• 제목/요약/키워드: industrial communications

Search Result 593, Processing Time 0.032 seconds

A Study on the Mutual Coexistence between Virtual Reality Bluetooth Devices and WLAN on the Monte-Carlo (몬테카를로 기반의 가상현실 블루투스 기기와 무선랜 사이의 상호 공존 연구)

  • Yun, Hye-Ju;Yu, Chul-Hee;Kim, Byung-Duk;Jo, Young-Do
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • As a communications system and using the wireless devices is increased at the world, the interference among devices at 2.4GHz band become issue. New complex content technology as education, concert, broadcast, thema-park are developed between Virtual Reality technology and tradition. That is expect an annual growth rate of more than 14%. Almost Virtual Reality devices use motion sense or a wireless joystick. Therefore it is necessarily to analyze the coexistence between Virtual Reality devices and Wi-Fi in the ISM band. The interference scenario and propagation of the Extended Hata Model was established to analyze the interference from WLAN into Virtual Reality devices. Through simulation results based on Monte-Carlo principle, separation frequency was obtained to protect WLAN interference from Virtual Reality devices.

Plug-in BLDC Control System using DC-link Communication (DC 전력선 통신을 이용한 Plug-in형 BLDC 구동 시스템)

  • Tao, Yu;Song, Sung-Geun;Lee, Min-Jung;Kim, Kwang-Heon;Park, Sung-Jun
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.14 no.2
    • /
    • pp.105-111
    • /
    • 2009
  • The powers used in the motor drive system are mostly DC sources like batteries. Even AC powers in some systems are generated from DC sources by the inverter. It is can be forecasted that the DC-link communications will be widely used in various industrial fields. In this paper a novel BLDC motor drive system using DC-link communications is proposed. The characteristic of this system Is that the communication only needs 2 DC lines. There are not additional lines to translate the reference signals. And the reliability o3 the system is ensured especially under some terrible circumstances. The number of lines can be minimized when the DC-link communication method is applied in the multi motor control system and the slip ring design also can be simplified when this method is applied in rotation machines. The proposed motor system is clarified by the PSIM and MATLAB simulations and tested through the hardware prototype.

An Effective Method for Approximating the Euclidean Distance in High-Dimensional Space (고차원 공간에서 유클리드 거리의 효과적인 근사 방안)

  • Jeong, Seung-Do;Kim, Sang-Wook;Kim, Ki-Dong;Choi, Byung-Uk
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.5
    • /
    • pp.69-78
    • /
    • 2005
  • It is crucial to compute the Euclidean distance between two vectors efficiently in high dimensional space for multimedia information retrieval. In this paper, we propose an effective method for approximating the Euclidean distance between two high-dimensional vectors. For this approximation, a previous method, which simply employs norms of two vectors, has been proposed. This method, however, ignores the angle between two vectors in approximation, and thus suffers from large approximation errors. Our method introduces an additional vector called a reference vector for estimating the angle between the two vectors, and approximates the Euclidean distance accurately by using the estimated angle. This makes the approximation errors reduced significantly compared with the previous method. Also, we formally prove that the value approximated by our method is always smaller than the actual Euclidean distance. This implies that our method does not incur any false dismissal in multimedia information retrieval. Finally, we verify the superiority of the proposed method via performance evaluation with extensive experiments.

Development Trends of Small Satellites and Military Applications (소형위성의 개발현황 및 군사적 활용 방안)

  • Lee, Sanghyun;Oh, Jaeyo;Kwon, Kyebeom;Lee, Gil-Young;Cho, Taehwan
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.3
    • /
    • pp.213-219
    • /
    • 2017
  • Large satellite development programs might take decades to build, launch and operate in space environments at costs in excess of a billion dollars. However, small satellites can reduce the costs not only by using commercial software and sensors, but also by shortening the development period to two years or less. In this paper, we discuss the development status of small satellites, and propose some military applications of small satellites. First, we describe the industrial trends of small satellites in advanced countries such as the United States and Japan. Also, we describe the development status of small satellites in Korea. Military applications are largely classified into education, research, and operational purposes. Small satellites are developing rapidly in commercial markets and they will play an important role in military sector. Therefore, the military should consider small satellites as important strategic assets in future conflicts and provide means to develop them.

Proactive Network Optimizer for Critical Applications (크리티컬한 응용을 위한 능동형 네트워크 최적화기)

  • Park, Bongsang;Park, Pangun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.9
    • /
    • pp.1250-1256
    • /
    • 2018
  • Recently, wireless networks are becoming an important infrastructure for the critical large-scale applications such as cyber-physical systems and next generation industrial automations. However, the fundamental performance uncertainty of wireless networks may incur the serious instability problem of the overall systems. This paper proposes the proactive network optimizer to guarantee the application demands without any real-time link monitoring information of the networks. In particularly, the proposed proactive optimizer is the cross-layer approach to jointly optimize the routing path and traffic distribution in order to guarantee the performance demand within a maximum k number of link faults. Through the simulations, the proposed proactive network optimizer provides better robustness than the traditional existing reactive networks. Furthermore, the proactive network does not expose to the major weakness of the reactive networks such as the performance degradation due to the erroneous link monitoring information and the network reconfiguration cost.

Design of a Planar Antenna with Monopole-like Radiation Pattern for On-Body Communications (수직 모노폴 방사패턴을 갖는 인체표면 통신용 평면형 안테나 설계)

  • Kwon, Jaekwang;Woo, Seungmin;Tak, Jinpil;Choi, Jaehoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.4
    • /
    • pp.365-373
    • /
    • 2015
  • In this paper, a planar antenna with monopole-like radiation pattern for on-body communications is proposed. The proposed antenna consists of three split-rings(SR) to generate a monopole-like radiation characteristic. To account for the on-body application, the proposed antenna is designed to have a low-profile. The antenna has an overall dimensions of $0.29{\lambda}_0{\times}0.29{\lambda}_0{\times}0.008{\lambda}_0$ at 5.8 GHz industrial, scientific, and medical(ISM) band(5.725~5.875 GHz). To verify the body effect, a two-thirds muscle equivalent semi solid phantom is fabricated and used to measure the antenna performance. The 10-dB return loss bandwidth is 280 MHz(5.68~5.96 GHz) and the measured peak gain is 1.91 dBi.

A Study on System Tracing User Activities in the Windows Operating System (윈도우 운영체제 상의 사용자 행위 추적에 관한 연구)

  • Jung, Chang-Sung;Kim, Young-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.101-114
    • /
    • 2011
  • As it seems like critical information leakages have been increasing due to industrial espionage and malicious internal users, the importance of introducing audit and log security technology is growing every now and then. In this paper, we suggest the session logging system for the company's internal control to meet the SOX legislation level, by monitoring and analyzing users behaviors connecting to the business-critical Operating System. The system proposed in this paper aims to monitor the user's illegal activities in the Operating System, and to present the clear evidence of purpose of those activities by detailed logs. For this purpose, we modified Operating System by adding multiple services suggested in this paper. These services utilize interfaces provided by the existing Operating System and add functions to control access and get logs. The system saves and manages session logs of users or administrators connected to the server with centralized log storage. And the system supports session log searching and lookup features required by SOX legislation for the company's internal controls with the level of computer forensics and logging technology.

An Empirical Study on Evaluation of Performance Shaping Factors on AHP (AHP 기법을 이용한 수행영향인자 평가에 관한 연구)

  • Jung, Kyung-Hee;Byun, Seong-Nam;Kim, Jung-Ho;Heo, Eun-Mee;Park, Hong-Joon
    • Journal of the Ergonomics Society of Korea
    • /
    • v.30 no.1
    • /
    • pp.99-108
    • /
    • 2011
  • Almost all companies have paid much attention to the safety management ranging from maintenance to operation even at the stage of designing in order to prevent accidents, but fatal accidents continue to increase throughout the world. In particular, it is essential to systematically prevent such fatal accidents as fire, explosion or leakage of toxic gas at factories in order to not only protect the workers and neighbors but also prevent economic losses and environmental pollution. Though it is well known that accident probability is very low in NPP(Nuclear Power Plants), the reason why many researches are still being performed about the accidents is the results may be so severe. HRA is the main process to make preparation for possibility of human error in designing of the NPP. But those techniques have some problems and limitation as follows; the evaluation sensitivity of those techniques are out of date. And the evaluation of human error is not coupled with the design process. Additionally, the scope of the human error which has to be included in reliability assessment should be expanded. This work focuses on the coincidence of human error and mechanical failure for some important performance shaping factors to propose a method for improving safety effectively of the process industries. In order to apply in these purposes into the thesis, I found 63 critical Performance Shaping Factors of the eight dimensions throughout studies that I executed earlier. In this study, various analysis of opinion of specialists(Personal Factors, Training, Knowledge or Experience, Procedures and Documentation, Information, Communications, HMI, Workplace Design, Quality of Environment, Team Factors) and the guideline for construction of PSF were accomplished. The selected method was AHP which simplifies objective conclusions by maintaining consistency. This research focused on the implementation process of PSF to evaluate the process of PSF at each phase. As a result, we propose an evaluation model of PSF as a tool to find critical problem at each phase and improve on how to resolve the problems found at each phase. This evaluation model makes it possible to extraction of PSF succesfully by presenting the basis of assessment which will be used by enterprises to minimize the trial and error of construction process of PSF.

A Study on the 4th Industrial Revolution and Intelligent Government Operating Strategy -In Terms of Block Chain Introduction Plans of Electronic Government- (제4차 산업혁명과 지능형 정부 운용전략에 대한 연구 -블록체인 기술의 전자정부 도입방안 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • In terms of realizing the future e-government such as intelligent government, this paper attempts to provide an earnest and insightful reflection and suggests desirable strategies with regard to the four different crucial elements including electronic voting, electronic contract, resident registration/electronic document management, and real-estate registration as an operating strategy of intelligent government and the fourth industrial revolution regarding. The 4th industrial revolution is aimed at concentrating information or data characterized with sharing, opening, communicating and releasing in cloud computing system, analyzing big data, collecting information, and flourishing people's well-being by information and communications technology with utilizing the smart devices. Therefore, reliability of the pivotal information or data is critical and it is important for the participants being transparently shared, without the data or information being forged. In this respect, introduction or application of block chain technology is essential. This paper will review preceding studies, discuss the aspect of the 4th industrial revolution and intelligent government, then suggest operating strategies in the field of electronic voting, electronic contract, management of resident registration and electronic document and real-estate registration.

Design of Secure Scheme based on Bio-information Optimized for Car-sharing Cloud (카 쉐어링 클라우드 환경에서 최적화된 바이오 정보 기반 보안 기법 설계)

  • Lee, Kwang-Hyoung;Park, Sang-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.469-478
    • /
    • 2019
  • Car-sharing services have been settled on as a new type of public transportation owing to their enhanced convenience, expanded awareness of practical consumption patterns, the inspiration for environmental conscientiousness, and the diffusion of smart phones following the economic crisis. With development of the market, many people have started using such services. However, security is still an issue. Damage is expected since IDs and passwords are required for log-in when renting and controlling the vehicles. The protocol suggested in this study uses bio-information, providing an optimized service, and convenient (but strong) authentication with various service-provider clouds registering car big data about users through brokers. If using the techniques suggested here, it is feasible to reduce the exposure of the bio-information, and to receive service from multiple service-provider clouds through one particular broker. In addition, the proposed protocol reduces public key operations and session key storage by 20% on mobile devices, compared to existing car-sharing platforms, and because it provides convenient, but strong, authentication (and therefore constitutes a secure channel), it is possible to proceed with secure communications. It is anticipated that the techniques suggested in this study will enhance secure communications and user convenience in the future car-sharing-service cloud environment.