• Title/Summary/Keyword: 제어 네트워크

Search Result 3,847, Processing Time 0.031 seconds

Design of a XML-based Data Store Architecture for Run-time Process Monitor (실행시간 프로세스 모니터를 위한 XML 기반의 데이터 저장소의 설계)

  • Jeong, Yoon-Seok;Kim, Tae-Wan;Chang, Chun-Hyon
    • The KIPS Transactions:PartA
    • /
    • v.10A no.6
    • /
    • pp.715-722
    • /
    • 2003
  • Monitoring is used to see if a real-time system provides a service on time. The target of monitoring is not only an interior system but also a remote system which is located in the remote network. Monitoring needs data store to monitor data from each system. But a data store should be designed on the considerations of time constraints and data accessibility. In this paper, we present an architecture of XML-based data store and network delivery. XML-based data store is based on XML which is a standardized data format. So any platform which supports TCP/IP and HTTP can access data in the data store without any conversion. The XML-based delivery architecture is designed to reduce the time of data access and delivery. In addition, some experiments were tested to provide the timing guideline to be kept by a real-time system which uses the architecture presented in this paper. The architecture of XML-based data store and delivery designed in this paper can be used in the domains of remote real-time monitoring and control.

Technical Issues and Solutions for Developing IoT Applications (IoT 애플리케이션 개발의 기술적 이슈 및 솔루션)

  • Shin, Dong Ha;Han, Seung Ho;La, Hyun Jung;Kim, Soo Dong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.3
    • /
    • pp.99-110
    • /
    • 2015
  • Internet-of-Things(IoT) is the computing paradigm converged with different technologies, where diverse devices are connected via the wireless network, acquire environmental information from their equipped sensors, and actuated. IoT applications typically provide smart services to users by interacting with multiple devices connected to the network and are designed by integrating multiple technologies such as sensor network, communication technologies, and software engineering. Moreover, since the concept of IoT has been introduced recently, most of the researches are in the beginning step, which is too early to be practically applied. Due to these facts, developing IoT application results in unconventional technical challenges which have not been observed in typical software applications. And, it is not straightforward to apply conventional project guidelines to IoT application development projects. Hence, there can be many difficulties to successfully complete the projects. Therefore, for successful completion of the projects, we analyze technical challenges occurring in all phases of the project lifecycle, i.e. project preparation stage and development stage. And, we propose the effective solutions to overcome the issues. To verify identified issues and presented solutions, we present the result of applying the solutions to an IoT application development. Through the case study, we evaluate how reasonable the unconventional technical issues are generated and analyze effectiveness of applying the solutions to the application.

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

A Study on the Development Environment for Flight Software using PowerPC (PowerPC를 이용한 저궤도 위성용 탑재소프트웨어 개발환경에 대한 연구)

  • 이재승;최종욱;김대영;이종인;김학정
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.514-516
    • /
    • 2004
  • 위성의 개발을 위해서는 오랜 개발기간과 많은 예산, 축적된 기술이 요구된다. 또한 위성에는 다양한 분야의 기술이 사용되어지기 때문에 각 서브시스템마다 독자적인 개발환경을 구축할 필요가 있다. 특히 위성의 찌어. 임무수행 및 지상과의 통신 등을 담당하는 탑재소프트웨어는 위성의 용도 및 목적에 따라 개발환경이 크게 달라진다. 실시간 운영체제는 무엇을 사용하는지, 개발 및 검증을 위한 도구로 어떤 프로그램을 사용하는지, 내외부의 인터페이스는 어떠한 방식으로 수행할지, 새로운 기능의 CPU나 하드웨어에 대한 제어 등 위성의 탑재소프트웨어를 개발하기 위해서는 많은 검토 항목들이 고려되어야 한다. 새로운 위성을 개발할 경우 신기술의 적용과 새로운 시스템위성시스템의 검증 및 개발을 위한 개발검증장비가 요if되며, 위성시스템의 변경 때마다 개발검증장비를 새로이 구축하게 되면 많은 기간과 막대한 비용이 위성개발 시마다 소요된다. 위성선진국에서는 다양한 위성의 개발 시 비용절감 및 개발기간 단축을 위하여 범용위성용 개발검증장비를 개발하여 이용하고 있는 추세이다. 국내에서는 다목적실용위성 1호가 발사되어 성공적으로 임무를 수행하고 있으며 다목 실용위성 2호가 개발되어 현재 통합 및 조립시험이 진행 중이다. 그러나 새로운 위성시스템의 사전 검증 및 신기술의 적용을 위한 범용위성 시스템 테스트베드에 대한 기술은 미비한 실정이다. 이러한 범용위성용 개발검증장비의 기반기술을 확보하기 위하며 현재 위성전자전산시스템 개발검증장비에 대한 연구가 수행되고 있다. 본 논문에서는 현재 수행되고 있는 PowerPC를 이용한 위성 탑재소프트웨어 개발검증시스템의 설계 및 개발현황에 대하여 소개한다.이스는 실험정보가 저장된 데이터베이스, 분석결과가 저장된 데이터베이스, 그리고 유전자 정보 탐색을 위한 데이터베이스로 분류해 데이터를 효율적으로 관리할 수 있게 하였다. 본 시스템은 LiNUX를 운영체계로 하고 데이터베이스는 MYSQL로 하여 JSP, Perl. 통계처리 언어인 R로 구현되었다.프트웨어를 사용하지 않고도 국내의 순수 솔루션인 리눅스 기반의 LonWare 3.0 다중 바인딩 기능을 통해 저 비용으로 홈 네트워크 구성 관리 서버 시스템 개발에 대한 비용을 줄일 수 있다. 기대된다.e 함량이 대체로 높게 나타났다. 점미가 수가용성분에서 goucose대비 용출함량이 고르게 나타나는 경향을 보였고 흑미는 알칼리가용분에서 glucose가 상당량(0.68%) 포함되고 있음을 보여주었고 arabinose(0.68%), xylose(0.05%)도 다른 종류에 비해서 다량 함유한 것으로 나타났다. 흑미는 총식이섬유 함량이 높고 pectic substances, hemicellulose, uronic acid 함량이 높아서 콜레스테롤 저하 등의 효과가 기대되며 고섬유식품으로서 조리 특성 연구가 필요한 것으로 사료된다.리하였다. 얻어진 소견(所見)은 다음과 같았다. 1. 모년령(母年齡), 임신회수(姙娠回數), 임신기간(姙娠其間), 출산시체중등(出産時體重等)의 제요인(諸要因)은 주산기사망(周産基死亡)에 대(對)하여 통계적(統計的)으로 유의(有意)한 영향을 미치고 있어 $25{\sim}29$세(歲)의 연령군에서, 2번째 임신과 2번째의 출산에서 그리고 만삭의 임신 기간에, 출산시체중(出産時體重) $3.50{\sim}3.99kg$사이의 아이에

  • PDF

Safe Driving Inducement Effect Analysis of Smart Delineator through Driving Simulation Evaluation (도로 주행 시뮬레이션 평가를 통한 스마트 델리네이터의 안전운전 유도 효과분석)

  • Ko, Han-Geom;Kim, Ji-Ho;Seong, Myung-Jae;Lee, Jin-Soo
    • Journal of Korean Society of Transportation
    • /
    • v.30 no.4
    • /
    • pp.43-59
    • /
    • 2012
  • Assuming a completed Smart Highway road & communication environment that allows real-time information collection and transmission of road traffic condition ahead, the purpose of this study is to develop a plan for inducing a network-level safe driving pattern by providing road traffic condition and safety information to multiple drivers through a road information provision device. In this study, the device with a function that displays different colors according to the hazard level to the existing delineator has been named 'Smart Delineator'. Smart Delineator is a device that provides not only alignment information but also safety information for drivers to receive real-time warning information and intuitively recognize road traffic condition ahead so that drivers can respond. To examine the effects of safety driving inducement level on drivers, a simulation test was conducted using driving simulator as well as a satisfaction survey. The result showed that the Smart Delineator was able to identify the location of occurrence and affecting driving according pattern, either adhering to recommended speed or reducing speed according to the pre-defined hazard level.

A Study on Competitiveness-reinforcing Factors in Designing Digital Door Lock Products and in Penetrating the Market -With Focus on an Analysis of Consumers' Preference by Product- (디지털 도어락 시장 진입을 위한 제품디자인의 경쟁력 장화요소 연구 - 제품별 소비자 선호도 분석을 중심으로 -)

  • Yoo, Boo-Mee
    • Archives of design research
    • /
    • v.18 no.1 s.59
    • /
    • pp.135-144
    • /
    • 2005
  • Consumers' awareness of product value, and their product preferences, are becoming increasingly influential in product development, particularly in corporations' efforts in manufacturing products with a competitive edge. Corporations conduct surveys on consumers' product satisfaction and preferences and conduct in-depth studies on consumer needs. They then manufacture products in accordance with the results of these surveys and studies. With the necessity and demand for digital door lock products recently growing, this research sought to explore product competitiveness reinforcement factors that could facilitate market penetration, and to formulate corresponding design strategies. In-depth consumer interviews were also conducted to identify consumer lifestyles and needs. Furthermore, consumer preference images, purchase and use-related patterns, and the status of door lock markets were studied. In the past, to design and manufacture consumer-oriented products, corporations primarily resorted to the improvement of the products' technological features. At present, the users' product preferences and the ways that they use these products are the factors that determine product design. Consumers today tend to adjust their lifestyles according to available products, and prefer products that have greater value in terms of lifestyle and culture. Strategic points for reinforcing competitiveness were presented in this study: first, offering different values that will enhance consumer satisfaction, second, positively developing bio-recognizable methods that will boost consumer preference, third, meeting the consumers' expectations that door lock products should not be mere 'entrance and exit control' systems, but network security systems and fourth, adopting convenient authentication methods backed by advanced technologies.

  • PDF

Design on Protection and Authentication System of IPTV Contents using OTP (OTP를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.129-137
    • /
    • 2009
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents protection and authentication system tends to draw more attentions. So we need a system that can protect contents and allow only authenticated person to use right service by controling user authority and using content encryption. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But the weak point of this system are in high costs, complexity and using HW. For resolving these problems, in this paper, we proposed IPTV contents protection and authentication system using OTP. When we transmit the content encrypted by OTP key using contents delivery technology, we operate XOR with contents using another settop-box's OTP key which was transmitted from distribution server. And contents are reconstructed and transmitted to the settop-box, In the end, downloaded content are encrypted by OTP key and are superior in content protection when contents redistribution. Since OTP use double-authentication elements in encryption process, this method is excellent in content protection. And it is very effective in cost aspect because it could be implemented by SW program. Another benefit is that we can shorten the development time period. In this paper, we propose and find its possibility as a new content protection and authentication method suitable for IPTV services.

An Analysis of Satellite Communications System structure for NCW (NCW대비 군 위성통신 구조 분석)

  • Park, Woo-Chul;Cha, Jae-Ryong;Kim, Jae-Hyun
    • Journal of Satellite, Information and Communications
    • /
    • v.4 no.1
    • /
    • pp.1-7
    • /
    • 2009
  • As the information age comes out, the aspect of future war brings about the many changes in terms of war-fighting environment. Accordingly, information superiority and intelligence-centric warfare have been important and new war-fighting concept such as NCW(network centric warfare) have been turned up. This paper proposed all-weather core-strategy communications systems guaranteeing not only the real-time transmission of the information collected in a battlefield and expansion, automation, and rapidity of a battlefield but also broadband, mobility, survivability, and flexibility. The proposed military satellite communications system is classified into wideband mass capacity link, survivability, and the system supporting OTM(on the move) communication for the real-time transmission of battlefield information. This paper analyzed the essential operation concepts and core schemes of the U.S. Army's next generation system, TSAT(Transformational Satellite Communication System). Base on the analysis results, this paper proposed that the architecture of next generation military satellite communications systems for NCW have to provide the data rate, anti-jamming capability, network control and management capability which are optimally adaptable for the wireless channel environments such as jamming and interference and to support the variety of platforms like high-speed mobile vehicles, micromini devices, super-high speed unmanned aerial vehicles. Finally, this paper also proposed that next generation military satellite communications systems need the technologies such as the adaptable multi-antenna, laser link, and next-generation anti-jamming waveform.

  • PDF

A Study on ACFBD-MPC in 8kbps (8kbps에 있어서 ACFBD-MPC에 관한 연구)

  • Lee, See-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.49-53
    • /
    • 2016
  • Recently, the use of signal compression methods to improve the efficiency of wireless networks have increased. In particular, the MPC system was used in the pitch extraction method and the excitation source of voiced and unvoiced to reduce the bit rate. In general, the MPC system using an excitation source of voiced and unvoiced would result in a distortion of the synthesis speech waveform in the case of voiced and unvoiced consonants in a frame. This is caused by normalization of the synthesis speech waveform in the process of restoring the multi-pulses of the representation segment. This paper presents an ACFBD-MPC (Amplitude Compensation Frequency Band Division-Multi Pulse Coding) using amplitude compensation in a multi-pulses each pitch interval and specific frequency to reduce the distortion of the synthesis speech waveform. The experiments were performed with 16 sentences of male and female voices. The voice signal was A/D converted to 10kHz 12bit. In addition, the ACFBD-MPC system was realized and the SNR of the ACFBD-MPC estimated in the coding condition of 8kbps. As a result, the SNR of ACFBD-MPC was 13.6dB for the female voice and 14.2dB for the male voice. The ACFBD-MPC improved the male and female voice by 1 dB and 0.9 dB, respectively, compared to the traditional MPC. This method is expected to be used for cellular telephones and smartphones using the excitation source with a low bit rate.

A Study of Autonomous Intelligent Load Management System Based on Queueing Model (큐잉모델에 기초한 자율 지능 부하 관리 시스템 연구)

  • Lee, Seung-Chul;Hong, Chang-Ho;Kim, Kyung-Dong;Lee, In-Yong;Park, Chan-Eom
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.22 no.2
    • /
    • pp.134-141
    • /
    • 2008
  • This paper presents an innovative load management technique that can effectively lower the summer peak load by adjusting the aircondition loads through smoothe coordinations between utility companies and large customers. An intelligent hierarchical load management system composed of a Central Intelligent Load Management System(CIMS) and multiple Local Intelligent Management Systems(LIMS) is also proposed to implement the reposed technique. Upon receiving a load curtailment request from the utilities, CIMS issues tokens, which can be used by each LIMS as a right to turn on the airconditioner. CIMS creates and maintains a queue for fair allocation of the tokens among the LIMS demanding tokens. By adjusting the number tokens and queue management Policies, desired load factors can be achieved conveniently. The Markov Birth and Death Process and the Balance Equations are employed in estimating various queue performances. The proposed technique is tested using a summer load data of a large apartment complex and proved to be quite effective in load management while minimizing the customer inconveniences.