• Title/Summary/Keyword: 전송장치

Search Result 1,560, Processing Time 0.028 seconds

A Study on the Reliability Verification of Real-time Railway Safety Integrated Monitoring and Control System (실시간 철도안전 통합 감시제어시스템 신뢰성 검증에 관한 연구)

  • Son, Sang-Hyun;Kim, Sang-Ahm;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.83-89
    • /
    • 2021
  • With the recent development of information and communication technology, there have been many attempts to apply various IT technologies in the railway field. Until now, the safety control system has been installed at the site and operated using actual data, but there is a problem that it is difficult to verify the function of the railway safety control system in that no accidents occur in real situations. In this study, accident data is generated randomly to verify that the safety control system is functioning properly, and to this end, simulation data is prepared according to the simulator, accident scenario and scenario. Real-time railway safety monitoring system collects and transmits data from interface devices to common protocol called DDS.

A Study to Apply A Fog Computing Platform (포그 컴퓨팅 플랫폼 적용성 연구)

  • Lee, Kyeong-Min;Lee, Hoo-Myeong;Jo, Min-Sung;Choi, Hoon
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.6
    • /
    • pp.60-71
    • /
    • 2019
  • As IoT systems such as smart farms and smart cities become popular, a large amount of data collected from many sensor nodes is sent to a server in the Internet, which causes network traffic explosion, delay in delivery, and increase of server's workload. To solve these problems, the concept of fog computing has been proposed to store data between IoT systems and servers. In this study, we implemented a software platform of the fog node and applied it to the prototype smart farm system in order to check whether the problems listed above can be solved when using the fog node. When the fog node is used, the time taken to control an IoT device is lower than the response time of the existing IoT device-server case. We confirmed that it can also solve the problem of the Internet traffic explosion and the workload increase in the server. We also showed that the intelligent control of IoT system is feasible by having the data visualization in the server and real time remote control, emergency notification in the fog node as well as data storage which is the basic capability of the fog node.

Measurement-based LEEFI Modeling and Experimental Verification for Predicting Firing Waveform of an ESAD (ESAD의 기폭 파형 예측을 위한 측정기반 LEEFI 모델링 및 검증)

  • Kang, Hyungmin;Kim, Joungho;Hwang, Sukhyun;Jung, Myung-suk;Jo, Seyoung;Son, Joongtak
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.1
    • /
    • pp.20-26
    • /
    • 2019
  • In this paper, we propose measurement based numerical resistivity model for low energy exploding foil initiator (LEEFI) of electronic safety and arming device(ESAD). A resistivity model describes a behavior of variable resistance in LEEFI by firing current. The previous resistivity model was based on high energy detonator applications as explosive bridge wire and exploding foil initiator. Therefore, to estimate the voltage, current, and burst time of LEEFI, a resistivity model suitable for LEEFI is needed. For the modeling of resistivity of LEEFI, we propose a specific action based equation which represents a behavior of LEEFI when firing current is applied. To verify the proposed model, we analyze a firing current transmission path to obtain parasitic impedance. We experimentally verify that the proposed resistivity model offers precise estimation for the behavior of variable resistance in LEEFI.

Design and Analysis of Technical Management System of Personal Information Security using Web Crawer (웹 크롤러를 이용한 개인정보보호의 기술적 관리 체계 설계와 해석)

  • Park, In-pyo;Jeon, Sang-june;Kim, Jeong-ho
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.69-77
    • /
    • 2018
  • In the case of personal information files containing personal information, there is insufficient awareness of personal information protection in end-point areas such as personal computers, smart terminals, and personal storage devices. In this study, we use Diffie-Hellman method to securely retrieve personal information files generated by web crawler. We designed SEED and ARIA using hybrid slicing to protect against attack on personal information file. The encryption performance of the personal information file collected by the Web crawling method is compared with the encryption decryption rate according to the key generation and the encryption decryption sharing according to the user key level. The simulation was performed on the personal information file delivered to the external agency transmission process. As a result, we compared the performance of existing methods and found that the detection rate is improved by 4.64 times and the information protection rate is improved by 18.3%.

Outdoor Experiments on video streaming over a Raspberry Pi-based MANETs (Raspberry Pi 기반 MANETs 환경에서 야외 Video Streaming 실험)

  • Lee, Yeong-mi;Kim, Byeong-jeong;Song, Seong-Ho;Park, Seop Hyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.147-151
    • /
    • 2014
  • With the advent of tiny and inexpensive computer systems like Raspberry Pi, it has become possible to construct an experimental environment of MANETs (Mobile Ad hoc Networks) at a relatively low cost. In this paper, we implement a node of MANETs with a Raspberry Pi equipped with two 802.11 wireless LAN cards and dynamic routing software running on it. In an outdoor MANETs environment with moving mobile nodes automatically rebuilding broken routes, we conducted a real-time video streaming experiment over the MANET. The video stream is transmitted from a node with a video camera installed on it to another node through the route established dynamically. Each node is equipped with a display device, with which the current status of the node can be checked out. We also implemented software that automatically collects data stored in each node and analyzes the performance of the MANETs. Through this experiment, we could evaluate the performance of realistic video streaming service in a MANETs environment.

  • PDF

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.

Salt and Pepper Noise Removal using Processed Pixels (전처리한 픽셀을 이용한 Salt and Pepper 잡음 제거)

  • Baek, Ji-Hyeon;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1076-1081
    • /
    • 2019
  • In response to the recent development of IT technologies, there are more demands for visual devices such as display. However, noise is generated in the process of sending video data due to various reasons. Noise is the representative noise which is commonly found. While A-TMF, CWMF, and AMF are the typical ways for removing Salt and Pepper noise, the noise is not removed well in high-density noise environment. To remove the noise in the high-density noise environment, this study suggested an algorithm which identifies whether it's noise or not. If it's not a noise, matches the original pixel. If it's a noise, divide the $3{\times}3$ local mask into the area of the element treated and the area of the element to be processed. Then, algorithm proposes to apply different weights for each element to treat it as an average filter. To analyze the performance of the algorithm, this study compared PSNR to compare the algorithm with other existing methods.

Emergency Broadcast System Using Radio and DMB for Tunnel and Underground (라디오와 DMB 방송을 이용한 터널 및 지하차도용 비상방송시스템)

  • Do, Daewook;Lee, Choong Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.392-394
    • /
    • 2019
  • Tunnels and subterranean roads, which are representative evacuation facilities for national or regional disasters, have radio relay broadcasting facilities for legal reasons and convenience reasons. However, this system is limited to radio broadcasting and it is impossible to effectively communicate disaster or emergency situations that occur locally due to broadcasting of national broadcasting without DMB broadcasting. In order to improve this, we construct a remote disaster broadcasting system at each regional disaster station and implement a system to transmit it to each tunnel using internet or LTE network. The system in the tunnel transmits the emergency broadcasting signal through the existing relay equipment through the modulator which decodes the SMS, the media file, the real time broadcasting or the image received by the digital signal and converts it into FM and DMB frequency. The method proposed and implemented in this study can be used to provide efficient information and remote field control in case of emergency in tunnel and underground roadway.

  • PDF

Design of Remote Broadcasting System Using LTE Moudule (LTE 모듈을 활용한 원격방송 시스템 설계)

  • Chae, Min-uk;Lee, Choong Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.389-391
    • /
    • 2019
  • In this study, we design a remote broadcasting system that can output announcement to a remote place using wired/wireless telephone. The designed remote broadcasting system uses the LTE module to amplify the telephone voice received wirelessly through the amplifier and output it. Also, a text message for broadcasting can be sent to a remote broadcasting system through a wired/wireless telephone capable of transmitting a text message, and the remote broadcasting system that receives the broadcasting text message can automatically output the corresponding announcement stored in the voice device. For security reasons, the telephone number of the receiver is analyzed by a comparison algorithm so that only the administrator and registered users can use the system. At this time, the recorded announcement broadcast is outputted through the speaker only when it is confirmed as the registered user. The system designed in this study allows the user to output announcements quickly without being limited by time and place.

  • PDF

Analysis on the Effects of TRV and MOV in Real System with TCSC (TCSC가 적용된 실계통 시스템에서의 TRV와 MOV의 영향에 대한 분석)

  • Lee, Seok-Ju
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.2
    • /
    • pp.41-46
    • /
    • 2019
  • The application of series compensator in a power system affects other devices such as circuit breakers transient recovery voltage (TRV) problem. In this paper, we analyze the TRV effect on a line circuit breaker in the cases with and without thyristor-controlled series capacitor (TCSC) via simulation, and suggest an effective method to overcome the increase of TRV due to the TCSC installation. It also discusses the impact of proposed protection on metal oxide varistor (MOV). A 345 kV transmission line in Korea was selected as a study case. Grid system was modelled using PSCAD (Power Systems Computer Aided Design) / EMTDC(Electro Magnetic Transient Direct Current). The TRV was analyzed by implementing a short circuit fault along the transmission line and at the breaker terminal. The proposed protection scheme, the TRV satisfies the standard. However, the MOV energy capacity increased as the delay time increased. This result can solve the TRV problem caused by the expected transmission line fault in a practical power system.