• Title/Summary/Keyword: Coverage Problem

Search Result 361, Processing Time 0.03 seconds

Signal Interference of Neighboring Wi-Fi Networks on Data Throughput (Wi-Fi 네트워크간의 신호간섭 및 데이터 전송률 영향 분석)

  • Zhang, Jie;Lee, Goo Yeon;Kim, Hwa Jong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.11
    • /
    • pp.17-23
    • /
    • 2012
  • Products of Wi-Fi devices in recent years offer higher throughput and have longer signal coverage which also bring unnecessary signal interference to neighboring wireless networks, and result in decrease of network throughput. Signal interference is an inevitable problem because of the broadcast nature of wireless transmissions. However it could be optimized by reducing signal coverage of wireless devices. On the other hand, smaller signal coverage also means lower transmission power and lower data throughput. Therefore, in this paper, we analyze the relationship among signal strength, coverage, interference and network throughput by simulation on various network topology.

Random Digit Dialing Telephone Survey and Major Findings (RDD 전화조사와 주요결과)

  • Kang, H.C.;Han, S.T.;Kim, J.Y.;Jung, Y.C.;Huh, M.H.
    • Survey Research
    • /
    • v.9 no.1
    • /
    • pp.1-22
    • /
    • 2008
  • Telephone directories ille still being used as the sampling frame in almost all fixed-line telephone surveys in Korea, causing potentially serious coverage error. RDD (random digit dialing) sampling is an obvious alternative to solve the problem. The aim of this paper is twofold: 1) proposal of RDD methodology suitable to the telephone system of Korea and 2) the identification of socio-demographic and socio-psychological differences between listed-number and unlisted-number respondents. Major findings of RDD telephone survey conducted experimental]y are as follows. 1) Population coverage by telephone directories is 60% or less. 2) Unlisted-number households have statistically larger income compared to listed-number households. 3) Unlisted-number households have smaller family size compared to listed-number households. 4) Unlisted-number respondents are more sensitive about confidentiality, leaks, 5) Unlisted-number respondents are more liberal compared to unlisted-number respondents. These facts suggest that directory-based telephone surveys tend to be biased in socio-economic aspects.

  • PDF

The Simple Wakeup Scheduling Protocols Considering Sensing Coverage in Wireless Sensor Networks (무선 센서 네트워크에서 센싱 커버리지를 고려한 Wake-up 스케줄링 프로토콜)

  • Cho, Jae-Kyu;Kim, Gil-Soo;Kwon, Tae-Kyoung;Choi, Yang-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1A
    • /
    • pp.41-49
    • /
    • 2009
  • A crucial issue in deploying wireless sensor networks is to perform a sensing task in an area of interest in an energy-efficient manner since sensor nodes have limited energy Power. The most practical solution to solve this problem is to use a node wake-up scheduling protocol that some sensor nodes stay active to provide sensing service, while the others are inactive for conserving their energy In this paper, we present a simple wake-up scheduling protocol, which can maintain sensing coverage required by applications and yet increase network lifetime by turning off some redundant nodes. In order to do this, we use the concept of a weighted average distance. A node decides whether it is active or inactive based on the weighted average distance. The proposed protocol allows sensor nodes to sleep dynamically while satisfying the required sensing coverage.

A Study of Coverage Improvement for Library Fuzzing (라이브러리 퍼징의 커버리지 향상 방법 연구)

  • Kim, Seoyoung;Cho, Mingi;Kim, Jongshin;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1079-1085
    • /
    • 2020
  • Fuzzing is used to find vulnerabilities for a library. Because library fuzzing only tests the implemented functions, in order to achieve higher code coverage, additional functions that are not implemented should be implemented. However, if a function is added without regard to the calling relationship of the functions in the library, a problem may arise that the function that has already been tested is added. We propose a novel method to improve the code coverage of library fuzzing. First, we analyze the function call graph of the library to efficiently add the functions for library fuzzing, and additionally implement a library function that has not been implemented. Then, we apply a hybrid fuzzing to explore for branches with complex constraints. As a result of our experiment, we observe that the proposed method is effective in terms of increasing code coverage on OpenSSL, mbedTLS, and Crypto++.

Constrained Relay Node Deployment using an improved multi-objective Artificial Bee Colony in Wireless Sensor Networks

  • Yu, Wenjie;Li, Xunbo;Li, Xiang;Zeng, Zhi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.2889-2909
    • /
    • 2017
  • Wireless sensor networks (WSNs) have attracted lots of attention in recent years due to their potential for various applications. In this paper, we seek how to efficiently deploy relay nodes into traditional static WSNs with constrained locations, aiming to satisfy specific requirements of the industry, such as average energy consumption and average network reliability. This constrained relay node deployment problem (CRNDP) is known as NP-hard optimization problem in the literature. We consider addressing this multi-objective (MO) optimization problem with an improved Artificial Bee Colony (ABC) algorithm with a linear local search (MOABCLLS), which is an extension of an improved ABC and applies two strategies of MO optimization. In order to verify the effectiveness of the MOABCLLS, two versions of MO ABC, two additional standard genetic algorithms, NSGA-II and SPEA2, and two different MO trajectory algorithms are included for comparison. We employ these metaheuristics on a test data set obtained from the literature. For an in-depth analysis of the behavior of the MOABCLLS compared to traditional methodologies, a statistical procedure is utilized to analyze the results. After studying the results, it is concluded that constrained relay node deployment using the MOABCLLS outperforms the performance of the other algorithms, based on two MO quality metrics: hypervolume and coverage of two sets.

Issues Facing the National Health Insurance System in Korea and Their Solutions (우리나라 공공의료의 쟁점과 해결책)

  • Lee, Eun Hye
    • Korean Medical Education Review
    • /
    • v.24 no.1
    • /
    • pp.10-17
    • /
    • 2022
  • South Korea is not a wasteland of publicly funded health care-instead, it has a good medical social security system known as the national health insurance (NHI). The NHI of Korea has three unique features; (1) low premiums, low insurance fees, and low coverage; (2) obligatory designation of medical institutions; (3) and allowance of non-benefit services. These features have made hospitals and doctors interested in profit-seeking. However, the commercialization of medical institutions has taken place in both private- and public-established sectors. A basic problem of commercialization is the co-existence of the obligatory designation of medical institutions and non-benefit services. The problem became worse in the Kim Dae-Jung government because it officially permitted non-benefit services. Since 2000, the Korean government has consistently pursued benefit extension policies, but the coverage rates of the NHI have stagnated. In addition, premiums and current medical expenses have markedly increased because policy-makers have emphasized accessibility to the NHI, while ignoring important principles of medical social security such as a needs-based approach and patient-referral system. In order to resolve the commercialization problem, the obligatory designation of medical institutions to the NHI should be changed to a contract system, and non-benefit services should be prohibited at NHI institutions. We must re-establish the patient-referral system via a needs-based approach. We also need to build a primary healthcare system and public health policies. We should make a long-term plan for healthcare reform.

Research on the Energy Hole Problem Based on Non-uniform Node Distribution for Wireless Sensor Networks

  • Liu, Tang;Peng, Jian;Wang, Xiao-Fen;Yang, Jin;Guo, Bing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2017-2036
    • /
    • 2012
  • Based on the current solutions to the problem of energy hole, this paper proposed a nonuniform node distribution clustering algorithm, NNDC. Firstly, we divide the network into rings, and then have an analysis and calculation on nodes' energy consumption in each ring of the network when clustering algorithm is applied to collect data. We also put forward a scheme of nonuniform node distribution on the basis of the proportion of nodes' energy consumption in each ring, and change nodes' active/hibernating states under density control mechanism when network coverage is guaranteed. Simulation shows NNDC algorithm can satisfyingly balance nodes' energy consumption and effectively avoid the problem of energy hole.

Improved Coordination Method for Back-up Protection Schemes Based on IEC 61850 (IEC 61850 기반 후비보호계전시스템 보호협조 개선방안)

  • Kim, Hyung-Kyu;Kang, Sang-Hee
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.1
    • /
    • pp.43-49
    • /
    • 2011
  • A distance relay scheme is commonly used for backup protection. This scheme, called a step distance protection, is comprised of 3 steps for graded zones having different operating time. As for the conventional step distance protection scheme, Zone 2 can exceed the ordinary coverage excessively in case of a transformer protection relay especially. In this case, there can be overlapped protection area from a backup protection relay and, therefore, malfunctions can occur when any fault occurs in the overlapped protection area. Distance relays and overcurrent relays are used for backup protection generally, and both relays have normally this problem, the maloperation, caused by a fault in the overlapped protection area. Corresponding to an IEEE standard, this problem can be solved with the modification of the operating time. On the other hand, in Korea, zones are modified to cope with this problem in some specific conditions. These two methods may not be obvious to handle this problem correctly because these methods, modifying the common rules, can cause another coordination problem. To overcome this problem clearly, this paper describes an improved backup protection coordination scheme using an IEC 61850-based distance relay for transformer backup protection. IEC 61850-based IED(Intelligent Electronic Device) and the network system based on the kernel 2.6 LINUX are realized to verify the proposed method. And laboratory tests to estimate the communication time show that the proposed coordination method is reliable enough for the improved backup protection scheme.

Circuit partitioning to enhance the fault coverage for combinational logic (조합논리회로의 고장 검출율 개선을 위한 회로분할기법)

  • 노정호;김상진;이창희;윤태진;안광선
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.4
    • /
    • pp.1-10
    • /
    • 1998
  • Partitioning problem of large combinational logic has been studied in real world. Most of logic include undectable faults from the structure of it's redundant, fan-out-reconvergent, and symetrical feature. BPT algorithm is proposed to enhance the fault voverage for combinational logic partitioning. This algorithm partitions the logic by cut the lines related to undetectable structure when seperating. Controllability and observability are considered in the process of partitioning. This algorithm is evaluated effective by testing ISCAS85 circuits.

  • PDF

TETRACYCLINE에 의한 변색치의 심미적 치료

  • Hwang, Byeong-Gak;Lee, Cheol-Won;Kim, Seok-Gyun
    • Journal of the Korean Academy of Esthetic Dentistry
    • /
    • v.1 no.1
    • /
    • pp.50-57
    • /
    • 1992
  • Intrinsic discoloration of permanent anterior teeth is a continuing esthetic problem. Tetracycline ingested during amelogenesis has long been recognized as predisposing factor in intrinsic staining. Methods for restoring original tooth color have included (1) complete PFM crown coverage (2) porcelain laminate veneers (3) direct bonding of composite resin, and (4) bleaching. In the case of tetracycline-stained upper anterior teeth, We authors, obtained the satisfactory results by means of gingivectomy, preliminary bleaching and porcelain laminate veneer restoration.

  • PDF