• Title/Summary/Keyword: (n, k)-way 시스템

Search Result 91, Processing Time 0.026 seconds

XML Based Heterogeneous Sensory Data Management System (XML 기반의이기종 센서 데이터 관리 시스템)

  • Nawaz, Waqas;Fahim, Muhammad;Lee, Sung-Young;Lee, Young-Koo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06b
    • /
    • pp.305-306
    • /
    • 2011
  • The Wireless sensor networks (WSN) continuously generates large volumes of raw data which own natural heterogeneity. These networks are normally application specific with no sharing or reusability of sensor data among applications. In order for applications and services to be developed independently of particular network, sensor data need to be available in more standardized form. In this paper, we propose Architecture for Sensory data management. This Extensible Markup Language (XML) oriented architecture allows the sensor data to be understood and processed in a meaningful way by a variety of applications with different purposes. We developed a middle layer which performs transformation on raw sensory data to XML and vice versa.

The Effect of the Telemedicine Service System Application for the Patients with Hypertension at Community Health Practitioner Posts in Gangwon Province (강원도 보건진료소 고혈압 환자의 원격관리시스템 적용 효과)

  • Kwon, Myung Soon;Noh, Ghee-Young;Choi, Jounghwa
    • Korean Journal of Health Education and Promotion
    • /
    • v.31 no.2
    • /
    • pp.55-64
    • /
    • 2014
  • Objectives: This study is to identify the effects of utilizing a telemedicine service system on patients with hypertension at home in rural areas. Methods: The study was designed to be a retrospective case-control study. The subjects of this study were 152patients with hypertension who were managed by community health practitioner posts; using telemedicine service system group (n=76), usual care group (n=76). The data was collected through EMR (electric medical record) from September to December, 2013, and analyzed by descriptive statistics of $x^2$/t-test and ANCOVA. Results: The analysis showed that telemedicine service system was an effective way to deal with body weight (F=4.723, p=.031) and BMI (F=5.225, p=.024). Conclusions: This study provides evidence for utilizing the telemedicine service system based on information technology as intervention method in the hypertension management.

Specification and Analysis of Key Recovery System using ECTPN (ECTPN을 이용한 키복구 시스템의 명세 및 분석)

  • Go, Jeong-Ho;Gang, Sang-Seung;Jeon, Eun-A;Lee, Gang-Su
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1874-1885
    • /
    • 2000
  • When a receiver of ciphertext message can not decrypt a message because he has lost his private-key, the private-key of receiver and session-key of the message should be recovered. In this paper, we developed an Encapsulation based Key Recovery System (EKRS). EKRS is a new key encapsulation based key recovery system which is characterized by secretly choice of KRA, randomized target keys. n-way recovery type, and useful for commercial key recovery. EKRS is formally specified by a pictorial model, an Extended Cryptographic Timed Petri Net (ECTPN). Secure information flow and reachability of a session-key are verified by using reachability graph of ECTPN. EKRS, executing over a Public Key Infrastructure, can be used as a security solution in Web based applications such as CALS, EC an EDI.

  • PDF

Study of Image Transmission System Using Image Segmentation (영상 분할을 이용한 영상 전송 시스템에 대한 연구)

  • Kim, Youngseop;Park, Inho;Lee, Yonghwan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.15 no.1
    • /
    • pp.33-35
    • /
    • 2016
  • This paper proposes a method utilizing image compression and transmission method for image segmentation in order to reduce the time required in the process of analyzing the image information that has in the image compression process. Many studies of existing with respect to the image segmentation are being studied as a way to split a lot of a particular part in the image. We divide full image into the N equal parts. And it is compressed using the field coding. This will reduce the time-consuming than using the conventional method.

Analysis of Noise Effects in Data Acquisition of Multi-Axis Force/Torque Sensors

  • Kang, Chul-Goo;Kim, Yong-Chan;Park, Chol-Ho;Nam, Hyun-Do
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1254-1258
    • /
    • 2003
  • One of the major factors that effect sensor performance is analog noise that added in a sensor signal such as voltage. In multi-axis force sensors, error sources may be classified mainly in two groups. One is structural error due to inaccuracy of sensor body. The other error source is noise signals existing in the sensed information. This paper presents a brief review about the principle of multi-axis force sensors, and then proposes a method that can reduce the effect of noise signal to sensor performance. The method is to convert analog voltage signal to digital numbers near sensor body and then to read these digital signals and conduct signal processing in the computer. By this way, we can eliminate a bad effect of electromagnetic wave emitted from computer and of 60 Hz noise emitted from AC source. The proposed method is investigated through experimental demonstration. The experimental results show that it improves S/N ratio of the sensor about 40 times in our experimental setup.

  • PDF

The extension of marine lantern protocol for Dual LED marine lantern control system (이중 LED 등명기 제어 시스템을 위한 확장된 해상 등명기 프로토콜)

  • Ye, Seong-Hyeon;Kim, Bum-Khon;Park, Jeong-Seon;Han, Soonhee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.2
    • /
    • pp.445-451
    • /
    • 2014
  • Dual LED lantern, which is composed of two light sources in one lantern, can be utilized as an auxiliary light source when the main light source is in trouble. Nevertheless, there are no way to obtain status information of the system and control the light source if the current domestic standard protocol is applied, since the standards for dual LED lantern are not defined yet. Regarding to this problem, we suggested expanded lantern protocol for management system of dual LED lantern based on current domestic standard. Also, we confirmed the normal operation of dual LED lantern after implementing suggested protocol on the developed management system. Control system suggested and implemented in this study is tested not only its function of controlling and acquiring the operating status of dual LED lantern, but also its capability to utilize as a control system of currently used LED lanterns.

A CPU-GPGPU Based Multithread File Chunking System (CPU-GPGPU 를 기반으로 멀티스레드 파일청킹 시스템)

  • Tang, Zhi;Won, You-Jip
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06b
    • /
    • pp.336-337
    • /
    • 2011
  • The popularity of general purpose GPU(GPGPU)makes the CPU-GPGPU heterogeneous architecture normal. Therefore, tradeoff the usage of CPU and GPGPU becomes a way to improve performance of programs. In this work, we exploit the properties of the CPU-GPGPU heterogeneous architecture and use them to accelerate the content based chunking operation of deduplication. We built a prototype system which is able to coordinate CPU and GPGPU to chunk file and has been proven to have a better performance compared to using either CPU or GPGPU alone.

Zigzag Gait Planning of n Quadruped Walking Robot Using Geometric Search Method (기하학적 탐색을 이용한 4각 보행로봇의 지그재그 걸음새 계획)

  • Park, Se-Hoon;Lee, Seung-Ha;Lee, Yun-Jung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.2
    • /
    • pp.142-150
    • /
    • 2002
  • This paper presents a systematic method of the zigzag gait planning for quadruped walking robots. When a robot walks with a zigzag gait, its body is allowed to move from side to side, while the body movement is restricted along a moving direction in conventional continuous gaits. The zigzag movement of the body is effective to improve the gait stability margin. To plan a zigzag gait in a systematic way, the relationship between the center of gravity(COG) and the stability margin is firstly investigated. Then, new geometrical method is introduced to plan a sequence of the body movement which guarantees a maximum stability margin as well as monotonicity along a moving direction. Finally, an optimal swing-leg sequence is chosen for a given arbitrary configuration of the robot. To verify the proposed method, computer simulations have been performed for both cases of a periodic gait and a non-periodic gait.

Hierarchically Encoded Multimedia-data Management System for Over The Top Service (OTT 서비스를 위한 계층적 부호화 기반 멀티미디어 데이터 관리 시스템)

  • Lee, Taehoon;Jung, Kidong
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.723-733
    • /
    • 2015
  • The OTT service that provides multimedia video has spread over the Internet for terminals with a variety of resolutions. The terminals are in communication via a networks such as 3G, LTE, VDSL, ADSL. The service of the network has been increased for a variety of terminals giving rise to the need for a new way of encoding multimedia is increasing. SVC is an encoding technique optimized for OTT services. We proposed an efficient multimedia management system for the SVC encoded multimedia data. The I/O trace was generated using a zipf distribution, and were comparatively evaluated for performance with the existing system.

Meta-Modeling to Detect Attack Behavior for Security (보안을 위한 공격 행위 감지 메타-모델링)

  • On, Jinho;Choe, Yeongbok;Lee, Moonkun
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1035-1049
    • /
    • 2014
  • This paper presents a new method to detect attack patterns in security-critical systems, based on a new notion of Behavior Ontology. Generally security-critical systems are large and complex, and they are subject to be attacked in every possible way. Therefore it is very complicated to detect various attacks through a semantic structure designed to detect such attacks. This paper handles the complication with Behavior Ontology, where patterns of attacks in the systems are defined as a sequences of actions on the class ontology of the systems. We define the patterns of attacks as sequences of actions, and the attack patterns can then be abstracted in a hierarchical order, forming a lattice, based on the inclusion relations. Once the behavior ontology for the attack patterns is defined, the attacks in the target systems can be detected both semantically and hierarchically in the ontology structure. When compared to other attack models, the behavior ontology analysis proposed in this paper is found to be very effective and efficient in terms of time and space.