http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Reconcile Security Requirements for Intelligent Vehicles
Madhusudan Singh,Shiho Kim 제어로봇시스템학회 2017 제어로봇시스템학회 국제학술대회 논문집 Vol.2017 No.10
An intelligent vehicle (Self-driving) is an emerging research area. Presently, many industries, research organizations and universities are working on intelligent vehicles. Some researchers are working on security issues of intelligent vehicles (IV). Most of the researchers focus on static security (static security cannot adapt to the changes in the environment). Since the environment of IV is dynamically changing, the approach of static security is not feasible to provide reconcile cyber-security in IV. Reconciling systems evolve in a very uncertain environment and try to fulfill a business objective by sensing the environment, analyzing it and taking the best decision according to its requirements. In this paper, we discuss reconcile security requirements engineering to provide cyber-security in IV. To fulfill our objective, we use the goal modeling approach of RE, the Knowledge Acquisition in Automated Specification (KAOS) Model approach, and designed it using Objectiver tool to find the reconciling requirements. Self-reconciliation in requirement engineering is acquired by five building blocks such as Monitor, Analyze, Plan, Execute and Knowledge i.e. [MAPE-K] loop architecture, which provides the reconciling capabilities to our proposed reconciling requirements for cyber-security in IV.
Non-Tree Based Hybrid Wireless Mesh Protocol
Madhusudan Singh,Sang-Gon Lee 한국멀티미디어학회 2009 한국멀티미디어학회 학술발표논문집 Vol.2009 No.2
Wireless mesh networks (WMNs) is a type of mobile ad-hoc networks. In WMNs, all nodes are static or related with fixed position. WMNs have a default routing protocol, Hybrid Wireless Mesh Protocol (HWMP), which is root constrain and tree-based proactive routing protocol. During reactive routing, it always initiates with PREQ message. In this paper, we propose, different root techniques for different data transmission, non-tree based HWMP for IEEE802.11s. In this paper, we propose some modification of the reactive routing and as well as compared with existing system.
Performance of Mobility Models for Routing Protocol in Wireless Ad-hoc Networks
Singh, Madhusudan,Lee, Sang-Gon,Lee, Hoon-Jae The Korea Institute of Information and Commucation 2011 Journal of information and communication convergen Vol.9 No.5
Nowadays Mobile Ad Hoc Networks (MANETs) are a very popular and emerging technology in the world. MANETs helps mobile nodes to communicate with each other anywhere without using infrastructure. For this purpose we need good routing protocols to establish the network between nodes because mobile nodes can change their topology very fast. Mobile node movements are very important features of the routing protocol. They can have a direct effect on the network performance. In this paper, we are going to discuss random walk and random waypoint mobility models and their effects on routing parameters. Previously, mobility models were used to evaluate network performance under the different routing protocols. Therefore, the network performance will be strongly modeled by the nature of the mobility pattern. The routing protocols must rearrange the changes of accurate routes within the order. Thus, the overheads of traffic routing updates are significantly high. For specific network protocols or applications, these mobility patterns have different impacts.
( Mdiftekhar Salam ),( Madhusudan Singh ),이상곤 ( Sang-gon Lee ),이훈재 ( Hoonjae Lee ) 한국정보처리학회 2011 한국정보처리학회 학술대회논문집 Vol.18 No.1
Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Consideringthecharacteristic of mesh network, in this paper we proposed a public key cryptography based security architecture toestablish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.
Shukla, Suryakant,Sreejeth, Mini,Singh, Madhusudan The Korean Institute of Power Electronics 2021 JOURNAL OF POWER ELECTRONICS Vol.21 No.1
An advanced predictive current controller (APCC) based on deadbeat (DB) control theory for permanent magnet synchronous motor (PMSM) drives is proposed in this paper, where the optimum voltage vector is computed offline by solving an optimization problem. The optimum voltage vector along with a zero-voltage vector (ZVV) is applied to the motor under steady state condition to minimize ripples in the stator current. To achieve a fast dynamic response during the transient state, the voltage vector having the largest magnitude is applied for the complete duration of the control cycle. The phase of the voltage-vector is synchronized to control the components of the stator-current in a DB manner. In previously reported control methods, the two best voltage vectors (BVVs) are selected through enumeration and two independent duty ratios are calculated. However, this increases the computation complexity and computational time. The proposed APCC employs a novel approach in calculating the stator current references of PMSM using maximum torque per ampere (MTPA) control. The effectiveness of the proposed APCC is investigated and compared with some recently reported predictive current controllers. The APCC improves the performance of PMSM drive under steady and transient operation with lower total harmonics distortion (THD) of the stator current and better torque dynamics.
Omega 3 Fatty Acids and COVID-19: A Comprehensive Review
Donald Hathaway III,Pandav Krunal,Patel Madhusudan,Riva-Moscoso Adrian,Singh Bishnu Mohan,Patel Aayushi,Min Zar Chi,Singh-Makkar Sarabjot,Sana Muhammad Khawar,Sanchez-Dopazo Rafael,Desir Rockeven,Fahe 대한감염학회 2020 Infection and Chemotherapy Vol.52 No.4
The rapid international spread of severe acute respiratory syndrome coronavirus 2 responsible for coronavirus disease 2019 (COVID-19) has posed a global health emergency in 2020. It has affected over 52 million people and led to over 1.29 million deaths worldwide, as of November 13th, 2020. Patients diagnosed with COVID-19 present with symptoms ranging from none to severe and include fever, shortness of breath, dry cough, anosmia, and gastrointestinal abnormalities. Severe complications are largely due to overdrive of the host immune system leading to “cytokine storm”. This results in disseminated intravascular coagulation, acute respiratory distress syndrome, multiple organ dysfunction syndrome, and death. Due to its highly infectious nature and concerning mortality rate, every effort has been focused on prevention and creating new medications or repurposing old treatment options to ameliorate the suffering of COVID-19 patients including the immune dysregulation. Omega-3 fatty acids are known to be incorporated throughout the body into the bi-phospholipid layer of the cell membrane leading to the production of less pro-inflammatory mediators compared to other fatty acids that are more prevalent in the Western diet. In this article, the benefits of omega-3 fatty acids, especially eicosapentaenoic acid and docosahexaenoic acid, including their anti-inflammatory, immunomodulating, and possible antiviral effects have been discussed.