• Title/Summary/Keyword: 개별 통신

Search Result 898, Processing Time 0.029 seconds

Design & Implementation of a Host Based Access Control System (호스트 기반 접근제어시스템의 설계 및 구현)

  • Kim, Jin-Chun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.34-39
    • /
    • 2007
  • According to the active use of internet the need for security in various environment is being emphasized. Moreover with the broad use of Messenger on PC and P2P applications. the security and management of individual hosts on internet became very important issues. Therefore in this paper we propose the design and implementation of a host based access control system for the hosts on internet including window based PC which provides access control, information on packets, and record and monitoring of log files.

셀룰러 차량사물통신(Vehicle-to-everything, V2X)을 위한 5G 통신 기술

  • Jeon, Yosep;Kim, Jeong-Yeon;Choe, Ji-Uk;Lee, Nam-Yun
    • Information and Communications Magazine
    • /
    • v.34 no.6
    • /
    • pp.27-33
    • /
    • 2017
  • 차량사물통신은 차량이 다양한 대상과 유무선 망을 이용해 정보를 주고 받는 기술을 의미한다. 차량사물통신을 이용하면 실시간으로 변화하는 교통 상황에 대해 개별 차량의 안정성을 크게 향상시킬 수 있다. 차량사물통신을 실현하기 위해서는 고도화 된 통신 기술들이 집약적으로 활용되어야 하며, 이러한 차량사물통신은 차세대 통신 시스템에서 각광받는 주요 기술이다. 본고는 차량사물통신을 위한 통신 기술 중 특별히 5G 통신에 관련된 세부 기술들을 소개한다. 먼저 차량사물통신을 위한 무선 통신에서 요구되는 기술적인 어려움에 대해 논의하고, 이를 바탕으로 차량사물통신에 대한 5G 통신 기술의 필요성에 관해 논의한다. 다음으로 차량사물통신을 위한 5G 통신의 세부기술들을 소개하고, 각 기술에 대한 기술적인 과제와 적용 시나리오에 대해 알아본다.

Traffic Flow Management under Ubiquitous Transportation System Environments (유비쿼터스 교통 환경하에서 교통류 관리구상)

  • Park, Eun-Mi
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.3
    • /
    • pp.179-186
    • /
    • 2008
  • It is crucial in traffic flow management to maintain productivity and the traffic stability at the same time especially under congested traffic conditions. This issue has not been explicitly addressed under the intelligent transportation system environments. However, the ubiquitous transportation system environments make it possible to collect the data for each vehicle's position and velocity and to perform more sophisticated traffic flow management at individual vehicle or platoon level through V2V and V2I communications. In this paper, a preventive traffic flow management scheme is proposed, in which the objective is to maintain traffic flow stability while the productivity of the system is not decreased. The management scheme is proposed based on Greenshield's model because it is simple and easy to handle. It is considered that further research should be performed to evaluate the various traffic flow models.

An Effective Method of Product Number Detection from Thick Plates (효과적인 후판의 제품번호 검출 방법)

  • Park, Sang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.1
    • /
    • pp.139-148
    • /
    • 2015
  • In this paper, a new algorithm is proposed for detecting the product number of each thick plate and extracting each character of the product number from a image which contains several thick plates. In general, a image of thick plates contains several steal plates. To obtain the product number from the image, we first need to separate each plate. To do so, we use the line edges of thick plates and a clustering algorithm. After separating each plate, background parts are eliminated from the image of each plate. Background parts of an individual thick plate image consist of the dark part of steel and the white part of paint which is used for printing the product number. We propose a two-tiered method where dark background parts are first eliminated and then white parts are eliminated. Finally, each character is extracted from the product number image using the characteristics of product number. The results of the experiments on the various steal plates images emphasize that the proposed algorithm detects each thick plate and extracts the product number from a image effectively.

Design of Optimized Pattern Recognizer by Means of Fuzzy Neural Networks Based on Individual Input Space (개별 입력 공간 기반 퍼지 뉴럴 네트워크에 의한 최적화된 패턴 인식기 설계)

  • Park, Keon-Jun;Kim, Yong-Kab;Kim, Byun-Gon;Hoang, Geun-Chang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.181-189
    • /
    • 2013
  • In this paper, we introduce the fuzzy neural network based on the individual input space to design the pattern recognizer. The proposed networks configure the network by individually dividing each input space. The premise part of the networks is independently composed of the fuzzy partition of individual input spaces and the consequence part of the networks is represented by polynomial functions. The learning of fuzzy neural networks is realized by adjusting connection weights of the neurons in the consequent part of the fuzzy rules and it follows a back-propagation algorithm. In addition, in order to optimize the parameters of the proposed network, we use real-coded genetic algorithms. Finally, we design the optimized pattern recognizer using the experimental data for pattern recognition.

Development of Power Energy Management System for Ships including Energy Saving of Separated Load Systems (개별 부하 시스템의 에너지 절감을 포함한 선박 전력 에너지 관리 시스템 개발)

  • Kang, Young-Min;Oh, Jin-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.131-139
    • /
    • 2018
  • Many ship researches have been carried out in connection with the fourth revolution, one of which focuses on EMS(energy management system). The EMS is referred to as systems for managing the energy of ships and include various systems. In this paper, we analyze the energy saving field in ship and propose a ship power energy management system including individual load control systems that can save energy in the engine room. EMS includes individual load control systems of PCS (Pump Control System), ERFCS (Engine Room Fan Control System), LCS (Load Control System), HVACS (Heating, Ventilation, Air conditioning Control System). Proposed EMS primarily conserves energy in the individual load systems of the engine room. Secondly, the integrated monitoring and control system is used to control the power generation system and the power load system to save energy.

Enhanced fuzzy Binarization for Improvement of Car License Plate Recognization and Extraction of Car License Plate (차량 번호판 인식 향상을 위한 개선된 퍼지 이진화와 차량 번호판 추출)

  • Kim, Dong-Hyun;Kim, Ki-Suk;Cho, Jae-Hyun;Kim, Kwang-Baek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.08a
    • /
    • pp.128-132
    • /
    • 2008
  • 본 논문에서는 현재 자가용 차량 번호판으로 사용되고 있는 4종류의 번호판인, 구형 녹색 번호판 두 종류와 유럽식 신형 흰색 번호판 두 종류에 대해 개별 코드를 효과적으로 추출하기 위한 개선된 퍼지 이진화 방법을 제안한다. 차량 영상에서 수직 에지와 반복 이진화 기법, 그리고 Grassfire 알고리즘을 적용하여 번호판의 후보 영역을 추출하고, 번호판의 형태학적 특징을 이용해 잡음을 제거한 후, 최종 번호판 영역을 추출한다 추출된 번호판 영역에서 개선된 퍼지 이진화 기법을 적용하여 개별 코드를 추출한다. 본 논문에서 제안하는 개선된 퍼지 이진화 방법은 추출한 번호판 영역을 그레이 레벨로 변환한 후에 번호판의 명도를 2구간으로 나누고 각각의 구간에 퍼지 소속 함수를 적용하여 번호판 영역을 이진화한 후, 퍼지 소속 함수에 의해 이진화 된 2개의 번호판 영역 중에서 가장 최적화된 번호판 영역을 선택하여 개별 코드를 추출한다. 본 논문에서 제안한 기법을 4종류의 번호판이 부착된 327장(구형녹색 50장, 신형녹색 157장, 짧은 흰색 60장, 긴 흰색 60장)을 대상으로 실험한 결과, 번호판 영역 추출은 327장의 영상중 97%가 추출되었고 개별 코드 추출은 번호판 영역이 추출된 324장의 영상에서 97%가 추출된 결과를 보였다.

  • PDF

Container Identifier Recognition Using Morphological Features and FCM-Based Fuzzy RBF Network (형태학적 특성과 FCM 기반 퍼지 RBF 네트워크를 이용한 컨테이너 식별자 인식)

  • Kim, Kwang-Baek;Kim, Young-Ju;Woo, Young-Woon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1162-1169
    • /
    • 2007
  • In this paper, we proposed a container identifier recognition method for containers used in harbors. After converting a real container image to a gray image, edges are detected from the gray image applying Prewitt mask and candidate identifier area is extracted using morphological features of individual identifier for identifying containers. Because noises are included in the extracted candidate identifier area, noises are eliminated and each identifier is separated using 4-directional edge tracking algorithm and Grassfire algorithm. Each identifier in the noise-free candidate identifier area is recognized using FCM-based row RBF network for discriminating containers. We used 300 real container images for experiment to evaluate the performance of the proposed method, and we could verify the proposed method is better than a conventional method.

State Machine design to support behavioral response in DTT protocol (불연속 개별시도 훈련에서 행동 반응을 지원하는 상태머신 설계)

  • Yun, Hyuk;Yun, Sang-Seok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.147-149
    • /
    • 2022
  • This paper proposes a state machine design methodology in which an interactive robot that mimics discrete trial training (DTT protocol) can support social interaction training for children with autism. The robot applied to social interaction training uses the response to the provided training stimulus as a quantitative indicator by processing the data received from the sensors measuring the behavioral response of the child. In this process, the state machine is used as information that classifies the state of the acquired data and provides the subsequent stimulus for DTT protocol. Through the joint attentional training, it can be used as evidence-based treatment information by quantitatively classifying the data on the number of sustainable and DTT protocol and the child's response, as well as the current reaction status of the child to the observer performing remote monitoring. At the same time, it was confirmed that it is possible to properly respond to misrecognition situations.

  • PDF

Design of USN Communication Protocol Using Individual Chaotic Systems (개별 혼돈 시스템을 이용한 USN 통신 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.528-533
    • /
    • 2015
  • In the construction of USN environment, the implementation of a safe sensor network using wireless communications can be said to be the most important factor in the entire system. Although USN communication uses wireless communications to enhance accessability and non-contact capability, this results in the security vulnerability, thus endangering the system. In this regard, we propose a security protocol that can be effectively applied to USN, a multi-sensor network. The proposed protocol is a method using an individual chaotic system, and it is a security protocol to synchronize the main chaotic system mounted on each sensor and prepared key values into the initial values, and to communicate with the use of the synchronized values as symmetric keys. The communication protocol proposed in this paper is expected to yield good results as a new method to resolve security problems of USN and program capacity limitations of sensor nodes if subsequent studies continue to be carried out.