• Title/Summary/Keyword: Intellectual Network

Search Result 234, Processing Time 0.036 seconds

A Study of a RealTime OS Based Motor Control System for Laparoscopic Surgery Robot (실시간 운영체제 기반의 복강경 수술 로봇의 모터제어 시스템에 관한 연구)

  • Song, Seung-Joon;Kim, Yong;Choi, Jae-Soon;Bae, Jin-Yong
    • Proceedings of the KIEE Conference
    • /
    • 2006.10d
    • /
    • pp.218-221
    • /
    • 2006
  • This paper reports on a Realtime OS based motor control system for laparoscopic surgery robot which enables telesurgery and overcomes shortcomings with conventional laparoscopic surgery. The system has a conventional master-slave robot configuration and the control system consists of joint controllers, host controllers, and power units. The robot features (1) a compact slave robot with 5 DOF (Degree Of Freedom) expanding the workspace of each tool and increasing the number of tools operating simultaneously, and (2) direct 1:1 correspondence in the joint of master and slave robot that simplifies control algorithm and enhances reliability. Each master, slave and GUI (Graphical User Interface) host has a dedicated RTOS (RealTime OS), RTLinux-Pro (FSMLabs Inc., U.S.A.) Each master and slave controller set pair has a dedicated CAN (Controller Area Network) channel for control and monitoring signal communication. Total 4 pairs of the master/slave manipulators as current are monitored by one host controller for operation monitoring and higher level motion control. The system showed acceptable performance in both position control precision and master-slave motion synchronization and is now under further development for better safety and control fidelity for clinically applicable prototype.

  • PDF

Design of an FPGA-Based RTL-Level CAN IP Using Functional Simulation for FCC of a Small UAV System

  • Choe, Won Seop;Han, Dong In;Min, Chan Oh;Kim, Sang Man;Kim, Young Sik;Lee, Dae Woo;Lee, Ha-Joon
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.18 no.4
    • /
    • pp.675-687
    • /
    • 2017
  • In the aerospace industry, we have produced various models according to operational conditions and the environment after development of the base model is completed. Therefore, when design change is necessary, there are modification and updating costs of the circuit whenever environment variables change. For these reasons, recently, in various fields, system designs that can flexibly respond to changing environmental conditions using field programmable gate arrays (FPGAs) are attracting attention, and the rapidly changing aerospace industry also uses FPGAs to organize the system environment. In this paper, we design the controller area network (CAN) intellectual property (IP) protocol used instead of the avionics protocol that includes ARINC-429 and MIL-STD-1553, which are not suitable for small unmanned aerial vehicle (UAV) systems at the register transistor logic (RTL) level, which does not depend on the FPGA vender, and we verify the performance. Consequentially, a Spartan 6 FPGA model-based system on chip (SoC) including an embedded system is constructed by using the designed CAN communications IP and Xilinx Microblaze, and the configured SoC only recorded an average 32% logic element usage rate in the Spartan 6 FPGA model.

A Study on Streaming Service for Content Protection (컨텐츠 보호를 위한 스트리밍 서비스 방안 연구)

  • 박지현;윤기송;전경표
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.198-201
    • /
    • 2003
  • Changes in internet and network environment make it possible to provide high-quality content services in real time. As demand for digital content is increased, problems related to intellectual property rights are getting more important. Streaming service like video-on-demand solved this problem by preventing content from being saved. But, as the advent of several tools able to save streamed content, the streamed content is not free from these problems any more. So, with security countermeasure like access control, new technologies to control and manage rights for content are needed. One of the solutions is DRM In this paper, we describe a DRM-based streaming service that can send the ASF stream which is the multimedia file format of Microsoft.

  • PDF

A Design CORBA Security Service for DataBase Security in Ubiquitous Computing (유비쿼터스 환경의 데이터베이스 보안을 위한 CSS 설계)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.15-22
    • /
    • 2005
  • The spread of Internet and the appear of Downsizing, SI(System Integration) is chaning centralized computing to distributed computing. Also distributed computing is rapidly changing to Ubiquitous computing escape from hard wire connected network. CORBA(Common Object Request Broker Architecture) is a middleware that used for smoothness communication between application program and operation system in a different environment. However distributed computing environment is not safe from the danger, the attack like virus, worm is too intellectual and variety. In this paper, we design a new DB security model and suggest efficiency of it in Ubiquitous environment base on CSS(CORBA Security Service) that present ed from OMG(Object Management Group).

  • PDF

An Improved Calculation Model for Analysis of [111] InGaAs/GaAs Strained Piezoelectric Superlattices

  • Kim, Byoung-Whi;Yoo, Jae-Hoon;Kim, Soo-Hyung
    • ETRI Journal
    • /
    • v.21 no.4
    • /
    • pp.65-82
    • /
    • 1999
  • We present a calculation model for an improved quantitative theoretical analysis of electronic and optical properties of strained-piezoelectric[111] InGaAs/GaAs superlattices (SLs). The model includes a full band-coupling between the four important energy bands: conduction, heavy, light, and spin split-off valence bands. The interactions between these and higher lying bands are treated by the k ${\cdot}$ p perturbation method. The model takes into account the differences in the band and strain parameters of constituent materials of the heterostructures by transforming it into an SL potential in the larger band-gap material region. It self-consistently solves an $8{\times}8$ effective-mass $Schr{\ddot{o}}dinger$ equation and the Hartree and exchange-correlation potential equations through the variational procedure proposed recently by the present first author and applied to calculate optical matrix elements and spontaneous emission rates. The model can be used to further elucidate the recent theoretical results and experimental observations of interesting properties of this type of quantum well and SL structures, including screening of piezoelectric field and its resultant optical nonlinearities for use in optoelectronic devices.

  • PDF

A Study on the Effect of Mobile Cloud Computing Services Characteristics on the Intellectual Convergence and the Performance Expectancy in Construction Project: From the Perspective of the Social Capital (건설프로젝트에서 Mobile-Cloud Computing Service 특성이 정보융합과 기대성과에 미치는 영향에 관한 연구: 사회적 자본의 관점에서)

  • Kim, Youngwoo;Oh, Jay In
    • The Journal of Bigdata
    • /
    • v.4 no.1
    • /
    • pp.129-142
    • /
    • 2019
  • Construction projects have experienced many failures due to incomplete production environments. Thus, the purpose of this study is to use ICT resources leased during the construction period at the construction site and to introduce the Mobile Cloud Computing Service, which utilizes Cloud Computing Service and mobile devices such as smart phones, tablet PCs, and notebooks instead of physically wired communication networks. The characteristics of Mobile Cloud, such as rapid accuracy, shared collaboration, and ubiquity, will affect the social network among various construction site participants. we conducted empirical research on the introduction of Mobile Cloud to promote information exchange and convergence among the participants and mutual trust, ultimately improving the project performance.

  • PDF

A Comparative Analysis of EAP Authentication/Key-Establishment Protocols (EAP 인증/키설정 프로토콜 비교분석)

  • Park DongGook;Cho Kyung-Ryong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1323-1332
    • /
    • 2005
  • EAP (Extensible authentication protocol) is a sort of general framework for authentication rather than a specific authentication protocol. An important consequence of this is that EAP can accommodate a variety of authentication/key-establishment protocols for different internet access networks possibly integrated to a common IP core network This paper tries a comparative analysis of several specific authentication/key establishment protocols for EAP, and suggest a strategic viewpoint toward the question: which one to un. In addition, we tried to make things clear about an intellectual property right issue with regard to some password-based protocols.

RGF: Receiver-based Greedy Forwarding for Energy Efficiency in Lossy Wireless Sensor Networks

  • Hur, In;Kim, Moon-Seong;Seo, Jae-Wan;Choo, Hyun-Seung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.4
    • /
    • pp.529-546
    • /
    • 2010
  • Greedy forwarding is the key mechanism of geographic routing and is one of the protocols used most commonly in wireless sensor networks. Greedy forwarding uses 1-hop local information to forward packets to the destination and does not have to maintain the routing table, and thus it takes small overhead and has excellent scalability. However, the signal intensity reduces exponentially with the distance in realistic wireless sensor network, and greedy forwarding consumes a lot of energy, since it forwards the packets to the neighbor node closest to the destination. Previous proposed greedy forwarding protocols are the sender-based greedy forwarding that a sender selects a neighbor node to forward packets as the forwarding node and hence they cannot guarantee energy efficient forwarding in unpredictable wireless environment. In this paper, we propose the receiver-based greedy forwarding called RGF where one of the neighbor nodes that received the packet forwards it by itself. In RGF, sender selects several energy efficient nodes as candidate forwarding nodes and decides forwarding priority of them in order to prevent unnecessary transmissions. The simulation results show that RGF improves delivery rate up to maximum 66.8% and energy efficiency, 60.9% compared with existing sender-based greedy forwarding.

A Study of Formative Characteristics in the Art to Wear on Constructivism - Focusing on Russian Avant-Garde Artist - (구성주의(構成主義) 예술의상(藝術衣裳)의 조형적(造形的) 특성(特性) 연구(硏究) - 러시아 아방가르드 예술가(藝術家)들의 작품(作品)을 중심(中心)으로 -)

  • Yang, Chieu-Kyung
    • Journal of Fashion Business
    • /
    • v.5 no.4
    • /
    • pp.101-117
    • /
    • 2001
  • Artist's creative works is accomplished in the very complicated network being in fluenced each other, getting celebrate from surround and center, and showing repetition and change. It took an important role of 1920's culture with new social and mental feature generated by revolution. It also has been influenced on an intellectual paradigm and artistic tendency. According to the feather the Art to Wear of Constructivism, at first, design as absolution of folk art in Russia prior to the concept is coming up to systematic design and useful article's performance. Courageous arrangement of color and rhythm is unique. The second is a tendency clothing design of productirism. It is connected with material culture and artists insisted creature of productive material that is a essential in life than Arts in museum. The third, tendency clothing design of minimalism emphasis functional aspect that is produced industrial aesthetics. The examples are simply designed and functional cloths for sorking uniform. This thesis is studied about clothing and textiles of major artists, formative property, and international reflection from October revolution in 1917 that is strengthen a system by introducing a new economic policy to a five year plan.

  • PDF

Analysis of Research status based on Citation Context

  • Kim, Byungkyu;Choi, Seon-heui;Kang, Muyeong;Kang, Ji-Hoon
    • International Journal of Contents
    • /
    • v.11 no.2
    • /
    • pp.63-68
    • /
    • 2015
  • A citation analysis utilizes the relations among citations and is the most popular bibliometric method. This analysis is based on 1) the evaluation by paper, journal and researcher of the research output, 2) the identification of emerging research topics, 3) the production of a map of the intellectual structure of the research domain and 4) various services for academic information. However, this approach has a limitation in that a citation is treated in a very simple manner, even though the purpose of citation can vary greatly. To address this problem, new approaches have been studied that take into account the citation context. This research separates the citations according to the citation functions and tries to conduct an analysis according to the newly classified citations. Furthermore, research on the citation summarization and visualization based on both the citation context and the citation function of the citations was also attempted. However, since there are very few studies related to citation context in South Korea, more research and development is needed in this area. This study analyzes the status of the research in terms of the citation context. For this, we utilized social network analysis methods.