• Title/Summary/Keyword: Network life time

Search Result 603, Processing Time 0.028 seconds

Increase of International Marriage in the Northern Vietnam and a Transnational Social Space (베트남 북부지역의 국제결혼의 증가와 초국가적 사회공간)

  • Jo, Hyun-Mi
    • Journal of the Korean association of regional geographers
    • /
    • v.19 no.3
    • /
    • pp.494-513
    • /
    • 2013
  • In this study, a transnational social space which emerges in a rural village of the northern Vietnam called 'Korean Village' is analyzed. The immigrant women of whom the spouses are Korean were forming transnational network with family members through which frequent and active communications took place. At the same time materialistic exchanges were occurring by means of remittance. Like most rural areas where up-to-date life patterns co-exist with outdated ones, the studied region was turning into a transnational social space under the influence of indigenous locallity, culture and other economic factors. Women were found to play a virtual role as resonator in practicing the transnational activity of migration. With the migration routes getting more and more solidified, the evolution of the transnational social space and the role of resonator, the form of transnational migration which makes involved young women look like a sacrifice is ceaselessly expanding around a specific region. This is noticeable because a rural village seemingly far away from internationalization is not only becoming the transnational social space but also a stage of its evolution.

  • PDF

Dynamic Scheduling Method for Cooperative Resource Sharing in Mobile Cloud Computing Environments

  • Kwon, Kyunglag;Park, Hansaem;Jung, Sungwoo;Lee, Jeungmin;Chung, In-Jeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.484-503
    • /
    • 2016
  • Mobile cloud computing has recently become a new paradigm for the utilization of a variety of shared mobile resources via wireless network environments. However, due to the inherent characteristics of mobile devices, a limited battery life, and a network access requirement, it is necessary for mobile servers to provide a dynamic approach for managing mobile resources efficiently in mobile cloud computing environments. Since on-demand job requests occur frequently and the number of mobile devices is drastically increased in mobile cloud computing environments, a different mobile resource management method is required to maximize the computational power. In this paper, we therefore propose a cooperative, mobile resource sharing method that considers both the inherent properties and the number of mobile devices in mobile cloud environments. The proposed method is composed of four main components: mobile resource monitor, job handler, resource handler, and results consolidator. In contrast with conventional mobile cloud computing, each mobile device under the proposed method can be either a service consumer or a service provider in the cloud. Even though each device is resource-poor when a job is processed independently, the computational power is dramatically increased under the proposed method, as the devices cooperate simultaneously for a job. Therefore, the mobile computing power throughput is dynamically increased, while the computation time for a given job is reduced. We conduct case-based experiments to validate the proposed method, whereby the feasibility of the method for the purpose of cooperative computation is shown.

Load-balanced multi-agent model for moving patient management in mobile distribution environment (모바일 분산 환경에서 이동형 환자관리를 위한 부하 균형 다중 에이전트 모델)

  • Lee, Mal-Rye;Kim, Eun-Gyung;Zang, Yu-Peng;Lee, Jae-Wan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.809-816
    • /
    • 2010
  • This paper proposed about a load-balanced multi-agent model in mobile distribution environment to monitor moving patients and to deal with a situation of emergency. This model was designed to have a structure based on distribution framework by expanding a mobile system, and provides healthcare services based on real time situational information on moving patients. In order to overcome the limitation of middleware when we design system, we provided an abstract layer between applications and their base network infrastructure so that balance between QoS requests and network life can be maintained. In addition, clustering was used in cells for the efficient load distribution among multi-agents. By using Clustering FCM, we got optimal resources and had solve about transmission delay.

A Study on contemporary space in Ubiquitous society - Focusing on Interactive space - (유비쿼터스 사회에서 나타나는 현대 공간에 관한 연구 - 인터렉티브 공간을 중심으로 -)

  • Koh, Gwi-Han
    • Korean Institute of Interior Design Journal
    • /
    • v.21 no.3
    • /
    • pp.50-57
    • /
    • 2012
  • In Ubiquitous era. architecture is not the old building adapting ubiquitous technology. In order to take the role as new architectural paradigm in space, environment and technology, it has to develop technology continuously and experimental architecture at the same time. it must have co-evolution of architectural field and others through organic network. by that, the evolution of space will be in the way that combines space which is responded to human emotion and user-centric human-friendly. It will be the new paradigm of Ubiquitous digital space. Digital technology resulted in a change to a society as well as to the life of human and its way of thinking. Due to those changes, new terms or concepts come out and a new meaning is added to the conventional concepts. This aims to examine type of spatial contexts for interaction design experience. This study is performed through Literature research for theory by interactive space and case studies for construction elements to design. The range of case study is limited to interaction space in addition of interactive elements and user interface. And analysis conclusion is show the many type, First, Interactive space has special purpose for make a interaction by intelligent elements.(sensor, program, algorithm, New-technology) Second, Interactive space was cooperation with various professional for space purpose. Third. Interactive space is self-develop by algorithm, program, sensor network and that is harmonize with user. finally. Interaction space is show the temper elements about allness, metastatic, activeness, liquidity, relationship. That was written by ecological theory.

  • PDF

A Data Centric Storage based on Adaptive Local Trajectory for Sensor Networks (센서네트워크를 위한 적응적 지역 트라젝토리 기반의 데이터 저장소 기법)

  • Lim, Hwa-Jung;Lee, Joa-Hyoung;Yang, Dong-Il;Tscha, Yeong-Hwan;Lee, Heon-Guil
    • The KIPS Transactions:PartC
    • /
    • v.15C no.1
    • /
    • pp.19-30
    • /
    • 2008
  • Sensor nodes are used as a storage space in the data centric storage method for sensor networks. Sensor nodes save the data to the node which is computed by hash table and users also access to the node to get the data by using hash table. One of the problems which the data centric storage method has is that queries from many users who are interested in the popular data could be concentrated to one node. In this case, responses for queries could be delayed and the energy of heavy loaded node could be dissipated fast. This would lead to reduction of network life time. In this paper, ALT, Data Centric Storage based on Adaptive Local Trajectory, is proposed as scalable data centric storage method for sensor network. ALT constructs trajectory around the storage node. The scope of trajectory is increased or decreased based on the query frequency. ALT distributes the query processing loads to several nodes so that delay of response is reduced and energy dissipation is also distributed.

Active Security System using IP Traceback Technology (IP 역추적 기술을 이용한 능동형 보안 시스템)

  • Kim, Jae-Dong;Chae, Cheol-Joo;Lee, Jae-Kwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.933-939
    • /
    • 2007
  • There is a tremendous increase in the growth of Internet making people's life easy. The rapid growth in technology has caused misuse of the Internet like cyber Crime. There are several vulnerabilities in current firewall and Intrusion Detection Systems (IDS) of the Network Computing resources. Automatic real time station chase techniques can track the internet invader and reduce the probability of hacking Due to the recent trends the station chase technique has become inevitable. In this paper, we design and implement Active Security system using ICMP Traceback message. In this design no need to modify the router structure and we can deploy this technique in larger network. Our Implementation shows that ICMP Traceback system is safe to deploy and protect data in Internet from hackers and others.

Wireless sensor networks for permanent health monitoring of historic buildings

  • Zonta, Daniele;Wu, Huayong;Pozzi, Matteo;Zanon, Paolo;Ceriotti, Matteo;Mottola, Luca;Picco, Gian Pietro;Murphy, Amy L.;Guna, Stefan;Corra, Michele
    • Smart Structures and Systems
    • /
    • v.6 no.5_6
    • /
    • pp.595-618
    • /
    • 2010
  • This paper describes the application of a wireless sensor network to a 31 meter-tall medieval tower located in the city of Trento, Italy. The effort is motivated by preservation of the integrity of a set of frescoes decorating the room on the second floor, representing one of most important International Gothic artworks in Europe. The specific application demanded development of customized hardware and software. The wireless module selected as the core platform allows reliable wireless communication at low cost with a long service life. Sensors include accelerometers, deformation gauges, and thermometers. A multi-hop data collection protocol was applied in the software to improve the system's flexibility and scalability. The system has been operating since September 2008, and in recent months the data loss ratio was estimated as less than 0.01%. The data acquired so far are in agreement with the prediction resulting a priori from the 3-dimensional FEM. Based on these data a Bayesian updating procedure is employed to real-time estimate the probability of abnormal condition states. This first period of operation demonstrated the stability and reliability of the system, and its ability to recognize any possible occurrence of abnormal conditions that could jeopardize the integrity of the frescos.

The Public Choice Analysis of Korean Mobile Telecom Policy (이동통신 정책의 공공 선택 분석)

  • Shin, Jin;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.917-920
    • /
    • 2014
  • In Korea mobile phone subscribers exceeded 1 million people in 1995, and ten million people in 1998. Prevalence of the mobile phone increased dramatically over 110% compared to the population. And all family members including children and students use one or two mobile terminal. Mobile phone is obviously necessary good more than washer, vacuum cleaner, passenger car. Our daily life with mobile communication are conveniently positioned, but communication related costs including the price of the device has become a big burden on the household. But the government does not seem to do the right role at the right time to prevent the failure of the market to further maximize consumer welfare and social welfare through fair competition. This principal-agent problems exist especially in perspective of joint use of the mobile communication network, number portability, separation of phone distribution and phone service and network neutrality among in mobile communication policies since the early 1990s up to now.

  • PDF

Dynamic quantitative risk assessment of accidents induced by leakage on offshore platforms using DEMATEL-BN

  • Meng, Xiangkun;Chen, Guoming;Zhu, Gaogeng;Zhu, Yuan
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.11 no.1
    • /
    • pp.22-32
    • /
    • 2019
  • On offshore platforms, oil and gas leaks are apt to be the initial events of major accidents that may result in significant loss of life and property damage. To prevent accidents induced by leakage, it is vital to perform a case-specific and accurate risk assessment. This paper presents an integrated method of Ddynamic Qquantitative Rrisk Aassessment (DQRA)-using the Decision Making Trial and Evaluation Laboratory (DEMATEL)-Bayesian Network (BN)-for evaluation of the system vulnerabilities and prediction of the occurrence probabilities of accidents induced by leakage. In the method, three-level indicators are established to identify factors, events, and subsystems that may lead to leakage, fire, and explosion. The critical indicators that directly influence the evolution of risk are identified using DEMATEL. Then, a sequential model is developed to describe the escalation of initial events using an Event Tree (ET), which is converted into a BN to calculate the posterior probabilities of indicators. Using the newly introduced accident precursor data, the failure probabilities of safety barriers and basic factors, and the occurrence probabilities of different consequences can be updated using the BN. The proposed method overcomes the limitations of traditional methods that cannot effectively utilize the operational data of platforms. This work shows trends of accident risks over time and provides useful information for risk control of floating marine platforms.

Semantic network analysis of schizophrenia through newspaper articles. (신문기사를 통해 본 조현병의 의미연결망 분석)

  • Song, Hye-Jin;Kim, Suk-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.375-384
    • /
    • 2021
  • This study explored the change in keywords and topics in newspaper articles related to schizophrenia after the Gangnam murder case. The study examined newspaper articles related to schizophrenia for five years before and after the Gangnam murder case. A semantic network analysis was conducted using the NetMiner 4.4.1 program. 610 articles between 2013 and 2018 were retrieved from 8 national newsletters. The most frequent core keyword was 'treatment' before the murder case, but 'incidents' after the case. Four topics were identified: 'becoming chronic if missing the time of treatment due to prejudice', 'being curable with early treatment', 'living an ordinary life with medication', 'being indicted as a murderer while impaired by a mental disorder' before the murder case. After the case, four topics were identified: 'committing murder for delusions, not misogyny', 'medication non-adherence leads to more impulsive behavior', 'claiming leniency for criminals due to the mental impairment', 'killing the police who were mobilized to stop stabbing rampage'. These findings suggest that newspaper articles should provide accurate information about schizophrenia to reduce prejudice and stigma toward patients with schizophrenia and other forms of mental illness.