• Title/Summary/Keyword: heterogeneous devices

Search Result 361, Processing Time 0.019 seconds

Implementation of AESA Radar Integration Analysis System by using Heterogeneous Media

  • Min-Jung Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.3
    • /
    • pp.117-125
    • /
    • 2024
  • In this paper, implement and propose an Active Electronically Scanned Array (AESA) radar integration analysis system which specialized for radar development by using heterogeneous media. Most analysis systems are used to analyze and improve the cause of defects, so they help the test easier. However, previous log analysis systems that operate only based on text are not intuitive and difficult to find the information user want at once if there is a lot of log information. so when an equipment defect occurs, there are limitations in analyzing the cause of defect. Therefore, the analysis system in this paper utilizes heterogeneous media. The media defined in this paper refers to recording text-based data, displaying data as image or video and visualizing data. The proposed analysis system classifies and stores data that transmitted and received between radar devices, radar target detection and Tracking algorithm data, etc. also displays and visualizes radar operation results and equipment defect information in real time. With this analysis system, it can quickly provide information what user want and assistance in developing high quality radar.

Design and Implementation of a Fault-Tolerant Caching System for Dynamic Heterogeneous Cache Server Networks (동적 이기종 캐시 서버 네트워크에서의 내결함성 캐싱 시스템 설계 및 구현)

  • Hyeon-Gi Kim;Gyu-Sik Ham;Jin-Woo Kim;Soo-Young Jang;Chang-Beom Choi
    • Journal of IKEEE
    • /
    • v.28 no.3
    • /
    • pp.458-464
    • /
    • 2024
  • This study proposes a fault-tolerant caching system to address the issue of caching content imbalance caused by the dynamic departure and participation of cache servers in a heterogeneous cache server network, and validates it in both real and virtual environments. With the increase of large-scale media content requiring various types and resolutions, the necessity of cache servers as key components to reduce response time to user requests and alleviate network load has been growing. In particular, research on heterogeneous cache server networks utilizing edge computing and low-power devices has been actively conducted recently. However, in such environments, the irregular departure and participation of cache servers can occur frequently, leading to content imbalance among the cache servers deployed in the network, which can degrade the performance of the cache server network. The fault-tolerant caching algorithm proposed in this study ensures stable service quality by maintaining balance among media contents even when cache servers depart. Experimental results confirmed that the proposed algorithm effectively maintains content distribution despite the departure of cache servers. Additionally, we built a network composed of seven heterogeneous cache servers to verify the practicality of the proposed caching system and demonstrated its performance and scalability through a large-scale cache server network in a virtual environment.

Small-cell Resource Partitioning Allocation for Machine-Type Communications in 5G HetNets (5G 이기종 네트워크 환경에서 머신타입통신을 위한 스몰셀 자원 분리 할당 방법)

  • Ilhak Ban;Se-Jin Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.1-7
    • /
    • 2023
  • This paper proposes a small cell resource partitioning allocation method to solve interference to machine type communication devices (MTCD) and improve performance in 5G heterogeneous networks (HetNet) where macro base station (MBS) and many small cell base stations (SBS) are overlaid. In the 5G HetNet, since various types of MTCDs generate data traffic, the load on the MBS increases. Therefore, in order to reduce the MBS load, a cell range expansion (CRE) method is applied in which a bias value is added to the received signal strength from the SBS and MTCDs satisfying the condition is connected to the SBS. More MTCDs connecting to the SBS through the CRE will reduce the load on the MBS, but performance of MTCDs will degrade due to interference, so a method to solve this problem is needed. The proposed small cell resource partitioning allocation method allocates resources with less interference from the MBS to mitigate interference of MTCDs newly added in the SBS with CRE, and improve the overall MTCD performace using separating resources according to the performance of existing MTCDs in the SBS. Through simulation results, the proposed small cell resource partitioning allocation method shows performance improvement of 21% and 126% in MTCDs capacity connected to MBS and SBS respectively, compared to the existing resource allocation methods.

Prediction of Crack Distribution for the Deck and Girder of Single-Span and Multi-Span PSC-I Bridges (단경간 및 다경간 PSC-I 교량의 바닥판 및 거더의 균열분포 예측)

  • Hyun-Jin Jung;Hyojoon An;Jaehwan Kim;Kitae Park;Jong-Han Lee
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.27 no.6
    • /
    • pp.102-110
    • /
    • 2023
  • PSC-I girder bridges constitute the largest proportion among highway bridges in Korea. According to the precision safety diagnosis data for the past 10 years, approximately 41.3% of the PSC-I bridges have been graded as C. Furthermore, with the increase in the aging of bridges, preemptive management is becoming more important. Damage and deterioration to the deck and girder with a long replacement cylce can have considerable impacts on the service and deterioration of a bridge. In addition, the high rate of device damages, including expansion joints and bearings, necessitates an investigation into the influence of the device damage in the structural members of the bridge. Therefore, this study defined representative PSC-I girder bridges with single and multiple spans to evaluate heterogeneous damages that incorporate the damage of the bridge member and device with the deterioration of the deck. The heterogeneous damages increased a crack area ratio compared to the individual single damage. For the single-span bridge, the occurrence of bearing damage leads to the spread of crack distribution in the girder, and in the case of multi-span bridges, expansion joint damage leads to the spread of crack distribution in the deck. The research underscores that bridge devices, when damaged, can cause subsequent secondary damage due to improper repair and replacement, which emphasizes the need for continuous observation and responsive action to the damages of the main devices.

Development of Electron-Beam Lithography Process Simulation Tool of the T-shaped Gate Formation for the Manufacturing and Development of the Millimeter-wave HEMT Devices (밀리미터파용 HEMT 소자 개발 및 제작을 위한 T-게이트 형성 전자빔 리소그래피 공정 모의 실험기 개발)

  • 손명식;김성찬;신동훈;이진구;황호정
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.5
    • /
    • pp.23-36
    • /
    • 2004
  • A computationally efficient and accurate Monte Carlo (MC) simulator of electron beam lithography process has been developed for sub-0.l${\mu}{\textrm}{m}$ T-shaped gate formation in the HEMT devices for millimeter-wave frequencies. For the exposure process by electron to we newly and efficiently modeled the inner-shell electron scattering and its discrete energy loss with an incident electron for multi-layer resists and heterogeneous multi-layer targets in the MC simulation. In order to form the T-gate shape in resist layers, we usually use the different developer for each resist layer to obtain good reproducibility in the fabrication of HEMT devices. To model accurately the real fabrication process of electron beam lithography, we have applied the different developers in trilayer resist system By using this model we have simulated and analyzed 0.l${\mu}{\textrm}{m}$ T-gate fabrication process in the HEMT devices, and showed our simulation results with the SEM observations of the T-shaped gate process.

Efficient Packet Transmission Utilizing Vertical Handover in IoT Environment (IoT 환경에서 수직 핸드오버를 활용한 효율적인 패킷 전송)

  • Ju, Hyunwoo;Yoo, Younghwan
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.807-816
    • /
    • 2015
  • The Internet of Things (IoT) has recently been showered with much attention worldwide. Various kinds of devices, communicating with each other in the IoT, demand multiple communication technologies to coexist. In this environment, mobile devices may utilize the vertical handover between different wireless radio interfaces such as Wi-Fi and Bluetooth, for efficient data transfer. In this paper, an IoT broker is implemented to support the vertical handover, which can also support and manage heterogeneous devices and communication interfaces. The handover is activated based on RSSI, Link Quality values, and real time traffic. The experimental results show that the proposed handover system substantially improves QoS in Bluetooth and reduces power consumption in mobile devices as compared with a system using only Wi-Fi.

EAP-AKA Authentication without UICC for Interworking Authentication in Heterogeneous Wireless Networks (이질적인 무선 네트워크 환경에서 인증 연동을 위한 비 UICC 방식의 EAP-AKA 인증)

  • Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.168-177
    • /
    • 2009
  • This paper proposes the EAP-AKA scheme without UICC for extending its usage to existing WLAN/WiBro devices. To apply the current EAP-AKA scheme, the WLAN/WiBro devices require an external Universal Integrated Circuit Card (UICC) reader. If they don't use UICC due to cost overhead and architectural problem of device, the EAP-AKA scheme loses its own advantages in security and portability aspects. The proposed scheme uses the DH key algorithm and a password for non-UICC devices instead of using the long-term key stored in UICC. The main contribution is to maintain the security and portability of the EAP-AKA while being applied to non-3GPP network devices not equipped with UICC. Furthermore, it does not require major modifications of authentication architecture in 3GPP.

A Framework for Provisioning Internet of Things Context-aware Services (사물인터넷 기반의 상황인지 서비스를 위한 프레임워크 설계)

  • Cheun, Du Wan
    • Journal of Service Research and Studies
    • /
    • v.2 no.2
    • /
    • pp.91-98
    • /
    • 2012
  • The emergence of new types of embedded computing devices and developments in wireless networking are broadening the domain of computing from the work place and home office to other facets of everyday life. This trend is expected to lead to a proliferation of Internet of Things (IoT) environments, in which inexpensive and interconnected computing devices are capable of supporting users in a range of tasks. Context-aware computing is a key source to develop such smart services. However, there are many challenges to enable services to be smart; Heterogeneous Computing Environments, Resource Limitations, Large Amount of Data Produced, and Different Requirements for Context Interpretation. Because of these challenges, there are difficulties in providing smart service by utilizing IoT devices. Currently, many researchers are conducting researches on mobile-computing based smart service development and provisioning and network infrastructure for interconnected IoT devices. Still, there are some limitations on developing core technologies for IoT computing based smart service development. In order to remedy this situation, this thesis presents a reusable framework that provides unique and noble features which are required in developing advanced context-aware IoT applications.

  • PDF

Probability-based Deep Learning Clustering Model for the Collection of IoT Information (IoT 정보 수집을 위한 확률 기반의 딥러닝 클러스터링 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.189-194
    • /
    • 2020
  • Recently, various clustering techniques have been studied to efficiently handle data generated by heterogeneous IoT devices. However, existing clustering techniques are not suitable for mobile IoT devices because they focus on statically dividing networks. This paper proposes a probabilistic deep learning-based dynamic clustering model for collecting and analyzing information on IoT devices using edge networks. The proposed model establishes a subnet by applying the frequency of the attribute values collected probabilistically to deep learning. The established subnets are used to group information extracted from seeds into hierarchical structures and improve the speed and accuracy of dynamic clustering for IoT devices. The performance evaluation results showed that the proposed model had an average 13.8 percent improvement in data processing time compared to the existing model, and the server's overhead was 10.5 percent lower on average than the existing model. The accuracy of extracting IoT information from servers has improved by 8.7% on average from previous models.

Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things (사물 인터넷 환경에서 경량화 장치 간 상호 인증 및 세션키 합의 기술)

  • Park, Jiye;Shin, Saemi;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.707-714
    • /
    • 2013
  • IoT, which can be regarded as an enhanced version of M2M communication technology, was proposed to realize intelligent thing to thing communications by utilizing Internet connectivity. Things in IoT are generally heterogeneous and resource constrained. Also such things are connected with each other over LLN(low power and lossy Network). Confidentiality, mutual authentication and message origin authentication are required to make a secure service in IoT. Security protocols used in traditional IP Networks cannot be directly adopted to resource constrained devices in IoT. Under the respect, a IETF standard group proposes to use lightweight version of DTLS protocol for supporting security services in IoT environments. However, the protocol can not cover up all of very constrained devices. To solve the problem, we propose a scheme which tends to support mutual authentication and session key agreement between devices that contain only a single crypto primitive module such as hash function or cipher function because of resource constrained property. The proposed scheme enhances performance by pre-computing a session key and is able to defend various attacks.