• Title/Summary/Keyword: 확산 제어

Search Result 589, Processing Time 0.025 seconds

Application and Evaluation of a Traffic Signal Control Algorithm based on Travel Time Information for Coordinated Arterials (연동교차로를 위한 통행시간기반 신호제어 알고리즘의 현장 적용 및 평가)

  • Jeong, Yeong-Je;Kim, Yeong-Chan
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.5
    • /
    • pp.179-187
    • /
    • 2009
  • This study develops a real-time signal control algorithm based on sectional travel times and includes a field test and evaluation. The objective function of the signal control algorithm is the equalization of delay of traffic movements, and the main process is calculating dissolved time of the queue and delay using the sectional travel time and detection time of individual vehicles. Then this algorithm calculates the delay variation and a targeted red time and calculates the length of the cycle and phase. A progression factor from the US HCM was applied as a method to consider the effect of coordinating the delay calculation, and this algorithm uses the average delay and detection time of probe vehicles, which were collected during the accumulated cycle for a stabile signal control. As a result of the field test and evaluation through the application of the traffic signal control algorithm on four consecutive intersections at 400m intervals, reduction of delay and an equalization effect of delay against TOD control were confirmed using the standard deviation of delay by traffic movements. This study was conducted to develop a real-time traffic signal control algorithm based on sectional travel time, using general-purpose traffic information detectors. With the current practice of disseminating ubiquitous technology, the aim of this study was a fundamental change of the traffic signal control method.

An Anonymity-Preserving User Authentication and Authorization Model for Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경을 위한 익명성을 보장하는 사용자 인증 및 접근제어 모델)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.4 s.304
    • /
    • pp.25-32
    • /
    • 2005
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'Smart space' augmented with intelligence and enhanced with services. However, the deployment of this computing paradigm in real-life is disturbed by poor security, particularly, the lack of proper authentication and authorization techniques. Also, it is very important not only to find security measures but also to preserve user privacy in ubiquitous computing environments. In this Paper, we propose efficient user authentication and authorization model with anonymity for the privacy-preserving for ubiquitous computing environments. Our model is suitable for distributed environments with the computational constrained devices by using MAC-based anonymous certificate and security association token instead of using Public key encryption technique. And our Proposed Protocol is better than Kerberos system in sense of cryptographic computation processing.

Hygienic Management for Salmonella-Free Chicken Meat Production (살모넬라 부재 계육 생산을 위한 위생관리)

  • Yang, Si-Yong;Hong, Young-Ho;Lee, Hyun-Jeong;Song, Chang-Seon
    • Korean Journal of Poultry Science
    • /
    • v.37 no.3
    • /
    • pp.289-295
    • /
    • 2010
  • Because some zoonotic Salmonella can be transmitted to human through poultry products, threatening human public health, Salmonella infections in poultry are increasingly worldwide subject to control measures and programs. Given the fact that there are numerous opportunities for Salmonella to gain entry to extensive, integrated poultry operations including the hatching, handling, feeding, and processing facilities, the whole supply chain of poultry meat should be an object of Salmonella control programs as well as biosecurity of poultry farms. This article reviews Salmonella food poisoning caused by poultry source and critical need to control Salmonella in poultry productions, and describes practical strategies.

Design and Implementation of a Location Privacy System supporting Privacy Self Controls (프라이버시 자기제어를 지원하는 위치정보 프라이버시 시스템의 설계 및 구현)

  • Lee, Eung-Jae;Ju, Yong-Wan;Nam, Kwang-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.853-862
    • /
    • 2010
  • As the mobile device and broadband wireless internet such as WiBro, HSDPA is widely spreading, various types of advertisement and services based on personal location information can be provided. However, with convenience supported by these services, it is possible to be increased an invasion of privacy such as personal location and moving pattern. In this paper, we analysis an essential element for protection of privacy related on location information in mobile environment and propose location privacy protocol for managing location privacy self-control. And we design and implementation prototype of location privacy self-control system which is able to manage user's location privacy condition oneself using the proposed location privacy protocol.

A Concurrency Control Scheme for Client Transaction in Dual-Channel Broadcast Disk Environments (이중 채널 기반 방송 디스크 환경에서 읽기 전용 트랜잭션을 위한 동시성 제어 기법)

  • Lee, Sangho;Kim, Jinhong;Lee, Sooin
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2013.06a
    • /
    • pp.97-100
    • /
    • 2013
  • 최근 4세대(4G) 통신망으로의 전환의 가속화와 스마트 모바일 기기의 확산으로 인하여 무선 통신망에서 데이터 트래픽이 급증하고 있다. 이러한 급증하는 데이터 트래픽을 분산시키기 위하여 2개의 주파수 밴드를 사용하는 멀티 캐리어 기술이 선보이고 있다. 방송 디스크는 서버가 데이터베이스에 저장된 모든 데이터를 연속적으로 다수의 모바일 클라이언트에게 방송하고, 클라이언트는 방송 채널을 감시하여 원하는 데이터가 방송될 경우 방송 채널로부터 데이터를 수신하는 통신 구조이다. 이런 관점에서 방송 채널은 클라이언트가 데이터를 액세스할 수 있는 디스크의 역할을 담당한다. 본 논문에서는 무선 통신망이 멀티 캐리어를 지원할 경우, 클라이언트에서 실행되는 읽기 전용 트랜잭션의 정확성을 보장하기 위한 동시성 제어 기법(Dual-Channel based Concurrency Control: DCC)을 제안한다. 기존에 동시성 제어 기법들은 단일 방송채널에서 트랜잭션의 철회률을 줄이기 위하여 추가적인 제어 정보들을 방송하거나 방송 데이터의 타임스탬프 필드를 이용하고 있다. 클라이언트에서 실행되는 트랜잭션은 단일 방송 사이클이 아니라 여러 방송 사이클에 걸쳐서 실행된다. 이러한 방송 디스크 환경의 특징은 클라이언트 트랜잭션이 디스크에서 방송 인덱스를 판독하여 방송 프로그램 상에서 트랜잭션에 필요한 데이터가 방송 될 때까지 기다리게 된다. 이와는 달리 DCC는 주력 망과 보조 망에서 방송되는 방송 프로그램의 순서를 서로 다르게 하여 데이터 판독에 필요한 대기 시간을 줄일 수 있다. 보조망의 방송 프로그램의 순서는 주력망의 방송 프로그램 순서의 역순서로 방송함으로써 보조 망 또는 주력 망에서 실행되고 있는 트랜잭션이 다른 방송 채널의 방송 인덱스를 판독하지 않아도 방송 프로그램 순서를 예측할 수가 있다. 그 결과, DCC는 방송 디스크의 데이터 판독에 요구되는 대기시간을 줄여 읽기 전용 트랜잭션의 철회률을 줄일 수 있다는 장점을 갖는다.

  • PDF

Performance Evaluation and Analysis of Zero Reduction Codes for Effective Dimming Control in Optical Wireless Communications using LED Lightings (LED조명을 이용한 광 무선 융합 통신 시스템에서 디밍제어를 위한 zero Reduction Code 성능 분석 및 고찰)

  • Kim, Kyun-Tak;Lee, Kyu-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.97-103
    • /
    • 2017
  • In this paper, we aim to investigate the generalization of ZRC codes by performing performance analysis on various coding rates and channel conditions of Zero Reduction Code (ZRC) for dimming control in VLC system. Simulation results show that the ZRC codes with relatively high coding rate achieve the enhanced BER performance as the RMS (Root Mean Square) delay spread value increases in the NLOS channelse. Therefore, it is expected that the designing of the dimming control technology using ZRC in the future visible light communication system will help to determine the coding rate according to the channel state through the analysis result in this study.

One-Snapshot Algorithm for Secure Transaction Management in Electronic Stock Trading Systems (전자 주식 매매 시스템에서의 보안 트랜잭션 관리를 위한 단일 스냅샷 알고리즘)

  • 김남규;문송천;손용락
    • Journal of KIISE:Databases
    • /
    • v.30 no.2
    • /
    • pp.209-224
    • /
    • 2003
  • Recent development of electronic commerce enables the use of Electronic Stock Trading Systems(ESTS) to be expanded. In ESTS, information with various sensitivity levels is shared by multiple users with mutually different clearance levels. Therefore, it is necessary to use Multilevel Secure Database Management Systems(MLS/DBMSs) in controlling concurrent execution among multiple transactions. In ESTS, not only analytical OLAP transactions, but also mission critical OLTP transactions are executed concurrently, which causes it difficult to adapt traditional secure transaction management schemes to ESTS environments. In this paper, we propose Secure One Snapshot(SOS) protocol that is devised for Secure Transaction Management in ESTS. By maintaining additional one snapshot as well as working database SOS blocks covert-channel efficiently, enables various real-time transaction management schemes to be adapted with ease, and reduces the length of waiting queue being managed to maintain freshness of data by utilizing the characteristics of less strict correctness criteria. In this paper, we introduce the process of SOS protocol with some examples, and then analyze correctness of devised protocol.

Development of a Remote Dust Collector Bag Control System using Power Line Communication (전력선 통신을 이용한 원격 집진기 bag 제어 시스템 개발)

  • Kim, Jung-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.4
    • /
    • pp.91-98
    • /
    • 2010
  • Advances in communications and control technology, the strengthening of the Internet, and the growing recognition of the urgency to reduce the risk and production cost are motivating the development of improvements in the traditional manufacturing industry. In this paper, we developed a remote dust collector bag control system which is a combination of advanced IT and traditional dust collector based on the event. At first, we made the A/D(Analog/Digital) converter using a micro processor because the differential pressure transmission, which is a sensor of the dust collector, produces analog volt data. A/D converter can provide RS-232 communication to connect with Power Line Communication(PLC) modem. And, n-bytes message format was defined for the efficient dust collector bag information transmission from a dust collector to a user. Also, we designed the data types to model the dust collector and the dust collector bag, and they were logically modeled using XML and object-oriented modeling method. In addition to that, we implemented the system for showing the dust collector bag exchange time exactly to users at real-time using various visual user interfaces.

Case Study of a Field Test for a Smoke Control System Using Sandwich Pressurization (샌드위치 가압을 이용하는 연기제어 시스템의 현장실험 사례 연구)

  • Kim, Jung-Yup;Ahn, Chan-Sol
    • Fire Science and Engineering
    • /
    • v.30 no.5
    • /
    • pp.87-92
    • /
    • 2016
  • Amid the growing number of high-rise complex buildings in Korea, efficient smoke prevention technology in a fire is required and as an alternative of a mechanical smoke control system in high-rise buildings, the use of a smoke control system using sandwich pressurization has been on the rise. In such a system, the appropriate pressure difference and the data for designing the air supply and exhaust flow rate are necessary to prevent the spread of smoke and offer a tenable evacuation environment. As part of such effort, this paper presents a field test process and result after testing a building where such a smoke control system using sandwich pressurization has been installed. A ventilation rate of 6 cycles per hour were applied to simulate the air exhaust flow rate on a fire floor and the air supply flow rate on the floors above and below the fire floor. As a result of the system operation, pressure difference of approximately 260 Pa between the 12th floor of a fire and the 13th floor was generated. The over pressure of the experiment has a serious effect on the evacuation or fire compartment so that it is necessary to examine the improvement.

Blockchain-Based Access Control Audit System for Next Generation Learning Management (차세대학습관리를 위한 블록체인 기반의 접근제어 감사시스템)

  • Chun, Ji Young;Noh, Geontae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.11
    • /
    • pp.351-356
    • /
    • 2020
  • With the spread of COVID-19 infections, the need for next-generation learning management system for undact education is rapidly increasing, and the Ministry of Education is planning future education through the establishment of fourth-generation NEIS. If the fourth-generation NEIS System is well utilized, there are advantages such as providing personalized education services and activating the use of educational data, but a solution to the illegal access problem in an access control environment where strict authorization is difficult due to various user rights. In this paper, we propose a blockchain-based access control audit system for next-generation learning management. Sensitive personal information is encrypted and stored using the proposed system, and when the auditor performs an audit later, a secret key for decryption is issued to ensure auditing. In addition, in order to prevent modification and deletion of stored log information, log information was stored in the blockchain to ensure stability. In this paper, a hierarchical ID-based encryption and a private blockchain are used so that higher-level institutions such as the Ministry of Education can hierarchically manage the access rights of each institution.