• Title/Summary/Keyword: hotspot

Search Result 261, Processing Time 0.019 seconds

Coordinated Cognitive Tethering in Dense Wireless Areas

  • Tabrizi, Haleh;Farhadi, Golnaz;Cioffi, John Matthew;Aldabbagh, Ghadah
    • ETRI Journal
    • /
    • v.38 no.2
    • /
    • pp.314-325
    • /
    • 2016
  • This paper examines the resource gain that can be obtained from the creation of clusters of nodes in densely populated areas. A single node within each such cluster is designated as a "hotspot"; all other nodes then communicate with a destination node, such as a base station, through such hotspots. We propose a semi-distributed algorithm, referred to as coordinated cognitive tethering (CCT), which clusters all nodes and coordinates hotspots to tether over locally available white spaces. CCT performs the following these steps: (a) groups nodes based on a modified k-means clustering algorithm; (b) assigns white-space spectrum to each cluster based on a distributed graph-coloring approach to maximize spectrum reuse, and (c) allocates physical-layer resources to individual users based on local channel information. Unlike small cells (for example, femtocells and WiFi), this approach does not require any additions to existing infrastructure. In addition to providing parallel service to more users than conventional direct communication in cellular networks, simulation results show that CCT can increase the average battery life of devices by 30%, on average.

Effects of Repetitive Transcranial Magnetic Stimulation on Motor Recovery in Lower Extremities of Subacute Stage Incomplete Spinal Cord Injury Patients: A Randomized Controlled Trial

  • Ji, Sang-Goo;Cha, Hyun-Gyu;Kim, Myoung-Kwon
    • Journal of Magnetics
    • /
    • v.20 no.4
    • /
    • pp.427-431
    • /
    • 2015
  • The aim of this study was to investigate whether repetitive transcranial magnetic stimulation (rTMS) can improve motor recovery in the lower extremities of the patients with subacute stage spinal cord injury (SCI). This study was conducted with 19 subjects diagnosed with paraplegia because of SCI. The experimental group included 10 subjects who underwent active rTMS, and the control group included 9 subjects who underwent sham rTMS. The SCI patients in the experimental group underwent conventional rehabilitation therapy, and active rTMS was applied daily to the hotspot of the lesional hemisphere. The SCI patients in the control group underwent sham rTMS and conventional rehabilitation therapy. The participants in both the groups received therapy five days per week for six weeks. Latency, amplitude, and velocity were assessed before and after the six-week therapy period. A significant difference in post-treatment gains for the latency and velocity was observed between the experimental and control groups (p < 0.05). However, no significant differences in the amplitude were observed between the two groups (p > 0.05). The results of this study indicate that rTMS may be beneficial in improving motor recovery in the lower extremities of subacute stage SCI patients.

A Prediction-based Energy-conserving Approximate Storage and Query Processing Schema in Object-Tracking Sensor Networks

  • Xie, Yi;Xiao, Weidong;Tang, Daquan;Tang, Jiuyang;Tang, Guoming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.5
    • /
    • pp.909-937
    • /
    • 2011
  • Energy efficiency is one of the most critical issues in the design of wireless sensor networks. In object-tracking sensor networks, the data storage and query processing should be energy-conserving by decreasing the message complexity. In this paper, a Prediction-based Energy-conserving Approximate StoragE schema (P-EASE) is proposed, which can reduce the query error of EASE by changing its approximate area and adopting predicting model without increasing the cost. In addition, focusing on reducing the unnecessary querying messages, P-EASE enables an optimal query algorithm to taking into consideration to query the proper storage node, i.e., the nearer storage node of the centric storage node and local storage node. The theoretical analysis illuminates the correctness and efficiency of the P-EASE. Simulation experiments are conducted under semi-random walk and random waypoint mobility. Compared to EASE, P-EASE performs better at the query error, message complexity, total energy consumption and hotspot energy consumption. Results have shown that P-EASE is more energy-conserving and has higher location precision than EASE.

Dosimetric Characteristics of 6 MV Modified Beams by Physical Wedges of a Siemens Linear Accelerator

  • Zabihzadeh, Mansour;Birgani, Mohammad Javad Tahmasebi;Hoseini-Ghahfarokhi, Mojtaba;Arvandi, Sholeh;Hoseini, Seyed Mohammad;Fadaei, Mahbube
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.4
    • /
    • pp.1685-1689
    • /
    • 2016
  • Physical wedges still can be used as missing tissue compensators or filters to alter the shape of isodose curves in a target volume to reach an optimal radiotherapy plan without creating a hotspot. The aim of this study was to investigate the dosimetric properties of physical wedges filters such as off-axis photon fluence, photon spectrum, output factor and half value layer. The photon beam quality of a 6 MV Primus Siemens modified by 150 and 450 physical wedges was studied with BEAMnrc Monte Carlo (MC) code. The calculated present depth dose and dose profile curves for open and wedged photon beam were in good agreement with the measurements. Increase of wedge angle increased the beam hardening and this effect was more pronounced at the heal region. Using such an accurate MC model to determine of wedge factors and implementation of it as a calculation algorithm in the future treatment planning systems is recommended.

Ecological and Biogeochemical Response of Antarctic Ecosystems to Iron Fertilization and Implications on Global Carbon Cycle

  • Bathmann, Ulrich
    • Ocean and Polar Research
    • /
    • v.27 no.2
    • /
    • pp.231-235
    • /
    • 2005
  • The European Iron Fertilization Experiment EIFEX studied the growth and decline of a phytoplankton bloom stimulated by fertilising $10km^2$ in the core of a mesoscale $(80{\times}120km)$ cyclonic eddy south of the Antarctic Polar Front with about 2 times 7 tonnes of iron sulphate. The phytoplankton accumulation induced by iron fertilization did not exceed $3{\mu}g\;chl\;a\;l^{-1}$ despite a draw down of $5{\mu}M$ of nitrate that should have resulted in at least double to triple the amount of phytoplankton biomass assuming regular Redfield-ratios for draw down after phytoplankton growth in the Southern Ocean. During EIFEX the fertilized core of the mesoscale eddy evolved to a hotspot for a variety of small and medium sized mesozooplankton copepods. In contrast to copepods, the biomass of salps (Salpa thompson)) that dominated zooplankton biomass before the onset of our experiment decreased to nearly extinction. Most of the species of the rnosozooplankton community showed extremely hiか feeding rates compared to literature values from Southern Ocean summer communities. At the end of the experiment, massive phytoplankton sedimentation reached the sea floor at about 3800m water depth.

A Novel Method for Virtual Machine Placement Based on Euclidean Distance

  • Liu, Shukun;Jia, Weijia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2914-2935
    • /
    • 2016
  • With the increasing popularization of cloud computing, how to reduce physical energy consumption and increase resource utilization while maintaining system performance has become a research hotspot of virtual machine deployment in cloud platform. Although some related researches have been reported to solve this problem, most of them used the traditional heuristic algorithm based on greedy algorithm and only considered effect of single-dimensional resource (CPU or Memory) on energy consumption. With considerations to multi-dimensional resource utilization, this paper analyzed impact of multi-dimensional resources on energy consumption of cloud computation. A multi-dimensional resource constraint that could maintain normal system operation was proposed. Later, a novel virtual machine deployment method (NVMDM) based on improved particle swarm optimization (IPSO) and Euclidean distance was put forward. It deals with problems like how to generate the initial particle swarm through the improved first-fit algorithm based on resource constraint (IFFABRC), how to define measure standard of credibility of individual and global optimal solutions of particles by combining with Bayesian transform, and how to define fitness function of particle swarm according to the multi-dimensional resource constraint relationship. The proposed NVMDM was proved superior to existing heuristic algorithm in developing performances of physical machines. It could improve utilization of CPU, memory, disk and bandwidth effectively and control task execution time of users within the range of resource constraint.

Analysis of Certificateless Signcryption Schemes and Construction of a Secure and Efficient Pairing-free one based on ECC

  • Cao, Liling;Ge, Wancheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4527-4547
    • /
    • 2018
  • Signcryption is a cryptographic primitive that provides authentication (signing) and confidentiality (encrypting) simultaneously at a lower computational cost and communication overhead. With the proposition of certificateless public key cryptography (CLPKC), certificateless signcryption (CLSC) scheme has gradually become a research hotspot and attracted extensive attentions. However, many of previous CLSC schemes are constructed based on time-consuming pairing operation, which is impractical for mobile devices with limited computation ability and battery capacity. Although researchers have proposed pairing-free CLSC schemes to solve the issue of efficiency, many of them are in fact still insecure. Therefore, the challenging problem is to keep the balance between efficiency and security in CLSC schemes. In this paper, several existing CLSC schemes are cryptanalyzed and a new CLSC scheme without pairing based on elliptic curve cryptosystem (ECC) is presented. The proposed CLSC scheme is provably secure against indistinguishability under adaptive chosen-ciphertext attack (IND-CCA2) and existential unforgeability under adaptive chosen-message attack (EUF-CMA) resting on Gap Diffie-Hellman (GDH) assumption and discrete logarithm problem in the random oracle model. Furthermore, the proposed scheme resists the ephemeral secret leakage (ESL) attack, public key replacement (PKR) attack, malicious but passive KGC (MPK) attack, and presents efficient computational overhead compared with the existing related CLSC schemes.

Efficient Distributed Processing Scheme for Load Balancing of MMORPG Servers (MMORPG 서버의 부하균등화를 위한 효율적인 분산처리 기법)

  • Jang, Su-Min;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.11
    • /
    • pp.69-75
    • /
    • 2007
  • In this paper, we propose a new distributed processing scheme to support MMORPG (Massively Multiplayer Online Role-Playing Games). But existing distributed game servers have some problems such as hotspot, congestion, server failure problems, and so on. To solve such problems, our proposed scheme begins by splitting the large virtual world into smaller regions, each region handled by a different server. We present a scheme that reduces the bandwidth requirements for both game servers and clients. Also our scheme allows seamless interaction among players residing on areas handled by different servers. We show an excellence of the proposed solution through various experiments.

Trends in Dynamic Crime Prediction Technologies based on Intelligent CCTV (지능형 CCTV 기반 동적 범죄예측 기술 동향)

  • Park, Sangwook;Oh, Seon Ho;Park, Su Wan;Lim, Kyung Soo;Choi, Bum Suk;Park, So Hee;Ghyme, Sang Won;Han, Seung Wan;Han, Jong-Wook;Kim, Geonwoo
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.2
    • /
    • pp.17-27
    • /
    • 2020
  • Predicting where and when a crime may occur in an area of interest is one of many strategies of predictive policing. Multidimensional analysis, including CCTV, can overcome the limitations of hotspot prediction, especially of violent crimes. In order to identify the precursors of a crime, it is necessary to analyze dynamic data such as attributes and activities of people, social information, environmental information, traffic flows, and weather. These parameters can be recognized by CCTV. In addition, it provides accurate analysis of the circumstances of a crime in a dynamic situation, calculates the risk, and predicts the probability of a crime occurring in the near future. Additionally, it provides ways to gather historical criminal datasets, including sensitive personal information.

Recent R&D Trends in Wireless Network Technology based on UAV-assisted FSO Technique (UAV 기반 FSO 무선통신 네트워크 기술 동향)

  • Yeo, C.I.;Heo, Y.S.;Ryu, J.H.;Park, S.W.;Kim, S.C.;Kang, H.S.;Lee, G.H.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.2
    • /
    • pp.38-49
    • /
    • 2020
  • In recent years, the unmanned aerial vehicle (UAV) assisted mobile free space optical (FSO) communication technique has attracted considerable attention regarding its aims to provide improved communication conditions for fixed-to-fixed FSO network and promising fronthaul and backhaul solutions for 5G+ wireless networks. This can be attributed to its outstanding advantages such as fast deployment and flexible network configuration. The UAV-assisted mobile FSO system can be used to provide cost-effective internet services in rural and remote areas and in hotspot areas that are characterized by increased data traffic. Additionally, it can be used to provide secure communication services under emergency circumstances. In this report, we review recent R&D trends in wireless network technology employing the UAV-assisted mobile FSO technique and key technologies for mobile FSO wireless networks. Furthermore, we introduce drone-based mobile FSO terminals and control systems that we have developed.