• Title/Summary/Keyword: Route exchange

Search Result 107, Processing Time 0.024 seconds

An Efficient Routing Protocol Considering Path Reliability in Cognitive Radio Ad-hoc Networks (인지 무선 애드혹 네트워크에서 경로 신뢰성을 고려한 효율적인 라우팅 기법)

  • Choi, Jun-Ho;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.11
    • /
    • pp.730-742
    • /
    • 2014
  • In the case of On-demand routing protocol in cognitive radio ad-hoc networks, broadcasting of control packets may occur common control channel overload and packet collisions during the routing procedure. This situation is to increase the overhead of path finding and also limited to find the accurate and reliable path. Since reliable channel and path finding is restricted, path life time is shorten and path reliability is reduced. In this paper, we propose a new routing algorithm that reduces control channel overhead and increases path life time by considering the probability of appearance of primary user and channel status of neighbor nodes. Each node performs periodic local sensing to detect primary user signal and to derive primary user activity patterns. The probability of primary appearance on the current channel and the channel status can be obtained based on the periodic sensing. In addition, each node identifies the quality of the channel by message exchange through a common channel with neighbor nodes, then determines Link_Levels with neighbor nodes. In the proposed method, the Link Level condition reduces the number of control messages that are generated during the route discovery process. The proposed method can improve path life time by choosing a path through Path_Reliability in which stability and quality are weighted depending on the location. Through simulation, we show that our proposed algorithm reduces packet collisions and increases path life time in comparison with the traditional algorithm.

A Study on the Costume of Khotan (우전(Khotan)의 복식에 관한 연구)

  • 김소현
    • Journal of the Korean Society of Costume
    • /
    • v.34
    • /
    • pp.169-182
    • /
    • 1997
  • Focusing on khotan located in the southern Silk Route which was one of the most important kingdoms in the Tarim Basin this study attempts to examine the changes of costume in Khotan by compar-ing the costumes in the painted panel showing the story of silk princess with the excavated costumes from ancient tombs. Furthermore this study attempts to inves-tigate the impacts of cultural exchange be-tween China and its western neighboring country Eastern and Western Turkestan on costume. Excavated costumes from the Shanpula ancient tomb in the region of Khotan and from ancient Niya in the esat-ern border of Khotan and discoveries from Rawak and Dandan-oilik near by Yotkan the ancient capital of Khotan are exam-ined. Basic Khotan's costume was the two piece style of tops and trousers. Over the basic costume wearing a top wear with half sleeves was popular. Skirt was worn by women. Even though there were many kinds tops were classified into the two types kaftan and tunic. Thouth Khotan maintained a association with China for a long time the style of Khotan costume had imbued to China. Top wear with half sleeves was worn frequently in Khotan. Also in China top wear with half sleeves was worn as over-wear which was called ban-xiu ban-bi bei-zi Costume style of China is covering the body profoundly and wrapping front edge toward the right. The types of chi-nese top wear with half sleeves for exam-ple round-neck·confronting front edge crossing-neck·confronting front edge tu-nic type discord with the traditional chi-nese costume style There were many cas-es that half sleeved top wear was worn as over wear in T'ang dynasty. The phenom-enon was due to the prevalence of 'ho' (foreign) and half sleeved top wear was introduced by the countries to the west of China Khotan. A round neck garment was a general type for the men of cuntries to the westof China. Also Chinese wore round neck garment since South and North Dynasty The type of Chinese round neck garment was not tunic but kaftan. From costume relics and ancient paintings the type of Khotan's round neck garment was tunic which was recorded on the Chinese histori-cal documents as " guan-tou-shan" that is tunic the type of persian costume, Even thgough the painted panel showing the sto-ry of silk princess was made in the it me when Turks was a dominion on Central Asia Khotan's costume style was not changed toward Turk's costume style and remained tunic style.

  • PDF

A Study of the Actual Condition for Inducing Container Cargos to Gunsan Port (군산항 컨테이너화물 유치를 위한 실태조사연구)

  • Song, Yong-Zong;Park, Hyoung-Chang;Kim, Myoung-Ryong
    • Journal of Korea Port Economic Association
    • /
    • v.23 no.4
    • /
    • pp.71-90
    • /
    • 2007
  • To induce container cargos to Gunsan port, we should struggle on securing the quantity of goods transported from the competitive Jeonbuk and Chungcheong areas by reducing transportation expenses by land, and make an activating plan for the international exchange between Gunsan port and nearby ports in China. As a result, if the plan to induce container cargos to Gunsan port is activated, the regular liners will stop at Gusan port. So the new sea route will be opened so that consignors can ship cargos in the proper time. The consignors will use Gunsan port frequently because of the reduction of distribution expenses. To do so, for the first, many incentives should be implemented to attract container cargos. In addition, various facilities should be fully equipped and improved. This paper is to improve the problems for which consignors, the shipping lines and forwarders may feel uncomfortable when they use Gunsan port. According to the research on the actual condition, the biggest problem in Gunsan port is the depth of water. The management, relation system, infrastructure and information system of Gunsan port are also insufficient. Therefore, this paper will make an alternative plan to improve these problems and help the container cargos induce to Gunsan port.

  • PDF

A Key Management Scheme for Ad hoc Sensor Networks (애드 혹 센서 네트워크를 위한 키 관리 방안)

  • Kim Seung-Hae;Chung Byung-Ho;Wang Gi-Cheol;Cho Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.32-40
    • /
    • 2006
  • It is very important to establish a pairwise key securely in wireless sensor networks. Because sensor networks consist of devices with weak physical security, they are likely to be compromised by an attacker. However, some approaches using key pre-distribution and other approaches using one hop local keys are known to be very vulnerable to threats caused by compromised nodes, even a small number. This paper proposes a scheme where each node establishes three hop local keys and employs them for a later pairwise key establishment. When any two nodes agree a pairwise key, all nodes on the route between two nodes contribute to the agreement of the pairwise key. Here, the initial three hop local keys are employed for encrypting a secret key delivered from a node to other nodes. Therefore, the proposed scheme bothers attackers to compromise much more nodes than the scheme using one hop local keys only. The simulation results have proven that the proposed scheme provides better performance and higher security than the scheme using one hop local keys in terms of message exchange, the number of encryption and decryption, and pairwise key exposure rate.

A Study on the Knowledge and Awareness of Dental Hygienists and Dental Hygiene Students about Hepatitis B (치과위생사와 치위생과 학생의 B형 간염에 대한 지식과 인식에 관한 조사연구)

  • Kim, Jeong-Suk;Choi, MI-Hye;Kang, Eun-Ju
    • Journal of dental hygiene science
    • /
    • v.8 no.4
    • /
    • pp.233-239
    • /
    • 2008
  • The purpose of this study was to survey the knowledge and awareness of dental hygienists and dental hygiene students about hepatitis B in an attempt to lay the solid foundation for the prevention of hepatitis B and infection control, as dental hygienists were highly likely to be exposed to HBV during job performance. The findings of the study were as follows: 1. 32.5% of the dental hygienists and 15.6% of the dental hygiene students were aware of their own HBsAg and HBsAb states. The dental hygienists who were cognizant of the states statistically significantly outnumbered the dental hygiene students who were (p=.000). 2. As for vaccination against hepatitis B, 71.8% of the dental hygienists and 47.3 % of the dental hygiene students were inoculated against it. The dental hygienists who were vaccinated against it outnumbered the dental hygiene students who were, and the disparity between the two was statistically significant (p=.000). 3. In the event of those who were vaccinated against hepatitis B, the dental hygienists were better cognizant than the dental hygiene students of the right time for the vaccination, required vaccination frequency (three times) and confirmation of the formation of hepatitis B antibody (p=.000). 4. Regarding awareness of hepatitis B infection route, the dental hygienists knew significantly better than the dental hygiene students that hepatitis B might be infected via blood (p=.030), sexual relations (p=.000), contaminated needle sticks (p=.000), mothers with hepatitis B positive during delivery (p=.000), toothbrushes/razors (p=.000) and exchange of drinking cups (p=.000). 5. As to the relationship between health status and knowledge on hepatitis B infection route, the respondents who were in bad shape had the best knowledge about that, followed by those in an average state of health and healthy respondents. And the dental hygienists had a significantly better knowledge than the dental hygiene students (p=.001). 6. Just a small number of the dental hygienists and students knew about the hepatitis B-related past experiences of their families, and the gap between the two was insignificant.

  • PDF

Radiation, Energy, and Entropy Exchange in an Irrigated-Maize Agroecosystem in Nebraska, USA (미국 네브라스카의 관개된 옥수수 농업생태계의 복사, 에너지 및 엔트로피의 교환)

  • Yang, Hyunyoung;Indriwati, Yohana Maria;Suyker, Andrew E.;Lee, Jihye;Lee, Kyung-do;Kim, Joon
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.22 no.1
    • /
    • pp.26-46
    • /
    • 2020
  • An irrigated-maize agroecosystem is viewed as an open thermodynamic system upon which solar radiation impresses a large gradient that moves the system away from equilibrium. Following the imperative of the second law of thermodynamics, such agroecosystem resists and reduces the externally applied gradient by using all means of this nature-human coupled system acting together as a nonequilibrium dissipative process. The ultimate purpose of our study is to test this hypothesis by examining the energetics of agroecosystem growth and development. As a first step toward this test, we employed the eddy covariance flux data from 2003 to 2014 at the AmeriFlux NE1 irrigated-maize site at Mead, Nebraska, USA, and analyzed the energetics of this agroecosystem by scrutinizing its radiation, energy and entropy exchange. Our results showed: (1) more energy capture during growing season than non-growing season, and increasing energy capture through growing season until senescence; (2) more energy flow activity within and through the system, providing greater potential for degradation; (3) higher efficiency in terms of carbon uptake and water use through growing season until senescence; and (4) the resulting energy degradation occurred at the expense of increasing net entropy accumulation within the system as well as net entropy transfer out to the surrounding environment. Under the drought conditions in 2012, the increased entropy production within the system was accompanied by the enhanced entropy transfer out of the system, resulting in insignificant net entropy change. Drought mitigation with more frequent irrigation shifted the main route of entropy transfer from sensible to latent heat fluxes, yielding the production and carbon uptake exceeding the 12-year mean values at the cost of less efficient use of water and light.

Analysis of Research Trends of 'Word of Mouth (WoM)' through Main Path and Word Co-occurrence Network (주경로 분석과 연관어 네트워크 분석을 통한 '구전(WoM)' 관련 연구동향 분석)

  • Shin, Hyunbo;Kim, Hea-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.179-200
    • /
    • 2019
  • Word-of-mouth (WoM) is defined by consumer activities that share information concerning consumption. WoM activities have long been recognized as important in corporate marketing processes and have received much attention, especially in the marketing field. Recently, according to the development of the Internet, the way in which people exchange information in online news and online communities has been expanded, and WoM is diversified in terms of word of mouth, score, rating, and liking. Social media makes online users easy access to information and online WoM is considered a key source of information. Although various studies on WoM have been preceded by this phenomenon, there is no meta-analysis study that comprehensively analyzes them. This study proposed a method to extract major researches by applying text mining techniques and to grasp the main issues of researches in order to find the trend of WoM research using scholarly big data. To this end, a total of 4389 documents were collected by the keyword 'Word-of-mouth' from 1941 to 2018 in Scopus (www.scopus.com), a citation database, and the data were refined through preprocessing such as English morphological analysis, stopwords removal, and noun extraction. To carry out this study, we adopted main path analysis (MPA) and word co-occurrence network analysis. MPA detects key researches and is used to track the development trajectory of academic field, and presents the research trend from a macro perspective. For this, we constructed a citation network based on the collected data. The node means a document and the link means a citation relation in citation network. We then detected the key-route main path by applying SPC (Search Path Count) weights. As a result, the main path composed of 30 documents extracted from a citation network. The main path was able to confirm the change of the academic area which was developing along with the change of the times reflecting the industrial change such as various industrial groups. The results of MPA revealed that WoM research was distinguished by five periods: (1) establishment of aspects and critical elements of WoM, (2) relationship analysis between WoM variables, (3) beginning of researches of online WoM, (4) relationship analysis between WoM and purchase, and (5) broadening of topics. It was found that changes within the industry was reflected in the results such as online development and social media. Very recent studies showed that the topics and approaches related WoM were being diversified to circumstantial changes. However, the results showed that even though WoM was used in diverse fields, the main stream of the researches of WoM from the start to the end, was related to marketing and figuring out the influential factors that proliferate WoM. By applying word co-occurrence network analysis, the research trend is presented from a microscopic point of view. Word co-occurrence network was constructed to analyze the relationship between keywords and social network analysis (SNA) was utilized. We divided the data into three periods to investigate the periodic changes and trends in discussion of WoM. SNA showed that Period 1 (1941~2008) consisted of clusters regarding relationship, source, and consumers. Period 2 (2009~2013) contained clusters of satisfaction, community, social networks, review, and internet. Clusters of period 3 (2014~2018) involved satisfaction, medium, review, and interview. The periodic changes of clusters showed transition from offline to online WoM. Media of WoM have become an important factor in spreading the words. This study conducted a quantitative meta-analysis based on scholarly big data regarding WoM. The main contribution of this study is that it provides a micro perspective on the research trend of WoM as well as the macro perspective. The limitation of this study is that the citation network constructed in this study is a network based on the direct citation relation of the collected documents for MPA.