• Title/Summary/Keyword: full connectivity

Search Result 34, Processing Time 0.032 seconds

Power Saving Algorithm based on Long-term Sleep Period for RFID/USN systems (RFID/USN 시스템 지원을 위한 장기간 수면 기반의 전력 절감 알고리즘)

  • Kang, Yu-Chol;Hwang, Jun-Ho;Yoo, Myung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1426-1434
    • /
    • 2009
  • RFID/USN is considered as a key convergence technology in future ubiquitous network. In RFID/USN, the power saving issue receives a great attention due to limited battery lifetime of sensor node. In this paper, we propose a new power saving algorithm, which takes advantage of long-term sleep period. To provide a full network connectivity and balance the battery consumption among sensor nodes, the proposed algorithm intelligently selects the long-term sleep sensor nodes. With mathematical analysis and simulations, we prove that the proposed algorithm can significantly reduce the power consumption of sensor nodes as compared to existing algorithms.

Design of Wireless HD Image Transmission System with Bidirectional CEC Function (양방향 CEC 기능을 갖는 무선 고화질 이미지 전송 시스템의 설계)

  • Kim, Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.1-9
    • /
    • 2011
  • Nowadays it is necessary to replace electrical wires with another intelligent connection method because the consumers, who have much experience with mobile smart devices, are expecting easier and smarter connectivity in their home electronics such as wireless linking. In this paper a bidirectional CEC control scheme is newly proposed to expand the controllability from one to two way in a millimeter band image transmission system because two degree of freedom controllability presents more intelligent convenience in HDMI interface systems. Experimental study shows the feasibility of the proposed system as an advanced image transmission solution in millimeter band including an intelligent 2 DOF CEC interface with the performance result of 3.0 Gbps transmission band for 1080p full-HD image steaming.

An Efficient Partial Reanalysis Algorithm for the Locally Changed Structures (부분적 강성 변화에 따른 효율적 부분 재해석 알고리즘)

  • Kim Chee-Kyeong
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.17 no.4
    • /
    • pp.459-467
    • /
    • 2004
  • This paper presents an efficient reanalysis algorithm, named PRAS (Partial Reanalysis algorithm using Adaptable Substructuring), for the partially changed structures. The algorithm recalculates directly any displacement or member force under consideration in real time without a full reanalysis in spite of local changes in member stiffness or connectivity_ The key procedures consists of 1) partitioning the whole structure into the changed part and the unchanged part, 2) condensing the internal degrees of freedom and forming the unchanged part substructure, 3) assembling and solving the new stiffness matrix from the unchanged part substructure and the changed members.

Strategic Choices of Small States in Asymmetric Dependence: Myanmar - China Relations through the case of the Myitsone Dam

  • Eszterhai, Viktor;Thida, Hnin Mya
    • Journal of Contemporary Eastern Asia
    • /
    • v.20 no.2
    • /
    • pp.157-173
    • /
    • 2021
  • In the transition to a multipolar international system, the literature has focused on great power competition while little attention has been given to the strategic possibilities of smaller states. However, as a result of globalization, states are so closely interconnected that the primary strategies of even major powers are not to achieve zero-sum solutions but to create asymmetric dependency through which they can influence the behavior of other states and non-state actors. States are assisted in this effort by a variety of tools, including setting up institutions, direct economic influence and through building different forms of infrastructure connectivity networks. By discussing asymmetric dependency situations from the perspective of the great powers, the literature presents smaller states primarily as passive actors, paralyzed by their dependence on great powers. Our paper argues that interdependence allows smaller states to effectively influence larger actors and examines strategies from which smaller states can choose in order to influence the behavior of larger states. Despite an extremely asymmetric relationship between Myanmar and China, actors in Myanmar have sought to influence China's Myanmar policy. We examine a case study of the Myitsone Dam, including Myanmar's strategic aims, chosen strategy and limitations in maneuvering space. Semi-structured interviews with local decision-makers and stakeholders are conducted in order to portray the full picture. Our study concludes that further research on the influencing strategies of small states in response to asymmetric dependence can contribute to a better understanding of the interdependence of states.

Knowledge Graph of Administrative Codes in Korea: The Case for Improving Data Quality and Interlinking of Public Data

  • Haklae Kim
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.3
    • /
    • pp.43-57
    • /
    • 2023
  • Government codes are created and utilized to streamline and standardize government administrative procedures. They are generally employed in government information systems. Because they are included in open datasets of public data, users must be able to understand them. However, information that can be used to comprehend administrative code is lost during the process of releasing data in the government system, making it difficult for data consumers to grasp the code and limiting the connection or convergence of different datasets that use the same code.This study proposes a way to employ the administrative code produced by the Korean government as a standard in a public data environment on a regular basis. Because consumers of public data are barred from accessing government systems, a means of universal access to administrative code is required. An ontology model is used to represent the administrative code's data structure and meaning, and the full administrative code is built as a knowledge graph. The knowledge graph thus created is used to assess the accuracy and connection of administrative codes in public data. The method proposed in this study has the potential to increase the quality of coded information in public data as well as data connectivity.

Development of Personalized Respiratory Training Device with Real-time Feedback for Respiratory Muscle Strengthening

  • Merve Nur Uygun;Yeong-geol Bae;Yejin Choi;Dae-Sung Park
    • Physical Therapy Rehabilitation Science
    • /
    • v.12 no.3
    • /
    • pp.251-258
    • /
    • 2023
  • Objective: The practice of breathing exercises involves altering the depth and frequency of respiration. Strengthening respiratory muscles plays a crucial role in maintaining overall health and well-being. The efficiency of the respiratory system affects not only physical activity but also various physiological processes including cardiovascular health, lung function, and cognitive abilities. The study evaluated the reliability of the developed device for inspiratory/expiratory training using pressure sensors and Bluetooth connectivity with a smartphone application. Design: Design & development research Methods: The research methodology involved connecting a custom-made respiratory sensor to an IMT-PEP BIC Breath device. Various pressure conditions were measured, and statistical analyses were performed to assess reliability and consistency. Results showed high Intraclass Coefficient Correlation (ICC) values for both inspiratory and expiratory pressures, indicating strong test-retest reliability. The device was designed for ease of use and wireless monitoring through a smartphone app. Results: This study conducted at expiratory pressure confirmed the proper operation of the IMT/PEP breathing trainer at the specified pressure setting in the product. The pressure sensor demonstrated high test-retest reliability with an ICC value of 0.999 for both expiratory and inspiratory pressure measurements. Conclusions: The developed respiratory training device measured and monitored inspiratory and expiratory pressures, demonstrating its reliability for respiratory training. The system could be utilized to record training frequency and intensity, providing potential benefits for patients requiring respiratory interventions. Further research is needed to assess the full potential of the device in diverse populations and applications.

Analysis of Control Performance using RPS System (RPS 시스템을 이용한 차량 제어 특성 해석)

  • Kim, Hyo-Juu;Lee, Chang-Ro
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.5
    • /
    • pp.160-166
    • /
    • 2018
  • This paper proposes an advanced suspension system and reports its performance in the framework of the preview control algorithm based on the RPS (road profile sensing) system and MSD system with the multi-stage damping characteristics. Typical disturbance inputs that cause excessive vibration and steering instability of an automobile are irregular obstacles that protrude or sink into the road surface to be driven. The control performance can be improved if information on the existence and shape function of its obstacle is known. Based on the results of the previous study, advanced research that uses the actuating system has been processed to be commercialized practically. For this purpose, a switching algorithm between the control logic and the multi-stage damping system was developed and its connectivity is presented. To verify the applicability of an actual vehicle, the proposed control system was implemented in full vehicle models and simulations were performed. The proposed system using the 3-DS actuator system, which is applied for structural simplicity, can improve the ride comfort and steering stability. In addition, the results indicate the feasibility of the intelligently controlled suspension system.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

Method on Constructing Precision Population-statistical Map Integrating GIS and National Census Data for Location Analysis (GIS와 국가인구통계자료 통합에 의한 입지분석용 정밀인구통계지도 구축 방법)

  • Lee, Yong-Ik;Hong, Sung-Eon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3302-3307
    • /
    • 2009
  • The objective of the present study lies in providing the method to construct the precision population-statistical map for statistical demographics making full advantage of GIS and the national census data in an attempt to improve accuracy and reliability of population estimation applicable for a variety of location analysis. More specifically, it adopts the multiple regression analysis by segmented land use type(biotope) taking into account that the land use diversified as residence, commercial and office areas has the close connectivity and interdependence with population. Based on the analyzed result above, the study finalizes the modeling to construct demographic map with higher precision by prioritizing the population density by weight value and then re-distributing the population according to jurisdictional dong's and types of use for the land. The study consequently is expected to be conducive to improving precision and reliability rather than the existing method for population estimation widely acceptable thus far.

3GPP LTE-Assisted Wi-Fi-Direct: Trial Implementation of Live D2D Technology

  • Pyattaev, Alexander;Hosek, Jiri;Johnsson, Kerstin;Krkos, Radko;Gerasimenko, Mikhail;Masek, Pavel;Ometov, Aleksandr;Andreev, Sergey;Sedy, Jakub;Novotny, Vit;Koucheryavy, Yevgeni
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.877-887
    • /
    • 2015
  • This paper is a first-hand summary on our comprehensive live trial of cellular-assisted device-to-device (D2D) communications currently being ratified by the standards community for next-generation mobile broadband networks. In our test implementation, we employ a full-featured 3GPP LTE network deployment and augment it with all necessary support to provide realtime D2D connectivity over emerging Wi-Fi-Direct (WFD) technology. As a result, our LTE-assisted WFD D2D system enjoys the required flexibility while meeting the existing standards in every feasible detail. Further, this paper provides an account on the extensive measurement campaign conducted with our implementation. The resulting real-world measurements from this campaign quantify the numerical effects of D2D functionality on the resultant system performance. Consequently, they shed light on the general applicability of LTE-assisted WFD solutions and associated operational ranges.