• Title/Summary/Keyword: mobile cluster

Search Result 308, Processing Time 0.033 seconds

Process Evaluation of a Mobile Weight Loss Intervention for Truck Drivers

  • Wipfli, Brad;Hanson, Ginger;Anger, Kent;Elliot, Diane L.;Bodner, Todd;Stevens, Victor;Olson, Ryan
    • Safety and Health at Work
    • /
    • v.10 no.1
    • /
    • pp.95-102
    • /
    • 2019
  • Background: In a cluster-randomized trial, the Safety and Health Involvement For Truck drivers intervention produced statistically significant and medically meaningful weight loss at 6 months (-3.31 kg between-group difference). The current manuscript evaluates the relative impact of intervention components on study outcomes among participants in the intervention condition who reported for a post-intervention health assessment (n = 134) to encourage the adoption of effective tactics and inform future replications, tailoring, and enhancements. Methods: The Safety and Health Involvement For Truck drivers intervention was implemented in a Web-based computer and smartphone-accessible format and included a group weight loss competition and body weight and behavioral self-monitoring with feedback, computer-based training, and motivational interviewing. Indices were calculated to reflect engagement patterns for these components, and generalized linear models quantified predictive relationships between participation in intervention components and outcomes. Results: Participants who completed the full program-defined dose of the intervention had significantly greater weight loss than those who did not. Behavioral self-monitoring, computer-based training, and health coaching were significant predictors of dietary changes, whereas behavioral and body weight self-monitoring was the only significant predictor of changes in physical activity. Behavioral and body weight self-monitoring was the strongest predictor of weight loss. Conclusion: Web-based self-monitoring of body weight and health behaviors was a particularly impactful tactic in our mobile health intervention. Findings advance the science of behavior change in mobile health intervention delivery and inform the development of health programs for dispersed populations.

The Improvement of NDF(No Defect Found) on Mobile Device Using Datamining (데이터 마이닝 기법을 활용한 Mobile Device NDF(No Defect Found) 개선)

  • Lee, Jewang;Han, Chang Hee
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.1
    • /
    • pp.60-70
    • /
    • 2021
  • Recently, with the development of technologies for the fourth industrial revolution, convergence and complex technology are being applied to aircraft, electronic home appliances and mobile devices, and the number of parts used is increasing. Increasing the number of parts and the application of convergence technologies such as HW (hardware) and SW (software) are increasing the No Defect Found (NDF) phenomenon in which the defect is not reproduced or the cause of the defect cannot be identified in the subsequent investigation systems after the discovery of the defect in the product. The NDF phenomenon is a major problem when dealing with complex technical systems, and its consequences may be manifested in decreased safety and dependability and increased life cycle costs. Until now, NDF-related prior studies have been mainly focused on the NDF cost estimation, the cause and impact analysis of NDF in qualitative terms. And there have been no specific methodologies or examples of a working-level perspective to reduce NDF. The purpose of this study is to present a practical methodology for reducing NDF phenomena through data mining methods using quantitative data accumulated in the enterprise. In this study, we performed a cluster analysis using market defects and design-related variables of mobile devices. And then, by analyzing the characteristics of groups with high NDF ratios, we presented improvement directions in terms of design and after service policies. This is significant in solving NDF problems from a practical perspective in the company.

Security Design for Efficient Detection of Misbehavior Node in MANET (MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계)

  • Hwang, Yoon-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.408-420
    • /
    • 2010
  • On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.

Fuzzy Relevance-Based Clustering for Routing Performance Enhancement in Wireless Ad-Hoc Networks (무선 애드 혹 네트워크상에서 라우팅 성능 향상을 위한 퍼지 적합도 기반 클러스터링)

  • Lee, Chong-Deuk
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.4
    • /
    • pp.495-503
    • /
    • 2010
  • The clustering is an important mechanism thai provides information for mobile nodes efficiently and improves the processing capacity for routing and the allocation of bandwidth. This paper proposes a clustering scheme based on the fuzzy relevance degree to solve problems such as node distribution found in the dynamic property due to mobility and flat structure and to enhance the routing performance. The proposed scheme uses the fuzzy relevance degree, ${\alpha}$, to select the cluster head for clustering in FSV (Fuzzy State Viewing) structure. The fuzzy relevance ${\alpha}$ plays the role in CH selection that processes the clustering in FSV. The proposed clustering scheme is used to solve problems found in existing 1-hop and 2-hop clustering schemes. NS-2 simulator is used to verify the performance of the proposed scheme by simulation. In the simulation the proposed scheme is compared with schemes such as Lowest-ID, MOBIC, and SCA. The simulation result showed that the proposed scheme has better performance than the other existing compared schemes.

The Global Distribution Direction of Defense Industry in Eastern Europe under the New Cooperation Strengthened (신 협력 강화에 따른 동유럽 방위산업의 국제유통방향)

  • Seo, Dae-Sung;Coo, Byung-Mo
    • Journal of Distribution Science
    • /
    • v.15 no.1
    • /
    • pp.83-93
    • /
    • 2017
  • Purpose - After the transition, the development of defense industry in Eastern Europe has been regressed. Recently, they have internationally recognized that new products have been exported and contributed to the Innovation-Based Manufacturing of national economy such as unmanned reconnaissance aircraft, water purification technology, and mobile chemical laboratory, etc. The military forces in Eastern Europe are re-armed by the localization of self-produced munitions in their own defense industry, and then emphasize fostering their own defense industry. Thus, if they make a collaboration with other nations as a industrial cluster, it will gain a competitive edge on the defense industry. Research design, data, and methodology - The study was designed with the data of each national defense department. The research of the subject was reviewed before and after the transition. Thousands of workers have worked in defense industries before the transition, however, the defense industry and experts left after the transition. The Hungarian defense spending on GDP also dropped sharply from 1.72% in 2000 to 0.85% in 2013. But, due to the crisis in Ukraine and the crisis of Syrian refugees, the Viségrad Group (V4) member countries have also increased their interest in a defense and industries as well as the confidence in the EU and NATO. Results - On the whole, the joint of military training and purchase of defense materials were found in order to form the EU cooperative combat troops in CEE. There are the implementation of a joint manual plan for strengthening V4 security policy and the joint military exercises for V4 every year, and the others are electronic warfare and innovation of V4 national forces. Through such a performance analysis methodology, we found that the defense industry is developed through the national cluster cooperation among CEEs and spreading global distribution. Conclusions - Eastern Europe and Balkan countries have been looking forward to cooperating with the non-EU countries such as Korea and other defense industries. There are a lot of potential development into a new civilian cooperation defense industry for global-distribution. Thus, Korea should develop electronic commercial applications, not just as a weapon exporting region.

An Energy Effective Protocol for Clustering Ad Hoc Network

  • Lee, Kang-Whan;Chen, Yun
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.2
    • /
    • pp.117-121
    • /
    • 2008
  • In ad hoc network, the scarce energy management of the mobile devices has become a critical issue in order to extend the network lifetime. Therefore, the energy consumption is important in the routing design, otherwise cluster schemes are efficient in energy conserving. For the above reasons, an Energy conserving Context aware Clustering algorithm (ECC) is proposed to establish the network clustering structure, and a routing algorithm is introduced to choose the Optimal Energy Routing Protocol (OERP) path in this paper. Because in ad hoc network, the topology, nodes residual energy and energy consuming rate are dynamic changing. The network system should react continuously and rapidly to the changing conditions, and make corresponding action according different conditions. So we use the context aware computing to actualize the cluster head node, the routing path choosing. In this paper, we consider a novel routing protocol using the cluster schemes to find the optimal energy routing path based on a special topology structure of Resilient Ontology Multicasting Routing Protocol (RODMRP). The RODMRP is one of the hierarchical ad hoc network structure which combines the advantage of the tree based and the mesh based network. This scheme divides the nodes in different level found on the node energy condition, and the clustering is established based on the levels. This protocol considered the residual energy of the nodes and the total consuming energy ratio on the routing path to get the energy efficiently routing. The proposed networks scheme could get better improve the awareness for data to achieve and performance on their clustering establishment and messages transmission. Also, by using the context aware computing, according to the condition and the rules defined, the sensor nodes could adjust their behaviors correspondingly to improve the network routing.

An Efficient Flooding Scheme using Clusters in Mobile Ad-Hoc Networks (애드 혹 네트워크에서 클러스터를 이용한 효율적인 플러딩 방안)

  • Wang Gi-cheol;Kim Tae-yeon;Cho Gi-hwan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.696-704
    • /
    • 2005
  • Flooding is usually utilized to find a multi hop route toward the destination which is not within transmission range in Ad Hoc networks. However, existing flooding schemes deteriorate the network performance because of periodic message exchanges, frequent occurrence of collisions, and redundant packet transmission. To resolve this, a flooding scheme using on demand cluster formation is proposed in this paper. The scheme employs ongoing Packets for constructing a cluster architecture as the existing on demand clustering scheme. Unlike to the existing on demand clustering scheme, the scheme makes use of unicast packet transmission to reduce the number of collisions and to find the flooding candidates easily. As a result, the proposed scheme yields fewer flooding nodes than other schemes. Simulation results proved that the proposed scheme reduces the number of transmissions and collisions than those of two other schemes.

A Proposal for Drone Entity Identification and Secure Information Provision Technology Using Quantum Entropy Chip-Based Cryptographic Module in WLAN Environment (무선랜 환경에서 양자 엔트로피 칩 기반 암호모듈을 적용한 드론 피아식별과 안전한 정보 제공 기술 제안)

  • Jung, Seowoo;Yun, Seunghwan;Yi, Okyeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.891-898
    • /
    • 2022
  • Along with global interest, drones are expanding the base of utilization such as transportation of goods, forest protection, and safety management, and cluster flights are being applied in various fields such as military operations and environmental monitoring. Currently, specialized networks such as e-UM 5G for services in specific industries are being established in Korea. In this regard, drone systems are also moving to establish specialized networks to provide services that are fused with AI and autonomous flight. As drones converge with various services, various security threats in various environments are also subordinated, and in response, requirements and guidelines for drone security are being prepared in Korea. In this paper, we propose a technology method for peer identification and safe information provision between cluster flight drones by utilizing a cryptographic module equipped with wireless LAN and quantum entropy-based random number generator in a cluster flight system and a mobile communication network such as e-UM 5G.

A Research on Low-power Buffer Management Algorithm based on Deep Q-Learning approach for IoT Networks (IoT 네트워크에서의 심층 강화학습 기반 저전력 버퍼 관리 기법에 관한 연구)

  • Song, Taewon
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.4
    • /
    • pp.1-7
    • /
    • 2022
  • As the number of IoT devices increases, power management of the cluster head, which acts as a gateway between the cluster and sink nodes in the IoT network, becomes crucial. Particularly when the cluster head is a mobile wireless terminal, the power consumption of the IoT network must be minimized over its lifetime. In addition, the delay of information transmission in the IoT network is one of the primary metrics for rapid information collecting in the IoT network. In this paper, we propose a low-power buffer management algorithm that takes into account the information transmission delay in an IoT network. By forwarding or skipping received packets utilizing deep Q learning employed in deep reinforcement learning methods, the suggested method is able to reduce power consumption while decreasing transmission delay level. The proposed approach is demonstrated to reduce power consumption and to improve delay relative to the existing buffer management technique used as a comparison in slotted ALOHA protocol.

The study on the social network service quality of companies in Mobile Environment -focusing on the difference of recognition depending on the level of commitment and loyalty- (모바일 환경에서 기업의 소셜네트워크 서비스 품질에 관한 연구 -몰입 및 충성도에 따른 집단간 인식차이를 중심으로-)

  • Kim, Sang-Hyuck;Yang, Jae-Hoon
    • International Commerce and Information Review
    • /
    • v.14 no.3
    • /
    • pp.539-558
    • /
    • 2012
  • The purpose of this study is examining the differences of mobile SNS's service quality, which consists data quality and system quality, among the groups that are classified by commitment and customer loyalty. For the experimental analysis, the frequency analysis was performed for general characteristics of sample. The variables were selected by factor analysis that also prove the validity of variables. The value of Cronbach's alpha was calculated to check the reliability of variables. In addition, the group was determined by the both hierarchical and hierarchical cluster analysis, then ANOVA was performed to test the hypotheses that there are differences of mobile SNS's service quality, among the groups that are classified by commitment and customer loyalty. The results of this study support that there are differences among the groups toward mobile SNS's service quality and also shows the more commitment and loyalty group is the higher recognition of mobile SNS's service quality. Thus, the companies have to realize that mobile SNS is very important key factor to success in rapidly changing business environment. In conclusion, the companies implement different customized strategy for the different group and develop the contents and the applications to maximize the commitment and loyalty of for the mobile SNS users.

  • PDF