• Title/Summary/Keyword: Mobility control

Search Result 997, Processing Time 0.037 seconds

Stress Coping Process in Elderly People: Grounded Theory Approach (노인의 스트레스 대처과정에 대한 근거 이론적 접근)

  • Kim Ae-Kyung
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.10 no.3
    • /
    • pp.345-353
    • /
    • 2003
  • Purpose: The purpose of this study was to explore the stress-coping process used by elderly people. Method: This study was based on the grounded theory methodology of Strauss & Corbin. The participants were 15 elders selected by theoretical sampling. Over a period of 3 months, in-depth interviews using audiotape recording were used to collect the data. The data were analyzed simultaneously by a constant comparative method in which new data were continuously coded in categories and properties according to Strauss and Corbin's methodology, Result: Stress in elderly people is caused by illness, family conflict, and loss of economic power. Stress occurred in connection with aging and limitation of social activity. The central incidents for stress were fear, alienation and anxiety. It was found that action/interactional strategies of stress-coping behavior were related to social support and mobility disorders. Action/interactional strategies to stress-coping in elderly people were dependent on medical treatment, mind control, participation of social activity, and renunciation of offensive behavior. Stress-coping in elderly people resulted in stability or instability in body and mind. Conclusion: It is suggested that the results of this study may contribute to the development stress-coping strategies for elderly people. There is need to develop social support systems and a positive environment to avoid negative coping strategies.

  • PDF

An Experimental Study on the Characteristics of Direct Photoelectric Charging (직접 광대전의 대전특성에 관한 실험적 연구)

  • Lee, Chang-Sun;Kim, Yong-Jin;Kim, Sang-Sao
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.24 no.6
    • /
    • pp.753-759
    • /
    • 2000
  • Photoelectric charging is a very efficient way of charging small particles. This method can be applied to combustion measurement, electrostatic precipitator, metal separation and control of micro-contamination. To understand the photoelectric charging mechanism, particle charging of silver by exposure to ultraviolet is investigated in this study. Average charges and charge distributions are measured at various conditions, using two differential mobility analyzers, a condensation nucleus counter, and an aerosol electrometer. The silver particles are generated in a spark discharge aerosol generator. After that process, the generated particles are charged in the photoelectric charger using low-pressure mercury lamp that emits ultraviolet having wavelength 253.7 nm. The results show that ultra-fine particles are highly charged by the photoelectric charging. The average charges linearly increase with increasing particle size and the charge distribution change with particle size. These results are discussed by comparison with previous experiments and proposed equations. It is assumed that the coefficient of electron emission probability is affected by initial charge. The results also show that the charge distribution of a particle is dependent on initial charge. Single changed particle, uncharged particle and neutralized particle are compared. The differences of charge distribution in each case increase with increasing particle size.

CACH Distributed Clustering Protocol Based on Context-aware (CACH에 의한 상황인식 기반의 분산 클러스터링 기법)

  • Mun, Chang-Min;Lee, Kang-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1222-1227
    • /
    • 2009
  • In this paper, we proposed a new method, the CACH(Context-aware Clustering Hierarchy) algorithm in Mobile Ad-hoc Network(MANET) systems. The proposed CACH algorithm based on hybrid and clustering protocol that provide the reliable monitoring and control of a variety of environments for remote place. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. The proposed analysis could help in defining the optimum depth of hierarchy architecture CACH utilize. Also, the proposed CACH could be used localized condition to enable adaptation and robustness for dynamic network topology protocol and this provide that our hierarchy to be resilient. As a result, our simulation results would show that a new method for CACH could find energy efficient depth of hierarchy of a cluster.

A Study on the Effective Routing Algorithm for Mobile Ad-hoc Wireless Program Developed Network (Ad-hoc 이동 통신망에서의 무료통신이 가능한 라우팅 알고리즘 프로그램 개발 연구)

  • Lee, Dong chul;Oh, Goo Young;You, Sung-Pil;Lee, Hye soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.601-603
    • /
    • 2013
  • The nodes of Ad-hoc network are made up of location registration for sending informations and a great number of packet transmissions to maintain routing route among the nodes. Under this environment, a huge number of traffics would be generated as mobility variable occurs more than in physical network. Hence, in this paper, focused on to study the relationship of nodes to analyze the extent of the traffic in order to control the traffics of the multi-hop in Ad-hoc.

  • PDF

A Study on the Effective Routing Algorithm for Mobile Ad-hoc Wireless Program Develop Network (Ad-hoc 통신망에서 요구되는 라우팅 알고리즘 프로그램 개발연구)

  • Lee, Dong chul;Kim, Sung gwun;Cho, Se hyun;Lee, Hye soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.623-625
    • /
    • 2012
  • The nodes of Ad-hoc network are made up of location registration for sending informations and a great number of packet transmissions to maintain routing route among the nodes. Under this environment, a huge number of traffics would be generated as mobility variable occurs more than in physical network. Hence, in this paper, focused on to study the relationship of nodes to analyze the extent of the traffic in order to control the traffics of the multi-hop in Ad-hoc.

  • PDF

The Design for Traffic Container to use resources efficiently in DiffServ (DiffServ의 효율적인 자원활용을 위한 트래픽 컨테이너 설계)

  • Jang, Kyung-Sung;Kang, Dae-Wook
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.115-122
    • /
    • 2004
  • Diff-Serv is a mechanism by which network service providers can offer differing levels of network service to different traffic, in so providing quality of service (QoS) to their customers. Because this mechanism has been deployed just for fixed hosts with the Token Bucket mechanism, DiffServ have been suggested can not satisfy the mobility service or the differential serrlce for Individual traffics. In this paper, we suggest WFQ mechanism for traffic conditioner and scheduling method for monitoring the AggF(Aggregate Flow) which will be controlled in edge nodes and border routers. So it will control traffic rate dynamically and suggest efficient usability of bandwidth.

Handover Control Scheme Initiated by the Mobile Terminal in Wireless ATM LAN System (무선 ATM LAN 시스템에서 이동 단말에 의한 핸드오버 제어 기법)

  • Park, Nam-Hun;Kim, Yeong-Seon;Choe, Jun-Gyun;Gam, Sang-Ha
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1236-1245
    • /
    • 2000
  • This paper propose a novel scheme, called Mobiel Terminal Initiated Scheme(MTIS), in which mobile terminal initiates the backward handover by sending handover request message with the list of target radio ports. In this scheme, the old ATM switch suporting end-user mobility, denoted by EMAS\ulcorner, checks whether each EMAS\ulcorner, managing the target radio port, has its available resources. If it has, the EMAS\ulcorner performs the path rerouting between CrossOver Switch (COS) and itself after deciding the most suitable target radio port. Therefore, the MT initiates the handover after deciding the most suitable target radio port through the beacon signal of Wireless Access Point (WAP). The EMAS\ulcorner have only to check the resource availability of the target radio port. It is no need to waste time to decide the suitable target radio port. Also, once receiving the request of the resource availability, the EMAS\ulcorner can reduce the rerouting delay time due to perform the path rerouting to the COS. In comparison with that of the ATM-Forum procedure, our proposed MTIS handover delay time reduced 14~21%, and end-to-end transfer delay time reduced 2~9%, as a result of the simulation.

  • PDF

Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments (퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가)

  • Jin, Byungwook;Kim, Jonghwa;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

Design Evaluation of Pickup Device Collecting Deep-Sea-Manganese Nodules (심해저 망간단괴 집광기 채집장치의 설계평가)

  • Choi, Jong-Soo;Lee, Tae-Hee;Hong, Sub;Sim, Jae-Yong
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.15 no.3
    • /
    • pp.68-74
    • /
    • 1998
  • Performance and efficiency of deep seabed collector is a primary factor for feasibility of commercial deep ocean mining. The efficiency of manganese nodules collector depends on vehicle mobility relative to undulating seafloor and is attributed pickup head to keep altitude and elevation of it against seafloor. For this reason, motion control of pickup head relative to the changing deep-sea topography and other disturbances is of particular importance in design of pickup device. The concept of design axiom is applied to a pickup device of hybrid type in order to evaluate the concept design. Kinematic analysis conducted in absolute Cartesian coordinates gives position, velocity, and acceleration of the hydraulic cylinders which enable the pickup head to keep the preset optimal distance from seafloor. Inverse dynamic analysis provides the driving forces of hydraulic cylinders and the reaction forces at each joint. Design sensitivity analysis is performed in order to investigate the effects of possible design variables on the change of the maximum strokes of hydraulic cylinders. The direct differentiation method is used to obtain the design sensitivity coefficients.

  • PDF

Cubic Tangible User Interface Development for Mobile Environment (모바일 환경을 위한 큐빅형 텐저블 사용자 인터페이스 개발)

  • Ok, Soo-Yol
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.26 no.10
    • /
    • pp.32-39
    • /
    • 2009
  • Most mobile devices provide limited input interfaces in order to maximize the mobility and the portability. In this paper, the author proposes a small cubic-shaped tangible input interface which tracks the location, the direction, and the velocity using MEMS sensor technology to overcome the physical limitations of the poor input devices in mobile computing environments. As the preliminary phase for implementing the proposed tangible input interface, the prototype design and implementation methods are described in this paper. Various experiments such as menu manipulation, 3-dimensional contents control, and sensor data visualization have been performed in order to verify the validity of the proposed interface. The proposed tangible device enables direct and intuitive manipulation. It is obvious that the mobile computing will be more widespread and various kinds of new contents will emerge in near future. The proposed interface can be successfully employed for the new contents services that cannot be easily implemented because of the limitation of current input devices. It is also obvious that this kind of interface will be a critical component for future mobile communication environments. The proposed tangible interface will be further improved to be applied to various contents manipulation including 2D/3D games.