• Title/Summary/Keyword: Real-Time Message System

Search Result 314, Processing Time 0.029 seconds

Modeling and Implementation of the Affordance-based Human-Machine Collaborative System (어포던스 기반의 인간-기계 협업 모델을 이용한 제조 시스템 구현 연구)

  • Oh, Yeong Gwang;Ju, Ikchan;Lee, Wooyeol;Kim, Namhun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.1
    • /
    • pp.34-42
    • /
    • 2015
  • Modeling and control of human-involved manufacturing systems poses a huge challenge on how to model all possible interactions among system components within the time and space dimensions. As the manufacturing environment are getting complicated, the importance of human in the manufacturing system is getting more and more spotlighted to incorporate the manufacturing flexibility. This paper presents a formal modeling methodology of affordance-based MPSG (Message-based Part State Graph) for a human-machine collaboration system incorporating supervisory control scheme for flexible manufacturing systems in automotive industry. Basically, we intend to extend the existing model of affordance-based MPSG to the real industrial application of humanmachine cooperative environments. The suggested extension with the real industrial example is illustrated in three steps; first, the manufacturing process and relevant data are analyzed in perspectives of MABA-MABA and the supervisory control; second, the manufacturing processes and task allocation between human and machine are mapped onto the concept of MABA-MABA; and the last, the affordance-based MPSG of humanmachine collaboration for the manufacturing process is presented with UMLs for verification.

Optimization of Fugitive Dust Control System for Meteorological Conditions (기상조건별 비산먼지 관리체계 최적화 연구)

  • Kim Hyun-Goo
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.21 no.6
    • /
    • pp.573-583
    • /
    • 2005
  • Fugitive dust, which is emitted in the ambient air without first passing through a stack or duct designed to control flow, is frequently generated by means of wind erosion from storage yards at Pohang Steel Wokrs. The size distribution of fugitive dust is mostly in the range of coarse particulate which is deposited as soon as emitted and less harm to human health; however $20\%$ of fugitive dust contains PM 10 known as one of most harmful airborne pollutant. Consequently, effective control and reduction of fugitive dust is strongly requested by the local society, but it is not easy so far because the generation and dispersion of fugitive dust highly depends on meteorological conditions, and it being occurred for irregularity. This research presented a fugitive dust control system for each meteorological condition by providing statistical prediction data obtained from a statistical analysis on the probability of generating the threshold velocity at which the fugitive dust begins to occur, and the frequency occurring by season and by time of the wind direction that can generate atmospheric pollution when the dispersed dust spreads to adjacent residential areas. The research also built a fugitive dust detection system which monitors the weather conditions surrounding storage yards and the changes in air quality on a real-time basis and issues a warning message by identifying a situation where the fugitive dust disperses outside the site boundary line so that appropriate measures can be taken on a timely basis. Furthermore, in respect to the spraying of water to prevent the generation of fugitive dust from the storage piles at the storage yard, an advanced statistical meteorological analysis on the weather conditions in Pohang area and a case study of fugitive dust dispersion toward outside of working field during $2002\∼2003$ were carried out in order to decide an optimal water-spraying time and the number of spraying that can prevent the origin of fugitive dust emission. The results of this research are expected to create extremely significant effects in improving surrounding environment through actual reduction of the fugitive dust produced from the storage yard of Pohang Steel Works by providing a high-tech warning system capable of constantly monitoring the leakage of fugitive dust and water-spray guidance that can maximize the water-spraying effects.

A Study on Data Recording and Play Method between Tactical Situations to Ensure Data Integrity with Data Link Processor Based on Multiple Data Links (다중데이터링크 기반에서 데이터링크 처리기와의 데이터 무결성 보장을 위한 전술상황전시기 간 데이터 기록 및 재생 방법 연구)

  • Lee, Hyunju;Jung, Eunmi;Lee, Sungwoo;Yeom, Jaegeol;Kim, Sangjun;Park, Jihyeon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.13-25
    • /
    • 2017
  • Recently, the high performance of tactical situation display console and tactical data links are used to integrate the operational situations in accordance with information age and NCW (Network Centric Warfare). The tendency to maximize the efficiency of task execution has been developed by sharing information and the state of the battle quickly through complex and diverse information exchange. Tactical data link is a communication system that shares the platform with core components of weapons systems and battlefield situation between the command and control systems to perform a Network Centric Warfare and provides a wide range of tactical data required for decision-making and implementation.It provides the tactical information such as tactical information such as operational information, the identification of the peer, and the target location in real time or near real time in the battlefield situation, and it is operated for the exchange of mass tactical information between the intellectuals by providing common situation recognition and cooperation with joint operations. In this study, still image management, audio file management, tactical screen recording and playback using the storage and playback, NITF (National Imagery Transmission Format) message received from the displayer integrates the tactical situation in three dimensions according to multiple data link operation to suggest ways to ensure data integrity between the data link processor during the entire operation time.

Cinematic Circulation of Meta-verse and Meta-physics (메타버스와 메타피직스의 영화적 순환)

  • Shim, Kwang-hyun
    • Trans-
    • /
    • v.12
    • /
    • pp.81-106
    • /
    • 2022
  • The possibility of metaverse system to be a catalyst for hyper-connected society will be dependent on the speed of connected technological development and its social utilization in the same manner as AI technology. Putting these technical realization processes in brackets, this paper focus on some philosophical-political issues in connection with cognitive-ecological changes in the future cinema which will be influenced by the complexive techno-socio couples of accelerated development of metaverse system. Generally speaking, essence of metaverse system seems to be the degree of immersion by technical accuracy, but is not true. In perspective of cognitive-ecology, flow degree of a picture or photograph is relied not on 'accuracy of representation' but on its message's contextual link-up. In this aspect, real potentiality of metaverse system shall be understood in the context of cognitive-ecological changes of human brain's multi-intelligence networking abilities(intersection of augmentation-simulation and outside-inside) which will be activated in the new structure of natural-social-technological coupling of metaverse system. These cognitive-ecological potentialities have been partially actualized in the cinematic process of tripod mimesis for the longest time, [real contradiction/conflicts (Mimesis-1) -->fictional solutions of cinema (Mimesis-2) --> selective interpretation of spectator's wish fulfillment (Mimesis-3) --> real change (Mimesis-1')]. Therefore metaverse's real potentiality must be considered to be dependent on the possibility of deepening and extending of cinematic circulation between real seperation/problems and ideal connection/solutions. In this context, advanced metaverse system can be compared as a modern technical version of ideal circulation of physics and metaphysics

Assessment of Position Degradation Due to Intermittent Broadcast of RTK MSM Correction Under Various Conditions

  • Yoon, Hyo Jung;Lim, Cheol soon;Park, Byungwoon
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.9 no.3
    • /
    • pp.237-248
    • /
    • 2020
  • GNSS has been evolving dramatically in recent years. There are currently 6 GNSS (4 GNSS, AND 2 RNSS) constellations, which are GPS (USA), GLONASS (Russia), BeiDou (China), Galileo (EU), QZSS (Japan), and IRNSS (India). The Number of navigation satellites is expected to be over 150 by 2020. As the number of both constellations and satellites used for the improvement of positioning performance, high accuracy, and robustness of precise positioning is more promising. However, a large amount of the correction messages is required to support the augmentation system for the available satellites of all the constellations. Since bandwidth for the correction messages is generally limited, sending or scheduling the correction messages might be a critical issue in the near future. In this study, we analyze the relationship between the size of the bandwidth and Real-Time Kinematics (RTK) performance. Multiple Signal Messages (MSM), the only Radio Technical Commission for Maritimes (RTCM) message that supports multi-constellation GNSS, has been used for this assessment. Instead of the conventional method that broadcasts all the messages at the same time, we assign the MSM broadcasting interval for each constellation in 5 seconds. An open sky static and dynamic test for this study was conducted on the roof of Sejong University. Our results show that the RTK fixed position accuracy is not affected by the 5-second interval corrections, but the ambiguity fixing rate is degraded for poor DOP cases when RTK correction are transmitted intermittently.

Modeling Differential Global Positioning System Pseudorange Correction

  • Mohasseb, M.;El-Rabbany, A.;El-Alim, O. Abd;Rashad, R.
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.21-26
    • /
    • 2006
  • This paper focuses on modeling and predicting differential GPS corrections transmitted by marine radio-beacon systems using artificial neural networks. Various neural network structures with various training algorithms were examined, including Linear, Radial Biases, and Feedforward. Matlab Neural Network toolbox is used for this purpose. Data sets used in building the model are the transmitted pseudorange corrections and broadcast navigation message. Model design is passed through several stages, namely data collection, preprocessing, model building, and finally model validation. It is found that feedforward neural network with automated regularization is the most suitable for our data. In training the neural network, different approaches are used to take advantage of the pseudorange corrections history while taking into account the required time for prediction and storage limitations. Three data structures are considered in training the neural network, namely all round, compound, and average. Of the various data structures examined, it is found that the average data structure is the most suitable. It is shown that the developed model is capable of predicting the differential correction with an accuracy level comparable to that of beacon-transmitted real-time DGPS correction.

  • PDF

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

Design and Implementation of The Vehicle Tracking Applications using Geospatial Query (공간 정보 질의를 이용한 차량 추적 애플리케이션의 설계 및 구현)

  • Ilham, Anugrah Moch;Jung, Jin-uk;Jin, Kyo-Hong;Hwang, Min-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.6
    • /
    • pp.637-644
    • /
    • 2019
  • In recent years, many public safety systems in the smart city are developed. These systems are taking responsibility to make a safe and comfortable city. In this paper, we propose vehicle tracking systems include a public safety system that enables the policeman to track the stolen vehicles more efficiently by providing the vehicle information in real time. When a vehicle is stolen, the vehicle owner can send a user emergency request. Then, the public safety server which supported by a geospatial query technique will give information such as time, distance, and routes to a policeman who is closest to the location of the vehicle to catch the thief. 300 simulations were performed to evaluate the performance of the system. We found that the average of times required when vehicle owner send a user emergency message on user application until policeman obtain a vehicle tracking request on police application below 1.2 seconds.

Development of a distributed high-speed data acquisition and monitoring system based on a special data packet format for HUST RF negative ion source

  • Li, Dong;Yin, Ling;Wang, Sai;Zuo, Chen;Chen, Dezhi
    • Nuclear Engineering and Technology
    • /
    • v.54 no.10
    • /
    • pp.3587-3594
    • /
    • 2022
  • A distributed high-speed data acquisition and monitoring system for the RF negative ion source at Huazhong University of Science and Technology (HUST) is developed, which consists of data acquisition, data forwarding and data processing. Firstly, the data acquisition modules sample physical signals at high speed and upload the sampling data with corresponding absolute-time labels over UDP, which builds the time correlation among different signals. And a special data packet format is proposed for the data upload, which is convenient for packing or parsing a fixed-length packet, especially when the span of the time labels in a packet crosses an absolute second. The data forwarding modules then receive the UDP messages and distribute their data packets to the real-time display module and the data storage modules by PUB/SUB-pattern message queue of ZeroMQ. As for the data storage, a scheme combining the file server and MySQL database is adopted to increase the storage rate and facilitate the data query. The test results show that the loss rate of the data packets is within the range of 0-5% and the storage rate is higher than 20 Mbps, both acceptable for the HUST RF negative ion source.

Implementing an Intrusion Detection Message Exchange Library for Realtime Interaction between SDMS-RTIR and Heterogeneous Systems (이기종의 침입탐지 시스템과 SDMS-RTIR의 실시간 상호연동을 지원하는 침입탐지 메시지 교환 라이브러리 구현)

  • Yun, Il-Sun;Lee, Dong-Ryun;Oh, Eun-Sook
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.565-574
    • /
    • 2003
  • This paper implements an intrusion detection message exchange protocol library (IDMEPL) for SDMS-RTIR, which Korea Information Security Agency (KISA) has developed to hierarchically detect and respond to network vulnerability scan attacks. The IDMEPL, based on the IDMEF and the IAP of the IDWG, enables SDMS-RTIR to interact with other intrusion detection systems (IDS) in realtime, and supports the TLS protocol to prevent security threats in exchanging messages between its server and its agents. Especially, with the protocol selection stage, the IDMEPL can support various protocols such as the IDXP besides the IAP. Furthermore, it can allow for agents to choose an appropriate security protocol for their own network, achieving security stronger than mutual authentication. With the IDMEPL, SDMS-RTIR can receive massive intrusion detection messages from heterogeneous IDSes in large-scale networks and analyze them.