• Title/Summary/Keyword: Location-aware

Search Result 289, Processing Time 0.028 seconds

A Scalable Explicit Multicast Protocol for MANETs

  • Gossain Hrishikesh;Anand Kumar;Cordeiro Carlos;Agrawal Dharma P.
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.294-306
    • /
    • 2005
  • Group oriented multicast applications are becoming increasingly popular in mobile ad hoc networks (MANETs). Due to dynamic topology of MANETs, stateless multicast protocols are finding increased acceptance since they do not require maintenance of state information at intermediate nodes. Recently, several multicast schemes have been proposed which scale better' with the number of multicast sessions than traditional multicast strategies. These schemes are also known as explicit multicast (Xcast; explicit list of destinations in the packet header) or small group multicast (SGM). In this paper, we propose a new scheme for small group' multicast in MANETs named extended explicit multicast (E2M), which is implemented on top of Xcast and introduces mechanisms to make it scalable with number of group members for a given multicast session. Unlike other schemes, E2M does not make any assumptions related to network topology or node location. It is based on the novel concept of dynamic selection of Xcast forwarders (XFs) between a source and its potential destinations. The XF selection is based on group membership and the processing overhead involved in supporting the Xcast protocol at a given node. If the number of members in a given session is small, E2M behaves just like the basic Xcast scheme with no intermediate XFs. As group membership increases, nodes may dynamically decide to become an XF. This scheme, which can work with few E2M aware nodes in the network, provides transparency of stateless multicast, reduces header processing overhead, minimizes Xcast control traffic, and makes Xcast scalable with the number of group members.

Fast and Accurate Visual Place Recognition Using Street-View Images

  • Lee, Keundong;Lee, Seungjae;Jung, Won Jo;Kim, Kee Tae
    • ETRI Journal
    • /
    • v.39 no.1
    • /
    • pp.97-107
    • /
    • 2017
  • A fast and accurate building-level visual place recognition method built on an image-retrieval scheme using street-view images is proposed. Reference images generated from street-view images usually depict multiple buildings and confusing regions, such as roads, sky, and vehicles, which degrades retrieval accuracy and causes matching ambiguity. The proposed practical database refinement method uses informative reference image and keypoint selection. For database refinement, the method uses a spatial layout of the buildings in the reference image, specifically a building-identification mask image, which is obtained from a prebuilt three-dimensional model of the site. A global-positioning-system-aware retrieval structure is incorporated in it. To evaluate the method, we constructed a dataset over an area of $0.26km^2$. It was comprised of 38,700 reference images and corresponding building-identification mask images. The proposed method removed 25% of the database images using informative reference image selection. It achieved 85.6% recall of the top five candidates in 1.25 s of full processing. The method thus achieved high accuracy at a low computational complexity.

Study on Middle School Student's Perception of School Violence after Preventive Education (중학생의 학교폭력 예방교육에 대한 인식 연구)

  • Kim, Mi Won;Park, Ok Im;Kim, Jin Hee;Park, Joon Sup
    • The Korean Journal of Community Living Science
    • /
    • v.26 no.1
    • /
    • pp.155-166
    • /
    • 2015
  • This thesis attempts to provide a foundation for effective preventative education of middle school students regarding school violence after identifying the level of perception of school violence as well as analyzing perception of preventive education among students. The study compiled data on 474 middle school students from middle schools in Jeollanamdo. The findings of the study are as follows. First, most of the students were aware of the necessity for preventive education regarding school violence. By gender, girls and those of lower grades showed great class participation and satisfaction. Second, research on the preventive education found differences in the seriousness of school violence according to school location. Fourth, preventive education conducted once or twice a month was the most desirable condition for middle school students. As a result, schools should consider gender differences and grade level when, developing an education program in order to prevent school violence.

A Study on the EPCIS Event Data Modeling and Simulation Test (EPCIS Event 데이터 모델링과 시뮬레이션 검증 연구)

  • Li, Zhong-Shi;Lee, Tae-Yun;Piao, Xue-Hua;Da, Dan;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.11 no.2
    • /
    • pp.137-144
    • /
    • 2009
  • EPCIS(EPC Information Services) system is a core component of EPCglobal Architecture Framework offering information of the freights, the time of awareness and the location of awareness on the EPCglobal Network. The role of EPCIS is to exchange information based on EPC. There are four kinds of event data which are object event data, aggregation event data, quantity event data, and transaction event data. These EPCIS events data are stored and managed in EPCIS repository. This study suggest the quantitative modeling about total number of EPCIS event data under the assumption to aware the RFID tags of items, cases(boxes), vehicles(carriers, forklifts, auto guided vehicles, rolltainers) at a time on the reading points. We also estimate the number of created EPCIS event data by the suggested quantitative modeling under scenario of process in the integrated logistics center based on RFID system And this study compare the TO-BE model with the AS-IS model about the total sizes of created EPCIS event data using the simulation, in which we suggested the TO-BE model as the development of the repository by skipping the overlapped records.

A Study of Personalized User Services and Privacy in the Library (도서관의 이용자맞춤형서비스와 프라이버시)

  • Noh, Younghee
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.3
    • /
    • pp.353-384
    • /
    • 2012
  • This study was conducted on the observation that the filter bubble and privacy violation problems are related to the personalized services provided by libraries. This study discussed whether there is the possibility for invasion of privacy when libraries provide services utilizing state-of-the-art technology, such as location-based services, context aware services, RFID-based services, Cloud Services, and book recommendation services. In addition, this study discussed the following three aspects: whether or not users give up their right to privacy when they provide personal information for online services, whether or not there are discussions about users' privacy in domestic libraries, and what kind of risks the filter bubble problem can cause library users and what are possible solutions. This study represents early-stage research on library privacy in Korea, and can be used as basic data for privacy research.

SLAOM: Scalable Location-Aware Overlay Multicast for Ad hoc Networks (애드 혹 망에서 확장성이 있는 이동 기반 오버레이 멀티캐스트)

  • Yu, Fu-Cai;Choi, Young-Hwan;Park, Soo-Chang;Lee, Eui-Sin;Tian, Ye;Park, Ho-Sung;Kim, Sang-Ha
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.235-239
    • /
    • 2007
  • 이동 애드 혹 망에서 노드들의 이동성은 멀티캐스트를 어렵게 한다. 많은 멀티캐스트 프로토콜에서 데이터 전달 구조 구성과 유지를 하기 위해 주기적인 플러딩이 널리 사용된다. 이런 주기적인 플러딩 메시지는 네트워크의 제어 비용을 심각하게 증가시키고, 에너지와 대역폭 자원을 낭비하게 한다. 데이터 전달구조 유지 부담을 줄이기 위해, 많은 비상태 멀티캐스트 프로토콜이 제안되었고 이 프로토콜들은 데이터패킷을 목적지로 보내기 위해 각각의 패킷 안에 목적지 주소 리스트를 적재한다. 그러나 데이터 패킷의 길이가 한정되어 있기 때문에, 목적지 주소 리스트 적재 정책은 프로토콜의 확장성을 제한한다. 이 논문에서는 이동 애드 혹 망을 위한 확장성이 있는 이동 기반 오버레이 멀티캐스트(SLAOM)라는 프로토콜을 제안한다. 이 프로토콜은 데이터 전달 구조 구성과 유지를 위한 주기적인 플러딩이 필요하지 않으며, 각각의 데이터 패킷에 목적지 주소 리스트를 적재할 필요도 없다. 시뮬레이션 결과는 우리의 프로토콜이 데이터 전송률과 제어 비용 면에서 다른 프로토콜들보다 뛰어남을 보여준다.

  • PDF

Priority for the Improvement on Natural Conservation Zone system (자연보전권역 관련 제도개선 우선순위에 관한 연구)

  • Lee, Yun Sang;Ahn, Hyeon;Lee, Mi Hong
    • Land and Housing Review
    • /
    • v.10 no.2
    • /
    • pp.1-13
    • /
    • 2019
  • This study suggests that the system improvement priority of the Natural Conservation Zone of the Metropolitan Area Maintenance Planning Law, which was enacted for about 37 years. First of all, through the precedent research and the consultation meeting, the improvement plan was divided into the short term and the mid(or long) term. Important findings and implications are as follows. The short-term priority results were 'Improve water quality regulation', 'Strengthen individual location regulations of factories and induce multi-use plan position', and 'Improvement of waterfront area regulation', which were both critical and urgent. The mid-term(or Long-term) priority results were 'To integrate development and environmental duplication regulations', 'Abolition and unification of environmental laws', and 'Adjustment and resetting of natural conservation areas', which were both critical and urgent. On the other hand, 76.4% of the residents and 64.5% of the experts are concerned about the necessity of improvement of the Natural Conservation Zone system. Both residents and experts seem to be aware of the necessity. Opinions about Improvement and mitigation of regulations on Natural Conservation Zone that were constantly raised. In the past, there was a temporary and fragmented institutional mitigation of the government. However, with the rapid development of eco-friendly technologies since 2010, Our Country Conditions is in a transition period. This study has significant implications for the improvement and mitigation of metropolitan area regulations.

Role based access control of healthcare information system for Mobile environments (모바일 환경에 적합한 헬스 케어 정보 시스템에서의 역할기반 접근제어)

  • Lee You-Ri;Park Dong-Gue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.119-132
    • /
    • 2005
  • The health care system revolutionized by the use of information and communication technologies. Computer information processing and electronic communication technologies play an increasingly important role in the area of health care. We propose a new role based access control model for pervasive health care systems, which changed location, time, environment information. Also our model can be solved the occurrence of an reduction authority problem to pervasive health care system at emergency environment. We propose a new role based access control model for pervasive health care systems, which combines role-to-role delegations, negative permission, context concept and dynamic context aware access control. With out approach we aim to preserver the advantages of RBAC and offer groat flexibility and fine-grained access control in pervasive healthcare information systems.

  • PDF

Localization Method in Wireless Sensor Networks using Fuzzy Modeling and Genetic Algorithm (퍼지 모델링과 유전자 알고리즘을 이용한 무선 센서 네트워크에서 위치추정)

  • Yun, Suk-Hyun;Lee, Jae-Hun;Chung, Woo-Yong;Kim, Eun-Tai
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.4
    • /
    • pp.530-536
    • /
    • 2008
  • Localization is one of the fundamental problems in wireless sensor networks (WSNs) that forms the basis for many location-aware applications. Localization in WSNs is to determine the position of node based on the known positions of several nodes. Most of previous localization method use triangulation or multilateration based on the angle of arrival (AOA) or distance measurements. In this paper, we propose an enhanced centroid localization method based on edge weights of adjacent nodes using fuzzy modeling and genetic algorithm when node connectivities are known. The simulation results shows that our proposed centroid method is more accurate than the simple centroid method using connectivity only.

Location-Aware System Design using the Bluetooth Protocol Stack (BlueZ) of Linux in Ubiquitous computing application (리눅스 블루투스 프로토콜 스택(BlueZ)을 이용한 위치 인식 시스템 설계)

  • Lee, Jae-Woo;Kim, Jin-Hyung;Cho, We-Duke
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10b
    • /
    • pp.285-290
    • /
    • 2007
  • 본 논문에서 구현하고자 하는 유비쿼터스 컴퓨팅 응용에 필요한 위치 인식 시스템의 주 요소는 블루투스 프로토콜 스택(BlueZ)에서 제공하는 RSSI(Received Signal Strength Indicator) 값을 측정하는 블루투스 AP, 측정된 RSSI 값을 위치 인식 서버에 전달하기 위한 무선 AP 공유기 그리고, 받은 데이터로 위치 값을 측정하는 위치 인식 서버 및 Context Broker(고 수준의 상황 정보를 추론하는 서버 역할)로 이루어져있다. 전체적인 동작 시스템은 위치 값을 측정하고자 하는 이동 매제(마스터)를 중심으로 최대 여덟 개까지 네트워크가 가능한 블루투스 AP(슬레이브)장치로 구성된 피코넷(Piconet) 영역에서 삼각측량 필요에 적절한 세 개의 블루투스 AP를 RSSI값을 이용하여 분류 한 후 이동 매체의 위치를 측정한다. 그 결과로 나온 데이터는 피코넷 영역에서 가장 가까운 무선 AP 공유기를 거쳐서 위치 값을 측정하는 위치 인식 서버에 전달한 후, 그 결과 값으로 Context Broker에서 상황 정보를 추론해서 Community Manager에서 유비쿼터스 컴퓨팅 응용에 맞게 서비스를 구현한다. 또한, 위와 같은 시스템 내부 구조 된 데이터처리는 리눅스 운영체제 내에서 디바이스 드라이버와 사용자 프로그램으로 구현된다.

  • PDF