• Title/Summary/Keyword: Multi-networking

검색결과 253건 처리시간 0.026초

The Critical Factors Affecting Cultural Resources-based Regional Development Strategy (문화자원에 기반을 둔 지역발전전략에 미치는 영향요인 특성과 중요도 분석)

  • Lee, Soonja
    • The Journal of the Korea Contents Association
    • /
    • 제17권7호
    • /
    • pp.546-556
    • /
    • 2017
  • This study aims to find out the key factors that could influence on regional development strategy to use cultural resources. The methods employed are Meta-analysis with 61 case studies in order to draw related factors and Analytic Hierarchy Process with 68 experts in order to analyze the relative importance of important factors. The main findings are as follows: 26 critical factors are drawn from the case studies and they could be classified into four categories, named as 'the capacity building to excavate and utilize cultural resources which are having potential power', 'the establishment of institutional basis for making projects good progress', 'the boosting of internal capability of locals in the process of project', and 'the preparation of cultural governance and multidirectional networking strategies among persons concerned or stakeholder'. The analysis of relative importance of factors shows that among others, 'the capacity building to excavate and utilize cultural resources which are having potential power' is the most fundamental factors to achieve policy goals. There are few studies that have drawn factors from multi-case studies. In this respect, it is far from being complete but meaningful to a little more enhance the generalization of research findings.

Modeling End-to-End Throughput of Multiple Flows and Efficient Route Selection in Wireless Mesh Networks (무선 메쉬 네트워크에서의 다중 트래픽 흐름을 위한 종단간 처리량 모델링 및 효율적인 라우팅 경로 선택 기법)

  • Wang, Xiaofei;Kwon, Ted Tae-Kyoung;Choi, Yang-Hee
    • Journal of KIISE:Information Networking
    • /
    • 제37권4호
    • /
    • pp.272-283
    • /
    • 2010
  • Wireless Mesh Networks (WMNs) have gained a lot of attention recently. Based on the characteristic of WMNs as a highly connected wireless infrastructure, many efforts from research organizations are made in order to improve the performance of the flow throughput in WMNs. Therefore, it is very critical issue to establish efficient routing paths for multiple concurrent ongoing flows. In this paper, we propose a general modeling methodology to analyze the end-to-end throughput of multiple concurrent flows by analytical calculation taking into account the carrier sensing behaviors, interference and the IEEE 802.11 Distributed Coordination Function mechanism. After the comparison of the average service time for each successful transmission at each node, we analyze the bottlenecks of flows, and hence obtain the maximum end-to-end throughput of them. By using our proposed model, it is possible to predicate the throughput of several candidate routing paths for multiple concurrent ongoing data flows, so we can select the most efficient route that can achieve the highest throughput. We carry out simulations with various traffic patterns of multiple flows in WMNs to validate our modeling and our efficient route selection mechanism.

Tuple Pruning Using Bloom Filter for Packet Classification (패킷 분류를 위한 블룸 필터 이용 튜플 제거 알고리즘)

  • Kim, So-Yeon;Lim, Hye-Sook
    • Journal of KIISE:Information Networking
    • /
    • 제37권3호
    • /
    • pp.175-186
    • /
    • 2010
  • Due to the emergence of new application programs and the fast growth of Internet users, Internet routers are required to provide the quality of services according to the class of input packets, which is identified by wire-speed packet classification. For a pre-defined rule set, by performing multi-dimensional search using various header fields of an input packet, packet classification determines the highest priority rule matching to the input packet. Efficient packet classification algorithms have been widely studied. Tuple pruning algorithm provides fast classification performance using hash-based search against the candidate tuples that may include matching rules. Bloom filter is an efficient data structure composed of a bit vector which represents the membership information of each element included in a given set. It is used as a pre-filter determining whether a specific input is a member of a set or not. This paper proposes new tuple pruning algorithms using Bloom filters, which effectively remove unnecessary tuples which do not include matching rules. Using the database known to be similar to actual rule sets used in Internet routers, simulation results show that the proposed tuple pruning algorithm provides faster packet classification as well as consumes smaller memory amount compared with the previous tuple pruning algorithm.

Joint Uplink/Downlink Co-Opportunistic Scheduling Technique in WLANs (무선랜 환경에서 협동 상향/하향 링크 기회적 스케줄링 기법)

  • Yoo, Joon;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • 제34권6호
    • /
    • pp.514-524
    • /
    • 2007
  • Recent advances in the speed of multi-rate wireless local area networks (WLANs) and the proliferation of WLAN devices have made rate adaptive, opportunistic scheduling critical for throughput optimization. As WLAN traffic evolves to be more symmetric due to the emerging new applications such as VoWLAN, collaborative download, and peer-to-peer file sharing, opportunistic scheduling at the downlink becomes insufficient for optimized utilization of the single shared wireless channel. However, opportunistic scheduling on the uplink of a WLAN is challenging because wireless channel condition is dynamic and asymmetric. Each transmitting client has to probe the access point to maintain the updated channel conditions at the access point. Moreover, the scheduling decisions must be coordinated at all clients for consistency. This paper presents JUDS, a joint uplink/downlink opportunistic scheduling for WLANs. Through synergistic integration of both the uplink and the downlink scheduling, JUDS maximizes channel diversity at significantly reduced scheduling overhead. It also enforces fair channel sharing between the downlink and uplink traffic. Through extensive QualNet simulations, we show that JUDS improves the overall throughput by up to 127% and achieves close-to-perfect fairness between uplink and downlink traffic.

A Specific Characters of Products In viewpoint of Inter-combination with Human -Concentrated on Inter-Combined Products′Type and Feather- (인간과 인터컴비네이션 관점에서의 제품특성연구 -상호결합제품의 유형과 특징을 중심으로-)

  • 진선태;박영목
    • Archives of design research
    • /
    • 제14권3호
    • /
    • pp.145-154
    • /
    • 2001
  • These days, the products like Walkman, mobile phone, notebook PC, PDA are moving together with our body, and in the imaginary world like internet, our other self, Avatar is moving in place of our body on the cyber world. These products are related with our human body, and when considering the ones, attached to the human body, and having the meaning of mental combination like these, as the combination of the human and the products, it is necessary to examine these products in approaching them with respect to the combination relation between the human and the products. As a result of examining we can understand that the products, said to combine with the human body, are coming oui steadily. and recently, the inclination on the combination and the movement appears strongly. As this background, there are a breakdown of dichotomy thought, mixed sexual imitation, cyber culture, techno culture. concept of informative nomands, phenomenon which the division of human and machine becomes vague. and the miniaturization of products. imitation of human, phenomenon that the Inclination on the combination with human is more accelerated by networking. These products combine with human body at each wearing type in the various forms. Its functions become multi-layered, and closer to the human body physically. or its communication becomes high·graded and, they have the recombined form through the existing products which the human has And, they communicate each other. have the strong fashionable property, and the characteristics like the imaginary product to imitate the human body and substitute for the human behave.

  • PDF

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • 제32권6호
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

Relationship between Characteristics of Lengthy Hospital Stay Patients, Knowledge of Transfer Needs and Their Willingness to Transfer - Strategies for the Effective Transfer of Lengthy Hospital Stay Patients - (장기재원환자의 특성 및 전원 인지도와 전원 의향과의 관계 - 장기재원환자의 효율적 전원을 위한 전략 제시 -)

  • Kang, Eun Sook;Tark, Kwan-Chul;Lee, Taewha;Kim, In Sook
    • Quality Improvement in Health Care
    • /
    • 제9권2호
    • /
    • pp.116-133
    • /
    • 2002
  • Background : It is very common in Korea to take care of non-acute patients in an acute setting, due to the lack of long-term facilities. Long term hospitalization increase medical expenses and decreases the bed utilization, which can affect the urgent and emergent admissions, and eventually jeopardize the hospital financially. In this study, strategies for effective transfers to the lower levels of care, and to decrease the length of stay were presented by surveying and analyzing the patient's knowledge of the transfer needs, and the willingness to transfer those whose hospital length of stay was more than 30days. Method : The survey is subject to a group of 251 patients who have been hospitalized over 30 days in a general hospital in Seoul. Excluding those that were in the Intensive Care Unit and psychiatric ward, 214 in-patients were used as participants. They were surveyed from April 9, 2002 to April 17, 2002. One hundred and thirty seven out of 214 were responded which made the response rate 64%. Data were analyzed by SAS and SPSS. Result : Multi-variable Logistic Regression Analysis showed a significant effect in medical expenses, knowledge of referral system and the information of the receiving hospital. The financial burden in medical expenses made the patient 10.7 times more willing to be transferred, knowledge of the referral system made them 5 times more willing to be transferred, and the information of receiving hospital makes 6.5 times more willing to be transferred. Reasons for willing to be transferred to a lower level of care were the phase of physical therapy, the distance from home, the attending physician's advice and being unable to be treated as an out patient. Reasons for refusing to be transferred were the following. The attending physician's competency, not being ready to be discharged, not trusting the receiving hospital's competency due to the lack of information, or never hearing about the referring system by the attending physician. Conclusion : Based on this, strategies for the effective transfer to the lower levels of care were suggested. It is desirable for the attending physician to be actively involved by making an effort to explain the transfer need, and referring to the Healthcare Coordinating Center, which can help the patient make the right decision. Nationwide networking for the referral system is the another key factor that may need to be suggested as an alternative to decrease the medical expenses. Collaborating with the Home Health Agency for the early discharge planning and the Social Service Department for financial aid are also needed. It is recommended that the hospital should expedite the transfer process by prioritizing the cost and the information as medical expenses, knowledge of referring system and the information of the receiving hospital, are the most important factors to the willingness to transfer to a lower level of care.

  • PDF

Offline Friend Recommendation using Mobile Context and Online Friend Network Information based on Tensor Factorization (모바일 상황정보와 온라인 친구네트워크정보 기반 텐서 분해를 통한 오프라인 친구 추천 기법)

  • Kim, Kyungmin;Kim, Taehun;Hyun, Soon. J
    • KIISE Transactions on Computing Practices
    • /
    • 제22권8호
    • /
    • pp.375-380
    • /
    • 2016
  • The proliferation of online social networking services (OSNSs) and smartphones has enabled people to easily make friends with a large number of users in the online communities, and interact with each other. This leads to an increase in the usage rate of OSNSs. However, individuals who have immersed into their digital lives, prioritizing the virtual world against the real one, become more and more isolated in the physical world. Thus, their socialization processes that are undertaken only through lots of face-to-face interactions and trial-and-errors are apt to be neglected via 'Add Friend' kind of functions in OSNSs. In this paper, we present a friend recommendation system based on the on/off-line contextual information for the OSNS users to have more serendipitous offline interactions. In order to accomplish this, we modeled both offline information (i.e., place visit history) collected from a user's smartphone on a 3D tensor, and online social data (i.e., friend relationships) from Facebook on a matrix. We then recommended like-minded people and encouraged their offline interactions. We evaluated the users' satisfaction based on a real-world dataset collected from 43 users (12 on-campus users and 31 users randomly selected from Facebook friends of on-campus users).

An Energy-Balancing Technique using Spatial Autocorrelation for Wireless Sensor Networks (공간적 자기상관성을 이용한 무선 센서 네트워크 에너지 균등화 기법)

  • Jeong, Hyo-nam;Hwang, Jun
    • Journal of Internet Computing and Services
    • /
    • 제17권6호
    • /
    • pp.33-39
    • /
    • 2016
  • With recent advances in sensor technology, CMOS-based semiconductor devices and networking protocol, the areas for application of wireless sensor networks greatly expanded and diversified. Such diversification of uses for wireless sensor networks creates a multitude of beneficial possibilities for several industries. In the application of wireless sensor networks for monitoring systems' data transmission process from the sensor node to the sink node, transmission through multi-hop paths have been used. Also mobile sink techniques have been applied. However, high energy costs, unbalanced energy consumption of nodes and time gaps between the measured data values and the actual value have created a need for advancement. Therefore, this thesis proposes a new model which alleviates these problems. To reduce the communication costs due to frequent data exchange, a State Prediction Model has been developed to predict the situation of the peripheral node using a geographic autocorrelation of sensor nodes constituting the wireless sensor networks. Also, a Risk Analysis Model has developed to quickly alert the monitoring system of any fatal abnormalities when they occur. Simulation results have shown, in the case of applying the State Prediction Model, errors were smaller than otherwise. When the Risk Analysis Model is applied, the data transfer latency was reduced. The results of this study are expected to be utilized in any efficient communication method for wireless sensor network monitoring systems where all nodes are able to identify their geographic location.

Cinematic Circulation of Meta-verse and Meta-physics (메타버스와 메타피직스의 영화적 순환)

  • Shim, Kwang-hyun
    • Trans-
    • /
    • 제12권
    • /
    • pp.81-106
    • /
    • 2022
  • The possibility of metaverse system to be a catalyst for hyper-connected society will be dependent on the speed of connected technological development and its social utilization in the same manner as AI technology. Putting these technical realization processes in brackets, this paper focus on some philosophical-political issues in connection with cognitive-ecological changes in the future cinema which will be influenced by the complexive techno-socio couples of accelerated development of metaverse system. Generally speaking, essence of metaverse system seems to be the degree of immersion by technical accuracy, but is not true. In perspective of cognitive-ecology, flow degree of a picture or photograph is relied not on 'accuracy of representation' but on its message's contextual link-up. In this aspect, real potentiality of metaverse system shall be understood in the context of cognitive-ecological changes of human brain's multi-intelligence networking abilities(intersection of augmentation-simulation and outside-inside) which will be activated in the new structure of natural-social-technological coupling of metaverse system. These cognitive-ecological potentialities have been partially actualized in the cinematic process of tripod mimesis for the longest time, [real contradiction/conflicts (Mimesis-1) -->fictional solutions of cinema (Mimesis-2) --> selective interpretation of spectator's wish fulfillment (Mimesis-3) --> real change (Mimesis-1')]. Therefore metaverse's real potentiality must be considered to be dependent on the possibility of deepening and extending of cinematic circulation between real seperation/problems and ideal connection/solutions. In this context, advanced metaverse system can be compared as a modern technical version of ideal circulation of physics and metaphysics