• Title/Summary/Keyword: power-aware

Search Result 316, Processing Time 0.023 seconds

ICARP: Interference-based Charging Aware Routing Protocol for Opportunistic Energy Harvesting Wireless Networks (ICARP: 기회적 에너지 하베스팅 무선 네트워크를 위한 간섭 기반 충전 인지 라우팅 프로토콜)

  • Kim, Hyun-Tae;Ra, In-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.27 no.1
    • /
    • pp.1-6
    • /
    • 2017
  • Recent researches on radio frequency energy harvesting networks(RF-EHNs) with limited energy resource like battery have been focusing on the development of a new scheme that can effectively extend the whole lifetime of a network to semipermanent. In order for considerable increase both in the amount of energy obtained from radio frequency energy harvesting and its charging effectiveness, it is very important to design a network that supports energy harvesting and data transfer simultaneously with the full consideration of various characteristics affecting the performance of a RF-EHN. In this paper, we proposes an interference-based charging aware routing protocol(ICARP) that utilizes interference information and charging time to maximize the amount of energy harvesting and to minimize the end-to-end delay from a source to the given destination node. To accomplish the research objectives, this paper gives a design of ICARP adopting new network metrics such as interference information and charging time to minimize end-to-end delay in energy harvesting wireless networks. The proposed method enables a RF-EHN to reduce the number of packet losses and retransmissions significantly for better energy consumption. Finally, simulation results show that the network performance in the aspects of packet transmission rate and end-to-end delay has enhanced with the comparison of existing routing protocols.

The IEEE 802.15.4e based Distributed Scheduling Mechanism for the Energy Efficiency of Industrial Wireless Sensor Networks (IEEE 802.15.4e DSME 기반 산업용 무선 센서 네트워크에서의 전력소모 절감을 위한 분산 스케줄링 기법 연구)

  • Lee, Yun-Sung;Chung, Sang-Hwa
    • Journal of KIISE
    • /
    • v.44 no.2
    • /
    • pp.213-222
    • /
    • 2017
  • The Internet of Things (IoT) technology is rapidly developing in recent years, and is applicable to various fields. A smart factory is one wherein all the components are organically connected to each other via a WSN, using an intelligent operating system and the IoT. A smart factory technology is used for flexible process automation and custom manufacturing, and hence needs adaptive network management for frequent network fluctuations. Moreover, ensuring the timeliness of the data collected through sensor nodes is crucial. In order to ensure network timeliness, the power consumption for information exchange increases. In this paper, we propose an IEEE 802.15.4e DSME-based distributed scheduling algorithm for mobility support, and we evaluate various performance metrics. The proposed algorithm adaptively assigns communication slots by analyzing the network traffic of each node, and improves the network reliability and timeliness. The experimental results indicate that the throughput of the DSME MAC protocol is better than the IEEE 802.15.4e TSCH and the legacy slotted CSMA/CA in large networks with more than 30 nodes. Also, the proposed algorithm improves the throughput by 15%, higher than other MACs including the original DSME. Experimentally, we confirm that the algorithm reduces power consumption by improving the availability of communication slots. The proposed algorithm improves the power consumption by 40%, higher than other MACs.

Study of Police Response to Radiation Accidents and Terrorism (방사선사고와 테러에 대한 경찰의 대응 인식에 관한 연구)

  • Kim, Sang Hoon;Park, Eun-Tae;Kim, Jung Hoon
    • Journal of the Korean Society of Radiology
    • /
    • v.11 no.7
    • /
    • pp.647-653
    • /
    • 2017
  • The purpose of this study is to provide basic data for policy making by understanding preparation plans and awareness of nuclear accidents and radiation terrorism among police officers in the vicinity of nuclear power plants. 221 police officers working in Busan metropolitan city were surveyed and their perception of disaster response was analyzed by organizational structure, command ability, and opinion management. As a result, there was no significant difference in disaster response perception by gender and command class (p>.05). There was statistically significant difference in the ability of command in age and ability according to work experience. As a result of the correlation analysis, there were statistically significant correlations among the three items of organizational structure perception, command ability, and opinion management (+0.5) (p<.01). Overall, it was positive for the police system, and it was well aware of the police work in case of radiation accidents and terrorist attacks. The purpose of this study is to provide basic data for policy making by understanding the coping and awareness of nuclear accidents and radiation terrorism among police officers in the vicinity of nuclear power plants.

The Public Television Crisis and the Mutation of the Public Sphere in Neo-liberalism (신자유주의 시대 공영방송의 위기와 공공영역의 변화)

  • Lee, Sang-Hoon
    • Korean journal of communication and information
    • /
    • v.57
    • /
    • pp.250-266
    • /
    • 2012
  • In neo-liberalism, the change-value of the market and of the machandise based on the individual as the consumer dominate the public sphere, and the capital power encroach on it. with the technological revolution. At the same time the public sphere as such represent the media sphere, which is more and more subordinate, and have no choice but to do to the governmental authority having political power privatized. The private usage of reason in the public sphere is carried out at the structual level. How can we call such a space in which the private usage of reason is generalized and dominant as the public sphere? And so now, we sound out the possibility of the public sphere such as a new space of the universality where the public usage of reason can be realized without any limits and with free. So, when we imagine the proletarian public sphere, in which co-exist the divers private interests, as a new public sphere capable to be constructed, we can address a question as follow. What is the caracteristic of the proletarian public sphere in modern society?, Is the public community able to be formed and realized in such space? How would have the proletarian public sphere the carateristics of the publis sphere? What is the attribute of the community that the proletarian public sphere would make, and what is its force of emancipation? The power is no longer stable and static. Rather, it is reconstructed and reorganized in the divers phases of the everyday life. It is the reason why we put on the order of the day the proletarian public sphere as alternative public space, which would be a place of divers hegemonic representation. And now, we are aware of the beginning of thses changes.

  • PDF

Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device (휴대용통신단말의 효과적인 보안관리를 위한 보안 재구성기법의 설계 및 구현)

  • An, Gae-Il;Kim, Ki-Young;Seo, Dong-Il
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.691-698
    • /
    • 2009
  • A mobile communication device is a small size of portable computer which provides communication service, such as smart phone and PDA. Currently, one of the biggest barriers in developing the mobile communication device is security issue. Even though there are excellent security functions which can remove the security issues, there is a problem that the mobile communication device can not be loaded with all the functions because it has low storage, poor computational power, and inconvenient user interface, compared to the desktop personal computer. This paper proposes a context-aware security reconfiguration scheme for effective security management of the mobile communication device. The scheme can provide the mobile communication device with the optimized security service which is most adapted to its current security context. Through the prototype implementation and the experiments of the proposed scheme, we have confirmed that the proposed scheme is excellent in terms of computing resource efficiency and usability, without degrading security level.

Sybil Attack Detection with Energy Efficiency in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 시빌 공격 탐지)

  • Heo, Junyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.115-120
    • /
    • 2013
  • There are lots of vulnerability and chance to be attacked in wireless sensor networks, which has many applications. Among those attacks, sybil attack is to generate a lot of false node and to inject false information into networks. When a user uses such false information without recognizing the attack, there might be a disaster. Although authentication method can be used to protect such attack, the method is not a good choice in wireless sensor networks, where sensor nodes have a limited battery and low power. In this paper, we propose a novel method to detect sybil attack with a little extra overhead. The proposed method use the characteristics that there is a weak connection between a group of normal nodes and a group of false nodes. In addition, the method uses energy aware routing based on random routing and adds a little information into the routing. Experimental results show that the proposed method detects false node by more than 90% probability with a little energy overhead.

A profile Mode Automation Technique for the Mobile Phone using Combination of Schedule and Context-awareness (스케줄과 상황 인식을 결합한 모바일 폰의 프로파일 모드 자동 설정 기법)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1364-1370
    • /
    • 2017
  • This paper proposes a method that automatically sets profile schedule context-based mobile phone by collecting the user's external situation based on the GPS sensor and accelerometer built into the smartphone and interacting with the data in the user's schedule to minimize the user's handset handling. However, real-time data collection in mobile phones causes energy shortage in the device due to battery consumption. In other words, a service control method is explained in a way that can efficiently handle resource consumption because accessing a measurement device such as GPS and other sensors may increase power consumption of the portable device. Therefore, effective data sharing for context awareness to reduce weekly schedules and smartphone mode has improved energy efficiency in sensing for data collection. The user can use the context more effectively by providing environmental adaptability for various situations such as the end user's local context and smartphone force control.

Energy-aware EDZL Real-Time Scheduling on Multicore Platforms (멀티코어 플랫폼에서 에너지 효율적 EDZL 실시간 스케줄링)

  • Han, Sangchul
    • Journal of KIISE
    • /
    • v.43 no.3
    • /
    • pp.296-303
    • /
    • 2016
  • Mobile real-time systems with limited system resources and a limited power source need to fully utilize the system resources when the workload is heavy and reduce energy consumption when the workload is light. EDZL (Earliest Deadline until Zero Laxity), a multiprocessor real-time scheduling algorithm, can provide high system utilization, but little work has been done aimed at reducing its energy consumption. This paper tackles the problem of DVFS (Dynamic Voltage/Frequency Scaling) in EDZL scheduling. It proposes a technique to compute a uniform speed on full-chip DVFS platforms and individual speeds of tasks on per-core DVFS platforms. This technique, which is based on the EDZL schedulability test, is a simple but effective one for determining the speeds of tasks offline. We also show through simulation that the proposed technique is useful in reducing energy consumption.

Parallelism-aware Request Scheduling for MEMS-based Storages (MEMS 기반 저장장치를 위한 병렬성 기반 스케줄링 기법)

  • Lee, So-Yoon;Bahn, Hyo-Kyung;Noh, Sam-H.
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.2
    • /
    • pp.49-56
    • /
    • 2007
  • MEMS-based storage is being developed as a new storage media. Due to its attractive features such as high-bandwidth, low-power consumption, high-density, and low cost, MEMS storage is anticipated to be used for a wide range of applications from storage for small handhold devices to high capacity mass storage servers. However, MEMS storage has vastly different physical characteristics compared to a traditional disk. First, MEMS storage has thousands of heads that can be activated simultaneously. Second, the media of MEMS storage is a square structure which is different from the platter structure of disks. This paper presents a new request scheduling algorithm for MEMS storage that makes use of the aforementioned characteristics. This new algorithm considers the parallelism of MEMS storage as well as the seek time of requests on the two dimensional square structure. We then extend this algorithm to consider the aging factor so that starvation resistance is improved. Simulation studies show that the proposed algorithms improve the performance of MEMS storage by up to 39.2% in terms of the average response time and 62.4% in terms of starvation resistance compared to the widely acknowledged SPTF (Shortest Positioning Time First) algorithm.

Leakage Energy Management Techniques via Shared L2 Cache Partitioning (캐시 파티션을 이용한 공유 2차 캐시 누설 에너지 관리 기법)

  • Kang, Hee-Joon;Kim, Hyun-Hee;Kim, Ji-Hong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.1
    • /
    • pp.43-54
    • /
    • 2010
  • The existing timeout based cache leakage management techniques reduce the leakage energy consumption of the cache significantly by switching off the power supply to the inactive cache line. Since these techniques were mainly proposed for single-processor systems, their efficiency is reduced significantly in multiprocessor systems with a shared L2 cache because of the cache interferences among simultaneously executing tasks. In this paper, we propose a novel cache partition strategy which partitions the shared L2 cache considering the inactive cycles of the cache line. Furthermore, we propose the adaptive task-aware timeout management technique which considers the characteristics of each task and adapts the timeout dynamically. Experimental results from the simulation show that the proposed technique reduces the leakage energy consumption of the shared L2 cache by 73% for the 2-way CMP and 56% for the 4-way CMP on average compared to the existing representative leakage management technique, respectively.