• Title/Summary/Keyword: 메시지 시스템

Search Result 2,106, Processing Time 0.03 seconds

Handover Delay Stability Method for Train Control on LTE Railway System (LTE-R 시스템에서 열차제어를 위한 핸드오버 지연 안정화 방안)

  • Oh, Sang-Chul;Yoon, Byung-Sik;Lee, Sook-Jin;Choi, Min-Suk;Kim, Dong-Joon;Sung, Dong-il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.12
    • /
    • pp.1646-1653
    • /
    • 2020
  • In case that the train driving with diverse high-speeds is manipulates by real-time remote control in long-term evolution-railway (LTE-R) system with frequent handovers, the real-time safe transmission of train control messages is important element. The handover delay time stability method regardless of train speed in order to enhance the real-time remote train control stability in LTE-R system is proposed in the paper. Furthermore, the variable speeds and altitudes of train collected by real measurements are applied for upgrading simulation accuracy. The simulation results inform that not only there are stable and unstable ranges to A3 offset values, but the optimal offset value for average handover delay is in unstable range. However, the late handover with A3 offset values in stable range should be chosen to get the predictable handover delay regardless of train speed rather than the early handover with A3 offset values in unstable range, since the key value of high-speed Korea railway system is the stability.

Cinematic Circulation of Meta-verse and Meta-physics (메타버스와 메타피직스의 영화적 순환)

  • Shim, Kwang-hyun
    • Trans-
    • /
    • v.12
    • /
    • pp.81-106
    • /
    • 2022
  • The possibility of metaverse system to be a catalyst for hyper-connected society will be dependent on the speed of connected technological development and its social utilization in the same manner as AI technology. Putting these technical realization processes in brackets, this paper focus on some philosophical-political issues in connection with cognitive-ecological changes in the future cinema which will be influenced by the complexive techno-socio couples of accelerated development of metaverse system. Generally speaking, essence of metaverse system seems to be the degree of immersion by technical accuracy, but is not true. In perspective of cognitive-ecology, flow degree of a picture or photograph is relied not on 'accuracy of representation' but on its message's contextual link-up. In this aspect, real potentiality of metaverse system shall be understood in the context of cognitive-ecological changes of human brain's multi-intelligence networking abilities(intersection of augmentation-simulation and outside-inside) which will be activated in the new structure of natural-social-technological coupling of metaverse system. These cognitive-ecological potentialities have been partially actualized in the cinematic process of tripod mimesis for the longest time, [real contradiction/conflicts (Mimesis-1) -->fictional solutions of cinema (Mimesis-2) --> selective interpretation of spectator's wish fulfillment (Mimesis-3) --> real change (Mimesis-1')]. Therefore metaverse's real potentiality must be considered to be dependent on the possibility of deepening and extending of cinematic circulation between real seperation/problems and ideal connection/solutions. In this context, advanced metaverse system can be compared as a modern technical version of ideal circulation of physics and metaphysics

A Study on the Development of Urban Roads Convoy Driving Service and Effect Analysis (도시부 도로 호송주행(Convoy Driving) 서비스 개발 및 효과분석)

  • Son, Seung-neo;Lee, Ji-yeon;Cho, Yong-sung;Park, Ji-hyeok;So, Jae-hyun(Jason)
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.1
    • /
    • pp.51-63
    • /
    • 2022
  • Convoy driving is one of the technologies of multi-vehicle cooperation driving along with platoon driving. All over the world, research on vehicle control mechanisms to maintain vehicle formation during convoy driving convoy driving has been actively conducted and in Europe's Autonet 2030 project has developed and demonstrated convoy driving services for highways. But, even the concept of convoy driving is still insufficient in Korea. Therefore, in this study, the concept of convoy driving service was established and scenarios and communication messages for service application on urban roads were developed. And its effectiveness was verified through simulation analysis. As a result of comparing and analyzing individual vehicle cooperative driving and convoy driving for the blind spot support service and dilemma zone safety support service, which are representative V2I cooperative driving services on urban roads, the number of conflicts(indicator of traffic safety) and delays and stops(indicator of traffic efficiency) are significantly improved in convoy driving compared to individual vehicle cooperative driving.

Checksum Signals Identification in CAN Messages (CAN 통신 메시지 내의 Checksum Signal 식별 방법 연구)

  • Gyeongyeon Lee;Hyunghoon Kim;Dong Hoon Lee;Wonsuk Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.747-761
    • /
    • 2024
  • Recently, modern vehicles have been controlled by Electronic Control Units (ECUs), by which the safety and convenience of drivers are highly improved. It is known that a luxury vehicle has more than 100 ECUs to electronically control its function. However, the modern vehicles are getting targeted by cyber attacks because of this computer-based automotive system. To address the cyber attacks, automotive manufacturers have been developing some methods for securing their vehicles, such as automotive Intrusion Detection System (IDS). This development is only allowed to the automotive manufacturers because they have databases for their in-vehicle network (i.e., DBC Format File) which are highly confidential. This confidentiality poses a significant challenge to external researchers who attempt to conduct automotive security researches. To handle this restricted information, in this paper, we propose a method to partially understand the DBC Format File by analyzing in-vehicle network traffics. Our method is designed to analyze Controller Area Network (CAN) traffics so that checksum signals are identified in CAN Frame Data Field. Also, our method creates a Lookup Set by which a checksum signal is correctly estimated for a given message. We validate our method with the publicly accessible dataset as well as one from a real vehicle.

A Control Method for designing Object Interactions in 3D Game (3차원 게임에서 객체들의 상호 작용을 디자인하기 위한 제어 기법)

  • 김기현;김상욱
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.322-331
    • /
    • 2003
  • As the complexity of a 3D game is increased by various factors of the game scenario, it has a problem for controlling the interrelation of the game objects. Therefore, a game system has a necessity of the coordination of the responses of the game objects. Also, it is necessary to control the behaviors of animations of the game objects in terms of the game scenario. To produce realistic game simulations, a system has to include a structure for designing the interactions among the game objects. This paper presents a method that designs the dynamic control mechanism for the interaction of the game objects in the game scenario. For the method, we suggest a game agent system as a framework that is based on intelligent agents who can make decisions using specific rules. Game agent systems are used in order to manage environment data, to simulate the game objects, to control interactions among game objects, and to support visual authoring interface that ran define a various interrelations of the game objects. These techniques can process the autonomy level of the game objects and the associated collision avoidance method, etc. Also, it is possible to make the coherent decision-making ability of the game objects about a change of the scene. In this paper, the rule-based behavior control was designed to guide the simulation of the game objects. The rules are pre-defined by the user using visual interface for designing their interaction. The Agent State Decision Network, which is composed of the visual elements, is able to pass the information and infers the current state of the game objects. All of such methods can monitor and check a variation of motion state between game objects in real time. Finally, we present a validation of the control method together with a simple case-study example. In this paper, we design and implement the supervised classification systems for high resolution satellite images. The systems support various interfaces and statistical data of training samples so that we can select the most effective training data. In addition, the efficient extension of new classification algorithms and satellite image formats are applied easily through the modularized systems. The classifiers are considered the characteristics of spectral bands from the selected training data. They provide various supervised classification algorithms which include Parallelepiped, Minimum distance, Mahalanobis distance, Maximum likelihood and Fuzzy theory. We used IKONOS images for the input and verified the systems for the classification of high resolution satellite images.

Entre l' espace sculptural et, l' espace architectural (조각공간과 건축공간의 관계)

  • Lee Bong-Soon
    • Journal of Science of Art and Design
    • /
    • v.5
    • /
    • pp.175-216
    • /
    • 2003
  • 시각이 아닌 오감체계에 관계하는 때문에 현대미술은 외관만으로 이루어지지 않는다. 곧 예술 작품들은 하나의 장소를 관객에게 제공하여, 심리적, 물리적, 또는 예술이 존재여부에 관한 갖가지 질문들을 제기한다. 모든 예술 작품은 메시지를 담고 있다. 이러한 관점에서 개념 또는 아이디어에 우선하는 현대미술은 그들의 메시지를 전달하기 위해 우리의 사회적 배경과 보편성을 간과할 수 없다. 우리의 물체 인식은 결국 우리의 경험체계를 통해서 이루어진다고 간주하면, 현대미술의 새로운 형태는 보편적 특질들이 그 특질들 이상의 상태로 보여지도록 유도한다. 이러한 창조 행위의 시작은 현대인간의 문화 읽기이며 문화는 인간과 자연의 긴밀한 관계 속에서 이루어진다. 역사는 지나간 시간을 기록한 것이며, 이 또한 우리의 지식과 정보 체계에 속한다. 회화가 평면에 입체감을 표현하는 것과는 달리 조각은 자연 속, 즉 실재공간 속에 있는 모든 것을 표현하기 때문에 시각(visible) 이외에도 촉각(tangible)이 관여하게 된다. 조각의 특수성은 촉각(tangible)이 우선하는 것이다. 그러나 시각과 촉각은 매우 적극적으로 미학적 경험에 참여하는 감각으로 이들을 서로 분리하여 생각하기가 무척 힘들다. 왜냐하면 어떤 경험에 있어서 기억연합 또는 감각 연합에 의해 하나의 감각이 다른 여러 감각을 촉발하여 연쇄반응 혹은 '형태 Gestalt'를 이루기 때문이다. 대부분의 근대 조각 작품들은 조각대 위에 고정되어 있는 구상 형태를 지녔기 때문에 조각작품 자체가 지닌 외적 형태와 그 자체내의 공간이 더욱 중요한 역할을 하게 된다. 말하자면 미로의 비너스 조각은 대리석과 비너스 형태의 결합이다. 때문에 관객은 그 주변을 돌면서 우리 신체의 내적 공간과 시각에 의존하면서 그 작품의 중량감, 양감, 형태 등의 특질과 만나게 된다. 그러나 현대 추상조각과 개념조각은 이보다 좀 더 확장된 공간을 제시한다. 이것은 현대조각이 건축개념을 수용한 때문이며, 그것이 때로는 안 쪽에서 때로는 바깥 쪽에서 그 형태를 결정하며, 보고 듣고 느끼고 만져지고 왕래하는 등의 인식 영역인 관객의 오감체계에 직접적으로 관계하기 때문이다. 우리는 건축 공간에서, 시각 외에도 청각이나 촉각을 통해 지각한다. 대강 요약하자면 공간은 객관적 상태이기보다는 인식영역의 주관성을 통해 받아들여진 우리가 지나쳐온 것들이나 체험된 공간이다. 여기서 '받아들여지는' 일은 과거 경험들의 주체들, 언어와 문화에 의해서 이루어져야 한다. 건물, 즉 둘러싸고 있는 공간은 중앙이 아니다. 중앙은 바로 나, 둘러싸여진 나이다 나는 나의 동작에 따라 그 공간의 시스템을 변화시킬 수 있는 유동적인 중심이다 (이때의 나는 위치의 축을 변화시키는 것이 아니라, 그들을 탐색하는 것이다). 작품이 대형화되면서 이러한 건축공간개념이 현대 조각가들의 작품개념에 이용되었다고 본다. 현대미술에서 In situ작업과 특정한 장소를 위한 기획되어진 최근의 프로젝트 작업들은 대형화되어있으며, 건축에서처럼 특정한 장소를 만들어낸다. 로잘린드 크라우스(Rosalind Krauss)는 또한 '조각영역의 확장 (La sculpture dans le champ elargi)'에서 현대조각이 건축과 환경의 영역을 침범하고 있음을 지적한다. 그녀에 의하면, 1960년대 이후의 현대조각은 이러한 탈 귀속성과 조각의 자율성을 획득함으로써 조각은 건축물이 아니면서 건축물 주변에 위치하거나 풍경이 아니면서 풍경 안에 자리잡게 되었다. 이와 같이 현대의 대형조각 작품들 - 예를 들어 대형화된 미니별 조각이나 개념미술, 또는 대지예술 등 -은 풍경의 실재가 아니기 때문에 환경으로부터 구분된다고 언급하고 있다. 이들 조각은 더 이상 만져지는 실체이거나 점유하는 공간의 상징언어를 지닌 조각의 범주에 한정되지 않게 된다. 조각과 건축의 공간인식을 인체의 크기와 관련하여 보면, 메를로 퐁티(Merleau-Ponty)의 '지각의 현상학' 은 우리가 논하는 작품의 공간체계를 분석하는데 지침표가 되어준다. 메를로 퐁티가 말하는 지각은 정신에 의해서만 이루어지는 것이 아니며, 몸과 함께 이루어지는 현상이다. 지각은 우리가 부단히 눈을 움직이고 만지고 냄새를 맡고 주변을 돌아 다니면서 세계와의 직접적인 접촉을 통해 이루어 진다. 몸의 움직임을 통하여 나타나는 신체적 표현은 몸 자체가 원천적으로 지향적 활동의 주체로서 파악되는 한 이미 항상(恒常, constant) 의미 현상을 지니다. 우리의 지각이 움직이는 몸의 지향 활동을 통해 이루어진다는 것은 우리의 몸의 지향활동이 의식에 선행함을 의미한다. 몸의 움직임은 의식의 의도를 표현할 때에만 의미를 나타내는 기호가 되는 것이 아니라, 이미 그 자체가 살아있는 표현이다. 우리의 몸짓, 표정은 우리 의식이 의도하기 전에 이미 의미가 담겨있다. 몸은 그 자체가 기호(Signe)적이다. 결국. 메를로 퐁티에게서 세상(le monde entier)은 그 자신이 주체가 되어 인식한다, 그리고 이 인식 구조에는 우리의 몸이 구심점(le point centripete)이 된다. 만약 우리가 이러한 메를로 퐁티의 개념을 염두에 둔다면, 예술작품의 특성에 매우 중요한 역할을 하고 있는 재료와 크기를 이해할 수 있을 것이다.

  • PDF

Incorporating Social Relationship discovered from User's Behavior into Collaborative Filtering (사용자 행동 기반의 사회적 관계를 결합한 사용자 협업적 여과 방법)

  • Thay, Setha;Ha, Inay;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.1-20
    • /
    • 2013
  • Nowadays, social network is a huge communication platform for providing people to connect with one another and to bring users together to share common interests, experiences, and their daily activities. Users spend hours per day in maintaining personal information and interacting with other people via posting, commenting, messaging, games, social events, and applications. Due to the growth of user's distributed information in social network, there is a great potential to utilize the social data to enhance the quality of recommender system. There are some researches focusing on social network analysis that investigate how social network can be used in recommendation domain. Among these researches, we are interested in taking advantages of the interaction between a user and others in social network that can be determined and known as social relationship. Furthermore, mostly user's decisions before purchasing some products depend on suggestion of people who have either the same preferences or closer relationship. For this reason, we believe that user's relationship in social network can provide an effective way to increase the quality in prediction user's interests of recommender system. Therefore, social relationship between users encountered from social network is a common factor to improve the way of predicting user's preferences in the conventional approach. Recommender system is dramatically increasing in popularity and currently being used by many e-commerce sites such as Amazon.com, Last.fm, eBay.com, etc. Collaborative filtering (CF) method is one of the essential and powerful techniques in recommender system for suggesting the appropriate items to user by learning user's preferences. CF method focuses on user data and generates automatic prediction about user's interests by gathering information from users who share similar background and preferences. Specifically, the intension of CF method is to find users who have similar preferences and to suggest target user items that were mostly preferred by those nearest neighbor users. There are two basic units that need to be considered by CF method, the user and the item. Each user needs to provide his rating value on items i.e. movies, products, books, etc to indicate their interests on those items. In addition, CF uses the user-rating matrix to find a group of users who have similar rating with target user. Then, it predicts unknown rating value for items that target user has not rated. Currently, CF has been successfully implemented in both information filtering and e-commerce applications. However, it remains some important challenges such as cold start, data sparsity, and scalability reflected on quality and accuracy of prediction. In order to overcome these challenges, many researchers have proposed various kinds of CF method such as hybrid CF, trust-based CF, social network-based CF, etc. In the purpose of improving the recommendation performance and prediction accuracy of standard CF, in this paper we propose a method which integrates traditional CF technique with social relationship between users discovered from user's behavior in social network i.e. Facebook. We identify user's relationship from behavior of user such as posts and comments interacted with friends in Facebook. We believe that social relationship implicitly inferred from user's behavior can be likely applied to compensate the limitation of conventional approach. Therefore, we extract posts and comments of each user by using Facebook Graph API and calculate feature score among each term to obtain feature vector for computing similarity of user. Then, we combine the result with similarity value computed using traditional CF technique. Finally, our system provides a list of recommended items according to neighbor users who have the biggest total similarity value to the target user. In order to verify and evaluate our proposed method we have performed an experiment on data collected from our Movies Rating System. Prediction accuracy evaluation is conducted to demonstrate how much our algorithm gives the correctness of recommendation to user in terms of MAE. Then, the evaluation of performance is made to show the effectiveness of our method in terms of precision, recall, and F1-measure. Evaluation on coverage is also included in our experiment to see the ability of generating recommendation. The experimental results show that our proposed method outperform and more accurate in suggesting items to users with better performance. The effectiveness of user's behavior in social network particularly shows the significant improvement by up to 6% on recommendation accuracy. Moreover, experiment of recommendation performance shows that incorporating social relationship observed from user's behavior into CF is beneficial and useful to generate recommendation with 7% improvement of performance compared with benchmark methods. Finally, we confirm that interaction between users in social network is able to enhance the accuracy and give better recommendation in conventional approach.

A study on optical coherence tomography system using optical fiber (광섬유를 이용한 광영상 단층촬영기에 관한연구)

  • 양승국;박양하;장원석;오상기;김현덕;김기문
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.04a
    • /
    • pp.5-9
    • /
    • 2004
  • In this paper, we studied the OCT(Optical Coherence Tomography) system which it has been extensively studied because of having some advantages such as high resolution cross-sectional images, low cost, and small size configuration. A basic principle of OCT system is Michelson interferometer. The characteristics of light source determine the resolution and the transmission depth. As a results, the light source have a commercial SLD with a central wavelength of 1,285 nm and FWHM(Full Width at Half Maximum) of 35.3 nm. The optical delay line part is necessary to equal of the optical path length with scattered light or reflected light from sample. In order to equal the optical path length, the stage which is attached to reference mirror is moved linearly by step motor And the interferometer is configured with the Michelson interferometer using single mod fiber, the scanner can be focused of the sample by using the reference arm. Also, the 2-dimensional cross-sectional images were measured with scanning the transverse direction of the sample by using step motor. After detecting the internal signal of lateral direction at a paint of sample, scanner is moved to obtain the cross-sectional image of 2-demensional by using step motor. Photodiode has been used which has high detection sensitivity, excellent noise characteristic, and dynamic range from 800 nm to 1,700 nm. It is detected mixed small signal between noise and interference signal with high frequency After filtering and amplifying this signal, only envelope curve of interference signal is detected. And then, cross-sectional image is shown through converting this signal into digitalized signal using A/D converter. The resolution of the OCT system is about 30$\mu\textrm{m}$ which corresponds to the theoretical resolution. Also, the cross-sectional image of ping-pong ball is measured. The OCT system is configured with Michelson interferometer which has a low contrast because of reducing the power of feedback interference light. Such a problem is overcomed by using the improved inteferometer. Also, in order to obtain the cross-sectional image within a short time, it is necessary to reduce the measurement time for improving the optical delay line.

  • PDF

Balanced DQDB Applying the System with Cyclic Service for a Fair MAC Procotol (공정한 MAC 프로토콜을 위해 순환서비스시스템을 적용한 평형 DQDB)

  • 류희삼;강준길
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.12
    • /
    • pp.1919-1927
    • /
    • 1993
  • A new MAC protocol has been proposed and analysed to relieve the unfairness problems exhibited by the basic version of the DQDB standard. DQDB MAC protocol has the unfairness problems in throughputs. message delay and so or. And when the slots are reused or the file transmissions takes long, the unfairness problems in the system become worse. The new access protocol proposed here, which of called the Balanced DQDB, guarantees a fair bandwidth distribution by using one bit of the dual bus network protocol and keeps up all characteristics of DQDB. the DQDB analysis model introduced by Wen Jing, et al, was considered to analyse a sequential balance distribution of solts. And the probabilities of the empty in operation mode were represented to determine the probabilities for busy bits to generate on each node of the bus using the Markov chain. Through the simulations. the performances of the proposed Balanced DQDB and that of the standard DQDB of the BWB mechanism were compared at the state that the values of the RQ or CD counter on each node varied dynamically. As the results, it is shown that the Balanced DQDB has the decrement of throughputs in upstream, but the numbers of the used empty slots at each node of the Balanced DQDB had more than that of the others because the Balanced DQDB has over 0.9 throughputs in the 70~80% nodes of total node and it has constant throughputs at each node. And there results were analogous to that of the analytical model.

  • PDF

The threats and responses of cyber-terrorism in a new security environment: Issues and propositions on strategic frameworks (새로운 안보환경을 둘러싼 사이버 테러의 위협과 대응방안: 쟁점들과 전략적 접근 틀에 대한 논의)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.109-145
    • /
    • 2014
  • Despite much discussions on cyber-terrorism in South Korea, several missing issues could be addressed. This paper attempts to deal with such missing but important issues. In South Korea, there has been little attentions on cyber-terrorism with the respects of national security strategy development under macro framework responding to future security environment. This article focuses on such issues. In other words, the purpose of this paper evaluates the meaning of national security threats raised from cyber-terrorism as a mode of security threats and proposes the matter of cyber-terrorism within the development of national security strategy in the future security environment. several issues in this discussion pass some important messages for the construction of national security strategic approach framework within the future security environment adding cyber-space. in the future environment, a new space called cyber is added as an important external condition which might determine the security of individuals, societies, and nations. Therefore, the fundamental strategic framework should be prepared. After that, the trend and direction of future technological advancement should be understood and the identity, nature, and types of threat should be analyzed. Also, after that, various responses and countermeasures are together constituted in the aspect of function and system regarding various anticipated threats of the future human society including cyber-terrorism.

  • PDF