• Title/Summary/Keyword: Group Membership

Search Result 173, Processing Time 0.029 seconds

A study on Elevator Group Controller of High Building using Adaptive Dual Fuzzy Algorithm (Adaptive Dual Fuzzy 알고리즘을 이용한 고층 빌딩의 엘리베이터 군 제어에 관한 연구)

  • Choi, Seung-Min;Kim, Hum-Mo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.18 no.4
    • /
    • pp.112-120
    • /
    • 2001
  • In this paper, the development of a new group controller for high-speed elevator is carried out utilizing the approach of an adaptive dual fuzzy logic. Some goals of control are the minimization of waiting time, mean-waiting time and long-waiting time in a high building, when a new hall call is generated, adaptive dual fuzzy controller evaluate traffic pattern and change appropriately the membership function of a fuzzy rule base. Controls for co-operation among elevators in a group control algorithm arte essential, and the most critical control function in the group controller is an effective and proper hall call assignment of elevators. The group elevator system utilizing adaptive dual fuzzy control reveals a great deal of improvement on its performance.

  • PDF

A Design for Elevator Group Controller of Building using Adaptive Dual Fuzzy Algorithm (Adaptive Dual Fuzzy 알고리즘을 이용한 빌딩의 엘리베이터 군 제어기 설계)

  • 최승민;김훈모
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.578-581
    • /
    • 2001
  • In this paper, the development of a new group controller for high-speed elevator is carried out utilizing approach of an adaptive dual fuzzy logic. A goals of control are the minimization of waiting time, mean-waiting time and long-waiting time in a building. when a new hall call is generated, adaptive dual fuzzy controller evaluate traffic pattern and change appropriately the membership function of fuzzy rule base. Control for co-operation among elevators in group control algorithm are essential, and the most critical control function in group controller is a effective and proper hall call assignment of elevators. Thy group elevator system utilizing adaptive dual fuzzy control reveals a great deal of improvement on its performance.

  • PDF

A Simulation of Elevator Group Controller using Adaptive Dual Fuzzy Algorithm (Adaptive Dual Fuzzy 알고리즘을 이용한 엘리베이터 군 제어 시뮬레이션)

  • 최승민;김훈모
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.11a
    • /
    • pp.157-160
    • /
    • 2000
  • In this paper, the development of a new group controller for high-speed elevator is carried out utilizing approach of an adaptive dual fuzzy logic. A goals of control are the minimization of waiting time, mean-waiting time and long-waiting time in a high building, when a new hall call is generated, adaptive dual fuzzy controller evaluate traffic pattern and change appropriately the membership function of fuzzy rule, base. Control for co-operation among elevators in group control algorithm are essential , and the most critical control function in group controller is a effective and proper hall call assignment of elevators. The group elevator system utilizing adaptive dual fuzzy control reveals a great deal of improvement on its performance.

  • PDF

Application Driven Cluster Based Group Key Management with Identifier in Mobile Wireless Sensor Networks

  • Huh, Eui-Nam;Nahar Sultana
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.1 no.1
    • /
    • pp.1-17
    • /
    • 2007
  • This paper proposes and analyzes a scalable and an efficient cluster based group key management protocol by introducing identity based infrastructure for secure communication in mobile wireless sensor networks. To ensure scalability and dynamic re-configurability, the system employs a cluster based approach by which group members are separated into clusters and the leaders of clusters securely communicate with each other to agree on a group key in response to changes in membership and member movements. Through analysis we have demonstrated that our protocol has a high probability of being resilient for secure communication among mobile nodes. Finally, it is established that the proposed scheme is efficient for secure positioning in wireless sensor networks.

A Study On ID-Based Group Signature (신원 정보 기반 그룹 서명)

  • Kim, Dae-Youb;Ju, Hak-Soo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.489-494
    • /
    • 2005
  • In 2002, Shundong Xia proposed a new ID-based group signature scheme with strong separability. The nature of a strong separability is to divide group manager's role into a membership manager and a revocation manager Jianhong et al showed that the scheme was not coalition-resistant. In this letter, we first propose two new attacks, forgery and link attacks, for Xia-You's scheme. We also propose a new ID-based group signature scheme that Is resistant to coalition, forgery and link attacks

Swarm Group Mobility Model for Ad Hoc Wireless Networks

  • Kim, Dong-Soo S.;Hwang, Seok-K.
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.1 no.1
    • /
    • pp.53-59
    • /
    • 2007
  • This paper proposes a new group mobility model for wireless communication. The mobility model considers the psychological and sociological behavior of each node and the perception of other nodes for describing interactions among a set of nodes. The model assumes no permanent membership of a group, capable of capturing natural behaviors as fork and join. It emulates a cooperative movement pattern observed in mobile ad hoc networks of military operation and campus, in which a set of mobile stations accomplish a cooperative motion affected by the individual behavior as well as a group behavior. The model also employs a physic model to avoid a sudden stopping and a sharping turning.

  • PDF

An Architecture for Key Management in Hierarchical Mobile Ad-hoc Networks

  • Rhee, Kyung-Hyune;Park, Young-Ho;Gene Tsudik
    • Journal of Communications and Networks
    • /
    • v.6 no.2
    • /
    • pp.156-162
    • /
    • 2004
  • In recent years, mobile ad-hoc networks have received a great deal of attention in both academia and industry to provide anytime-anywhere networking services. As wireless networks are rapidly deployed, the security of wireless environment will be mandatory. In this paper, we describe a group key management architecture and key agreement protocols for secure communication in mobile ad-hoc wireless networks (MANETs) overseen by unmanned aerial vehicles (UAVs). We use implicitly certified public keys method, which alleviates the certificate overhead and improves computational efficiency. The architecture uses a two-layered key management approach where the group of nodes is divided into: 1) Cell groups consisting of ground nodes and 2) control groups consisting of cell group managers. The chief benefit of this approach is that the effects of a membership change are restricted to the single cell group.

Design of an Leader Election Protocol in Mobile Ad Hoc Distributed Systems (분산 이동 시스템에서 선출 프로토콜의 설계)

  • Park, Sung-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.12
    • /
    • pp.53-62
    • /
    • 2008
  • The Election paradigm can be used as a building block in many practical problems such as group communication, atomic commit and replicated data management where a protocol coordinator might be useful. The problem has been widely studied in the research community since one reason for this wide interest is that many distributed protocols need an election protocol. However, despite its usefulness, to our knowledge there is no work that has been devoted to this problem in a mobile ad hoc computing environment. Mobile ad hoc systems are more prone to failures than conventional distributed systems. Solving election in such an environment requires from a set of mobile nodes to choose a unique node as a leader based on its priority despite failures or disconnections of mobile nodes. In this paper, we describe a solution to the election problem from mobile ad hoc computing systems. This solution is based on the Group Membership Detection algorithm.

Fibromyalgia diagnostic model derived from combination of American College of Rheumatology 1990 and 2011 criteria

  • Ghavidel-Parsa, Banafsheh;Bidari, Ali;Hajiabbasi, Asghar;Shenavar, Irandokht;Ghalehbaghi, Babak;Sanaei, Omid
    • The Korean Journal of Pain
    • /
    • v.32 no.2
    • /
    • pp.120-128
    • /
    • 2019
  • Background: We aimed to explore the American College of Rheumatology (ACR) 1990 and 2011 fibromyalgia (FM) classification criteria's items and the components of Fibromyalgia Impact Questionnaire (FIQ) to identify features best discriminating FM features. Finally, we developed a combined FM diagnostic (C-FM) model using the FM's key features. Methods: The means and frequency on tender points (TPs), ACR 2011 components and FIQ items were calculated in the FM and non-FM (osteoarthritis [OA] and non-OA) patients. Then, two-step multiple logistic regression analysis was performed to order these variables according to their maximal statistical contribution in predicting group membership. Partial correlations assessed their unique contribution, and two-group discriminant analysis provided a classification table. Using receiver operator characteristic analyses, we determined the sensitivity and specificity of the final model. Results: A total of 172 patients with FM, 75 with OA and 21 with periarthritis or regional pain syndromes were enrolled. Two steps multiple logistic regression analysis identified 8 key features of FM which accounted for 64.8% of variance associated with FM group membership: lateral epicondyle TP with variance percentages (36.9%), neck pain (14.5%), fatigue (4.7%), insomnia (3%), upper back pain (2.2%), shoulder pain (1.5%), gluteal TP (1.2%), and FIQ fatigue (0.9%). The C-FM model demonstrated a 91.4% correct classification rate, 91.9% for sensitivity and 91.7% for specificity. Conclusions: The C-FM model can accurately detect FM patients among other pain disorders. Re-inclusion of TPs along with saving of FM main symptoms in the C-FM model is a unique feature of this model.

A Group Key Management Architecture in Mobile Network Environments (이동네트워크 환경에서의 그룹키 관리구조)

  • 박영호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.89-100
    • /
    • 2002
  • In this paper, we propose a group key management architecture for the secure group communications in mobile netwowrks and authenticated key agreement protocol for this system. Most of existing group key management schemes un certificates based on the public key for the purpose of user authentication and key agreement in secure fashion however, we use the ICPK(Implicitly Certified Public key) to reduce the bandwidth for a certificate exchanging and to improve a computational efficiency. In this architecture, we use two-tier approach to deal with key management where the whole group is divided into two parts; the first is a cell groups consisted of mobile hosts and another is a control group consisted of cell group managers. This approach can provide flexibility of key management such that the affection for a membership change is locally restricted to the cell group which is an autonomous area of the CGM(Cell Group Manager).