• Title/Summary/Keyword: protocol Analysis

Search Result 2,517, Processing Time 0.026 seconds

Security-reliability Analysis for a Cognitive Multi-hop Protocol in Cluster Networks with Hardware Imperfections

  • Tin, Phu Tran;Nam, Pham Minh;Duy, Tran Trung;Voznak, Miroslav
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.3
    • /
    • pp.200-209
    • /
    • 2017
  • In this paper, we investigate the tradeoff between security and reliability for a multi-hop protocol in cluster-based underlay cognitive radio networks. In the proposed protocol, a secondary source communicates with a secondary destination via the multi-hop relay method in the presence of a secondary eavesdropper. To enhance system performance under the joint impact of interference constraint required by multiple primary users and hardware impairments, the best relay node is selected at each hop to relay the source data to the destination. Moreover, the destination is equipped with multiple antennas and employs a selection combining (SC) technique to combine the received data. We derive closed-form expressions of the intercept probability (IP) for the eavesdropping links and the outage probability (OP) for the data links over a Rayleigh fading channel. Finally, the correction of our derivations is verified by Monte-Carlo simulations.

Group Average-consensus and Group Formation-consensus for First-order Multi-agent Systems (일차 다개체 시스템의 그룹 평균 상태일치와 그룹 대형 상태일치)

  • Kim, Jae Man;Park, Jin Bae;Choi, Yoon Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.12
    • /
    • pp.1225-1230
    • /
    • 2014
  • This paper investigates the group average-consensus and group formation-consensus problems for first-order multi-agent systems. The control protocol for group consensus is designed by considering the positive adjacency elements. Since each intra-group Laplacian matrix cannot be satisfied with the in-degree balance because of the positive adjacency elements between groups, we decompose the Laplacian matrix into an intra-group Laplacian matrix and an inter-group Laplacian matrix. Moreover, average matrices are used in the control protocol to analyze the stability of multi-agent systems with a fixed and undirected communication topology. Using the graph theory and the Lyapunov functional, stability analysis is performed for group average-consensus and group formation-consensus, respectively. Finally, some simulation results are presented to validate the effectiveness of the proposed control protocol for group consensus.

Efficient Brainwave Transmission VANET Routing Protocol at Cross Road in Urban Area (도심 사거리 교차로 지역의 효율적인 뇌파전송 VANET 라우팅 프로토콜)

  • Jo, Jun-Mo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.3
    • /
    • pp.329-334
    • /
    • 2014
  • Recently, various electronic functions are developed for car drivers as the advent of electrical automobile. Especially, there are functions to examine for preventing drowsy or healthcare through monitoring brainwave(EEG) of drivers in real time. This function can be provided by transmitting driver's EEG, and the network function for transmission among cars or between car and road side infrastructure is a vital issue. Therefore, in this paper, to provide efficient routing protocol for transmitting EEG data at a cross road in an urban area, 5 different wireless communication network applied each routing protocol such as AODV, DSR, GRP, OLSR, and TORA is designed and simulated in the OPNet network simulator, then it is evaluated for the result.

Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication

  • Vijayakumar, P.;Bose, S.;Kannan, A.;Jegatha Deborah, L.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.878-894
    • /
    • 2013
  • Secure multimedia multicast applications involve group communications where group membership requires secured dynamic key generation and updating operations. Such operations usually consume high computation time and therefore designing a key distribution protocol with reduced computation time is necessary for multicast applications. In this paper, we propose a new key distribution protocol that focuses on two aspects. The first one aims at the reduction of computation complexity by performing lesser numbers of multiplication operations using a ternary-tree approach during key updating. Moreover, it aims to optimize the number of multiplication operations by using the existing Karatsuba divide and conquer approach for fast multiplication. The second aspect aims at reducing the amount of information communicated to the group members during the update operations in the key content. The proposed algorithm has been evaluated based on computation and communication complexity and a comparative performance analysis of various key distribution protocols is provided. Moreover, it has been observed that the proposed algorithm reduces the computation and communication time significantly.

The measurement temperature and analysis used embedded system by internet explorer (인터넷 익스플로러를 통한 임베디드 시스템 기반의 온도 측정 및 분석)

  • 김희식;김영일;설대연;남철
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.1003-1006
    • /
    • 2004
  • In this paper have developed a system for monitoring and processing the real time sensor data in remote site through network. For realizing this system, measurement equipment and protocol are used to transmit the measurement data to remote server and to process measurement data. In server part, the received data from remote site sensor is converted to text or graphic charts for user. The measurement device in sensor part receives the sensor data form sensor and store the received data to its internal memory for transmitting data to server part through Internet. Also the measurement device can receive data form server. The temperature sensor is connected to the measurement device located in laboratory and the measurement device measures temperature of laboratory which can be confirmed by user through Internet. We have developed a server programworking on the Linux to store measurement data from measurement device to server memory. The program is use for SNMP(Simple Network Management Protocol) to exchange data with measurement device. Also the program changes the measurement data into text and graphic charts for user display. The program is use apache PHP program for user display and inquiry. The real time temperature measurement system can be apply for many parts of industry and living.

  • PDF

ASESDP : An Efficient Service Discovery Protocol in Pervasive Computing Environments

  • Ma, Qianli;Liao, Minghong;Jiang, Shouxu;Hong, Wan-Pyo;Gao, Zhenguo
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.4
    • /
    • pp.396-404
    • /
    • 2008
  • Service discovery is the technology of finding needed services in networks, and a key point in pervasive computing environments. This paper presents a novel service discovery protocol: ASESDP(AIP and SRR Enhanced Service Discovery Protocol). In ASESDP, tow schemes are proposed to enhance its performance: AIP(Advertisement Information Piggybacked) and SRR(Shortest Reply Route). In AIP, parts of advertisement information are piggybacked in the service reply packet, which makes the advertisement information propagating along the reply path, and spreads its transmission area. In SRR, in order to reduce the service response time, the shortest reply route is chosen to forward the service reply packet to the source node sending the service request. With the theoretical analysis and Glomosim simulation results, it is verified that ASESDP can reduce the number of service request packets, save the response time, and improve the efficiency of service discovery.

Throughput analysis of packet applied to the transmission probability for CSMA/CA protocol in wireless LAN (CSMA/CA에 적합한 전송확률을 고려한 무선 LAN의 패킷 처리율 분석)

  • Ha, Eun-Sil
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.51-61
    • /
    • 2009
  • This paper analyzes the throughput of DCF protocol at the MAC layer in the 802.11a wireless LAN. The throughput of DCF protocol is related on probability of backoff, depends on retransmission of each terminal. This paper applied to nonmarcov discrete model for each terminal BER in the base station versus the packet throughput is progressing with the data rate of 6,12,24,54 Mbps, We find the fact that the less the data rate be the higher the throughput. We also find from the throughput calculation by means of traffic intensity in OFDM wireless LAN.

  • PDF

Accuracy of c-KIT in lung cancer prognosis; a systematic review protocol" instead of c-KIT Expression in Lung Cancer Prognostic Evaluation - a Systematic Review Protocol

  • Roudi, Raheleh;Kalantari, Elham;Keshtkar, Abbas;Madjd, Zahra
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.2
    • /
    • pp.863-866
    • /
    • 2016
  • Background: Extensive efforts have been made to investigate c-KIT expression in lung cancer specimens and its correlation with clinical outcomes, but the issue remains unresolved. Thus, this study will be conducted to clarify the prognostic value of c-KIT expression in lung cancer patients. Materials and Methods: We will search Pubmed, SCOPUS, and ISI web of sciences with no restriction of language. Studies with any design (except case reports or case series) evaluating correlations of c-KIT expression with survival or outcome in patients with lung cancer will be included. The outcome measures will include all types of survival indexes, including overall survival rate and disease free survival using Kaplan-Meier analysis and hazard ratios. Study selection and data extraction will be performed by two independent researchers. Quality assessment (assessment of risk of bias) and data synthesis will be implemented using Stata software version 11.1. Results: No ethical issues are predicted. These findings will be published in a peer-reviewed journal and presented at national and international conferences. Conclusions: This systematic review protocol is registered in the PROSPERO International Prospective Register of Systematic Reviews, registration number = CRD42015023391.

Systematic Review for the Development of the Clinical Study with Economical Assessment Protocol on Facial palsy (얼굴마비의 임상연구병행 경제성평가 프로토콜 개발을 위한 체계적 문헌고찰연구)

  • Gong, Na-Gyeong;Seo, Eunsung;Seon, Ji-Hye;Kim, Nam-Kwen
    • The Journal of Korean Medicine
    • /
    • v.38 no.1
    • /
    • pp.46-55
    • /
    • 2017
  • Objectives: The aim of this study is reviewing the literature to extract the key parameter, study design, perspective, cost-effectiveness index and find the calibration parameter for the clinical study with economical evaluation protocol on facial palsy. Methods: Literature search is performed using PUBMED for literature published from January 2000 to December 2016. We included randomized controlled trials(RCTs) and modelling study with economic assessment in which human participated. Results: As a result of literature search, the 198 articles were found. After reviewing the title, abstract and full text, the 5 articles were selected. Selected articles are classified into 4 RCT studies dealing with quality of life and 1 CEA(cost-effectiveness analysis) study. Conclusions: We found reliable key parameters, calibration parameters and elements of economical assessment study, which might be necessary factors for developing research protocol of clinical trial with economic evaluation about facial palsy patients.

Design and Performance Analysis of Electronic Seal Protection Systems Based on AES

  • Kim, Dong-Kyue;Lee, Mun-Kyu;Kang, You-Sung;Chung, Sang-Hwa;Yoon, Won-Ju;Min, Jung-Ki;Kim, Ho-Won
    • ETRI Journal
    • /
    • v.29 no.6
    • /
    • pp.755-768
    • /
    • 2007
  • A very promising application of active RFID systems is the electronic seal, an electronic device to guarantee the authenticity and integrity of freight containers. To provide freight containers with a high level of tamper resistance, the security of electronic seals must be ensured. In this paper, we present the design and implementation of an electronic seal protection system. First, we propose the eSeal Protection Protocol (ePP). Next, we implement and evaluate various cryptographic primitives as building blocks for our protocol. Our experimental results show that AES-CBC-MAC achieves the best performance among various schemes for message authentication and session key derivation. Finally, we implement a new electronic seal system equipped with ePP, and evaluate its performance using a real-world platform. Our evaluation shows that ePP guarantees a sufficient performance over an ARM9-based interrogator.

  • PDF