• Title/Summary/Keyword: Real time control network

Search Result 1,355, Processing Time 0.029 seconds

5GHz Wi-Fi Design and Analysis for Vehicle Network Utilization (차량용 네트워크 활용을 위한 5GHz WiFi 설계 및 분석)

  • Yu, Hwan-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.18-25
    • /
    • 2020
  • With the development of water internet technology, data communication between objects is expanding. Research related to data communication technology between vehicles that incorporates related technologies into vehicles has been actively conducted. For data communication between mobile terminals, data stability, reliability, and real-time performance must be guaranteed. The 5 GHz Wi-Fi band, which is advantageous in bandwidth, communications speed, and wireless saturation of the wireless network, was selected as the data communications network between vehicles. This study analyzes how to design and implement a 5 GHz Wi-Fi network in a vehicle network. Considering the characteristics of the mobile communication terminal device, a continuous variable communications structure is proposed to enable high-speed data switching. We simplify the access point access procedure to reduce the latency between wireless terminals. By limiting the Transmission Control Protocol Internet Protocol (TCP/IP)-based Dynamic Host Configuration Protocol (DHCP) server function and implementing it in a broadcast transmission protocol method, communication delay between terminal devices is improved. Compared to the general commercial Wi-Fi communication method, the connection operation and response speed have been improved by five seconds or more. Utilizing this method can be applied to various types of event data communication between vehicles. It can also be extended to wireless data-based intelligent road networks and systems for autonomous driving.

Development of On-line Quality Sorting System for Dried Oak Mushroom - 3rd Prototype-

  • 김철수;김기동;조기현;이정택;김진현
    • Agricultural and Biosystems Engineering
    • /
    • v.4 no.1
    • /
    • pp.8-15
    • /
    • 2003
  • In Korea, quality evaluation of dried oak mushrooms are done first by classifying them into more than 10 different categories based on the state of opening of the cap, surface pattern, and colors. And mushrooms of each category are further classified into 3 or 4 groups based on its shape and size, resulting into total 30 to 40 different grades. Quality evaluation and sorting based on the external visual features are usually done manually. Since visual features of mushroom affecting quality grades are distributed over the entire surface of the mushroom, both front (cap) and back (stem and gill) surfaces should be inspected thoroughly. In fact, it is almost impossible for human to inspect every mushroom, especially when they are fed continuously via conveyor. In this paper, considering real time on-line system implementation, image processing algorithms utilizing artificial neural network have been developed for the quality grading of a mushroom. The neural network based image processing utilized the raw gray value image of fed mushrooms captured by the camera without any complex image processing such as feature enhancement and extraction to identify the feeding state and to grade the quality of a mushroom. Developed algorithms were implemented to the prototype on-line grading and sorting system. The prototype was developed to simplify the system requirement and the overall mechanism. The system was composed of automatic devices for mushroom feeding and handling, a set of computer vision system with lighting chamber, one chip microprocessor based controller, and pneumatic actuators. The proposed grading scheme was tested using the prototype. Network training for the feeding state recognition and grading was done using static images. 200 samples (20 grade levels and 10 per each grade) were used for training. 300 samples (20 grade levels and 15 per each grade) were used to validate the trained network. By changing orientation of each sample, 600 data sets were made for the test and the trained network showed around 91 % of the grading accuracy. Though image processing itself required approximately less than 0.3 second depending on a mushroom, because of the actuating device and control response, average 0.6 to 0.7 second was required for grading and sorting of a mushroom resulting into the processing capability of 5,000/hr to 6,000/hr.

  • PDF

Supply Network Analysis of Second and Third Outsourcing Firms with E-Invoice at Automobile Parts Industry: Focused to Brake Manufacturing Firms (자동차 부품산업의 전자세금계산서 기반 2차·3차 공급망 분석: 브레이크 업계를 중심으로)

  • Kim, Tae Jin;Lee, Jae Hoo;Hong, Jung Sik
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.3
    • /
    • pp.79-99
    • /
    • 2016
  • Supply network of automobile part is addressed with the e-invoices generated at real time. Automobile is composed of 8 modules. Firms which produce these modules are defined as the first outsourcing firm. Brake is the part of power control module and so, brake manufacturing firm is called the second outsourcing firm. In this paper, the third supply networks of brake manufacturing firms is analyzed with e-invoices and social network method. At the node-level, the third outsourcing firms are classified into 3 categories, interator, allocator and hub with respect to their role at the ego-network of each brake manufacturing firm. At the network level, A2, one of 3 brake manufacturing firms have more outsourcing firms and bigger centrality than the other brake manufacturing firms. Intre-firms trade patterns are, also, analyzed by using the degree of trade dedication with respect to the modes of business. It is shown that trade pattern of retail, commodity brokerage firm, rubber and plastic manufacturing firm are hierarchical trade because their degree of trade dedication is almost near to 1.

DBSCAN Clustering-Based Detection of Signaling Attack in 5G/LTE Networks (5G/LTE 네트워크에서의 DBSCAN 클러스터링 기반 시그널링 공격 탐지)

  • Yerin Kwon;Junbeom Hur
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.1059-1071
    • /
    • 2024
  • The 5G mobile network provides various services to numerous devices and applications, unlike LTE which focuses on smartphones. Features of 5G, such as low latency and massive connectivity, increase the overhead of the control plane(CP, signaling part) and make it difficult to detect abnormal devices due to random traffic patterns. In this paper, we propose a DBSCAN clustering-based detection method to counter signaling attacks, which are a type of 'Denial of Service(DoS)' attack targeting mobile networks. DBSCAN helps to create clusters of various shapes and can address dynamic traffic because the algorithm needs not to depend on past traffic statistics. We also use a real-time traced dataset for experiments to assess usability in real-world scenarios. According to the experiments, our method achieves 99.32% of accuracy and 0.03% of false-positive rates, demonstrating superior performance compared to previous works.

A Dynamic Sweep Scheme Enabling Scheduling Period Expansions for Continuous Media Playback (연속매체 재연에 적합한 스케줄링 주기 확장을 허용하는 동적 Sweep 기법)

  • Lim, Sung-Chae
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.355-364
    • /
    • 2005
  • With fast advances in computing power and network technologies, online streaming services of continuous media (CM) have been popularly implemented on the Web. To implement such services, a variety of CM streams need to be processed efficiently, so that the Sweep scheme was proposed. This scheme has several advantages such as hiccup-free playbacks and seek-time optimization. In this scheme, however, the entire CM streams are scheduled with a single scheduling period, called a cycle. Since only one scheduling period is allowed in this scheme, a significant amount of disk time is usually wasted because of its inflexible disk schedules. To solve this, we propose a new dynamic Sweep scheme. For this, we devise an algorithm that is able to expand scheduling periods of serviced CM streams and propose a new admission control mechanism guaranteeing hiccup-free playbacks. To show performance gains, we execute various simulation experiments. From the experimental results, we can see that the proposed scheme outperforms the Sweep scheme in terms of disk utilization and scheduling flexibility.

Mobile monitoring system of the Dual LED marine lantern (이중 LED 등명기의 휴대용 모니터링 시스템)

  • Ye, Seong-Hyeon;Han, Soonhee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.8
    • /
    • pp.1948-1954
    • /
    • 2014
  • Advances in IT technology and modernization of AtoN(Aids to Navigation) facility has increased the unmanned operation of AtoN. However, in AtoN facilities, accessibility is low and it is not able to perform maintenance on the bad weather at the time. In connection with this, in this paper, by applying the protocol of the enhanced dual LED marine lantern, we implemented the short-range monitoring system for a mobile terminal. System implemented in this paper can be carried out confirm the operation status, inspection or control of the dual LED marine lantern at a short distance. Also, it is possible to reduce maintenance costs and prevent accidents during inspection of AtoN. At the same time, it enables the operation test easily without disassembling the product, effective AtoN operation is possible. We tested the system that has been implemented using prototype of the LED marine lantern and confirmed state informations and controlled the behavior of the system in real time.

Systemic Approaches Identify a Garlic-Derived Chemical, Z-ajoene, as a Glioblastoma Multiforme Cancer Stem Cell-Specific Targeting Agent

  • Jung, Yuchae;Park, Heejoo;Zhao, Hui-Yuan;Jeon, Raok;Ryu, Jae-Ha;Kim, Woo-Young
    • Molecules and Cells
    • /
    • v.37 no.7
    • /
    • pp.547-553
    • /
    • 2014
  • Glioblastoma multiforme (GBM) is one of the most common brain malignancies and has a very poor prognosis. Recent evidence suggests that the presence of cancer stem cells (CSC) in GBM and the rare CSC subpopulation that is resistant to chemotherapy may be responsible for the treatment failure and unfavorable prognosis of GBM. A garlic-derived compound, Z-ajoene, has shown a range of biological activities, including anti-proliferative effects on several cancers. Here, we demonstrated for the first time that Z-ajoene specifically inhibits the growth of the GBM CSC population. CSC sphere-forming inhibition was achieved at a concentration that did not exhibit a cytotoxic effect in regular cell culture conditions. The specificity of this inhibitory effect on the CSC population was confirmed by detecting CSC cell surface marker CD133 expression and biochemical marker ALDH activity. In addition, stem cell-related mRNA profiling and real-time PCR revealed the differential expression of CSC-specific genes, including Notch, Wnt, and Hedgehog, upon treatment with Z-ajoene. A proteomic approach, i.e., reverse-phase protein array (RPPA) and Western blot analysis, showed decreased SMAD4, p-AKT, 14.3.3 and FOXO3A expression. The protein interaction map (http://string-db.org/) of the identified molecules suggested that the AKT, ERK/p38 and $TGF{\beta}$ signaling pathways are key mediators of Z-ajoene's action, which affects the transcriptional network that includes FOXO3A. These biological and bioinformatic analyses collectively demonstrate that Z-ajoene is a potential candidate for the treatment of GBM by specifically targeting GBM CSCs. We also show how this systemic approach strengthens the identification of new therapeutic agents that target CSCs.

A Study on Constructing of Security Monitoring Schema based on Darknet Traffic (다크넷 트래픽을 활용한 보안관제 체계 구축에 관한 연구)

  • Park, Si-Jang;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1841-1848
    • /
    • 2013
  • In this paper, the plans for improvement of real-time security monitoring accuracy and expansion of control region were investigated through comprehensive and systematic collection and analysis of the anomalous activities that inflow and outflow in the network on a large scale in order to overcome the existing security monitoring system based on stylized detection patterns which could correspond to only very limited cyber attacks. This study established an anomaly observation system to collect, store and analyze a diverse infringement threat information flowing into the darknet network, and presented the information classification system of cyber threats, unknown anomalies and high-risk anomalous activities through the statistics based trend analysis of hacking. If this security monitoring system utilizing darknet traffic as presented in the study is applied, it was indicated that detection of all infringement threats was increased by 12.6 percent compared with conventional case and 120 kinds of new type and varietal attacks that could not be detected in the past were detected.

A study on the implementation of the wireless video security system (무선 영상보안시스템 구현에 관한 연구)

  • Kim, Young-Min;Kim, Myeong-Hwan;Kim, Sun-Hyung
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.1
    • /
    • pp.99-104
    • /
    • 2012
  • In this paper, implementation of a wireless video security system relates to a situation outside of using infrared sensors to detect changes when using Zigbee network security in the area of the sensor sends information to the server. The server can judge the situation if an emergency situation through the IP network security camera shot of the area to be transferred command to pantilte. The camera images and information in the security area, sent to administrator's smartphone users to control the camera can see the situation and More than a small video security system was designed so that user can monitor the security zone. Finally, for real-time to identify and respond to emergency situations based on the available wireless networks for video surveillance systems were verified through research and implementation.

  • PDF

Policy-based Reconfigurable Bandwidth-Controller for Network Bandwidth Saturation Attacks (네트워크 대역폭 고갈 공격에 대한 정책 기반 재구성 가능 대역폭제어기)

  • Park Sang-kil;Oh Jin-tae;Kim Ki-young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.951-958
    • /
    • 2004
  • Nowadays NGN is developed for supporting the e-Commerce, Internet trading, e-Government, e-mail, virtual-life and multimedia. Internet gives us the benefit of remote access to the information but causes the attacks that can break server and modify information. Since 2000 Nimda, Code Red Virus and DSoS attacks are spreaded in Internet. This attack programs make tremendous traffic packets on the Internet. In this paper, we designed and developed the Bandwidth Controller in the gateway systems against the bandwidth saturation attacks. This Bandwidth con-troller is implemented in hardware chipset(FPGA) Virtex II Pro which is produced by Xilinx and acts as a policing function. We reference the TBF(Token Bucket Filter) in Linux Kernel 2.4 and implemented this function in HDL(Hardware Description Language) Verilog. This HDL code is synthesized in hardware chipset and performs the gigabit traffic in real time. This policing function can throttle the traffic at the rate of band width controlling policy in bps speed.