• Title/Summary/Keyword: discovery framework

Search Result 91, Processing Time 0.03 seconds

MUVIS: Multi-Source Video Streaming Service over WLANs

  • Li Danjue;Chuah Chen-Nee;Cheung Gene;Yoo S. J. Ben
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.144-156
    • /
    • 2005
  • Video streaming over wireless networks is challenging due to node mobility and high channel error rate. In this paper, we propose a multi-source video streaming (MUVIS) system to support high quality video streaming service over IEEE 802.1l-based wireless networks. We begin by collocating a streaming proxy with the wireless access point to help leverage both the media server and peers in the WLAN. By tracking the peer mobility patterns and performing content discovery among peers, we construct a multi-source sender group and stream video using a rate-distortion optimized scheme. We formulate such a multi-source streaming scenario as a combinatorial packet scheduling problem and introduce the concept of asynchronous clocks to decouple the problem into three steps. First, we decide the membership of the multisource sender group based on the mobility pattern tracking, available video content in each peer and the bandwidth each peer allocates to the multi-source streaming service. Then, we select one sender from the sender group in each optimization instance using asynchronous clocks. Finally, we apply the point-to-point rate-distortion optimization framework between the selected sender-receiver pair. In addition, we implement two different caching strategies, simple caching simple fetching (SCSF) and distortion minimized smart caching (DMSC), in the proxy to investigate the effect of caching on the streaming performance. To design more realistic simulation models, we use the empirical results from corporate wireless networks to generate node mobility. Simulation results show that our proposed multi-source streaming scheme has better performance than the traditional server-only streaming scheme and that proxy-based caching can potentially improve video streaming performance.

The Characteristics of Habin Sin Hu-Dam's Method of Interpreting Zhouyi (신후담(愼後聃) 『주역(周易)』 해석의 특징 - 정주(程朱)역학, 성호(星湖)역학, 다산(茶山)역학 등의 해석을 상호비교 하며 -)

  • Lee, Chang-il
    • The Journal of Korean Philosophical History
    • /
    • no.52
    • /
    • pp.37-67
    • /
    • 2017
  • This article is to examine the characteristics of Habin Sin Hu-Dam's method of interpreting Zhouyi and to review its position in Zhouyi history of Joseon Dynasty. Especially, there has been drown attention to the connection both Habin and Tasan Cheong Yagyong. Habin is a philosopher who consistently interprets Zhouyi through the inner logic of it, not through Neo-confucian framework of it. The inner logic is yaobian theory, which is found through investigating the auguries in the old Books of Confucianism. It could be said that this discovery is the Habin's original one, although there may be historically connections between him and Seong-Ho School in the interpreting methodology about Zhouyi. However, at a future date this logic is found in Tasan. There are no connections between two philosophers, but it may be said that they arrive at the common method of interpreting Zhouyi through investigating the auguries in the old Books of Confucianism. We find that their common methods of interpreting Zhouyi do not keep to authoritative interpretation, but there is the passion of searching for Zhouyi the way as it is.

Insect Pest Resistance to Insecticides and Future Researches (해충의 살충제저항성과 금후대책)

  • Choi Seung Yoon
    • Korean journal of applied entomology
    • /
    • v.22 no.2 s.55
    • /
    • pp.98-105
    • /
    • 1983
  • The rapid increase in cases of insect resistance to insecticides indicates that the contribution of present chemical control practices inevitably leads to exhaustion of available insecticide resources against key insect species. Now the problem of insecticide resistance exists worldwide among insects and mites affecting field crops and animals including human beings, ranging from minimal or absent in some developing countries, where use of insecticides has been low, to extremely severe in many developed countries. Since the occurrence of insect resistance to insecticides was firstly recognized in 1908, the increase in recent decades has been almost linear and now the number of species of insects and acarines in which resistant strains have evolved have been increased to a total of 432. Of these, $261(60\%)$ are agricultural importance and $171(40\%)$ of medical/veterinary importance. The phenomenon of insecticide resistance is asserting itself as the greatest challenge to effective chemical control of many important insect pests. Resistance of insects to insecticides has a history of nearly 80 years, but its greatest increase and its strongest impact have occurred during the last 40 years following the discovery and extensive use of synthetic organic insecticides and acaricides. The impact of resistance should be considered not only in terms of greater cost of pest control due to increased dosages and number of applications but also in terms of the ecological disruption of pest-beneficial species density relationships, the loss of investment in the development of the insecticides concerned, and socio-economic disruption in agricultural communities. Despite its grave economic consequences, the phenomenon of insecticide resistance has received surprisingly little attention in Korea. Since the study of insecticides started firstly in 1963, many entomologists have been concerned with this study. According to their results, some of the rice pests and some of the mites on orchard trees, for example, have developed worrisome level of resistance in several areas of this peninsula. With many arthropods, considerable advances in the developed countries have been made in the study of the biochemical and physiological mechanisms of resistance. Progress involves the biochemical characteristics of specific defense mechanisms, their genetics, interactions, and their quantitative and qualitative contribution to resistance. But their studies arc still inadequately known and relatively little have been contributed in terms of unique schemes of population management in achieving satisfactory pest control. It is apparent that there is no easy solution to resistance as a general phenomenon. For future challenging to effective control of insect pests which are resistant to the insecticides concerned, new insecticide groups with distinctly novel mode of action are urgently needed. It is clear, however, that a great understanding of the factors which govern the intensity of selection of field population for resistance could lead to far more permanently successive use of chemicals within the framework of integrated pest management than heretofore practiced.

  • PDF

Distribute Intelligent Multi-Agent Technology for User Service in Ubiquitous Environment (유비쿼터스 환경의 사용자 서비스를 위한 분산 지능형 에이전트 기술)

  • Choi, Jung-Hwa;Choi, Yong-June;Park, Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.9
    • /
    • pp.817-827
    • /
    • 2007
  • In the age of ubiquitous environment, huge number of devices and computing services are provided to users. Personalized service, which is modeled according to the character of each and every individual is of particular need. In order to provide various dynamic services according to user's movement, service unit and operating mode should be able to operate automatically with minimum user intervention. In this paper, we discuss the steps of offering approximate service based on user's request in ubiquitous environment. First, we present our simulator designed for modeling the physical resource and computing object in smart space - the infrastructure in ubiquitous. Second, intelligent agents, which we developed based on a FIPA specification compliant multi-agent framework will be discussed. These intelligent agents are developed for achieving the service goal through cooperation between distributed agents. Third, we propose an automated service discovery and composition method in heterogeneous environment using semantic message communication between agents, according to the movement by the user interacting with the service available in the smart space. Fourth, we provide personalized service through agent monitoring anytime, anywhere from user's profile information stored on handhold device. Therefore, our research provides high quality service more than general automated service operation.

The Decision-Making Journey of Malaysian Women with Early Breast Cancer: A Qualitative Study

  • Abdullah, Adina;Abdullah, Khatijah Lim;Yip, Cheng Har;Teo, Soo-Hwang;Taib, Nur Aishah;Ng, Chirk Jenn
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.12
    • /
    • pp.7143-7147
    • /
    • 2013
  • Background: The survival outcomes for women presenting with early breast cancer are influenced by treatment decisions. In Malaysia, survival outcome is generally poor due to late presentation. Of those who present early, many refuse treatment for complementary therapy. Objective: This study aimed to explore the decision making experiences of women with early breast cancer. Materials and Methods: A qualitative study using individual in-depth interviews was conducted to capture the decision making process of women with early breast cancer in Malaysia. We used purposive sampling to recruit women yet to undergo surgical treatment. A total of eight participants consented and were interviewed using a semi-structured interview guide. These women were recruited from a period of one week after they were informed of their diagnoses. A topic guide, based on the Ottawa decision support framework (ODSF), was used to facilitate the interviews, which were audio recorded, transcribed and analysed using a thematic approach. Results: We identified four phases in the decision-making process of women with early breast cancer: discovery (pre-diagnosis); confirmatory ('receiving bad news'); deliberation; and decision (making a decision). These phases ranged from when women first discovered abnormalities in their breasts to them making final surgical treatment decisions. Information was vital in guiding these women. Support from family members, friends, healthcare professionals as well as survivors also has an influencing role. However, the final say on treatment decision was from themselves. Conclusions: The treatment decision for women with early breast cancer in Malaysia is a result of information they gather on their decision making journey. This journey starts with diagnosis. The women's spouses, friends, family members and healthcare professionals play different roles as information providers and supporters at different stages of treatment decisions. However, the final treatment decision is influenced mainly by women's own experiences, knowledge and understanding.

Integrated Security Management with MCGA in IPv6 Network (IPv6 네트워크 환경에서 MCGA를 고려한 통합적인 보안관리 방안)

  • Oh, Ha-Young;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.27-38
    • /
    • 2007
  • IPv6 has appeared for solving the address exhaustion of IPv4 and for guaranteeing the problems of security and QoS. It occurs the unexpected new attacks of IPv6 as well as the existing attacks of IPv4 because of the increasing address space to 128bits and the address hierarchies for efficient network management and additions of the new messages between nodes and routers like neighbor discovery and auto address configuration for the various comfortable services. For the successful transition from IPv4 to IPv6, we should get the secure compatibility between IPv4 hosts or routers working based on secure and systematic policy and IPv6. Network manager should design security technologies for efficient management in IPv4/IPv6 co-existence network and IPv6 network and security management framework designation. In this paper, we inspected the characteristics of IPv4 and IPv6, study on security requirement for efficient security management of various attacks, protocol, service in IPv4/IPv6 co-existence and IPv6 network, and finally suggest integrated solution about security vulnerability of IPv6 network in considering of analysis of IPv6 system, host and application, IPv6 characteristics, modified CGA(MCGA).

A Study on Current Status of Detection Technology and Establishment of National Detection Regime against Nuclear/Radiological Terrorism (핵테러/방사능테러 탐지 기술 현황 및 국내 탐지체계 구축 방안에 관한 연구)

  • Kwak, Sung-Woo;Jang, Sung-Soon;Lee, Joung-Hoon;Yoo, Ho-Sik
    • Journal of Radiation Protection and Research
    • /
    • v.34 no.3
    • /
    • pp.115-120
    • /
    • 2009
  • Since 1990s, some events - detection of a dirty bomb in a Russian nation park in 1995, 9/11 terrorist attack to WTC in 2001, discovery of Al-Qaeda's experimentation to build a dirty bomb in 2003 etc - have showed that nuclear or radiological terrorism relating to radioactive materials (hereinafter "radioactive materials" is referred to as "nuclear material, nuclear spent fuel and radioactive source") is not incredible but serious and credible threat. Thus, to respond to the new threat, the international community has not only strengthened security and physical protection of radioactive materials but also established prevention of and response to illicit trafficking of radioactive materials. In this regard, our government has enacted or revised the national regulatory framework with a view to improving security of radioactive materials and joined the international convention or agreement to meet this international trend. For the purpose of prevention of nuclear/radiological terrorism, this paper reviews physical characteristics of nuclear material and existing detection instruments used for prevention of illicit trafficking. Finally, national detection regime against nuclear/radiological terrorism based on paths of the smuggled radioactive materials to terrorist's target building/area, national topography and road networks, and defence-in-depth concept is suggested in this paper. This study should contribute to protect people's health, safety and environment from nuclear/radiological terrorism.

Habitual Fallacy or Intentional Propaganda: Understanding the Mechanism of Re-constructing North Korean Myth (관습적 오류 혹은 의도적 프로파간다: 북한관련 '의혹'의 실체적 진실과 담론 왜곡의 구조)

  • Kim, Sunghae;Lu, Liu;Kim, Tongkyu
    • Korean Journal of Legislative Studies
    • /
    • v.23 no.1
    • /
    • pp.187-226
    • /
    • 2017
  • North Korea discourse is doubtful. A considerable portion is distorted under political objectives, group identity, and interests. Surely, there are facts based on North Korea's conducts. Apparent deceptions commonly exist as well though. Korean media does not endeavor to set the records straight and there are no revision towards mislead information. This is substantially dangerous as it can misjudge North Korean policies, beget national antipathy, and interferes with rational and constructive policy making. This study stems from such concerns and takes such cases as HEU(Highly Enriched Uranium) suspicion of 2002, dispute covering BDA(Banco Delta Asia)'s counterfeiting, and the abandonment of the Geneva Agreed Framework into consideration. The first part concentrates on fathoming the truth of the three cases. References from US government, academia, think tanks, media were inquired with an addition of secondary material from Korea and China. Secondly it examines whether domestic news properly reflects the precedent facts along the process of discovery. The cause and solution suggested by domestic media were organized and inductively reconstituted to frames. The last study questions the structural factors that reproduces suspicion analogs. Today's dangers facing Korean society are essentially not natural but artificial. This research hopes to foster peace by analyzing related discourses that are infamous to reinterpret reality.

Development of Imagery-Focused Music Listening Program to Improve Emotion Regulation Among Infertile Women (난임 여성의 정서조절기술 향상을 위한 심상 중심 음악감상 프로그램 개발)

  • Rho, Yoonhee
    • Journal of Music and Human Behavior
    • /
    • v.17 no.2
    • /
    • pp.29-56
    • /
    • 2020
  • The purpose of this study was to develop and validate an imagery-focused music listening program for improving emotion regulation among infertile women. For the program development in this study, the literature on emotional issues and coping strategy of infertile women was analyzed to establish theoretical foundation; and the literature on Supportive Music and Imagery (SMI) was analyzed to identify intervention components. Based on the established theoretical framework, the program was developed and finalized after evaluation of validity by four SMI professionals. The developed program was found to systematically target changes in emotions in the step-wise process of discovery, reinforcement, and affirmation of positive emotional resources. The list of music for future use was also identified and presented after systematic analysis of musical features in relation to valence and arousal of emotions. The imagery-focused music listening program was an initial approach to infertile women with SMI, which indicates the possibility of extended application for broadened clinical population.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.