• Title/Summary/Keyword: DC 보안

Search Result 21, Processing Time 0.031 seconds

72[W] Power LED Photovoltaic Lighting System including the Current Limiting Function (전류제한 기능을 갖는 72[W ]급 파워 LED 태양광 보안등)

  • Park, Hyo-Sik;Han, Woo-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.8
    • /
    • pp.2999-3004
    • /
    • 2010
  • In comparison with some other light sources, LED has merits such as long lifetime, pollution free, and high energy efficiency. Lately, due to development of LED with high brightness and capacity, LED, which has been applied in display system only, has applied in the field of lighting system. As power LED for lighting system can be burned out by heat problem, the driving current of power LED has to be controlled below the designed value. In this paper, power LED photovoltaic lighting system, which has the current limitting function, has been described. After photovoltaic power is generated from PV panel. it is charged into a battery. And then, after the charged power is converted to DC24[V] through a boost DC-DC converter, it is supplied to power LED at night. It has been validated by designing and testing of 72[W] power LED lighting system, which includes a PV charger, a boost DC-DC converter and a current limiter for driving power LED.

SDCDS: A Secure Digital Content Delivery System with Improved Latency time (SDCDS: 지연시간을 개선한 디지털콘텐트 전송 시스템)

  • Na Yun Ji;Ko Il Seok
    • The KIPS Transactions:PartD
    • /
    • v.12D no.2 s.98
    • /
    • pp.303-308
    • /
    • 2005
  • Generally, the overloaded server problem and the rapidly increased network traffic problem are happened in a center concentrated multimedia digital content service. Recently, a study about the CDN which is a digital content transmission technology to solve these problems are performed actively. In this study, we proposed the SDCDS which improved a process latency time and a security performance on a digital content delivery and management. The goal of the SDCDS is the digital content security and the improvement of the processing time. For that, we have to design the security and the caching method considering the architecture characteristics of the CDN. In the SDCDS, the public key encryption method is designed by considering the architecture characteristics of CDN. And we improved the processing latency time by improved the caching method which uses the grouped caching method on the encrypted DC and the general DC. And in the experiment, we veryfy the performance of the proposed system.

Development of a System Security Unit using RFID (RFID를 이용한 시스템 보안 장치 개발)

  • Jang, Jae-Hyuk;Sim, Gab-Sig
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.1
    • /
    • pp.11-18
    • /
    • 2011
  • This study developed a digital security device which power is on/off by the RFID card. This device is based on the wireless data transmit/receive circuits, built in RS-232C chip and applied to computer and other digital devices. We can check whether this device is operated or not by connecting the LED. In this system, 13.56MHz frequency circuit supplies power with ID card, and DC inputs check the proximity operating distance of the card field for verifying the existence of a card. The security level of this system is much stronger than that of a compared system[13]. Anyone cannot use the system without RFID card. All illegal access is prevented except for authorized path.

Synchronization of Robot driving DC motor (로봇구동용 직류전동기의 동기화 구현)

  • 엄한성;안병원;김현수;박영산;배철오
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.325-328
    • /
    • 2003
  • This paper is studied about the DC motor synchronization control for robot driving DC motor where is located in long distance place. The DC motors are received the speed order through internet with realtime. We designed the PID controller that related to PWM voltage and revolution given by 80C196KC $\mu$-Processor to move DC motors, so two motors were synchronized quickly about the order of random speed or location by PID controller. Furthermore, we controlled motors with realtime through internet by using lava platform that had a excellent compatibility, and monitored the speed of two motors.

  • PDF

A study on the boost type bi-directional DC-DC converters for fuel cell system using supercap acitors (수퍼커패시터를 이용한 연료전지시스템용 승압형 양방향 DC-DC 컨버터)

  • Choi, Won-Mook;Kwak, Goun-Poung;Ahn, Ho-Gyun
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.1352-1353
    • /
    • 2011
  • 친환경에너지원인 연료전지시스템에서 구조상 발생되는 문제점인 발전기와 같은 동작 특성과 느린 동특성으로 에너지를 저장할 수 있는 능력이 없다. 이를 보안하고자 400V급 승압형 풀브릿지 컨버터와 수퍼커패시터를 이용한 양방향 하프브릿지 컨버터를 적용하여 부하에 따른 낮은 출력전압을 승압하고 연료전지시스템 특성상 느린 동특성과 부하에 따른 출력변동을 슈퍼 커패시터를 이용하여 빠르게 충 방전함으로써 연료전지시스템으로도 상용전원과 같은 시스템에 적용 가능함을 시뮬레이션을 통하여 검증하였다.

  • PDF

Performance Evaluation for Scheduling Policies on a Realtime Database (실시간 데이터베이스에 대한 스케쥴링 정책의 성능 평가)

  • Kim, Suhee;Han, Kwangrok;Kim, Hwankoo;Son, Sang-Hyuk
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.57-82
    • /
    • 2004
  • The confluence of computers, communications, and databases is quickly creating a distributed database where many applications require real-time access to temporally consistent sensor data. We have developed an object-oriented real-time database system called BeeHive to provide a significant improvement in performance and functionality over conventional non-real-time database and object management systems. In this paper, the performance of two data-deadline cognizant scheduling policies EDDF and EDF-DC and the baseline EDF policy with/without admission control are evaluated through extensive experiments on BeeHive. The ranges where data-deadline cognizant scheduling policies are effective and where admission control plays a role are identified.

  • PDF

Development of Passive Millimeter-wave Security Screening System (수동 밀리미터파 보안 검색 시스템 개발)

  • Yoon, Jin-Seob;Jung, Kyung Kwon;Chae, Yeon-Sik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.7
    • /
    • pp.138-143
    • /
    • 2016
  • The designed and fabricated millimeter-wave security screening system receives radiation energy from an object and a human body. The imaging system consist of sixteen array antennas, sixteen four-stage LNAs, sixteen detectors, an infrared camera, a CCD camera, reflector, and a focusing lens. This system requires high sensitivity and wide bandwidth to detect the input thermal noise. The LNA module of the system has been measured to have 65.8 dB in average linear gain and 82 GHz~102 GHz in bandwidth to enhance the sensitivity for thermal noise, and to receive it over a wide bandwidth. The detector is used for direct current (DC) output translation of millimeter-wave signals with a zero bias Schottky diode. The lens and front-end of the millimeter-wave sensor are important in the system to detect the input thermal noise signal. The frequency range in the receiving sensitivity of the detectors was 350 to 400 mV/mW at 0 dBm (1 mW) input power. The developed W-band imaging system is effective for detecting and identifying concealed objects such as metal or plastic.

A Data Sharing Algorithm of Micro Data Center in Distributed Cloud Networks (분산클라우드 환경에서 마이크로 데이터센터간 자료공유 알고리즘)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.63-68
    • /
    • 2015
  • Current ICT(Information & Communication Technology) infrastructures (Internet and server/client communication) are struggling for a wide variety of devices, services, and business and technology evolution. Cloud computing originated simply to request and execute the desired operation from the network of clouds. It means that an IT resource that provides a service using the Internet technology. It is getting the most attention in today's IT trends. In the distributed cloud environments, management costs for the network and computing resources are solved fundamentally through the integrated management system. It can increase the cost savings to solve the traffic explosion problem of core network via a distributed Micro DC. However, traditional flooding methods may cause a lot of traffic due to transfer to all the neighbor DCs. Restricted Path Flooding algorithms have been proposed for this purpose. In large networks, there is still the disadvantage that may occur traffic. In this paper, we developed Lightweight Path Flooding algorithm to improve existing flooding algorithm using hop count restriction.

A Study on the Block Cryptosystem Design with Byte Variable Operation (바이트 가변 연산기능을 가진 블록 암호시스템 설계에 관한 연구)

  • 이선근;정우열
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.125-130
    • /
    • 2004
  • With development of information communications and network environments security importance to the informations deepen as time goes. In this viewpoint, cryptosystem is developing but proportionally cracking and hacking technology is developing Therefore, in this paper we proposed and designed block cryptosystem with byte variable operation. Designed cryptosystem based on byte operation is safe than existed cryptosystem because it is not generate the fixed DC and LC characteristics. Additionally, proposed cryptosystem have high processing rate and authenticated operation. Therefore proposed cryptosystem is considered to many aid in the network fields.

  • PDF

A Study on the Block Cryptosystem Design with Variable Byte Operation (바이트 가변 연산기능을 가진 블록 암호시스템 설계에 관한 연구)

  • Lee, Seon-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2311-2316
    • /
    • 2011
  • With development of information communications and network environments security importance to the informations deepen as time goes. In this viewpoint, cryptosystem is developing but proportionally cracking and hacking technology is developing. Therefore in this paper we proposed and designed block cryptosystem with byte variable operation. Designed cryptosystem based on byte operation is safe than existed cryptosystem because it is not generate the fixed DC and LC characteristics. Additionally, proposed cryptosystem have high processing rate and authenticated operation. Therefore proposed cryptosystem is considered to many aid in the network fields.