• Title/Summary/Keyword: node-link

Search Result 623, Processing Time 0.024 seconds

The Diversity-Multiplexing Tradeoff for Multiple-Antenna Adaptive Decode and Forward Relay Protocols Exploiting Imperfect CSIT (불완전한 채널정보를 사용하는 다중안테나 적응형 복호 후 전송 중계 프로토콜의 Diversity-Multiplexing Tradeoff 분석)

  • Yoon, Han-Sang;Yoon, Eun-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9A
    • /
    • pp.776-783
    • /
    • 2011
  • In this paper, assuming that the transmitter can exploit imperfect channel state information (CSI), the diversity-multiplexing tradeoff (DMT) functions of three adaptive decode-and-forward (DF) relay protocols, each of which uses multiple-antennas at the destination node, at the relay node, or at the source node are derived. When the imperfect CSI qualities for the source-relay link, the relay-destination link, and the source-destination link are subject to asymptotic conditions, the additional diversity gains attainable by exploiting the imperfect CSI at the transmitter for those three adaptive DF relay protocols are investigated.

Particle filter-assisted ad hoc routing in a multi-hop wireless ad hoc network for multi-robots

  • Doh, Nak-Ju Lett;Nam, Chang-Joo;Lee, Suk-Kyu;Kim, Hwang-Nam
    • Journal of IKEEE
    • /
    • v.14 no.4
    • /
    • pp.312-316
    • /
    • 2010
  • We describe in this paper how to facilitate ad hoc routing with a particle filter in a hostile radio environment for multi-hop wireless ad hoc networks that connect multi-robots. The proposed scheme increases a connection's throughput by exploiting alternative links without going through the procedure of route discovery when link failure happens among multi-robots' networking. The scheme is implemented by using a particle filter to find strongly connected nodes. The filter estimates the probability distribution function in a sample-based manner with N particles. The particles are associated with a weight which represents the probability of the corresponding node to be the node with the best link. At every step of the estimation, the weights of particles are calculated and particles are resampled based on the weights. Since a node with the strongest link status possesses the largest number of particles, we take this node to forward the packets.

The Security DV-Hop Algorithm against Multiple-Wormhole-Node-Link in WSN

  • Li, Jianpo;Wang, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.2223-2242
    • /
    • 2019
  • Distance Vector-Hop (DV-Hop) algorithm is widely used in node localization. It often suffers the wormhole attack. The current researches focus on Double-Wormhole-Node-Link (DWNL) and have limited attention to Multi-Wormhole-Node-Link (MWNL). In this paper, we propose a security DV-Hop algorithm (AMLDV-Hop) to resist MWNL. Firstly, the algorithm establishes the Neighbor List (NL) in initialization phase. It uses the NL to find the suspect beacon nodes and then find the actually attacked beacon nodes by calculating the distances to other beacon nodes. The attacked beacon nodes generate and broadcast the conflict sets to distinguish the different wormhole areas. The unknown nodes take the marked beacon nodes as references and mark themselves with different numbers in the first-round marking. If the unknown nodes fail to mark themselves, they will take the marked unknown nodes as references to mark themselves in the second-round marking. The unknown nodes that still fail to be marked are semi-isolated. The results indicate that the localization error of proposed AMLDV-Hop algorithm has 112.3%, 10.2%, 41.7%, 6.9% reduction compared to the attacked DV-Hop algorithm, the Label-based DV-Hop (LBDV-Hop), the Secure Neighbor Discovery Based DV-Hop (NDDV-Hop), and the Against Wormhole DV-Hop (AWDV-Hop) algorithm.

Development of Traffic Accident Prediction Model Based on Traffic Node and Link Using XGBoost (XGBoost를 이용한 교통노드 및 교통링크 기반의 교통사고 예측모델 개발)

  • Kim, Un-Sik;Kim, Young-Gyu;Ko, Joong-Hoon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.45 no.2
    • /
    • pp.20-29
    • /
    • 2022
  • This study intends to present a traffic node-based and link-based accident prediction models using XGBoost which is very excellent in performance among machine learning models, and to develop those models with sustainability and scalability. Also, we intend to present those models which predict the number of annual traffic accidents based on road types, weather conditions, and traffic information using XGBoost. To this end, data sets were constructed by collecting and preprocessing traffic accident information, road information, weather information, and traffic information. The SHAP method was used to identify the variables affecting the number of traffic accidents. The five main variables of the traffic node-based accident prediction model were snow cover, precipitation, the number of entering lanes and connected links, and slow speed. Otherwise, those of the traffic link-based accident prediction model were snow cover, precipitation, the number of lanes, road length, and slow speed. As the evaluation results of those models, the RMSE values of those models were each 0.2035 and 0.2107. In this study, only data from Sejong City were used to our models, but ours can be applied to all regions where traffic nodes and links are constructed. Therefore, our prediction models can be extended to a wider range.

Transportation Network Data Generation from the Topological Geographic Database (GIS위상구조자료로부터 교통망자료의 추출에 관한 연구)

  • 최기주
    • Spatial Information Research
    • /
    • v.2 no.2
    • /
    • pp.147-163
    • /
    • 1994
  • This paper presents three methods of generating the transportation network data out of the topological geographic database in the hope that the conversion of the geographic database file containing the topology to the conventional node-link type trans¬portation network file may facilitate the integration between transportation planning mod¬els and GIS by alleviating the inherent problems of both computing environments. One way of the proposed conversion method is to use the conversion software that allows the bi-directional conversion between the UTPS (Urban Transportation Planning System) type transportation planning model and GIS. The other two methods of data structure conversion approach directly transform the GIS's user-level topology into the transportation network data topology, and have been introduced with codes programmed with FORTRAN and AML (Arc Macro Language) of ARC/INFO. If used successfully, any approach would not only improve the efficiency of transportation planning process and the associated decision-making activities in it, but enhance the productivity of trans¬portation planning agencies.

  • PDF

Integration Model for Urban Flood Inundation Linked with Underground Space Flood Analysis Model (지하공간 침수해석모형과 연계한 도시침수해석 통합모형)

  • Lee, Chang-Hee;Han, Kun-Yeun
    • Journal of Korea Water Resources Association
    • /
    • v.40 no.4
    • /
    • pp.313-324
    • /
    • 2007
  • An irregular cell-based numerical model was developed to analyze underground space flooding. In this model, the flow characteristics in underground space were computed by link-node system. Also, the model can simulate the underground flood flow related to the influence of stairs and wall-structures. Empirical discharge formula were introduced to analyze weir-type flow for shopping mall, and channel-type flow for subway railroad respectively. The simulated results matched in reasonable range compared with the observed depth. The dual-drainage inundation analysis model and the underground space flood analysis model were integrated using visual basic application of ArcGIS system. The developed model can help the decision support system of flood control authority for redesigning and constructing flood prevention structures and making the potential inundation zone, and establishing flood-mitigation measures.

Finding the First K Shortest Loopless Paths in a Transportation Network (교통망에 적합한 K 비루프 경로 탐색 알고리즘)

  • Shin, Seong-Il
    • Journal of Korean Society of Transportation
    • /
    • v.22 no.6
    • /
    • pp.121-131
    • /
    • 2004
  • The K-shortest path algorithms are largely classified into two groups: oneis for finding loopless path (simple path), another loop paths. In terms of cimputational complexities, in general the loop-paths-finding ones are considered more efficient and easier to be handled than the loopless-paths-finding. The entire path deletion methods have been known as the best efficient algorithms among the proposed K-shortest path algorithms. These algorithms exploit the K-th network transformation to prevent the same path, which was already selected as the (K-1)th path, from being redetected. Nevertheless, these algorithms have a critical limitationto be applied in the practical traffic networks because the loops, in which the same modes and links can be unlimitedly repeated, are not preventable. This research develops a way to be able to selectively control loop-paths by applying link-label. This research takes an advantage of the link-based shortest path algorithms that since the algorithms can take care of two links simultaneouslyin the searching process, the generation of loops can be controlled in the concatenation process of the searched link and the preceded link. In concatenation of two links, since the precede link can be treated a sub-shortest to this link from the origination, whether both the node and the link of the searched link were already existed or not can be evaluated. Terefore, both the node-loopless path, in which the same node is not appeared, and the link-loopless, in which the same link is not appeared, can be separately controlled. Especially, the concept of the link-loopless path is expended to take into consideration reasonable route choice behaviors such as U-Turn, P-Turn, and Turn-Penalty, which are frequently witnessed in urban traffic network with intersections. The applicability of the proposed method is verified through case studies.

A Connection Entropy-based Multi-Rate Routing Protocol for Mobile Ad Hoc Networks

  • Hieu, Cao Trong;Hong, Choong-Seon
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.3
    • /
    • pp.225-239
    • /
    • 2010
  • This paper introduces a new approach to modeling relative distance among nodes under a variety of communication rates, due to node's mobility in Mobile Ad-hoc Networks (MANETs). When mobile nodes move to another location, the relative distance of communicating nodes will directly affect the data rate of transmission. The larger the distance between two communicating nodes is, the lower the rate that they can use for transferring data will be. The connection certainty of a link also changes because a node may move closer to or farther away out of the communication range of other nodes. Therefore, the stability of a route is related to connection entropy. Taking into account these issues, this paper proposes a new routing metric for MANETs. The new metric considers both link weight and route stability based on connection entropy. The problem of determining the best route is subsequently formulated as the minimization of an object function formed as a linear combination of the link weight and the connection uncertainty of that link. The simulation results show that the proposed routing metric improves end-to-end throughput and reduces the percentage of link breakages and route reparations.

Development of Link Cost Function using Neural Network Concept in Sensor Network

  • Lim, Yu-Jin;Kang, Sang-Gil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.141-156
    • /
    • 2011
  • In this paper we develop a link cost function for data delivery in sensor network. Usually most conventional methods determine the optimal coefficients in the cost function without considering the surrounding environment of the node such as the wireless propagation environment or the topological environment. Due to this reason, there are limitations to improve the quality of data delivery such as data delivery ratio and delay of data delivery. To solve this problem, we derive a new cost function using the concept of Partially Connected Neural Network (PCNN) which is modeled according to the input types whether inputs are correlated or uncorrelated. The correlated inputs are connected to the hidden layer of the PCNN in a coupled fashion but the uncoupled inputs are in an uncoupled fashion. We also propose the training technique for finding an optimal weight vector in the link cost function. The link cost function is trained to the direction that the packet transmission success ratio of each node maximizes. In the experimental section, we show that our method outperforms other conventional methods in terms of the quality of data delivery and the energy efficiency.

Enhanced OLSR for Defense against DOS Attack in Ad Hoc Networks

  • Marimuthu, Mohanapriya;Krishnamurthi, Ilango
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.31-37
    • /
    • 2013
  • Mobile ad hoc networks (MANET) refers to a network designed for special applications for which it is difficult to use a backbone network. In MANETs, applications are mostly involved with sensitive and secret information. Since MANET assumes a trusted environment for routing, security is a major issue. In this paper we analyze the vulnerabilities of a pro-active routing protocol called optimized link state routing (OLSR) against a specific type of denial-of-service (DOS) attack called node isolation attack. Analyzing the attack, we propose a mechanism called enhanced OLSR (EOLSR) protocol which is a trust based technique to secure the OLSR nodes against the attack. Our technique is capable of finding whether a node is advertising correct topology information or not by verifying its Hello packets, thus detecting node isolation attacks. The experiment results show that our protocol is able to achieve routing security with 45% increase in packet delivery ratio and 44% reduction in packet loss rate when compared to standard OLSR under node isolation attack. Our technique is light weight because it doesn't involve high computational complexity for securing the network.