• Title/Summary/Keyword: limited service

Search Result 1,998, Processing Time 0.024 seconds

The Adaptive Switching Technology for Multimedia Streaming Service (멀티 미디어 스트리밍 서비스를 위한 적응적 스위칭 기술멀티)

  • Lee, Ho-Chan;Choi, Eun-Seok;Shin, Hye-Min;Kim, Hyoung-Yuk;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2003.11b
    • /
    • pp.155-158
    • /
    • 2003
  • This paper proposes a quality-of-service(QoS)-adaptive proxy-switching scheme for multimedia streaming over the Internet. characteristic of multimedia-object about that effect on weight and transport-time causes Streaming Application is restricted to high-quality-service. But using of Proxy or Cache can reduce restraint of media stream. However previous scheme propose only structure of proxy and skill of streaming-object. It couldn't propose proper scheme about limited cache and proxy error occasion. We propose adaptive-proxy-switching mechanism for solution about some problems that caused by single-proxy and limited cache in case of streaming service.

  • PDF

Radical surgery for stage IV gallbladder cancers: Treatment strategies in patients with limited metastatic burden

  • Shraddha Patkar;Swapnil Patel;Mufaddal Kazi;Mahesh Goel
    • Annals of Hepato-Biliary-Pancreatic Surgery
    • /
    • v.27 no.2
    • /
    • pp.180-188
    • /
    • 2023
  • Backgrounds/Aims: The present study looked at the role of radical surgery in gallbladder cancers (GBC) with limited metastatic disease. Methods: The retrospective observational study was conducted to screen the database from 1st January 2010 to 31st December 2019. Patients of GBC found to have low-volume metastatic disease upon surgical exploration were included. Results: Of the 1,040 patients operated for GBC, 234 patients had low-volume metastatic disease (microscopic disease in station 16b1 node or N2 disease isolated port-site metastases, or low burden peritoneal disease with deposits less than 1 cm, in adjacent omentum or adjacent diaphragm or Morrison's pouch or a solitary discontinuous liver metastasis in adjacent liver parenchyma) detected intraoperative. Of these, 62 patients underwent radical surgery for R-0 metastatic disease followed by systemic therapy, while the remaining 172 patients did not undergo radical surgery and were given palliative systemic chemotherapy. Patients who underwent radical surgery had significantly superior overall survival (19 months versus 12 months, p < 0.01) and superior progression-free survival (10 months versus 5 months, p < 0.01) when compared to the rest. This difference in survival was more significant amongst patients when operated on after neoadjuvant chemotherapy. Regression analysis showed that a sub-group of patients with incidental GBC with limited metastases showed more favorable outcomes with radical surgery. Conclusions: Authors suggest a possible role for radical treatment of advanced GBC with a limited metastatic burden. Neoadjuvant chemotherapy can be used for preferentially selecting patients of favorable disease biology for curative treatment.

Service Agent System for Mobile Devices (이동 환경을 위한 서비스 에이전트 시스템)

  • Yoon Jeong-seob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.55-59
    • /
    • 2004
  • Recently the wireless-internet has been spreading extensively. People are spending a large part of their time gaining access to information using a mobile device. However. limited process speed. low bandwidth, the low battery capacity of mobile devices and a high rate of wireless network errors brings out many overheads during service time with server for service. In this paper, we suggest an autonomous service delivery system. which provides mobile agent capability to users that can not maintain a connection. We have developed the system based on java mobile agent technology. Using this system, we can provide more effective services to users when the user is sending requirements of service through a mobile device that has limited resources and can manage the contact server dynamically when new services are added.

  • PDF

Study on Inheritance and Transgressions at Cocoon and Shell Weight Characters between Genetically Sex-limited Silkworm Bombyx mori L. Lines

  • Petkov N.;Petkov Z.;Grekov D.;Arnaudova K.
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.11 no.1
    • /
    • pp.75-78
    • /
    • 2005
  • Inheritance of cocoon and shell weight characters in silkworm crosses between sex-limited at larva stage lines, including three (NIG$_{1}$ $\times$ TV$_{3/2}$ ,NIG$_{1}$ $\times$ TBV$_{2/24}$ and NIG$_{1}$ $\times$ B$_{2/6}$ ) from Japanese type and three (NIG$_{2}$ $\times$ B$_{2/6}$ ,TV$_{3/2}$ $\times$ NIG$_{1}$ and NIG$_{2}$ $\times$ TBV$_{2/24}$ ) from Chinese type was studied at Regional Centre for Scientific­Applied Service - Vratza during the period of 2000 ­2002. Inheritance of tested characters in F I was deter­mined through genetic parameters, additiveness (a), dominance (d) and their ratio (d/a). Degree and frequency of transgressions in F$_{2}$ were calculated also. Over dominance (d/a(>) 1) with bigger contribution of the parent with higher value was determined at inheritance tested characters. Transgressions obtained at cocoon and shell weight characters were positive and varied in wide limits. The productivity of parent's lines had defined the variability of genetic parameters for degree and frequency of transgressions. Combination of positive transgressions at cocoon and shell weight characters in F2 hybrid populations from sex-limited at larva stage allow us to select individuals with high productive potential for further use in selection programs.

Space-based Ocean Surveillance and Support Capability: with a Focus on Marine Safety and Security (인공위성 원격탐사의 활용: 선박 감시 기법)

  • Yang, Chan-Su
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2006.05a
    • /
    • pp.41-45
    • /
    • 2006
  • From the 1978 Seasat synthetic aperture radar(SAR) to present systems, spaceborne SAR has demonstrated the capability to image the Earth's ocean and land features over broad areas, day and night, and under most weather conditions. The application of SAR for surveillance of commercial fishing grounds can did in the detection of illegal fishing activities and provides more efficient use cf limited aircraft or patron craft resources. In the area of vessel traffic monitoring for commercial vessels, Vessel Traffic Service (VTS) which uses the ground-based radar system has some difficulties in detecting moving ships due to the limited detection range cf about 10 miles. This paper introduces the field testing results of ship detection by RADARSAT SAR imagery, and proposes a new approach for a Vessel Monitoring System(VMS), including VTS, and SAR combination service.

  • PDF

MBTI-based Recommendation for Resource Collaboration System in IoT Environment

  • Park, Jong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.35-43
    • /
    • 2017
  • In IoT(Internet of Things) environment, users want to receive customized service by users' personal device such as smart watch and pendant. To fulfill this requirement, the mobile device should support a lot of functions. However, the miniaturization of mobile devices is another requirement and has limitation such as tiny display. limited I/O, and less powerful processors. To solve this limitation problem and provide customized service to users, this paper proposes a collaboration system for sharing various computing resources. The paper also proposes the method for reasoning and recommending suitable resources to compose the user-requested service in small device with limited power on expected time. For this goal, our system adopts MBTI(Myers-Briggs Type Indicator) to analyzes user's behavior pattern and recommends personalized resources based on the result of the analyzation. The evaluation in this paper shows that our approach not only reduces recommendation time but also increases user satisfaction with the result of recommendation.

Study on optimum service model of passenger car monitoring system at limited wireless bandwidth (열차객실감시시스템의 제한된 무선 대역폭에서의 최적의 서비스모델에 대한 연구)

  • Jeong, Sang-Guk;Choi, Gab-Bong;An, Tae-Ki;Kim, Back-Hyun;Yong, Dong-Seok
    • Proceedings of the KIEE Conference
    • /
    • 2008.10c
    • /
    • pp.199-201
    • /
    • 2008
  • In this paper, We studied optimum service model of passenger car monitoring system at limited wireless bandwidth subway and railway. High bandwidth is better if we need more services. But, high bandwidth requires more cost at tunnel of subway. More bandwidth make receive sensitivity to bad. We deduced best bandwidth of subway wireless transmission system reflecting the cost of installation and efficiency of system. Consequently, we decide efficient service model of passenger car monitoring system.

  • PDF

Space-based Ocean Surveillance and Support Capability: with a Focus on Marine Safety and Security (영해관리를 위한 인공위성 원격탐사기술)

  • Yang, Chan-Su
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2007.05a
    • /
    • pp.127-132
    • /
    • 2007
  • From the 1978 Seasat synthetic aperture radar(SAR) to present systems, spaceborne SAR has demonstrated the capability to image the Earth's ocean and land features over broad areas, day and night, and under most weather conditions. The application of SAR for surveillance of commercial fishing grounds can aid in the detection of illegal fishing activities and provides more efficient use of limited aircraft or patrol craft resources. In the area of vessel traffic monitoring for commercial vessels, Vessel Traffic Service (VTS) which uses the ground-based radar system has some difficulties in detecting moving ships due to the limited detection range of about 10 miles. This paper introduces the field testing results of ship detection by RADARSAT SAR imagery, and proposes a new approach for a Vessel Monitoring System(VMS), including VTS, and SAR combination service.

  • PDF

Trust Evaluation Metrics for Selecting the Optimal Service on SOA-based Internet of Things

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.129-140
    • /
    • 2019
  • In the IoT environment, there is a huge amount of heterogeneous devices with limited capacity. Existing trust evaluation methods are not adequate to accommodate this requirement due to the limited storage space and computational resources. In addition, since IoT devices are mainly human operated devices, the trust evaluation should reflect the social relations among device owners. There is also a need for a mechanism that reflects the tendency of the trustor and environmental factors. In this paper, we propose an adaptable trust evaluation method for SOA-based IoT system to deal with these issues. The proposed model is designed to minimize the confidence bias and to dynamically respond to environmental changes by combining direct evaluation and indirect evaluation. It is expected that it will be possible to secure trust through quantitative evaluation by providing feedback based on social relationships.

Reliable Distributed Lookup Service Scheme for Mobile Ad-hoc Networks

  • Malik Muhammad Ali;Kim Jai-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.124-126
    • /
    • 2006
  • Mobile Ad hoc networking is an emerging technology and in these days many applications are being developed to run on these networks. In these networks lookup services are very important because all nodes do not have same resources in term of memory and computing power. Nodes need to use different services offered by different servers. Reliable and efficient scheme should be available for lookup services due to limited bandwidth and low computing power of devices in mobile ad hoc networks. Due to mobility and rapid change in network topology, lookup mechanism used in wired network is not appropriate. Service discovery mechanism can be divided into two main categories Centralized and Distributed. Centralized mechanism is not reliable as there is no central node in these networks. Secondly centralized mechanism leads toward single point failure. We can handle the service discovery mechanism by distributing server's information to each node. But this approach is also not appropriate due to limited bandwidth and rapid change in network. In this paper, we present reliable lookup service scheme which is based on distributed mechanism. We are not using replication approach as well due to low bandwidth of wireless networks. In this scheme service discovery mechanism will be handled through different lookup servers. Reliability is the key feature of our proposed scheme.

  • PDF