• Title/Summary/Keyword: 제어 모듈

Search Result 1,919, Processing Time 0.032 seconds

Energy Efficient Grid-Based WPAN Protocol for Ship Area Networks (에너지 효율성을 갖는 그리드 기반 선박 내 WPAN 프로토콜)

  • Lee, Seong Ro;Jeong, Min-A;Hur, Kyeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1185-1191
    • /
    • 2014
  • An integrated ship area network has functionality of remote control and autonomous management of various sensors and instruments embedded or boarded in a ship. For such environment, a wireless bridge is essential to transmit control and/or managing information to sensors or instruments from a central integrated ship area network station. In this paper, one of reliable schemes of In-ship sensor networks using a Grid-based WPAN is proposed. The proposed scheme is based on a novel grid network which allows a multi-path communication, and is robust, energy efficient. The results demonstrate that the proposed Grid-based WPAN outperforms the IEEE 802.15.4 based network in terms of success ratio and power efficiency.

Generalization modeling and verify for low-orbit satellite regulation converter (저궤도 위성의 정 전압 변압기 일반화 모델링 및 적용)

  • Yun, Seok-Teak
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.2
    • /
    • pp.136-140
    • /
    • 2011
  • Satellites industry has been developing with the commercial and military needs. Because power system of satellites is very important to survival operation and hard to test, increasing reliability is very critical. Especially LEO small satellites are very sensitive to power system, effective stabilization control is important. Because of various need of load condition, converter design are complicated. Therefore this paper introduced general modeling of LEO small satellite converter system and analyzed stabilization control design. The performance prediction of LEO small satellites power system is typically critical. Because of verity controller and rectification value, it is hard to computation and test implementation. So, this approach has merit that will reduce cost and make more reliable system. Furthermore, it can be constraint of converter specification and controller design. This paper will examine generation a modeling of LEO small satellites power converting system, and a possible guide line to design reliable controller which optimizing power converters of LEO small satellite.

Key Distribution Scheme for Supporting Multiple Set-Top Box in Chipset Pairing Conditional Access System (칩셋 페어링 접근제한시스템 환경에서 다중 셋톱박스를 지원하는 키 분배 기법)

  • Lee, Hoon-Jung;Son, Jung-Gab;Oh, Hee-Kuck
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.39-46
    • /
    • 2012
  • In this paper, we propose a key distribution scheme for flexible chipset pairing conditional access system. Chipset pairing conditional access system is the implementation of CA (Conditional Access) module by using both embedded secure chip in a Set-Top Box(STB) and smartcard, and the secure chip embedded in a STB forms a secure channel between the smartcard and the STB. In short, it is the system that a smartcard outputs encrypted CW (Control Word) to the STB, and the STB decrypts an encrypted CW by using the embedded secure chip. The drawback of this chipset pairing conditional access system is that one smartcard is able to be used for only one specified STB since it is the system using the STB bound to a smartcard. However, the key distribution scheme proposed in this paper overcomes a drawback of current chipset pairing conditional access system by using Chinese Remainder Theorem(CRT). To be specific, with this scheme, one smartcard can be used for multiple, not single, STBs, and applied to current chipset pairing without great changes.

Study on performance improvement of electric-point machine monitoring system (전기선로전환기 모니터링시스템의 성능 향상에 관한 연구)

  • Park, Jae-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4509-4514
    • /
    • 2010
  • In this thesis, the effect of switch maintenance improvement is confirmed after testing and operating the switch monitoring system that were researched and developed originally in order to improve method of electric switch maintenance. However, as in an automatic interlocking station where a ground crew was not placed, repair and inspection could not be carried out until the maintenance person comes in case of switch problems or maintenance. In order to improve this issue, control module was installed in a monitoring system which can communicate through a data radio to a remote computer. Thus, the monitoring device can receive control information which a remote computer commands during the operation of switches. Afterward, it shows information on the real-time status of swith, in particular, anomaly situation through user interface after the switch is operated. By improving performance of the monitoring system in this way which can be managed and controled at a remote place, the prompt countermeasure system in case of disruption will be built and as a result, efficiency and convenience of maintenance improvement will be expected to increase.

An Adaptive Anomaly Detection Model Design based on Artificial Immune System in Central Network (중앙 집중형 망에서 인공면역체계 기반의 적응적 망 이상 상태 탐지 모델 설계)

  • Yoo, Kyoung-Min;Yang, Won-Hyuk;Lee, Sang-Yeol;Jeong, Hye-Ryun;So, Won-Ho;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3B
    • /
    • pp.311-317
    • /
    • 2009
  • The traditional network anomaly detection systems execute the threshold-based detection without considering dynamic network environments, which causes false positive and limits an effective resource utilization. To overcome the drawbacks, we present the adaptive network anomaly detection model based on artificial immune system (AIS) in centralized network. AIS is inspired from human immune system that has learning, adaptation and memory. In our proposed model, the interaction between dendritic cell and T-cell of human immune system is adopted. We design the main components, such as central node and router node, and define functions of them. The central node analyzes the anomaly information received from the related router nodes, decides response policy and sends the policy to corresponding nodes. The router node consists of detector module and responder module. The detector module perceives the anomaly depending on learning data and the responder module settles the anomaly according to the policy received from central node. Finally we evaluate the possibility of the proposed detection model through simulation.

Long Distance Transmission System of Tag's ID in RFID System (전자인식 시스템에서 택 ID의 원거리 전송 시스템)

  • Kim, Dong-Hun;Jo, Hyeong-Guk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.63-67
    • /
    • 2009
  • In RFID system, Tag's Identification data is processed in host computer by application program. Example of application program is parking administration program, library state program etc.. Tag's ID that is recognized in reader is inputted to the Host computer. Application program of computer searches data in DB of computer such as Tag ID. After finding the same ID, host computer send to control command to driver H/W in accordance with application purpose. But, It need to confirm in long distance whether achievement process is acted normally. There will be the 2 methods, when we monitors the process in long distance. One is wired monitoring system, another is wireless monitoring system. Among wire method, internet communication network is useful. RFID system manufacture first in this treatise. RFID system Embody using EM4095 chip that is doing 125KHz by carrier wave. Tag's characteristic ID is sent in remote place through module that use W3100A chip. This system Manufacture, and data send-receive confirmed using simple application program. Reception confirm by result, and pictures show by whole system and each part. And a control program explained of each part.

  • PDF

Study of real-time OS structure that use OSEK/VDX (OSEK/VDX이용한 실시간 OS 구조에 관한 연구)

  • Oh, Chang-Yeon;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.861-865
    • /
    • 2009
  • Technical development in car has utilized electronic controls (ECU, Electronic Control Unit) recently if was achieved machine such as engine performance in priority and electronic side technical development that improve safety, convenience, expense etc. is proceeded vigorously. Also, preference of consumers for car is various model's number according to change at the fast speed and complexity of software required from vanguard service development was increased greatly. Software development expense dominated considerable weight in car manufacture expense by such change and automakers established OSEK/VDX that is standard of automobile embeded system to reuse application software by module to respond this and transplant easily to other control device. Do when search about all item that is necessary in real-time OS structure that examines OSEK/VDX standard that is presented as the alternative to respond environment that change rapidly that refer in dignified mien after it is original, and uses actuality OSEK/VDX.

  • PDF

Processing Time Optimization of an Electronic Stability Control system design Using Multi-Cores for AURIX TC 275 (AURIX TC 275에서 멀티코어를 이용한 Electronic Stability Control의 수행시간 최적화)

  • Jang, Hong-Soon;Cho, Young-Hwan;Jeong, Gu-Min
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.5
    • /
    • pp.385-393
    • /
    • 2021
  • This study proposes a multi-core-based controller design for an ESC(Electronic Stability Control) system in an automotive multi-core processor. Considering the architectures of an automotive multi-core processor and an ESC system, the overall execution time has been optimized for multi-core platforms. The function module assignment, synchronization between cores, and memory assignment for core-dependent variables in automotive multi-core systems are evaluated. The ESC controller comprising five function modules is used herein. Based on the proposed design, the single-core controller is extended to multi-core controllers. Using multi-core optimization methods, such as function module assignment, semaphore, interrupt awakening, and variable assignment over cores, the ESC system is redesigned to a multi-core controller. Experimental results reveal that the execution time for the multi-core processor is reduced by 59.7% compared with that for the single-core processor.

The development of th gamma-ray imaging and operation algorithm for the gamma-ray detection system (감마선 탐지장치의 감마선 영상화 및 운용 알고리즘 개발)

  • Song, Kun-young;Hwang, Young-gwan;Lee, Nam-ho;Yuk, Young-ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.942-943
    • /
    • 2016
  • Stereo gamma ray detection system generates a two-dimensional image of the gamma ray by using the position values and the gamma ray signal. And the device will overlap with the visible light image shows the actual distribution of the gamma-ray space. The gamma ray detection device is a stereo configuration to a motion controller for controlling the signal measurement unit and the position detection portion for detecting the detection portion and the gamma-ray signal comprising a gamma-ray detection sensor. In this paper, we developed a system operation management algorithm for each module individually configured efficiently. We confirmed the imaged and distribution information output for the gamma rays from gamma-ray irradiation test site by using these results.

  • PDF

Industry Secret Information Leakage Prevention : Focus on the Utilization of IoT (기업의 산업기밀정보 유출예방에 관한 연구: 사물인터넷 활용을 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.101-110
    • /
    • 2017
  • The purpose of this study is to examine possibilities of industry secret information leakage through IoT devices and to prevent information leakage from the perspective of administrative and technique security. From the administrative security perspective, first, it is important to face the possibility of industry information data leakage through anyone who can access companies and should establish guidelines to limit the use of IoT devices when entering companies. Second, security management guideline should be prepared by companies or upon user's request and use of any electronic devices sharing wireless internet connection should be eliminated or restricted. From technique security perspective, channels that sharing IoT devices in computers should be controlled since industry secret information are stored in computers and servers. Furthermore, IoT devices that accessing wireless internet network or devices that already registered should be regularly checked in order to minimize any information leakage. Lastly, data and information stored in computers and servers should be encrypted.