• Title/Summary/Keyword: Personal Network

Search Result 1,447, Processing Time 0.03 seconds

Clustering Algorithm to Equalize the Energy Consumption of Neighboring Node on Sink in Wireless Sensor Networks (무선 센서 네트워크에서 싱크노드와 인접한 노드의 균등한 에너지 소모를 위한 클러스터링 알고리즘)

  • Jung, Jin-Wook;Jin, Kyo-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1107-1112
    • /
    • 2008
  • Clustering techniques, which are algorithm to increase the network lifetime in wireless sensor networks, is developed to minimize the energy consumption of nodes. Existing clustering techniques by to increase the network lifetime with equalizing each node's the energy consumption by rotating the role of CH(Cluster Head), but these algorithms did not present the solution that minimizes the energy consumption of neighboring nodes with sink. In this paper, we propose the clustering algorithm that prolongs the network lifetime by not including a part of nodes in POS(Personal Operating Space) of the sink in a cluster and communicating with sink directly to reduce the energy consumption of CH closed to sink.

Zigbee-based Local Army Strategy Network Configurations for Multimedia Military Service

  • Je, Seung-Mo
    • Journal of Multimedia Information System
    • /
    • v.6 no.3
    • /
    • pp.131-138
    • /
    • 2019
  • With the rapid evolution of communication technology, it became possible to overcome the spatial and temporal limitations faced by humans to some extent. Furthermore, the quality of personal life was revolutionized with the emergence of the personal communication device commonly known as the smart phone. In terms of defense networks, however, due to restrictions from the military and security perspectives, the use of smart phones has been prohibited and controlled in the army; thus, they are not being used for any defense strategy purposes as yet. Despite the current consideration of smart phones for military communication, due to the difficulties of network configuration and the high cost of the necessary communication devices, the main tools of communication between soldiers are limited to the use of flag, voice or hand signals, which are all very primitive. Although these primitive tools can be very effective in certain cases, they cannot overcome temporal and spatial limitations. Likewise, depending on the level of the communication skills of each individual, communication efficiency can vary significantly. As the term of military service continues to be shortened, however, types of communication of varying efficiency depending on the levels of skills of each individual newly added to the military is not desirable at all. To address this problem, it is essential to prepare an intuitive network configuration that facilitates use by soldiers in a short period of time by easily configuring the strategy network at a low cost while maintaining its security. Therefore, in this article, the author proposes a Zigbee-based local strategic network by using Opnet and performs a simulation accordingly.

Analysis of the Facebook Profiles for Korean Users: Description and Determinants (페이스북 이용자의 개인정보 공개와 결정 요인)

  • Lee, Mina;Lee, Seungah;Choi, Inhye
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.73-85
    • /
    • 2014
  • This study analyzed the profile of a Facebook account to examine how personal information is revealed and what kinds of factors influence personal information revelation. Categories of user's profile on Facebook were analyzed and two dimensions were developed; the degree that how much personal information is revealed and the network limits that personal information is accessed. Main variables to determine personal information revelation are Facebook privacy concern and uses for social relationships along with gender, the duration of Facebook use, and average time of use. Data were collected from college students. Factor analysis produced two factors of Facebook privacy concern, Facebook privacy concern with users and Facebook privacy concern with the Facebook system. Regression analyses were performed to identify significant determinants of the degree of information revelation and the network limits of personal information. The results found out that the degree of personal information revelation is explained by gender, the duration of use, and use for social relationships while the network limit is explained by the duration of use and Facebook privacy concern with users. Worthy of notice is that use for social relationships and Facebook privacy concern with the Facebook system offset each other. The implications of the results are discussed. Additionally and finally the categories of profiles are graphically re-grouped to show how personal information revelation is associated with social relationship generation and maintenance.

Architecture of Streaming Layer as Core of Personal Robot's Middleware.

  • Li, Vitaly;Choo, Seong-Ho;Jung, Ki-Duk;Choi, Dong-Hee;Park, Hong-Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.98-100
    • /
    • 2005
  • This paper, proposes concept of personal robot middleware core also called streaming layer. Based on openness and portability, the streaming layer is proposed in order to meet requirements of different kinds of applications. The streaming layer architecture provides effective management of data flows and allows integration of different systems with ease regardless software of hardware platform. With extensibility support additional features can be build in without affect to performance. Therefore, heterogeneous network support, real-time communications, embedded boards support can be easily achieved. In order to achieve high performance together with portability into different platforms, the most functions has to be implemented in C language, while critical parts, such as scheduling, priority assignment has to be made using native functions of tested platforms.

  • PDF

Adaptive Cross-Layer Packet Scheduling Method for Multimedia Services in Wireless Personal Area Networks

  • Kim Sung-Won;Kim Byung-Seo
    • Journal of Communications and Networks
    • /
    • v.8 no.3
    • /
    • pp.297-305
    • /
    • 2006
  • High-rate wireless personal area network (HR-WPAN) has been standardized by the IEEE 802.15.3 task group (TG). To support multimedia services, the IEEE 802.15.3 TG adopts a time-slotted medium access control (MAC) protocol controlled by a central device. In the time division multiple access (TDMA)-based wireless packet networks, the packet scheduling algorithm plays a key role in quality of service (QoS) provisioning for multimedia services. In this paper, we propose an adaptive cross-layer packet scheduling method for the TDMA-based HR-WPAN. Physical channel conditions, MAC protocol, link layer status, random traffic arrival, and QoS requirement are taken into consideration by the proposed packet scheduling method. Performance evaluations are carried out through extensive simulations and significant performance enhancements are observed. Furthermore, the performance of the proposed scheme remains stable regardless of the variable system parameters such as the number of devices (DEVs) and delay bound.

The Effects of Individualism-Collectivism Propensity, Social Capital, Participation Activity of Social Network Service Users on Fashion Brands Relationship Orientation (SNS 이용자의 개인주의-집단주의 성향과 사회적 자본, 참여활동이 패션브랜드 관계지향성에 미치는 영향)

  • Lee, Eun-Jin;Suk, HyoJung
    • Fashion & Textile Research Journal
    • /
    • v.19 no.2
    • /
    • pp.194-206
    • /
    • 2017
  • This study analyzed the effect of individualism-collectivism propensity and social capital on participation activity as well as the effect of participation activity on fashion brands relationship orientation of social network service users. Also, this study investigated the difference in participation activity and fashion brands relationship orientation by participation level of social network service. A survey was conducted from October 1 to November 31, 2015, and 476 responses were used in the analysis. As results, the individualism-collectivism propensity was composed of vertical-horizontal individualism and vertical-horizontal collectivism. The social capital was composed of trust, norm, and network. Also, the participation activity was composed of personal interaction, consumer rights, information pursuit, interest pursuit, and economic pursuit. Vertical individualism positively affected information pursuit and economic pursuit, and horizontal individualism positively affected personal interaction, consumer rights, and information pursuit; in addition, vertical collectivism positively affected personal interaction, consumer rights, and interest pursuit. Horizontal collectivism positively affected information pursuit, but it negatively affected consumer rights. Consumer rights, information pursuit, interest pursuit, and economic pursuit of participation activity positively affected fashion brands relationship orientation. Also, there were significant differences in the participation activity and fashion brands relationship orientation by participation level. The study results provide useful information to the marketing strategies using social network service of fashion brands.

Development of Bluetooth Protocol Stack on Embedded System (임베디드 시스템 상에서 블루투스 프로토콜 스택 개발)

  • Lee, Sang-Hak;Chung, Tae-Choong
    • The KIPS Transactions:PartA
    • /
    • v.11A no.2
    • /
    • pp.123-128
    • /
    • 2004
  • Recent advancement in RF technology and wireless communications has enabled the development of noble networks. Bluetooth that can be used in various application field is a kind of WPAN(Wireless Personal Area Network) standard that is widely known. Bluetooth enables voice and data applications to operate simultaneously. Various applications have been implemented based on standard Profiles. In this paper, we describes the development of Biuetooth network AP(Access Point) system for network connection of Bluetooth devices. Unlike headset, mouse, and keyboard, the access point should have capability to support multiple connection and stabilized network throughput. We have designed and developed the hardware system, core stack and profiles on embedded system to comply with standard specification. Our system showed compatibility and good protocol performance through testing with lots of products that is available in market.

Analysis of Interference Effects Caused by LR-WPAN in the Frequency Band of 900MHz (900MHz 대역의 LR-WPAN에 의한 간섭영향 분석)

  • Kang, Sang-Gee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.215-220
    • /
    • 2009
  • LR-WPAN(Low-Rate Wireless Personal Area Network) hewn as IEEE 802.15.4 is considered as one of the most suitable specifications published until now to accomplish USN(Ubiquitous Sensor Network). In this paper we simulate interference effects to other systems if LR-WPAN will be used in 900MHz. In considering the current usage situation of 900MHz frequency band, we can think LR-WPAN shares the frequency band of $908.5{\sim}914MHz$ assigned for RFID/USN. The simulation results of the case of LR-WPAN and RFID/USN sharing the frequency band show that the probability of interference of LR-WPAN to CT1 and RFID is 2.5% and 2.1%, respectively. In order to avoid interference effects to public communications, simulations results show that the protection distance of about loom is needed.

Design and Implementation of Embedded Linux-based Personal Mobile Broadcasting Service (임베디드 리눅스 기반의 개인 모바일 방송국 서비스 설계 및 구현)

  • Kim, Do-Hyung;Kim, Sun-Ja;Lee, Cheol-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.16D no.3
    • /
    • pp.441-450
    • /
    • 2009
  • This paper describes the design and implementation of Personal Mobile Broadcasting Service which bases on embedded Linux and it supports personal broadcasting in wireless network environments. Recently, with the advent of various wireless networks and the increased use of high performance mobile devices, the demand for personal mobile broadcasting is being increased. The personal mobile broadcasting service makes it possible that mobile users create contents using their own mobile devices while they are moving or they are in any place. And then, it sends the created contents to server in real-time where their blogs are. Users connected to the content creator's blog can play the contents in real-time. With the implemented personal mobile broadcasting service, mobile users can share multimedia contents in real-time through wireless networks. And, it also helps users to construct their own broadcasting stations where they can broadcast the scene of the accident or public performance in real-time.

Issues of Harmonization of ISO 9001 Standard and the Law 09-08. Protection of Personal Data in Morocco: Potentials and Risks

  • Adil CHEBIR ;Ibtissam EL MOURY;Adil ECHCHELH;Omar TAOUAB
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.57-66
    • /
    • 2023
  • Since 2009, Morocco has had a law governing the processing of personal data, the law 09-08, and a supervisory authority, the CNDP (National Commission for the Protection of Personal Data). Since May 2018, the European General Regulation on the Protection of Personal Data (GDPR) entered into force, which applies outside the EU in certain cases and therefore to certain Moroccan companies. The question of the protection of personal data is primarily addressed to the customer. The latter may not only be a victim of crime linked to ICT, but also have to face risks linked to the collection and abusive processing of his personal data by the private and public sectors. Often the customer does not really know how their data is stored, nor for how long and for what purpose. This fact raises the question of satisfying customer requirements, in particular for organizations that have adopted a quality approach based on ISO 9001 standard.In order to master these constraints, Moroccan companies have to adopt strategies based on modern quality management techniques, especially the adoption of principles issued from the international standard ISO 9001 while being confirmed by the law 09-08. It is through ISO 9001 and the law 09-08 that these companies can refer to recognized approaches in terms of quality and compliance. The major challenge for these companies is to have a Quality approach that allows the coexistence between the law 09-08 and ISO 9001 standard and this article deals within this specific context.