• Title/Summary/Keyword: leave system

Search Result 283, Processing Time 0.023 seconds

Tag Trajectory Generation Scheme for RFID Tag Tracing in Ubiquitous Computing (유비쿼터스 컴퓨팅에서 RFID 태그 추적을 위한 태그 궤적 생성 기법)

  • Kim, Jong-Wan;Oh, Duk-Shin;Kim, Kee-Cheon
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.1-10
    • /
    • 2009
  • One of major purposes of a RFID system is to track moving objects using tags attached to the objects. Because a tagged object has both location and time information expressed as the location of the reader, we can index the trajectory of the object like existing spatiotemporal objects. More efficient tracking may be possible if a spatiotemporal trajectory can be formed of a tag, but there has not been much research on tag trajectory indexes. A characteristic that distinguishes tags from existing spatiotemporal objects is that a tag creates a separate trajectory in each reader by entering and then leaving the reader. As a result, there is a trajectory interruption interval between readers, in which the tag cannot be located, and this makes it difficult to track the tag. In addition, the point tags that only enter and don't leave readers do not create trajectories, so cannot be tracked. To solve this problem, we propose a tag trajectory index called TR-tree (tag trajectory R-tree in RFID system) that can track a tag by combining separate trajectories among readers into one trajectory. The results show that TR-tree, which overcomes the trajectory interruption superior performance than TPIR-tree and R-tree.

Design and Research for Intelligent Typhoon Evasion System for Ships

  • Wang, Jing-Quan;He, Yi;Shi, Ping-An;Peng, Xiao-Hong;Xu, Zu-Yuan;Qin, Shan-Ci;Li, Qing-Lie;Ding, Bing-Lin
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2001.10a
    • /
    • pp.177-186
    • /
    • 2001
  • Based upon the previous experiences and typical oases of typhoon evasion fur ships as well as tile achievement in scientific research in this detrain, we developed the Intelligent Typhoon Evasion System for Ships. It consists of five subsystems, including electronic charts, ship movement management, typhoon information query and automatic plotting, real-time calculation of ship-typhoon situation, intelligent typhoon evasion decision making. With the synthetical application of analogy theory, synoptic chart, satellite cloud picture analysis, typhoon digital forecast and other relevant technologies, we leave established the typhoon evasion data bases. model bases and knowledge bases, which make it possible to automatically track the ships and typhoon paths. The system can realize ship-typhoon situation analysis, risk levee assessment, typhoon paths correction and course synoptic forecast, and intelligent typhoon evasion decision making.

  • PDF

A Study on System Engineering of Light Rail Transit Private Investment Projects (경량전철 민간투자사업의 시스템엔지니어링 연구)

  • Cha, Gi-Ho;Park, Jin-Jae;Lee, Jae-Hyeong;Chu, Dong-Su
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.517-544
    • /
    • 2011
  • Promote competition in local government and the construction of a subway construction in the vicious cycle of debt due to the operating deficit as a greater burden on local finances was leave. This government policy of public transport in the center of the metro construction costs affordable and to respond appropriately to public transport demand new transit LRT(Light rail Transit) by introducing the current Busan was the opening of Line 4, yongin line, Busan - Gimhae line, parliamentary and barge construction or ready for the opening. What is light rail, compared to the existing subway and cheaper construction cost, the existing road or bridge that runs along the track is installed, etc. Manless system construction cost and operating expenses as a possible new railway transportation has been a leading state-of-the-art mad. However, the domestic business system engineering of light rail-related companies in the developed countries are doing to advance to the national to the local engineering skills of the self-free, hurry will have to be secured. Therefore, this paper applies local light rail project on the status of the systems engineering analysis and based on this source of the latest engineering technology-intensive systems engineering to provide direction to the development of technology.

  • PDF

Implementation of an RFID Key Management System for DASH7

  • Vegendla, Aparna;Seo, Hwajeong;Lee, Donggeon;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.19-25
    • /
    • 2014
  • The wireless sensor networking standard DASH7 operates in low-power communication with a better transmission quality in active RFID networks. The DASH7 security standard supports public key cryptography. At present, the DASH7 standard uses the message authentication code in the network layer for authentication and integrity. However, its security standard is still in an incubation stage with respect to the implementation of a crypto exchange over a DASH7 network. Effective key management is an important factor for privacy and security. If organizations are not careful about where and how keys are stored, they leave the encrypted data vulnerable to theft. In this regard, we present a key management system designed for efficient key management through public key infrastructure authentication as well as a non-repudiation feature for the DASH7 standard. We analyze the performance of the proposed system on a basis of various performance criteria such as latency and throughput.

Finite element analysis of vehicle-bridge interaction by an iterative method

  • Jo, Ji-Seong;Jung, Hyung-Jo;Kim, Hongjin
    • Structural Engineering and Mechanics
    • /
    • v.30 no.2
    • /
    • pp.165-176
    • /
    • 2008
  • In this paper, a new iterative method for solving vehicle-bridge interaction problems is proposed. Iterative methods have advantages over the non-iterative methods in that it is not necessary to update the system matrix for a given wheel location, and the method can be applied for a new type of car or bridge with few or no modifications. In the proposed method, the necessity of system matrices update is eliminated using the equivalent interaction force acting on the bridge, which is obtained iteratively. Ballast stiffness is included in the interaction forces and the geometric compatibility at the contact points are used as convergence criteria. The bridge is considered as an elastic Bernoulli-Euler beam with surface irregularity and ballast stiffness. The moving vehicle is modeled as a multi-axle mass-spring-damper system having many degrees of freedom depending on the number of axles. The pitching effect, which is the interaction effect between the rear and front wheels when a vehicle begins to enter or leave the bridge, is also considered in the formulation including extended ground boundaries having surface irregularity and ballast stiffness. The applicability of the proposed method is illustrated in the numerical studies.

Study on Survey and Improvement Approaches on Basic Mathematics Ability of Engineering College Students (공과대학생의 수학 기초능력에 대한 실태 조사 및 개선 방안에 관한 연구)

  • Kim, Jong Hwa;Cho, Sung Eui
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.111-118
    • /
    • 2013
  • Today, universities in Korea give a great effort to complement basic college scholastic ability of freshman. Maybe it could be unnecessary effort from university. However, we cannot just leave students who have poor academic performance about 10 to 30% in a university. Universities have to prepare to solve this problem. Thus government and universities investigate a lot of efforts but there is no guarantee. As a result, e-learning could be the best solution to complement poor academic performance of freshman and it also could be the best way to reduce financial burden of university. So, many universities introduce e-learning system and they also support professors to make e-learning content. We need to promote content usage and to improve overall operations. In this paper, we discuss poor academic performance problems under the current middle and high school education systems and review approaches to solve these problems. From this analysis, we propose the design of an effective e-learning system and a method of operation to complement students who achieve poor academic performance.

Modeling Variation in Residence Time Response to Freshwater Discharge in Gangjin Bay, Korea (남해 강진만 담수유입에 따른 체류시간 변화 모델링)

  • Kim, Jin Ho;Park, Sung-Eun;Lee, Won-Chan
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.54 no.4
    • /
    • pp.480-488
    • /
    • 2021
  • The term residence time is defined as the time taken for substances in a system to leave the system and is a useful concept to explain the physical environment characteristics of a coastal area. It is important to know the spatial characteristics of the residence time to understand the behavioral properties of pollutants generated in a marine system. In this study, the spatial distribution of average residence time was calculated for Gangjin Bay, Korea, using a hydrodynamic model including a particle tracking module. The results showed that the average residence time was about 10 days at the surface layer and about 20 days at the bottom layer. Spatially, this was the longest residence time in the southwestern sea. There was no significant difference in average residence time at the surface layer due to freshwater discharge, but spatial variation at the bottom layer was larger. The average residence time at the bottom layer decreased in the southwestern area due to freshwater discharge and increased in the northern area. This result suggests that the residence time of anthropogenic pollutants may have a large spatial difference depending on the freshwater discharge, and thus the time taken to influence cultured organisms may also vary.

Implementation and Design of Smart Reading Room Desk using IoT (IoT를 활용한 스마트 독서실 책상의 설계 및 구현)

  • Ha, Hye-Ju;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.71-76
    • /
    • 2020
  • Recently, the market of private study room continues to grow due to increased usage of private study room. However, old study room operators often have problems with cleanliness and theft, and cannot handle them in real time. Also, there is a problem of wasting power since users usually leave their desk for a long time with the lights on. Thus, in this paper, we intended to design a service which can prevent theft, clean up the user's desk, and adjust lighting system according to the user's condition based on Arduino system. Also, we tried to design a system which sends notifications from information of android-based IoT(Internet of Things), to the terminal when other people approach to the user's desk or try to steal user's item.

A Novel Active User Identification Method for Space based Constellation Network

  • Kenan, Zhang;Xingqian, Li;Kai, Ding;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.212-216
    • /
    • 2022
  • Space based constellation network is a kind of ad hoc network in which users are self-organized without center node. In space based constellation network, users are allowed to enter or leave the network at any given time. Thus, the number of active users is an unknown and time-varying parameter, and the performance of the network depends on how accurately this parameter is estimated. The so-called problem of active user identification, which consists of determining the number and identities of users transmitting in space based constellation network is discussed and a novel active user identification method is proposed in this paper. Active user identification code generated by transmitter address code and receiver address code is used to spread spectrum. Subspace-based method is used to process received signal and judgment model is established to identify active users according to the processing results. The proposed method is simulated under AWGN channel, Rician channel and Rayleigh channel respectively. Numerical results indicate that the proposed method obtains at least 1.16dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

A Maximum A Posterior Probability based Multiuser Detection Method in Space based Constellation Network

  • Kenan, Zhang;Xingqian, Li;Kai, Ding;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.51-56
    • /
    • 2022
  • In space based constellation network, users are allowed to enter or leave the network arbitrarily. Hence, the number, identities and transmitted data of active users vary with time and have considerable impacts on the receiver's performance. The so-called problem of multiuser detection means identifying the identity of each active user and detecting the data transmitted by each active user. Traditional methods assume that the number of active users is equal to the maximum number of users that the network can hold. The model of traditional methods are simple and the performance are suboptimal. In this paper a Maximum A Posteriori Probability (MAP) based multiuser detection method is proposed. The proposed method models the activity state of users as Markov chain and transforms multiuser detection into searching optimal path in grid map with BCJR algorithm. Simulation results indicate that the proposed method obtains 2.6dB and 1dB Eb/N0 gains respectively when activity detection error rate and symbol error rate reach 10-3, comparing with reference methods.