• Title/Summary/Keyword: Session Patterns

Search Result 67, Processing Time 0.026 seconds

Performance Analysis of Cost-Effective Location and Service Management Schemes in LTE Networks (LTE 네트워크에서 비용효과적인 위치 및 서비스 관리 기법의 성능분석)

  • Lee, June-Hee;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.1-16
    • /
    • 2012
  • In this paper, we propose a cost-effective location and service management scheme in LTE (Long Term Evolution) networks, which a per-user service proxy is created to serve as a gateway between the mobile user and all client-server applications engaged by the mobile user. The service proxy is always co-located with the mobile user's location database such that whenever the MU's location database moves during a location hand-off, a service hand-off also ensues to co-locate the service proxy with the location database. This allows the proxy to know the location of the mobile user all the time to reduce the network communication cost for service delivery. We analyze four integrated location and service management schemes. Our results show that the centralized scheme performs the best when the mobile user's SMR (service to mobility ratio) is low and ${\upsilon}$(session to mobility ratio) is high, while the fully distributed scheme performs the best when both SMR and ${\upsilon}$ are high. In all other conditions, the dynamic anchor scheme is the best except when the service context transfer cost is high under which the static anchor scheme performs the best. Through analytical results, we demonstrate that different users with vastly different mobility and service patterns should adopt different integrated location and service management methods to optimize system performance.

Effects of corrective exercises on selective functional movement assessment and health risk appraisal in middle-aged women

  • Kim, Jae Eun;Kim, Cheong;Kim, Sinseop
    • Physical Therapy Rehabilitation Science
    • /
    • v.5 no.4
    • /
    • pp.185-192
    • /
    • 2016
  • Objective: The purpose of this study was to find the limited patterns of middle-aged women in selective functional movement evaluation and analyze the effects of pattern improvement exercises and general control groups on the Health Risk Appraisal (HRA). Design: Randomized controlled trial. Methods: The 31 subjects were physically healthy middle-aged women aged 40-59 living in Seoul, The subjects were randomly divided into an experimental group and a control group. Forty-three physically healthy women were originally recruited and randomly assigned to either the experimental group (n=22) or the control group (n=21). However, due to lack of participation, a total of seventeen subjects in the exercise group and fourteen subjects in the control group participated in the study. All subjects were tested using Selective Functional Movement Assessment (SFMA) and HRA for the baseline measurement and joined an exercise program of their group for one hour per session, twice a week for four weeks. The experimental group was provided with the corrective exercises and the control group was given the general fitness program. A follow-up test was conducted after eight weeks from the baseline measurement. Results: Both experimental and control group showed significant changes in SFMA and HRA scores (p<0.05). In the experimental group and control groups, the SFMA and HRA showed significant improvement from baseline to 4 weeks (p<0.05). Also, in the experimental group, the SFMA was significantly improved from baseline to 8 weeks (p<0.05). For the experimental group, there was a significant improvement in SFMA after 4 weeks compared to the control group (p<0.05). Conclusions: The corrective exercise in the experimental group had a positive effect on the SFMA score as well as the general squat exercise in the control group. The corrective exercise and general control group had the same positive effect on the HRA score.

Secure Handoff Based on Dual Session Keys in Mobile IP with AAA (Mobile IP 및 AAA 프로토콜 기반으로 신속성과 안전성을 고려한 듀얼세션키 핸드오프 방식연구c)

  • Choi Yumi;Lee Hyung-Min;Choo Hyunseung
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.107-119
    • /
    • 2005
  • The Mobile IP has evolved from providing mobility support for portable computers to support wireless handheld devices with high mobility patterns. The Mobile IP secures mobility, but does not guarantee security, In this paper, the Mobile IP has been adapted to allow AM protocol that supports authentication, authorization and accounting for authentication and collection of accounting information of network usage by mobile nodes, For this goal, we propose a new security handoff mechanism to intensify the Mobile IP security and to achieve fast handoff. In the proposed mechanism, we provide enough handoff achievement time to maintain the security of mobile nodes, According to the analysis of modeling result, the proposed mechanism composed the basic Mobile IP along with AM protocol is up to about $60\%$ better in terms of normalized surcharge for the handoff failure rate that considers handoff time.

  • PDF

Effects of Behavior Modification and Aerobic Exercise on the Degree of Obesity, Eating Behavior, Depression and Self Esteem in Obese Adolescent Girls (행동수정프로그램과 에어로빅운동이 비만여중생의 비만도, 식이행동, 우울 및 자아존중감에 미치는 효과)

  • Chaung Seung-Kyo
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.4 no.1
    • /
    • pp.103-117
    • /
    • 1997
  • This study was designed to investigate the effects of behavior medication and aerobic exercise on the degree of obesity, eating behavior, depression and self esteem among adolescent girls who were overweight and obese. Forty seven subjects were selected from one girl's middle school located in Seoul. Seventeen girls received the behavior modification program by joining 60-90 minute group session weekly. Behavior modification, in this study, consisted of self-monitoring, changing patterns of life style and attitudes, teaching nutrition and physical activities, and asking personal help. The aerobic exercise program was given to 16 girls 3 times per week with 60 minutes each time. Forteen girls received both behavior modification and aerobic exercise. These interventions continued for 8 weeks. Changes after intervention were examined twice after 4 weeks and 8 weeks for degree of obesity and once after 8 weeks only for eating behavior, depression and self esteem. The results were as follows ; 1. Degree of obesity was significantly decreased after 4 weeks and 8 weeks in 3 groups. Degree of obesity after 4 weeks and 8 weeks were not significantly different among 3 groups. 2. The mean score of eating behavior related to obesity decresed significantly after intervention in the behavior modification group only. There was significant difference in eating behavior among 3 groups after intervention. 3. The behavior modification group showed no significant changes in depression and self esteem after intervention. In the aerobic exercise group and group who participated in both behavior modification and aerobic exercise, the level of depression decreased significantly and the level of self esteem increased significantly. There were no significant differences in the level of depression and self esteem among 3 groups after intervention. These findings indicate that behavior modification might be effective in decreasing degree of obesity and eating behavior related to obesity, aerobic exercise be effective in decreasing degree of obesity and the level of depression, and also in increasing the level of self esteem.

  • PDF

Effects of an Integrated Breast Health Program according to Stages of Breast Cancer Risk Appraisal (유방암 위험평가 단계에 따른 통합적 유방건강관리 프로그램의 효과)

  • Hur, Hea-Kung;Kim, Gi-Yon;Kim, Chang-Hee;Park, Jong-Ku;Koh, Sang-Baek;Park, So-Mi
    • Korean Journal of Health Education and Promotion
    • /
    • v.26 no.1
    • /
    • pp.15-26
    • /
    • 2009
  • Objectives: The current study evaluated the effects of an integrated breast health program according to levels of breast cancer risk appraisal on knowledge on breast cancer, early detection behaviors, and diet patterns and attitudes in Korean healthy women. Method: A nonequivalent control group pre-posttest design was used. A total of 413 women aged 40-59, registering at the Life Long Health Center in two cities, were classified into intervention groups of 179 women and control groups of 234 women. The integrated breast health program included education, counseling on breast cancer, early detection behaviors, and appropriate diet with multimedia and individual practice session using breast models, reflecting characteristics of each level according to levels of risk appraisal. The knowledge on breast cancer, early detection behaviors, and diet were investigated using questionnaires at baseline and three months after intervention. Results: In both normal and borderline-risk group, intervention groups reported significantly higher scores of knowledge on breast cancer and higher stages of BSE behaviors than control groups. Conclusion: The results showed positive effects on knowledge and early detection behaviors of breast cancer in normal and borderline-risk groups. Further studies should investigate longitudinal effects of the intervention program on dietary change.

An X-masking Scheme for Logic Built-In Self-Test Using a Phase-Shifting Network (위상천이 네트워크를 사용한 X-마스크 기법)

  • Song, Dong-Sup;Kang, Sung-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.2
    • /
    • pp.127-138
    • /
    • 2007
  • In this paper, we propose a new X-masking scheme for utilizing logic built-in self-test The new scheme exploits the phase-shifting network which is based on the shift-and-add property of maximum length pseudorandom binary sequences(m-sequences). The phase-shifting network generates mask-patterns to multiple scan chains by appropriately shifting the m-sequence of an LFSR. The number of shifts required to generate each scan chain mask pattern can be dynamically reconfigured during a test session. An iterative simulation procedure to synthesize the phase-shifting network is proposed. Because the number of candidates for phase-shifting that can generate a scan chain mask pattern are very large, the proposed X-masking scheme reduce the hardware overhead efficiently. Experimental results demonstrate that the proposed X-masking technique requires less storage and hardware overhead with the conventional methods.

Poor Fibrinolytic Response on a Single Bout Exercise Intensity and Time in Male Chronic Ischemic Stroke Patient (남성 만성기 허혈성 뇌졸중환자의 운동강도 및 시간에 대한 Poor Fibrinolytic Response)

  • Kang, Dong-Yeon;Lee, Hye-Young;Kim, Kyoung
    • The Journal of Korean Physical Therapy
    • /
    • v.25 no.4
    • /
    • pp.224-231
    • /
    • 2013
  • Purpose: The purpose of this case study was to investigate three poor fibrinolytic responders with chronic ischemic stroke to acute exercise intensity and time. Methods: Three ischemic stroke patients (male) from the stroke center located at Busan metropolitan area in Republic of Korea volunteered at this study. They performed two single session exercises that were a VO2peak test and a single bout treadmill walking (70-75%HRpeak, 30 min, 50min). Fasting blood samples for determination of tissue Plasminogen Activator (tPA) and Plasminogen Activator Inhibitor-1 (PAI-1) were obtained before, immediately after, 30min after acute exercise. SPSS 12.0 was used for analyzing of data and computing mean and standard deviation, and change rate was conducted between times. Results: In fibrinolytic activity according to the intensity and time of acute exercise, tPA change increased steadily during the recovery stage after the VO2peak in the cases, but PAI-1 activity showed different patterns among the cases. In a single bout treadmill walking (70-75%HRpeak, 30 min, 50min), tPA change increased between 30min and 50min. Conclusion: In conclusion, these results suggest that the exercise prescription for poor fibrinolytic responder with three male chronic ischemic stroke patients without motor disability recommend at 70-75%HRpeak, over 30min.

Relationship between the Ball Velocity and Upper Extremity Kinematic Variables during an Overarm Throwing Task of Inexperienced Individuals

  • Ozkaya, Gizem;Jung, Hae Ryun;Jeong, In Sub;Choi, Min Ra;Shin, Min Young;Lin, Xue;Heo, Woo Seong;Kim, Mi Sun;Lee, Ki Kwang
    • Korean Journal of Applied Biomechanics
    • /
    • v.27 no.1
    • /
    • pp.19-23
    • /
    • 2017
  • Objective: The aim of this study was to investigate the relationship between the ball velocity and the upper extremity kinematics for both dominant and non-dominant side in inexperienced participants about an overarm throwing task. Method: Seven women who are inexperienced in overarm throwing participated in this study (Age: $25.1{\pm}2.4years$, Height: $160.8{\pm}3.5$; Weight $56.5{\pm}7.8$). Participants visit the laboratory for three days with one day rest between test sessions. Whole body 3-dimensional (3D) motion capture was recorded during the overarm throwing trials with ten cameras Vicon motion analysis system (T-10, T40, Oxford Metrics Ltd, UK). Total 45 overarm throwing were recorded for each side for each test session. Ball speed also was measured 3 meters away behind the subjects and recorded for every trial. Results: Mean ball velocity was higher for dominant hand compared to non-dominant hand (p <.05). Trunk segment variables (maximum angles and angular velocities) showed the most consistent relationship with the ball velocity. Conclusion: The importance of the trunk segment during the throwing activities can be seen in some individuals. But inconsistent results between subjects emphasize the importance of the individuals' movement patterns especially for bilateral sports. The future studies should be conduct about the sequence of segments, kinetic variables and effect of training.

An Analysis on the Internet Uses and Barriers of the Older Adults in Korea (고령층의 인터넷 활용 및 장애 요인 분석)

  • Kim, Heesop;Kim, Pansoo;Lee, Misook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.1
    • /
    • pp.257-276
    • /
    • 2014
  • The purpose of this study is to investigate the patterns and barriers of the Internet for the elderly adults in Korea. Data was collected through the face to face interview using a questionnaire for the residence of Daegu and Kyungsang Buk-Do areas targeted over the 60-years-olds elder adults. A total of 119 valid response data were analyzed with the descriptive statistics and the group differences by age and gender using SPSS 18.00. It found that the most of the elder adults access the Internet to seek the entertainment contents, the knowledge-related contents, and the cultural and art contents. They spend most of the Internet online session to do searching information and enjoying movie and music. However, there were age differences and gender differences within the subjects. The complexity of computer and the Internet usage is one of the barriers for the Internet access, and they suggest that a customized education and training courses of computer literacy for the elderly adults would be the ways of resolve those obstructions.

Attacks and Defenses for Vulnerability of Cross Site Scripting (크로스 사이트 스크립팅(XSS) 취약점에 대한 공격과 방어)

  • Choi, Eun-Jung;Jung, Whi-Chan;Kim, Seung-Yeop
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.177-183
    • /
    • 2015
  • Cross Site Scripting enables hackers to steal other user's information (such as cookie, session etc.) or to do abnormal functions automatically using vulnerability of web application. This attack patterns of Cross Site Scripting(XSS) can be divided into two types. One is Reflect XSS which can be executed in one request for HTTP and its reply, and the other is Stored XSS which attacks those many victim users whoever access to the page which accepted the payload transmitted. To correspond to these XSS attacks, some measures have been suggested. They are data validation for user input, output validation during HTML encoding procedures, and removal of possible risk injection point to prevent from trying to insert malicious code into web application. In this paper, the methods and procedures for these two types are explained and a penetration testing is done. With these suggestions, the attack by XSS could be understood and prepared by its countermeasures.