• Title/Summary/Keyword: node code

Search Result 264, Processing Time 0.024 seconds

Fault Recover Algorithm for Cluster Head Node and Error Correcting Code in Wireless Sensor Network (무선센서 네트워크의 클러스터 헤드노드 고장 복구 알고리즘 및 오류 정정코드)

  • Lee, Joong-Ho
    • Journal of IKEEE
    • /
    • v.20 no.4
    • /
    • pp.449-453
    • /
    • 2016
  • Failures would occur because of the hostile nature environment in Wireless Sensor Networks (WSNs) which is deployed randomly. Therefore, considering faults in WSNs is essential when we design WSN. This paper classified fault model in the sensor node. Especially, this paper proposed new error correcting code scheme and fault recovery algorithm in the CH(Cluster Head) node. For the range of the small size information (<16), the parity size of the proposed code scheme has the same parity length compared with the Hamming code, and it has a benefit to generate code word very simple way. This is very essential to maintain reliability in WSN with increase power efficiency.

Design of RCNC(Random Connection Node Convolutional) Code with Security Property (비화 특성을 가진 RCNC(Random Connection Node Convolutional) 부호 기법의 설계)

  • Kong, Hyung-Yun;Cho, Sang-Bock;Lee, Chang-Hee
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3944-3951
    • /
    • 2000
  • In this paper, we propose the new FEC(Forward Error Correction) code method, so called RCNC(Random Connection Node Convolutional) code with security property. Recently, many wireless communication systems, which can prouide integrated semices of various media types and hil rales, are required to haue the ability of secreting information and error correclion. This code system is a kind qf conuolulional code, but it Ius various code formats as each node is connected differently. And systems hy using RCNC codes haue all. ability of error correction as well as information protection. We describe the principle of operating RCNC codes, including operation examples. In this paper, we also show the peiformance of BER(Bit Error Rate) and verify authority of network system with computer simulation.

  • PDF

Efficient Evaluation of Path Algebra Expressions

  • Lee, Tae-kyong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.1
    • /
    • pp.1-15
    • /
    • 2000
  • In this paper, an efficient system for finding answers to a given path algebra expression in a directed acylic graph is discussed more particulary, in a multimedia presentration graph. Path algebra expressions are formulated using revised versions of operators next and until of temporal logic, and the connected operator. To evaluate queries with path algebra expressions, the node code system is proposed. In the node code system, the nodes of a presentation graph are assigned binary codes (node codes) that are used to represent nodes and paths in a presentation graph. Using node codes makes it easy to find parent-child predecessor-sucessor relationships between nodes. A pair of node codes for connected nodes uniquely identifies a path, and allows efficient set-at-a-time evaluations of path algebra expressions. In this paper, the node code representation of nodes and paths in multimedia presentation graphs are provided. The efficient algorithms for the evaluation of queries with path algebra expressions are also provided.

  • PDF

Efficient Evaluation of Path Expressions Using Connectivity of Nodes (노드의 연결성을 이용한 패스 표현의 효과적인 처리)

  • Lee, Tae-Gyeong
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.337-344
    • /
    • 2002
  • Recently, there has been a lot of research on graph-type data because it can model seamless the application domains such as GIS, network, WWW, multimedia presentations etc., and domain in which the data sequence is important. In this paper, an efficient code system, called node code system, is proposed to evaluate paths of DAG in a multimedia presentation graph. The node code system assigns a unique binary string to each node of a graph. The comparison of node codes of two nodes tells the connectivity between the nodes without actual traversal of a graph. The method using the property of the node code system allows us to construct the paths between two nodes more efficiently than the method using conventional graph traversals. The algorithms to construct paths using the node code system are provided.

Performance Analysis on Error Correction Scheme for Wireless Sensor Network over Node-to-node Interference

  • Choi, Sang-Min;Moon, Byung-Hyun;Ryu, Jeong-Tak;Park, Se-Hyun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.1 no.2
    • /
    • pp.37-42
    • /
    • 2006
  • In this paper, we study a problem of providing reliable data transmission in wireless sensor network(WSN). A system with forward error correction9FEC) can provide an objective reliability while using less transmission power than a system without FEC. We propose the use of LDPC codes of various code rate (0.53, 0.81, 0.91) of FEC for WSN. Node-node-node interference is considered in the simulation in addition to AWGN in the channel. It is shown that the rate of 0.91 LDPC coded system obtained 7dB gain in signal to noise ratio over a system without FEC.

  • PDF

Markov Model-Driven in Real-time Faulty Node Detection for Naval Distributed Control Networked Systems (마코브 연산 기반의 함정 분산 제어망을 위한 실시간 고장 노드 탐지 기법 연구)

  • Noh, Dong-Hee;Kim, Dong-Seong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.11
    • /
    • pp.1131-1135
    • /
    • 2014
  • This paper proposes the enhanced faulty node detection scheme with hybrid algorithm using Markov-chain model on BCH (Bose-Chaudhuri-Hocquenghem) code in naval distributed control networked systems. The probabilistic model-driven approach, on Markov-chain model, in this paper uses the faulty weighting interval factors, which are based on the BCH code. In this scheme, the master node examines each slave-nodes continuously using three defined states : Good, Warning, Bad-state. These states change using the probabilistic calculation method. This method can improve the performance of detecting the faulty state node more efficiently. Simulation results show that the proposed method can improve the accuracy in faulty node detection scheme for real-time naval distributed control networked systems.

ANC Caching Technique for Replacement of Execution Code on Active Network Environment (액티브 네트워크 환경에서 실행 코드 교체를 위한 ANC 캐싱 기법)

  • Jang Chang-bok;Lee Moo-Hun;Cho Sung-Hoon;Choi Eui-In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9B
    • /
    • pp.610-618
    • /
    • 2005
  • As developed Internet and Computer Capability, Many Users take the many information through the network. So requirement of User that use to network was rapidly increased and become various. But it spend much time to accept user requirement on current network, so studied such as Active network for solved it. This Active node on Active network have the capability that stored and processed execution code aside from capability of forwarding packet on current network. So required execution code for executed packet arrived in active node, if execution code should not be in active node, have to take by request previous Action node and Code Server to it. But if this execution code take from previous active node and Code Server, bring to time delay by transport execution code and increased traffic of network and execution time. So, As used execution code stored in cache on active node, it need to increase execution time and decreased number of request. So, our paper suggest ANC caching technique that able to decrease number of execution code request and time of execution code by efficiently store execution code to active node. ANC caching technique may decrease the network traffic and execution time of code, to decrease request of execution code from previous active node.

Proactive Code Verification Protocol Using Empty Memory Deletion in Wireless Sensor Network (무선 센서 네트워크에서의 메모리 공간 삭제를 이용한 선행 코드-검증 기법)

  • Choi, Young-Geun;Kang, Jeon-Il;Lee, Kyung-Hee;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.37-46
    • /
    • 2007
  • The authentication in WSN(Wireless Sensor Network) usually means the entity authentication, but owing to the data centric nature of sensor network, much more importance must be put on the authentication(or attestation) for code of sensor nodes. The naive approach to the attestation is for the verifier to compare the previously known memory contents of the target node with the actual memory contents in the target node, but it has a significant drawback. In this paper, we show what the drawback is and propose a countermeasure. This scheme can verify the whole memory space of the target node and provides extremely low probability of malicious code's concealment without depending on accurate timing information unlike SWATT. We provide two modes of this verification method: BS-to-node and node-to-node. The performance estimation in various environments is shown.

MAC Layer Based Certificate Authentication for Multiple Certification Authority in MANET

  • Sekhar, J. Chandra;Prasad, Ramineni Sivarama
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.298-305
    • /
    • 2014
  • In this study, a novel Randomly Shifted Certification Authority Authentication protocol was used in ad hoc networks to provide authentication by considering the MAC layer characteristics. The nodes achieve authentication through the use of public key certificates issued by a CA, which assures the certificate's ownership. As a part of providing key management, the active CA node transfers the image of the stored public keys to other idle CA nodes. Finally the current active CA randomly selects the ID of the available idle CA and shifts the CA ownership by transferring it. Revoking is done if any counterfeit or duplicate non CA node ID is found. Authentication and integrity is provided by preventing MAC control packets, and Enhanced Hash Message Authentication Code (EHMAC) can be used. Here EHMAC with various outputs is introduced in all control packets. When a node transmits a packet to a node with EHMAC, verification is conducted and the node replies with the transmitter address and EHMAC in the acknowledgement.

Node.js-based Online Source Code Storege(Code Box) (Node.js 기반의 온라인 소스코드 저장소(Code Box))

  • Hur, Tai-Sung;Mok, Gi-Yun;Lee, Jee-Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.225-226
    • /
    • 2019
  • Code box 시스템은 프론트엔트 개발자를 위한 온라인 소스코드 저장소로 HTML. CSS, JavaScript를 작성하고 그 결과를 즉시 확인할 수 있으며, 소스코드의 버전관리 기능을 추가하여 소스코드의 변경에 따른 소스코드 관리 능력을 향상하도록 하였으며, 소스코드 작성 시 편의성을 향상시키기 위하여 코드 작성란에 문법자동완성과 Syntax Highlighting기능을 추가하였다. 또한 작성한 소스코드를 사용자들이 공유할 수 있으며 소스코드 작성 중 질문 사항이 발생하면 작성된 소스코드를 옮겨 실시간 질의 사항을 공유하도록 하였다.

  • PDF