• Title/Summary/Keyword: signal safety

Search Result 1,133, Processing Time 0.035 seconds

Service Management Scheme using Security Identification Information adopt to Big Data Environment (빅데이터 환경에 적합한 보안 인식 정보를 이용한 서비스 관리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.393-399
    • /
    • 2013
  • Recently, the quantity and type of data that is being processed in cloud environment are varied. A method for easy access in different network in a heterogeneous environment of big data stored in the device is required. This paper propose security management method for smoothly access to big data in other network environment conjunction with attribute information between big data and user. The proposed method has a high level of safety even if user-generated random bit signal is modulated. The proposed method is sufficient to deliver any number of bits the user to share information used to secure recognition. Also, the security awareness information bit sequence generated by a third party to avoid unnecessary exposure value by passing a hash chain of the user anonymity is to be guaranteed to receive.

A Train Locating Device Using the Current Phase Difference Upon Magnetic Field Variation (자기장 변화에 따른 전류 위상차를 이용한 열차 위치검지 장치)

  • Choi, Jae Sik;Kim, Baik;Rho, Sung Chan
    • Journal of the Korean Society for Railway
    • /
    • v.15 no.6
    • /
    • pp.604-608
    • /
    • 2012
  • Traditionally, the track circuits have been used for the purpose of train locating. However, the recent train control systems like a CBTC(Communications Based Train Control) do not utilize the track circuits to minimize the amount of ground signal devices. Therefore, there are increasing concerns over the system that can locate the position of train exactly without using the track circuits. Then, the contactless locating methods are added to ensure safety when the shunting sensitivity of the track circuit becomes low for the existing sections equipped with the track circuits. In this paper, a prototype of train locating device has been designed and tested, which utilizes the current phase difference upon magnetic field variation. The results show improved features of this method over the conventional track circuits method.

Development of ABS ECU for a Bus using Hardware In-the-Loop Simulation

  • Lee, K.C.;Jeon, J.W.;Nam, T.K.;Hwang, D.H.;Kim, Y.J.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1714-1719
    • /
    • 2003
  • Antilock Brake System (ABS) is indispensable safety equipment for vehicles today. In order to develop new ABS ECU suitable for pneumatic brake system of a bus, a Hardware In-the-Loop Simulation (HILS) System was developed. In this HILS, the pneumatic brake system of a bus and antilock brake component were used as hardware. For the computer simulation, the 14-Degree of Freedom (DOF) bus dynamic model was constructed using the Matlab/Simulink software package. This model was compiled and downloaded in the simulation board, where the Power PC processor was used for real-time simulation. Additional commercial package, the ControlDesk was used to monitor the dynamic simulation results and physical signal values. This paper will focus on the procedure and results of evaluating the ECU in the HILS simulation. Two representative cases, wet basalt road and $split-{\mu}$ road, were used to simulate real road conditions. At each simulated road, the vehicle was driven and stopped under the help of the developed ECU. In each simulation, the dynamical behavior of the vehicle was monitored. After enough tests in the laboratory using HILS, the parameter-tuned ECU was equipped in a real bus, which was driven and stopped in the real test field in Korea. And finally, the experiment results of ABS equipped vehicle's dynamic behavior both in HILS test and in test fields were compared.

  • PDF

Localization of a Mobile Robot Using Ceiling Image with Identical Features (동일한 형태의 특징점을 갖는 천장 영상 이용 이동 로봇 위치추정)

  • Noh, Sung Woo;Ko, Nak Yong;Kuc, Tae Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.2
    • /
    • pp.160-167
    • /
    • 2016
  • This paper reports a localization method of a mobile robot using ceiling image. The ceiling has landmarks which are not distinguishablefrom one another. The location of every landmark in a map is given a priori while correspondence is not given between a detected landmark and a landmark in the map. Only the initial pose of the robot relative to the landmarks is given. The method uses particle filter approach for localization. Along with estimating robot pose, the method also associates a landmark in the map to a landmark detected from the ceiling image. The method is tested in an indoor environment which has circular landmarks on the ceiling. The test verifies the feasibility of the method in an environment where range data to walls or to beacons are not available or severely corrupted with noise. This method is useful for localization in a warehouse where measurement by Laser range finder and range data to beacons of RF or ultrasonic signal have large uncertainty.

Cell-SELEX Based Identification of an RNA Aptamer for Escherichia coli and Its Use in Various Detection Formats

  • Dua, Pooja;Ren, Shuo;Lee, Sang Wook;Kim, Joon-Ki;Shin, Hye-su;Jeong, OK-Chan;Kim, Soyoun;Lee, Dong-Ki
    • Molecules and Cells
    • /
    • v.39 no.11
    • /
    • pp.807-813
    • /
    • 2016
  • Escherichia coli are important indicator organisms, used routinely for the monitoring of water and food safety. For quick, sensitive and real-time detection of E. coli we developed a 2'F modified RNA aptamer Ec3, by Cell-SELEX. The 31 nucleotide truncated Ec3 demonstrated improved binding and low nano-molar affinity to E. coli. The aptamer developed by us out-performs the commercial antibody and aptamer used for E. coli detection. Ec3(31) aptamer based E. coli detection was done using three different detection formats and the assay sensitivities were determined. Conventional Ec3(31)-biotin-streptavidin magnetic separation could detect E. coli with a limit of detection of $1.3{\times}10^6CFU/ml$. Although, optical analytic technique, biolayer interferometry, did not improve the sensitivity of detection for whole cells, a very significant improvement in the detection was seen with the E. coli cell lysate ($5{\times}10^4CFU/ml$). Finally we developed Electrochemical Impedance Spectroscopy (EIS) gap capacitance biosensor that has detection limits of $2{\times}10^4CFU/mL$ of E. coli cells, without any labeling and signal amplification techniques. We believe that our developed method can step towards more complex and real sample application.

Development of Abnormal Behavior Monitoring of Structure using HHT (HHT를 이용한 이상거동 시점 추정 기법 개발)

  • Kim, Tae-Heon;Park, Ki-Tae
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.19 no.2
    • /
    • pp.92-98
    • /
    • 2015
  • Recently, buildings tend to be large size, complex shape and functional. As the size of buildings is becoming massive, the need for structural health monitoring (SHM) technique is increasing. Various SHM techniques have been studied for buildings which have different dynamic characteristics and influenced by various external loads. "Abnormal behavior point" is a moment when the structure starts vibrating abnormally and this can be detected by comparing between before and after abnormal behavior point. In other words, anomalous behavior is a sign of damage on structures and estimating the abnormal behavior point can be directly related to the safety of structure. Abnormal behavior causes damage on structures and this leads to enormous economic damage as well as damage for humans. This study proposes an estimating technique to find abnormal behavior point using Hilber-Huang Transform which is a time-frequency signal analysis technique and the proposed algorithm has been examined through laboratory tests with a bridge model using a shaking table.

Performance Analysis of a Satellite Communication System based on IPsec VPN (IPsec VPN 기반 위성 통신 시스템 성능 분석)

  • Jeong, Won-Ho;Hwang, Lan-Mi;Kim, Ki-Hong;Park, Sang-Hyun;Yang, Sang-Woon;Lim, Jeong-Seok;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.53-60
    • /
    • 2015
  • Satellite signal is excellent broadband, can provide the same information in a wide range, but there is a disadvantage that much less of the security level of the data. Therefore, supplementation of safety is a serious problem than anything in the satellite communication. In this paper, it was simulated by applying ARIA in encryption technique and by applying transport mode, tunnel mode in security header AH and ESP in order to examine the effect of IPsec VPN. In addition, we had compare with general services that do not apply encryption in order to analyze the impact of the encryption algorithm. Channel, by applying the Markov channel and adding AWGN, is constituted a satellite communication environment. In case of retransmission based error control scheme, we applied Type-II HARQ scheme and Type-III HARQ scheme which are performance is a good way in recently, and it is constituted by a turbo code and BPSK modulation scheme. we were analyzed performance in BER and Throughput in order to compare the simulation more effectively.

Impact Source Location on Composite CNG Storage Tank Using Acoustic Emission Energy Based Signal Mapping Method (음향방출 에너지 기반 손상 위치표정 기법을 이용한 복합재 CNG 탱크의 충격 신호 위치표정)

  • Han, Byeong-Hee;Yoon, Dong-Jin;Park, Chun-Soo;Lee, Young-Shin
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.36 no.5
    • /
    • pp.391-398
    • /
    • 2016
  • Acoustic emission (AE) is one of the most powerful techniques for detecting damages and identify damage location during operations. However, in case of the source location technique, there is some limitation in conventional AE technology, because it strongly depends on wave speed in the corresponding structures having heterogeneous composite materials. A compressed natural gas(CNG) pressure vessel is usually made of carbon fiber composite outside of vessel for the purpose of strengthening. In this type of composite material, locating impact damage sources exactly using conventional time arrival method is difficult. To overcome this limitation, this study applied the previously developed Contour D/B map technique to four types of CNG storage tanks to identify the source location of damages caused by external shock. The results of the identification of the source location for different types were compared.

Evaluation of In-vehicle Warning Information Modalities by Kansei Engineering (감성공학을 이용한 차내 경고정보 제공방식 평가)

  • Park, Jun-Yeong;O, Cheol;Kim, Myeong-Ju;Jang, Myeong-Sun
    • Journal of Korean Society of Transportation
    • /
    • v.28 no.3
    • /
    • pp.39-49
    • /
    • 2010
  • Provision of in-vehicle warning information is of keen interest since it can be effectively used to prevent traffic accident on the road. This study evaluates the effectiveness of information provision modalities based on kansei engineering. Various warning information scenarios using different modalities are devised for the evaluation. Statistical data analysis techniques including factor analysis, correlation analysis, and the general linear model are used to assess the user's affect for information modalities. The evaluation result shows that the provision of visual information consisted of 'text and pictogram' leads to higher understandability. The combination of beep sound and voice message' was identified as a more effective modality for auditory warning. In addition, the red color for the blinking warning signal was preferred by users.

Analysis of 27MHz Wireless Keyboard Electromagnetic Signal Using USRP and GNU Radio (USRP와 GNU Radio를 이용한 27MHz 무선 키보드 전자파 신호 분석)

  • Kim, Ho-Yeon;Sim, Bo-Yeon;Park, Ae-Sun;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.81-91
    • /
    • 2016
  • Nowadays, electronic device is in a close relationship with human life. Above all, the use of wireless electronic devices such as smart phone, tablet pc, and wireless keyboard is increasing owing to the high convenience and portability. Furthermore, according to the increasing use of sensitive personal and financial information from the electronic device, various attacks for stealing information are being reported. In this paper we do an analysis of 27MHz wireless keyboard vulnerability and set up an analysis environment. Moreover, we make an experiment and show that there are real vulnerabilities. An experimental result will be used for safety analysis and vulnerability verification of wireless electronic devices.