• Title/Summary/Keyword: Research Information Systems

Search Result 12,220, Processing Time 0.044 seconds

Underwater Channel Analysis and Transmission Method Research via Coded OFDM (수중채널 분석과 Coded OFDM을 통한 전송방법 연구)

  • Jeon, Hyeong-Won;Lee, Su-Je;Lee, Heung-No
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.573-581
    • /
    • 2011
  • The underwater channel is known to offer poor communications channel. The channel medium is highly absorptive and the transmission bandwidth is limited. In addition, the channel is highly frequency selective; the degree of selectiveness depends on a detailed geometry of the channel. Furthermore, the response changes over time as the channel conditions affecting the response such as water temperature, sea surface wind and salinity are time-varying. The transceiver design to deal with the frequency and time selective channel, therefore, becomes very challenging. It has been known that deep fading at certain specific sub-carriers are detrimental to OFDM systems. To mitigate this negative effect, the proposed coded OFDM system employs an LDPC code based modulation. In this paper, we aim 1) to provide a detailed underwater channel model; 2) to design a robust LDPC coded OFDM system; 3) to test the proposed system under a variety of channel conditions enabled by the channel model.

Real-time Graph Search for Space Exploration (공간 탐사를 위한 실시간 그래프 탐색)

  • Choi, Eun-Mi;Kim, In-Cheol
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.153-167
    • /
    • 2005
  • In this paper, we consider the problem of exploring unknown environments with a mobile robot or an autonomous character agent. Traditionally, research efforts to address the space exploration problem havefocused on the graph-based space representations and the graph search algorithms. Recently EXPLORE, one of the most efficient search algorithms, has been discovered. It traverses at most min$min(mn, d^2+m)$ edges where d is the deficiency of a edges and n is the number of edges and n is the number of vertices. In this paper, we propose DFS-RTA* and DFS-PHA*, two real-time graph search algorithms for directing an autonomous agent to explore in an unknown space. These algorithms are all built upon the simple depth-first search (DFS) like EXPLORE. However, they adopt different real-time shortest path-finding methods for fast backtracking to the latest node, RTA* and PHA*, respectively. Through some experiments using Unreal Tournament, a 3D online game environment, and KGBot, an intelligent character agent, we analyze completeness and efficiency of two algorithms.

  • PDF

Diagnosing Multiple Faults using Multiple Context Spaces (다중 상황공간을 이용한 다중 오류의 고장 진단)

  • Lee, Gye-Sung;Gwon, Gyeong-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.137-148
    • /
    • 1997
  • Diagnostic problem solving is a major application area of knowledge-based systems research. However, most of the current approaches, both heuristic and model-based, are designed to identify single faults, and do not generalize easily to multiple fault diagnosis without exhibiting exponential behavior in the amount of computation required. In this paper, we employ a decomposition approach based on system configuration to generate an efficient algorithm for multiple fault diagnosis. The basic idea of the algorithm is to reduce the inherent combinatorial explosion that occurs in generating multiple faults by partitioning the circuit into groups that correspond to output measurement points. Rules are multiple faults by partitioning the circuit into groups that correspond to output measurement points. rules are developed for combining candidates from individual groups, and forming consistent sets of minimal candidates.

  • PDF

A Study on Cyber Security Threat and Security Requirements for Industrial Wireless Communication Devices (산업용 무선통신기기 사이버 보안위협 및 보안요구사항에 관한 연구)

  • Lee, Jiseop;Park, Kyungmi;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.757-770
    • /
    • 2020
  • Industrial Control System(ICS) is a system that measures, monitors, and controls various distributed assets, and is used in industrial facilities such as energy, chemical, transportation, water treatment, and manufacturing plants or critial infrastructure. Because ICS system errors and interruptions can cause serious problem and asset damage, research on prevention and minimization of security threats in industrial control systems has been carried out. Previously wireless communication was applied in limited fields to minimize security risks, but the demand for industrial wireless communication devices is increasing due to ease of maintenance and cost advantages. In this paper, we analyzed the security threats of industrial wireless communication devices supporting WirelessHART and ISA100.11a. Based on the analysis results, we proposed the security requirements for adopting and operating industrial wireless communication devices. We expect that the proposed requirements can mitigate security threats of industrial wireless devices in ICS.

Ubiquitous Sensor Network based Localization System for Public Guide Robot (서비스 로봇을 위한 유비쿼터스 센서 네트워크 기반 위치 인식 시스템)

  • Choi, Hyoung-Youn;Park, Jin-Joo;Moon, Young-Sun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.10
    • /
    • pp.1920-1926
    • /
    • 2006
  • With social interest, there hie been a lot of research on the Service Robot but now we are faced with the limitation of single platform. The alternative plan is the Ubiquitous-based Service Robot connected with a Ubiquitous network to overcome this limitation. Systems using RFID(Radio frequency Identification) and supersonic waves appeared for functions such as recognition of surroundings through Ubiquitous Sensor Networks. This was applied to the real robot and we have got good results. However, this has several limitations to applying to low power-based Sensor Network For example, if RFID uses a passive Sensor, the rate of recognition with the distance is limited. In case of supersonic waves, high power is required to drive them. Therefore, we intend to develop RSSI position recognition system on the basis of embodying a Sensor Network Module in this thesis. This RSSI position recognition system only measures RSSI of signals from each sensor nod. then converts them into distances and calculates the position. As a result, we can still use low power-based Sensor Network and overcome the limitation according to distance as planning Ad-Hoc Network.

A Security Protocol for Swarming Technique in Peer-to-Peer Networks (피어 투 피어 네트워크에서 스워밍 기법을 위한 보안 프로토콜)

  • Lee, Kwan-Seob;Lee, Kwan-Sik;Lee, Jang-Ho;Han, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1955-1964
    • /
    • 2011
  • With fast deployment of high-speed networks and various online services, the demand for massive content distribution is also growing fast. An approach that is increasingly visible in communication research community and in industry domain is peer-to-peer (P2P) networks. The P2P swarming technique enables a content distribution system to achieve higher throughput, avoid server or network overload, and be more resilient to failure and traffic fluctuation. Moreover, as a P2P-based architecture pushed the computing and bandwidth cost toward the network edge, it allows scalability to support a large number of subscribers on a global scale, while imposing little demand for equipment on the content providers. However, the P2P swarming burdens message exchange overheads on the system. In this paper, we propose a new protocol which provides confidentiality, authentication, integrity, and access control to P2P swarming. We implemented a prototype of our protocol on Android smart phone platform. We believe our approach can be straightforwardly adapted to existing commercial P2P content distribution systems with modest modifications to current implementations.

Channel Equalization Schemes using Midamble for WAVE Systems (WAVE 시스템에서 미드엠블을 이용한 채널 등화 방식)

  • Hong, Dae-Ki;Kang, Bub-Joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2215-2222
    • /
    • 2010
  • A Wireless Access for Vehicular Environment (WAVE) system based on Orthogonal Frequency Division Multiplexing (OFDM) is made for vehicle to vehicle wireless communications. The physical layer standard of the WAVE system is very similar to that of the IEEE802.11a wireless local area network (WLAN). Therefore, the performance of the WAVE system is degraded by continual channel variation in the WAVE multipath fading channels after starting initial channel estimation. In this paper, we research the performance improvement of equalization in 64 Quadrature Amplitude Modulation (QAM) transmission in WAVE environment. The proposed algorithms use the training sequence and the midamble sequence which is used for fast channel variation such as WAVE environments. Additionally, various interpolation methods are also used for the channel tracking.

Delay based Authentication Model for Flooding of Service Tolerance of Rehabilitation Psychology Analysis System (재활심리분석시스템의 폭주서비스 감내를 위한 지연기반 인증모델)

  • Lim, Ho-Chan;Kim, Young-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2073-2081
    • /
    • 2013
  • Today's rapidly changing society can lead to maladaptive behaviors. In the situations, rehabilitation psychology analysis using the on-line test be needed to solve the problem. However, Internet-based rehabilitation psychology analysis by a malicious attacker may still be vulnerable to denial-of-service attacks. The service flooding attacks render the server incapable of providing its service to legitimate clients. Therefore the importance of implementing systems that prevent denial of service attacks and provide service to legitimate users cannot be overemphasized. In this paper, we propose a puzzle protocol which applies to authentication model. our gradually strengthening authentication model improves the availability and continuity of services and prevent denial of service attacks and we implement flooding of service tolerance system to verify the efficiency of our model. This system is expected to be ensure in the promotion of reliability.

A Study on Performance Evaluation of Conveyor System in Corrugated Mamanufacturing Industry (골판지 제조업체의 컨베이어 시스템 성능평가 사례연구)

  • Lee, Yeong-Jae;Kim, Jae-Sik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.1
    • /
    • pp.1-8
    • /
    • 1996
  • A conveyor system in corrugated manufacturing industry may be in charge of carriage/storage, and may control logistics flow and production activities of products in a manufacturing process which consists of corrugators, conveyors, and printer-slotter systems. It identifies problems that the conveyor system in this case study is overloaded and often operated manually. This research is to evaluate e the conveyor system though simulation model of technological evaluation beyond d eco-nomic and qualitative one. The rate of operation and the load of the conveyor system are used as parameters in the simulation. This paper suggests a direction to a new conveyor system implementation the basis of the results that are derived by new alternatives based on current model. The best alternative is supposed to be the number of conveyors and the operation times of the printer-slotter that may be increased at the same time.

  • PDF

A Design and Implementation of CHILL Run-time System for Distributed Real-time Processing (실시간 분산처리를 제공하는 CHILL 실행시간 지원 시스템의 설계 및 구현)

  • Paik, Eui-Hyun;Chang, Jong-Hyun;Lee, Dong-Gill
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.9
    • /
    • pp.2815-2826
    • /
    • 2000
  • This paper describes the design and implementation of a CHILL Run-time System(CRS) that provides a running environments of real-time distributed software like as ATM switching software on host computers. To do this, we have proposed an execution model of real-time distributed CHILL proRrams and developed a CHS executinR the software of the execution model on host computers. Because CRS provides transparent runninR environments of target operating system, programmers are able to develop target system software without target system. As it provides an environment for multiple users running programs concurrently, it guarantees the improvement of program productivity. Originally, CRS has developed as a simulator of SROS. But it can be easily modified for other operating systems.

  • PDF