http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Study on WBAN-Based Efficient and Energy-Saving Access Mechanisms
Zhong Qi,Yan Yi-Xin 보안공학연구지원센터 2016 International Journal of Multimedia and Ubiquitous Vol.11 No.6
With the constant development of wireless communication technology and gradual maturity of sensor technology, WBAN has gradually become research focus, mainly used in such fields as medical treatment, daily life, entertainment and military. Its main units are sensor nodes, responsible for data collection, processing and transmission. Sensor nodes are usually powered by batteries, and due to limited energy, reducing energy consumption of sensor nodes and extending the life cycle of such nodes are of great importance to WBAN. In this paper, WBAN is briefly introduced first, and the research status of MAC protocols for WBAN is analyzed, with focus placed on the introduction to wakeup radio mechanism-based MAC protocols. Then priority is set for business type and sensor nodes, emergency business data flow is simplified and TDMA modulation mechanism is adopted to optimize awake up radio-based protocol. The optimized MAC protocol has realized a good result in terms of energy consumption reduction of WBAN, reduced terminal node energy consumption and extended the network lifetime.
Security Threats among DICOM Imaging Communications in Public Networks
Feng Zhou,Zhongqi Zhang,Jin Wang,Bin Li,Jeong-Uk Kim 보안공학연구지원센터 2014 International Journal of Future Generation Communi Vol.7 No.6
Picture archiving and communication systems (PACS) require high-speed networks to transmit large image files between components. Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. However, public network’s security issues had always been the significant problems. Recent years, IPv6 brings significant improvements in mechanisms for assuring a higher level of security and confidentiality of the transmitted information. Thus, it is still necessary to take care of some particular aspects. In this paper, we first analyzes how actual security threats and different types of attacks affect IPv6 networks while transmitting Digital Imaging and Communications in Medicine (DICOM) files through the public Internet. Second, illustrate some shortcomings of IPv6 and IPv6’s traffic loads. Finally, some possible solutions against a number of security threats in IPv6 DICOM files transmitting networks have been given.
Lu-Yun (Vivian) Cheng,Huifen (Helen) Cai,Zhongqi Jin 글로벌지식마케팅경영학회 2016 Global Marketing Conference Vol.2016 No.7
The paper addresses the phenomenon of the opportunism that arises from a parent (principal) toward an IJV (agent) and its antecedents. This study integrates Agency Theory and Resource Dependence Theory (RDT) to discover its determinants from the perspectives of principal opportunism. Using Structural Equation Modelling (SEM) techniques and fuzzy-set qualitative comparative analysis (fsQCA) based on a sample of 185 Chinese-foreign IJVs in China, which are useful to reals the overall story of the principal opportunism. This study finds an IJV depends on parents’ support in both knowledge- and property-based resources has more chances to subject to principal opportunism. The result also indicates that psychic distance has a negative impact on principal opportunism. fsQCA, however, provides further solutions that the specific combinations of these predictors or their negation predicts principle opportunism.
An enhanced fall detection system for elderly person monitoring using consumer home networks
Jin Wang,Zhongqi Zhang,Bin Li,Sungyoung Lee,Sherratt, R. Simon IEEE 2014 IEEE transactions on consumer electronics Vol.60 No.1
<P>Various fall-detection solutions have been previously proposed to create a reliable surveillance system for elderly people with high requirements on accuracy, sensitivity and specificity. In this paper, an enhanced fall detection system is proposed for elderly person monitoring that is based on smart sensors worn on the body and operating through consumer home networks. With treble thresholds, accidental falls can be detected in the home healthcare environment. By utilizing information gathered from an accelerometer, cardiotachometer and smart sensors, the impacts of falls can be logged and distinguished from normal daily activities. The proposed system has been deployed in a prototype system as detailed in this paper. From a test group of 30 healthy participants, it was found that the proposed fall detection system can achieve a high detection accuracy of 97.5%, while the sensitivity and specificity are 96.8% and 98.1% respectively. Therefore, this system can reliably be developed and deployed into a consumer product for use as an elderly person monitoring device with high accuracy and a low false positive rate.</P>
Brittle fracture and plastic creep of the completely decomposed granite presented in CT
Yanjun Shang,Zhongqi Yue,박형동,현창욱 한국자원공학회 2015 Geosystem engineering Vol.18 No.6
Completely decomposed granite (CDG) with different structures shows different patterns in deformation and failure as brittle fracture or as plastic creep in triaxial test. It is necessary to monitor and to compare the fabric changes due to stress in real time during test. By means of the computerized tomography (CT) technique for monitoring deformation and failure of soils in real time without suspending the mechanical test and disturbing samples, a newly designed triaxial test machine was used to test CDG from Hong Kong in a procedure of saturation, consolidation and undrained condition. It was found that CT data (images and values) depicts the failure patterns as brittle fracture or as plastic creep at 3-D in real time. The results were concordant with stress–strain curves and observation of the appearance of samples before and after tests.