• Title/Summary/Keyword: Mobility control

Search Result 997, Processing Time 0.024 seconds

Effects of Ultrasound and Laser Therapy in Patients With Sub-Acute Lower Back Pain (초음파 치료와 레이저 치료가 아급성 요통에 미치는 영향)

  • Choi, Jin-Ho
    • Physical Therapy Korea
    • /
    • v.14 no.2
    • /
    • pp.76-84
    • /
    • 2007
  • This study was designed to determine the efficacy of ultrasound and laser therapy for sub-acute lower back pain. Twenty-seven patients with sub-acute low back pain were recruited, who were randomly assigned to three groups: Ultrasound group (actual ultrasound, 1.1 MHz, $1.0W/cm^2$, duty cycle 100%, 10 min/session, n=9), laser group (actual laser, 904 nm, 155 ns, 13.5 W, 12 mW, 90 sec/point, n=9), and control group (placebo ultrasound or placebo laser, n=9). All of treatments including placebo procedures were applied to patients over a period of 2 weeks, five times a week. Visual Analogue Scale (VAS), Modified Schober's Test (MST), and Modified Oswestry Disability Questionnaire (MODQ) were used by the clinical and functional evaluations before and after intervention. At post-hoc, significant differences were observed in all groups with respect to VAS, MST (p<.05), except MODQ. VAS and MST score were more significantly improved in the ultrasound group than the laser and control group (p<.0167). However, no significant difference was present between the laser group and the control group. Therefore, this study revealed that ultrasound therapy was effective in pain relief and improvement of lumbar mobility in patients with sub-acute lower back pain. However, laser therapy did not show the effects for sub-acute lower back pain.

  • PDF

Locomotion Control of 4 Legged Robot Using HyperNEAT (HyperNEAT를 이용한 4족 보행 로봇의 이동 제어)

  • Jang, Jae-Young;Hyun, Soo-Hwan;Seo, Ki-Sung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.1
    • /
    • pp.132-137
    • /
    • 2011
  • The walking mobility with stability of 4 legged robots is the distinguished skills for many application areas. Planning gaits of efficient walking for quadruped robots is an important and challenging task. Especially, autonomous generation of locomotion is required to manage various robot models and environments. In this paper, we propose an adaptive locomotion control of 4 legged robot for irregular terrain using HyperNEAT. Generated locomotion is executed and analysed using ODE based Webots simulation for the 4 legged robot which is built by Bioloid.

Design and Implementation of A UPnP Security Model (UPnP보안 모델의 설계 및 구현)

  • Lee Dong-Gun;Lim Kyeng-Sik;Park Kwang-Ro
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.1 no.2
    • /
    • pp.30-42
    • /
    • 2002
  • UPnP(Universal Plug and Play) is commercial product for the first time in home network middlewares, but it has problem that it has no security standards in UPnP specification. In this paper, we present UPnP security model. It is based on XML Signature of XML Security. It provides UPnP with secure services which are device control message authentication and user access level control. It is independent of UPnP modules and has mobility of secure service modules for non secure ability user part. We conclude this paper with an example of applying UPnP Security model to the UPnP audio device control and an test example.

  • PDF

Analysis on Kinematic Characteristics of the Revolute-joint-based Translational 3-DOF Parallel Mechanisms (회전관절만을 활용하는 병진 3자유도 병렬 메커니즘의 기구학 특성 분석)

  • Park, Jae-Hyun;Kim, Sung Mok;Kim, WheeKuk
    • The Journal of Korea Robotics Society
    • /
    • v.10 no.2
    • /
    • pp.119-132
    • /
    • 2015
  • Two novel parallel mechanisms (PMs) employing two or three PaPaRR subchains are suggested. Each of those two PMs has translational 3-DOF motion and employs only revolute joints such that they could be adequate for haptic devices requiring minimal frictions. The position analyses of those two PMs are conducted. The mobility analysis, the kinematic modeling, and singularity analysis of each of two PMs are performed employing the screw theory. Then through optimal kinematic design, each of two PMs has excellent kinematic characteristics as well as useful workspace size adequate for haptic applications. In particular, by applying an additional redundantly actuated joint to the 2-PaPaRR type PM which has a closed-form position solution, it is shown that all of its parallel singularities within reachable workspace are completely removed and that its kinematic characteristics are improved.

Context-Aware Security System for the Smart Phone-based M2M Service Environment

  • Lee, Hyun-Dong;Chung, Mok-Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.64-83
    • /
    • 2012
  • The number of smart phone users is rapidly growing due to recent increase in wireless Internet usage, development of a wide variety of applications, and activation of M2M (Machine to machine) services. Although the smart phone offers benefits of mobility and convenience, it also has serious security problems. To utilize M2M services in the smart phone, a flexible integrated authentication and access control facility is an essential requirement. To solve these problems, we propose a context-aware single sign-on and access control system that uses context-awareness, integrated authentication, access control, and an OSGi service platform in the smart phone environment. In addition, we recommend Fuzzy Logic and MAUT (Multi-Attribute Utility Theory) in handling diverse contexts properly as well as in determining the appropriate security level. We also propose a security system whose properties are flexible and convenient through a typical scenario in the smart phone environment. The proposed context-aware security system can provide a flexible, secure and seamless security service by adopting diverse contexts in the smart phone environment.

Coverage Scheduling control Algorithm in MANET (모바일 에드 혹 네트워크에서 커버리지 스케쥴링 제어 알고리즘)

  • Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.848-850
    • /
    • 2014
  • Mobile Ad hoc Networks(MANET) is consist of node that has mobility, MANET build cluster formation for using energy efficient. In existing LEACH algorithm elect cluster head node in coverage area by distribution function. However, when the cluster head node, that elected by distribution function, is divided coverage area unevenly, the network can't consumption energy efficiency. To solve this problem, we proposed CSWC(Coverage Scheduling Weight-value Control) algorithm. When the coverage area is divided nonchalance, proposed algorithm increased number of hops, that determines coverage area, for balance coverage area. As the result proposed algorithm is set balance coverage area, the network consumption energy efficiency.

  • PDF

Analyses of Security Issues for Internet of Things in Healthcare Application (헬스캐어 시스템에서의 사물 인터넷 통신을 위한 보안 문제 분석)

  • Shin, Yoon-gu;Kim, Hankyu;Kim, Sujin;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.699-700
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other healthcare giver. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper defines a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic Personal Health Records. This security architecture is aimed to be used with a mobile e-health application (m-health) through a simple and intuitive interface, supported by RFID technology. This architecture, able to support secured and authenticated interactions, will enable an easy deployment of m-health applications. The special case of drug administration and ubiquitous medication control system, along with the corresponding Internet of Things context, is presented.

  • PDF

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

An Efficient Service Function Chains Orchestration Algorithm for Mobile Edge Computing

  • Wang, Xiulei;Xu, Bo;Jin, Fenglin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4364-4384
    • /
    • 2021
  • The dynamic network state and the mobility of the terminals make the service function chain (SFC) orchestration mechanisms based on static and deterministic assumptions hard to be applied in SDN/NFV mobile edge computing networks. Designing dynamic and online SFC orchestration mechanism can greatly improve the execution efficiency of compute-intensive and resource-hungry applications in mobile edge computing networks. In order to increase the overall profit of service provider and reduce the resource cost, the system running time is divided into a sequence of time slots and a dynamic orchestration scheme based on an improved column generation algorithm is proposed in each slot. Firstly, the SFC dynamic orchestration problem is formulated as an integer linear programming (ILP) model based on layered graph. Then, in order to reduce the computation costs, a column generation model is used to simplify the ILP model. Finally, a two-stage heuristic algorithm based on greedy strategy is proposed. Four metrics are defined and the performance of the proposed algorithm is evaluated based on simulation. The results show that our proposal significantly provides more than 30% reduction of run time and about 12% improvement in service deployment success ratio compared to the Viterbi algorithm based mechanism.