• Title/Summary/Keyword: internet based control

Search Result 2,060, Processing Time 0.03 seconds

Altered Functional Disconnectivity in Internet Addicts with Resting-State Functional Magnetic Resonance Imaging

  • Seok, Ji-Woo;Sohn, Jin-Hun
    • Journal of the Ergonomics Society of Korea
    • /
    • v.33 no.5
    • /
    • pp.377-386
    • /
    • 2014
  • Objective: In this study, we used resting-state fMRI data to map differences in functional connectivity between a comprehensive set of 8 distinct cortical and subcortical brain regions in healthy controls and Internet addicts. We also investigated the relationship between resting state connectivity strength and the level of psychopathology (ex. score of internet addiction scale and score of Barratt impulsiveness scale). Background: There is a lot of evidence of relationship between Internet addiction and impaired inhibitory control. Clinical evidence suggests that Internet addicts have a high level of impulsivity as measured by behavioral task of response inhibition and a self report questionnaire. Method: 15 Internet addicts and 15 demographically similar non-addicts participated in the current resting-state fMRI experiment. For the connectivity analysis, regions of interests (ROIs) were defined based on the previous studies of addictions. Functional connectivity assessment for each subject was obtained by correlating time-series across the ROIs, resulting in $8{\times}8$ matrixs for each subject. Within-group, functional connectivity patterns were observed by entering the z maps of the ROIs of each subject into second-level one sample t test. Two sample t test was also performed to examine between group differences. Results: Between group, the analysis revealed that the connectivity in between the orbito frontal cortex and inferior parietal cortex, between orbito frontal cortex and putamen, between the orbito frontal cortex and anterior cingulate cortex, between the insula and anterior cingulate cortex, and between amydgala and insula was significantly stronger in control group than in the Internet addicts, while the connectivity in between the orbito frontal cortex and insula showed stronger negative correlation in the Internet addicts relative to control group (p < 0.001, uncorrected). No significant relationship between functional connectivity strength and current degree of Internet addiction and degree of impulsitivy was seen. Conclusion: This study found that Internet addicts had declined connectivity strength in the orbitofrontal cortex (OFC) and other regions (e.g., ACC, IPC, and insula) during resting-state. It may reflect deficits in the OFC function to process information from different area in the corticostriatal reward network. Application: The results might help to develop theoretical modeling of Internet addiction for Internet addiction discrimination.

Remote Control of Autonomous Robots via Internet

  • Sugisaka, Masanori;Johari, Mohd Rizon M
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.24-27
    • /
    • 2004
  • This paper describes the method how to control an autonomous robot remotely using Internet. The autonomous robot that has an artificial brain is called "Tarou". (1) It is able to move along the line on the floor based on processing the image data obtained from two CCD cameras. (2) It is able to understand dialogs between human being and it and is able to take actions such as turn right and lefts, go forward 1m and go backward 0.5m, etc. (3) It is able to recognize patterns of objects. (4) It is able to recognize human faces. (5) It is able to communicate human being and to speak according to contents written in the program. We show the techniques to control the autonomous robot "Tarou" remotely by personal computer and/or portable Phone via Internet. The techniques developed in our research could dramatically increase their performance for..the need of artificial life robot as the next generation robot and national homeland security needs.

  • PDF

An Efficient Service Function Chains Orchestration Algorithm for Mobile Edge Computing

  • Wang, Xiulei;Xu, Bo;Jin, Fenglin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4364-4384
    • /
    • 2021
  • The dynamic network state and the mobility of the terminals make the service function chain (SFC) orchestration mechanisms based on static and deterministic assumptions hard to be applied in SDN/NFV mobile edge computing networks. Designing dynamic and online SFC orchestration mechanism can greatly improve the execution efficiency of compute-intensive and resource-hungry applications in mobile edge computing networks. In order to increase the overall profit of service provider and reduce the resource cost, the system running time is divided into a sequence of time slots and a dynamic orchestration scheme based on an improved column generation algorithm is proposed in each slot. Firstly, the SFC dynamic orchestration problem is formulated as an integer linear programming (ILP) model based on layered graph. Then, in order to reduce the computation costs, a column generation model is used to simplify the ILP model. Finally, a two-stage heuristic algorithm based on greedy strategy is proposed. Four metrics are defined and the performance of the proposed algorithm is evaluated based on simulation. The results show that our proposal significantly provides more than 30% reduction of run time and about 12% improvement in service deployment success ratio compared to the Viterbi algorithm based mechanism.

Design and Implementation of LonWorks/IP Router for Network-based Control (네트워크 기반 제어를 위한 Lonworks/IP 라우터의 설계 및 구현)

  • Hyun, Jin-Waok;Choi, Gi-Sang;Choi, Gi-Heung
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.409-412
    • /
    • 2007
  • Demand for the technology for access to device control network in industry and for access to building automation system via internet is on the increase. In such technology integration of a device control network with a data network such as internet and organizing wide-ranging DCS(distributed control system) is needed, and it can be realized in the framework of VDN(virtual device network). Specifications for device control network and data network are quite different because of the differences in application. So a router that translates the communication protocol between device control network and data network, and efficiently transmits information to destination is needed for implementation of the VDN(virtual device network). This paper proposes the concept of NCS(networked control system) based on VDN(virtual device network) and suggests the routing algorithm that uses embedded system.

  • PDF

Implementation of Tone Control Module in Anchor System for Improved Audio Quality

  • Seungwon Lee;Soonchul Kwon;Seunghyun Lee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.10-21
    • /
    • 2024
  • Recently, audio systems are changing the configuration of conventional sound reinforcement (SR) systems and public address (PA) systems by using audio over IP (AoIP), a technology that can transmit and receive audio signals based on internet protocol (IP). With the advancement of IP technology, AoIP technologies are leading the audio market and various technologies are being released. In particular, audio networks and control hierarchy over peer-to-peer (Anchor) technology based on AoIP is a system that transmits and receives audio signals over a wide bandwidth without an audio mixer, creating a novel paradigm for existing audio system configurations. Anchor technology forms an audio system by connecting audio sources and output equipment with On-site audio center (OAC), a device that can transmit and receive IP. Anchor's receiving OAC is capable of receiving and mixing audio signals transmitted from different IPs, making it possible to configure a novel audio system by replacing the conventional audio mixer. However, Anchor technology does not have the ability to provide audio effects to input devices such as microphones and instruments in the audio system configuration. Due to this, when individual control of each audio source is required, there is a problem of not being able to control the input signal, and it is impossible to individually affect a specific input signal. In this paper, we implemented a tone control module that can individually control the tone of the audio source of the input device using the audio processor core in the audio system based on Anchor technology, tone control for audio sources is possible through a tone control module connected to the transmitting OAC. As a result of the study, we confirmed that OAC receives the signal from the audio source, adjusts the tone and outputs it on the tone control module. Based on this, it was possible to solve problems that occurred in Anchor technology through transmitting OAC and tone control modules. In the future, we hope that the audio system configuration using Anchor technology will become established as the standard for audio equipment.

Adaptive Rate Control Scheme for Streaming-based Content Sharing Service

  • Lee, Sunghee;Chung, Kwangsue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.784-799
    • /
    • 2013
  • This paper presents an adaptive rate control scheme for streaming-based content sharing service. This scheme delivers multimedia contents from a user device to another device or seamlessly redirects streaming service across heterogeneous user devices. In the proposed scheme, a streaming server adjusts video quality level according to the network and client status. Our scheme is different from other rate control schemes, because the video quality at the server is decided not only based on the available bandwidth, but also based on the device characteristics and bandwidth requirement at the access network. We also propose a bandwidth estimation method to achieve more equitable bandwidth allocations among streaming flows competing for the same narrow link with different Round Trip Times (RTTs). Through the simulation, we prove that our scheme improves the network stability and the quality of streaming service by appropriately adjusting the quality of the video stream. The simulation results also demonstrate the ability of the proposed scheme in ensuring RTT-fairness while remaining throughput efficient.

Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model

  • Yan, Xiefei;Zou, Yun
    • ETRI Journal
    • /
    • v.30 no.1
    • /
    • pp.81-88
    • /
    • 2008
  • The security threat posed by worms has steadily increased in recent years. This paper discusses the application of the optimal and sub-optimal Internet worm control via Pontryagin's maximum principle. To this end, a control variable representing the optimal treatment strategy for infectious hosts is introduced into the two-factor worm model. The numerical optimal control laws are implemented by the multiple shooting method and the sub-optimal solution is computed using genetic algorithms. Simulation results demonstrate the effectiveness of the proposed optimal and sub-optimal strategies. It also provides a theoretical interpretation of the practical experience that the maximum implementation of treatment in the early stage is critically important in controlling outbreaks of Internet worms. Furthermore, our results show that the proposed sub-optimal control can lead to performance close to the optimal control, but with much simpler strategies for long periods of time in practical use.

  • PDF

Remote Power Control System using the Raspberry Pi

  • Park, Jin-Ho;Yang, Hong-Sik;Lee, Jae-Hyeok;Lee, Hoon-Jae;Kim, Tae-Yong
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.120-123
    • /
    • 2015
  • The use of smart devices worldwide has been increasing day by day and its applications based on IoT have been also extended. But the power control system requires complicated control and processing information from the various sensors in practice. One of the best ways to save the power consumption is to manage electrical equipment individually on the Internet. In this paper, remote power control system for managing the power through the relay switch module via Python server was implemented by using Raspberry Pi. The proposed power control system can be used anywhere over the Internet.

Web-based Distribute Control Networks

  • Kiwon Song;Kim, Jonghwi;Park, Gi-Sang;Park, Gi-Heung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.82.4-82
    • /
    • 2001
  • Requirements for device control networks differ greatly from those of data (business) networks. Consequently, any control network which uses a filedbus protocol is, in general, different from If network protocol TCP/IP. One then needs to integrate both fieldbus protocol and TCP/IP to realize distributed control over IP network or internet. LonWorks technology provides networked intelligent I/O and controllers which make it a powerful, expandable solution. Connecting these remote Lon Works networks to the Internet can provide a powerful, integrated, distributed control system. This paper suggests a basic concept that be applied to distributed control over IP network or internet. Specially, Lonworks technology that used LonTalk protocol is reviewed as device network and ...

  • PDF

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service

  • Chen, Liqing;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1523-1545
    • /
    • 2019
  • Cloud computing is now a widespread and economical option when data owners need to outsource or share their data. Designing secure and efficient data access control mechanism is one of the most challenging issues in cloud storage service. Anonymous broadcast encryption is a promising solution for its advantages in the respects of computation cost and communication overload. We bring forward an efficient anonymous identity-based broadcast encryption construction combined its application to the data access control mechanism in cloud storage service. The lengths for public parameters, user private key and ciphertext in the proposed scheme are all constant. Compared with the existing schemes, in terms of encrypting and decrypting computation cost, the construction of our scheme is more efficient. Furthermore, the proposed scheme is proved to achieve adaptive security against chosen-ciphertext attack adversaries in the standard model. Therefore, the proposed scheme is feasible for the system of data access control in cloud storage service.