• Title/Summary/Keyword: protocol Analysis

Search Result 2,510, Processing Time 0.041 seconds

Comprehensive Analysis and Evaluation of Mobile S-MAC Protocol in Wireless Sensor Network

  • Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.358-366
    • /
    • 2022
  • Wireless sensor networks (WSN) are becoming widely used in collecting and sensing information in different fields such as in the medical area, smart phone industry and military environment. The main concern here is reducing the power consumption because it effects in the lifetime of wireless sensor during commutation because it may be work in some environment like sensor in the battlefields where is not easy to change the battery for a node and that may decrease the efficiency of that node and that may affect the network traffic may be interrupted because one or more nodes stop working. In this paper we implement, simulate, and investigate S-MAC protocol with mobility support and show the sequence of events the sender and receiver go through. We tested some parameters and their impacts of on the performance including System throughput, number of packets successfully delivered per second, packet delay, average packet delay before successful transmission.

Risk Assessment for Performance Evaluation System of Hydrogen Refueling Station (수소충전소 성능평가 장비 안전성 평가 연구)

  • KANG, SEUNGKYU;LEE, DONGHOON
    • Transactions of the Korean hydrogen and new energy society
    • /
    • v.33 no.3
    • /
    • pp.232-239
    • /
    • 2022
  • This study performed qualitative and quantitative risk assessment of equipment for evaluating the protocol of hydrogen refueling stations and suggested measures to improve safety. Hazard and operability study was performed for qualitative risk assessment, and Hy-KoRAM was used for quantitative risk assessment. Through a qualitative risk assessment, additional ventilation devices were installed, simultaneous venting of the storage container was prohibited, and the number of repeated refilling of the evaluation equipment was identified to manage the number of fillings of the container. Through quantitative risk assessment, the area around the device was set as a restricted area when evaluating the station, and measures were suggested to reduce the frequency of accidents.

Enhancement OLSR Routing Protocol using Particle Swarm Optimization (PSO) and Genrtic Algorithm (GA) in MANETS

  • Addanki, Udaya Kumar;Kumar, B. Hemantha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.131-138
    • /
    • 2022
  • A Mobile Ad-hoc Network (MANET) is a collection of moving nodes that communicate and collaborate without relying on a pre-existing infrastructure. In this type of network, nodes can freely move in any direction. Routing in this sort of network has always been problematic because of the mobility of nodes. Most existing protocols use simple routing algorithms and criteria, while another important criterion is path selection. The existing protocols should be optimized to resolve these deficiencies. 'Particle Swarm Optimization (PSO)' is an influenced method as it resembles the social behavior of a flock of birds. Genetic algorithms (GA) are search algorithms that use natural selection and genetic principles. This paper applies these optimization models to the OLSR routing protocol and compares their performances across different metrics and varying node sizes. The experimental analysis shows that the Genetic Algorithm is better compared to PSO. The comparison was carried out with the help of the simulation tool NS2, NAM (Network Animator), and xgraph, which was used to create the graphs from the trace files.

An Efficient Anonymous Mobile P2P Protocol Reducing Garbage Files (가비지 파일의 수신을 줄여줄 수 있는 효율적인 익명 모바일 P2P 프로토콜)

  • Cui, Yun-Feng;Oh, Hee-Kuk;Kim, Sang-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.706-709
    • /
    • 2008
  • With the increasing popularity of P2P file sharing and advancement of mobile technologies, mobile P2P has revealed its attraction. Anonymity has become an increasing requirement in mobile networks. To reduce receiving garbage files, file validation and filtering are other requirements in the mobile P2P environment. If there are effective file filtering and validation mechanism, nodes' battery duration will be saved. In this paper, we do an analysis of security and anonymity in P2P file sharing and exchange system in mobile ad hoc environment, and propose a new efficient anonymous protocol, which can provide anonymity by broadcasting with a probabilistic algorithm and hiding real hop count information, the file validation by the file's special hash value and file filtering mechanism through the collaboration of middle nodes.

Prothrombin Complex Concentrate versus Fresh Frozen Plasma in Adult Patients Undergoing Cardiac Surgery: A Systematic Review and Meta-Analysis

  • Patricia Viana;Jessica Hoffmann Relvas;Marina Persson;Thamiris Dias Delfino Cabral;Jorge Eduardo Persson;Jessica Sales de Oliveira;Paulo Bonow;Camila Veronica Souza Freire;Sara Amaral
    • Journal of Chest Surgery
    • /
    • v.57 no.1
    • /
    • pp.25-35
    • /
    • 2024
  • Background: Prothrombin complex concentrate (PCC) and fresh frozen plasma (FFP) are commonly used to manage bleeding in patients during cardiac surgery. However, the relative efficacy and safety of these 2 strategies remain uncertain. Methods: MEDLINE, Embase, and Cochrane were searched for studies comparing PCC and FFP in patients who underwent cardiac surgery complicated by bleeding. Review Manager (RevMan) ver. 5.4 (Nordic Cochrane Centre, The Cochrane Collaboration) was used for statistical analysis. Binary and continuous outcomes were compared using pooled risk ratios and mean differences, respectively. The meta-analysis protocol was registered in the International Prospective Register of Systematic Reviews under protocol number CRD42022379144. Results: We included 8 studies with 1,500 patients, of whom 613 (40.9%) received PCC. The mean follow-up period ranged from 28 to 90 days. The PCC group had significantly lower chest tube drainage at 24 hours (mean difference [MD], -148.50 mL; 95% CI, -253.02 to -43.99 mL; p=0.005; I2 =42%). Fewer units of red blood cells (RBCs) were transfused within the first 24 hours (MD, -1.02 units; 95% CI, -1.81 to -0.24 units; p=0.01; I2 =56%), and fewer patients required RBC transfusion within the first 24 hours (risk ratio, 0.85; 95% CI, 0.78-0.93; p<0.007; I2 =45%) in the PCC group. There were no statistically significant differences in secondary outcomes. Nonetheless, a subgroup analysis of randomized controlled trials failed to corroborate the results obtained from the main analysis. Conclusion: Our findings suggest that PCC can be effective, without increased adverse events, when compared with FFP in patients undergoing cardiac surgery complicated by bleeding.

Drone Flight Record Forensic System through DUML Packet Analysis (DUML 패킷 분석을 통한 드론 비행기록 포렌식 시스템)

  • YeoHoon Yoon;Joobeom Yun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.103-114
    • /
    • 2024
  • In a situation where drone-related crimes continue to rise, research in drone forensics becomes crucial for preventing and responding to incidents involving drones. Conducting forensic analysis on flight record files stored internally is essential for investigating illegal activities. However, analyzing flight record files generated through the exclusive DUML protocol requires a deep understanding of the protocol's structure and characteristics. Additionally, a forensic analysis tool capable of handling cryptographic payloads and analyzing various drone models is imperative. Therefore, this study presents the methods and characteristics of flight record files generated by drones. It also explains the structure of the flight record file and the features of the DUML packet. Ultimately, we conduct forensic analysis based on the presented structure of the DUML packet and propose an extension forensic analysis system that operates more universally than existing tools, performing expanded syntactic analysis.

One-probe P300 based concealed information test with machine learning (기계학습을 이용한 단일 관련자극 P300기반 숨김정보검사)

  • Hyuk Kim;Hyun-Taek Kim
    • Korean Journal of Cognitive Science
    • /
    • v.35 no.1
    • /
    • pp.49-95
    • /
    • 2024
  • Polygraph examination, statement validity analysis and P300-based concealed information test are major three examination tools, which are use to determine a person's truthfulness and credibility in criminal procedure. Although polygraph examination is most common in criminal procedure, but it has little admissibility of evidence due to the weakness of scientific basis. In 1990s to support the weakness of scientific basis about polygraph, Farwell and Donchin proposed the P300-based concealed information test technique. The P300-based concealed information test has two strong points. First, the P300-based concealed information test is easy to conduct with polygraph. Second, the P300-based concealed information test has plentiful scientific basis. Nevertheless, the utilization of P300-based concealed information test is infrequent, because of the quantity of probe stimulus. The probe stimulus contains closed information that is relevant to the crime or other investigated situation. In tradition P300-based concealed information test protocol, three or more probe stimuli are necessarily needed. But it is hard to acquire three or more probe stimuli, because most of the crime relevant information is opened in investigative situation. In addition, P300-based concealed information test uses oddball paradigm, and oddball paradigm makes imbalance between the number of probe and irrelevant stimulus. Thus, there is a possibility that the unbalanced number of probe and irrelevant stimulus caused systematic underestimation of P300 amplitude of irrelevant stimuli. To overcome the these two limitation of P300-based concealed information test, one-probe P300-based concealed information test protocol is explored with various machine learning algorithms. According to this study, parameters of the modified one-probe protocol are as follows. In the condition of female and male face stimuli, the duration of stimuli are encouraged 400ms, the repetition of stimuli are encouraged 60 times, the analysis method of P300 amplitude is encouraged peak to peak method, the cut-off of guilty condition is encouraged 90% and the cut-off of innocent condition is encouraged 30%. In the condition of two-syllable word stimulus, the duration of stimulus is encouraged 300ms, the repetition of stimulus is encouraged 60 times, the analysis method of P300 amplitude is encouraged peak to peak method, the cut-off of guilty condition is encouraged 90% and the cut-off of innocent condition is encouraged 30%. It was also conformed that the logistic regression (LR), linear discriminant analysis (LDA), K Neighbors (KNN) algorithms were probable methods for analysis of P300 amplitude. The one-probe P300-based concealed information test with machine learning protocol is helpful to increase utilization of P300-based concealed information test, and supports to determine a person's truthfulness and credibility with the polygraph examination in criminal procedure.

Effects of communication in learning middle grade school Mathematics (중학생을 대상으로 한 수학적 의사소통의 지도 효과에 관한 연구)

  • 김선희;이종희
    • Journal of Educational Research in Mathematics
    • /
    • v.8 no.1
    • /
    • pp.145-162
    • /
    • 1998
  • This study investigated the effect of teaching mathematical communication in mathematics learning. Cooperative learning, mathematics pin pals, and writing a mathematics diary were used to teach how to communicate mathematically. The experimental group was assigned to cooperate in class, to write a mathematics diary at the end of each class, and to exchange the mathematics pen pals once a week. The control group was taught by the traditional teaching method. The results were analyzed quantitatively and qualitatively. The learning achievement between the two groups was performed with pretests and posttests. And after this study, mathematics pen pals, video protocol and open-ended test were analyzed. The results of this study are the following: 1. There were little differences in learning achievement test between the group taught through communication and those not. And there were little differences in the results of achievement test between the two groups-high and low level classes.2. Cooperative learning, writing a mathematics diary and mathematics pen pals were effective as methods of teaching communication mathematically. The analysis of mathematics pen pals which is to investigate student's writing abilities showed that pen pal partners were improved in QCAI communication levels. There was a significant difference between the two groups in open-ended test. This means that communication learning has an effect on the tests for mathematical thought, reasoning, and creative thought. The analysis of video protocol showed that four students in a cooperative group were improved in their speaking and listening abilities.

  • PDF

Modeling of wind-induced fatigue of cold-formed steel sheet panels

  • Rosario-Galanes, Osvaldo;Godoy, Luis A.
    • Structural Engineering and Mechanics
    • /
    • v.49 no.2
    • /
    • pp.237-259
    • /
    • 2014
  • Wind-induced failure around screwed connections has been documented in roof and wall cladding systems made with steel sheet cold-formed panels during high wind events. Previous research has found that low cycle fatigue caused by stress concentration and fluctuating wind loads is responsible for most such failures. A dynamic load protocol was employed in this work to represent fatigue under wind effects. A finite element model and fatigue criteria were implemented and compared with laboratory experiments in order to predict the fatigue failure associated with fluctuating wind loads. Results are used to develop an analytical model which can be employed for the fatigue analysis of steel cold-formed cladding systems. Existing three dimensional fatigue criteria are implemented and correlated with fatigue damage observed on steel claddings. Parametric studies are used to formulate suitable yet simple fatigue criteria. Fatigue failure is predicted in different configurations of loads, types of connections, and thicknesses of steel folded plate cladding. The analytical model, which correlated with experimental results reported in a companion paper, was validated for the fatigue life prediction and failure mechanism of different connection types and thicknesses of cold-formed steel cladding.

Research about Asynchronous LAS Advanced & WRC Weblog Analysis of Practical use ESM (LAS Advanced & WRC 웹로그 분석을 활용한 ESM에 관한 연구)

  • Woo, Seung-Ho;Kang, Soon-Duk
    • The Journal of Information Technology
    • /
    • v.7 no.4
    • /
    • pp.9-20
    • /
    • 2004
  • Result Dos that materialization KNU Virus Wall to solve serious problem Hurtfulness Virus is present network chiefly in this research to do not become and do correct disposal in situation such as internet and Multiple Protocol that is done intelligence anger for ESM, CIS and MIS side as secondary to solve this problem about out log analysis system embody. As a result, could use comprehensively, and can click by Site Design, Packet transmission, and used to interior internet (GroupWare) in information protection aspect because intelligence enemy to face each other ESM's various hacking and virus uses Enterprise Security Management system and CIS, whole web through Smart View and relation of security could do monitoring.

  • PDF