• Title/Summary/Keyword: 스마트워크 시스템

Search Result 672, Processing Time 0.032 seconds

General Web Cache Implementation Using NIO (NIO를 이용한 범용 웹 캐시 구현)

  • Lee, Chul-Hui;Shin, Yong-Hyeon
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.1
    • /
    • pp.79-85
    • /
    • 2016
  • Network traffic is increased rapidly, due to mobile and social network, such as smartphones and facebook, in recent web environment. In this paper, we improved web response time of existing system using direct buffer of NIO and DMA. This solved the disadvantage of JAVA, such as CPU performance reduction due to the blocking of I/O, garbage collection of buffer. Key values circulated many data due to priority change put on a hash map operated easily and apply a priority modification algorithm. Large response data is separated and stored at a fast direct buffer and improved performance. This paper showed that the proposed method using NIO was much improved performance, in many test situations of cache hit and cache miss.

EmXJ : A Framework of Configurable XML Processor for Flexible Embedding (EmXJ : 유연한 임베딩을 위한 XML 처리기 구성 프레임워크)

  • Chung, Won-Ho;Kang, Mi-Yeon
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.467-478
    • /
    • 2002
  • With the rapid development of wired or wireless Internet, various kinds of resource constrained mobile devices, such as cellular phone, PDA, homepad, smart phone, handhold PC, and so on, have been emerging into personal or commercial usages. Most software to be embedded into those devices has been forced to have the characteristic of flexibility rather than the fixedness which was an inherent property of embedded system. It means that recent technologies require the flexible embedding into the variety of resource constrained mobile devices. A document processor for XML which has been positioned as a standard mark-up language for information representation on the Web, is one of the essential software to be embedded into those devices for browsing the information. In this paper, a framework for configurable XML processor called EmXJ is designed and implemented for flexible embedding into various types of resource constrained mobile devices, and its advantages are compared to conventional XML processors.

Insulation Effect of Double Layered Bubble Sheet Application in Cold Weather Concrete and Initial Quality Control by Wireless Sensor Network (한중시공에서 2중 버블시트 포설에 따른 단열 효과분석 및 무선센서 네트워크에 의한 초기 품질관리)

  • Han, Min-Cheol;Seo, Hang-Goo
    • Journal of the Korea Institute of Building Construction
    • /
    • v.21 no.1
    • /
    • pp.21-29
    • /
    • 2021
  • The objective of this study is to evaluate the effect of the application of double layered bubble sheet on the curing of slab and wall concrete placed at the job site in cold weather and to offer a feasibility of Concrete IoT Management System(CIMS), which is wireless sensor network developed by the authors, to manage early age quality of the concrete in terms of temperature, maturity and strength development. Test results indicated that the application of bubble sheet enhances the insulation performance, which results in an increase of the temperature by around 1~20. 6℃. It is found that CIMS can gather the temperature, maturity and strength development data from the sensors embedded from 30 m far from CIMS successfully. Predicted compressive strengths by CIMS had good agreement with measured ones within 2 MPa error level until 7 days. It is thought that the combination of the bubble sheet application for cold weather protection and CIMS for quality management tool in cold weather concreting contributes to shorten the time for the form removal by one day.

Smart Ship Container With M2M Technology (M2M 기술을 이용한 스마트 선박 컨테이너)

  • Sharma, Ronesh;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.3
    • /
    • pp.278-287
    • /
    • 2013
  • Modern information technologies continue to provide industries with new and improved methods. With the rapid development of Machine to Machine (M2M) communication, a smart container supply chain management is formed based on high performance sensors, computer vision, Global Positioning System (GPS) satellites, and Globle System for Mobile (GSM) communication. Existing supply chain management has limitation to real time container tracking. This paper focuses on the studies and implementation of real time container chain management with the development of the container identification system and automatic alert system for interrupts and for normal periodical alerts. The concept and methods of smart container modeling are introduced together with the structure explained prior to the implementation of smart container tracking alert system. Firstly, the paper introduces the container code identification and recognition algorithm implemented in visual studio 2010 with Opencv (computer vision library) and Tesseract (OCR engine) for real time operation. Secondly it discusses the current automatic alert system provided for real time container tracking and the limitations of those systems. Finally the paper summarizes the challenges and the possibilities for the future work for real time container tracking solutions with the ubiquitous mobile and satellite network together with the high performance sensors and computer vision. All of those components combine to provide an excellent delivery of supply chain management with outstanding operation and security.

A Study on the Development of Energy IoT Platform (에너지 IoT 플랫폼 개발에 관한 연구)

  • Park, Myung Hye;Kim, Young Hyun;Lee, Seung Bae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.311-318
    • /
    • 2016
  • IoT(Internet of Things areas) rich information based on the user easy access to service creation must be one of the power system of specificity due following: The IoT spread obstacle to the act be, and 'Smart Grid information of this is not easy under power plants approach the Directive on the protection measures, particularly when stringent security policies IoT technologies applied to Advanced Metering Infrastructure sector has been desired. This is a situation that occurs is limited to the application and use of IoT technologies in the power system. Power Information Network is whilst closed network operating is has a smart grid infrastructure, smart grid in an open two-way communication for review and although information security vulnerabilities increased risk of accidents increases as according to comprehensive security policies and technologies are required and can. In this paper, the IoT platform architecture design of information systems as part of the power of research and development IoT-based energy information platform aims. And to establish a standard framework for a connection to one 'Sensor-Gateway-Network-platform sensors Service' to provide power based on the IoT services and solutions. Framework is divided into "sensor-gateway" platform to link information modeling and gateways that can accommodate the interlocking standards and handling protocols variety of sensors Based on this real-time data collection, analysis and delivery platform that performs the role of the relevant and to secure technology.

A spectral efficient transmission method for ofdm-based power line communications (직교주파수분할다중화기반 전력선통신에서 대역 효율적인 전송기법)

  • Kim, Byung Wook
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.4
    • /
    • pp.25-32
    • /
    • 2014
  • Powerline communications (PLC) is a promising medium for network access technology where smart grid aided network services can be provided. In the presence of frequency selective fading in the PLC channel, orthogonal frequency division multiplexing (OFDM) is a technique for reliable communications. This paper presents a spectral efficient method using a superimposed hidden pilot for OFDM-based PLC systems. Based on the scheme using a hidden pilot, it is possible to estimate the channel with no consumption of bandwidth, but with utilization of power allocated to the hidden pilot. Computer simulations showed that the proposed scheme provides higher achievable data rate than that of the conventional schemes in low voltage and medium voltage transmission lines.

ECC-based IPTV Service Key Establishment Protocol With User Attribute (사용자 속성을 이용한 ECC 기반의 IPTV 서비스 키 설립 프로토콜)

  • Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.105-111
    • /
    • 2012
  • Internet Protocol Television (IPTV) through broadband cable network is a subscriber-based system which consists of software and set-top box. However, a weakness for the current IPTV system is the lack of security between users and CAS. This paper proposes a user authentication protocol at STB, which limits the service by the user-valued attribute to prevent illegal IPTV users. User attribute values change the order with bit form according to the certain rule, and apply to one-way hash function and Diffie-Hellman's elliptic curve key-exchange algorithm. The proposed protocol is able to improve on user authentication and computation. Also, each user generates an authentication message by smart card and receives various services based on the user-valued attribute.

Impersonation Attacks on Anonymous User Authentication and Key Agreement Scheme in Wireless Sensor Networks (무선센서네트워크에서 익명의 사용자 인증과 키동의 기법에 대한 가장 공격)

  • Choi, Hae-Won;Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.287-293
    • /
    • 2016
  • Wireless sensor networks (WSNs) have many applications and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these WSNs. Recently, an anonymous user authentication and key agreement scheme (AUAKAS) was proposed based on symmetric cryptosystem in WSNs. It is claimed in AUAKAS that it assures security against different types of attacks including impersonation attacks. However, this paper shows that AUAKAS does not cope from user impersonation attack and gateway impersonation attack from the legally registered user on the gateway. The security analysis could guide the required features of the security scheme to be satisfied.

The Implementation of Broadcasting Scalable Application on Multimedia mobile device using SADL (멀티미디어 모바일 단말기기를 이용한 방송통신용 스케일러블 애플리케이션 구현)

  • Kim, Sang-Hyun;Lim, Tae-Beom;Kim, Kyung-Won;Lee, Seok-Pil
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2011.07a
    • /
    • pp.556-559
    • /
    • 2011
  • 최근 디지털 방송 서비스가 본격화가 이루어짐에 따라 디지털 콘텐츠는 기하급수적으로 늘어나고 있다. 또한 방송통신 융합 환경은 기존 셋탑 박스와 같은 방송 전용 단말기와 PC, 노트북, PDA와 같은 인터넷 단말기기, 그리고 모바일 폰과 같은 통신기기 사이의 벽을 허물고 있다. IPTV, SmartTV 시대의 도래로 방송통신 제공자의 양방향성 콘텐츠의 제공 및 상호연동 서비스의 제공은 중요한 이슈가 되었다. 이에 따라 다양한 단말기를 이용해 N-Screen이 가능하도록 방송통신 융합 서비스를 제공하고, 이를 위한 여러 콘텐츠 제작이 활발히 일어나고 있다. 이에 본 논문은 양방향성과 상호운용성을 높이기 위한 하나의 방법으로, 방송통신 융합서비스를 인터넷에 의한 전송과 방송 셋탑에 의한 전송에 있어서 상호 동일한 콘텐츠의 통일성을 유지하여 관리가 쉽도록 하는 Scalable Application Framework를 이용하였고 이를 실제 멀티미디어 모바일 단말기기에 적용하고 구현하였다. 이를 통해 앞으로 스마트 방송 시대에 대비할 수 있는 시스템의 대안을 제안하고자 한다. MPEG-21의 DID를 기초로 하여 SADL(Scalable Application Description Language)를 정의하고 이를 이용한 다양한 프레임워크 모델 중 일부인 멀티미디어 모바일 단말기기에 적용하여 이를 활용하는 방안에 대해 논의한다.

  • PDF

User-patterns Analysis Method to provide the Intelligent Home Network Service (지능적인 홈네트워크 서비스 제공을 위한 사용자 패턴 분석 기법)

  • Kim, Hak-Soo;Choi, Yun-Ho;Lee, Seung-Mi;Son, Jin-Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10c
    • /
    • pp.243-247
    • /
    • 2007
  • 오늘날 스마트 홈은 네트워크 센서, 가전 기기 등에 자동화된 서비스를 부여하여 사용자의 인지 없이 지능형 서비스를 제공하는 것이 목적이다. 이와 같은 지능형 홈 네트워크 서비스를 제공하기 위한 기존의 연구들은 온톨로지 기반의 컨텍스트 모델을 통해서 시맨틱 컨텍스트 표현, 추론, 지식 공유를 통해서 자동화된 서비스를 제공하는데 초점을 두고 있다. 그러나 이러한 연구들은 장치가 제공하는 서비스에 대한 자동화에 초점을 두고 있지만 진정한 지능형 홈 네트워크 서비스는 사용자의 다양한 패턴에 따라서 시간순으로 서비스를 자동으로 제공해야만 한다. 이러한 관점에서 본 논문은 사용자 패턴에 따른 자동화된 서비스를 사용자에게 지능적으로 제공하는 지능형 흠 네트워크 서비스를 제공하는 시스템 설계에 초점을 둔다. 이러한 자동화된 서비스를 제공하기 위하여 본 논문은 데이터 마이닝 기법을 사용하여 사용자 패턴 분석 기법을 제안할 것이다.

  • PDF