• Title/Summary/Keyword: Active Management

Search Result 2,974, Processing Time 0.037 seconds

An Efficient Network Management System using The Smart Router (스마트 라우터를 사용한 효율적인 네트워크 관리 시스템)

  • Park Moon-Hwa
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.253-260
    • /
    • 2005
  • Active networks not only allows the network nodes, switches or routers. to perform routing and forwarding but so allows their users inject customized programs into the nodes of the network or the packets. that may modify, store or redirect the user data flowing through the network. In this paper, we proposed a new network management system built using active network technology, that can solve problems inherent in most of existing legacy centralized network management systems. The main contribution is to present the Smart Router model that can reduce traffics due to managing networks by way of making control packets into simplified patterns. The disadvantages of the centralized network management are presented and the current solution for distributed network management are discussed. The performance improvements that our architecture offers are showed through a service example experiment.

  • PDF

Differences of Appearance Management Behaviors and Life Satisfaction among Lifestyle Groups (라이프스타일 집단별 외모관리행동과 삶의 만족도의 차이분석)

  • Park, Kwang Hee;Kim, In Sook
    • Fashion & Textile Research Journal
    • /
    • v.15 no.4
    • /
    • pp.554-564
    • /
    • 2013
  • We provide an empirical assessment that examines the differences in appearance management behavior, life satisfaction and demographic variables between groups classified by individual lifestyle. Questionnaires were administered to 513 female and male adults over 17 years of age in the Daegu and Kyungbok metropolitan regions. Descriptive statistics, cluster analysis, Cronbach's ${\alpha}$, ANOVA, Duncan test and ${\chi}^2$ test were applied to analyze data from 513 respondents. The results are as follows. First, we did a cluster analysis on the appearance management behavior of weight training, skin care, hair care, make-up and clothing selection. Four groups (passive, rational, fashion oriented, and active typed) where classified according to individual lifestyle. Second, the rational and active groups were more interested in the social life, environmental stability, health, fashion and economic seeking life. They were also more involved in appearance management behavior and in a higher level of life satisfaction. However, the differences of life satisfaction among the lifestyle group (male) were not statistically significant. Third, females with higher level of income and education (among the demographic variables) belonged to the active group. We found significant differences in appearance management behavior, life satisfaction and demographic variables among male and female groups classified by lifestyle.

An Implementation of Management Function based on RM for Smart Active RFID Reader (스마트 능동형 RFID 리더를 위한 RM 기반 관리 기능 구현)

  • Kwon, Yoon-Geun;Chung, Sang-Hwa;Lee, Yun-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10B
    • /
    • pp.1159-1167
    • /
    • 2011
  • In this paper, we proposed and implemented an EPCglobal Reader Manegement (RM) based management protocol. Using RFID Reader's management function, we could diagnose an active RFID Reader concretely which was impossible with only using Reader protocols and check the problem quickly when the RFID Reader is in failure. When diagnosing RFID Readers using the proposed RM based management protocol, we can check on their failure in stages and specifically, and can estimate range of failure. This helps RFID Reader's fast recovery, reduce loss of failure and improve QoS. We could get reader information with almost same overhead compared with the management message in LLRP. And we could get more information about RFID Reader's operation status.

Effects of female college students' self-image and media involvement on appearance management behavior (여대생의 자기이미지와 미디어관여가 외모관리행동에 미치는 영향)

  • Kim, Jiyang;Yim, Eunhyuk;Chun, Hokyung
    • Journal of Fashion Business
    • /
    • v.17 no.2
    • /
    • pp.164-178
    • /
    • 2013
  • The purpose of this study is to verify effects of female college students' self-image on appearance management behavior and investigate the differences caused by TV involvement and entertainer imitation on the appearance managing behavior. Respondents of the survey were 424 college females living in Seoul and Gyeonggi province. For statistical analysis, factor analysis and multiple regression were conducted using SPSS 18.0 program. The results of this study are as follows: First, self-image among college females were composed of 5 factors, which were active image, feminine image, intelligent image, gentle image and modern image. Second, college females' self-image influenced on skin management behavior, hair management behavior, make-up behavior, clothing behavior and weight management behavior significantly. Specifically, as respondents' active image and modern image are getting higher, they tend to perform skin management behavior, hair management behavior and clothing behavior. As female students' intellectual image and modern image were getting higher, more positive effects were found on make-up behavior. As female students' gentle image and active image were getting higher, there was more positive effects on weight management behavior. But, female students' self-image didn't show significant effects on cosmetic surgery behavior. Third, when subjects' TV involvement was high, self-image made greater effect on skin management behavior and cosmetic surgery behavior than those with low TV involvement. Forth, when entertainer imitation was high, self-image made greater effects on skin management behavior, hair management behavior, clothing behavior, make-up behavior, weight management behavior, cosmetic surgery behavior than those with low entertainer management.

Fuzzy PSO Congestion Management using Sensitivity-Based Optimal Active Power Rescheduling of Generators

  • Venkaiah, Ch;Vinod Kumar, D M
    • Journal of Electrical Engineering and Technology
    • /
    • v.6 no.1
    • /
    • pp.32-41
    • /
    • 2011
  • This paper presents a new method of Fuzzy Particle Swarm Optimization (FPSO)-based Congestion Management (CM) by optimal rescheduling of active powers of generators. In the proposed method, generators are selected based on their sensitivity to the congested line for efficient utilization. The task of optimally rescheduling the active powers of the participating generators to reduce congestion in the transmission line is attempted by FPSO, Fitness Distance Ratio PSO (FDR-PSO), and conventional PSO. The FPSO and FDR-PSO algorithms are tested on the IEEE 30-bus and Practical Indian 75-bus systems, after which the results are compared with conventional PSO to determine the effectiveness of CM. Compared with FDR-PSO and PSO, FPSO can better perform the optimal rescheduling of generators to relieve congestion in the transmission line.

An Adaptive Proportional Integral Active Queue Management Algorithm based on Self-Similar Traffic Rate Estimation in WSN

  • Liu, Heng;Wang, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1946-1958
    • /
    • 2011
  • Wireless Sensor Network (WSN) is made up of a number of sensor nodes and base stations. Traffic flow in WSN appears self-similar due to its data delivery process, and this impacts queue length greatly and makes queuing delay worse. Active queue management can be designed to improve QoS performance for WSN. In this paper, we propose self-similar traffic rate estimating algorithm named Power-Law Moving Averaging (PLMA) to regulate packet marking probability. This algorithm improves the availability of the rate estimation algorithm under the self-similar traffic condition. Then, we propose an adaptive Proportional Integral algorithm (SSPI) based on the estimation of the Self-Similar traffic rate by PLMA. Simulation results show that SSPI can achieve lower queue length jitter and smaller setting time than PI.

A Representation of Engineering Change Objects and Their Integrity Constraints Using an Active Object-Oriented Database Model (능동형 객체지향적 데이터베이스 모텔을 이용한 설계변경 개체 및 제약조건의 표현)

  • 도남철
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.1
    • /
    • pp.111-125
    • /
    • 2003
  • This paper proposes a product data model that can express and enforce integrity constraints on product structure during engineering changes (ECs). The model adopts and extends an active object-oriented database model in order to Integrate IC data and their integrity constraints. Tightly integrated with product structure, It will enable designers to maintain and exchange consistent EC data throughout the product life cycle. In order to properly support operations for ECs, the model provides the data, operations, and Event-Condition-Action rules for nested ECs and simultaneous EC applications to multiple options. in addition, the EC objects proposed In the model integrate the data and Integrity constraints into a unified repository. This repository enables designers to access all EC data and integrity constraints through the product structure and relationships between EC objects. This paper also describes a prototype product data management system based on the proposed model In order to demonstrate its effectiveness.

  • PDF

Development of the Active RFID based Smart Occupancy Detection System (능동형 RFID 기반 지능형 재실감지시스템의 개발)

  • Choi, Yeon-Suk;Park, Byoung-Tae
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.4
    • /
    • pp.117-123
    • /
    • 2012
  • For an effective energy management in intelligent buildings it is necessary to gather information about position/absence of people and the level of population. In this paper the smart occupancy detection system using the active RFID is developed to satisfy such a demand based on the results of previous research. First of all the design considerations and functions of the system are introduced. In sequence the functions of the system is presented, and then the performance of the developed system is tested and verified through various field tests. The developed core technology can be also applied to other fields such as security, healthcare, smart home, etc.

Effects of Transformational and Transactional Leadership on Followers' Empowerment and Creativity (변혁적 리더십이 구성원의 임파워먼트와 창의성에 미치는 영향 관계 - 창의적 품질을 위한제품/서비스 조직의 새로운 리더십 패러다임 탐색 -)

  • Yoo, Seung-Dong
    • Journal of Korean Society for Quality Management
    • /
    • v.27 no.2
    • /
    • pp.57-80
    • /
    • 1999
  • This research uses measures of transformational and transactional leadership to examine its impact on subordinate psychological empowerment and on his/her creativity in 3 resort complexes. For a total of 462 respondents, followers' sense of increased empowerment and creativity are significantly and positively related to the transformational leadership behaviors of their immediate superior, including charismatic attributes and behaviors, individual consideration, and intellectual stimulation. Two of the three transactional leadership measures, including contingent reward and management-by-exception(active), correlate positively with the followers' perceived empowerment and creativity, but the rest one, management-by-exception(passive), negatively with them. The impact of all of the three measures of transformational leadership and the two of transactional leadership(i.e., contingent reward and active management-by-exception) on subordinate creativity is partially mediated by the subordinate empowerment.

  • PDF

Study on a Secure Active network Architecture (안전한 액티브 네트워크 구조에 관한 연구)

  • Hong, Sung-Sik;Han, In-Sung;Ryou, Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.4 s.304
    • /
    • pp.17-24
    • /
    • 2005
  • The existing passive networks have the only data-storing and transmission functions. On the other hand, the active network which can do operation jobs on the transmitting packets was introduced at 1990's. However, the advantages of activating processing are obviously more complex than traditional networks and raise considerable security issues. In this paper, we propose the safer structure in Active Networks that is based on the discrete approach which resolves the weak point of the Active Network. The proposed system provides the node management and user management in the Active Networks, and improves the security of Packet transmission with packet cryptography and the session.