• Title/Summary/Keyword: Computing technology

Search Result 4,201, Processing Time 0.029 seconds

A RFID Tag Anti-Collision Algorithm Using 4-Bit Pattern Slot Allocation Method (4비트 패턴에 따른 슬롯 할당 기법을 이용한 RFID 태그 충돌 방지 알고리즘)

  • Kim, Young Back;Kim, Sung Soo;Chung, Kyung Ho;Ahn, Kwang Seon
    • Journal of Internet Computing and Services
    • /
    • v.14 no.4
    • /
    • pp.25-33
    • /
    • 2013
  • The procedure of the arbitration which is the tag collision is essential because the multiple tags response simultaneously in the same frequency to the request of the Reader. This procedure is known as Anti-collision and it is a key technology in the RFID system. In this paper, we propose the 4-Bit Pattern Slot Allocation(4-BPSA) algorithm for the high-speed identification of the multiple tags. The proposed algorithm is based on the tree algorithm using the time slot and identify the tag quickly and efficiently through accurate prediction using the a slot as a 4-bit pattern according to the slot allocation scheme. Through mathematical performance analysis, We proved that the 4-BPSA is an O(n) algorithm by analyzing the worst-case time complexity and the performance of the 4-BPSA is improved compared to existing algorithms. In addition, we verified that the 4-BPSA is performed the average 0.7 times the query per the Tag through MATLAB simulation experiments with performance evaluation of the algorithm and the 4-BPSA ensure stable performance regardless of the number of the tags.

IoT Based Performance Measurement of Car Audio Systems in Korean Recreation Vehicles (IoT 센서를 이용한 국산 RV차량 음향시스템의 음향특성에 관한 분석)

  • Park, Hyung Woo;Lee, Sangmin
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.57-64
    • /
    • 2017
  • Recent automobile manufacturing technology has improved not only the function and performance of cars, but also the audio systems in cars so as to increase their marketability. Automobile manufacturers always have the option of simply installing an expensive acoustic system to help customers enjoy a high-level sound quality car audio system. However, this also tends to increase the MSRP (Manufacturer's Suggested Retail Price) of the car. Therefore, it is desirable, where possible, to enhance the sound quality of plainer, less expensive audio devices to help customers feel as if they have a high-quality and expensive audio device in their car. In order to make this happen, the manufacturer must develop an optimal interior environment and audio system at a relatively lower cost. To this end, features of the car audio system can be enhanced by analyzing audio frequency response and using performance metrics to figure out the characteristics of the human auditory system. This study analyzed the sound field of Korean Recreation Vehicles (RVs) using the Internet of Things (IoT) sensor for the measurement of car audio system. As a result, high energy of sensitive bandwidth, one of the human auditory characteristics often makes annoying sound. This study also found that increasing the frequency response flatness is required by taking human auditory field into account when designing the car audio system for the future.

Fingerprint Recognition Algorithm using Clique (클릭 구조를 이용한 지문 인식 알고리즘)

  • Ahn, Do-Sung;Kim, Hak-Il
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.2
    • /
    • pp.69-80
    • /
    • 1999
  • Recently, social requirements of personal identification techniques are rapidly expanding in a number of new application ares. Especially fingerprint recognition is the most important technology. Fingerprint recognition technologies are well established, proven, cost and legally accepted. Therefore, it has more spot lighted among the any other biometrics technologies. In this paper we propose a new on-line fingerprint recognition algorithm for non-inked type live scanner to fit their increasing of security level under the computing environment. Fingerprint recognition system consists of two distinct structural blocks: feature extraction and feature matching. The main topic in this paper focuses on the feature matching using the fingerprint minutiae (ridge ending and bifurcation). Minutiae matching is composed in the alignment stage and matching stage. Success of optimizing the alignment stage is the key of real-time (on-line) fingerprint recognition. Proposed alignment algorithm using clique shows the strength in the search space optimization and partially incomplete image. We make our own database to get the generality. Using the traditional statistical discriminant analysis, 0.05% false acceptance rate (FAR) at 8.83% false rejection rate (FRR) in 1.55 second average matching speed on a Pentium system have been achieved. This makes it possible to construct high performance fingerprint recognition system.

  • PDF

A Design of Multiplier Over $GF(2^m)$ using the Irreducible Trinomial ($GF(2^m)$의 기약 3 항식을 이용한 승산기 설계)

  • Hwang, Jong-Hak;Sim, Jai-Hwan;Choi, Jai-Sock;Kim, Heung-Soo
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.38 no.1
    • /
    • pp.27-34
    • /
    • 2001
  • The multiplication algorithm using the primitive irreducible trinomial $x^m+x+1$ over $GF(2^m)$ was proposed by Mastrovito. The multiplier proposed in this paper consisted of the multiplicative operation unit, the primitive irreducible operation unit and mod operation unit. Among three units mentioned above, the Primitive irreducible operation was modified to primitive irreducible trinomial $x^m+x+1$ that satisfies the range of 1$x^m,{\cdots},x^{2m-2}\;to\;x^{m-1},{\cdots},x^0$ is reduced. In this paper, the primitive irreducible polynomial was reduced to the primitive irreducible trinomial proposed. As a result of this reduction, the primitive irreducible trinomial reduced the size of circuit. In addition, the proposed design of multiplier was suitable for VLSI implementation because the circuit became regular and modular in structure, and required simple control signal.

  • PDF

The Effect of Cloud Service Risks on the Intention of Purchasing Real Options: Focusing on Public Cloud Service of Small and Medium-sized Enterprises (클라우드 서비스 위험이 실물옵션 채택의도에 미치는 영향: 중소기업의 퍼블릭 클라우드 서비스를 중심으로)

  • Kim, Jeong-eun;Yang, Hee-dong
    • Information Systems Review
    • /
    • v.17 no.1
    • /
    • pp.117-140
    • /
    • 2015
  • Cloud Computing has drawn attention as one of 10 IT strategic technology trends and has various advantages such as cost reduction and enhancing business flexibility. However, corporations hesitate to adopt the service because of unexpected risks. Especially compared to large firm, medium and small ones use public cloud that security risk is high. Meanwhile, real option strategy has drawn attention as the method to hedge uncertainty in IT projects. Therefore, in this study causal relationships among technical, security, relational, and economic risks of cloud service will be investigated. Eventually, this study investigates how those risks influence the intention to choose the real option about the cloud service. For this study, five hypotheses is drawn, and a survey is conducted about the medium and small firms which are currently using cloud service to examine hypotheses. Since the study is at organizational level, 287 questionnaire replies are recalculated to 120 firms. For statistical analysis, Smart PLS and SPSS Statistics18 are used. As a result, technical risk of cloud service has significantly positive influence on security risk. Second, security risk and relational risk of cloud service has significantly positive influence on economic risk. Third, economic risk of cloud service has significantly positive influence on the intention to purchase the delay option or abandon option. Based on this result, this research discussed practical and academic implications and the limitations.

Utilization of Social Media Analysis using Big Data (빅 데이터를 이용한 소셜 미디어 분석 기법의 활용)

  • Lee, Byoung-Yup;Lim, Jong-Tae;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.2
    • /
    • pp.211-219
    • /
    • 2013
  • The analysis method using Big Data has evolved based on the Big data Management Technology. There are quite a few researching institutions anticipating new era in data analysis using Big Data and IT vendors has been sided with them launching standardized technologies for Big Data management technologies. Big Data is also affected by improvements of IT gadgets IT environment. Foreran by social media, analyzing method of unstructured data is being developed focusing on diversity of analyzing method, anticipation and optimization. In the past, data analyzing methods were confined to the optimization of structured data through data mining, OLAP, statics analysis. This data analysis was solely used for decision making for Chief Officers. In the new era of data analysis, however, are evolutions in various aspects of technologies; the diversity in analyzing method using new paradigm and the new data analysis experts and so forth. In addition, new patterns of data analysis will be found with the development of high performance computing environment and Big Data management techniques. Accordingly, this paper is dedicated to define the possible analyzing method of social media using Big Data. this paper is proposed practical use analysis for social media analysis through data mining analysis methodology.

Authentication and Key Management Techniques for Secure Communication in IP Camera (IoT 환경에서 IP카메라의 효율적 운용을 위한 키 관리 및 보안 설계 프로토콜)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.602-608
    • /
    • 2020
  • Development of Internet technology and the spread of various smart devices provide a convenient computing environment for people, which is becoming common thanks to the Internet of Things (IoT). However, attacks by hackers have caused various problems, such as leaking personal information or violating privacy. In the IoT environment, various smart devices are connected, and network attacks that are used in the PC environment are occurring frequently in the IoT. In fact, security incidents such as conducting DDoS attacks by hacking IP cameras, leaking personal information, and monitoring unspecified numbers of personal files without consent are occurring. Although attacks in the existing Internet environment are PC-oriented, we can now confirm that smart devices such as IP cameras and tablets can be targets of network attacks. Through performance evaluation, the proposed protocol shows 11% more energy efficiency on servers than RSA, eight times greater energy efficiency on clients than Kerberos, and increased efficiency as the number of devices increases. In addition, it is possible to respond to a variety of security threats that might occur against the network. It is expected that efficient operations will be possible if the proposed protocol is applied to the IoT environment.

Computation of the Shortest Distance of Container Yard Tractor for Multi-Cycle System (다중 사이클 시스템을 위한 실시간 위치 기반 컨테이너 야드 트랙터 최단거리 계산)

  • Kim, Han-Soo;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.17-29
    • /
    • 2010
  • A container terminal productivity is maximized by a minimized time for processing containers. So, we have been elevated the container terminal productivity through an improvement of computing system, but there are a limitation because of problems for transportation management and method. A Y/T(Yard Tractor), which is a representative transportation, is able to do only one process, loading or unloading, at one time. So if the Y/T can do loading and unloading step by step at a same time, the processing time would be shortened. In this paper, we proposed an effective operating process of Y/T(Yard Tractor) Multi-Cycle System by applying RTLS(Real Time Location System) to Y/T(Yard Tractor) in order to improve the process of loading and unloading at the container terminal. For this, we described Multi-Cycle System. This system consists of a real time location of Y/T based on RTLS, an indicating of Y/T location in real time with GIS technology, and an algorithm(Dijkstra's algorithm) of the shortest distance. And we used the system in container terminal process and could improve the container terminal productivity. As the result of simulation for the proposed system in this paper, we could verify that 9% of driving distance was reduced compared with the existing rate and 19% of driving distance was reduced compared with the maximum rate. Consequently, we could find out the container performance is maximized.

Design and Implementation of Process Management Model applying Agent Technology (헬스케어 홈 서비스를 위한 데이터베이스 및 응용 서비스 구현)

  • Lee, Chung-Sub;Jeong, Chang-Won;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.57-70
    • /
    • 2007
  • This paper is to construct a healthcare database using information obtained from healthcare home environments, and use this one for healthcare home services, Especially, our researching focus in this paper is how to design healthcare database scheme and how to use this constructed database on the Framework for Supporting Healthcare Integrated Service(FSHIS) we developed previously. Healthcare information is designed to database schemes in accordance to the specific save types of the data collected from various typed-sensors. The healthcare database constructed by using this information for the purpose of healthcare home services is divided into the base information with real schemes and the context based information with view schemes. Firstly, the base information includes low data obtained from physical sensors relevant to locations, healths, environments, and the personnel healthy profiles. The other is the context based information that is produced and fused by using the based information. This context based information might be got via various view schemes according to healthcare application services. Finally, for verifying the practical use of healthcare database constructed in this paper, Via interconnecting this database to our FSHIS, we show an example of healthcare home monitoring service using information (basic and context based information), emergency call, home appliance control, and so on needed from living activity area for elderly living alone.

  • PDF

A Study on the Clearance Level(draft) for the Steel Scrap from the KRR-1 & 2 Decommissioning (연구로 1,2호기 해체 철재폐기물의 규제해제농도기준(안) 도출을 위한 연구)

  • 홍상범;이봉재;정운수
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.2 no.1
    • /
    • pp.60-67
    • /
    • 2004
  • The exposure dose form recycling of a large amount of the steel scrap from the KRR-1&2 decommissioning activities was evaluated, and also the clearance level(draft) was derived. The maximum individual dose and collective dose were evaluated by modifying internal dose conversion factor which was based on the concept of effective dose in ICRP 60, applied to the RESRAD-RECYCLE ver 3.06 computing code, IAEA Safety Series 111-P-1.1 and NUREG-1640 as the assessment tool. The result of assessment for individual dose and collective dose is 23.9 $\mu$Sv per year and 0.11 man$.$Sv per year respectively. The clearance levels were ultimately determined by extracting the most conservative value form the results of the generic assessment and specific assessment methodologies. The result of clearance level for radionuclides( $Co^{60}$ , C $s^{l37}$) is less than 1.14${\times}$10$^{-1}$ Bq/g to comply with the clearance criterion(maximum individual dose : 10 $\mu$Sv per year, collective dose : 1 man$.$Sv per year) provided for Korea Atomic Energy Act and relevant regulations.s.

  • PDF