• Title/Summary/Keyword: computer models

Search Result 3,894, Processing Time 0.029 seconds

A trust evaluation method for improving nodes utilization for wireless sensor networks

  • Haibo, Shen;Kechen, Zhuang;Hong, Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1113-1135
    • /
    • 2018
  • Existing trust evaluation models for wireless sensor networks can accurately and objectively evaluate trust value of nodes, but the nodes' energy saving problem was ignored. Especially when there are a few malicious nodes in a network, the overall trust value calculation for all nodes would waste lots of energy. Beside that, the network failure caused by nodes death was also not considered. In this paper, we proposed a method for avoiding energy hole which applied trust evaluation models and a trust evaluation method based on information entropy, so as to achieve the purpose of improving nodes utilization. Simulation results show that the proposed method can effectively improve nodes utilization, and it has reasonable detection rate and lower false alert rate compared to other classical methods.

Signal Transient and Crosstalk Model of Capacitively and Inductively Coupled VLSI Interconnect Lines

  • Kim, Tae-Hoon;Kim, Dong-Chul;Eo, Yung-Seon
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.7 no.4
    • /
    • pp.260-266
    • /
    • 2007
  • Analytical compact form models for the signal transients and crosstalk noise of inductive-effect-prominent multi-coupled RLC lines are developed. Capacitive and inductive coupling effects are investigated and formulated in terms of the equivalent transmission line model and transmission line parameters for fundamental modes. The signal transients and crosstalk noise expressions of two coupled lines are derived by using a waveform approximation technique. It is shown that the models have excellent agreement with SPICE simulation.

The Application of Computer Simulation, Industrial CT and DLS RP for the rapid development of casting pilot models (신속한 주물 시제품 개발을 위한 전산모사 기술과 산업용 단층촬영기 및 쾌속표형기의 적용)

  • Yoo S.M.;Lim C.H.;Cho I.S.;Choi J.K.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.195-196
    • /
    • 2006
  • Direct laser sintering (DLS) technology for the resign coated sand is one of attractive technologies to produce molds and cores for the foundry industry rapidly and cost effectively. The objective of this case study is to develop casting pilot models using computer simulation technology, DLS RP machine and industrial computed tomography. The proposed casting design was verified by the Z-Cast software in the fields of fluid flow and solidification during the casting process. Casting parts with aluminum alloy using the post-curing treated sand moulds and cores are accurate to dimension and defect free.

  • PDF

Analysis Performance Characterics of Dynamic Signature File Methods

  • Yoo, Jae-Soo;Choi, Kil-Seong;Kim, Myoung-Ho
    • Journal of Electrical Engineering and information Science
    • /
    • v.2 no.4
    • /
    • pp.37-45
    • /
    • 1997
  • With rapid increase of information requirements from various application areas, there has been much research on dynamic information storage structures that effectively support insertions, deletions and updates. In this appear we evaluate the performance of he existing dynamic signature file methods such as the S-tree, Quick Filter and HS file and provide guidelines for the most effective usage to a given operational environment. We derive analytic performance evaluation models of the storage structures based on retrieval time, storage overhead and insertion time. We also perform extensive experiments with various data distributions such as uniform, normal and exponential distributions. The relationships among various performance parameters are throughly investigated. We show through performance comparison based on analytic models and experiments that regardless of data distribution, the HS file significantly improves performance in both the retreival time and the storage overhead over S-tree and Quick Filter.

  • PDF

A Performance Comparison of the Mobile Agent Model with the Client-server Model under Security Conditions

  • Jeong, Ki-Moon;Han, Seung-Wan;Lim, Hyeong-Seok
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.977-981
    • /
    • 2000
  • The traditional client-server model RPC and mobile agents have been used for interprocess communication between processes in different hosts. The performances of two mechanisme were analyzed in the literature [4, 6, 9]. But the security services which extensively affect the performance of systems because of low speed have not been considered. We propose two performance models considering the security services for the RPC and the mobile agent Through the analysis of the models, we show that the execution time of the mobile agent takes less than the RPC In the environment considering security services.

  • PDF

Interactive visual knowledge acquisition for hand-gesture recognition (손 제스쳐 인식을 위한 상호작용 시각정보 추출)

  • 양선옥;최형일
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.9
    • /
    • pp.88-96
    • /
    • 1996
  • Computer vision-based gesture recognition systems consist of image segmentation, object tracking and decision. However, it is difficult to segment an object from image for gesture in computer systems because of vaious illuminations and backgrounds. In this paper, we describe a method to learn features for segmentation, which improves the performance of computer vision-based hand-gesture recognition systems. Systems interact with a user to acquire exact training data and segment information according to a predefined plan. System provides some models to the user, takes pictures of the user's response and then analyzes the pictures with models and a prior knowledge. The system sends messages to the user and operates learning module to extract information with the analyzed result.

  • PDF

Jellyfish: A Conceptual Model for the AS Internet Topology

  • Siganos Georgos;Tauro Sudhir Leslie;Faloutsos Michalis
    • Journal of Communications and Networks
    • /
    • v.8 no.3
    • /
    • pp.339-350
    • /
    • 2006
  • Several novel concepts and tools have revolutionized our understanding of the Internet topology. Most of the existing efforts attempt to develop accurate analytical models. In this paper, our goal is to develop an effective conceptual model: A model that can be easily drawn by hand, while at the same time, it captures significant macroscopic properties. We build the foundation for our model with two thrusts: a) We identify new topological properties and b) we provide metrics to quantify the topological importance of a node. We propose the jellyfish as a model for the inter-domain Internet topology. We show that our model captures and represents the most significant topological properties. Furthermore, we observe that the jellyfish has lasting value: It describes the topology for more than six years.

Analysis and Comparison of Usability Models and Techniques Measuring User Performance Interacting with Websites

  • Abdulhak, Sami Abduljalil;Kang, Dae-Ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.210-212
    • /
    • 2011
  • Human Computer Interaction is rapidly growing in different aspects and areas. One of the areas that grab many scholars and researchers interest is usability. Usability is a main factor and critical pillar of products success and acceptance. In this paper, we deeply analyze the current usability models that measure the user performance during the interaction with products. Then, we fairly compare between each model to discover and present the strength and weakness of each model for supporting developer and business organization with guidelines during the development process of the products before launching the actual and final one. Decomposing comparison between each model is performed based on specific criteria. Comparison is tabulated, graphically depicted, and analytically decomposed.

  • PDF

Hot Gas Analysis of Circuit Breakers By Combining Partial Characteristic Method with Net Emission Coefficient

  • Park, Sang-Hun;Bae, Chae-Yoon;Jung, Hyun-Kyo
    • KIEE International Transaction on Electrical Machinery and Energy Conversion Systems
    • /
    • v.3B no.3
    • /
    • pp.115-121
    • /
    • 2003
  • This paper proposes a radiation model, which considers radiation transport as an important component in hot gas analysis. This radiation model is derived from combining the method of partial characteristics (MPC) with net emission coefficient (NEC), and it covers the drawbacks of existing models. Subsequently, using this proposed model, the arc-flow interaction in an arcing chamber can be efficiently computed. The arc is represented as an energy source term composed of ohmic heating and the radiation transport in the energy conservation equation. Ohmic heating term was computed by the electric field analysis within the conducting plasma region. Radiation transport was calculated by the proposed radiation model. Also, in this paper, radiation models were introduced and applied to the gas circuit breaker (GCB) model. Through simulation results, the efficiency of the proposed model was confirmed.

HetNet Characteristics and Models in 5G Networks

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.27-32
    • /
    • 2022
  • The fifth generation (5G) mobile communication technology is designed to meet all communication needs. Heterogeneous networks (HetNets) are a new emerging network structure. HetNets have greater potential for radio resource reuse and better service quality than homogeneous networks since they can evolve small cells into macrocells. Effective resource allocation techniques reduce inter-user interference while optimizing the utilization of limited spectrum resources in HetNets. This article discusses resource allocation in 5G HetNets. This paper explains HetNets and how they work. Typical cell types in HetNets are summarized. Also, HetNets models are explained in the third section. The fourth component addresses radio resource control and mobility management. Moreover, future study in this subject may benefit from this article's significant insights on how HetNets function.