• Title/Summary/Keyword: Data gathering

Search Result 757, Processing Time 0.023 seconds

Analysis of Types of Gather Drape with Visual Evaluation (시각적 평가에 의한 개더 드레이프 형상 분석)

  • Lee Myung-Hee;Jung Hee-Kyeong
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.7 no.1
    • /
    • pp.33-40
    • /
    • 2005
  • Gathering is method used to control fullness along a seam line. The purpose of this study was to investigate the relationship between the quantitative research and qualitative method; the effect of gather and the types of gather drape. The experimental design consists of four factors: (l) three kinds of different weight and thickness of fabrics (2) three kinds of stitch densities (3) five kinds of ratio of gathers (4) three kinds of grain directions. Therefore one hundred thirty five (135) samples were made. And utilized SPSS WIN 10.0 Package in data analysis. The results of this study were as follows; First, after frequency analysis, side height, hem line width, node depth, node count, node width accorded with these result data recording. Second, after correlation analysis, side height related with front statements. Side height and entire visual was negative correlation. Hem line width, node depth, node count with section statements was negative correlation but node width at section statements was positive correlation. Third, after $k^2$ analysis, front picture parts getting excellent evaluation were 1st side height, 3rd hem line width, 4th node depth, 3rd node count, 3rd node width. And section illustration parts getting excellent evaluation were 4th side height, 1st hem line width, 2nd node depth, 3rd node count, 4th node width.

  • PDF

CREEC: Chain Routing with Even Energy Consumption

  • Shin, Ji-Soo;Suh, Chang-Jin
    • Journal of Communications and Networks
    • /
    • v.13 no.1
    • /
    • pp.17-25
    • /
    • 2011
  • A convergecast is a popular routing scheme in wireless sensor networks (WSNs) in which every sensor node periodically forwards measured data along configured routing paths to a base station (BS). Prolonging lifetimes in energy-limited WSNs is an important issue because the lifetime of a WSN influences on its quality and price. Low-energy adaptive clustering hierarchy (LEACH) was the first attempt at solving this lifetime problem in convergecast WSNs, and it was followed by other solutions including power efficient gathering in sensor information systems (PEGASIS) and power efficient data gathering and aggregation protocol (PEDAP). Our solution-chain routing with even energy consumption (CREEC)-solves this problem by achieving longer average lifetimes using two strategies: i) Maximizing the fairness of energy distribution at every sensor node and ii) running a feedback mechanism that utilizes a preliminary simulation of energy consumption to save energy for depleted Sensor nodes. Simulation results confirm that CREEC outperforms all previous solutions such as LEACH, PEGASIS, PEDAP, and PEDAP-power aware (PA) with respect to the first node death and the average lifetime. CREEC performs very well at all WSN sizes, BS distances and battery capacities with an increased convergecast delay.

Estimation of Velocity and Training Overhead Constraints for Energy Efficient Cooperative Technique in Wireless Sensor Networks (협력통신을 이용하는 무선 센서네트워크에서의 에너지 소비 감소를 위한 속도와 훈련심볼의 오버헤드 임계값 추정)

  • Islam, Mohanmmad Rakibul;Kim, Jin-Sang;Cho, Won-Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5B
    • /
    • pp.443-448
    • /
    • 2009
  • A boundary value of the velocity of data gathering node (DGN) and a critical value for training overhead beyond which the scheme will not be feasible for a Multiple Input Multiple Output (MIMO) based cooperative communication for energy-limited wireless sensor networks is proposed in this paper. The performance in terms of energy efficiency and delay for a combination of two transmitting and two receiving antennas is analyzed. The results show that a set of critical value of velocity and training overhead pair is present for the long haul communication from the sensors to the data gathering node. Finally a relation between training overhead and velocity is simulated.

A Monitoring Method for Supporting QoS in Next Generation Mobile Communication Networks (차세대 이동통신망의 QoS를 보장하기 위한 모니터링 방법)

  • Lee, Gi-Sung;Lee, Jong-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.8
    • /
    • pp.3680-3686
    • /
    • 2012
  • This research suggests a monitoring method to support QoS of mobile multimedia services effectively based on information gathering. It means a method in which a subscriber's terminal collects information about its current condition and its surrounding base stations, and a base station, through the data collected by monitoring inner or adjacent base station, shares related data and converges, controlling QoS on its own. In other words, as context information of mobile terminal and base station changes, set-up of related functions and QoS mapping is adapted; each function fits into the change, exchanges the process of reorganization, and interacts; these actions go toward to satisfy service continuity.

A Study on the Improvement of Sailing Efficiency Using Big Data of Ship Operation (선박 운항 빅데이터를 활용한 운항 효율 향상 방법 연구)

  • Shin, Jung-Hun;Shim, Jeong-Yeon;Park, Jin-Woo;Choi, Dae-Han;BYEON, Sang-Su
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2017.04a
    • /
    • pp.244-244
    • /
    • 2017
  • Recently, A study is actively underway to apply to various industries, which are one of the major changes in the key drivers of the industry 4.0.. The data generated by the ship include various indicators such as the fuel volume, engine power, ground speed, speed, speed, main engine rpm, DFOC, SFOC, and FOC. This paper analyzes the sensitivity of the Gathering data and analyzes the impact energy efficiency of the vessel operation by analyzing the influence among each parameter, using the mathematical models, you create an surrogate model using the math model, comparative analysis of actual measurement data and predictive results were analyzed. Through the use of big data analysis technology, it is possible to identify the sensitivity between the energy efficiency related variables of the ship, The possibility of utilization of fuel efficiency indicators using of the surrogate model is identified.

  • PDF

Cluster-based Delay-adaptive Sensor Scheduling for Energy-saving in Wireless Sensor Networks (센서네트워크에서 클러스터기반의 에너지 효율형 센서 스케쥴링 연구)

  • Choi, Wook;Lee, Yong;Chung, Yoo-Jin
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.47-59
    • /
    • 2009
  • Due to the application-specific nature of wireless sensor networks, the sensitivity to such a requirement as data reporting latency may vary depending on the type of applications, thus requiring application-specific algorithm and protocol design paradigms which help us to maximize energy conservation and thus the network lifetime. In this paper, we propose a novel delay-adaptive sensor scheduling scheme for energy-saving data gathering which is based on a two phase clustering (TPC). The ultimate goal is to extend the network lifetime by providing sensors with high adaptability to the application-dependent and time-varying delay requirements. The TPC requests sensors to construct two types of links: direct and relay links. The direct links are used for control and forwarding time critical sensed data. On the other hand, the relay links are used only for data forwarding based on the user delay constraints, thus allowing the sensors to opportunistically use the most energy-saving links and forming a multi-hop path. Simulation results demonstrate that cluster-based delay-adaptive data gathering strategy (CD-DGS) saves a significant amount of energy for dense sensor networks by adapting to the user delay constraints.

Corpus of Eye Movements in L3 Spanish Reading: A Prediction Model

  • Hui-Chuan Lu;Li-Chi Kao;Zong-Han Li;Wen-Hsiang Lu;An-Chung Cheng
    • Asia Pacific Journal of Corpus Research
    • /
    • v.5 no.1
    • /
    • pp.23-36
    • /
    • 2024
  • This research centers on the Taiwan Eye-Movement Corpus of Spanish (TECS), a specially created corpus comprising eye-tracking data from Chinese-speaking learners of Spanish as a third language in Taiwan. Its primary purpose is to explore the broad utility of TECS in understanding language learning processes, particularly the initial stages of language learning. Constructing this corpus involves gathering data on eye-tracking, reading comprehension, and language proficiency to develop a machine-learning model that predicts learner behaviors, and subsequently undergoes a predictability test for validation. The focus is on examining attention in input processing and their relationship to language learning outcomes. The TECS eye-tracking data consists of indicators derived from eye movement recordings while reading Spanish sentences with temporal references. These indicators are obtained from eye movement experiments focusing on tense verbal inflections and temporal adverbs. Chinese expresses tense using aspect markers, lexical references, and contextual cues, differing significantly from inflectional languages like Spanish. Chinese-speaking learners of Spanish face particular challenges in learning verbal morphology and tenses. The data from eye movement experiments were structured into feature vectors, with learner behaviors serving as class labels. After categorizing the collected data, we used two types of machine learning methods for classification and regression: Random Forests and the k-nearest neighbors algorithm (KNN). By leveraging these algorithms, we predicted learner behaviors and conducted performance evaluations to enhance our understanding of the nexus between learner behaviors and language learning process. Future research may further enrich TECS by gathering data from subsequent eye-movement experiments, specifically targeting various Spanish tenses and temporal lexical references during text reading. These endeavors promise to broaden and refine the corpus, advancing our understanding of language processing.

Consumer needs on a Reform of Administrative Service (소비자의 행정서비스개선에 대한 요구 분석)

  • 배순영
    • Journal of the Korean Home Economics Association
    • /
    • v.35 no.1
    • /
    • pp.129-142
    • /
    • 1997
  • The purpose of this study is (1) to investigate the level of the consumer needs on a reform of administrative service and (2) to identify the influencing variables. For empirical analysis it used the data on 511 persons collected in the Chunju. The questionaire method was for data gathering. The major findings are as follows: (1) The level of consumer needs on a reform of administrative service is quite high and expecially the need on ' a government employee' is very high(2) It differed significantly according to age occupation attitude on adminstation attitude on consumerism and especially attitude on consumerism is most influencing variables.

  • PDF

A study on vulnerabilities of serial based DNP in power control fields (전력 제어시스템의 시리얼 기반 DNP통신 취약점에 관한 연구)

  • Jang, Ji Woong;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1143-1156
    • /
    • 2013
  • Power control system like SCADA(Supervisory Control And Data Acquisition) is gathering information using RS232C and low-speed analog communication network. In general, these methods are known as secure because of the secure characteristics from the analog based communication network and serial communication. In this study, first we build DNP communication environment using commercial power control simulator and find some vulnerabilities by testing from the viewpoint of confidentiality, integrity and availability. Consequently, we see the necessity of a valid method for authentication and data encryption when gathering information, even though that is known as secure so far. Discussion of needs of DNP authentication and data encryption is started about several years ago, but there is still nowhere applied that on real environment because the current methods can not fully meet the security requirements of the real environment. This paper suggests a solution to the vulnerabilities, and propose some considerations for enhancing power control system's security level by applying DNP authentication and data encryption.