• Title/Summary/Keyword: Path extension

Search Result 154, Processing Time 0.025 seconds

Balance Evaluation after Reconstruction of Medial Patellar Luxation in Small-Sized Dogs with Wii Balance Board

  • Lee, Shinho;Lee, Joo-Myoung;Park, Hyunjung;Cha, Yuri;Cheong, Jongtae
    • Journal of Veterinary Clinics
    • /
    • v.36 no.6
    • /
    • pp.301-305
    • /
    • 2019
  • Wii® balance board (WBB, Nintendo, Japan) is a device that can measure and record the center of pressure path length (CPPL) and 95% confidence ellipse area (Area 95) in relation to body sway. For evaluating measure of improvement after reconstruction of medial patellar luxation (MPL) in small sized dogs, A total of 6 dogs with limping and lameness gait attributed to Grade II, III or IV MPL were evaluated. Dogs were measured for difference of extension and flexion range of motion in the stifle (dROM), muscle mass, lameness, willingness to bear weight on the affected limb while standing, and willingness to lift the contralateral limb scores, CPPL and Area 95 of WBB on pre-surgery, post-surgery 4, 8 weeks. CPPL was significantly different on pre-surgery compared with post-surgery 8 weeks (p < 0.05). Except for CPPL, measured variables were significantly different on pre-surgery compared with post-surgery 4 and post-surgery 8 weeks (p < 0.01).

Performance Analysis of Location Estimation Algorithm Considering an Extension of Searching Area (탐색범위 확장을 고려한 위치추정 알고리즘의 성능분석)

  • Jeong, Seung-Heui;Lee, Hyun-Jae;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.4
    • /
    • pp.385-393
    • /
    • 2006
  • In this paper, we proposed a location estimation algorithm considering an extension of searching area in 2.45GHz band RTLS and analyzed its performance in terms of an average estimation error distance. The extendable searching area was assumed to be square of $300m{\times}300m$ and 2 dimensions. The arrangement shape of available readers was considered circle, rectangle, and shrinkage rectangle for extendable searching area. Also, we assumed that propagation path was LOS (Line-Of-Sight) environment, and analyzed the estimation error performance as a function of the number of received sub-blink considering an arrangement shape of available readers in searching area. From the results, compared with rectangle shape, circle shape showed the higher estimation accuracy. Also, we confirmed that the proposed location estimation algorithm provided high estimation accuracy in the shrinkage rectangle shape that was suitable for extension of searching area.

  • PDF

Transient Multipath routing protocol for low power and lossy networks

  • Lodhi, Muhammad Ali;Rehman, Abdul;Khan, Meer Muhammad;Asfand-e-yar, Muhammad;Hussain, Faisal Bashir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2002-2019
    • /
    • 2017
  • RPL routing protocol for low-power and lossy networks is an Internet Engineering Task Force (IETF) recommended IPv6 based protocol for routing over Low power Lossy Networks (LLNs). RPL is proposed for networks with characteristics like small packet size, low bandwidth, low data rate, lossy wireless links and low power. RPL is a proactive routing protocol that creates a Directed Acyclic Graph (DAG) of the network topology. RPL is increasingly used for Internet of Things (IoT) which comprises of heterogeneous networks and applications. RPL proposes a single path routing strategy. The forwarding technique of RPL does not support multiple paths between source and destination. Multipath routing is an important strategy used in both sensor and ad-hoc network for performance enhancement. Multipath routing is also used to achieve multi-fold objectives including higher reliability, increase in throughput, fault tolerance, congestion mitigation and hole avoidance. In this paper, M-RPL (Multi-path extension of RPL) is proposed, which aims to provide temporary multiple paths during congestion over a single routing path. Congestion is primarily detected using buffer size and packet delivery ratio at forwarding nodes. Congestion is mitigated by creating partially disjoint multiple paths and by avoiding forwarding of packets through the congested node. Detailed simulation analysis of M-RPL against RPL in both grid and random topologies shows that M-RPL successfully mitigates congestion and it enhances overall network throughput.

A Flexible Handover Scheme for Supporting Seamless Real-Time Services in Wireless Network (무선망에서 끊김 없는 실시간 서비스 제공을 위한 유연성 있는 핸드오버 기법)

  • Cho, Sung-Hyun;Pakr, Sung-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.1
    • /
    • pp.23-31
    • /
    • 2000
  • In this paper, we propose an adaptive handover scheme in wireless network. The proposed handover scheme is a hybrid type of virtual path extension and rerouting. The proposed handover scheme chooses the virtual path management scheme according to the service QoS instead of the network topology which is used in the previous hybrid handover schemes. The proposed scheme supports the seamless service and small buffering during virtual path rerouting handover through the multicasting service. To evaluate the performance of the proposed scheme, we computed the number of signaling message used for handover and perform computer simulation. The simulation results show that the proposed scheme provides more efficiency in the handover delay and seamless service than the previous methods.

  • PDF

A Study on the Path Search for the Rapid Suppression of Naval Ships Casualties (함정 재해의 신속 진압을 위한 경로 탐색에 관한 연구)

  • Park, Ju-hun;Ruy, Won-Sun;Chung, Jung-Hoon;Kim, Sook-Kyoung
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.57 no.4
    • /
    • pp.221-229
    • /
    • 2020
  • Naval ships could be seriously damaged by enemy attacks in battle. Moreover, this damage could be spread and deteriorated into a secondary accident. Secondary accidents that have adverse effects on naval ship's survivability, such as fire, flood, smoke extension, and patient occurrence, are defined as casualties. These casualties sharply degrade the survivability of naval ships. Furthermore, naval ships could be burned-out and sunk by casualties in isolated sea. Therefore, damage control and rapid suppression of the casualties in the naval ships is essential. This study was conducted in the establishment of suppression paths according to the characteristics of each casualty so that the developed system can support the rapid suppression in an emergency and even the training situation on a regular state. To establish the suppression paths, the two-dimensional numerical map is designed by converting the three-dimensional features of the naval ships, and the well known algorithms are compared to present the appropriate one for path finding problem on the naval ships. Finally, we devised a specific routing algorithm that fits the characteristics of each casualty in accordance with the Korean Navy's doctrines and handbooks of casualty suppression.

A Study on the Current Detector with Non Contact Type (비접촉식 전류 검출 장치에 관한 연구)

  • Kim, Ki-Joon
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.31 no.5
    • /
    • pp.351-356
    • /
    • 2018
  • Commonly, a live-line alarm can be used to measure the electric field strength of a high-voltage system to calculate its current, but it is hard to detect the electric field of shielded cables or concealed structures, such as underground distribution cables. Current sensors can detect the magnetic field in a single core wire, but they cannot determine the magnetic field about a double-core wire because the currents flow in opposite directions. Therefore, it is very difficult to detect certain current problems, such as a fault current in an extension line comprised of a double line. In this paper, to ultimately develop a sensor that can detect the current regardless of line conditions, we used a simulation to determine the concentration of the magnetic field dependent on the distribution of the external magnetic field and the path of each line's core.

Fatigue Crack Growth Behavior in Ultrafine Grained Low Carbon Steel

  • Kim, Ho-Kyung;Park, Myung-Il;Chung, Chin-Sung;Shin, Dong-Hyuk
    • Journal of Mechanical Science and Technology
    • /
    • v.16 no.10
    • /
    • pp.1246-1252
    • /
    • 2002
  • Ultrafine grained (UFG) low carbon (0.15 wt.% C) steel produced by equal channel angula. pressing (ECAP) was tested for investigating the effect of load ratio on the fatigue crack growth rate. Fatigue crack growth resistance and threshold of UFG steel were lower than that of asreceived coarse grained steel. It was attributed to the less tortuous crack path. The UFG steel exhibited slightly higher crack growth rates and a lower △Kth with an increase of R ratio. The R ratio effect on crack growth rates and △Kth was basically indistinguishable at lower load ratio (R >0.3), compared to other alloys, which indicates that contribution of the crack closure vanishes. The crack growth rate curve for UFG steel exhibited a longer linear extension to the lower growth rate regime than that for the coarse grained as-received steel.

Tracking Control of Ball and Plate System via Integrated Fuzzy Controllers (결합된 퍼지 제어기를 이용한 볼과 플레이트 시스템에서의 추정제어기 설계)

  • Seo, Min-Seok;Hyun, Chang-Ho;Park, Mig-Noon
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.223-225
    • /
    • 2006
  • A ball moving on a beam is a typical nonlnear dynamic system, which is often adopted to proof test diverse control schemes. Ball and plate system is the extension of the traditional ball and beam problem that moves a metal ball on a rigid plate. In this paper, a trajectory planning and tracking problem is proposed for ball and plate system, which is to control the ball from a point to another without hitting the obstacles. Our scheme is composed of three controllers, TS type optimal path tracking controller, mandani type obstacle avoidance controller and trajectory planning controller that determines the desired trajectory. But this type of construction can give rise to chattering executions. Because the difference of contributions from concurrent controllers can cause behaviors unsmoothly. We propose fuzzy pid supervision control1er to handle this problem.

  • PDF

Development of Expert Systems based on Dynamic Knowledge Map and DBMS (동적지식도와 데이터베이스관리시스템 기반의 전문가시스템 개발)

  • Jin Sung, Kim
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.10a
    • /
    • pp.568-571
    • /
    • 2004
  • In this study, we propose an efficient expert system (ES) construction mechanism by using dynamic knowledge map (DKM) and database management systems (DBMS). Generally, traditional ES and ES developing tools has some limitations such as, 1) a lot of time to extend the knowledge base (KB), 2) too difficult to change the inference path, 3) inflexible use of inference functions and operators. First, to overcome these limitations, we use DKM in extracting the complex relationships and causal rules from human expert and other knowledge resources. Then, elation database (RDB) and its management systems will help to transform the relationships from diagram to relational table. Therefore, our mechanism can help the ES or KBS (Knowledge-Based Systems) developers in several ways efficiently. In the experiment section, we used medical data to show the efficiency of our mechanism. Experimental results with various disease show that the mechanism is superior in terms of extension ability and flexible inference.

  • PDF

Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks

  • Avula, Mallikarjun;Lee, Sang-Gon;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.1982-2004
    • /
    • 2014
  • Wireless Mesh Networks (WMNs) are emerging as promising, convenient next generation wireless network technology. There is a great need for a secure framework for routing in WMNs and several research studies have proposed secure versions of the default routing protocol of WMNs. In this paper, we propose a security framework for Hybrid Wireless Mesh Protocol (HWMP) in WMNs. Contrary to existing schemes, our proposed framework ensures both end-to-end and point-to-point authentication and integrity to both mutable and non-mutable fields of routing frames by adding message extension fields to the HWMP path selection frame elements. Security analysis and simulation results show that the proposed approach performs significantly well in spite of the cryptographic computations involved in routing.