RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        A THREE DIMENSIONAL LOCATION SYSTEM FOR HIKER WALKING SPEEDS BASED ON CONTOUR LINES

        Wu, Mary,Ahn, Kyung-Hwan,Chen, Ni,Kim, Chong-Gun The Korean Society for Computational and Applied M 2009 Journal of applied mathematics & informatics Vol.27 No.3

        GPS is especially suitable for location systems in flat areas, but the availability of GPS is limited in highly urbanized and mountain areas, due to the nature of satellite communications. Dead reckoning is generally used to solve a location problem when a pedestrian is out of range of GPS coverage. To extend the apparent coverage of the GPS system for a hiker in mountain areas, we propose an integrated 3D location system that interpolates a 3D dead reckoning system based on information about contour lines. The speeds of hikers vary according to the inclination of the ground in sloped areas such as mountains. To reduce location measurement errors, we determine the angle of inclination based on the contour lines of the mountain, and use the speeds based on the inclination in the location system. The simulation results show that the proposed system is more accurate than the existing location system.

      • SCOPUS
      • KCI등재

        PERFORMANCE ANALYSES OF PATH RECOVERY ROUTING PROTOCOLS IN AD HOC NETWORKS

        Wu, Mary,Kim, Chong-Gun Korean Society of Computational and Applied Mathem 2008 Journal of applied mathematics & informatics Vol.26 No.1

        On-demand routing protocol in ad hoc network is that establishes a route to a destination node only when it is required by a source node. But, it is necessary to reestablish a new route when an active route breaks down. The reconstruction process establishes another route by flooding messages from the source to the destination, cause not only heavy traffic but also long delays in route discovery. A good method for analyzing performance of protocols is important for deriving better systems. In this paper, we suggest the numerical formulas of a representative on-demand routing protocol AODV, ARMP, and RRAODV to estimate the performance of these routing protocols for analyzing the performance of these protocols. The proposed analytical models are very simple and straightforward. The results of analysis show good agreement with the results of computer simulations.

      • 사물인터넷 기술개요와 개발동향

        우매리(Mary Wu) 영남신학대학교 2016 신학과 목회 Vol.46 No.-

        In the near future society, in addition to people sharing information via the Internet, it is expected to evolve in the IoT(Internet of Thing). In the IoT environment, information that things are produced or environmental information that sensors sense are shared over the Internet. The IoT enabled the sharing of information between things and things, and between things and people, and then, people can be further optimized for their actions through the received information and systems are able themselves to the status determination, and autonomously perform operations without human intervention. In the future of the Internet, most objects that are present in the peripheral has a unique identifier, exchange with each other the data generated through the sensing function and operation. As a result, the role of the production and the consumption of information that only people can do be expanded to a range of things, and it provides the convenience and automation in daily life, will create a new level of service and market. In the paper, in order to understand and prepare IoT as a principal in the era of IoT, IoT technical elements for providing IoT, such as sensing technology, context-aware technologies, location-based technologies, ontology technology, information technology, big data processing, RFID, WPAN, WiFi, cloud computing are introduced, and IoT services of various types which offered in our real life are introduced. Finally, the future prospects of IoT technologies are introduced.

      • KCI등재
      • KCI등재

        애드 혹 네트워크에서 경로 손실 회피 라우팅 프로토콜의 성능평가

        우매리(Mary Wu),정상준(Sang Joon Jung),정영석(Youngseok Jung),김종근(Chonggun Kim) 한국정보과학회 2006 정보과학회논문지 : 정보통신 Vol.33 No.1

        애드 혹 네트워크의 요구 기반 라우팅 프로토콜은 노드가 이동하여 경로가 손실되는 경우, 경로 유지를 위해 지역 탐색을 수행하거나 송신 노드가 새 경로 탐색을 수행하여 경로를 유지한다. 새 경로 탐색이나 지역 경로 탐색을 수행할 경우, 전송중인 패킷의 지연이 발생한다. 경로 손실로 인한 지연을 줄이기 위해 경로 손실을 예측하고 대체 경로를 구성하여 경로 손실 지연을 줄이는 기법으로써 ARMP와 RPAODV가 있다. 이 라우팅 프로토콜은 링크 상태가 불안정 상태가 될 때, 지역적으로 대체 경로를 구성하여 경로 손실을 회피하는 기법으로써 대체 경로 생성의 성공률은 경로 손실과 전송 지연에 직접적인 영향을 가져온다. 본 연구에서는 이전에 제안된 경로 손실 회피 라우팅 기법들의 효율성을 검증하기 위해서 대표적인 요구 기반 라우팅 프로토콜인 AODV, 경로 손실 회피 라우팅 기법인 ARMP와 RPAODV의 수치 평가식을 제안하고, 각 프로토콜의 성능을 평가하였다. 또한, 제안한 수치 평가식의 효용성을 검증하기 위해서 컴퓨터 시뮬레이션 결과와 비교 분석한다. When the movement of a node breaks the route in ad-hoc network, on-demand routing protocol performs the local route recovery or a new route search for the route maintenance. And when it performs the new route search or the local search, the packet which is transmitted can be delayed. There are ARMP and RPAODV as the methods reducing the delay resulted from the route-breakage. They predict the route-breakage and construct an alterative local route before the occurrence of the route-breakage. When the link state is unstable, the success rate of the alternative local route that can avoid the route-breakage can give a direct effect on the route-breakage and the transmission delay. To estimate the performance of routing protocols avoiding route-breakage, we suggest the numerical formulas of AODV, the representative on-demand routing protocol, and ARMP, RPAODV. To verify the efficiency and accuracy of the proposed numerical formulas, we analysis and compare with the results of the computer simulation and that of the numerical formulas.

      • 사회네트워크 분석을 이용한 교우관계분석과 SNS 서비스의 적용

        우매리(Wu Mary) 영남신학대학교 2014 신학과 목회 Vol.41 No.-

        In this paper, the companionship in a classroom environment was analyzed using by Social network analysis(SNA) techniques. Various social network analysis techniques are applied to the network companionship. Thus, at the result, the popularity and the characteristics of each learner, isolated relationships, connectivities between members in the companionship network any analyzed. Also, small intimate groups within the entire network were identified. Professors can use this analytical method to effectively manage and lead a classroom network as an important guidance material and church leaders can also use it to manage new church members and to lead church departments. Due to the recent increase in the use of smart phone, SNS service in the rapidly growing amount of use was applied to a classroom network and changes in intimacy was analyzed

      • KCI등재

        센서 네트워크의 인접행렬 기반 홀 커버리지 발견 기법

        우매리(Mary Wu) 한국컴퓨터정보학회 2019 韓國컴퓨터情報學會論文誌 Vol.24 No.4

        Wireless sensor networks are used to monitor and control areas in a variety of military and civilian areas such as battlefield surveillance, intrusion detection, disaster recovery, biological detection, and environmental monitoring. Since the sensor nodes are randomly placed in the area of interest, separation of the sensor network area may occur due to environmental obstacles or a sensor may not exist in some areas. Also, in the situation where the sensor node is placed in a non-relocatable place, some node may exhaust energy or physical hole of the sensor node may cause coverage hole. Coverage holes can affect the performance of the entire sensor network, such as reducing data reliability, changing network topologies, disconnecting data links, and degrading transmission load. It is possible to solve the problem that occurs in the coverage hole by finding a coverage hole in the sensor network and further arranging a new sensor node in the detected coverage hole. The existing coverage hole detection technique is based on the location of the sensor node, but it is inefficient to mount the GPS on the sensor node having limited resources, and performing other location information processing causes a lot of message transmission overhead. In this paper, we propose an Adjacent Matrix-based Hole Coverage Discovery(AMHCD) scheme based on connectivity of neighboring nodes. The method searches for whether the connectivity of the neighboring nodes constitutes a closed shape based on the adjacent matrix, and determines whether the node is an internal node or a boundary node. Therefore, the message overhead for the location information strokes does not occur and can be applied irrespective of the position information error.

      • 디지털 기술에 기반한 기술융합 시대로서의 제4차 산업혁명의 미래 동향

        우매리(Mary Wu) 영남신학대학교 2018 신학과 목회 Vol.50 No.-

        The 4th industrial revolution will lead to technology convergence where the boundaries between physical space, digital space and will have a significant impact on the economic structure based on the cyber system. It has the characteristics of hyper-connectivity, hyper-intelligence, and through these features, everything will be interconnected and fused, transforming the environment in which we live into a more intelligent society. In this paper, we understand the changes of technological environment and industrial structure in the 4th industrial revolution and to recognize the position as the leading role of the 4th industrial revolution.

      • 4차 산업혁명의 기술혁신 인공지능의 현재 동향과 미래 발전 방향

        우매리(Mary Wu) 영남신학대학교 2023 신학과 목회 Vol.60 No.-

        This paper analyzes the development and problems of artificial intelligence technology, a key technology in the era of the 4th industrial revolution, and appeals how to prepare for the upcoming artificial intelligence environment in the future. The times in which we live are making very rapid technological progress, and the pace of that development will accelerate further. Artificial intelligence is already a large part of our real life. Whether we prepare for the world to come with an open mind on the utility, value, and social change of artificial intelligence technology, or reject this environment with fear of the unimaginable future predictions that artificial intelligence technology will bring, it is clear that artificial intelligence technology will become a real-life environment in the near future. If so, it is clear that the future artificial intelligence environment, which futurists and artificial intelligence experts talk about, may not be understandable at the present time, but it is clearly time to prepare for the future to come. It is necessary to analyze the problems of artificial intelligence technology well to establish binding standards around the world so that artificial intelligence technology does not overwhelm humans, and to set directions so that artificial intelligence technology development contributes to human happiness and prosperity through a global organization with coercion, and does not disturb the providence of creation. In order for artificial intelligence technology to achieve its goals, it should be made at a time when it is not too late to regulate technology development for dangerous technology development that does not fit human intentions, and it is thought that consistent and legally binding measures should be taken worldwide by comprehensively reviewing the effectiveness and risks of artificial intelligence applied in each field.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼