• Title/Summary/Keyword: 전송주기

Search Result 852, Processing Time 0.032 seconds

Analysis of Tropospheric Zenith Path Delay of GPS Code Based Precise Time Comparison Technique (GPS 코드 기반 정밀시각비교기법의 대류층 천정지연모델 분석)

  • Yu, Dong-Hui;Yang, Sung-Hoon;Do, Jae-Chul;Lee, Chang-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.61-69
    • /
    • 2012
  • This paper shows results of the precise time comparison technique based on GPS code transfer in order to determine the UTC(Universal Time Coordinated) and generate TAI(International Atomic Time). CGGTTS(CCTF Group on GNSS Time Transfer Standards) which is generated by GPS timing receivers is used as the international standard format. For geodetic receivers which provide RINEX formats as GPS time transfer results, ROB(Royal Observatory of Belgium) developed a conversion program, r2cggtts, and have distributed the program to timing laboratories participating in TAI link all over the world. Timing laboratories generate the time comparison results of GPS code transfer by the program and send them to BIPM(Bureau International des Poids et Mesures) periodically. In this paper, we introduce the delay features generated while GPS code is transferred and the calibration methods of them. Then, we introduce the tropospheric delay and analyze the results of Saastamoinen model and NATO(North Atlantic Treaty organization) model. Saastamoinen model is the representative tropospheric zenith path delay model and NATO model is applied to the legacy r2cggtts program.

A Query Result Integrity Assurance Scheme Using an Order-preserving Encryption Scheme in the Database Outsourcing Environment (데이터베이스 아웃소싱 환경에서 순서 보존 암호화 기법을 이용한 질의 결과 무결성 검증 기법)

  • Jang, Miyoung;Chang, Jae Woo
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.97-106
    • /
    • 2015
  • Recently, research on database encryption for data protection and query result authentication methods has been performed more actively in the database outsourcing environment. Existing database encryption schemes are vulnerable to order matching and counting attack of intruders who have background knowledge of the original database domain. Existing query result integrity auditing methods suffer from the transmission overhead of verification object. To resolve these problems, we propose a group-order preserving encryption index and a query result authentication method based on the encryption index. Our group-order preserving encryption index groups the original data for data encryption and support query processing without data decryption. We generate group ids by using the Hilbert-curve so that we can protect the group information while processing a query. Finally, our periodic function based data grouping and query result authentication scheme can reduce the data size of the query result verification. Through performance evaluation, we show that our method achieves better performance than an existing bucket-based verification scheme, it is 1.6 times faster in terms of query processing time and produces verification data that is 20 times smaller.

Update Protocols for Web-Based GIS Applications (웹 기반 GIS 응용을 위한 변경 프로토콜)

  • An, Seong-U;Seo, Yeong-Deok;Kim, Jin-Deok;Hong, Bong-Hui
    • Journal of KIISE:Databases
    • /
    • v.29 no.4
    • /
    • pp.321-333
    • /
    • 2002
  • As web-based services are becoming more and more popular, concurrent updates of spatial data should be possible in the web-based environments in order to use the various services. Web-based GIS applications are characterized by large quantity of data providing and these data should be continuously updated according to various user's requirements. Faced with such an enormous data providing system, it is inefficient for a server to do all of the works of updating spatial data requested by clients. Besides, the HTTP protocol used in the web environment is established under the assumption of 'Connectionless'and 'Stateless'. Lots of problems may occur if the scheme of transaction processing based on the LAN environment is directly applied to the web environment. Especially for long transactions of updating spatial data, it is very difficult to control the concurrency among clients and to keep the consistency of the server data. This paper proposes a solution of keeping consistency during updating directly spatial data in the client-side by resolving the Dormancy Region Lock problem caused by the 'Connectionless'and 'Stateless'feature of the HTTP protocol. The RX(Region-eXclusive) lock and the periodically sending of ALIVE_CLIENTi messages can solve this problem. The protocol designed here is verified as effective enough through implementing in the main memory spatial database system, called CyberMap.

A System for Change Management of Sensor Network Applications based on Version Synchronization (버전동기화 기반의 센서 네트워크 응용 소프트웨어 변경 관리 시스템의 구축 사례)

  • Kim, Jae-Cheol;Kim, Ju-Il;Chong, Ki-Won;Lee, Woo-Jin
    • The KIPS Transactions:PartA
    • /
    • v.16A no.2
    • /
    • pp.125-134
    • /
    • 2009
  • This paper proposes a change management system of sensor network applications based on version synchronization that supports to effectively manage defect correction of applications, change of functions for applications or improvement of applications without suspending the sensor network. The proposed change management system consists of the NADE which is an application development environment, the Node Management Server, and the Node Agent. NADE is an Eclipse-based development environment for developing applications which are installed into nodes. NADE is also connected with CVSNT which is a version management tool and performs application version management using the CVSNT. Node Management Server manages nodes to maintain latest versions of applications by synchronizing versions of applications which are performed on the nodes with the versions of applications which are developed in the NADE. Node Agent which is loaded into the node periodically sends the version information of the application to the server, and stores and updates the version information of the application. Through the proposed change management system, applications of nodes are automatically updated when versions of applications are changed by correcting defects, changing functions or improving applications. Therefore, the user can effectively manage the execution of sensor network system without suspending or delaying the sensor network. Also, visibility of change management for sensor network applications will be improved.

LECSEN : Link Exchanged Chain in SEnsor Networks (링크 교환을 이용한 무선 센서 네트워크용 체인 토폴로지 : LECSEN)

  • Shin, Ji-Soo;Suh, Chang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.273-280
    • /
    • 2008
  • In WSN(Wireless Sensor Network) many routing algorithms such as LEACH, PEGASIS and PEDEP consisting of sensor nodes with limited energy have been proposed to extend WSN lifetime. Under the assumption of perfect fusion, these algorithms used convergecast that periodically collects sensed data from all sensor nodes to a base station. But because these schemes studied less energy consumption for a convergecast as well as fairly energy consumption altogether, the minimum energy consumption for a convergecast was not focused enough nor how topology influences to energy consumption. This paper deals with routing topology and energy consumption for a single convergecast in the following ways. We chose major WSN topology as MSC(Minimum Spanning Chain)s, MSTs, PEGASIS chains and proposed LECSEN chains. We solved the MSC length by Linear Programming(LP) and propose the LECSEN chain to compete with MST and MSC. As a result of simulation by Monte Carlo method for calculation of the topology length and standard deviation of link length, we learned that LECSEN is competitive with MST in terms of total energy consumption and shows the best with the view of even energy consumption at the sensor nodes. Thus, we concluded LECSEN is a very useful routing topology in WSN.

IEEE 802.11a Technnical Analysis and Research for Development of Unmanned Vehicle System (무인자동차 시스템 개발을 위한 IEEE 802.11a 기술 분석 및 연구)

  • Kim, Young-Hyuk;Choi, Sang-Wook;Lim, Il-Kwon;Choi, Jeong-Dan;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.108-111
    • /
    • 2009
  • In this paper, the development of unmanned vehicle systems to analysis applicable communications and alternative IEEE 802.11a. IEEE 802.11b/g uses the 2.4GHz. So, using the 5GHz OFDM in IEEE 802.11a interference phenomenon better. IEEE 802.11a has a maximum speed of 54Mbps. Indoors and apartment parking on experiment to soft roaming, hard roaming. Test equipments are AP four units(RSU), reliable results for the AP one unit Bridge, Switch one unit, one server notebook, one notebook(OBU), one car. Use Softwares are Wireshark, Jperf, Ping and million second transfer was used to develop the program. So the actual car was similar to the environment. With the results of the experiment for the unmanned vehicle systems will provide the best method.

  • PDF

Exercise Posture Calibration System using Pressure and Acceleration Sensors (압력 및 가속도 센서를 활용한 운동 자세 교정 시스템 )

  • Won-Ki Cho;Ye-Ram Park;Sang-Hyeon Park;Young-Min Song;Boong-Joo Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.4
    • /
    • pp.781-790
    • /
    • 2024
  • As modern people's interest in exercise and health increases, the demand for exercise-related information and devices is increasing, and exercising in the wrong posture can lead to body imbalance and injury. Therefore, in this study, the purpose of this study is to correct the posture for health promotion and injury prevention through the correct exercise posture of users. It was developed using Arduino Uno R3, a pressure sensor, and an acceleration sensor as the main memory device of the system. The pressure sensor was used to determine the squat posture, and the acceleration sensor was used to determine three types of gait: normal step, nasolabial step, and saddle step. Data is transmitted to a smartphone through a Bluetooth module and displayed on an app to guide the user in the correct exercise posture. The gait was determined based on the 20˚ angle at which the foot was opened, and the correct squat posture was compared with the ratio of the pressure sensor values of the forefoot and hindfoot based on the data of the skilled person. Therefore, based on an experiment with about 90% accuracy when determining gait and 95% accuracy based on a 7:3 ratio of pressure sensor values in squat posture, a system was established to guide users to exercise in the correct posture by checking in real time through a smartphone application and correcting exercise in the wrong posture.

Development of a Real-Time Mobile GIS using the HBR-Tree (HBR-Tree를 이용한 실시간 모바일 GIS의 개발)

  • Lee, Ki-Yamg;Yun, Jae-Kwan;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.6 no.1 s.11
    • /
    • pp.73-85
    • /
    • 2004
  • Recently, as the growth of the wireless Internet, PDA and HPC, the focus of research and development related with GIS(Geographic Information System) has been changed to the Real-Time Mobile GIS to service LBS. To offer LBS efficiently, there must be the Real-Time GIS platform that can deal with dynamic status of moving objects and a location index which can deal with the characteristics of location data. Location data can use the same data type(e.g., point) of GIS, but the management of location data is very different. Therefore, in this paper, we studied the Real-Time Mobile GIS using the HBR-tree to manage mass of location data efficiently. The Real-Time Mobile GIS which is developed in this paper consists of the HBR-tree and the Real-Time GIS Platform HBR-tree. we proposed in this paper, is a combined index type of the R-tree and the spatial hash Although location data are updated frequently, update operations are done within the same hash table in the HBR-tree, so it costs less than other tree-based indexes Since the HBR-tree uses the same search mechanism of the R-tree, it is possible to search location data quickly. The Real-Time GIS platform consists of a Real-Time GIS engine that is extended from a main memory database system. a middleware which can transfer spatial, aspatial data to clients and receive location data from clients, and a mobile client which operates on the mobile devices. Especially, this paper described the performance evaluation conducted with practical tests if the HBR-tree and the Real-Time GIS engine respectively.

  • PDF

Integrated Management Data Warehouse Development Process of Research Expenses in Enterprise Environment (엔터프라이즈 환경의 연구비 통합관리 데이터 웨어하우스 개발 프로세스)

  • Choi, Seong-Man;Yoo, Cheol-Jung;Chang, Ok-Bae
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.183-194
    • /
    • 2004
  • The existing management job of research expenses has been divided into three parts: budget planning, budget draw-up, and exact settlement of budget. However, it caused some problems. Under this current circumstance it is required to obtain research expenses steadily, to operate efficiently and to use them clearly to solve such problems. As a result of a study on data warehouse development process of existing system integration company (Inmon, IBM) to reflect current trend described above, data warehouse development process of Inmon uses systematic and gradual access as a classical development cycle method. It causes overlap and feedback to the previous step in the process of each step Is requested. And another problem that it is difficult to toil what function refers and corrects data because functions and data are separated during performing development process at data warehouse development process of IBM is caused. Integrated management data warehouse development process of research expenses in the enterprise environment which applies UML at planning and analysis step, design step and implement and test step is suggested in this paper. Information retrieval agent uses existing budget plan DB, budget draw-up DB and budget settlement DB to find out information that a user wants to know. Information retrieval agent collects and saves information at integration database and information integration agent extracts, transports, transforms and loads the data. Information integration agent reduces a user's efforts to access to a number of information sources and check each of them. It also screens out data that a user may not need. As a result, integrated management data warehouse development process of research expenses in the enterprise environment reflects a user's requirements as much as possible and provides various types of information to make a decision which is needed to establish the policy of research expense management. It helps an end user approach his/her desired analysis information quickly and get various data from the comprehensive viewpoint rather than the fragmentary viewpoint. Furthermore, as it integrated three systems into one, it is possible to share data, to integrate the system, to reduce operating expenses and to simplify supporting environment for the decision making.

T-Cache: a Fast Cache Manager for Pipeline Time-Series Data (T-Cache: 시계열 배관 데이타를 위한 고성능 캐시 관리자)

  • Shin, Je-Yong;Lee, Jin-Soo;Kim, Won-Sik;Kim, Seon-Hyo;Yoon, Min-A;Han, Wook-Shin;Jung, Soon-Ki;Park, Se-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.5
    • /
    • pp.293-299
    • /
    • 2007
  • Intelligent pipeline inspection gauges (PIGs) are inspection vehicles that move along within a (gas or oil) pipeline and acquire signals (also called sensor data) from their surrounding rings of sensors. By analyzing the signals captured in intelligent PIGs, we can detect pipeline defects, such as holes and curvatures and other potential causes of gas explosions. There are two major data access patterns apparent when an analyzer accesses the pipeline signal data. The first is a sequential pattern where an analyst reads the sensor data one time only in a sequential fashion. The second is the repetitive pattern where an analyzer repeatedly reads the signal data within a fixed range; this is the dominant pattern in analyzing the signal data. The existing PIG software reads signal data directly from the server at every user#s request, requiring network transfer and disk access cost. It works well only for the sequential pattern, but not for the more dominant repetitive pattern. This problem becomes very serious in a client/server environment where several analysts analyze the signal data concurrently. To tackle this problem, we devise a fast in-memory cache manager, called T-Cache, by considering pipeline sensor data as multiple time-series data and by efficiently caching the time-series data at T-Cache. To the best of the authors# knowledge, this is the first research on caching pipeline signals on the client-side. We propose a new concept of the signal cache line as a caching unit, which is a set of time-series signal data for a fixed distance. We also provide the various data structures including smart cursors and algorithms used in T-Cache. Experimental results show that T-Cache performs much better for the repetitive pattern in terms of disk I/Os and the elapsed time. Even with the sequential pattern, T-Cache shows almost the same performance as a system that does not use any caching, indicating the caching overhead in T-Cache is negligible.