• Title/Summary/Keyword: hierarchical control

Search Result 823, Processing Time 0.03 seconds

Effects of Acculturative Stress and Emotional Control on Depression/Anxiety in Children from Multicultural Families: Mediating Effects of Social Support (문화적응스트레스 및 정서조절이 다문화가정 아동의 우울/불안에 미치는 영향 : 사회적 지지 매개효과를 중심으로)

  • Woo, Hee-Jung
    • The Korean Journal of Community Living Science
    • /
    • v.26 no.3
    • /
    • pp.551-563
    • /
    • 2015
  • This study examines the mediating effects of social support on 1) the relationships between acculturative stress and depression/anxiety and 2) the relationships between emotional control and depression/anxiety in children from multicultural families. Pearson's correlations between variables were analyzed, and hierarchical regression analyses were conducted to identify direct and indirect effects of acculturative stress, emotional control, and social support on children's depression/anxiety. The sample included a total of 199 primary school students in grades 3 to 6 who lived in the Gwangju or Chonnam regions of Korea. First, there were positive correlations between acculturative stress and depression/anxiety and negative correlations between emotional control and social support. Second, social support from both peers and teachers partially mediated the relationships between acculturative stress and depression/anxiety. Third, social support from peers fully mediated the relationships between emotional control and depression/anxiety, and that from teachers partially mediated these relationships. The results suggest that social support from peers and teachers may reduce depression/anxiety in multicultural children as a mediating variable.

The Main and Interaction Effects of Control Parenting and Early Adolescents' Ego-Resiliency on Peer Attachment : Focusing on the Data of the Korean Children and Youth Panel Survey 2010 (초기 청소년의 또래애착에 대한 부모의 통제적 양육행동과 자아탄력성의 주효과 및 상호작용효과 : 2010 한국아동·청소년패널조사 자료를 중심으로)

  • Lee, Mi-Sook;Min, Ha-Young
    • Journal of Families and Better Life
    • /
    • v.31 no.6
    • /
    • pp.1-9
    • /
    • 2013
  • The purpose of this study was to investigate the relationships among control parenting, early adolescents' ego-resiliency and peer attachment. The subjects were 2,346 1st-year middle school students from all over the country. Korean Children and Youth Panel Survey(2010) data were analyzed by means of Pearson's correlation, hierarchical regression, and by the use of SPSS 19.0. The results of our study are as follows. First, parents' control parenting operated as a major determining factor with the effect that peer attachment decreased as parents' control parenting levels increased. Second, early adolescents' ego-resiliency operated as a major determining factor with the effect that peer attachment increased as adolescents' ego-resiliency levels increased. Finally, the interaction effects of parents' control parenting and early adolescents' ego-resiliency on peer attachment were observed.

Enhanced Communication Transport Protocol: Implementations and Experimentations (ECTP 멀티캐스트 전송 프로토콜: 구현 및 성능분석)

  • Park, Ki-Shik;Park, Juyoung;Koh, Seok-Joo;Jo, In-June
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.876-890
    • /
    • 2003
  • This paper proposes a protocol for the reliableand QoS-aware multicast transport, which is called the Enhanced Communications Transport Protocol (ECTP). The ECTP has so far been developed and standardized in ITU-T SG17 and ISO/IEC JTC 1/SC 6. Differently from the conventional reliable multicast, as shownin the IETF RMT WG, the ECTP additionally provides several distinct features such as tight control of multicast session, tree-based error control, and QoS management. For the tight control of multicast connections, the sender is at the heart of one-to-many group communications, and it is responsible for overall connection management such as connection creation/termination, pause/resumption, and the join and leave operations. for tree-based reliability control, ECTP configures a hierarchical tree during connection creation. Error control is performed within each local group defined by a control tree, which was partly designed like the IETF TRACK approach. Each parent retransmits lost data in response to retransmission requests from its children. For QoS management, ECTP supports QoS negotiation for resource reservation, and it also provides QoS monitoring and maintenance operations. ECTP has been implemented and tested on Linux machine, along with Application Programming Interfaces based on Berkeley sockets. For basic testing of the ECTP functionality, we give some preliminary experimental results for performance comparison of ECTP and TCP unicast transports. In conclusion, we describe the status of ECTP experimentations over APAN/KOREN testbed networks

A Hierarchical Production Planning and Control System in a Make-to-Order Environment with Dynamic Events (동적 이벤트를 고려한 수주생산환경의 계층적 생산계획 및 통제 시스템)

  • Jang, Gil-Sang;Kim, Jae-Gyun
    • IE interfaces
    • /
    • v.14 no.1
    • /
    • pp.9-19
    • /
    • 2001
  • Production planning and control system plays an important role in manufacturing companies because it determines all production capacity planning, material procurement planning, and production scheduling which are needed in the process of producing products. Many researches on production planning and control system have been conducted for many manufacturing companies for recent decade. But, a considerable research achievement has mainly been obtained on the forecast-driven production for a make-to-stock and an assemble-to-order. The reason is that there are some hardships such as difficulties of standardizing product information, the frequent changes of design and material, and the unexpected dynamic events that influence the production of customer's order in a make-to-order or an engineering-to-order environments. By these characteristics and their complexities, some studies for production planning and control system in a make-to-order environment are presented recently. In this paper, we present the framework of the hietachical production planning and control for a make-to-order environment with dynamic events. In order to illustrate the usefulness of the proposed framework for a hietachical production planning and control, the information system for a make-to-order production was implemented with the object of the company of producing electricity transformer.

  • PDF

Continuation Time Integration (CTI)-Based Time Domain Simulation Analysis for Wind Farms (연속 시적분 (CTI) 기반 풍력발전단지 시모의 해석)

  • Cho, Sung-Koo;Song, Hwa-Chang;Lee, Jang-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.11
    • /
    • pp.1971-1979
    • /
    • 2010
  • As a result of increasing environmental concern, the penetration of renewable power on power systems is now increasing. Wind energy can be considered as the most economical energy sources to generate electricity without depletion of fossil fuel. To devise adequate control strategies for wind farm, time domain simulation analysis needs to be performed. This presents a continuation time integration (CTI)-based time domain simulation algorithm for wind farm with doubly fed asynchronous generator (DFAG) connected to the external power systems. This paper depicts how to time trajectories are traced using CTI-based time domain simulation. Also this paper describes the possibilities of hierachical control for wind farm output limitation, and the coordinated control has been designed by hierarchical control structured from central control level to wind farm control board and to an individual wind turbine level. Finally it shows an illustrative example of time domain simulation result with two test systems through case study.

Factors Affecting Female Nursing Students' Intention to Control Drinking (간호학과 여학생의 절주의도 영향요인)

  • Song, Hyo-Suk;Lim, So Hee
    • Journal of the Korean Society of School Health
    • /
    • v.32 no.2
    • /
    • pp.116-124
    • /
    • 2019
  • Purpose: This study was performed to measure the influence of drinking motives, drinking refusal self-efficacy, and self-determination on the intention to control drinking among nursing students. Methods: A cross-sectional survey was done with the participation of 258 nursing students attending four universities in G city. Data collection was conducted from May to June, 2018, using a self-report questionnaire. Data were analyzed using the t-test, ANOVA, $Scheff{\acute{e}}$ test, Pearson's correlation coefficients, and Hierarchical multiple regression. Results: The average scores for drinking motives, drinking refusal self-efficacy, self-determination, and intention to control drinking were 2.29, 4.54, 3.89, and 4.29 respectively. There were significant differences in the intention to control drinking according to grade, religion, and age of alcohol initiation. The factors influencing the intention to control drinking in nursing students were identified as self-determination (${\beta}=.24$), drinking refusal self-efficacy (${\beta}=.17$) and drinking motives (${\beta}=-.17$). This factor explained 26% of the nursing students' intention to control drinking. Conclusion: Therefore, it is necessary to develop a alcohol education program to improve the drinking culture of nursing college students and to improve their self-regulation skills in order to help them form a desirable drinking habit, and it is also necessary to apply the developed intervention program and test the effect.

Load Allocation Strategy for Command and Control Networks based on Interdependence Strength

  • Bo Chen;Guimei Pang;Zhengtao Xiang;Hang Tao;Yufeng Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2419-2435
    • /
    • 2023
  • Command and control networks(C2N) exhibit evident multi-network interdependencies owing to their complex hierarchical associations, interleaved communication links, and dynamic network changes. However, the existing command and control networks do not consider the effects of dependent nodes on the load distribution. Thus, we proposed a command and control networks load allocation strategy based on interdependence strength. First, a new measure of interdependence strength was proposed based on the edge betweenness, which was followed by proposing the inter-layer load allocation strategy based on the interdependence strength. Eventually, the simulation experiments of the aforementioned strategy were designed to analyze the network invulnerability with different initial load capacity parameters, allocation model parameters, and allocation strategies. The simulation indicates that the strategy proposed in this study improved the node survival rate of the interdependent command and control networks model and successfully prevented cascade failures.

Facial Expression Control of 3D Avatar by Hierarchical Visualization of Motion Data (모션 데이터의 계층적 가시화에 의한 3차원 아바타의 표정 제어)

  • Kim, Sung-Ho;Jung, Moon-Ryul
    • The KIPS Transactions:PartA
    • /
    • v.11A no.4
    • /
    • pp.277-284
    • /
    • 2004
  • This paper presents a facial expression control method of 3D avatar that enables the user to select a sequence of facial frames from the facial expression space, whose level of details the user can select hierarchically. Our system creates the facial expression spare from about 2,400 captured facial frames. But because there are too many facial expressions to select from, the user faces difficulty in navigating the space. So, we visualize the space hierarchically. To partition the space into a hierarchy of subspaces, we use fuzzy clustering. In the beginning, the system creates about 11 clusters from the space of 2,400 facial expressions. The cluster centers are displayed on 2D screen and are used as candidate key frames for key frame animation. When the user zooms in (zoom is discrete), it means that the user wants to see mort details. So, the system creates more clusters for the new level of zoom-in. Every time the level of zoom-in increases, the system doubles the number of clusters. The user selects new key frames along the navigation path of the previous level. At the maximum zoom-in, the user completes facial expression control specification. At the maximum, the user can go back to previous level by zooming out, and update the navigation path. We let users use the system to control facial expression of 3D avatar, and evaluate the system based on the results.

A Novel K-hop Cluster-based Ad hoc Routing Scheme with Delegation Functions (위임 기능을 이용한 새로운 K-hop 클러스터 기반 Ad hoc 라우팅 구조)

  • Kim Tae-yeon;Wang Ki-cheoul
    • Journal of Internet Computing and Services
    • /
    • v.5 no.5
    • /
    • pp.27-37
    • /
    • 2004
  • The existing ad hoc network protocols suffer the scalability problem due to the inherent characteristics of node mobility. Cluster-based routing protocols divide the member nodes into a set of clusters and perform a hierarchical routing between these clusters. This hierarchical feature help to improve the scalability of ad hoc network routing. However, previous k-hop cluster-based routing protocols face another problems, that is, control overhead of the cluster headers. This paper proposes a novel k-hop cluster-based routing scheme with delegation functions for mobile ad hoc networks. The scheme employs is based on tree topology to manage cluster members in effectively. The cluster headers do not manage the routing table for whole members, while the header keeps the routing table for its neighbor members and the member list for one hop over nodes within k-hop cluster. Then the in-between leveled nodes manage the nested nodes which is structured in the lower level. Therefore, the proposed mechanism can reduce some control overhead of the cluster leaders.

  • PDF

A hierarchical property-based multi-level approach method for improves user access control in a cloud environment (클라우드 환경에서 사용자 접근제어를 향상시킨 계층적 속성 기반의 다단계 접근 방법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Choel
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.7-13
    • /
    • 2017
  • In recent years, cloud computing technology has been socially emerged that provides services remotely as various devices are used. However, there are increasing attempts by some users to provide cloud computing services with malicious intent. In this paper, we propose a property - based multi - level hierarchical approach to facilitate authentication access for users accessing servers in cloud environment. The proposed method improves the security efficiency as well as the server efficiency by hierarchically distributing a set of attribute values by replacing the order of the user 's attribute values in the form of bits according to a certain rule. In the performance evaluation, the proposed method shows that the accuracy of authentication according to the number of attributes is higher than that of the existing method by an average of 15.8% or more, and the authentication delay time of the server is decreased by 10.7% on average. As the number of attributes increases, the average overhead change is 8.5% lower than that of the conventional method.