• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.031 seconds

An Exploration of Crops Listed in Gwanhyuji, an Agricultural Book in the Joseon Dynasty for the Promotion of the Diversity of Urban Gardens

  • Hong, In-Kyoung;Chae, Young;Lee, Sang-Mi;Jung, Young-Bin
    • Journal of People, Plants, and Environment
    • /
    • v.22 no.4
    • /
    • pp.341-354
    • /
    • 2019
  • Urban agriculture, which promotes communication in vulnerable classes and the formation of social networks has been gaining attention with an emphasis on healthy city, elderly-friendly city, safe city and happy city as future keywords about urban life. There is a growing interest in public awareness in many areas such as health, society, economy, and ecology. As an attempt to improve the diversity of urban gardens, this study begins with collecting suitable crops for urban gardens from "Imwongyeongjeji (林園經濟志)," an encyclopedia written by Yoo-Ku Seo, a scholar in the 18-19th century. Out of those recorded in "Gwanhyuji (灌畦志)," 128 kinds of crops with linkage of the historical achievements of the realists who gave their priority to public welfare were selected and 53 crops which had traditionality, historicality, health functionality and popularity were finally selected. The properties (cold, warm, clam) of the selected crops were evenly distributed, and there was no crop that was hot and cool. In addition, the number of crops that have a sweet taste was the highest, followed by spicy and bitter, but there was no salty vegetable, which can be attributed to the fact that 12 namuls (wild vegetables) that grow in seas were excluded in this study since they were not suitable for urban gardens. Urban gardens can be transformed from those that focus on primary production and secondary consumption activities into a new resource that offers educational and traditional values by applying humanities to urban agriculture as a content resource in the era of cultural consilience and convergence. It is expected to satisfy urban residents' intellectual and participatory needs and to enhance the diversity and utility of urban gardens by applying traditional knowledge to a new model of urban agriculture. We hope that further research will be conducted to develop new types and models of urban agriculture going forward.

Relationship between Evaluation for the Self and others and Anhedonia in Patients with Schizophrenia (조현병 환자에서 자기 및 타인 평가와 무쾌감증 간의 관련성)

  • Kim, Min-Kyeong;Kim, Eun Seong;Lee, Jung Suk;Kim, Eun Joo;Kim, Joohan;Kim, Jae-Jin
    • Korean Journal of Schizophrenia Research
    • /
    • v.17 no.1
    • /
    • pp.36-42
    • /
    • 2014
  • Objectives : The dysfunctional neural networks underlying self-evaluation in schizophrenia are overlapped with the neural structures involved in emotion regulation. The purpose of this study was to investigate the influence of anhedonia on the self-evaluation attitude of patients with schizophrenia. Methods : Twenty healthy controls and twenty patients with schizophrenia performed a self-evaluation task, presenting a pair of the face (self, familiar other, and unfamiliar other) and word (negative, neutral, and positive noun) at the same time. Participants were asked to evaluate relevance between the pairs by pressing a corresponding button. Relevance rating scores were compared between the groups and were correlated with the severity of physical and social anhedonia. Results : Patients evaluated the condition of a self face with a negative word and a familiar face with a negative word to be more relevant than healthy controls. In the patient group, the scores of relevance rating in the condition of an unfamiliar other face with a negative word were positively correlated with the anhedonia scale scores (physical : r=0.486, p=0.030 ; social : r=0.499, p=0.025). There was no correlation between the self-evaluation attitude and the severity of anhedonia. Conclusion : Patients with schizophrenia evaluate themselves badly in only negative circumstances, and anhedonia is not related to self-evaluation, but rather other-evaluation.

Channel Modeling and RF Performance Verification in mmWave Bands Based on NS-3 (NS-3 기반의 mmWave 대역 채널 모델링 및 RF 성능 검증)

  • Seung-Min Lee;Jun-Seok Seo;Hong-Je Jang;Myung-Ryul Choi
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.650-656
    • /
    • 2023
  • This paper implements a channel model for mmWave bands using an NS-3-based 5G system-level simulator and analyzes the reliability and validity of the implemented model through RF performance verification. The channel model for RF performance verification in the mmWave bands consider parameters such as characteristics defined in 3GPP TR 38.901, beam-forming, antenna configuration, scenarios, among others. Furthermore, the simulation results verify compliance within the ranges permitted by the 3GPP standards and verify reliability in indoor environmental scenarios by exploiting the Radio Environment Map (REM). Therefore, the channel model implemented in this study is applicable to the actual design and establishment of 5G networks, presenting a method to evaluate and validate RF performance by adjusting various parameters.

Enhancing Acute Kidney Injury Prediction through Integration of Drug Features in Intensive Care Units

  • Gabriel D. M. Manalu;Mulomba Mukendi Christian;Songhee You;Hyebong Choi
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.434-442
    • /
    • 2023
  • The relationship between acute kidney injury (AKI) prediction and nephrotoxic drugs, or drugs that adversely affect kidney function, is one that has yet to be explored in the critical care setting. One contributing factor to this gap in research is the limited investigation of drug modalities in the intensive care unit (ICU) context, due to the challenges of processing prescription data into the corresponding drug representations and a lack in the comprehensive understanding of these drug representations. This study addresses this gap by proposing a novel approach that leverages patient prescription data as a modality to improve existing models for AKI prediction. We base our research on Electronic Health Record (EHR) data, extracting the relevant patient prescription information and converting it into the selected drug representation for our research, the extended-connectivity fingerprint (ECFP). Furthermore, we adopt a unique multimodal approach, developing machine learning models and 1D Convolutional Neural Networks (CNN) applied to clinical drug representations, establishing a procedure which has not been used by any previous studies predicting AKI. The findings showcase a notable improvement in AKI prediction through the integration of drug embeddings and other patient cohort features. By using drug features represented as ECFP molecular fingerprints along with common cohort features such as demographics and lab test values, we achieved a considerable improvement in model performance for the AKI prediction task over the baseline model which does not include the drug representations as features, indicating that our distinct approach enhances existing baseline techniques and highlights the relevance of drug data in predicting AKI in the ICU setting.

The impact of security and privacy risk on smart car safety and trust (보안과 프라이버시 위험이 스마트카 안전과 신뢰에 미치는 영향)

  • Soonbeom Kwon;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.9-19
    • /
    • 2023
  • Smart cars, which incorporate information and communication technologies (ICT) to improve driving safety and convenience for drivers, have recently emerged. However, the increasing risk of automotive cybersecurity due to the vulnerability of electronic control units (ECUs) and automotive networks, which are essential for realizing the autonomous driving functions of smart cars, is a major obstacle to the widespread adoption of smart cars. Although there have been only a few real-world cases of smart car hacking, drivers' concerns about the security of smart cars can have a negative impact on their proliferation. Therefore, it is important to understand the risk factors perceived by drivers and the trust in smart cars formed through them in order to promote the future diffusion of smart cars. This study examines the risk factors that affect the formation of trust in smart cars, focusing on security and privacy, and analyzes how these factors affect safety perceptions and trust in smart cars.

Retained Message Delivery Scheme utilizing Reinforcement Learning in MQTT-based IoT Networks (MQTT 기반 IoT 네트워크에서 강화학습을 활용한 Retained 메시지 전송 방법)

  • Yeunwoong Kyung;Tae-Kook Kim;Youngjun Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.131-135
    • /
    • 2024
  • In the MQTT protocol, if the retained flag of a message published by a publisher is set, the message is stored in the broker as a retained message. When a new subscriber performs a subscribe, the broker immediately sends the retained message. This allows the new subscriber to perform updates on the current state via the retained message without waiting for new messages from the publisher. However, sending retained messages can become a traffic overhead if new messages are frequently published by the publisher. This situation could be considered an overhead when new subscribers frequently subscribe. Therefore, in this paper, we propose a retained message delivery scheme by considering the characteristics of the published messages. We model the delivery and waiting actions to new subscribers from the perspective of the broker using reinforcement learning, and determine the optimal policy through Q learning algorithm. Through performance analysis, we confirm that the proposed method shows improved performance compared to existing methods.

A Study on the Operation and System Improvement of Cyber Security Center (사이버보안관제센터 운영 및 제도 개선에 관한 연구)

  • Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.39-45
    • /
    • 2024
  • The purpose of security control in the public sector is to secure the safety of administrative services for the public by preventing resource loss or information infringement in information systems and information and communication networks. The security control system is a process that performs real-time detection, analysis, response, and reporting through system vulnerability analysis and security system detection pattern optimization. This study aims to objectively identify the current situation of the mismatch between the supply and demand of cyber security control centers currently in operation and specialized security control companies that can be entrusted to operate them, and to derive and propose practical and institutional improvement measures. Considering that the operation of security control centers in the public sector is expected to increase in the future, research on the practical supplementation required for the operation process of security control centers and the improvement of the designation system of security control specialized organizations has fundamental and timely significance, and it is an area that requires continuous research in terms of strategic industrialization.

State-of-the-Art in Cyber Situational Awareness: A Comprehensive Review and Analysis

  • Kookjin Kim;Jaepil Youn;Hansung Kim;Dongil Shin;Dongkyoo Shin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1273-1300
    • /
    • 2024
  • In the complex virtual environment of cyberspace, comprised of digital and communication networks, ensuring the security of information is being recognized as an ongoing challenge. The importance of 'Cyber Situation Awareness (CSA)' is being emphasized in response to this. CSA is understood as a vital capability to identify, understand, and respond to various cyber threats and is positioned at the heart of cyber security strategies from a defensive perspective. Critical industries such as finance, healthcare, manufacturing, telecommunications, transportation, and energy can be subjected to not just economic and societal losses from cyber threats but, in severe cases, national losses. Consequently, the importance of CSA is being accentuated and research activities are being vigorously undertaken. A systematic five-step approach to CSA is introduced against this backdrop, and a deep analysis of recent research trends, techniques, challenges, and future directions since 2019 is provided. The approach encompasses current situation and identification awareness, the impact of attacks and vulnerability assessment, the evolution of situations and tracking of actor behaviors, root cause and forensic analysis, and future scenarios and threat predictions. Through this survey, readers will be deepened in their understanding of the fundamental importance and practical applications of CSA, and their insights into research and applications in this field will be enhanced. This survey is expected to serve as a useful guide and reference for researchers and experts particularly interested in CSA research and applications.

Implementation of Potential Field-Based Routing for Wireless Mesh Networks and its Performance Evaluation in Real-World Testbed (무선 메쉬 네트워크를 위한 포텐셜 필드 기반 라우팅의 구현과 실환경 테스트베드에서의 성능 평가)

  • Jihoon Sung;Yeunwoong Kyung
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.3
    • /
    • pp.1-6
    • /
    • 2024
  • In response to the increasing demand for unrestricted access to diverse services regardless of location, cost-effective and easily deployable Wireless Mesh Network (WMN) solutions have once again captured attention. This paper primarily addresses the implementation challenges of Autonomous Load-balancing Field-based Anycast routing+ (ALFA+) for three-dimensional (3D) WMNs. Subsequently, we evaluate the performance of ALFA+ in an 802.11-based 3D WMN testbed established within a university campus using commercial devices, thus validating the practical viability of ALFA+. While most prior research has relied on performance evaluation through virtual environment simulations, this study distinguishes itself by performance evaluations in a real-world testbed using commercial devices and providing detailed implementation-related information necessary for such evaluations. This approach holds considerable significance in assessing the actual applicability of ALFA+.

Implementation of Audio Effect Device for Anchor System

  • Seungwon Lee;Soonchul Kwon;Seunghyun Lee
    • International journal of advanced smart convergence
    • /
    • v.13 no.3
    • /
    • pp.1-12
    • /
    • 2024
  • Recently, Audio systems transform the configuration of conventional sound reinforcement and public address systems using audio over internet protocol (AoIP), whereby audio signals are transmitted and received based on internet protocol (IP). Currently, AoIP technologies are leading the audio market, and various technologies have been released. Audio networks and the control hierarchy over peer-to-peer (Anchor) technology based on AoIP transmit and receive audio signals over a wide bandwidth without an audio mixer. Audio system based on Anchor technology is constructed by connecting the on-site audio center (OAC), a device that can transmit and receive audio sources and output equipment over IP. Receiving OAC of the Anchor technology can receive and mix audio signals transmitted from different IPs; consequently, novel audio systems can be configured by replacing conventional audio mixers. However, the Anchor technology does not have an equalizer function for improving the quality of audio equipment. Therefore, tone distortion may occur owing to signal loss between equipment, poor audio-signal clarity, and howling due to audio deformation according to different architectural structures and environments. In this study, we implemented an audio effect device capable of tone control using the Audio Processor Core. Using Anchor technology, tone control was realized through an audio effect device in the receiving OAC. The output of the incoming OAC was received by the audio effect device, which adjusted the tone and then outputted it. Thus, the tone issues in Anchor technology were overcome by the receiving OAC and audio effect devices. In future, audio system configurations using Anchor technology could be the standard for audio equipment.