• Title/Summary/Keyword: optimal protocol

Search Result 475, Processing Time 0.046 seconds

A Generous Cooperative Routing Protocol for Vehicle-to-Vehicle Networks

  • Li, Xiaohui;Wang, Junfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5322-5342
    • /
    • 2016
  • In vehicle-to-vehicle (V2V) networks, where selfishness degrades node activity, countermeasures for collaboration enforcement must be provided to enable application of a sage and efficient network environment. Because vehicular networks feature both high mobility and various topologies, selfish behavior judgment and establishment of a stable routing protocol become intensely challenging. In this paper, a two-phase-based generous cooperative routing protocol (called GEC) is presented for V2V networks to provide resistance to selfishness. To detect selfish behaving vehicles, a packet forwarding watchdog and an average connection rate based on the multipath weight method are used, where evidence is gathered from different watchdogs. Then, multihop relay decisions are made using a generous cooperative algorithm based on game theory. Finally, through buffering of the multiple end-to-end paths and judicious choice of optimal cooperative routes, route maintenance phase is capable of dealing with congestion and rapidly exchanging traffic. Specifically, it is proved that the GEC is theoretically subgame perfect. Simulation results show that for V2V networks with inherently selfish nodes, the proposed method isolates uncooperative vehicles and is capable of accommodating both the mobility and congestion circumstances by facilitating information dissemination and reducing end-to-end delay.

Intelligent On-demand Routing Protocol for Ad Hoc Network

  • Ye, Yongfei;Sun, Xinghua;Liu, Minghe;Mi, Jing;Yan, Ting;Ding, Lihua
    • Journal of Information Processing Systems
    • /
    • v.16 no.5
    • /
    • pp.1113-1128
    • /
    • 2020
  • Ad hoc networks play an important role in mobile communications, and the performance of nodes has a significant impact on the choice of communication links. To ensure efficient and secure data forwarding and delivery, an intelligent routing protocol (IAODV) based on learning method is constructed. Five attributes of node energy, rate, credit value, computing power and transmission distance are taken as the basis of segmentation. By learning the selected samples and calculating the information gain of each attribute, the decision tree of routing node is constructed, and the rules of routing node selection are determined. IAODV algorithm realizes the adaptive evaluation and classification of network nodes, so as to determine the optimal transmission path from the source node to the destination node. The simulation results verify the feasibility, effectiveness and security of IAODV.

MAC Protocol for Packet Data Service in Slotted CDMA Environment (슬롯 CDMA 환경에서 패킷 데이터 서비스를 위한 MAC 프로토콜)

  • 임인택
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1399-1405
    • /
    • 2003
  • This paper proposes an MAC protocol for fair packet data services in stoned CDMA system. In slotted CDMA system, the packets transmitted in the same slot act as multiple access interference, so that unsuccessful packet transmissions are entirely caused by multiple access interference. Therefore, in order to get the optimal system throughput, the number of simultaneously transmitted Packets should be kept at a proper level. In the proposed protocol, the base station calculates the new and retransmitted packet transmission probability of mobile stations according to the offered load and then broadcasts these probabilities. Mobile stations, which have a packet, attempt to transmit packet with the received probabilities. Simulation results show that the proposed scheme can offer better system throughput than the conventional scheme, and guarantee a good fairness among all mobile stations regardless of the offered load.

Experiments on decision tree analysis for four-peg tower of Hanoi (4 개의 기둥을 가진 하노이의 탑에 대한 결정 트리 생성 실험)

  • Kang, Dae-Ki;Choi, Jae-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.171-172
    • /
    • 2011
  • In this research, we discuss the process of analyzing the solution of four-peg tower of Hanoi using protocol analysis technique, and of developing decision trees from the analyzed contents. For these, we design and implement a computer program that can simulate four-peg tower of Hanoi. The implemented program generates a certain regular-to-regular tower of Hanoi problem, let a user to solve the problem, and records the solution process. From the process by the implemented program and the recorded protocol, we can build the decision tree for the solution. We expect this research can contribute to find a non-optimal solution for n-peg tower of Hanoi.

  • PDF

Omnidirectional Camera-based Image Rendering Synchronization System Using Head Mounted Display (헤드마운티드 디스플레이를 활용한 전방위 카메라 기반 영상 렌더링 동기화 시스템)

  • Lee, Seungjoon;Kang, Suk-Ju
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.6
    • /
    • pp.782-788
    • /
    • 2018
  • This paper proposes a novel method for the omnidirectional camera-based image rendering synchronization system using head mounted display. There are two main processes in the proposed system. The first one is rendering 360-degree images which are remotely photographed to head mounted display. This method is based on transmission control protocol/internet protocol(TCP/IP), and the sequential images are rapidly captured and transmitted to the server using TCP/IP protocol with the byte array data format. Then, the server collects the byte array data, and make them into images. Finally, the observer can see them while wearing head mounted display. The second process is displaying the specific region by detecting the user's head rotation. After extracting the user's head Euler angles from head mounted display's inertial measurement units sensor, the proposed system display the region based on these angles. In the experimental results, rendering the original image at the same resolution in a given network environment causes loss of frame rate, and rendering at the same frame rate results in loss of resolution. Therefore, it is necessary to select optimal parameters considering environmental requirements.

A Study on CSMA/CA for WLAN Environment

  • Moon Il-Young;Cho Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.530-533
    • /
    • 2006
  • Recently, a basic access method about IEEE 802.11 MAC layer protocol using IEEE 802.11 wireless LANs is the DCF thatis based on the CSMA/CA. But, cause of IEEE 802.11 MAC layer uses original backoff algorithm (exponential backoff method), when collision occurred, the size of contention windows increases the double size. Also, a time of packet transmission delay increases and efficiency is decreased by original backoff scheme. In this paper, we have analyzed TCP packet transmission time of IEEE 802.11 MAC DCF protocol for wireless LANs a proposed enhanced backoff algorithm. It is considered the transmission time of transmission control protocol (TCP) packet on the orthogonal frequency division multiplexing (OFDM) in additive white gaussian noise (AWGN) and Rician fading channel. From the results, a proposed enhanced backoff algorithm produces a better performance improvement than an original backoff in wireless LAN environment. Also, in OFDM/quadrature phase shift keying channel (QPSK), we can achieve that the transmission time in wireless channel decreases as the TCP packet size increases and based on the data collected, we can infer the correlation between packet size and the transmission time, allowing for an inference of the optimal packet size in the TCP layer.

  • PDF

The Propose of Optimal Flow Data Acquisition by Error Rate Analysis of Flow Data (유량 데이터 오차율 분석을 통한 최적의 유량데이터 취득방안 제안)

  • Kim, Yunha;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.31 no.3
    • /
    • pp.249-256
    • /
    • 2017
  • Recently, application areas based on M2M (Machine-to-Machine communications) and IoT (Internet of Things) technologies are expanding rapidly. Accordingly, water flow and water quality management improvements are being pursued by applying this technology to water and sewage facilities. Especially, water management will collect and store accurate data based on various ICT technologies, and then will expand its service range to remote meter-reading service using smart metering system. For this, the error in flow rate data transmitting should be minimized to obtain credibility on related additional service system such as real time water flow rate analysis and billing. In this study, we have identified the structural problems in transmitting process and protocol to minimize errors in flow rate data transmission and its handling process which is essential to water supply pipeline management. The result confirmed that data acquisition via communication system is better than via analogue current values and pulse, and for communication method case, applying the industrial standard protocol is better for minimizing errors during data acquisition versus applying user assigned method.

Trust-aware secure routing protocol for wireless sensor networks

  • Hu, Huangshui;Han, Youjia;Wang, Hongzhi;Yao, Meiqin;Wang, Chuhang
    • ETRI Journal
    • /
    • v.43 no.4
    • /
    • pp.674-683
    • /
    • 2021
  • A trust-aware secure routing protocol (TSRP) for wireless sensor networks is proposed in this paper to defend against varieties of attacks. First, each node calculates the comprehensive trust values of its neighbors based on direct trust value, indirect trust value, volatilization factor, and residual energy to defend against black hole, selective forwarding, wormhole, hello flood, and sinkhole attacks. Second, any source node that needs to send data forwards a routing request packet to its neighbors in multi-path mode, and this continues until the sink at the end is reached. Finally, the sink finds the optimal path based on the path's comprehensive trust values, transmission distance, and hop count by analyzing the received packets. Simulation results show that TSRP has lower network latency, smaller packet loss rate, and lower average network energy consumption than ad hoc on-demand distance vector routing and trust based secure routing protocol.

Establishment of protocol for genetic transformation of carnation with 1-aminocyclopropane-carboxylate deaminase (acdS) gene

  • Jeong, Hui Yeong;Naing, Aung Htay;Kim, Chang Kil
    • Journal of Plant Biotechnology
    • /
    • v.48 no.2
    • /
    • pp.93-99
    • /
    • 2021
  • This study was conducted to develop an Agrobacterium-mediated genetic transformation protocol for the carnation cv. "Jinju" to counteract its ethylene sensitivity. The new protocol involves the use of an improved shoot regeneration medium, optimized minimal concentrations of the selective agent, a pre-culture period, and co-cultivation periods. Silver nanoparticles (NAg) added at a concentration of 2.0 μM to the Murashige and Skoog (MS) basal shoot regeneration medium supplemented with 0.1 mg/L indole-3-butyric-acid (IBA) and 0.2 mg/L thidiazuron (TDZ) improved the shoot regeneration efficiency, number of shoots per explant, and plant growth compared to the control without the addition of NAg. The phosphinothricin (PPT) concentration of 1.0 mg/L was determined to be the minimal and optimal concentration for the selection of putative transgenic plants. When the explants were infected with Agrobacterium cells harboring the acdS gene, the explants that were pre-cultured for three days induced more putative transgenic plants than those that were co-cultivated for four days. Therefore, we expect that the results of this study will benefit researchers who are developing genetic transformations of carnations.

Developing a Job Exposure Matrix of Work Organization Hazards in the United States: A Review on Methodological Issues and Research Protocol

  • Choi, BongKyoo
    • Safety and Health at Work
    • /
    • v.11 no.4
    • /
    • pp.397-404
    • /
    • 2020
  • Background: Most job exposure matrices (JEMs) have been developed for chemical and physical hazards in the United States (US). In addition, the overall validity of most JEMs of work organization hazards using self-reported data in the literature remains to be further tested due to several methodological weaknesses. Methods: This paper aims to review important methodological issues with regard to a JEM of work organization hazards using self-report data and to present a research protocol for developing a four-axis (job titles, hazards, sex, and time) JEM of major work organization hazards using the US General Social Survey-Quality of Work-Life (GSS-QWL) data (2002-2018; N = 7,100 workers). Results: Five methodological weaknesses in existing JEMs of work organization hazards using self-report data were identified: having only two axes (hazard and occupation), using psychometrically weak items and scales, including scales having little interoccupational variability, unresolved optimal minimum numbers of subjects per occupation, and low accessibility. The methodological weaknesses were successfully addressed in the proposed research protocol. Conclusion: The work organization JEM to be developed will significantly facilitate and strengthen occupational epidemiological studies on work organization hazards and major health outcomes, improve national and occupational surveillance of work organization hazards, and promote interventions for a healthy work environment in the US.