• Title/Summary/Keyword: Re-implemented

Search Result 285, Processing Time 0.025 seconds

A Study on DID Implementation for Wireless Calling System using Smart-device (스마트 기기를 이용한 무선호출용 DID구현에 대한 연구)

  • Cho, Youngseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.19-25
    • /
    • 2015
  • In this time, as an industrial society developed to a welfare society, more and more people want their quality of lives upgraded and specially customized service by mass production/mass consumption. And it leads to an increase of requiring service. There're active developments and studies on various IT equipment as the requirement made IT devices used in service. In this paper, we try to design and realize radio paging DID by using smart device to be used as a receiver of a radio pager which is broadly used at face to face service. Firstly, we used MCU to design and implement Wireless Calling Gateway which change radio calling signal of ISM band to smart device. A receiver of wireless caller used original receiver module. Also it used bluetooth module to communicate with smart device. It was possible to have satisfactory communication since radio paging signal converter and smart device were linked in 3M. Secondly, to indicate various paging information delivered from a radio pager, we realized DID application program by using Smart PAD. As a result, we could indicate various information compared to an original receiver which only could indicate letters or numeric data. Secondly, we implemented the DID app for wireless calls that can display a variety of information sent from a wireless pager. Was implemented using the Smart Pad. As a result, it is shown that can display a variety of information than the existing receiver.

Implementation of a Top-down Clustering Protocol for Wireless Sensor Networks (무선 네트워크를 위한 하향식 클러스터링 프로토콜의 구현)

  • Yun, Phil-Jung;Kim, Sang-Kyung;Kim, Chang-Hwa
    • Journal of Information Technology Services
    • /
    • v.9 no.3
    • /
    • pp.95-106
    • /
    • 2010
  • Many researches have been performed to increase energy-efficiency in wireless sensor networks. One of primary research topics is about clustering protocols, which are adopted to configure sensor networks in the form of hierarchical structures by grouping sensor nodes into a cluster. However, legacy clustering protocols do not propose detailed methods from the perspective of implementation to determine a cluster's boundary and configure a cluster, and to communicate among clusters. Moreover, many of them involve assumptions inappropriate to apply those to a sensor field. In this paper, we have designed and implemented a new T-Clustering (Top-down Clustering) protocol, which takes into considerations a node's density, a distance between cluster heads, and remained energy of a node all together. Our proposal is a sink-node oriented top-down clustering protocol, and can form uniform clusters throughout the network. Further, it provides re-clustering functions according to the state of a network. In order to verify our protocol's feasibility, we have implemented and experimented T-Clustering protocol on Crossbow's MICAz nodes which are executed on TinyOS 2.0.2.

Performance Reengineering of Embedded Real-Time Systems (내장형 실시간 시스템의 성능 개선을 위한 리엔지니어링 기법)

  • 홍성수
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.5_6
    • /
    • pp.299-306
    • /
    • 2003
  • This paper formulates a problem of embedded real-time system re-engineering, and presents its solution approach. Embedded system re-engineering is defined as a development task of meeting performance requirements newly imposed on a system after its hardware and software have been fully implemented. The performance requirements nay include a real-time throughput and an input-to-output latency. The proposed solution approach is based on a bottleneck analysis and nonlinear optimization. The inputs to the approach include a system design specified with a process network and a set of task graphs, task allocation and scheduling, and a new real-time throughput requirement specified as a system's period constraint. The solution approach works in two steps. In the first step, it determines bottleneck precesses in the process network via estimation of process latencies. In the second step, it derives a system of constraints with performance scaling factors of processing elements being variables. It then solves the constraints for the performance staling factors with an objective of minimizing the total hardware cost of the resultant system. These scaling factors suggest the minimal cost hardware upgrade to meet the new performance requirement. Since this approach does not modify carefully designed software structures, it helps reduce the re-engineering cycle.

Implementation of FlexRay Protocol Specification and its Application to a Automobile Advance Alarm System (FlexRay 프로토콜 설계 및 자동차 경보 시스템 응용)

  • Xu, Yi-Nan;Yang, Sang-Hoon;Chung, Jin-Gyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.8
    • /
    • pp.98-105
    • /
    • 2008
  • FlexRay is a high-speed communications protocol with high flexibility and reliability. It was devised by automotive manufacturers and semiconductor vendors and implemented as on vehicle LAN protocol using x-by-wire systems. FlexRay provides a high speed serial communication, time triggered bus and fault tolerant communication between electronic devices for automotive applications. In this paper, we first design the FlexRay communication controller, bus guardian protocol specification and function parts using SDL (Specification and Description Language). Then, the system is re-designed using Verilog HDL based on the SDL source. The FlexRay system was synthesized using Samsung $0.35{\mu}m$ technology. It is shown that the designed system can operate in the frequency range above 76 MHz. In addition, to show the validity of the designed FlexRay system, the FlexRay system is combined with automobile advance alarm system in vehicle applications. The FlexRay system is implemented using ALTERA Excalibur ARM EPXA4F672C3. It is shown that the implemented system operates successfully.

Area based image matching with MOC-NA imagery (MOC-NA 영상의 영역기준 영상정합)

  • Youn, Jun-Hee;Park, Choung-Hwan
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.28 no.4
    • /
    • pp.463-469
    • /
    • 2010
  • Since MOLA(Mars Orbiter Laser Altimeter) data, which provides altimetry data for Mars, does not cover the whole Mars area, image matching with MOC imagery should be implemented for the generation of DEM. However, automatic image matching is difficult because of insufficient features and low contrast. In this paper, we present the area based semi-automatic image matching algorithm with MOC-NA(Mars Orbiter Camera ? Narrow Angle) imagery. To accomplish this, seed points describing conjugate points are manually added for the stereo imagery, and interesting points are automatically produced by using such seed points. Produced interesting points being used as initial conjugate points, area based image matching is implemented. For the points which fail to match, the locations of initial conjugate points are recalculated by using matched six points and image matching process is re-implemented. The quality assessment by reversing the role of target and search image shows 97.5 % of points were laid within one pixel absolute difference.

Implementation of Ubiquitous Digital Systems and Services (유비쿼터스 디지털 시스템 및 서비스의 구축 사례)

  • Song, Kyo-Sun;Park, Gyeo-Re;Choi, Yu-Raak;Lee, Se-Sang-Pyoung-Hwa;Kim, Min-Young;Kim, Yun-Sam;Cho, Eun-Sun
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1075-1078
    • /
    • 2005
  • In this paper, we propose a simple middleware for ubiquitous computing systems. Developed with UPnP in Java, it efficiently organizes runtime interactions of devices. To show the feasibility of this system, we implemented a set of customized services based on this middleware. This prototype allows users to enjoy services at various spatial points even while moving around.

  • PDF

A Relationship between Security Engineering and Security Evaluation

  • Kim, Tai-Hoon
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.71-75
    • /
    • 2004
  • The Common Criteria (CC) philosophy is to provide assurance based upon an evaluation of the IT product or system that is to be trusted. Evaluation has been the traditional means of providing assurance. It is essential that not only the customer' srequirements for software functionality should be satisfied but also the security requirements imposed on the software development should be effectively analyzed and implemented in contributing to the security objectives of customer's requirements. Unless suitable requirements are established at the start of the software development process, the re suiting end product, however well engineered, may not meet the objectives of its anticipated consumers. By the security evaluation, customer can sure about the quality of the products or sys tems they will buy and operate. In this paper, we propose a selection guide for If products by show ing relationship between security engineering and security evaluation and make help user and customer select appropriate products or system.

  • PDF

The Activites Based on Van Hiele Model Using Computer as a Tool

  • Park, Koh;Sang, Sook
    • Research in Mathematical Education
    • /
    • v.4 no.2
    • /
    • pp.63-77
    • /
    • 2000
  • The purpose of this article is to devise the activities based on van Hiele levels of geometric thought using computer software, Geometer\\\\`s Sketchpad(GSP) as a tool. The most challenging task facing teachers of geometry is the development of student facility for understanding geometric concepts and properties. The National Council of teachers of Mathematics(Curriculum and Evaluation Standards for School Mathematics, 1991; Principles and Standards for School Mathematics, 2000) and the National Re-search Council(Hill, Griffiths, Bucy, et al., Everybody Counts, 1989) have supported the development of exploring and conjecturing ability for helping students to have mathematical power. The examples of the activities built is GSP for students ar designed to illustrate the ways in which van Hiele\\\\`s model can be implemented into classroom practice.

Essentials of Physiotherapy after Thoracic Surgery: What Physiotherapists Need to Know. A Narrative Review

  • Ahmad, Ahmad Mahdi
    • Journal of Chest Surgery
    • /
    • v.51 no.5
    • /
    • pp.293-307
    • /
    • 2018
  • Physiotherapy has recently become an essential part of enhanced recovery protocols after thoracic surgery. The evidence-based practice of physiotherapy is essential for the effective management of postoperative patients. Unfortunately, only a small body of literature has discussed the rationale of the physiotherapy interventions that are routinely implemented following thoracic surgery. Nonetheless, we can integrate the available knowledge into our practice until new evidence emerges. Therefore, in this review, the principles of physiotherapy after thoracic surgery are presented, along with a detailed description of physiotherapy interventions, with the goals of enhancing the knowledge and practical skills of physiotherapists in postoperative care units and helping them to re-evaluate and justify their traditional practices.

A Network-path based Web Cache Algorithm (네트워크 경로에 기초한 웹 캐쉬 알고리즘)

  • Min, Gyeong-Hun;Jang, Hyeok-Su
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2161-2168
    • /
    • 2000
  • Since most of the existing web cache structures are static, they cannot support the dynamic request change of he current WWW users well. Users re generally using multiple programs in several different windows with rapid preference change within a relatively short period of time. We develop a network-path based algorithm. It organizes a cache according to the network path of the requested URLs and build a network cache farm where caches are logically connected with each other and each cache has its own preference over certain network paths. The algorithm has been implemented and tested in a real site. The performance results show that the new algorithm outperforms the existing static algorithms in the hit ratio and response time dramatically.

  • PDF