• Title/Summary/Keyword: construction protocol

Search Result 272, Processing Time 0.025 seconds

A Case Study for Creativity Assessment of Problem Solving Process of Mathematically Gifted High School Students Utilizing Construction Protocol of GeoGebra (GeoGebra의 구성단계 기능을 활용한 고등학교 수학 영재 문제해결 과정의 창의성 평가 사례 연구)

  • Yang, Seonghyun
    • Journal of Gifted/Talented Education
    • /
    • v.24 no.6
    • /
    • pp.897-916
    • /
    • 2014
  • In this study, we presented a teaching-learning method that can apply process-focused assessment for mathematical creativity of problem solving process of the gifted student, By necessity of appropriate teaching-learning program development to the level and ability of students who belong to high school gifted classes and courses evaluation for students who participated in education programs for the gifted. In the construction implementation process of students utilizing a kind of teaching-learning software, GeoGebra. We analyzed process of a variety of creative constructing figures using interfaces of GeoGebra and algebraic calculation. Utilizing 'Construction Protocol' and 'Navigation Bar' of GeoGebra, We identified computer languages, construction order, run times used in construction process of individual student and found mathematical creativity of students in the process. Comparing this result with prerequisite learning degree of individual student, We verified that this teaching-learning method can apply at the high school gifted classes as well as institutes for the gifted education in the city office.

Secure Data Gathering Protocol over Wireless Sensor Network (무선센서네트워크에서 안전한 데이터 수집 프로토콜)

  • Choi, Hae-Won;Ryoo, Myung-Chun;Lee, Chae-Soo;Kim, Hyun-Sung
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.367-380
    • /
    • 2013
  • A secure data gathering in a Wireless Sensor Network(WSN) has given attention to one of security issues. In general, the process of secure data gathering causes difficulties: one process is exchanging the secured data and the other is constructing secured data path. The previous studies have been resolving the difficulties in terms of two problems: security and data gathering in WSNs. However, a WSN requires a protocol that has to guarantee a security of path between sensors and sink, or a cluster head. Thus how to gather data securely is an important issue. In this paper, we propose a secure data gathering protocol over WSNs, which consists of hierarchical key settlement and secure path construction, and aims at tackling two problems. The proposed protocol causes little overhead to sensor nodes for secured key settlement and path construction. This work provides security analysis focused on the key settlement protocol and evaluates network performance for the proposed data gathering protocol through simulation.

The Study on the OLSR(Optimized Link State Routing Protocol) Implementation in the Mobile Ad-hoc Network (모바일 에드혹 네트워크의 OLSR(Optimized Link State Routing Protocol) 구현에 관한 연구)

  • Cho, Tae-Kyung;Lee, Jea-Hee
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.60 no.4
    • /
    • pp.257-261
    • /
    • 2011
  • In this paper, we research the OLSR(Optimized Link State Routing Protocol) of the mobile ad-hoc network protocols, and design the system implementation based on the Embedded Linux for the Ubiquitous Space construction. We prove the performance of proposed system in the various experiment environments through several scenarios which is about transmitting the image data on the mobile ad-hoc network environment.

Study of Bluetooth Scatternet Formation (Bluetooth Scatternet Formation에 관한 연구)

  • 안호성;황진옥;민성기
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.592-594
    • /
    • 2004
  • Bluetooth 칩셋의 생산량을 보면, 보이지 않는 곳에서 Bluetooth의 성장은 계속 되고 있다. [1] 그리고 Bluetooth는 Scatternet을 구성하여 Personal Area Network의 영역을 넘어 Senssor network에 적용하는 것이 가능하다. 그러나 Bluetooth specification[2]에서는 Scatternet Formation 방법에 대해 제안하지 않는다. 이를 개선하기 위해 BTCP (Bleutooth Topology Construction Protocol)[3], Bluetree[4], Bluenet[5], TPSF(Two-Phase Scatternet Formation) protocol[6]이 제안되었다. 본 논문에서는 이러한 protocol들을 개략적으로 설명하고 그에 대한 장단점을 알아보겠다.

  • PDF

A Study on the Communication Protocol based on POS Data Automated Chicken Cooking Utensils for Open-style Kitchens (오픈 주방형 무인 자동화 치킨 조리기용 포스 연동 통신 프로토콜에 관한 연구)

  • Han, Kyoung-heon;Cho, Che-hyun;Kang, Min-ju;Seo, Hyung-sook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.332-335
    • /
    • 2018
  • 인건비 상승으로 여러 치킨 프렌차이즈 업체들이 무인 자동화 치킨 조리기를 개발을 진행하고 있으나, 포스와의 연동이 미흡하여 완전한 무인 자동화 치킨 조리기로 완성이 되고 있지 않은 실정이다. 그리고 포스 정보는 이더넷 기반으로 다수의 명령 전달에 대해 반영이 되어 있지 않아 다수의 데이터로 병목현상이 발생하여 지연시간이 증가하는 문제점을 보유 하고 있으며, 추가 네트워크 장치로 인해 기존에 구축된 안정적인 환경을 해칠 수 있는 우려가 있다. 그래서 본 논문에서는 기존 포스 정보 데이터를 수집하여 치킨 조리기에 데이터를 전송할 수 있는 유무선 통신모듈과 통신 모듈 추가로 인해 발생할 수 있는 문제 해결이 가능한 데이터 교환 프로토콜을 제안한다.

  • PDF

A Study on the Information Security Protocol in LLC/MAC Layer Architecture (LLC/MAC 계층 구조에서의 정보 보호 포로토콜에 관한 연구)

  • 류황빈;이재광
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.10
    • /
    • pp.1164-1174
    • /
    • 1992
  • In this paper, an Information Security protocol in LLC/MAC Layer Architecture is discussed. This paper examines the security Vulnerability and threats, the security Service required to protect these threats, and architectural considerations of security protocol in IEEE 802 LAN architecture. To provide an Information security service, an information security protocol(SP2 : Security Protocol 2) PDU construction with LLC/MAC service primitives is suggested. To construct the SP2 protocol, the ECB, CBC mode of DES algorithm and DAA(Data Authentication Algorithm) of FIPS is used. The SP2 protocol suggested in this paper provides data origin authentication, data confidentiality, data integrity service.

  • PDF

Development of Embedded Board for Construction of Smart Factory (스마트 팩토리 구축을 위한 임베디드 보드 개발)

  • Lee, Yong-Min;Lee, Won-Bog;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.23 no.3
    • /
    • pp.1092-1095
    • /
    • 2019
  • In this paper, we propose the development of an embedded board for construction of smart factory. The proposed embedded board for construction of smart factory consists of main module, ADC module, I/O module. Main module is a main calculating device which includes communication pard that allows interface with external device with using industrial protocol and is ported operating system makes board operating into. ADC module takes part in transferring digital signal has converted from electrical signal to the main module from the external sensor which is installed on the field. I/O module is an input and output module which transfers to the main module about a status, alarm, command signal of field device and it has a function that blocks external noises from field device with isolation circuit into it. In order to evaluate the performance of the proposed embedded board for construction of smart factory, it has been tested by an authorized testing institute. As a result, quantity of interacting protocol was 5, speed of hardware clock synchronization was under 10us and operating time of battery without source power was over 8 hours. It produced the same result as the world's highest level.

A STUDY FOR RFID APPLICATION OF CONSTRUCTION MATERIALS

  • Choong-Han Han ;Ki-Bum Ju
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.1155-1160
    • /
    • 2009
  • The trend in construction industry, now, lies in improving efficiency and competitive power in construction management and on-the-spot instruction by combining with new IT technology. Above all, it is safe to say that the application of RFID technology can play a pivotal role at this point, but it is not that easy to apply RFID due to the physical, chemical and environmental peculiarities of construction materials. Thus, a study on the standardization of the usable frequency, specifications, protocol, and package administration is required. This study, as part of the study on the standardization, figured out the restrictions by attaching the existing RFID Tag to the construction materials, turned out the prototype of RFID Tag to perform a field test. In result the effective recognition range varies according to the physical and environmental peculiarities of construction materials; and the management efficiency varies as the attaching method and/or applying method. To analyze the management method (media, process etc.) systematically for the existing construction materials; to prepare more various restrictions and its solutions for practical construction spots will be the key for successful RFID implementation.

  • PDF

A Study on the Standardization of Operation System for Road Tunnels (터널운영시스템 표준화 연구)

  • Kim, Tae-Hyung;Kim, Jin;Keum, Jae-Sung;Tae, Jae-Ho;Kim, Sun-Hong;Hong, Dae-Hie
    • Proceedings of the SAREK Conference
    • /
    • 2008.11a
    • /
    • pp.75-79
    • /
    • 2008
  • Since tunnel construction order was placed one by one, various sensors and actuators installed at the RTU and higher level system in each tunnel maintenance office had their own protocols depending on construction company. The TGMS testbed established on the extended region of Yong-dong Highway, for example, did not have consistent protocol between each automation levels and management levels without considering the functions and/or roles of each level. The management sever in each tunnel was simply networked to the TGMS server. Therefore, it is impossible to implement a new control algorithm as well as to integrate each other since each tunnel was constructed by different company. So, if the construction company is out of business, there is no way to maintain the corresponding tunnel effectively. In order to solve this problem, all the necessary standard protocols was established between automation level and management levels. These interface standards provide the clear classification between individual tunnel system and tunnel management system. So, even if construction company is different, its effect is minimized, so that it is expected to successfully establish PC based TGMS.

  • PDF

An Entropy-Based Routing Protocol for Supporting Stable Route Life-Time in Mobile Ad-hoc Wireless Sensor Networks (모바일 Ad-hoc 무선 센서 네트워크에서 안정된 경로의 Life-Time을 지원하기 위한 엔트로피 기반의 라우팅 프로토콜)

  • An, Beong Ku;Lee, Joo Sang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.31-37
    • /
    • 2008
  • In this paper, we propose an entropy-based routing protocol to effectively support both stable route construction and route lifetime in Mobile Ad-hoc Wireless Sensor Networks (MAWSN). The basic idea and feature of the proposed routing protocol are as follows. First, we construct the stable routing routes based on entropy concept using mobility of mobile nodes. Second, we consider a realistic approach, in the points of view of the MAWSN, based on mobile sensor nodes as well as fixed sensor nodes in sensor fields while the conventional research for sensor networks focus on mainly fixed sensor nodes. The performance evaluation of the proposed routing protocol is performed via simulation using OPNET(Optimized Network Engineering Tool) and analysis. The results of the performance evaluation show that the proposed routing protocol can efficiently support both the construction of stable route and route lifetime in mobile ad-hoc wireless networks.

  • PDF