• Title/Summary/Keyword: Self-networking

Search Result 152, Processing Time 0.027 seconds

Optimizing Energy Efficiency in Mobile Ad Hoc Networks: An Intelligent Multi-Objective Routing Approach

  • Sun Beibei
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.19 no.2
    • /
    • pp.107-114
    • /
    • 2024
  • Mobile ad hoc networks represent self-configuring networks of mobile devices that communicate without relying on a fixed infrastructure. However, traditional routing protocols in such networks encounter challenges in selecting efficient and reliable routes due to dynamic nature of these networks caused by unpredictable mobility of nodes. This often results in a failure to meet the low-delay and low-energy consumption requirements crucial for such networks. In order to overcome such challenges, our paper introduces a novel multi-objective and adaptive routing scheme based on the Q-learning reinforcement learning algorithm. The proposed routing scheme dynamically adjusts itself based on measured network states, such as traffic congestion and mobility. The proposed approach utilizes Q-learning to select routes in a decentralized manner, considering factors like energy consumption, load balancing, and the selection of stable links. We present a formulation of the multi-objective optimization problem and discuss adaptive adjustments of the Q-learning parameters to handle the dynamic nature of the network. To speed up the learning process, our scheme incorporates informative shaped rewards, providing additional guidance to the learning agents for better solutions. Implemented on the widely-used AODV routing protocol, our proposed approaches demonstrate better performance in terms of energy efficiency and improved message delivery delay, even in highly dynamic network environments, when compared to the traditional AODV. These findings show the potential of leveraging reinforcement learning for efficient routing in ad hoc networks, making the way for future advancements in the field of mobile ad hoc networking.

Why do people leave SNS? : The Influences of the Users' Characteristics and SNS Fatigue (SNS를 떠나는 사람들 : 사용자의 특성과 SNS 피로감 중심으로 SNS 중단의향에 영향을 미치는 사용자 특성)

  • Lee, Eunji
    • Journal of the HCI Society of Korea
    • /
    • v.13 no.1
    • /
    • pp.11-19
    • /
    • 2018
  • Recently, SNS users have begun to complain of fatigue attributed by the dependency on the Social Networking Services, and this trend seem to have them cease or leave the SNS despite its exponential growth. Although researchers devote their effort to identify negative effects of perceived SNS fatigue on the intention to keep using SNS, it still lacks dealing with users' personal characteristics. Thus, this study looked into (1) the differences of perceived SNS fatigue and the differences of intention to leave SNS based on the users' characteristics (demographic variables, personality traits, and SNS usages) and (2) the users' characteristics on the intention to discontinue SNS. The results show that the users with low self-esteem were more likely to feel higher SNS fatigue and to discontinue SNS than those with high self-esteem, and the users in 20s showed higher intention to discontinue SNS than those in 40s. Moreover, the younger the users were, and the lower the levels of self-esteem were, the users reported higher level of fatigue. Additionally, the female users showed that the higher the level of fatigue, the stronger intentions to discontinue SNS. This research sheds light on the fact that the characteristics of users give influences the intention to discontinue SNS, and is expected to suggest practical implications in the ever-expanding SNS market.

  • PDF

Cyberbullying Victimization Experience on SNSs: Focusing on Self-disclosure, Compulsive Internet Use, and Depressive Status (SNS상에서 사이버불링 피해경험: 자기노출, 강박적 인터넷 사용 그리고 우울한 상태 중심으로)

  • Jooyeon Won;DongBack Seo
    • Information Systems Review
    • /
    • v.26 no.1
    • /
    • pp.219-249
    • /
    • 2024
  • Cyberbullying has become a critical issue as people (especially, young people) daily use social networking sites (SNSs). This study investigates possible factors affecting cyberbullying victimization experiences, comparing SNS users in Austria and Korea. Particularly, this study focuses on how individuals' self-disclosure patterns, compulsive Internet use, and depressive status are related to four different types of cyberbullying victimization experiences (written-verbal, visual, exclusion, and impersonation). Furthermore, the results are compared between SNS users in Austria and Korea. Results from total 519 respondents show that self-disclosure patterns on SNSs, compulsive Internet use, and depressive status are positively related to different types of cyberbullying victimization experiences. However, there are differences between Austria and Korea. For example, the frequency of changing one's profile setting is positively related to all types of cyberbullying victimization experiences in Korea, while it is only positively related to victimization experience of visual cyberbullying in Austria. Depressive status is only positively related to victimization experience of written-verbal cyberbullying in Korea, while it is positively related to all types of cyberbullying victimization experience in Austria.

A self-portrait of the information society: An Arguments on the SNS users' Responsibilities

  • Seo, Ran-Sug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.159-172
    • /
    • 2020
  • Social networking services (SNS) are developing significantly with the Internet and smartphones. It's a friendly social media, but if you think deeply about it, you'll find that it has a variety of faces. It is a communication tool between users, a medium for delivering information, an infrastructure for providing applications, and a community where people with common interests gather. In recent years, business tools, shopping and payment methods are also being swallowed. The influence of the spread of SNS on the real world is also expanding, and the work being dealt with from a sociological perspective is also increasing. Also, if you pay attention to the technical aspects of SNS, it is composed of various technical elements, such as infrastructure that handles large-scale access, user interface that supports comfortable use, and big data analysis to understand people's behavior more deeply. However, I usually use it as usual. However, if you look through SNS, you can see that the situation is surprisingly profound and multifaceted. This study began by looking at the history and current status of SNS and attempted to find its status through comparison with other media. From the point of view of relationship with society, it can be a risk and legal issue when using SNS, such as crimes using bad social media or social media. It is also necessary to comment on the activities on SNS or the guidelines established by the operators. Therefore, various legal issues on SNS will be discussed. Also, as an example of using SNS, I will introduce an example of using SNS in disaster response. From a more technical point of view, you will receive commentary on SNS's network-based technology and SNS's information use, and these articles will help you understand and use SNS safely and help you further utilize or develop SNS.

An Exploratory Study on Social Media Users' Ambivalent Attitudes (소셜 미디어 이용자의 양가성 태도에 관한 연구)

  • Seol, Jinah
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.87-94
    • /
    • 2014
  • Social media which includes Facebook enable users to construct relationships and networks as well as sharing of information. By enlisting Facebook users as proxy, this paper attempted to analyze the different emotional states experienced by social media users, specifically to gauge what effect their usage motivation and usage pattern had on the ambivalence level of the users. The quantitative survey result revealed that usage duration or the time of day when Facebook was accessed had no relevant impact on one's ambivalence level. However, there was a direct correlation between frequency of Facebook usage and the ambivalence level. The more the user logged onto Facebook the more suppressed his or her expression became due to fear of giving negative impressions to others and also receiving their negative feedbacks, which then subsequently added to the user's ambivalence. People's main reasons for using Facebook were identified as "chatting," "communicating," "maintaining relationships," "relationship building," "networking," and "finding information about friends," but only "maintaining relationships," "communicating," and "networking" had observable effect on ambivalence. There were no noticeable differences among genders with regards to ambivalence and usage levels, but there was a marked difference based on the user's age. For example, people in their forties showed higher levels of ambivalence than those in their twenties. This may be attributed to anxiety they face as they use Facebook primarily to expand their networks and to maintain relationships. As such, it is surmised that their fatigue level from using social media will only increase. Meanwhile, Korean Facebook user's emotional manifestation tended to skew toward relation-involved ambivalence rather than the self-defensive type. This relation-involved ambivalence might be something that can actually help prevent damage to relationships by limiting excessive emotional expressions. In other words, such ambivalence by Facebook users may be a positive element in a user's social media interaction.

Real-Time Traffic Information and Road Sign Recognitions of Circumstance on Expressway for Vehicles in C-ITS Environments (C-ITS 환경에서 차량의 고속도로 주행 시 주변 환경 인지를 위한 실시간 교통정보 및 안내 표지판 인식)

  • Im, Changjae;Kim, Daewon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.55-69
    • /
    • 2017
  • Recently, the IoT (Internet of Things) environment is being developed rapidly through network which is linked to intellectual objects. Through the IoT, it is possible for human to intercommunicate with objects and objects to objects. Also, the IoT provides artificial intelligent service mixed with knowledge of situational awareness. One of the industries based on the IoT is a car industry. Nowadays, a self-driving vehicle which is not only fuel-efficient, smooth for traffic, but also puts top priority on eventual safety for humans became the most important conversation topic. Since several years ago, a research on the recognition of the surrounding environment for self-driving vehicles using sensors, lidar, camera, and radar techniques has been progressed actively. Currently, based on the WAVE (Wireless Access in Vehicular Environment), the research is being boosted by forming networking between vehicles, vehicle and infrastructures. In this paper, a research on the recognition of a traffic signs on highway was processed as a part of the awareness of the surrounding environment for self-driving vehicles. Through the traffic signs which have features of fixed standard and installation location, we provided a learning theory and a corresponding results of experiment about the way that a vehicle is aware of traffic signs and additional informations on it.

The Evaluation of Regional Innovation and Innovative Cluster Policies in Korea (참여정부 지역혁신 및 혁신클러스터 정책 추진의 평가와 과제)

  • Lee, Chul-Woo
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.10 no.4
    • /
    • pp.377-393
    • /
    • 2007
  • National balanced development and regional innovation have been one of the most important national agendas under the Participatory Government. National balanced development gives a central focus on realizing self-sustaining localization which is based on regional innovation. The core policy goal is to build competitive regional innovation system and innovative clusters in the regions of the country. In this vein, this paper aims to evaluate the present government's policies of regional innovation and innovative cluster. It needs to point out that the regional innovation and cluster policies show some critical problems. Firstly, the policy-making process is based on the top-down approach rather than the bottom-up one. Secondly, regional innovation policies, in many cases, expose the redundancy of similar policies and a lack of linkages between similar policies. Thirdly, the regional innovation policies are too much social infrastructure building-centered, even though the basic principle of regional innovation policy should be based on building superstructure such as networking and social capital.

  • PDF

Numerical Analysis of Authentication Algorithm using Randomized CA Groups in Mobile Ad Hoc Networks (모바일 애드혹 네트워크에서 랜덤 CA 그룹을 이용한 인증 알고리즘에 대한 성능 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.8
    • /
    • pp.22-33
    • /
    • 2009
  • Mobile Ad Hoc Networks (MANETs) are self-organized networks that do not rely in their operation on wired infrastructure. As in any networking technology, security is an essential element in MANET as well, for proliferation of this type of networks. But supporting secure communication in MANETs proved to be a significant challenge, mainly due to the fact that the set of nodes in the network can change frequently and rapidly and due to the lack of access to the wired infrastructure. In particular, the trust model and the authentication protocols, which were developed for wired and infrastructure-based networks, cannot be used in MANETs. In [1], we addressed the problem of efficient authentication of distributed mobile users in geographically large networks and proposed a new authentication scheme for this case of MANETs. The proposed scheme exploits randomized groups to efficiently share authentication information among nodes that together implement the function of a distributive Certification Authority(CA). In this paper, we analyze numerically the performance of authentication method using randomized groups and compare with the simulation result.

Investments on Pro-poor Development Projects on Goats: Ensuring Success for Improved Livelihoods

  • Devendra, C.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.26 no.1
    • /
    • pp.1-18
    • /
    • 2013
  • The elements that determine the success of development projects on goats and the prerequisites for ensuring this are discussed in the context of the bewildering diversity of goat genetic resources, production systems, multifunctionality, and opportunities for responding to constraints for productivity enhancement. Key determinants for the success of pro-poor projects are the imperatives of realistic project design, resolution of priorities and positive impacts to increase investments and spur agricultural growth, and appropriate policy. Throughout the developing world, there exist 97% of the total world population of 921 million goats across all agroecological zones (AEZs), including 570 breeds and 64% share of the breeds. They occupy a very important biological and socioeconomic niche in farming systems making significant multifunctional contributions especially to food, nutrition and financial security, stability of farm households, and survival of the poor in the rural areas. Definitions are given of successful and failed projects. The analyses highlighted in successful projects the value of strong participatory efforts with farmers and climate change. Climate change effects on goats are inevitable and are mediated through heat stress, type of AEZ, water availability, quantity and quality of the available feed resources and type of production system. Within the prevailing production systems, improved integrated tree crops - ruminant systems are underestimated and are an important pathway to enhance C sequestration. Key development strategies and opportunities for research and development (R and D) are enormous, and include inter alia defining a policy framework, resolution of priority constraints using systems perspectives and community-based participatory activities, application of yield-enhancing technologies, intensification, scaling up, and impacts. The priority for development concerns the rainfed areas with large concentrations of ruminants in which goats, with a capacity to cope with heat tolerance, can be the entry point for development. Networks and networking are very important for the diffusion of information and can add value to R and D. Well formulated projects with clear priority setting and participatory R and D ensure success and the realisation of food security, improved livelihoods and self-reliance in the future.

Scanning Worm Detection Algorithm Using Network Traffic Analysis (네트워크 트래픽 특성 분석을 통한 스캐닝 웜 탐지 기법)

  • Kang, Shin-Hun;Kim, Jae-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.6
    • /
    • pp.474-481
    • /
    • 2008
  • Scanning worm increases network traffic load and result in severe network congestion because it is a self-replicating worm and send copies of itself to a number of hosts through the Internet. So an early detection system which can automatically detect scanning worms is needed to protect network from those attacks. Although many studies are conducted to detect scanning worms, most of them are focusing on the method using packet header information. The method using packet header information has long detection delay since it must examine the header information of all packets entering or leaving the network. Therefore we propose an algorithm to detect scanning worms using network traffic characteristics such as variance of traffic volume, differentiated traffic volume, mean of differentiated traffic volume, and product of mean traffic volume and mean of differentiated traffic volume. We verified the proposed algorithm by analyzing the normal traffic captured in the real network and the worm traffic generated by simulator. The proposed algorithm can detect CodeRed and Slammer which are not detected by existing algorithm. In addition, all worms were detected in early stage: Slammer was detected in 4 seconds and CodeRed and Witty were detected in 11 seconds.