• Title/Summary/Keyword: Hardware limitation

Search Result 142, Processing Time 0.026 seconds

IoT Platform Implementation and Service Operating Method for Private Networks (용이한 사설망 지원을 위한 IoT 플랫폼 구현 및 서비스 운영 방법)

  • Lee, Kyoung Hun;Kim, DooYoung;Song, Seheon;Lee, Sangil;Park, JaeHyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.5
    • /
    • pp.109-116
    • /
    • 2016
  • Today various IoT platforms exist, but most of them only consider IPv6, without other types of network including private network. They support, therefore, the private network to use virtual private network or through the hardware gateway. To solve this limitation, we propose a IoT platform that provides IoT Services on private networks. Also we verify this platform though constructing a testbed.

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.

Analysis on designer's cognitive thinking process in 3D animation design (3D 애니메이션 제작을 위한 디자이너의 인지적 사고과정 분석)

  • Kim, Kie-Su
    • Cartoon and Animation Studies
    • /
    • s.20
    • /
    • pp.1-14
    • /
    • 2010
  • The success of a three-dimensional blockbuster movie, AVARTA, brought an public attention on the expansion of three-dimensional computer applications, and it allows experts predict further hardware technology developments to support the such applications. Futhermore, an internet based infra structure and three-dimensional structure, third generation network community, advanced computer networks have influenced advancement in computer technology within the 3D game industry and the spread of 2D computer animation technologies. This advancement of computer technologies allow the industry to overcome a limitation of generating cultural design contexts existed within 2D network community. However, despite of the expansion of 2D and 3D computer technologies, a limitation of analysing designers' intentions on morphology of digital contents and user interface still exists. Therefore, the purpose of this study is to analyze (1) present conditions of the 3D industry and (2) protocols of designers' cognitive design processes based on their design communication, contents, and tools. Analysis was conducted based on literature reviews and case precedent analyses. For the analysis, a 2D Avarta sketch character was designed and then applied into a 3D game system. Observations how designers solve cultural problem within the structure via Avarta were conducted. Outcomes were then coded for further analysis.

  • PDF

A Parallel Emulation Scheme for Data-Flow Architecture on Loosely Coupled Multiprocessor Systems (이완 결합형 다중 프로세서 시스템을 사용한 데이터 플로우 컴퓨터 구조의 병렬 에뮬레이션에 관 한 연구)

  • 이용두;채수환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.12
    • /
    • pp.1902-1918
    • /
    • 1993
  • Parallel architecture based on the von Neumann computation model has a limitation as a massively parallel architecture due to its inherent drawback of architectural features. The data-flow model of computation has a high programmability in software perspective and high scalability in hardware perspective. However, the practical programming and experimentaion of date-flow architectures are hardly available due to the absence of practical data-flow, we present a programming environment for performing the data-flow computation on conventional parallel machines in general, loosely compled multiprocessor system in particular. We build an emulator for tagged token data-flow architecture on the iPSC/2 hypercube, a loosely coupled multiprocessor system. The emulator is a shallow layer of software executing on an iPSC/2 system, and thus makes the iPSC/2 system work as a data-flow architecture from the programmer`s viewpoint. We implement various numerical and non-numerical algorithm in a data-flow assembler language, and then compare the performance of the program with those of the versions of conventional C language, Consequently, We verify the effectiveness of this programming environment based on the emulator in experimenting the data-flow computation on a conventional parallel machine.

  • PDF

Efficient Security Mechanism using Light-weight Data Origin Authentication in Sensor Networks (경량화 데이터 origin 인증을 통한 효율적인 센서 네트워크 보안에 관한 연구)

  • Park, Min-Ho;Lee, Chung-Keun;Son, Ju-Hyung;Seo, Seung-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7A
    • /
    • pp.717-723
    • /
    • 2007
  • There are many weaknesses in sensor networks due to hardware limitation of sensor nodes besides the vulnerabilities of a wireless channel. In order to provide sensor networks with security, we should find out the approaches different from ones in existing wireless networks; the security mechanism in sensor network should be light-weighted and not degrade network performance. Sowe proposed a novel data origin authentication satisfying both of being light-weighted and maintaining network performance by using Unique Random Sequence Code. This scheme uses a challenge-response authentication consisting of a query code and a response code. In this paper, we show how to make a Unique Random Sequence Code and how to use it for data origin authentication.

Instruction-corruption-less Binary Modification Mechanism for Static Stack Protections (이진 조작을 통한 정적 스택 보호 시 발생하는 명령어 밀림현상 방지 기법)

  • Lee, Young-Rim;Kim, Young-Pil;Yoo, Hyuck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.1
    • /
    • pp.71-75
    • /
    • 2008
  • Many sensor operating systems have memory limitation constraint; therefore, stack memory areas of threads resides in a single memory space. Because most target platforms do not have hardware MMY (Memory Management Unit), it is difficult to protect each stack area. The method to solve this problem is to exchange original stack handling instructions in binary code for wrapper routines to protect stack area. In this exchanging phase, instruction corruption problem occurs due to difference of each instruction length between stack handling instructions and branch instructions. In this paper, we propose the algorithm to call a target routine without instruction corruption problem. This algorithm can reach a target routine by repeating branch instructions to have a short range. Our solution makes it easy to apply security patch and maintain upgrade of software of sensor node.

Code Refactoring Techniques Based on Energy Bad Smells for Reducing Energy Consumption (Energy Bad Smells 기반 소모전력 절감을 위한 코드 리팩토링 기법)

  • Lee, Jae-Wuk;Kim, Doohwan;Hong, Jang-Eui
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.5
    • /
    • pp.209-220
    • /
    • 2016
  • While the services of mobile devices like smart phone, tablet, and smart watch have been increased and varied, the software embedded into such devices has been also increased in size and functional complexity. Therefore, increasing operation time of mobile devices for serviceability became an important issue due to the limitation of battery power. Recent studies focus on the software development having efficient behavioral patterns because the energy consumption of mobile devices is caused by software behaviors which control the hardware operations. However, it is often difficult to develop the embedded software with considering energy-efficiency and behavior optimization due to the short development cycle of the mobile services in many cases. Therefore, this paper proposes the refactoring techniques for reducing energy consumption, and enables to fulfill the energy requirements during software development and maintenance. We defined energy bad smells with the code patterns that can excessively consume the energy, and our refactoring techniques are to remove these bad smells. We performed some case studies to verify the usefulness of our refactoring techniques.

Design and Implementation of File Access Control System using Java Card (자바카드를 이용한 파일 접근제어 시스템의 설계 및 구현)

  • Koo, Eun-Bee;Woo, Chan-Il
    • 전자공학회논문지 IE
    • /
    • v.43 no.1
    • /
    • pp.46-51
    • /
    • 2006
  • Recently, smart card system which is known as easy to portable and also safe from physical, electrical, and software attack is observed to manage information that becomes the target of security in safety. And java card graft upon java technology to smart card platform is having very good advantage with object-oriented techniques and also, java card have the open type OS that can show the same action in different hardware characteristic which allows various application programs. In this paper, we introduced independent execution characteristic of java platform because being set to each smart card was uncomfortable till now and we designed access control member card that allows several administrators in different access privilege by single card using java card. Several administrators can approach to various information of file type that is included on issued card to user by using different PIN. In the proposed method, confirmation of personal information, administration contents update, demand by contents, is possible by single card. At this moment, wish to do safer user certification that improve security limitation which is from PIN, used for user certification, and signature data. In the proposed method, as design and implementation of utilization technology of java card, biometrics, user certification which uses multi PIN, provide that more safety and conveniently.

A Design and Construction of Digital Filter (디지탈 필터의 설계와 구성)

  • Lee, Dae-Yeong;Jin, Yong-Ok;Heo, Do-Geun
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.17 no.4
    • /
    • pp.11-17
    • /
    • 1980
  • This paper describes realization of digital filter using $\mu$p controler and discusses measured characteristics of this filter, The idea of P. L. implementation[1] is used in realization, and in this system we utilize a DMA and arithmatic control program of $\mu$p. In this way, we can get more flexible capability than the basic PL method, and higher speed than a filter using general purpose $\mu$p in hardware, Furthermore, we get a 15 KHz sampling frequency(fs) as speed limit in real time processing, and know that this limitation is restricted by execution time (58$\mu$ sec) of DMA control statement. As for filter charateristics, maximum stop band frequencies (fsp) are 1665 Hz, 1445 Hz in Butterworth and Tchebichef approximation, respectively, when fs = 14 KHz. Measured errors between the design specification and the actual result are 0.2dB, 0.1 dB in pass band (when cufoff frequency is 500Hz),-1.1dB (when fsp is 1000Hz), 0.4dB(when fsp is 750 Hz) in stop band frequency of Butterworth and Tchebichef, respectively.

  • PDF

Electromagnatic Effect Analysis inside Electrically Large Structures Using Topological Modeling and PWB Method (위상학적 모델링과 PWB Method를 이용한 대형 구조물 내부의 전자파 영향 해석)

  • Lee, Jae-Min;Jung, In-Hwan;Lee, Jae-Wook;Lee, Young-Seung;Kwon, Jong-Hwa
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.3
    • /
    • pp.284-290
    • /
    • 2016
  • As the recently advanced scientific developments result in high lever of the usability and the needs for the electrical equipment and devices in various situations, the safety technologies protecting malfunction and electrical critical damages including soft and hardware from the unexpectedly radiated electromagnetic interferences are required gradually. In addition, the numerical analysis for the miniaturized electrical components and equipments as well as the conventional electrical devices installed inside the electrically large enclosures and structures requires the memory requirement and time consumption too big to be handled in a realistic situation, which will result in a limitation in solving the complete set of maxwell's equations. In this paper, PWB method based on statistical theory and topological modeling with appropriate zoning concepts are introduced for the EM analysis of an electrically large complex structures.