• Title/Summary/Keyword: Hierarchical Network

Search Result 975, Processing Time 0.025 seconds

Literature Review and Network Analysis on the Pain Disease Approach of Saam Acupuncture Method (사암도인침법의 통증 질환 접근법에 대한 고찰)

  • Park, Ji-Yeun;Lee, Soon-Ho;Kim, Song-Yi;Park, Hi-Joon
    • Korean Journal of Acupuncture
    • /
    • v.34 no.2
    • /
    • pp.88-99
    • /
    • 2017
  • Objectives : Saam acupuncture initiated by Saamdoin in $17^{th}$ century is one of the most widely adopted acupuncture techniques used by Korean medical doctors in clinic. Our study aimed to analyze the application of the Saam acupuncture method to pain diseases based on the literature data. Methods : Based on the contents described in "(Do Hae Kyo Kam) Saam's acupuncture method", the texts related to pain condition were analyzed. The frequency of prescription of Saam acupuncture method was analyzed, and then the relationships between each acupoint were visualized by network analysis and hierarchical cluster analysis for the quantitative aspect. Results and conclusions: In our study, Lung tonifying and Liver tonifying acupuncture were the most frequently used method for the treatment of pain disease. As the acupoints, BL66 and SI5 were used the most frequently. It was found that visceral pattern identification was considered as the most important factor in the selection of the Saam acupuncture method. Network analysis and hierarchical clustering analysis showed that each acupoint was closely related to other acupoints, and most of them were connected more closely according to the method of Saam acupuncture operation. The experiential prescriptions of Saam acupuncture were classified as an independent group. In the future, fundamental research on the principle of Saam acupuncture method is needed for the various diseases, and research for the clinical efficacy and the mechanism of Saam acupuncture method should be preceded.

Performance Comparison between Hierarchical Routing Protocols applying New Performance Evaluation Items (성능 비교 항목들을 적용한 계층형 라우팅 프로토콜간의 성능비교)

  • Lee, Jong-Yong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.51-57
    • /
    • 2020
  • WSN is a wirelessly configured network of sensor nodes with limited power such as batteries. If the sensor node's battery is exhausted, the node is no longer available. Therefore, if the network is to be used for a long time, energy consumption should be minimized. There are many Wireless Sensor Network Protocols to improve energy efficiency, including Cluster-based and chain-based Protocols. This paper seeks to examine the performance evaluation of routing protocols studied separately for the improvement of performance in wireless sensor network. The criteria for comparison were selected as the LEACH protocol, a representative hierarchical routing protocol, and the comparison targets considered CHEF and FLCFP and LEACH-DFL routing protocols with Fuzzy Logic. Various criteria for performance comparison were presented in this paper, and the performance was compared through simulation of each protocol. The purpose is to present a reference point for comparing the performance of other protocols through the performance comparison of CHEF, FLCFP, and LEACH-DFL, protocols with LEACH and Fuzzy Logic, and to provide additional design methods for improving the performance of protocols.

The Effects of Social Capital on Occupational Aspiration in University Students (대학생의 사회자본이 직업포부에 미치는 영향)

  • An, Kwan-Su;Hwang, Jae-Yeon
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.237-247
    • /
    • 2017
  • The Effects of Social Capital on Occupational Aspiration in University Students This study aims to understand the impact of social capital (parent-child relationship, human network, and SNS use) on the occupational aspiration level in university students based on Coleman's Social Capital Concept. To achieve this, statistical significance test was conducted through correlation analysis and hierarchical multiple regression analysis. The major study findings are as follows. As a result of correlation analysis, it was found that Other variables, except for parent's occupational of social capital had a positive effect on vocational aspiration. Also. as a result of hierarchical multiple regression analysis, it was found that parent-child relationship, human network obtained from social activities, Social Networking Service use and usefulness of information - social capital factors - had a statistically significant impact on occupational aspiration. Such findings suggest that the process of possessing and acquiring social capital among university students served as an important achievement-oriented value in terms of social mobility.

A Logical Hierarchy Architecture of Location Registers for Supporting Mobility in Wireless ATM Networks (무선 ATM 망에서 이동성 지원을 위한 위치 등록기의 논리적 계층 구조)

  • 김도현;조유제
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6A
    • /
    • pp.361-370
    • /
    • 2003
  • This paper attempts to improve the existing architecture of location register for location management in Private Network to Network Interface(PNNI)-based wireless ATM networks. Our approach enhances the hierarchical architecture of location registers based on a PNNI hierarchical architecture, which is referred to as the logical hierarchy architecture of location registers. This paper introduces a logical hierarchy architecture for location registers to reduce the cost of their location management. This logical hierarchy architecture of location registers begins with the lowest level physical location registers that are organized into clusters called logical groups. These logical groups are then represented in higher layers by logical nodes. These logical nodes are again grouped into clusters that are treated as single nodes by the next higher layer. In this way, all location registers are included in this tree-type logical hierarchy architecture. Compared with the existing physical hierarchy architecture of location registers, the analysis results show that the proposed logical hierarchy architecture can reduce the number of databases and thereby the average total location management cost.

A Hierarchical Underwater Acoustic Sensor Network Architecture Utilizing AUVs' Optimal Trajectory Movements (수중 무인기의 최적 궤도 이동을 활용하는 계층적 수중 음향 센서 네트워크 구조)

  • Nguyen, Thi Tham;Yoon, Seokhoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1328-1336
    • /
    • 2012
  • Compared to terrestrial RF communications, underwater acoustic communications have several limitations such as limited bandwidth, high level of fading effects, and a large underwater propagation delay. In this paper, in order to tackle those limitations of underwater communications and to make it possible to form a large underwater monitoring systems, we propose a hierarchical underwater network architecture, which consists of underwater sensors, clusterheads, underwater/surface sink nodes, autonomous underwater vehicles (AUVs). In the proposed architecture, for the maximization of packet delivery ratio and the minimization of underwater sensor's energy consumption, a hybrid routing protocol is used. More specifically, cluster members use Tree based routing to transmit sensing data to clusterheads. AUVs on optimal trajectory movements collect the aggregated data from clusterhead and finally forward the data to the sink node. Also, in order to minimize the maximum travel distance of AUVs, an Integer Linear Programming based algorithm is employed. Performance analysis through simulations shows that the proposed architecture can achieve a higher data delivery ratio and lower energy consumption than existing routing schemes such as gradient based routing and geographical forwarding. Start after striking space key 2 times.

An Efficient Data Dissemination Protocol for Cluster-based Wireless Sensor Networks (클러스터 기반의 무선 센서네트워크에서 통신량을 줄인 데이터 보급방법)

  • Cho, Ji-Eun;Choe, Jong-Won
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.222-230
    • /
    • 2009
  • A sensor network is an important element of the ubiquitous and it consists of sensor fields that contain sensor nodes and sink nodes that collect data from sensor nodes. Since each sensor node has limited resources, one of the important issues covered in the past sensor network studies has been maximizing the usage of limited energy to extend network lifetime. However, most studies have only considered fixed sink nodes, which created various problems for cases with multiple mobile sink nodes. Accordingly, while maintaining routes to mobile sink nodes, this study aims to deploy the hybrid communication mode that combines single and multi-hop modes for intra-cluster and inter-cluster transmission to resolve the problem of failed data transmission to mobile sink nodes caused by disconnected routes. Furthermore, a 2-level hierarchical routing protocol was used to reduce the number of sensor nodes participating in data transmission, and cross-shape trajectory forwarding was employed in packet transmission to provide an efficient data dissemination method.

Prototype Design and Security Association Mechanism for Policy-based on Security Management Model (정책기반 보안관리 모델을 위한 프로토타입과 정책 협상 메커니즘)

  • 황윤철;현정식;이상호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.131-138
    • /
    • 2003
  • With the Internet winning a huge popularity, there rise urgent problems which are related to Network Security Managements such as Protecting Network and Communication from un-authorized user. Accordingly, Using Security equipments have been common lately such as Intrusion Detection Systems, Firewalls and VPNs. Those systems. however, operate in individual system which are independent to me another. Their usage are so limited according to their vendors that they can not provide a corporate Security Solution. In this paper, we present a Hierarchical Security Management Model which can be applicable to a Network Security Policies consistently. We also propose a Policy Negotiation Mechanism and a Prototype which help us to manage Security Policies and Negotiations easier. The results of this research also can be one of the useful guides to developing a Security Policy Server or Security Techniques which can be useful in different environments. This study also shows that it is also possible to improve a Security Characteristics as a whole network and also to support Policy Associations among hosts using our mechanisms.

A Study on the Effects of Social Capital on Collaborative governance (사회적자본이 협력적거버넌스에 미치는 영향에 관한 연구)

  • Yu, Mi-Hyun;Na, Ju-Mong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.4
    • /
    • pp.37-46
    • /
    • 2017
  • In this research, we conducted an empirical study on the influence of social capital on cooperative governance for the Gwangju city social economy. The results of the study are as follows. First, the social capital factor commonly affecting cooperative governance is trust. Secondly, we were able to learn that there was a difference in the results of the hierarchical regression analysis to grasp the magnitude of the relative influence of detailed elements of social capital by cooperative governance factors in order. Network(4.843) exerted the most influence in Common Decision-making, followed by Trust(3.855). Trust(3.130) exerted the most influence on Management of Governance, followed by Network(2.936). Network(2.647) exerted the most influence on Cowork System, followed by Trust(2.244). Finally, Network(4.153) exerted the most influence on Partnership Building, followed by Trust(2.244). In particular, 'Participation' was an important factor in 'Co-work System'.

An Anonymous Authentication in the Hierarchy for VANET (VANET 환경을 위한 계층적 구조의 익명 인증 기술)

  • Bae, Kyungjin;Lee, Youngkyung;Kim, Jonghyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.563-577
    • /
    • 2018
  • In order to support secure communication in VANET(Vehicular Ad hoc Network), messages exchanged between vehicles or between vehicle and infrastructure must be authenticated. In this paper, we propose a hierarchical anonymous authentication system for VANET. The proposed system model reduces the overhead of PKG, which is a problem of previous system, by generating private keys hierarchically, thereby enhancing practicality. We also propose a two-level hierarchical identity-based signature(TLHIBS) scheme without pairings so that improve efficiency. The proposed scheme protects the privacy of the vehicle by satisfying conditional privacy and supports batch verification so that efficiently verifies multiple signatures. Finally, The security of the proposed scheme is proved in the random oracle model by reducing the discrete logarithm problem(DLP) whereas the security proof of the previous ID-based signatures for VANET was incomplete.

Efficient Hierarchical Mobility Management Scheme for Mobile Content Centric Networking (이동 컨텐츠 중심 네트워크에서의 효율적인 계층적 이동성 관리 방안)

  • Lee, Jihoon;Lee, Juyong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.37-41
    • /
    • 2018
  • As individuals generate and share various content anytime and anywhere, new networking architectures, such as content-centric networking (CCN) using the content name as a packet identifier, have been in the spotlight recently. However, the current CCN hardly takes into account node mobility problems, especially the mobility of content sources. The movement of content sources causes long delivery latency and long service disruptions. To solve that, the tunneling-based redirection scheme was proposed. However, the tunneling-based scheme requires a location-update procedure whenever the network changes, which creates many control messages and causes long latency. So, this paper presents hierarchical mobility management of mobile CCN to reduce the number of control messages and handoff latency. Performance evaluation shows that the proposed scheme can provide low control overhead, which results in network scalability.