• Title/Summary/Keyword: success/failure scheme

Search Result 13, Processing Time 0.019 seconds

A Study of College students' implicit representations of 'success/failure' by dual-priming task (이중점화기법을 통해 본 남녀 대학생의 '성공/실패'에 대한 암묵적 표상)

  • Hyeja Cho ;Hee Jeong Bang ;Sook Ja Cho ;Hyun Jeong Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.14 no.1
    • /
    • pp.101-123
    • /
    • 2008
  • We investigated the implicit representations of success/failure associated with mother in male and female college students. In study 1, participants were presented 'mother' or 'basket' as a context prime and 'success' or 'failure' related words as second primes for 100ms, and were asked to make lexical decisions about 'accept' or 'reject' related words and non-words after 150 ms (SOA 250ms). Results revealed that lexical decision times on the mother condition were more rapid than the ones on the basket condition, and lexical decision times on the acceptance condition were more rapid than the ones on the rejection condition, and female participants showed shorter times than male students did. In study 2, we divided participants into four groups by gender and attachment style, Results showed that the interaction between success/failure and acceptance/rejection was statistically significant, that is, quickest lexical decision times on the success-acceptance condition, and slowed times on failure-acceptance, failure-rejection, and success-rejection condition in order. On the other hand, no significant differences between high and low attachment group were found in males, but significant three-way interactions were found in females. In highly attached females, lexical decision times in success-acceptance condition were not differed from ones in success-rejection condition, and slowed times in failure-rejection condition. Low attached females showed very rapid times in success-acceptance condition, but very slow times in success-rejection condition. The results were discussed in terms of self-positivity and success/failure scheme depending on gender and attachment styles.

  • PDF

Evaluation of Damage from Reclosing Scheme for Power Transfromer (재폐로방식이 전력용 변압기에 미치는 영향 평가)

  • O, Jeong-Hwan;Yun, Sang-Yun;Im, Seong-Jeong;Kim, Jae-Cheol
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.3
    • /
    • pp.177-183
    • /
    • 1999
  • This paper presents how to evaluate the transformer damage caused by reclosing scheme at the distribution substation. We describe a quantitative relationship between the reclosing scheme and the number of fault current flowing through transformer wsing the probability of a reclosing success/failure. The transformer damage from reclosing scheme is presented using a weight function and a damage function. A weight function is associated with the number of reclosing attempts and the reclosing deadtime to consider cumulative stress caused by reclosing scheme. A damage function is associated with a transformer impact ratio and a transformer functional life. In the case study, the transformer damage is simulated for the probability of a reclosing success. And the evaluation of transformer damage using KEPCO's operation data is performed.

  • PDF

Efficient Block ACK Scheme for Reducing the Number of Retransmitted Frames in IEEE 802.11n Wireless LANs (IEEE 802.11n 무선 랜에서 재전송 프레임 수를 줄이기 위한 향상된 Block ACK 방법)

  • Lee, Hyun-Woong;Kim, Sunmyeng
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.4
    • /
    • pp.65-74
    • /
    • 2014
  • IEEE 802.11n standard has introduced the new schemes in MAC and PHY layers to improve network throughput. Frame aggregation and Block ACK are mainly defined to increase the efficiency of the MAC layer. There exists still problem in IEEE 802.11n. When block ACK request and/or response frames are missing or received in error, the sender does not know the status (success/failure) of each frame in the aggregated large frame and retransmits all the frames. This can cause a lower network performance. To solve this problem, we propose a new effective scheme, called reduced retransmission of MPDUs (RRM) scheme. In the proposed scheme, when a sender does not receive a block ACK response frame, it just transmits a next data frame and requests a block ACK. Therefore, it can retransmits the erroneous frames. Performance of the proposed scheme is investigated by simulation. Our results show that the proposed scheme is very effective and improves the performance under a wide range of channel error conditions.

A Robust Energy Saving Data Dissemination Protocol for IoT-WSNs

  • Kim, Moonseong;Park, Sooyeon;Lee, Woochan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5744-5764
    • /
    • 2018
  • In Wireless Sensor Networks (WSNs) for Internet of Things (IoT) environment, fault tolerance is a most fundamental issue due to strict energy constraint of sensor node. In this paper, a robust energy saving data dissemination protocol for IoT-WSNs is proposed. Minimized energy consumption and dissemination delay time based on signal strength play an important role in our scheme. The representative dissemination protocol SPIN (Sensor Protocols for Information via Negotiation) overcomes overlapped data problem of the classical Flooding scheme. However, SPIN never considers distance between nodes, thus the issue of dissemination energy consumption is becoming more important problem. In order to minimize the energy consumption, the shortest path between sensors should be considered to disseminate the data through the entire IoT-WSNs. SPMS (Shortest Path Mined SPIN) scheme creates routing tables using Bellman Ford method and forwards data through a multi-hop manner to optimize power consumption and delay time. Due to these properties, it is very hard to avoid heavy traffic when routing information is updated. Additionally, a node failure of SPMS would be caused by frequently using some sensors on the shortest path, thus network lifetime might be shortened quickly. In contrast, our scheme is resilient to these failures because it employs energy aware concept. The dissemination delay time of the proposed protocol without a routing table is similar to that of shortest path-based SPMS. In addition, our protocol does not require routing table, which needs a lot of control packets, thus it prevents excessive control message generation. Finally, the proposed scheme outperforms previous schemes in terms of data transmission success ratio, therefore our protocol could be appropriate for IoT-WSNs environment.

A Novel Scheme of Providing Mobile IPv6 between the UMTS and Heterogeneous Networks (UMTS와 이기종망 사이의 Mobile IPv6 지원방안)

  • Cha, Seung-Bum;Min, Sang-Won;Kim, Yong-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11A
    • /
    • pp.1012-1020
    • /
    • 2005
  • In this paper, we propose a novel applying method of Mobile IPv6 service into the UMTS to solve the mapping problems in the GGSN TFT packet filter. The mobility management tables or the GGSN should be maintained as the same as the MN and the CN. Our proposed scheme copes with the problem when the RO procedure is not normally performed by using Mobile IPv6 signaling packets in the GGSN and adding a function block in the UMTS. To show the performance of our proposed algorithm, we accomplish the simulations of measuring the delay time in the cases of success and failure of the RO procedure. Also, the amount of transmission is observed when the packet transmission is assured in the case of the successful RO procedure.

A Study on the Economic Feature of Fisheries Resource and Socio-economic Objectives in Fisheries Management (어업자원의 경제적 특성과 그 관리의 사회.경제적 목표에 관한 연구)

  • 유동운
    • The Journal of Fisheries Business Administration
    • /
    • v.12 no.2
    • /
    • pp.73-100
    • /
    • 1981
  • Fisheries resources, due to their intrinsic biological -density dependent, and socio- economic -common property nature, might yield the sustained benefits to the society involved, depending on the degree to which the social management scheme, pursuing the optimum yield from each of them, is framed. And besides, the success or failure of the management on them would, with no doubt, lead parallelly to the direction on scientific study of "Natural Resource Economics." Thus the objectives of the management, to ensue the best use of these society's resource, should underlie the technical, economic, ana social efficiency all together to meet the maximization of society's benefits from yields, taking account of managerial efficiency. And those multiple conflicts need communications between biologists, social scientists, and managers given tile mandate, tobe coordinated to arrive at a unique value weighed, through the well-ordered system approach and resulting timely decision-making which accommodates dynamical fisheries aspects and varying social purposes. purposes.

  • PDF

Efficient Access Management Scheme for Machine Type Communications in LTE-A Networks (LTE-A 네트워크 환경에서 MTC를 위한 효율적인 접근관리 기법)

  • Moon, Jihun;Lim, Yujin
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.1
    • /
    • pp.287-295
    • /
    • 2017
  • Recently, MTC (Machine Type Communication) is known as an important part to support IoT (Internet of Things) applications. MTC provides network connectivities between MTC devices without human intervention. In MTC, a large number of devices try to access over communication resource with a short period of time. Due to the limited communication resource, resource contention becomes severe and it brings about access failures of devices. To solve the problem, it needs to regulate device accesses. In this paper, we present an efficient access management scheme. We measure the number of devices which try to access in a certain time period and predict the change of the number of devices in the next time period. Using the predicted change, we control the number of devices which try to access. To verify our scheme, we conduct experiments in terms of success probability, failure probability, collision probability and access delay.

Grid Structure-Based Mobility Support Scheme for Sink Groups in Wireless Sensor Networks (무선 센서 네트워크에서 격자 구조 기반 이동 싱크 그룹 지원 방안)

  • Yim, Yongbin;Lee, Euisin;Kim, Sang-Ha
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.5
    • /
    • pp.239-246
    • /
    • 2017
  • Communications for mobile sink groups such as rescue teams or platoons bring about a new challenging issue for handling group mobility in wireless sensor networks. Recently, a group region-based approach has been proposed to send data to a mobile sink group. However, it uses excessive flooding for 3 steps (group region discovery, region information notification, and data dissemination) to support mobile sink group. Thus, it causes high energy consumption and data delivery failure. Moreover, its per-sink mobility supporting scheme makes energy consumption and data delivery failure more serious. Thus, this paper proposes an Energy-efficient and Reliable Mobile Group communication protocol (ERMG) to support a mobile sink group, which exploits a virtual grid structure. For the group region discover and notification and the data dissemination, ERMG uses communications with only cell heads of grid cells that manages group sinks. ERMG also uses a per-grid based scheme to support sink mobility. Simulation results show that ERMG has 30% less energy consumption and 6% more desired delivery deadline success ratio than the existing protocols.

Development Strategies of Agri-food Exportation for Agricultural Export Promotion in Korea (우리나라 수출농업 활성화를 위한 농식품 수출 발전방안)

  • Cho, Sung-Je
    • International Commerce and Information Review
    • /
    • v.12 no.1
    • /
    • pp.203-224
    • /
    • 2010
  • With the launching WTO, the world economy has been changing new competitive environment. Agricultural exports should be pursued actively in the market of opening era to develop the foreign agricultural product market and to improve the domestic agribusiness quality and strengthen its competitiveness. The purpose of this is paper is to understand agricultural export status of Korea to detect challenges and matter for improvement, to find new measures of export strategy for the foreign market, recent emerging export promotion with high potential growth, and to increase Korea agricultural export to new world market by using a new method. The profit and loss status is volatile since the agricultural export is in its infancy. However, we have learned lessons from previous success and failure that prior analyzing of agricultural export feasibility, phased-in expansion of agri-food export volume, connection of agri-food export and agri-food market policy. In relation to this, this paper introduces Efficient and Effective Utilization of Communal Facilities in agri-food export. Consequently, First, Export promotion scheme for agri-food is to precise analysis of import countries and to collection agri-food export procedure and agri-food market system. Second, In order to expand export agricultural products to new world market, we need to direct 3rd support program to enhancing competitiveness in expanding export of agricultural export.

  • PDF

Per Packet Authentication Scheme Using One-bit in 802.11 Wireless LAN (802.11 무선랜에서 1 비트를 이용한 패킷 인증 방안)

  • Lee Sungryoul;Kang Jimyung;Moon hogun;Lee myungsoo;Kim Chong-Kwon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.465-472
    • /
    • 2005
  • IEEE 802.11 wireless LAN technology is essential for wireless internet, next generation converged network and home network. But, it is certain that user's privacy must be provided to expand the applicable area in IEEE 802.11 WLAN. Recently, WEP and 802.11i security scheme can be used in MAC Layer. But with VPN technology which is applied to WLAN user, it means that suity mechanism is used redundantly. One bit authentication mechanism was already proposed to solve this redundancy. In this paper, we analyze problems of 1-bit Authentication mechanism which are failure of synchronization and waste of packet. And we propose new algorithm which synchronizes sender with receiver, at once, using duplicated-packet-count information. We show that our algorithm improves success probability of packet authentication up to $98\%$ and efficiency of authentication bit stream up to $97\%$.