• Title/Summary/Keyword: Unpredicted

Search Result 59, Processing Time 0.022 seconds

Design of an Efficient Power Manger through the cooperative Dynamic Power Management for Ad hoc Wireless Sensor Networks (Ad hoc 무선 센서네트워크에서의 효율 전력 매니지먼트에 관한 연구)

  • Jeon, Dong-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.809-814
    • /
    • 2011
  • The major resource problem in sensor networks is energy efficiency. There are two major access methods to efficiently use energy. The first is to use dynamic power management (DPM). The second is to use energy efficient protocols. In DPM methods, the OS, the power manager, is responsible for managing the proper power state of CPU and each I/O with respect to the events, but the OS is not largely concerned about the internal operation of each network protocols. Also, energy efficient protocols are mainly focused on the power saving operation of the radio PHY. In addition, in wireless sensor network most of tasks are connected to communication. In such a situation, traditional power managers can waste unpredicted power. In this paper, we introduce an efficient power manger that can reduce a lot of unwanted power consumption through cooperative power management (CPM) in communication-related tasks between each units, such as radio, sensing unit, and CPU, for ad hoc wireless sensor nodes.

Communication Event-driven Power Management for Energy Efficient Wireless Sensor Network (에너지 효율적인 무선 센서 네트워크를 위한 통신 이벤트 기반의 전력 관리 방안에 관한 연구)

  • Hwang, Kwang-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7B
    • /
    • pp.411-421
    • /
    • 2007
  • It is well known that the biggest problem of wireless sensor networks is power conservation. There have been two major approaches to efficiently use energy in wireless sensor networks. One is to use a dynamic power management scheme and the other is to use energy efficient protocols. In the former, the power manager is responsible for managing the proper power state of CPU and each I/O with respect to the events, but the power manager does not concern about the internal operation of the underlying network protocols. Thus such conventional power managers can waste unpredicted power during communication period. On the other hand, the energy efficient protocols are just focused on the power saving operation of the radio PHY. In this paper, we introduce an energy-efficient power saving mechanism that can significantly reduce unwanted power consumption of wireless sensor nodes through the communication event-driven power management. We show that our scheme improves the energy conservation in the entire network through simulations.

Shield TBM trouble cases review and parameter study for the cause analysis (쉴드 TBM 트러블 사례 및 매개변수 연구를 통한 원인 분석)

  • Koh, Sungyil;La, You-Sung;Kim, Bumjoo
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.22 no.2
    • /
    • pp.197-217
    • /
    • 2020
  • Shield TBM tunneling, used in the construction of Seoul subway line 7 and line 9, has been well known as a very efficient, as well as safe, tunneling method. Although the Shield TBM method has been known to be effectively used in poor ground conditions, a number of troubles have occurred during the use of the shield TBM, due to inappropriate machine selection, machine breakdown, and unpredicted ground conditions etc. In this study, several accidents and trouble cases occurred during excavation by Shield TBM, reported from Japan, were investigated. A series of numerical analysis was then performed to compare with the trouble cases and back-analysis results for the cause analysis. The lessons learned from the case studies are presented at the end.

On the Docking Analysis of Global Ship Structure Using Simplified Grillage Model (간이화된 격자 구조 모델을 사용한 선박의 도킹 해석에 대하여)

  • Kim, Sung-Chan;Ryu, Cheol-Ho;Lee, Jang-Hyun;Lee, Kyung-Seok;Baek, Ki-Dae;Sohn, Sang-Yong;Choi, Joong-Hyo
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.45 no.6
    • /
    • pp.710-718
    • /
    • 2008
  • This paper presents a simple and fast approach to plan the arrangement of supports and to do a ship docking analysis. The unpredicted structural damages often happen from a docking works as the size of ships are getting larger and larger. In docking a ship, excessive reaction forces from supports are primary causes of the structural damage. The grillage analysis method is employed to simply calculate only the reaction forces at supports. The grillage modeling strategies are proposed to improve the accuracy. In this paper, the results obtained by the proposed approach are compared with those of the current whole-ship FEA for typical types of ships. Comparison shows that the results from the present grillage approaches are reasonably in a good agreement with the 3-D full F.E one. Finally, an integrated program developed for the ship docking analysis is described.

Pulmonary artery rupture due to bacterial endocarditis complicated by patent ductus arteriosus. (동맥관개존증에 합병한 심내막염에 의한 폐동맥파열 실험 1례)

  • 조순걸
    • Journal of Chest Surgery
    • /
    • v.18 no.4
    • /
    • pp.537-541
    • /
    • 1985
  • Recently, we met a 12 year old female patient who suffered from bacterial endocarditis and pericarditis which were complicated by patent ductus arteriosus. She was admitted to our hospital because of dyspnea, fever, headache, and generalized ache for 10 days. The initial diagnosis was bacterial endocarditis and pericarditis complicated by patent ductus arteriosus and congestive heart failure. At first, we tried to treat the patient medically with digitalis, diuretics, and massive antibiotics. On echocardiography large amount of pericardial fluid was accumulated mainly right anterior aspect and also noted a large vegetation at pulmonary valve area. With vigorous medical treatment including repeated pericardiocentesis, the patient showed no improvement. So we decided to perform pericardiectomy for elimination of the most probable septic focus. On operation, we encountered an unpredicted event, the pericardium was thickened, distended, and its surface showed pulsating which meant connecting to systemic circulation. We decided to close the operative wound and reoperate her under cardiopulmonary bypass later. On the next day, we operated her under cardiopulmonary bypass later. On the next day we operated her under cardiopulmonary bypass. The operative findings were ruptured main pulmonary artery about 1.5cm in diameter on its ventral portion, the blood from the ruptured main pulmonary artery was filled up the localized pericardial sac due to previous pericarditis. Through the ruptured main pulmonary artery, we also found 0.5cm diametered patent ductus arteriosus. With the aid of partial cardiopulmonary bypass and inserting 24F ballooned Foley catheter at aorta, pericardiectomy was performed first. After completion of the pericardiectomy, total cardiopulmonary bypass was established. With minimum pump flow [0.3L/min/m2] the PDA was closed with two Teflon-felted 4-0 Prolene interrupted sutures. The ruptured main pulmonary artery was also closed using thickened pericardium with three Teflon-felted 4-0 Prolene interrupted sutures. The operation was successful and postoperative course was uneventful. She was discharged on the 16th POD. We report this case as a very rare secondary complication of bacterial endocarditis complicated by patent ductus arteriosus.

  • PDF

Analysis and Experiment on the Tape Spring Hinges for CubeSat Missions (큐브위성 임무를 위한 테이프 스프링 힌지의 비선형 거동 분석 및 실험)

  • Yoo, JeongUk;Im, Byeong-Uk;Shin, SangJoon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.10
    • /
    • pp.712-719
    • /
    • 2019
  • This paper explores an implementation of finite element analysis and experiment in the design process of a tape spring hinge used for various CubeSat missions. Tape spring hinges consist of short-length hardened-steel strips with one-sided curvature, and thus the behavior is subject to large deformation with unpredicted non-linearity. Precise dimensions of a commercial tape spring are traced by the use of high-resolution digital camera, and thin-shell FEM analysis is conducted using ABAQUS program. Based on the rotation-moment analysis suggested in previous studies, parametric analysis is conducted by adjusting the contributing factors such as strip thickness and the subtended angle of the cross section. Finally the behaviors are investigated by both analytical and non-linear finite element methods, and the results are compared with the simple measurements. Further studies suggest a possible application in dynamic characteristics of hinges during CubeSat operations.

The Roles of Money's Pride and Surprise Tag on the Use of Money

  • Liu, Cong;Choi, Nak Hwan
    • Asia Marketing Journal
    • /
    • v.17 no.3
    • /
    • pp.1-31
    • /
    • 2015
  • The present research examined the interesting but less attended effects of pride- and surprise-tagged money on consumers' spending decisions. Focusing on the unexpected money received in their daily life, we explored recipient's judgments and responses toward pride-tagged money versus surprise-tagged, and identified differences in types of recipient's consumption and spending behaviors between the pride- tagged money and the surprise-tagged money. Consumers tend to use the money associated with pride (vs. surprise) to reward their invested effort; as a result, they were more likely to buy a personal gift. Moreover, in the context of self-gift, consumers with pride-tagged money have showed a bigger positive difference between the intent to buy individual self-expressive products and the intent to buy social self-expressive products than those with surprise-tagged money. And the receipt of pride-tagged money activates motivation to express one's individual self. Consumers who have received a sum of extra money tend to add the money into the current spendable income account and broaden the array of product category. And consumers with high arousal level of surprise triggered by receiving a sum of unpredictable money because of good luck show a smaller difference between the intent to buy individual self-expressive product and the intent to buy social self-expressive product than those with low level arousal in pride. Therefore, marketers should advertise their products in the respects of individual self-expression when their customers have pride-tagged money, and should advertise their products in the respects of social self-identity when they have surprise-tagged money by winning a large sum of unpredicted money like lottery winning.

Ensuring Data Confidentiality and Privacy in the Cloud using Non-Deterministic Cryptographic Scheme

  • John Kwao Dawson;Frimpong Twum;James Benjamin Hayfron Acquah;Yaw Missah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.49-60
    • /
    • 2023
  • The amount of data generated by electronic systems through e-commerce, social networks, and data computation has risen. However, the security of data has always been a challenge. The problem is not with the quantity of data but how to secure the data by ensuring its confidentiality and privacy. Though there are several research on cloud data security, this study proposes a security scheme with the lowest execution time. The approach employs a non-linear time complexity to achieve data confidentiality and privacy. A symmetric algorithm dubbed the Non-Deterministic Cryptographic Scheme (NCS) is proposed to address the increased execution time of existing cryptographic schemes. NCS has linear time complexity with a low and unpredicted trend of execution times. It achieves confidentiality and privacy of data on the cloud by converting the plaintext into Ciphertext with a small number of iterations thereby decreasing the execution time but with high security. The algorithm is based on Good Prime Numbers, Linear Congruential Generator (LGC), Sliding Window Algorithm (SWA), and XOR gate. For the implementation in C, thirty different execution times were performed and their average was taken. A comparative analysis of the NCS was performed against AES, DES, and RSA algorithms based on key sizes of 128kb, 256kb, and 512kb using the dataset from Kaggle. The results showed the proposed NCS execution times were lower in comparison to AES, which had better execution time than DES with RSA having the longest. Contrary, to existing knowledge that execution time is relative to data size, the results obtained from the experiment indicated otherwise for the proposed NCS algorithm. With data sizes of 128kb, 256kb, and 512kb, the execution times in milliseconds were 38, 711, and 378 respectively. This validates the NCS as a Non-Deterministic Cryptographic Algorithm. The study findings hence are in support of the argument that data size does not determine the execution.

Optimal Sensor Placement of Boundaries and Robustness Analysis for Chemical Release Detection and Response of Near Plant (주변 사업장의 화학물질 확산 감지와 대응을 위한 경계면의 센서배치 최적화 및 강건성 분석)

  • Cho, Jaehoon;Kim, Hyunseung;Kim, Tae-Ok;Shin, Dongil
    • Journal of the Korean Institute of Gas
    • /
    • v.20 no.5
    • /
    • pp.104-111
    • /
    • 2016
  • Recently, the quantities of chemical material are increasing in chemical industries. At that time, release accident is increasing due to aging of equipment, mechanical failure, human error, etc. and industrial complexes found community properties in a specific area. For that matter, chemical release accident can lead to hight probability of large disaster. There is a need to analyze the boundaries optimal sensor placement calculated by selecting release scenarios through release condition and wether condition in a chemical process for release detection and response. This paper is to investigate chlorine release accident scenarios using COMSOL. Through accident scenarios, a numerical calculation is studied to determine optimized sensor placement with weight of detection probability, detection time and concentration. In addition, validity of sensor placement is improved by robustness analysis about unpredicted accident scenarios. Therefore, this verifies our studies can be effectively applicable on any process. As mention above, the result of this study can help to place mobile sensor, to track gas release based concentration data.

Exploring the Relationship among Conflict, Knowledge Sharing, and Agility in Startup: Focus on the Role of Shared Vision (갈등상황에서 민첩한 스타트업 팀에 관한 연구: 공유된 비전의 이중효과)

  • Lee, Hyejung;Park, Jun-Gi;Lee, Seyoon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.11 no.3
    • /
    • pp.233-242
    • /
    • 2016
  • Startup must be agile and be able to handle extreme changes, survive unpredicted threats, and capitalize on emerging business opportunities. Agile teams continually sense changes for competitive action and marshal the necessary knowledge. While team members share their knowledge, there must be emerging various type of conflicts in teams. This study examines the relationship among the conflict, knowledge sharing and agility in startup context. At the same time, we tested the roles of shard vision both moderating variable between conflict and knowledge sharing, and antecedent for knowledge sharing. Different two types of conflict, task conflict and relationship conflict, knowledge sharing, agility, and different impact of shared vision are identified from literatures and tested. 182 data points were collected from under 5-year old startup's representatives to test these hypotheses. PLS data analysis indicated that the task conflict and shard vision positively effect on knowledge sharing, and then knowledge sharing has statistically significant effect on agility. And the impact of conlict has been weakened by shared vision's moderating effect. Based on the results, we proposed practically several team management skills for startup managers, leaders and stakeholder, and explained theoretical contributions.

  • PDF