• Title/Summary/Keyword: Overload Analysis

Search Result 389, Processing Time 0.036 seconds

A Qualitative Study on the Acknowledgement of the cause of the illness in the Patients with RA (류마티스관절염 환자의 원인지각에 관한 질적 연구)

  • Eun, Young
    • Journal of muscle and joint health
    • /
    • v.3 no.2
    • /
    • pp.151-165
    • /
    • 1996
  • The purpose of this study is to describe the acknowledgement of the cause of the illness in the patients with RA. I used naturalistic inquiry as a research methodology. The purposive sampling was conducted. 23 subjects who experienced RA, lived in middle-sized city in Korea, and 19 women and 4 men. I collected data using indepth structured interview, "What is the acknowledgement of the cause of the illness?" I used inductive data analysis-such as unitizing and categorizing. This process is used constant comparative method. Summerising the results of this study, the acknowledgement of the cause of the illness are composed of physical constitution, fatalism, the attribution of physical overload, the attribution of stress, the lack of nutrition. The factors which affect the acknowledgement of the cause of the illness are composed of internal factors, external factors, environmental factors. The internal factors are the weakness of the childhood, the illness experience in the family members, juvenile rheumatoid arthritis, personality, lack of nutrition. The external factors are pregnancy, delivery, role burden and conflict, economic problem. The environmental factors are humid condition, abrupt environmental change. It is needed to explaine the coping pattern according to the acknowledgement of the cause of the illness in the next research.

  • PDF

An Expert System for Operational Aids of Security Control by Incorporation with Conventional Program Packages (기존 전산 프로그램 연계에 의한 신뢰도 제어 운전 지원을 위한 전문가시스템)

  • 문영현;최병윤;김세호
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.39 no.3
    • /
    • pp.240-246
    • /
    • 1990
  • The security control can be defined as all control actions and counter-measures to return the operating state of the system to a normal state. In an emergency state, fault clearing and/or overload suppression is enabled as a security control in order to prevent the extension of the fault. In the alert state, counter-measures should be set up in advance for the dangerous points of the system operation in drder to protect the system from expected accidents. In the normal state, the routine scenario is conducted to analyze system state. In the decision-making of the classification of system states, the heuristic and experienced knowledge can be well applied and thus application of expert system to this area attains considerable achievements. In this study, it is attempted to extract empirical rules through heuristic analysis and establish the knowledge base. Finally, the incorporation method with the conventional program packages in proposed. The expert system is designed to select an appropriate method and to perform the corresponding package. The input data can be automatically set up by using the data base. The computation results can be automatically added to the data base.

  • PDF

Congestion Control Mechanism for Efficient Network Environment in WMSN (무선 멀티미디어 센서 네트워크에서 효율적인 네트워크 환경을 위한 혼잡 제어 메커니즘)

  • Park, Jeong-Hyeon;Lee, Sung-Keun;Oh, Won-Geun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.2
    • /
    • pp.289-296
    • /
    • 2015
  • Wireless multimedia sensor network senses and transfers mass multimedia data. Also, it is sensitive to latency. This thesis proposes a routing technique based on traffic priority in order to improve the network efficiency by minimizing latency. In addition, it proposes a congestion control mechanism that uses packet service time, packet inter-arrival time, buffer usage, etc. In this thesis, we verified the reduction of packet latency in accordance with the quality level of packet as a result of the performance analysis through the simulation method. Also, we verified that the proposed mechanism maintained a reliable network state by preventing packet loss due to network overload.

Analysis of Radio Resource Utilization for a Massive M2M Communication in LTE Systems (LTE 시스템에서 극 다수 기계간 통신을 위한 무선 자원 사용량 분석)

  • Chu, Eunmi;Jung, Bang Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.562-565
    • /
    • 2017
  • In this letter, we consider a 7-step transmission procedure of a large number of machine nodes when they simultaneously request random access to transmit uplink data. We model the radio resource utilization of LTE systems, and analyze the overloaded resources. From the simulation results, we show that the resource of PDCCH becomes significantly overloaded as the number of machine nodes increases in a cell. To alleviate the overload of PDCCH, we allocate radio resource of PDSCH to PDCCH. The result shows that the resource utilization of PDCCH is improved.

A Mixed SOC Estimation Algorithm with High Accuracy in Various Driving Patterns of EVs

  • Lim, Dong-Jin;Ahn, Jung-Hoon;Kim, Dong-Hee;Lee, Byoung Kuk
    • Journal of Power Electronics
    • /
    • v.16 no.1
    • /
    • pp.27-37
    • /
    • 2016
  • In this paper, a mixed algorithm is proposed to overcome the limitations of the conventional algorithms, which cannot be applied in various driving patterns of drivers. The proposed algorithm based on the coulomb counting method is mixed with reset algorithms that consist of the enhanced OCV reset method and the DCIR iterative calculation method. It has many advantages, such as a simple model structure, low computational overload in various profiles, and a low accumulated SOC error through the frequent SOC reset. In addition, the enhanced parameter based on a mathematical analysis of the second-order RC ladder model is calculated and is then applied to all of the methods. The proposed algorithm is verified by experimental results based on a 27-Ah LiPB. It is observed that the SOC RMSE of the proposed algorithm decreases by about 9.16% compared to the coulomb counting method.

Analysis of Transformer Fluid Aging from Overload Operation (지중 저압접속함의 침수조건에 따른 전위 분석)

  • Joung, Jong-Man;Lee, Byung-Sung;Choi, Jong-Gi;Jeong, Yeon-Ha;Park, Cheol-Bae;Song, Il-Kun
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2006.05a
    • /
    • pp.284-287
    • /
    • 2006
  • In this paper variety test results were discussed regarding to the ground potential increase. The tests conducted with a joint box simulating leakage point having an insulator fault. Inside the joint box three-phase cables and one neutral line were connected and the insulator at jointed part was peeled from the one of three-phase cables. The potentials around manhole cover were measured with the variation of manhole material, ground resistance and water resistance when the manhole was flooded. The potentials induced by an electric leakage were drastically decreased with increasing the distance from the leakage location and with less ground resistance.

  • PDF

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication

  • Abdelkader, Ghazli;Naima, Hadj Said;Adda, Ali Pacha
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.152-173
    • /
    • 2017
  • Mobile phones are the most common communication devices in history. For this reason, the number of mobile subscribers will increase dramatically in the future. Therefore, the determining the location of a mobile station will become more and more difficult. The mobile station must be authenticated to inform the network of its current location even when the user switches it on or when its location is changed. The most basic weakness in the GSM authentication protocol is the unilateral authentication process where the customer is verified by the system, yet the system is not confirmed by the customer. This creates numerous security issues, including powerlessness against man-in-the-middle attacks, vast bandwidth consumption between VLR and HLR, storage space overhead in VLR, and computation costs in VLR and HLR. In this paper, we propose a secure authentication mechanism based new mobility management method to improve the location management in the GSM network, which suffers from a lot off drawbacks, such as transmission cost and database overload. Numerical analysis is done for both conventional and modified versions and compared together. The numerical results show that our protocol scheme is more secure and that it reduces mobility management costs the most in the GSM network.

Empirical Study on Antecedents and Consequences of Users' Fatigue on SNS and the Moderating Effect of Habit (SNS에서의 사용자 피로감의 선행 및 결과 요인과 습관의 조절효과에 관한 실증연구)

  • Kim, Sanghyun;Park, Hyunsun
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.137-157
    • /
    • 2015
  • The development of Social Network Service (SNS) has brought many positive changes to the ways people communicate, interact and share information. However, using the SNS does not always leads to in a positive results, particularly when it is addictively used. In fact, the addictive use of SNS results in many negative effects in our society. Recently, SNS users feel negative emotions such as expecially stress and fatigue while using SNS. Thus, the purpose of this study is to empirically examine antecedents of user fatigue on SNS, which can be explained by the degree of Individual, environment and SNS characteristics. This study also examines consequences of user fatigue on SNS. Lastly, we examine the moderating effects of Habit among SNS fatigue, barrier of living and task performance decline. The data for empirical analysis were collected 401 responses on SNS users in Korea. The results of this study are as follows; First, reputation perception, loneliness, unwanted relation, privacy concern, information overload, social presence and interaction are significantly related to SNS fatigue. Second, SNS fatigue, barrier of living and Task performance decline are significantly related to discontinuous usage intention. Third, the moderating effect of Habit of SNS using is found in the relationship among SNS fatigue, barrier of living and task performance decline. Based on the results of this study, Theoretical and practical suggestions were discussed.

Premature Failure Analysis of Servovalve Components for a Thermal Power Plant

  • Chang, Sung-Yong;Chang, Joong-Chel;Kim, Bum-Soo;Seo, Min-Woo;Choi, Chel-Jong
    • Korean Journal of Metals and Materials
    • /
    • v.49 no.9
    • /
    • pp.708-714
    • /
    • 2011
  • The premature failure of a servovalve used for six months in a thermal power plant has been analyzed. The servovalve was made of stainless steel, containing 16Cr-0.44Mo, along with other elements. An overload of oil-supply pumping and an abnormal increase in the oil flux were observed during operation. A study revealed that erosion and corrosion could be the main causes of the failure. The visual examination of the servovalve did not show any appreciable damage. However, corrosion and erosion of the servovalve were observed using scanning electron microscopy (SEM). Upon examination of the servovalve, the corrosion was found to have occurred throughout the bushing and spool; however, erosion occurred at only the edge-side. In addition, the condition of the electrohydraulic control system (EHC) oil was investigated with respect to its satisfaction of the management standard.

A Study on New Alternatives for Overflowing Internet Information and Blocking Harmful Information (인터넷 정보과잉과 유해정보 차단을 위한 새로운 대안 연구)

  • Kim, Sang-Geun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.81-86
    • /
    • 2019
  • Problems related to information overload and harmful information have already expanded to national social problems as well as personal problems. This study explores the causes of Internet addiction, exposure to harmful information, malicious comments, fake information/information manipulation, and new alternatives that have recently been felt as social problems. Assuming that existing technologies/policies were not applied effectively, psychological cause analysis was performed for the fundamental problem approach. As a result, internal problems such as obsession with knowledge/understanding of wrong information/black and white stereotypes and prejudice were analyzed as main causes. Each proposed solution aims to help improve national technology/policy regarding internet addiction and blocking harmful information.