• Title/Summary/Keyword: Technology-oriented

Search Result 2,622, Processing Time 0.027 seconds

Implementation of a Top-down Clustering Protocol for Wireless Sensor Networks (무선 네트워크를 위한 하향식 클러스터링 프로토콜의 구현)

  • Yun, Phil-Jung;Kim, Sang-Kyung;Kim, Chang-Hwa
    • Journal of Information Technology Services
    • /
    • v.9 no.3
    • /
    • pp.95-106
    • /
    • 2010
  • Many researches have been performed to increase energy-efficiency in wireless sensor networks. One of primary research topics is about clustering protocols, which are adopted to configure sensor networks in the form of hierarchical structures by grouping sensor nodes into a cluster. However, legacy clustering protocols do not propose detailed methods from the perspective of implementation to determine a cluster's boundary and configure a cluster, and to communicate among clusters. Moreover, many of them involve assumptions inappropriate to apply those to a sensor field. In this paper, we have designed and implemented a new T-Clustering (Top-down Clustering) protocol, which takes into considerations a node's density, a distance between cluster heads, and remained energy of a node all together. Our proposal is a sink-node oriented top-down clustering protocol, and can form uniform clusters throughout the network. Further, it provides re-clustering functions according to the state of a network. In order to verify our protocol's feasibility, we have implemented and experimented T-Clustering protocol on Crossbow's MICAz nodes which are executed on TinyOS 2.0.2.

Design and Development of a PDA mobile banking System (PDA를 활용한 모바일뱅킹 시스템의 설계 및 구현)

  • Choi, Eui-Kwon;Lee, San-Bum
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1530-1536
    • /
    • 2007
  • In this paper, a mobile banking system which can provide banking services is introduced. Since a PDA has excellent features like a small-size computer and provides mobility, it has been widely used by salesmen. Therefore, if general banking services can be provided with PDA by using wireless technology, it will be very useful. In addition, it is easy to develop and maintain the client software of PDA because it uses Windows-based operation systems. In this paper, a PDA banking system is introduced. The system is designed and developed based on the techniques of wireless network, security and PDA programming to be used for mobile banking and a prototype system is developed. Moreover, we used the object-oriented modeling technique, UML and Java Beans for programming.

  • PDF

Improving Strategy of Reading Culture for Printed Disabled People in the Library (도서관을 통한 장애인 독서문화 확산 및 활성화 방안)

  • Ahn, In-Ja
    • Journal of Information Management
    • /
    • v.43 no.1
    • /
    • pp.187-212
    • /
    • 2012
  • The reading culture promotion for the disabled is a key task of library which minimizes the level of information poverty, and improves the living standards of the people. In order to address the promotional methods, this study adopts a frame from a reading culture promotion policy, and analyzes national and international library services for the disabled. In results, the current library services for the disabled are mainly based on 'building appropriate reading environments' and guaranteeing 'equal reading opportunities'. However, campaigns or tasks targeting the disabled which makes reading a way of life are insufficient. This study, therefore, suggests 'reading education', 'reading therapy', 'user-oriented program development' to make reading a way of life. Library promoting strategies can also be useful in campaign of reading activities for the disabled.

A Design and Implementation of Multimedia Contents Delivery System Using the ZigBee (ZigBee를 활용한 멀티미디어 Contents Delivery 시스템 설계 및 구현*)

  • Kim, Min-Sung;Chung, Yeong-Jee
    • Journal of Information Technology Services
    • /
    • v.9 no.2
    • /
    • pp.151-161
    • /
    • 2010
  • Recently, as the era of ubiquitous has arrived, an infrastructure for the short-distance wireless communication has been extended socially, and thus a variety of services are being proposed. The Multimedia Contents Delivery System using the ZigBee, in particular, has an important stance in enlargement of a variety of services in the aspect of individual-oriented service support though Wireless Personal Area Network (WPAN). Nonetheless, the ZigBee, or the IEEE 802.15.4 Standard, has many restrictions on the Multimedia Contents Delivery System due to the low data transport rate. In order to improve the ZigBee which presents a limit on the transport rate at the IEEE 802.15.4 Standard, this thesis has designed the burst mode which is a method of transmitting a certain amount of data in block units at a high speed without any stoppage until the completion of the transmission. Also, to provide a Multimedia Contents Delivery Service with an application of the normal data transmission mode, it improved the transmission performance of the ZigBee. In addition, for the Multimedia Contents Delivery Service under the ubiquitous environment, it designed and implemented a broadcasting Multimedia Contents Delivery System based on the ZigBee to conduct a comparative analysis on the data transmission performance according to the transmission method.

A Study on Establishing Guidelines for Information Protection and Security for Educational Institutes (학내 정보보호지침 수립에 관한 연구)

  • Yu, Ki-Hun;Choi, Woong-Chul;Kim, Shin-Kon;Goo, Chun-Yul
    • Journal of Information Technology Services
    • /
    • v.7 no.1
    • /
    • pp.23-43
    • /
    • 2008
  • Because IT security guidelines for universities and colleges mostly focus on hardware aspects, the problems such as security incidents by a user's mistake and personal information leakage by hacking are serious in our higher educational institutes. In order to solve these information protection and security problems in the educational institutes, realizable and implementable information protection and security guidelines which will contribute to escalate information protection level should be established and at the same time, specific guidelines should be provided to make the guidelines efficient. In this paper, the information security problems and cases are categorized to develop information security guidelines for the higher educational institutes in terms of short, mid, and long term aspects and the solutions to the problems are sought. In addition, a serious of approaches to the information security are proposed such as the improvement measures for the employees of the institute to have desirable security-minded, security problem prevention and resolving methods, developing conflict coordination procedure and law and regulation system establishment for making the educational institutes be information-oriented.

Damping for Wind Turbine Electrically Excited Synchronous Generators

  • Tianyu, Wang;Guojie, Li;Yu, Zhang;Chen, Fang
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.4
    • /
    • pp.801-809
    • /
    • 2016
  • The electrically excited synchronous generator (EESG) is applied in wind turbine systems recently. In an EESG control system, electrical torque is affected by stator flux and rotor current. So the control system is more complicated than that of the permanent-magnet synchronous generator (PMSG). Thus, the higher demanding of the control system is required especially in case of wind turbine mechanical resonance. In this paper, the mechanism of rotor speed resonant phenomenon is introduced from the viewpoint of mechanics firstly, and the characteristics of an effective damping torque are illustrated through system eigenvalues analysis. Considering the variables are tightly coupled, the four-order small signal equation for torque is derived considering stator and rotor control systems with regulators, and the bode plot of the closed loop transfer function is analyzed. According to the four-order mathematical equation, the stator flux, stator current, and electrical torque responses are derived by torque reference step and ramp in MATLAB from a pure mathematical deduction, which is identical with the responses in PSCAD/EMTDC simulation results. At last, the simulation studies are carried out in PSCAD software package to verify the resonant damping control strategy used in the EESG wind turbine system.

Modeling of Liquid Entrainment and Vapor Pull-Through in Header-Feeder Pipes of CANDU

  • Cho Yong Jin;Jeun Gyoo Dong
    • Nuclear Engineering and Technology
    • /
    • v.36 no.2
    • /
    • pp.142-152
    • /
    • 2004
  • The liquid entrainment and vapor pull-through offtake model of RELAP5/MOD3 had been developed for SBLOCA (Small Break Loss of Coolant Accident). The RELAP5/MOD3 model for horizontal volumes accounts for the phase separation phenomena and computes the flux of mass and energy through a branch when stratified conditions occur in the horizontal pipe. In the case of CANDU reactor, this model should be used in the coolant flow of 95 feeders connected to the reactor header component under the horizontal stratification in header. The current RELAP5 model can treat the only 3 directions junctions; vertical upward, downward, and side oriented junctions, and thus improvements for the liquid entrainment and vapor pull-through model were needed for considering the exact angles. The RELAP5 off-take model was modified and generalized by considering the geometric effect of branching angles. Based on the previous experimental results, the critical height correlation was reconstructed by use of the branch line connection angle and validation analyses were also performed using SET. The new model can be applied to vertical upward, downward and angled branch, and the accuracy of the new correlations is more improved than that of RELAP5.

Nondestructive inspection of spent nuclear fuel storage canisters using shear horizontal guided waves

  • Choi, Sungho;Cho, Hwanjeong;Lissenden, Cliff J.
    • Nuclear Engineering and Technology
    • /
    • v.50 no.6
    • /
    • pp.890-898
    • /
    • 2018
  • Nondestructive inspection (NDI) is an integral part of structural integrity analyses of dry storage casks that house spent nuclear fuel. One significant concern for the structural integrity is stress corrosion cracking in the heat-affected zone of welds in the stainless steel canister that confines the spent fuel. In situ NDI methodology for detection of stress corrosion cracking is investigated, where the inspection uses a delivery robot because of the presence of the harsh environment and geometric constrains inside the cask protecting the canister. Shear horizontal (SH) guided waves that are sensitive to cracks oriented either perpendicular or parallel to the wave vector are used to locate welds and to detect cracks. SH waves are excited and received by electromagnetic acoustic transducers (EMATs) using noncontact ultrasonic transduction and pulse-echo mode. A laboratory-scale canister mock-up is fabricated and inspected using the proposed methodology to evaluate the ability of EMATs to excite and receive SH waves and to locate welds. The EMAT's capability to detect notches from various distances is evaluated on a plate containing 25%-through-thickness surface-breaking notches. Based on the results of the distances at which notch reflections are detectable, NDI coverage for spent nuclear fuel storage canisters is determined.

Status Report on the Korean Speech Recognition Platform (한국어 음성인식 플랫폼 개발현황)

  • Kwon, Oh-Wook;Kwon, Suk-Bong;Jang, Gyu-Cheol;Yun, Sung-rack;Kim, Yong-Rae;Jang, Kwang-Dong;Kim, Hoi-Rin;Yoo, Chang-Dong;Kim, Bong-Wan;Lee, Yong-Ju
    • Proceedings of the KSPS conference
    • /
    • 2005.11a
    • /
    • pp.215-218
    • /
    • 2005
  • This paper reports the current status of development of the Korean speech recognition platform (ECHOS). We implement new modules including ETSI feature extraction, backward search with trigram, and utterance verification. The ETSI feature extraction module is implemented by converting the public software to an object-oriented program. We show that trigram language modeling in the backward search pass reduces the word error rate from 23.5% to 22% on a large vocabulary continuous speech recognition task. We confirm the utterance verification module by examining word graphs with confidence score.

  • PDF

A Study on Extraction and its Storage method of Topological Information from Common 2-D CAD Using The Boundary-Representation Method (범용 2D MCAD 상에서 경계표현법을 이용한 위상 정보 추출 및 그 저장방식에 관한 연구)

  • Hong, Sang-Hoon;Han, Seong-Young;Kim, Yong-Yun
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.16 no.9
    • /
    • pp.25-34
    • /
    • 1999
  • In spite of the advance of 3D solid modeling technology, there are some distinct areas where 2D CAD S/W are still dominant, and more competent comparing with 3D CAD S/W. For example, in the manufacturing of 2D-shaped electrical parts, most related manufacturing tools have 2D geometric features by nature, and 3D solid models applied to these parts have substantial overheads. Nevertheless, most 2D CAD S/W have no topological inquiry services because they have no such information on their geometrical database inherently. Thus, it is needed to extract such information from 2D CAD database for developing more advanced application such as automated drafting/design S/W. In this paper, the extraction of topological information from 2D CAD has been performed in general way using concept of B-rep. A general extraction algorithm, data structure and meta file format for 2D topological object have been developed and successfully applied to the development of the automated lead frame die design system in Samsung Aerospace. it is also possible to provide a flexible, powerful topology-oriented functionality on any common 2D CAD S/W.

  • PDF