• Title/Summary/Keyword: Cruise Industry

Search Result 71, Processing Time 0.045 seconds

Network Design for Effective In-Ship Communication Network Construction (선박 내 통신망 구성을 위한 네트워크 구조 설계)

  • Kim, Mi-Jin;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.269-272
    • /
    • 2011
  • Recently, all areas of IT has been rapidly in land. As a result, the location is very important in everyday life. But in ship are limits network with communication Equipment and service. As a result, be far removed from information age. Currently, ship is connected with the outside world via satellite on the voyage. But, because high billing, ship is possible data transfer using low speed bandwidth. Because ship is not possible using LAN, only limit ship's crew some use internet in limited space. So, ship is required construction of the network. In this paper, because composition of basic IT environment with information need of crew and customer from ship to cruises, there construct LAN in ship and propose network design for network of ship.

  • PDF

Design of Network for Effective In-Ship Communication Network Construction (효과적인 선박 내 통신망 구성을 위한 네트워크 설계)

  • Kim, Mi-Jin;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.187-190
    • /
    • 2010
  • Lately, IT has been rapidly in land. as a result, mobile device come into wide use and is very important in everyday life. But in ship are limits network with communication Equipment and service. as a result, be far removed from information age. Currently, ship Is connected with the outside world via satellite on the voyage. but, because high billing, ship is possible data transfer using low speed bandwidth. because ship is not possible using LAN, only limit ship's crew some use internet in limited space. so, ship is required construction of the network. in this paper, because composition of basic IT environment with information need of crew and customer from ship to cruises, there construct LAN in ship and propose network design for network of ship.

  • PDF

Verification and Development of Simulation Model for Fuel Consumption Calculation between ICEV and PHEV (자동차 동력원별(ICEV, PHEV) 연비산출 모델개발 및 이의 검증)

  • Kim, J.W.;Park, J.M.;Kim, T.K.;Lee, J.W.
    • Journal of ILASS-Korea
    • /
    • v.22 no.2
    • /
    • pp.47-54
    • /
    • 2017
  • $CO_2$ emission regulation will be prescribed and main issue in automotive industry. Mostly, vehicle's fuel efficiency deeply related to $CO_2$ emission is regulated by qualified driving test cycle by using chassis dynamometer and exhaust gas analyser. But, real driving fuel consumption rate depends so much on the individual usage profile and where it is being driven: city traffic, road conditions. In this study, vehicle model of fuel consumption rate for ICEV and PHEV was developed through co-simulation with CRUISE model and Simulink based on driving control model. The simulation results of fuel consumption rate were analysed with on-road vehicle data and compared with its official level.

Implementation of Electro-Mechanical Brake(EMB) for Brake-By-Wire System of Electric Vehicle (전기 자동차용 Brake-By-Wire 시스템을 위한 전자식 브레이크 구현)

  • Ryu, Hye-Yeon;Jeong, Ki-Min;Kim, Man-Ho;Lee, Kyung-Chang
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.4
    • /
    • pp.313-323
    • /
    • 2017
  • As vehicles become more intelligent this is focused on ways to enhance safety and convenience for both drivers and passengers. In particular, x-by-wire systems that replace rigid mechanical components with dynamically configurable electronic elements are being developed to expand intelligent functions, such as adaptive cruise control or lane departure warning system. Because the malfunction of safety-related modules controlling critical functions, such as brakes, throttle, and steering in x-by-wire systems, can cause injury or death, safety and reliability are the most critical issue for automotive vendors and parts manufacturers. In an effort to develop better and effective brake-by-wire system, this paper presents EMB system by using the low speed electric vehicle, which is not required large braking force, with motor controller. In addition, we design performance evaluation system of EMB with 1/4 low speed electric vehicle model and suggested EMB is evaluated through the performance evaluation system.

OVERVIEW OF TELEMATICS: A SYSTEM ARCHITECTURE APPROACH

  • Cho, K.Y.;Bae, C.H.;Chu, Y.;Suh, M.W.
    • International Journal of Automotive Technology
    • /
    • v.7 no.4
    • /
    • pp.509-517
    • /
    • 2006
  • In the mid 1990s, the combination of vehicles and communication was expected to bolster the stagnant car industry by offering a flood of new revenues. In-vehicle computing systems provide safety and control systems needed to operate the vehicle as well as infotainment, edutainment, entertainment, and mobile commerce services in a safe and responsible manner. Since 1980 the word "telematics" has meant the blending of telecommunications and informatics. Lately, telematics has been used more and more to mean "automotive telematics" which use informatics and telecommunications to enhance the functionality of motor vehicles such as wireless data applications, intelligent cruise control, and GPS in vehicles. This definition identifies telecommunications transferring information as the key enabling technology to provide these advanced services. In this paper, a possible framework for future telematics, which called an Intelligent Vehicle Network(IVN), is proposed. The paper also introduces and compares a number of existing technologies and the terms of their capabilities to support a suite of services. The paper additionally the paper suggests and analyzes possible directions for future telematics from current telematics techniques.

Acoustic characteristics of Anchovy schools, and visualization of their connection with water temperature and salinity in the Southwestern Sea and the Westsouthern Sea of South Korea (서해 남부와 남해 서부의 한 정점에서 수온 및 염분과 멸치 어군의 특징의 관련성 시각화)

  • Kang, Myounghee;Choi, Seok-Gwan;Hwang, Bo-Kyu
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.50 no.1
    • /
    • pp.39-49
    • /
    • 2014
  • Morphological and positional characteristics of anchovy aggregations, confirmed by trawling, were examined in two locations of the southern part of theWest Sea (T1) and the western side of South Sea (T11) of South Korea. Morphological characteristics (mean length, height and area) of the anchovy aggregations at T1 were smaller than those at T11, however the positional characteristics (distributional depth and bottom depth) of the aggregations at T1 were larger than those at T11. Diverse dataset such as the ship's cruise track, the cruse map, and interpolated three-dimensional-like water temperature were visualized in multiple dimensions. For a comprehensive understanding of the anchovy aggregations within their surrounding circumstances, the interpolated water temperature transferred to the location of anchovy aggregations at both stations were visualized based on geospatial information. Using quantitative investigation, the overall range of change in water temperature and salinity of anchovy aggregations at stations was considerably small. However, the water temperature and salinity of anchovy aggregations at T11 were somewhat higher than those at T1.

Decomposing Twitter Network in Tourism Marketing

  • Kim, Wonsik;Kim, Daegeun
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.80-85
    • /
    • 2021
  • This study is to analyze the structure of the networks of tourism marketing on Twitter, identifying the most prominent users, the flow of information about tourism marketing, and the interaction between the users posting tweets. This study employs NodeXL pro as a visualization software package for social network analysis. The number of vertices or nodes is 171, and the number of the unique edges or links is 128, but there are 101 edges with duplicates, so the total links are 229, which means that there are fewer Twitter accounts in the social network on tourism marketing, but they have a few close relationships by sharing information. The research can map the social network of communicators of tourism marketing using Twitter data. The network has a complicated pattern, including one independent network and some connected networks. Some mediators connect each network and can control the information flow of tourism marketing. More communicators are getting the information than the ones providing it, which means that there is likely to be the dependence of information among communicators that can cause an obstacle and distortion of the information flow system, especially in the independent network.

A Study on Evaluation Method of ACC Test Considering Domestic Road Environment (국내도로 환경을 고려한 ACC 시험평가 방법에 관한 연구)

  • Kim, BongJu;Lee, SeonBong
    • Journal of Auto-vehicle Safety Association
    • /
    • v.9 no.4
    • /
    • pp.38-47
    • /
    • 2017
  • With automobiles sharply increasing worldwide, we are faced with serious social problems such as traffic accidents, traffic jams, environmental pollution, and economic inefficiency. In response, research on ITS is promoted mainly by regions with advanced automotive industry such as the US, Europe, and Japan. While Korea is working to get ahead to take global market through developing and turning into global standards systems related to ASV(Advanced Safety Vehicle), the country is not excellently prepared for such projects. The purpose of ACC is to control the vehicle's longitudinal speed and distance and minimize driver workload. Such a system should be useful in preventing accidents, as it reduces driver workload in the 21st-century world of telematics created by the development of automobile culture industry. In this light, the thesis presents a method to test and evaluate ACC system and a mathematical method to assess distance. Furthermore, for the proposed test and evaluation, theoretical values are tested with vehicle test and a database is acquired, by using vehicles equipped with an ACC system. We proposed the scenarios suitable for the domestic environment and conducted the actual road test. Theoretical evaluation criteria for developing ACC system may be employed and scenario-specific evaluation methods may find their useful application through testing the formula proposed by comparing the database and the mathematical method. and, many companies are expected to utilize the scenario in the developing stage of ACC, and be able to employ as a verification method by harnessing theoretical formula before a road test.

A Growth and Yield Model for Predicting Both Forest Stumpage and Mill Side Manufactured Product Yields and Economics

  • Schultz Emily B.;Matney Thomas G.
    • Proceedings of the Korea Technical Association of the Pulp and Paper Industry Conference
    • /
    • 2006.06b
    • /
    • pp.305-309
    • /
    • 2006
  • This paper presents and illustrates the application of a growth and yield model that supports both forest and mill side volume and value estimates. Traditional forest stand growth and yield models represent the forest landowner view of yield and economics. Predicted yields are estimates of what one would expect from a procurement cruise, and current stumpage prices are applied to investigate optimum management strategies. Optimum management regimes and rotation ages obtained from the forest side view are unlikely to be economically optimal when viewed from the mill side. The actual distribution of recoverable manufactured product and its value are highly dependent on mill technologies and configurations. Overcoming this limitation of growth and yield computer models necessitates the ability to predict and price the expected manufactured distribution of lumber, lineal meters of veneer, and tonnes of air dried pulp fiber yield. With these embedded models, users of the yield simulator can evaluate the economics of possible/feasible management regimes from both the forest and mill business sides. The simulator is a forest side model that has been modified to produce estimates of manufactured product yields by embedding models for 1) pulpwood chip size class distribution and pulp yield for any kappa number (Schultz and Matney, 2002), 2) a lumber yield and pricing model based on the Best Opening Face model developed by the USDA Forest Service Forest Products Laboratory (Lewis, 1985a and Lewis, 1985b), and 3) a lineal meter veneer model derived from peeler block tests. While the model is strictly applicable to planted loblolly pine (Pinus taeda L.) on cutover site-prepared land in the United States (US) Gulf South, the model and computer program are adaptable to any region and forest type.

  • PDF

Vulnerability Case Analysis of Wireless Moving Vehicle (무선이동체의 취약점 사례 분석)

  • Oh, Sangyun;Hong, Jinkeun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.8
    • /
    • pp.41-46
    • /
    • 2018
  • As the industry related to drones has been activated, the public interest in drones has increased explosively, and many cases of drone-using are increasing. In the case of military drones, the security problem is the level of defense of the aircraft or cruise missiles, but commercial small and low cost drones are often released and utilized without security count-measure. This makes it possible for an attacker to easily gain access to the root of the drones, access internal files, or send fake packets. However, this droning problem can lead to another dangerous attack. In this regard, this paper has identified the vulnerabilities inherent in the commercial drones by analyzing the attack cases in the communication process of the specific drones. In this paper, we analyze and test the vulnerability in terms of scanning attack, meson attack, authentication revocation attack, packet stop command attack, packet retransmission attack, signal manipulation and de-compile attack. This study is useful for the analysis of drones attack and vulnerability.