• 제목/요약/키워드: Primary-secondary user

검색결과 199건 처리시간 0.023초

Immediate Effect of Foot Drop Stimulator in Outpatients with Chronic Stroke: A Mixed Method Study

  • Park, Jaeyoung;Lee, Dooho;Oh, Donghwan
    • Journal of International Academy of Physical Therapy Research
    • /
    • 제11권1호
    • /
    • pp.1992-1998
    • /
    • 2020
  • Background: The foot drop stimulator is designed to improve the walking ability of foot drop in patients after stroke, however, studies on clinical effects are still lacking. Objective: To investigate the effect of a foot drop stimulator on the walking and balancing abilities of foot drop patients after a stroke. Design: One-Group (Pretest-Posttest) Design. Methods: All subjects walked in all three conditions: foot drop stimulator (FDS) ankle foot orthosis (AFO) and barefoot. Primary outcome measures were assessed for walking and balance using a 10-m walking test (10MWT) and a timed up and go test (TUG). Secondary outcome measures consisted of a brief user interview, and the patients recorded the advantages and disadvantages of each condition. Results: FDS, AFO, and barefoot conditions showed a statistically significant difference in 10MWT and TUG (P<.001) as a result of comparing three conditions. FDS and AFO were significantly different from the barefoot condition as post-hoc results; however, there was no significant difference between the two conditions (P>.05). Conclusion: In this study, the foot drop stimulator contributed to improving the balance ability, and the walking ability was similar to the effect of the ankle-foot orthosis.

The impact of technology on resource sharing (정보기술이 자원공유에 미치는 영향)

  • 이영자
    • Journal of Korean Library and Information Science Society
    • /
    • 제22권
    • /
    • pp.205-244
    • /
    • 1995
  • Originally the concept of the traditional resource sharing has been discussed in the context of bibliographic materials, and has been labor-intensive and high-cost activities. The technology has had a great impact on such pattern of the resource sharing, and has expanded the limited scope of the traditional concept into the sharing of library information in the levels of local, regional and national systems, and expertise, materials, facilities, equipments and personnels of the library system. While the traditional circulation service as a basic method to share library materials by users can provide the resource to a single person at a time, the electronic resource can be shared, by multi-users at a time anytime anywhere. The maximization of the electronic resource sharing requires that publishing process should be fundamentally changed and articles, books, chapters, speech manuscripts, music scores, maps, sound, and other formats of materials should be prepared in machine readable format. This study examined the positive effects of the technology on the resource sharing, but not investigate the concrete and complex problems as to the cost, guidelines, detailed procedures, design details, and intellectual properties and protection involved in the resource sharing. Some findings extracted from the study can be summarized as follows; (1) ILL will lose its meaning as a method to share the materials if they are all in the electronic format and the phrase 'networked information resource' becomes omnipresent. (2) The technology keeps on changing the concept of resource sharing. Today, the scope of resource sharing not only encompasses the sharing of the primary and secondary materials but also the sharing of the processings(eg. cataloging), expertise, user education, special facilities, and the integrated automated library systems. (3) The sharing of the networked resource will be a method to provide better services for library users in the low cost. (4) The a n.0, pplication of the technology to the resource sharing should be focus on the method which allows an end-users to do the direct access to the needed materials, and to be delivered the primary document as soon as possible.

  • PDF

Design of Security Module using Key Exchange Protocol in Digital Contents (키 교환 프로토콜을 이용한 디지털콘텐츠 보호 모듈 설계)

  • 권도윤;이경원;김정호
    • The Journal of the Korea Contents Association
    • /
    • 제3권3호
    • /
    • pp.40-46
    • /
    • 2003
  • In the paper, designed digital contents security module to check unlawfulness reproduction and distribution of digital contents. This paper applied Diffie-Hellman algorithm that use discrete logarithm and random number as primary for public key application to create encryption key that agree each other through communication channel between DCPS and HOST, and applied Triple DES repeat DES 3 times through 2 different encryption key that is selecting ANSI X9.17 that is key management standard, ISO 8732 and PEM(Privacy-Enhanced Mail) etc. by secondary protection for safe transmission of digital contents in transmission line. Designed security module consist of key exchange module, key derivation module and copy protection processing module. Digital contents security module that design in this thesis checks reproduction and distribution of digital contents by unauthenticated user through user certification function and digital contents encryption function, and protect digital contents transmission line.

  • PDF

Probabilistic Constrained Approach for Distributed Robust Beamforming Design in Cognitive Two-way Relay Networks

  • Chen, Xueyan;Guo, Li;Dong, Chao;Lin, Jiaru;Li, Xingwang;Cavalcante, Charles Casimiro
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권1호
    • /
    • pp.21-40
    • /
    • 2018
  • In this paper, we propose the distributed robust beamforming design scheme in cognitive two-way amplify-and-forward (AF) relay networks with imperfect channel state information (CSI). Assuming the CSI errors follow a complex Gaussian distribution, the objective of this paper is to design the robust beamformer which minimizes the total transmit power of the collaborative relays. This design will guarantee the outage probability of signal-to-interference-plus-noise ratio (SINR) beyond a target level at each secondary user (SU), and satisfies the outage probability of interference generated on the primary user (PU) above the predetermined maximum tolerable interference power. Due to the multiple CSI uncertainties in the two-way transmission, the probabilistic constrained optimization problem is intractable and difficult to obtain a closed-form solution. To deal with this, we reformulate the problem to the standard form through a series of matrix transformations. We then accomplish the problem by using the probabilistic approach based on two sorts of Bernstein-type inequalities and the worst-case approach based on S-Procedure. The simulation results indicate that the robust beamforming designs based on the probabilistic method and the worst-case method are both robust to the CSI errors. Meanwhile, the probabilistic method can provide higher feasibility rate and consumes less power.

A Call Admission Control Using Markovian Queueing Model for Multi-services Cognitive Radio Networks (멀티 서비스 무선 인지 망을 위한 마르코프 큐잉모델을 이용한 호 수락 제어)

  • Lee, Jin-Yi
    • Journal of Advanced Navigation Technology
    • /
    • 제18권4호
    • /
    • pp.347-352
    • /
    • 2014
  • In this paper, we propose a Markovian queueing model(M/M/1)-based call admission control to reduce forced terminating rate of non-real secondary user's call for Multi-services Cognitive Radio Networks. A existing control has a problem that the forced terminating rate increases because of adopting a policy of spectrum priority allocation to real calls. In our scheme the rate can be reduced as the call that has no useful spectrum waits in a queue until getting an available spectrum. Our scheme use a neural-net based prediction of primary user's reappearance. Through the simulation, we analysis the call forced terminating rate, access delay and spectrum utilization efficiency, and then show that our scheme can more reduce the forced terminating rate of the call, compared to that of the existing algorithm.

Unlimited Cooperative Sensing with Energy Detection for Cognitive Radio

  • Bae, Sunghwan;Kim, Hongseok
    • Journal of Communications and Networks
    • /
    • 제16권2호
    • /
    • pp.172-182
    • /
    • 2014
  • In this paper, we investigate the fundamental performance limits of the cooperative sensing using energy detection by considering the unlimited number of sensing nodes. Although a lot of cognitive radio research so far proposed various uses of energy detection because of its simplicity, the performance limits of energy detection have not been studied when a large number of sensing nodes exist. First, we show that when the sensing nodes see the independent and identically distributed channel conditions, then as the number of sensing nodes N goes to infinity, the OR rule of hard decision achieves zero of false alarm Pf for any given target probability of detection $\bar{P_d}$ irrespective of the non-zero received primary user signal to noise ratio ${\gamma}$. Second, we show that under the same condition, when the AND rule of hard decision is used, there exists a lower bound of $P_f$. Interestingly, however, for given $\bar{P_d}$, $P_f$ goes to 1 as N goes to infinity. Third, we show that when the soft decision is used, there exists a way of achieving 100% utilization of secondary user, i.e., the sensing time overhead ratio goes to zero so does $P_f$.We verify our analyses by performing extensive simulations of the proposed unlimited cooperative sensing. Finally, we suggest a way of incorporating the unlimited cooperative sensing into a practical cellular system such as long term evolutionadvanced by exploiting the existing frame structure of absolute blank subframe to implement the in-band sensing.

Performance Analysis of Collaborative Wideband Sensing Scheme based on Energy Detection with User Selection for Cognitive Radio (에너지검출 기반 협력 광대역 센싱에서 사용자 선택에 따른 센싱 성능 분석)

  • Lee, Mi-Sun;Kim, Yoon-Hyun;Kim, Jin-Young
    • Journal of Satellite, Information and Communications
    • /
    • 제6권2호
    • /
    • pp.72-77
    • /
    • 2011
  • Spectrum sensing is a critical functionality of CR network; it allow secondary user to detect spectral holes and to opportunistically use under-utilized frequency bands without causing harmful interference to primary use. Recently, wideband service has been increase for processing abundance of data traffic. So CR network needs a realizable implementation design of spectrum sensing for wideband. To get high resolution performance of wideband sensing must precede algorithm processing for reliability signal detection. By the way, the performance of spectrum sensing can be degraded due to fading and shadowing. In order to overcome this problem, we propose system model of wideband sensing scheme on energy detected collaborative technique. we divide wideband into narrowbands and use narrowbands to detect signal excepting some narrowbands including bad channel through the CSI. And we simulate and analyze in terms of detection probability with various SNR.

Analysis of Teacher's Needs on a Life-cycle System of the Educational Digital Contents through a Case Study of EDUNET (에듀넷 사례를 통한 교육용 디지털 콘텐츠 수명주기에 대한 교사 요구사항 분석)

  • Cha, Hyunjin;Hwang, Yunja
    • The Journal of Korean Association of Computer Education
    • /
    • 제22권3호
    • /
    • pp.101-112
    • /
    • 2019
  • This study aims to draw implications on a life-cycle system of digital contents through a case study about EDUNET in order to maintain the quality and efficiency of the service for educational digital contents in the primary and secondary education area. To achieve the objective, lead teachers in EDUNET service participated in requirements analysis about the life-cycle of the digital contents, for example, contents utilization periods, the periods for being updated, etc. From the results, it was found that a systematic life-cycle framework should be established to re-evaluate the contents in service and provide a quality of contents, responding to consistent changes for educational environments in teaching-learning and for educational topics/directions, or according to educational content's substance such as curriculum or extra-curriculum. This study contributes to suggesting needs to implement the systematic management of contents based on a life-cycle system by analyzing user's requirements in order to provide user-friendly service for the K-12 educational digital contents.

Design and implementation of improved authentication mechanism base on mobile DRM using blockchain (블록체인을 이용한 모바일 DRM 기반 개선된 인증 메커니즘 설계 및 구현)

  • Jeon, Jinl-Oh;Seo, Byeong-Min
    • Journal of Digital Convergence
    • /
    • 제19권4호
    • /
    • pp.133-139
    • /
    • 2021
  • Due to the rapid progress in network technology, many research on content security technologies is also being conducted in the mobile digital content sector. In the meantime, content protection has been immersed in preventing illegal copying, certifying, and issuance/management certificates, but still have many vulnerabilities in managing or authenticating confidential information. This study aims to strengthen confidential information about content based on dual management of content download rights through mobile phone numbers or device numbers. It also protect replay-attack by building a secure mobile DRM system where digital content is safely distributed based on a three-stage user authentication process. In addition, blockchain-based content security enhancements were studied during the primary/secondary process for user authentication for the prevention of piracy and copyright protection. In addition, the client authentication process was further improved through three final stages of authorization in the use of illegal content, considering that legitimate users redistributed their content to third-party.

Robust Inter-MAP Binding Update Scheme in HMIPv6 (HMIPv6 네트워크에서 Robust 한 Inter-MAP 바인딩 업데이트 기법)

  • Jinwook Park;Jongpil Jeong;Hyunseung Choo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2008년도 추계학술발표대회
    • /
    • pp.1387-1390
    • /
    • 2008
  • In a wireless network, handover latency is very important in supporting user mobility with the required quality of service (QoS). In view of this many schemes have been developed which aim to reduce the handover latency. The Hierarchical Mobile IPv6 (HMIPv6) approach is one such scheme which reduces the high handover latency that arises when mobile nodes perform frequent handover in Mobile IPv6 wireless networks. Although HMIPv6 reduces handoff latency, failures in the mobility anchor point (MAP) results in severe disruption or total disconnection that can seriously affect user satisfaction in ongoing sessions between the mobile and its correspondent nodes. HMIPv6 can avoid this situation by using more than one mobility anchor point for each link. In [3], an improved Robust Hierarchical Mobile IPv6 (RH-MIPv6) scheme is presented which enhances the HMIPv6 method by providing a fault-tolerant mobile service using two different MAPs (Primary and Secondary). It has been shown that the RH-MIPv6 scheme can achieve approximately 60% faster recovery times compared with the standard HMIPv6 approach. However, if mobile nodes perform frequent handover in RH-MIPv6, these changes incur a high communication overhead which is configured by two local binding update units (LBUs) as to two MAPs. To reduce this communication overhead, a new cost-reduced binding update scheme is proposed here, which reduces the communication overhead compared to previous schemes, by using an increased number of MAP switches. Using this new proposed method, it is shown that there is a 19.6% performance improvement in terms of the total handover latency.