• Title/Summary/Keyword: shared behavior control

Search Result 24, Processing Time 0.026 seconds

Evolution of a Robotic Cane

  • Yoon, Joong-Sun;Kim, Jin-Young
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.5
    • /
    • pp.635-641
    • /
    • 2004
  • A human-friendly interactive system that is based on the harmonious symbiotic coexistence of human and robots is explored. Based on interactive technology paradigm, a robotic cane is proposed for blind or visually impaired travelers to navigate safely and quickly through obstacles and other hazards faced by blind pedestrians. Robotic aids, such as robotic canes, require cooperation between human and robots. Various methods for implementing the appropriate cooperative recognition, planning, and acting, have been investigated. The issues discussed include the interaction of human and robot, design issues of an interactive robotic cane, and behavior arbitration methodologies for navigation planning.

Oncologists Experience with Second Primary Cancer Screening: Current Practices and Barriers and Potential Solutions

  • Shin, Dong-Wook;Kim, Yeol;Baek, Young-Ji;Mo, Ha-Na;Choi, Jin-Young;Cho, Ju-Hee
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.2
    • /
    • pp.671-676
    • /
    • 2012
  • Objectives: Screening for second primary cancer (SPC) is one of the key components of cancer survivorship care. The aim of the present study was to explore oncologists' experience with promoting second primary cancer screening. Methods: Two focus group interviews were conducted with 12 oncologists of diverse backgrounds. Recurrent issues were identified and placed into thematic categories. Results: Most of the oncologists did not consider SPC screening promotion as their responsibility and did not cover it in routine care. All of the study participants had experience with unexpected SPC cases, and they were under emotional tress. There was no systematic manner of providing SPC screening. Oncologists usually prescribe SPC screening in response to patients' requests, and there was no active promotion of SPC screening. Short consultation time, limited knowledge about cancer screening, no established guideline for SPC screening, and disagreement with patients about oncologists' roles were major barriers to its promotion. An institution-based shared care model was suggested as a potential solution for promoting SPC screening given current oncology practices in Korea. Conclusion: Oncologists could not effectively deal with the occurrence of SPC, and they were not actively promoting SPC screening. Lack of knowledge, limited health care resources, and no established guidelines were major barriers for promoting SPC screening to cancer survivors. More active involvement of oncologists and a systematic approach such as shared-care models would be necessary for promoting SPC screening considering increasing number of cancer survivors who are vulnerable.

Cross-Layer Architecture for QoS Provisioning in Wireless Multimedia Sensor Networks

  • Farooq, Muhammad Omer;St-Hilaire, Marc;Kunz, Thomas
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.178-202
    • /
    • 2012
  • In this paper, we first survey cross-layer architectures for Wireless Sensor Networks (WSNs) and Wireless Multimedia Sensor Networks (WMSNs). Afterwards, we propose a novel cross-layer architecture for QoS provisioning in clustered and multi-hop based WMSNs. The proposed architecture provides support for multiple network-based applications on a single sensor node. For supporting multiple applications on a single node, an area in memory is reserved where each application can store its network protocols settings. Furthermore, the proposed cross-layer architecture supports heterogeneous flows by classifying WMSN traffic into six traffic classes. The architecture incorporates a service differentiation module for QoS provisioning in WMSNs. The service differentiation module defines the forwarding behavior corresponding to each traffic class. The forwarding behavior is primarily determined by the priority of the traffic class, moreover the service differentiation module allocates bandwidth to each traffic class with goals to maximize network utilization and avoid starvation of low priority flows. The proposal incorporates the congestion detection and control algorithm. Upon detection of congestion, the congested node makes an estimate of the data rate that should be used by the node itself and its one-hop away upstream nodes. While estimating the data rate, the congested node considers the characteristics of different traffic classes along with their total bandwidth usage. The architecture uses a shared database to enable cross-layer interactions. Application's network protocol settings and the interaction with the shared database is done through a cross-layer optimization middleware.

Performance Improvement of Parallel Processing System through Runtime Adaptation (실행시간 적응에 의한 병렬처리시스템의 성능개선)

  • Park, Dae-Yeon;Han, Jae-Seon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.7
    • /
    • pp.752-765
    • /
    • 1999
  • 대부분 병렬처리 시스템에서 성능 파라미터는 복잡하고 프로그램의 수행 시 예견할 수 없게 변하기 때문에 컴파일러가 프로그램 수행에 대한 최적의 성능 파라미터들을 컴파일 시에 결정하기가 힘들다. 본 논문은 병렬 처리 시스템의 프로그램 수행 시, 변화하는 시스템 성능 상태에 따라 전체 성능이 최적화로 적응하는 적응 수행 방식을 제안한다. 본 논문에서는 이 적응 수행 방식 중에 적응 프로그램 수행을 위한 이론적인 방법론 및 구현 방법에 대해 제안하고 적응 제어 수행을 위해 프로그램의 데이타 공유 단위에 대한 적응방식(적응 입도 방식)을 사용한다. 적응 프로그램 수행 방식은 프로그램 수행 시 하드웨어와 컴파일러의 도움으로 프로그램 자신이 최적의 성능을 얻을 수 있도록 적응하는 방식이다. 적응 제어 수행을 위해 수행 시에 병렬 분산 공유 메모리 시스템에서 프로세서 간 공유될 수 있은 데이타의 공유 상태에 따라 공유 데이타의 크기를 변화시키는 적응 입도 방식을 적용했다. 적응 입도 방식은 기존의 공유 메모리 시스템의 공유 데이타 단위의 통신 방식에 대단위 데이타의 전송 방식을 사용자의 입장에 투명하게 통합한 방식이다. 시뮬레이션 결과에 의하면 적응 입도 방식에 의해서 하드웨어 분산 공유 메모리 시스템보다 43%까지 성능이 개선되었다. Abstract On parallel machines, in which performance parameters change dynamically in complex and unpredictable ways, it is difficult for compilers to predict the optimal values of the parameters at compile time. Furthermore, these optimal values may change as the program executes. This paper addresses this problem by proposing adaptive execution that makes the program or control execution adapt in response to changes in machine conditions. Adaptive program execution makes it possible for programs to adapt themselves through the collaboration of the hardware and the compiler. For adaptive control execution, we applied the adaptive scheme to the granularity of sharing adaptive granularity. Adaptive granularity is a communication scheme that effectively and transparently integrates bulk transfer into the shared memory paradigm, with a varying granularity depending on the sharing behavior. Simulation results show that adaptive granularity improves performance up to 43% over the hardware implementation of distributed shared memory systems.

An Interactive Robotic Cane

  • Yoon, Joongsun
    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.5 no.1
    • /
    • pp.5-12
    • /
    • 2004
  • A human-friendly interactive system that is based on the harmonious symbiotic coexistence of human and robots is explored. Based on this interactive technology paradigm, a robotic cane is proposed for blind or visually impaired travelers to navigate safely and quickly through obstacles and other hazards faced by blind pedestrians. The proposed robotic cane, "RoJi,” consists of a long handle with a button-operated interface and a sensor head unit that is attached at the distal end of the handle. A series of sensors, mounted on the sensor head unit, detect obstacles and steer the device around them. The user feels the steering command as a very noticeable physical force through the handle and is able to follow the path of the robotic cane easily and without any conscious effort. The issues discussed include methodologies for human-robot interactions, design issues of an interactive robotic cane, and hardware requirements for efficient human-robot interactions.ions.

An Advanced Resource Allocation Algorithm for PON-LTE Converged Networks

  • Abhishek Gaur;Vibhakar Shrimali
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.16-22
    • /
    • 2023
  • Enhanced radio access technologies (RAT) are deployed in Next Generation Convergence Networks by the service providers so as to satisfy the basic requirements of end-users for e.g. QoS. Whenever the available resources are being shared simultaneously and dynamically by multiple users or distribution of allocated channels randomly, the deficiency of spectral resources and dynamic behavior of Network traffic in real time Networking, we may have problem. In order to evaluate the performance of our proposed algorithm, computer simulation has been performed on NS-2 simulator and a comparison with the existing algorithms has been made.

Faster Detouring for Data Plane Failures in Software Defined Networks (SDN에서 데이터 평면 장애를 해결하는 빠른 우회 기법)

  • Thorat, Pankaj;Yeom, Sanggil;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.124-126
    • /
    • 2016
  • Successful deployment of the Software Defined Network (SDN) depends on its ability to cope up with network failures. There are various types of failures that may occur in an SDN. The most common are switch and link failures. It is necessary to recover the network from failures for a continuous service availability. But for the real-time services fast recovery from the failure is required to minimize the service disruption time. In the proposed work, we focused on minimizing the recovery time after the failure is detected. Once the failure is detected, the controller involvement is needed to dynamically reroute the failure disrupted flows from the failed component to an alternate path. The aim of the proposed scheme is to provide a traffic management scheme which can react to the dynamic network events by rapidly modifying the forwarding behavior of the switches for faster in-band network adaptability. The proposed scheme (1) Considers the shared data and control path delay (2) Optimally utilize the network resources (3) Eliminates the need of constant monitoring overhead at the controller which results into faster detouring and ultimately rapid recovery.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Cervical Cancer Screening: Recommendations for Muslim Societies

  • Khodakarami, Nahid;Farzaneh, Farah;Yavari, Parvin;Akbari, Mohamad Esmaeil
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.1
    • /
    • pp.239-247
    • /
    • 2016
  • Background: The overall cervical cancer incidence rate is low in Iran; however, because of a higher risk of death for cervical cancer, a disease that kills women in middle age, a cervical cancer control program is needed. The aim of this study was to provide consensus recommendation for cervical cancer prevention in Iran and other Muslim societies with low incidences of cervical cancer. Materials and Methods: Through a practical guideline development cycle, we developed six questions that were relevant to produce the recommendation. We reviewed 190 full text records of cervical cancer in Iran (1971 to 2013) of which 13 articles were related to the data needed to answer the recommendation questions. We also reviewed World Health Organization, IARC, GLOBOCAN report, Iran Ministry of Health cancer registry report and 8 available foreign countries guidelines. Lastly, we also evaluated the Pap smear results of 825 women who participated in the Iranian HPV survey, of whom 328 were followed-up after a 5-year interval. Results: The obtained data highlighted the burden of HPV and cervical cancer situation in Iran. Experts emphasized the necessity of a cervical cancer screening program for Iranian women, and recommended an organized screening program with a cytological evaluation (Pap smear) that would start at the age of 30 years, repeated every 5 years, and end at the age of 69 years. Meanwhile, there is no need for screening among women with a hysterectomy, and screening should be postponed to post-partum among pregnant women. Conclusions: An organized cervical cancer screening is a necessity for Iran as more than 500-900 women in middle age diagnosed with an invasive cervical cancer every year cannot be ignored. This recommendation should be taken into account by the National Health System of Iran and Muslim countries with shared culture and behavior patterns. CUBA HPV test could be consideration in countries Muslim country with appropriate budget, resources and facility.

A Freezing Method for Concurrence Control in Secure Real-Time Database Systems (실시간 보안 데이타베이스 시스템에서 병행수행 제어를 위한 얼림 기법)

  • Park, Chan-Jung;Han, Hee-Jun;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.29 no.3
    • /
    • pp.230-245
    • /
    • 2002
  • Database systems for real-time applications must satisfy timing constraints associated with transactions. Typically, a timing constraint is expressed in the form of a deadline and is represented as a priority to be used by schedulers. Recently, security has become another important issue in many real-time applications. In many systems, sensitive information is shared by multiple users with different levees of security clearance. As more advanced database systems are being used in applications that need to support timeliness while managing sensitive information, there is an urgent need to develop concurrency control protocols in transaction management that satisfy both timing and security requirements. In this paper, we propose two concurrence control protocols that ensure both security and real-time requirements. The proposed protocols are primarily based on multiversion locking. However, in order to satisfy timing constraint and security requirements, a new method, called the FREEZE, is proposed. In addition, we show that our protocols work correctly and they provide a higher degree of concurrency than existing multiversion protocols. We Present several examples to illustrate the behavior of our protocols, along with performance comparisons with other protocols. The simulation results show that the proposed protocols can achieve significant performance improvement.