-Youl;Noh, Seok-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.702-703
    • /
    • 2013
  • 본 논문은 차량 추돌 예방 레이더용 24GHz 전압제어발진기를 제안한다. 이러한 회로는 TSMC $0.13{\mu}m$ 혼성신호/고주파 CMOS 공정($f_T/f_{MAX}=120/140GHz$)으로 설계되어 있다. 이러한 회로는 스위치형 공진기 (switched resonator)의 기본 구조를 지닌 24GHz 주파수 대역을 사용할 수 있도록 CMOS LC 튜닝 회로를 포함하고 있다. 특히 전체 칩 면적을 줄이기 위해 수동형 인덕터 대신 능동형 인덕터부를 사용하였다. 본 연구에서 개발한 발진기는 전체 튜닝 범위에 대해 24GHz에서 8%의 측정 결과를 보였으며, 600kHz 오프셋에서 24GHz에 대해 약 -89dBc/Hz의 우수한 위상 잡음 특성을 보였다.

  • PDF

Scheduling of Real-time and Nonreal-time Traffics in IEEE 802.11 Wireless LAN (무선랜에서의 실시간 및 비실시간 트래픽 스케줄링)

  • Lee, Ju-Hee;Lee, Chae Y.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.2
    • /
    • pp.75-89
    • /
    • 2003
  • Media Access Control (MAC) Protocol in IEEE 802.11 Wireless LAN standard supports two types of services, synchronous and asynchronous. Synchronous real-time traffic is served by Point Coordination Function (PCF) that implements polling access method. Asynchronous nonreal-time traffic is provided by Distributed Coordination Function (DCF) based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. Since real-time traffic is sensitive to delay, and nonreal-time traffic to error and throughput, proper traffic scheduling algorithm needs to be designed. But it is known that the standard IEEE 802.11 scheme is insufficient to serve real-time traffic. In this paper, real-time traffic scheduling and admission control algorithm is proposed. To satisfy the deadline violation probability of the real time traffic the downlink traffic is scheduled before the uplink by Earliest Due Date (EDD) rule. Admission of real-time connection is controlled to satisfy the minimum throughput of nonreal-time traffic which is estimated by exponential smoothing. Simulation is performed to have proper system capacity that satisfies the Quality of Service (QoS) requirement. Tradeoff between real-time and nonreal-time stations is demonstrated. The admission control and the EDD with downlink-first scheduling are illustrated to be effective for the real-time traffic in the wireless LAN.

Utilization of Planned Routes and Dead Reckoning Positions to Improve Situation Awareness at Sea

  • Kim, Joo-Sung;Jeong, Jung Sik;Park, Gyei-Kark
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.288-294
    • /
    • 2014
  • Understanding a ship's present position has been one of the most important tasks during a ship's voyage, in both ancient and modern times. Particularly, a ship's dead reckoning (DR) has been used for predicting traffic situations and collision avoidance actions. However, the current system that uses the traditional method of calculating DR employs the received position and speed data only. Therefore, it is not applicable for predicting navigation within the harbor limits, owing to the frequent changes in the ship's course and speed in this region. In this study, planned routes were applied for improving the reliability of the proposed system and predicting the traffic patterns in advance. The proposed method of determining the dead reckoning position (DRP) uses not only the ships' received data but also the navigational patterns and tracking data in harbor limits. The Mercator sailing formulas were used for calculating the ships' DRPs and planned routes. The data on the traffic patterns were collected from the automatic identification system and analyzed using MATLAB. Two randomly chosen ships were analyzed for simulating their tracks and comparing the DR method during the timeframes of the ships' movement. The proposed method of calculating DR, combined with the information on planned routes and DRPs, is expected to contribute towards improving the decision-making abilities of operators.

Intelligent Internal Stealthy Attack and its Countermeasure for Multicast Routing Protocol in MANET

  • Arthur, Menaka Pushpa;Kannan, Kathiravan
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1108-1119
    • /
    • 2015
  • Multicast communication of mobile ad hoc networks is vulnerable to internal attacks due to its routing structure and high scalability of its participants. Though existing intrusion detection systems (IDSs) act smartly to defend against attack strategies, adversaries also accordingly update their attacking plans intelligently so as to intervene in successful defending schemes. In our work, we present a novel indirect internal stealthy attack on a tree-based multicast routing protocol. Such an indirect stealthy attack intelligently makes neighbor nodes drop their routing-layer unicast control packets instead of processing or forwarding them. The adversary targets the collision avoidance mechanism of the Medium Access Control (MAC) protocol to indirectly affect the routing layer process. Simulation results show the success of this attacking strategy over the existing "stealthy attack in wireless ad hoc networks: detection and countermeasure (SADEC)" detection system. We design a cross-layer automata-based stealthy attack on multicast routing protocols (SAMRP) attacker detection system to identify and isolate the proposed attacker. NS-2 simulation and analytical results show the efficient performance, against an indirect internal stealthy attack, of SAMRP over the existing SADEC and BLM attacker detection systems.