• Title/Summary/Keyword: weak topology

Search Result 57, Processing Time 0.025 seconds

Mobility Support of IEEE 802.15.4 MAC in Wireless Sensor Networks (무선 센서 네트워크에서 IEEE 802.15.4 MAC의 이동성 지원)

  • Hwang, Sung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.11
    • /
    • pp.2185-2191
    • /
    • 2007
  • The traditional sensor network is composed of the cable and the sensor of high price, when collecting a sensing data, there is a weak point which is not pliability. WSN uses the equipment of low price, it will be able to collect the data which is diverse from various node. In this paper we composed coal mining topology which used IEEE802.15.4 MAC in Korea Coal Corporation site. We proposed models for the mobility support of the work manager from the coal mining, we selected the optimum model through simulation experiments. When applying the WSN in the Korea Coal Corporation and other mines, this result can be used as a basis.

The Effect of Lattice Topology on Benzyl Alcohol Adsorption on Kaolinite Surfaces: Quantum Chemical Calculations of Mulliken Charges and Magnetic Shielding Tensor (캐올리나이트 규산염 층과 벤질알코올의 반응에 대한 양자화학계산에서 결정학적 위상이 멀리켄 전하와 자기 차폐 텐서에 미치는 영향)

  • Lee, Bum-Han;Lee, Sung-Keun
    • Journal of the Mineralogical Society of Korea
    • /
    • v.20 no.4
    • /
    • pp.313-325
    • /
    • 2007
  • In order to have better insights into adsorption of organic molecules on kaolinite surfaces, we performed quantum chemical calculations of interaction between three different model clusters of kaolinite siloxane surfaces and benzyl alcohol, with emphasis on the effect of size and lattice topology of the cluster on the variation of electron density and magnetic shielding tensor. Model cluster 1 is an ideal silicate tetrahedral surface that consists of 7 hexagonal rings, and model cluster 2 is composed of 7 ditrigonal siloxane rings with crystallographically distinct basal oxygen atoms in the cluster, and finally model cluster 3 has both tetrahedral and octahedral layers. The Mulliken charge analysis shows that siloxane surface of model cluster 3 undergoes the largest electron density transfer after the benzyl alcohol adsorption and that of model cluster 1 is apparently larger than that of model cluster 2. The difference of Mulliken charges of basal oxygen atoms before and after the adsorption is positively correlated with hydrogen bond strength. NMR chemical shielding tensor calculation of clusters without benryl alcohol shows that three different basal oxygen atoms (O3, O4, and O5) in model cluster 2 have the isotropic magnetic shielding tensor as $228.2{\pm}3.9,\;228.9{\pm}3.4,\;and\;222.3{\pm}3.0ppm$, respectively. After the adsorption, the difference of isotropic chemical shift varies from 1 to 5.5 ppm fer model cluster 1 and 2 while model cluster 2 apparently shows larger changes in isotropic chemical shift. The chemical shift of oxygen atoms is also positively correlated with electron density transfer. The current results show that the adsorption of benzyl alcohol on the kaolinite siloxane surfaces can largely be dominated by a weak hydrogen bonding and electrostatic force (charge-charge interaction) and demonstrate the importance of the cluster site and the lattice topology of surfaces on the adsorption behavior of the organic molecules on clay surfaces.

Development of DC-DC Converter for Arc Welding Machines using A Novel Half Bridge Soft Switching PWM Inverter (새로운 하프 브리지 소프트 스위칭 PWM 인버터를 이용한 용접기용 DC-DC 컨버터의 개발)

  • Kwon, Soon-Kurl;Mun, Sang-Pil
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.45 no.4
    • /
    • pp.60-67
    • /
    • 2008
  • This paper presents a new full-bridge soft switching PWM DC-DC converter circuit topology that adding two switcher, two lossless snubber quasi-resonance capacity, two diode to power source for general welding machine. This half bridge soft switching Is low voltage hight current output that first coil current is smaller than second coil current in high frequency transformer can be obtained with decreasing path loss in conventional DC bus line switcher. As it operate ZCS/ZVS in full range, high frequency, high efficiency and high output are implemented at low voltage and high DC current switching power supplies. All of this items are got from simulation and the result of experiment. If make up for the weak points of this proposed circuit, it will be used more easily for next generation TIG, MIG and MAG type of arc-welding machine.

Recovery Schemes for Spatial Data Update Transactions in Client-Server Computing Environments (클라이언트-서버 환경에서 공간 데이터의 변경 트랜잭션을 위한 회복 기법)

  • 박재관;최진오;홍봉희
    • Journal of KIISE:Databases
    • /
    • v.30 no.1
    • /
    • pp.64-79
    • /
    • 2003
  • In client-server computing environments, update transactions of spatial data have the following characteristics. First, a transaction to update maps needs interactive work, and therefore it nay take a long time to finish. Second, a long transaction should be allowed to read the dirty data to enhance parallelism of executing concurrent transactions. when %he transaction is rolled back, it should guarantee the cascading rollback of all of the dependent transactions. Finally, two spatial objects may have a weak dependency constraint, called the spatial relationship, based on geometric topology. The existing recovery approaches cannot be directly applied to this environment, due to the high rollback cost and the overhead of cascading rollbacks. Furthermore, the previous approaches cannot guarantee the data integrity because the spatial relationship, which is a new consistency constraint of spatial data, is not considered. This paper presents new recovery schemes for update transactions of spatial data. To guarantee the data integrity, this paper defines recovery dependency as a rendition of cascading rollbacks. The partial-rollback is alto suggested to solve the problem of high rollback cost. The recovery schemes proposed in this paper can remove the unnecessary cascading rollbacks by using undo-delta, partial -redo and partial-undo. Finally, the schemes are performed to ensure the correctness.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

'Picnic', a New Mid-season Apple Cultivar with Medium Size and Good Taste (식미가 우수한 중과형 사과 '피크닉' 육성)

  • Kwon, Soon-Il;Park, Jong-Taek;Lee, Jung-Woo;Kim, Mok-Jong;Kim, Jeong-Hee
    • Horticultural Science & Technology
    • /
    • v.33 no.5
    • /
    • pp.784-788
    • /
    • 2015
  • A new cultivar 'Picnic' originated from an artificial cross between 'Fuji' and 'Sansa' at National Institute of Horticultural & Herbal Science in 1994. The cultivar was preliminarily selected among the elite siblings for its high fruit quality in 2003. After regional adaptability tests in five districts for four subsequent years as 'Wonkyo Ga-34', it was ultimately selected in 2008. Optimum harvest time is late September. Mature fruit has mean weight of 233 g and is conic with light red skin on a greenish yellow ground and yellowish white flesh. The fruit contains a favorable total soluble solids content at $13.8^{\circ}Brix$ and titratable acidity at 0.43%, which results in gustatory harmony between sugars and acids. It is not resistant to bitter rot or Marssonina blotch. 'Picnic' exhibits a physiological cross compatibility with leading cultivars such as 'Fuji', 'Hongro' and 'Tsugaru'. Tree topology is semi-spreading with a weak growth habit.

Enhancement of the Working Capacity and Selectivity Factor of Calcium-Exchanged Y Zeolites for Carbon Dioxide Pressure Swing Adsorption (이산화탄소 압력순환흡착을 위한 칼슘 이온교환 Y 제올라이트의 작업용량과 선택계수 향상)

  • Kim, Moon Hyeon
    • Clean Technology
    • /
    • v.24 no.1
    • /
    • pp.41-49
    • /
    • 2018
  • Y zeolites with different extra-framework cations, such as $Na^+$, $N^+$, $Ca^{2+}$, and $Cu^{2+}$, with different charge and ionic radius have been investigated to greatly enhance a working capacity (W) of $CO_2$ adsorption at $25^{\circ}C$ and a $CO_2/CO$ selectivity factor (S). A sample of NaY with a very small amount of 0.012% $Ca^{2+}$ was fully reversible for seven times repeated $CO_2$ adsorption/desorption cycles, thereby forming no surface carbonates unlikely earlier reports. Although at pressures above 4 bar, 2.00% CaY, 1.60% CuY and 1.87% LiY all showed a $CO_2$ adsorption very similar to that measured for NaY, they gave a significant decrease in the adsorption at lower pressures, depending on the metal ion. At 0.5 ~ 2.5 bar, the extent of $CO_2$ adsorption was in the order NaY > 1.60% CuY > 2.00% CaY > 1.87% LiY. All the $Na^+-based$ metals-exchanged zeolites have a FAU (faujasite) framework and a Si/Al value near 2.6; thus, there is no discernible difference in the framework topology, framework chemical compositions, effective aperture size, and channel structure between the zeolite samples. Therefore, the distinctive behavior in the adsorption of $CO_2$ with a character as a weak Lewis acid is associated with the site basicity of the zeolites, and the interaction potentials of the cations. Different trend was shown for a CO adsorption due to weaker quadrupole interactions. Adsorption of $CO_2$ and CO on samples of CaY with 0.012 to 5.23% Ca disclosed a significant dependence on the Ca loading. The $CO_2$ adsorption increased when the cation exists up to ca. 0.05%, while it decreased at higher Ca amounts. However, values for both W and S could greatly increase as the bare zeolite is enriched by $Ca^{2+}$ ions. The 5.23% CaY had $W=2.37mmol\;g^{-1}$ and S = 4.37, and the former value was comparable to a benchmark reported in the literature.