• Title/Summary/Keyword: hierarchical protocol

Search Result 274, Processing Time 0.027 seconds

Effects of Habitat Disturbance on Fish Community Structure in a Gravel-Bed Stream, Korea (자갈하천에서 서식처 교란이 어류 군집구조에 미치는 영향)

  • Kim, Seog Hyun;Lee, Wan-Ok;Cho, Kang-Hyun
    • Ecology and Resilient Infrastructure
    • /
    • v.1 no.2
    • /
    • pp.49-60
    • /
    • 2014
  • Fish assemblages play an integral role in stream ecosystem and are influenced by stream environmental conditions and habitat disturbances. Fish community structures and habitat parameters of U.S. EPA rapid bio-assessment protocol were surveyed to investigate the effect of stream environment and habitat disturbance on fish communities at 13 study sites in the Gapyeong Stream, a typical gravel-bed stream. Principal component analysis (PCA) based on data from habitat assessment at each study site indicated that the study sites were differentiated by habitat parameters such as embeddedness, velocity/depth regime and sediment deposition, which were related with bed slope. A total of 46 species belonging to 12 families were collected in the Gapyeong Stream. A dominant species was Zacco koreanus, subdominant species was Z. platypus. Hierarchical cluster analysis based on species abundance classified fish communities into the three main groups along the stream longitudinal change. Non-metric multidimensional scaling (NMDS) portrayed that fish community structures were related to major habitat parameters, i.e., epifaunal substrate/available cover, embeddedness, velocity/depth regime, sediment deposition, channel alternation and frequency of riffles. These results suggested that fish community structures were primary affected by the longitudinal environmental changes, and those were modified by habitat disturbance in the Gapyeong Stream, a gravel-bed stream.

The Mechanism of Proxy Mobile IPv4 to Minimize the Latency of Handover Using MIH Services (MIH 서비스를 활용한 Proxy Mobile IPv4의 핸드오버 지연 최소화 방안)

  • Kim, Sung-Jin;You, Heung-Ryeol;Rhee, Seuck-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.211-217
    • /
    • 2008
  • Recently, there are many efforts to support seamless mobility in 802.11 WLANs using IP Layer mobility protocols. The IP layer mobility protocols are the most efficient mechanism to guarantee the service session continuity when IP subnet is changed during handover. Even if the IP layer mobility protocols are quite efficient, the feature of the protocols that had been designed to consider only L3 layer makes it difficult to improve the performance of hand over more and more. Nowadays, to overcome this limitation of IP mobility protocols, many researchers have worked on the mobility protocols integration of different layers (e.g., L2 layer). In this paper, we propose the enhanced Proxy MIPv4 to minimize the latency of handover using MIH protocol in 802.11 WLANs. The proposed mechanism minimizes the latency of authentication by exchanging security keys between Access Routers during handover. Moreover, it also minimizes packet losses by Inter-AP Tunneling and data forwarding.

  • PDF

Distributed Certificate Authority under the GRID-Location Aided Routing Protocol (Ad hoc 네트워크에서 GRID-Location Aided Routing 프로토콜을 이용한 분산 CA 구성)

  • Lim, Ji-Hyung;Kang, Jeon-Il;Koh, Jae-Young;Han, Kwang-Taek;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.59-69
    • /
    • 2005
  • Ad hoc network is the network which can be considered without a pre-constructed infrastructure, and a mobile node can join the network freely. However, the participation of the mobile nodes to the ad hoc network brings up much burden of re-computation for new routes, because it leads to losing the connection frequently. And, also, it causes serious security problem to be broadcasted wrong information by the malicious user. Therefore, it needs authentication against the mobile nodes. To make that Possible, we have two methods: single CA and distributed CA. In the case of CA method, the wireless network can be collapsed owing to expose the CA, but still the distributed CA method is a little more safe than previous one because it needs attacks toward a lot of CAs to collapse the network We can consider Secret Share scheme as the method that constructs the distributed CA system, but it is weak when the network size is too large. In this paper, we suggest hierarchical structure for the authentication method to solve this problem, and we will show the results of simulation for this suggestion.

Scientific Thinking Types and Processes Generated in Inductive Inquiry by College Students (대학생들의 귀납적 탐구에서 나타난 과학적 사고의 유형과 과정)

  • Kwon, Yong-Ju;Choi, Sang-Ju;Park, Yun-Bok;Jeong, Jin-Su
    • Journal of The Korean Association For Science Education
    • /
    • v.23 no.3
    • /
    • pp.286-298
    • /
    • 2003
  • The purpose of this study was to analyze scientific thinking types and processes generated in inductive inquiry by college students. Subjects were three college student. Three inductive tasks were developed: Caminalcules set I which is a task consisted of 6 imaginary animals, a potato task which is a task about the interaction between juiced potato and $H_2O_2$, and Caminalcules set 2. Subjects' thinking types and processes were investigated through thinking-aloud method and interview. Subjects' performances were recorded on videotapes and analyzed. Subjects have shown 5 types of inductive thinking in the first task; observing, discovering commonness, discovering pattern, classifying, discovering hierarchy. The processes of inductive thinking shown by students are followed; observing $\rightarrow$discovering commonness $\rightarrow$classifying $\rightarrow$discovering pattern $\rightarrow$discovering hierachy. The subtypes of inductive thinking on observing were investigated by the analysis of subjects' performance on the second task. In analysis of protocol, student' thinking types on observing have been classified as simple observing and operational observing. Operational observing has been categorized conjectural observing and predictive observing. The subtypes of inductive thinking on classification and hierarchy were investigated by the analysis of subjects' performance on the third task. In analysis of protocol, students' thinking types on classification have been searching criteria for classifying and selecting criteria for classifying. Subtypes of discovering hierarchy have been classifying groups and hierarchical ordering by students. Processes of classifying groups proceeded from searching criteria for classifying to selecting criteria for classifying.