• Title/Summary/Keyword: Amount of Information

Search Result 7,026, Processing Time 0.048 seconds

The study on scheme for train position detection based on GPS/DR (GPS/DR기반의 차상열차위치검지방안 연구)

  • Shin, Kyung-Ho;Joung, Eui-Jin;Lee, Jun-Ho
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.802-810
    • /
    • 2006
  • For a thorough train control, the precise train position detection is necessarily required. The widely used current way for train position detection is the one of using track circuits. The track circuit has a simple structure, and has a high level of reliability. However trains can be detected only on track circuits, which have to be installed on all ground sections, and much amount of cost for its installation and maintenance is needed. In addition, for the track circuit, only discontinuous position detection is possible because of the features of the closed circuit loop configuration. As the recent advances in telecommunication technologies and high-tech vehicle-based control equipments, for the train position detection, the method to detect positions directly from on trains is being studied. Vehicle-based position detection method is to estimate train positions, speed, timing data continuously, and to use them as the control information. In this paper, the features of GPS navigation and DR navigation are analyzed, and the navigation filters are designed by constructing vehicle-based train position detection method by combining GPS navigation and DR navigation for their complementary cooperation, and by using kalman filter. The position estimation performance of the proposed method is also confirmed by simulations.

  • PDF

Efficient Transmission Structure and Key Management Mechanism Using Key Provisioning on Medical Sensor Networks (의료 센서 네트워크에서의 효율적인 전송 구조 및 Key Provisioning을 사용한 키 관리 기법 연구)

  • Seo, Jae-Won;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.285-298
    • /
    • 2009
  • According to the development of ubiquitous technologies, sensor networks is used in various area. In particular, medical field is one of the significant application areas using sensor networks, and recently it has come to be more important according to standardization of the body sensor networks technology. There are special characteristics of their own for medical sensor networks, which are different from the one of sensor networks for general application or environment. In this paper, we propose a hierarchical medical sensor networks structure considering own properties of medical applications, and also introduce transmission mechanism based on hierarchical structure. Our mechanism uses the priority and threshold value for medical sensor nodes considering patient's needs and health condition. Through this way Cluster head can transmit emergency data to the Base station rapidly. We also present the new key establishment mechanism based on key management mechanism which is proposed by L. Eschenauer and V. Gligor for our proposed structure and transmission mechanism. We use key provisioning for emergency nodes that have high priority based on patients' health condition. This mechanism guarantees the emergency nodes to establish the key and transmit the urgent message to the new cluster head more rapidly through preparing key establishment with key provisioning. We analyze the efficiency of our mechanism through comparing the amount of traffic and energy consumption with analysis and simulation with QualNet simulator. We also implemented our key management mechanism on TmoteSKY sensor board using TinyOS 2.0 and through this experiments we proved that the new mechanism could be actually utilized in network design.

Transient Overloads Control Mechanism for Virtual Memory System (가상 메모리 시스템의 일시적인 과부하 완화 기법)

  • Go, Young-Woong;Lee, Jae-Yong;Hong, Cheol-Ho;Yu, Hyukc
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.319-330
    • /
    • 2001
  • In virtual memory system, when a process attempts to access a page that is not resident in memory, the system generates and handles a page fault that causes unpredictable delay. So virtual memory system is not appropriate for the real-time system, because it can increase the deadline miss ratio of real-time task. In multimedia system, virtual memory system may degrade the QoS(quality of service) of multimedia application. Furthermore, in general-purpose operating system, whenever a new task is dynamically loaded, virtual memory system suffers from extensive page fault that cause transient overloading state. In this paper, we present efficient overloading control mechanism called RBPFH (Rate-Based Page Fault Handling). A significant feature of the RBPFH algorithm is page fault dispersion that keeps page fault ratio from exceeding available bound by monitoring current system resources. Furthermore, whenever the amount of available system resource is changed, the RBPFH algorithm dynamically adjusts the page fault handling rate. The RBPFH algorithm is implemented in the Linux operating system and its performance measured. The results demonstrate RBPFH\`s superior performance in supporting multimedia applications. Experiment result shows that RBPFH could achieve 10%∼20% reduction in deadline miss ratio and 50%∼60% reduction in average delay.

  • PDF

Major Outcomes and Tasks for ICH Network Activities in Central Asia : Focusing on Case Studies and Experiences from the Recent Collaborative Work in the Region (중앙아시아 무형문화유산 네트워크 활동의 성과와 미래 - 최근 사례와 경험을 중심으로 -)

  • Park, Seong-Yong
    • Korean Journal of Heritage: History & Science
    • /
    • v.48 no.3
    • /
    • pp.204-219
    • /
    • 2015
  • International society, including the United Nations, has recently been making efforts to further promote a rapprochement of cultures in relation to alleviating military and political conflicts and other social clashes. In line with these efforts at the international level, there has been a growing interest on Central Asia and, in particular, on the Silk Road, which functioned as a trade route among ancient civilizations in the region and is also seen as a route that promoted cultural dialogue and exchanges. Given the amount of cross cultural dialogue and exchange, it is no surprise that intangible cultural heritage has historically been abundant and easily found in the region. However, this heritage was placed in considerable risk because heritage transmission critically weakened for seventy years under Soviet rule. Fortunately, since independence, there has been increasing interest in restoring community identity and reviving intangible heritage. Nevertheless, in spite of this interest, a lack of policies and cultural support in each country has made heritage safeguarding difficult. In this paper, I analyze the various phenomena that took place after the concept and international trends on ICH were introduced and speak about the experiences and outcomes obtained from collaborative network projects by ICHCAP and the Central Asian countries over the last six year. In addition, I would like take this opportunity to discuss how we can understand and develop collaboration in the intangible heritage field in Central Asia in a long-term perspective.

Social network monitoring procedure based on partitioned networks (분할된 네트워크에 기반한 사회 네트워크 모니터링 절차)

  • Hong, Hwiju;Lee, Joo Weon;Lee, Jaeheon
    • The Korean Journal of Applied Statistics
    • /
    • v.35 no.2
    • /
    • pp.299-310
    • /
    • 2022
  • As interest in social network analysis increases, researchers' interest in detecting changes in social networks is also increasing. Changes in social networks appear as structural changes in the network. Therefore, detecting a change in a social network is detecting a change in the structural characteristics of the network. A local change in a social network is a change that occurs in a part of the network. It usually occurs between close neighbors. The purpose of this paper is to propose a procedure to efficiently detect local changes occurring in the network. In this paper, we divide the network into partitioned networks and monitor each partitioned network to detect local changes more efficiently. By monitoring partitioned networks, we can detect local changes more quickly and obtain information about where the changes are occurring. Simulation studies show that the proposed method is efficient when the network size is small and the amount of change is small. In addition, under a fixed overall false alarm rate, when we partition the network into smaller sizes and monitor smaller partitioned networks, it detects local changes better.

The Algorithm for an Energy-efficient Particle Sensor Applied LEACH Routing Protocol in Wireless Sensor Networks (무선센서네트워크에서 LEACH 라우팅 프로토콜을 적용한 파티클 센서의 에너지 효율적인 알고리즘)

  • Hong, Sung-Hwa;Kim, Hoon-Ki
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.13-21
    • /
    • 2009
  • The sensor nodes that form a wireless sensor network must perform both routing and sensing roles, since each sensor node always has a regular energy drain. The majority of sensors being used in wireless sensor networks are either unmanned or operated in environments that make them difficult for humans to approach. Furthermore, since many wireless sensor networks contain large numbers of sensors, thus requiring the sensor nodes to be small in size and cheap in price, the amount of power that can be supplied to the nodes and their data processing capacity are both limited. In this paper, we proposes the WSN(Wireless Sensor Network) algorithm which is applied sensor node that has low power consumption and efficiency measurement. Moreover, the efficiency routing protocol is proposed in this paper. The proposed algorithm reduces power consumption of sensor node data communication. It has not researched in LEACH(Low-Energy Adaptive Clustering Hierarchy) routing protocol. As controlling the active/sleep mode based on the measured data by sensor node, the energy consumption is able to be managed. In the event, the data is transferred to the local cluster head already set. The other side, this algorithm send the data as dependent on the information such as initial and present energy, and the number of rounds that are transformed into cluster header and then transferred. In this situation, the assignment of each node to cluster head evenly is very important. We selected cluster head efficiently and uniformly distributed the energy to each cluster node through the proposed algorithm. Consequently, this caused the extension of the WSN life time.

Algorithm Development for Extract O/D of Air Passenger via Mobile Telecommunication Bigdata (모바일 통신 빅데이터 기반 항공교통이용자 O/D 추출 알고리즘 연구)

  • Bumchul Cho;Kihun Kwon
    • The Journal of Bigdata
    • /
    • v.8 no.2
    • /
    • pp.1-13
    • /
    • 2023
  • Current analysis of air passengers mainly relies on statistical methods, but there are limitations in analyzing detailed aspects such as travel routes, number of regional passengers and airport access times. However, with the advancement of big data technology and revised three data acts, big data-based transportation analysis has become more active. Mobile communication data, which can precisely track the location of mobile phone terminals, can serve as valuable analytical data for transportation analysis. In this paper, we propose a air passenger Origin/Destination (O/D) extraction algorithm based on mobile communication data that overcomes the limitations of existing air transportation user analysis methods. The algorithm involves setting airport signal detection zones at each airport and extracting air passenger based on their base station connection history within these zones. By analyzing the base station connection data along the passenger's origin-destination paths, we estimate the entire travel route. For this paper, we extracted O/D information for both domestic and international air passengers at all domestic airports from January 2019 to December 2020. To compensate for errors caused by mobile communication service provider market shares, we applied a adjustment to correct the travel volume at a nationwide citizen level. Furthermore correlation analysis was performed on O/D data and aviation statistics data for air traffic users based on mobile communication data to verify the extracted data. Through this, there is a difference in the total amount (4.1 for domestic and 4.6 for international), but the correlation is high at 0.99, which is judged to be useful. The proposed algorithm in this paper enables a comprehensive and detailed analysis of air transportation users' travel behavior, regional/age group ratios, and can be utilized in various fields such as formulating airport-related policies and conducting regional market analysis.

Implementation of PersonalJave™ AWT using Light-weight Window Manager (경량 윈도우 관리기를 이용한 퍼스널자바 AWT 구현)

  • Kim, Tae-Hyoun;Kim, Kwang-Young;Kim, Hyung-Soo;Sung, Min-Young;Chang, Nae-Hyuck;Shin, Heon-Shik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.3
    • /
    • pp.240-247
    • /
    • 2001
  • Java is a promising runtime environment for embedded systems because it has many advantages such as platform independence, high security and support for multi-threading. One of the most famous Java run-time environments, Sun's ($PersonalJave^{TM}$) is based on Truffle architecture, which enables programmers to design various GUIs easily. For this reason, it has been ported to various embedded systems such as set-top boxes and personal digital assistants(PDA's). Basically, Truffle uses heavy-weight window managers such as Microsoft vVin32 API and X-Window. However, those window managers are not adequate for embedded systems because they require a large amount of memory and disk space. To come up with the requirements of embedded systems, we adopt Microwindows as the platform graphic system for Personal] ava A WT onto Embedded Linux. Although Microwindows is a light-weight window manager, it provides as powerful API as traditional window managers. Because Microwindows does not require any support from other graphics systems, it can be easily ported to various platforms. In addition, it is an open source code software. Therefore, we can easily modify and extend it as needed. In this paper, we implement Personal]ava A WT using Microwindows on embedded Linux and prove the efficiency of our approach.

  • PDF

A Study of Weight Control and Associated Factors among High School Female Students (서울 일부 지역 여고생의 체중조절 및 이와 관련된 요인)

  • Ahn, Yun;Kim, Hyung-Mee;Kim, Kyung-Won
    • Korean Journal of Community Nutrition
    • /
    • v.10 no.6
    • /
    • pp.814-824
    • /
    • 2005
  • The study purpose was to examine weight control status and related factors among 370 high school girls in Seoul. Factors examined included interest toward weight control, body satisfaction, body image, beliefs regarding weight control and self-efficacy. $65.1\%$ had attempted to control weight and were categorized into attempt group. Those in the attempt group had higher body weight (p < 0.001) and BMI (p < 0.001) than the counterparts. They tried to control weight 2.9 times on average (22.4 days each time). The major information sources for weight control were internet ($62.8\%$), and TV/radio ($17.1\%$). Exercise was most commonly used for weight control, followed by reducing meal amount and skipping dinner. The attempt group was less satisfied with body size (p < 0.001) and perceived their body size as heavier than the counterparts (p < 0.001), but they showed more interest toward weight control (p < 0.001). The ideal body size of society or the body size that they want was very thin in both groups. Twelve out of 20 beliefs regarding weight control were significantly different between the two groups. The attempt group believed more strongly on the advantages such as increased self-confidence, appearance, attractiveness (p < 0.001) and 'good for making friends' (p < 0.01) In contrast, the attempt group believed less strongly about the disadvantages including harmful effects on health (p < 0.001), parents' dislike, feelings of discouragement (p < 0.01) and becoming (p < 0.05). The attempt group showed lower overall self-efficacy to control overeating (p < 0.05) than the counterparts. Especially, the attempt group felt less control of overeating in situations such as eating-out, after school, when they are with family (p < 0.01) or with friends, when they feel hungry, during examination periods and when others offer food (p < 0.05). This study suggested that weight management education for adolescents include strategies for changing body image and beliefs regarding weight control, as well as increasing self-efficacy to control overeating. (Korean J Community Nutrition 10(6) : $814\∼824$, 2005)

An Active Prefetch Filtering Schemes using Exclusive Prefetch Cache (선인출 전용 캐시를 이용한 적극적 선인출 필터링 기법)

  • Chon Young-Suk;Kim Suk-il;Jeon Joong-nam
    • The KIPS Transactions:PartA
    • /
    • v.12A no.1 s.91
    • /
    • pp.41-52
    • /
    • 2005
  • Memory reference instruction caused by cache miss is the critical factor that limits the processing power of processor. Cache prefetching technique is an effective way to reduce the latency due to memory access. However, excessively aggressive prefetch leads to cache pollution and finally to cancel out the advantage of prefetch. In this study, an active prefetch filtering scheme is introduced which dynamically decides whether to commence prefetching after referring a filtering table to reduce the cache pollution due to unnecessary prefetches. For the precision filtering, an evicted address referencing scheme has been proposed where the filter directly compares the current prefetch address with previous unnecessary prefetch addresses stored in filtering table. Moreover, a small sized exclusive prefetch cache has been introduced to increase the amount of eviction of unnecessarily prefetched addresses to enhance the accuracy of dynamic filtering. The exclusive prefetch cache also prevents useful demand data from being pushed out by prefetched data, while the evicted address direct referencing scheme enables the prefetch cache to keep most of useful prefetch data within its small size. Experimental results from commonly used general and multimedia benchmarks show that the average cache miss ratio has been decreased by $13.3{\%}$ by virtue of enhanced filtering accuracy compared with conventional schemes.