• Title/Summary/Keyword: Cluster-based Network

Search Result 855, Processing Time 0.029 seconds

Data Aggregation and Transmission Mechanism for Energy Adaptive Node in Wireless Sensor Networks (무선 센서네트워크 환경에서 에너지를 고려한 노드 적응적 데이터 병합 및 전달 기법)

  • Cho, Young-Bok;You, Mi-Kyung;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11A
    • /
    • pp.903-911
    • /
    • 2011
  • In this paper we proposed an energy adaptive data aggregation and transmission mechanism to solve the problem of energy limitation in wireless sensor networks (WSNs). Hierarchical structure methods are wildly used in WSNs to improve the energy efficiency. LEACH and TEEN protocols are the typical techniques. In these methods, all nodes, including nodes who have sensed data to transmit and nodes who haven't, are set frame timeslots in every round. MNs (member nodes) without sensed data keep active all the time, too. These strategies caused energy waste. Furthermore, if data collection in MNs is same to the previous transmission, it increases energy consumption. Most hierarchical structure protocols are developed based on LEACH. To solve the above problems, this paper proposed a method in which only MNs with sensed data can obtain allocated frame to transmit data. Moreover, if the MNs have same sensed data with previous, MNs turn to sleep mode. By this way redundant data transmission is avoided and aggregation in CH is lightened, too.

Trait of Local Community Adaptation of Migrant Women by Marriage (결혼이민여성의 지역사회적응 특성)

  • Sung, Hyang-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.307-316
    • /
    • 2011
  • The objective of this study is to figure out some specific features that were found during the adaptation process of migrant women by marriage to their local community, and also to elicit certain practical implications to facilitate their adaptation, based on the findings. For data collection, in-depth interviews were conducted with eight migrant women by marriage and the interviews were tape-recorded for transcription. For analysis, phenomenological method, particularly, Colaizzi method was adopted, by which meaningful statements in the data were categorized into themes and theme clusters. A total of 7 thematic unts, 17 themes and 47 meanings were elicited from the analysis and these 7 thematic units were "reinforcement of inner capability"; "cultural assimilation"; "to be a limited benefit receiver"; "no human network"; " impossible to be optimistic about future"; "hoping to reside in their local community"; "possible to leave Korea." Finally, this study suggested the implications for social welfare practices to facilitate the adaptation of immigrant women by marriage in their local community.

Fashion Image Preference, Pursued Image and Self-Image Satisfaction of Businessmen According to Personality Types (직장 남성의 성격유형에 따른 의복이미지 선호, 추구이미지와 이미지 만족도)

  • Kim, Hyun-Sue;Lee, Ji-Yeon;Lee, Youn-Hee
    • Journal of the Korean Society of Costume
    • /
    • v.62 no.1
    • /
    • pp.1-13
    • /
    • 2012
  • This study is aimed at finding out the self-perception and value of clothing they wear to today's businessmen who work in a fast-growing global network society and for developing a suitable image consulting program for businessmen. The purpose of this study is to categorize businessmen into personality types, and then analyzing purchase behaviors for clothing and image perception, self-image satisfaction among categorized groups. The participants of this study are 320 businessmen who are from 20's to 50's and working in Seoul. A total of 302 questionnaires were used for the survey of this study. The questionnaire is composed of 3 different parts as follows: 1) personality types, 2) purchase behaviors for clothing and image perception, 3) self-image satisfaction. The methods of this study are frequency analysis, descriptive analysis, factor analysis, variance analysis, cluster analysis, t-test and reliability analysis. In conclusion, an image consulting education program for businessmen has to be based on one's own personality type, current fashion style and image perception. Each person has to be provided a unique direction to increase his self satisfaction, which will result in improvements in both personal image satisfaction and social satisfaction. These changes will ultimately become the driving force of career life.

A Study of the Thematically Integrated Information Literacy Curriculum for Strengthening its Relationship with Curricula (교과 연계성 강화를 위한 학습주제 중심의 통합 정보활용교육과정에 관한 연구)

  • Song, Gi-Ho;Kim, Tae-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.3
    • /
    • pp.41-64
    • /
    • 2008
  • This study sought to develop an integrated information literacy curriculum that would have a strong relationship with curricula through the standard themes abstracted from theme network structures, scan and cluster analyses of the information literacy curricula. In addition, this study also attempted to develop a teaching-learning model for the developed integrated information literacy curriculum. This study utilized the themes of information literacy instruction that have interdisciplinary characteristics as analysis criteria in analyzing the commonality of information literacy instruction and the subject curricula. The following characteristics were found from the analyzing the areas of commonality. Foremost, the first themes(the fields of basic learning skills and nature) which belongs to the fields of information society, library, information technology, collaborative skills were found to have many relationships with the subject curricula. Next, the second themes(the field of information problem solving capabilities) which is the core field of information literacy instruction showed a weak relationship with the subject curricula.

CLUSTERING DNA MICROARRAY DATA BY STOCHASTIC ALGORITHM

  • Shon, Ho-Sun;Kim, Sun-Shin;Wang, Ling;Ryu, Keun-Ho
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.438-441
    • /
    • 2007
  • Recently, due to molecular biology and engineering technology, DNA microarray makes people watch thousands of genes and the state of variation from the tissue samples of living body. With DNA Microarray, it is possible to construct a genetic group that has similar expression patterns and grasp the progress and variation of gene. This paper practices Cluster Analysis which purposes the discovery of biological subgroup or class by using gene expression information. Hence, the purpose of this paper is to predict a new class which is unknown, open leukaemia data are used for the experiment, and MCL (Markov CLustering) algorithm is applied as an analysis method. The MCL algorithm is based on probability and graph flow theory. MCL simulates random walks on a graph using Markov matrices to determine the transition probabilities among nodes of the graph. If you look at closely to the method, first, MCL algorithm should be applied after getting the distance by using Euclidean distance, then inflation and diagonal factors which are tuning modulus should be tuned, and finally the threshold using the average of each column should be gotten to distinguish one class from another class. Our method has improved the accuracy through using the threshold, namely the average of each column. Our experimental result shows about 70% of accuracy in average compared to the class that is known before. Also, for the comparison evaluation to other algorithm, the proposed method compared to and analyzed SOM (Self-Organizing Map) clustering algorithm which is divided into neural network and hierarchical clustering. The method shows the better result when compared to hierarchical clustering. In further study, it should be studied whether there will be a similar result when the parameter of inflation gotten from our experiment is applied to other gene expression data. We are also trying to make a systematic method to improve the accuracy by regulating the factors mentioned above.

  • PDF

Property-based Hierarchical Clustering of Peers using Mobile Agent for Unstructured P2P Systems (비구조화 P2P 시스템에서 이동에이전트를 이용한 Peer의 속성기반 계층적 클러스터링)

  • Salvo, MichaelAngelG.;Mateo, RomeoMarkA.;Lee, Jae-Wan
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.189-198
    • /
    • 2009
  • Unstructured peer-to-peer systems are most commonly used in today's internet. But file placement is random in these systems and no correlation exists between peers and their contents. There is no guarantee that flooding queries will find the desired data. In this paper, we propose to cluster nodes in unstructured P2P systems using the agglomerative hierarchical clustering algorithm to improve the search method. We compared the delay time of clustering the nodes between our proposed algorithm and the k-means clustering algorithm. We also simulated the delay time of locating data in a network topology and recorded the overhead of the system using our proposed algorithm, k-means clustering, and without clustering. Simulation results show that the delay time of our proposed algorithm is shorter compared to other methods and resource overhead is also reduced.

  • PDF

Distributed Intrusion Detection System for Safe E-Business Model (안전한 E-Business 모델을 위한 분산 침입 탐지 시스템)

  • 이기준;정채영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.41-53
    • /
    • 2001
  • Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.

  • PDF

Connected-IPs: A Novel Connected Industrial Parks Architecture for Building Smart Factory in Korea (연결형 산업단지(CIPs): 한국의 스마트공장 구축을 위한 연결형 산업단지 아키텍처)

  • Yang, Young-Chuel;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.131-142
    • /
    • 2018
  • In Korea, for the past 50 years, industrial parks have played an important role in economic growth as a cluster of national key industries. However, due to various problems of these old industrial parks, they are weakening competitiveness. It is necessary to be converted into a model for the management and fostering of high-tech industrial complex park by classifying them into development plans, management plans, and support plans according to types and characteristics of industrial parks. For this purpose, we propose CIPs (Connected-Industrial parks) using new technologies such as Cloud Computing, RFID, WSN, CPS, and Big Data analysis based on IoT. It is a hub that supports various services in transportation, warehousing and manufacturing fields while possessing and operating physical assets as concept. each CIP (Connected-Industrial park) is connected and expanded Through such CIPs, network-type collaborative manufacturing and intelligent logistics innovation enables cost reduction, delivery shortening, quality improvement.

A Study of Security Requirement in Wireless Charging (무선충전에서 보안요구사항에 관한 연구)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.3
    • /
    • pp.23-27
    • /
    • 2014
  • In recent times, there is an increasing interest in wireless charge of smartphones and devices, and many companies are developing wireless charges. The range of application of wireless charge would be expanded to almost all electronics, including not only mobile devices, but also notebook computers and vacuum cleaners. On-line electric vehicles are to be launched in the market this year in a massive scale. As such wireless charge-related markets are inexhaustible. Wireless charge is included in the world's top 10 promising technologies, and its rapid growth is expected to have annual growth by more than 100%. However, there's a need to establish a safe environment, by analyzing security threats to technical limitations and harmfulness to human body, and arrange institutional compliments. The development of communication method for a variety of wireless charging are delivering comfortable and safe information. This paper aims to examine the factors to threaten electric vehicle, which are usually intruded through network system and analyzes security threats to and security requirements for magnetic resonance mode-based wireless charge in mobile devices, and suggests security requirements.

An Optimal Resource Distribution Scheme for P2P Streaming Service over Centralized DU Environment in LTE (LTE에서 집중화된 DU 환경에서 P2P 스트리밍 서비스를 위한 최적의 자원 배분 방안)

  • Kim, Yangjung;Chong, Ilyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.3
    • /
    • pp.81-86
    • /
    • 2014
  • According to the development of streaming services with P2P and mobile network technologies, researches to enhance the service quality in mobile environment have been proposed. However, streaming services considering high-speed mobile environment and characteristics of heterogenous terminals have been hindered from being provided with the required quality from user because of bandwidth congestion between selfish peers of existing P2P system. It is also prone to long delay and loss in accordance with the repeated traffic amounts because there are no optimized solution for traffic localization. The structure to enhance peer contribution for service differentiation and peer selection with clustering scheme with location information of terminal can satisfy both users and service providers with service quality and efficiency. In this paper, we propose an incentive mechanism and resource distribution scheme with user contribution and traffic cost information based on user location, which make mobile users increase the satisfaction of service quality in LTE environments.