• Title/Summary/Keyword: Multiple Access Interface

Search Result 120, Processing Time 0.023 seconds

A study on the implementation of Medical Telemetry systems using wireless public data network (무선공중망을 이용한 의료 정보 데이터 원격 모니터링 시스템에 관한 연구)

  • 이택규;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.278-283
    • /
    • 2000
  • As information communication technology developed we could check our blood pressure, pulsation electrocardiogram, SpO2 and blood test easily at home. To check our health at ordinary times is able though interlocking the house medical instrument with the wireless public data network This service will help the inconvenience to visit the hospital everytime and will save the individual's time and cost. In each house an organism data which is detected from the human body will be transmitted to the distance hospital and will be essentially applied through wireless public data network The medical information transmit system is utilized by wireless close range network It would transmit the obtained organism signal wirelessly from the personal device to the main center system in the hospital. Remote telemetry system is embodied by utilizing wireless media access protocol. The protocol is embodied by grafting CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance) protocol falling mode which is standards from IEEE 802.11. Among the house care telemetry system which could measure blood pressure, pulsation, electrocardiogram, SpO2 the study embodies the ECC(electrocardiograph) measure part. It within the ECC function into the movable device and add 900㎒ band wireless public data interface. Then the aged, the patients even anyone in the house could obtain ECG and keep, record the data. It would be essential to control those who had a health-examination heart diseases or more complicated heart diseases and to observe the latent heart disease patient continuously. To embody the medical information transmit system which is based on wireless network. It would transmit the ECG data among the organism signal data which would be utilized by wireless network modem and NCL(Native Control Language) protocol to contact through wireless network Through the SCR(Standard Context Routing) protocol in the network it will be connected to the wired host computer. The computer will check the recorded individual information and the obtained ECC data then send the correspond examination to the movable device. The study suggests the medical transmit system model utilized by the wireless public data network.

  • PDF

Design and Implementation of a High-Performance Index Manager in a Main Memory DBMS (주기억장치 DBMS를 위한 고성능 인덱스 관리자의 설계 및 구현)

  • Kim, Sang-Wook;Lee, Kyung-Tae;Choi, Wan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7B
    • /
    • pp.605-619
    • /
    • 2003
  • The main memory DBMS(MMDBMS) efficiently supports various database applications that require high performance since it employs main memory rather than disk as a primary storage. In this paper, we discuss the index manager of the Tachyon, a next-generation MMDBMS. Recently, the gap between the CPU processing and main memory access times is becoming much wider due to rapid advance of CPU technology. By devising data structures and algorithms that utilize the behavior of the cache in CPU, we are able to enhance the overall performance of MMDBMSs considerably. In this paper, we address the practical implementation issues and our solutions for them obtained in developing the cache-conscious index manager of the Tachyon. The main issues touched are (1) consideration of the cache behavior, (2) compact representation of the index entry and the index node, (3) support of variable-length keys, (4) support of multiple-attribute keys, (5) support of duplicated keys, (6) definition of the system catalog for indexes, (7) definition of external APIs, (8) concurrency control, and (9) backup and recovery. We also show the effectiveness of our approach through extensive experiments.

A Solution for Congestion and Performance Enhancement using Dynamic Packet Bursting in Mobile Ad Hoc Networks (모바일 애드 혹 네트워크에서 패킷 버스팅을 이용한 혼잡 해결 및 성능향상 기법)

  • Kim, Young-Duk;Yang, Yeon-Mo;Lee, Dong-Ha
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.409-414
    • /
    • 2008
  • In mobile ad hoc networks, most of on demand routing protocols such as DSR and AODV do not deal with traffic load during the route discovery procedure. To solve the congestion and achieve load balancing, many protocols have been proposed. However, the existing load balancing schemes has only considered avoiding the congested route in the route discovery procedure or finding an alternative route path during a communication session. To mitigate this problem, we have proposed a new scheme which considers the packet bursting mechanism in congested nodes. The proposed packet bursting scheme, which is originally introduced in IEEE 802.11e QoS specification, is to transmit multiple packets right after channel acquisition. Thus, congested nodes can forward buffered packets promptly and minimize bottleneck situation. Each node begins to transmit packets in normal mode whenever its congested status is dissolved. We also propose two threshold values to define exact overloaded status adaptively; one is interface queue length and the other is buffer occupancy time. Through an experimental simulation study, we have compared and contrasted our protocol with normal on demand routing protocols and showed that the proposed scheme is more efficient and effective especially when network traffic is heavily loaded.

MAC Schemes for Best Effort Service in Wireless MAN: Design and Performance Analysis (무선 MAN에서 Best Effort 서비스를 위한 MAC 방식의 설계 및 성능 분석)

  • Park, Jin-Kyung;Shin, Woo-Cheol;Ha, Jun;Choi, Cheon-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.128-140
    • /
    • 2006
  • In the IEEE 802.16 Wireless MAN standard specifies the air interface of fixed point-to-multipoint broadband wireless access systems providing multiple services. Among the service classes supported between the base station and subscriber stations in the wireless MAN, the best effort service class is ranked on the lowest position in priority and is assisted by a MAC scheme based on reservation ALOHA. The wireless MAN standard, however, does not reveal every detail of the MAC scheme but only describes the skeleton of the MAC scheme. Focusing on the amount of resource that a subscriber demands by a request and the amount of resource that the base grants to a request we thus present a number of resource demand rules and resource grant rules. Also, we construct a candidate MAC scheme by implanting a pair of resource demand and grant rules into the skeleton of the MAC scheme. Meanwhile a difficult situation for the best effort service is expected wherein only scarce resource is available after most of the resource is already preempted by other services. Perceiving such a situation, we evaluate the throughput and delay performance of each candidate MAC scheme. Especially we develop an analytical method to approximately calculate the throughput in the saturated environment. From the numerical results, we observe that the candidate MAC scheme which adopts the non-gated exhaustive demand rule paired with the full grant rule attains superior performance at the expense of the fairness.

Development of the Ship Manoeuvring PC Simulator Based on the Network (네트워크 기반의 간이 선박조종 시뮬레이터 개발)

  • Choi, Won-jin;Kim, Hyo-Il;Jun, Seung-Hwan
    • Journal of Navigation and Port Research
    • /
    • v.43 no.6
    • /
    • pp.403-412
    • /
    • 2019
  • The characteristics of the manoeuvring motion of a ship are dependent on the ship type, as well as draft or speed in the same ship. In recent years, the number of extra-large vessels has increased significantly, which can cause enormous material and environmental damage in the event of a marine accident. Thus, the importance of ship maneuvering is increasing. The IMO has forced the officers to be trained in simulators through the STCW 95 amendment. However, FMSS is costly and difficult to access and the PC-based simulator has the disadvantage that only one person can engage in simulation. The purpose of this study was to solve the shortcomings of the FMSS and PC-based simulators by enabling multiple people to use their PCs to simulate based on a network. The simulator is implemented through the analysis and numerical calculation of the Nomoto model, Radar function mounting, data transfer protocol design, and GUI building. To verify the simulator, the simulation results were compared and analyzed with the test results of T.S. HANBADA according to the criteria of the Korean Register of Shipping(KR) and IMO standards for ship maneuverability. As a result, It showed a relative error of 0%~ 32.1% with an average of 13.7%, and it satisfied the IMO criteria for ship maneuverability.

A Cluster-Based Channel Assignment Algorithm for IEEE 802.11b/g Wireless Mesh Networks (IEEE 802.11b/g 무선 메쉬 네트워크를 위한 클러스터 기반 채널 할당 알고리즘)

  • Cha, Si-Ho;Ryu, Min-Woo;Cho, Kuk-Hyun;Jo, Min-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.87-93
    • /
    • 2009
  • Wireless mesh networks (WMNs) are emerging technologies that provide ubiquitous environments and wireless broadband access. The aggregate capacity of WMNs can be improved by minimizing the effect of channel interference. The IEEE 802.11b/g standard which is mainly used for the network interface technology in WMNs provides 3 multiple channels. We must consider the channel scanning delay and the channel dependency problem to effectively assign channels in like these multi-channel WMNs. This paper proposes a cluster-based channel assignment (CB-CA) algorithm for multi-channel WMNs to solve such problems. The CB-CA does not perform the channel scanning and the channel switching through assigning co-channel to the inter-cluster head (CH) links. In the CB-CA, the communication between the CH and cluster member (CM) nodes uses a channel has no effect on channels being used by the inter-CH links. Therefore, the CB-CA can minimize the interference within multi-channel environments. Our simulation results show that CB-CA can improve the performance of WMNs.

A Design and Implementation of Reliability Analyzer for Embedded Software using Markov Chain Model and Unit Testing (내장형 소프트웨어 마르코프 체인 모델과 단위 테스트를 이용한 내장형 소프트웨어 신뢰도 분석 도구의 설계와 구현)

  • Kwak, Dong-Gyu;Yoo, Chae-Woo;Choi, Jae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.1-10
    • /
    • 2011
  • As requirements of embedded system get complicated, the tool for analyzing the reliability of embedded software is being needed. A probabilistic modeling is used as the way of analyzing the reliability of a software and to apply it to embedded software controlling multiple devices. So, it is necessary to specialize that to embedded software. Also, existing reliability analyzers should measure the transition probability of each condition in different ways and doesn't consider reusing the model once used. In this paper, we suggest a reliability analyzer for embedded software using embedded software Markov chin model and a unit testing tool. Embedded software Markov chain model is model specializing Markov chain model which is used for analyzing reliability to an embedded software. And a unit testing tool has host-target structure which is appropriate to development environment of embedded software. This tool can analyze the reliability more easily than existing tool by automatically measuring the transition probability between units for analyzing reliability from the result of unit testing. It can also directly apply the test result updated by unit testing tool by representing software model as a XML oriented document and has the advantage that many developers can access easily using the web oriented interface and SVN store. In this paper, we show reliability analyzing of a example by so doing show usefulness of reliability analyzer.

The Design and Implementation of a Effective web-based electronic mailing system (효율적인 웹기반 전자 우편 시스템의 설계 및 구현)

  • An, Syung-Og;Yoo, Sung-Jung;Yoo, Hyun-Ggung
    • The Journal of Engineering Research
    • /
    • v.4 no.1
    • /
    • pp.5-22
    • /
    • 2002
  • With the rapid advance of internet service and the corresponding migration of service environment from the text-based one to WWW (World Wide Web) environment, the number of internet users is growing rapidly due to its easy usage. Accordingly, usage of internet as services for sending electronic mails to the other party over the network is becoming increasingly prevalent. Web-based electronic mailing system is comprised of a server and a client. The former provides the users with e-mail accounts and services, while the latter serves as a user interface. In other words, it enables those public users who dos not own e-mail accounts on the existing mail server to have an access to the mailing service through the web. In this paper, we designed a effective web-based electronic mailing system which is based on the internet explorer and linux operating system, which overcomes limitations of the existing e-mail systems and meets the need of a cost-efficient alternative. Our electronic mailing system also supports the convenience of users through appropriate handling of preregistered spam e-mails and multiple e-mails, and this facilitates the development of a stable e-mail system by being able to avoiding the low system performance due to the bursty characteristics of e-mail messages and the increasing number of users

  • PDF

The Ethical Regime and Technological Citizenship in Software Oriented Society (SW(소프트웨어)중심사회의 윤리적 체제와 기술 시티즌십)

  • Kim, Seungeun;Kim, Hyomin
    • Journal of Science and Technology Studies
    • /
    • v.15 no.2
    • /
    • pp.263-301
    • /
    • 2015
  • Digital inclusion is the ability or opportunities of individuals and groups to access and use information technology (IT). Digital inclusion strategies aims to ensure that all citizens regardless of their gender, race and class benefit from IT. Discourse of digital inclusion is notable in that it proposes a desirable relationship between the state, individuals, and the market within the shifting topology of technoscience. Throughout broad discourse analysis of media coverages, in-depth interviews and reports on Korean IT industry, this research argues that dialogues on digital inclusion have substantially influenced the formation of a specific ethical regime. In this regime, individuals should become subjects embodying IT expertise and acceptable codes of conducts. We further discuss that such government-driven ethical regime conflicts with technological citizenship practiced by IT experts and semi-experts. We make theoretical contribution to STS by expanding the concept of technological citizenship to include the rights and obligations of heterogeneous expert and semi-expert groups to form, propose and socially demand alternative developmental pathways of technoscience. We also note that, amid the conflict between ethical regime and technological citizenship, alternative interpretations of gender gap can be forged, providing competing perspectives on women's under-representation and labor conditions in the IT industry. Further research is required to capture the emergence of multiple identities--differentiated by gender, race, class, and more--within the clashing interface between the ethical regime and technological citizenship.

INFLUENCES OF DRY METHODS OF RETROCAVITY ON THE APICAL SEAL (치근단 역충전와동의 건조방법이 폐쇄성에 미치는 영향)

  • Lee, Jung-Tae;Kim, Sung-Kyo
    • Restorative Dentistry and Endodontics
    • /
    • v.24 no.1
    • /
    • pp.166-179
    • /
    • 1999
  • Apical sealing is essential for the success of surgical endodontic treatment. Root-end cavity is apt to be contaminated with moisture or blood, and is not always easy to be dried completely. The purpose of this study was to evaluate the influence of dry methods of retrocavity on the apical seal in endodontic surgery. Apical seal was investigated through the evaluation of apical leakage and adaptation of filling material over the cavity wall. To investigate the influence of various dry methods on the apical leakage, 125 palatal roots of extracted human maxillary molar teeth were used. The clinical crown of each tooth was removed at 10 mm from the root apex using a slow-speed diamond saw and water spray. Root canals of the all the specimens were prepared with step-back technique and filled with gutta-percha by lateral condensation method. After removing of the coronal 2 mm of filling material, the access cavities were closed with Cavit$^{(R)}$. Two coats of nail polish were applied to the external surface of each root. Apical three millimeters of each root was resected perpendicular to the long axis of the root with a diamond saw. Class I retrograde cavities were prepared with ultrasonic instruments. Retrocavities were washed with physiologic saline solution and dried with various methods or contaminated with human blood. Retrocavities were filled either with IRM, Super EBA or composite resin. All the specimens were immersed in 2% methylene blue solution for 7 days in an incubator at $37^{\circ}C$. The teeth were dissolved in 14 ml of 35% nitric acid solution and the dye present within the root canal system was returned to solution. The leakage of dye was quantitatively measured via spectrophotometric method. The obtained data were analysed statistically using one-way ANOVA and Duncan's Multiple Range Test. To evaluate the influence of various dry methods on the adaptation of filling material over the cavity wall, 12 palatal roots of extracted human maxillary molar teeth were used. After all the roots were prepared and filled, and retrograde cavities were made and filled as above, roots were sectioned longitudinally. Filling-dentin interface of cut surfaces were examined by scanning electron microscope. The results were as follows: 1. Cavities dried with paper point or compressed air showed less leakage than those dried with cotton pellet in Super EBA filled cavity (p<0.05). However, there was no difference between paper point- and compressed air-dried cavities. 2. When cavities were dried with compressed air, dentin-bonded composite resin-filled cavities showed less apical leakage than IRM- or Super EBA-filled ones (p<0.05). 3. Regardless of the filling material, cavities contaminated with human blood showed significantly more apical leakage than those dried with compressed air after saline irrigation (p<0.05). 4. Outer half of the cavity showed larger dentin-filling interface gap than inner half did when cavities were filled with IRM or Super EBA. 5. In all the filling material groups, cavities contaminated with blood or dried with cotton pellets only showed larger defects at the base of the cavity than ones dried with paper points or compressed air.

  • PDF