• Title/Summary/Keyword: 신뢰도 기반 설계

Search Result 1,303, Processing Time 0.035 seconds

Analysis of Performance and IKEv2 Authentication Exchange model in Mobile IPv6 Network (MIPv6망에서 IKEv2 인증 교환 모텔 및 성능 분석)

  • Ryu, Dong-Ju;Kim, Gwang-Hyun;Kim, Dong-Kook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1085-1091
    • /
    • 2006
  • For an experiment in this paper, designed test bed to secure confidentiality of data and safe transmission that Mobile node exchanges in Mobile network. And, For IPsec use that support basically in MIPv6, modeling and experimented IKEv2 protocol that is used for reliable authentication key management and distribution between End Point. When Mobile node handoff in Mobile network, analyzed effect that authentication key re-exchange and limited bandwidth that happen often get in key exchange. And studied about Performance and latency about authentication setting and exchange process that use multi interface. To conclusion, when Mobile node transmits using IPSec, re-authentication of key confirmed that re-setting by limit of bandwidth that existent Mobile network has can be impossible. According to other result, proposed MN's multi interface is expected to minimise key exchange latency by hand-off when transmit IPSec.

Implementation of Remote Control System using TeleRemote System (TeleRemote를 이용한 원격 제어 시스템 구현)

  • 김상복;한성호;진현준;박노경
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12B
    • /
    • pp.1115-1123
    • /
    • 2003
  • In this paper, a remote control system called TeleRemote system which can be applied to existing wireless mobile networks or public telephone networks for remote control is designed and implemented. The proposed design employs program technology based on the theory of signal detect control and enables the EPG(Electronic Program Guide) functions such as recording reservation of bidirectional video signals with TV reception card on PC. It can also control recording reservation using remote control program through telecommunication network The PC-EPG system is implemented in Web programs with Server/Clinet architecture and the server system that provides EPG functionalities is in charge of recording reservations and data communications by means of the scheduler program. Data storing to client PCs is performed through TCP/IP and finished by client programs implemented using Visual C++/MFC programs. As remote control system, the developed system can be used for unmanned security system using the Web camera. Building intranet and making connection to internet, the TeleRemote system is believed to create potential for commercial communication system.

MPEG-21 Event Reporting Message Structure based on digital data broadcasting use case scenarios (디지털 데이터 방송 유즈케이스 시나리오에 기반한 MPEG-21 이벤트 리포팅 구조 설계)

  • 송영주;홍진우;문남미;지경희
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.399-409
    • /
    • 2003
  • In this paper, we present an Event Reporting which is one of the major items of MPEG-21 and exemplify two digital data broadcasting use case scenarios, and according1y we propose the Event Reporting message structure for MPEG-21 broadcasting contents that is based on these use case scenarios. Every interaction with a Digital Item in the multimedia framework can be called an Event. The need to standardize Event Reporting within the Multimedia Framework arise from the need to monitor and communicate amongst Peers and Users the Events relating to Digital Items and/or the programs and devices that operate on them at any given time. However, there are a number of difficulties in providing an accurate report about an Event. Different observers of the Event may have vastly different perspectives. In this paper, we describe a structure and vision of the Event Reporting. Besides we show the activities on MPEG-21 Event Reporting standardization.

Built-In-Test Methods to use RF returnloss for fault Diagnosis of the Wideband Transmitter Antenna (광대역 무선송신장치의 RF 반사손실을 이용한 안테나 자체고장진단 방법)

  • Jung, Won-hee
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.45 no.5
    • /
    • pp.409-416
    • /
    • 2017
  • In order that multiple wideband RF transmitters which have mission to deliver essential information to aircraft operate at the same time, RF transmitter has a variable sub-carrier frequency to modulate the signal. In case of exposure to weak environment, Wide-band RF transmitter is designed to check component of transmitter that includes antenna BIT to increase system reliability. Normally, Antenna BIT measure the reflection RF power of antenna to check system condition. However, Antenna BIT has a difference that depends on testing frequency to use the long RF cable which is located between the power amp and the antenna. The periodic phenomenon of the reflected antenna power are theoretically explained about dependence on the RF cable length. Based on presented result, suggested measurement methods is effectively able to be applied to diagnosis system condition.

Velocity Field Estimation using Karman Vortex Images (칼만 와류(渦流) 영상을 이용한 속도장 추정)

  • Kim, Hyeong-kwon;Kim, Jin-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1327-1333
    • /
    • 2018
  • Numerical analysis has the advantage that no actual flow pathways need to be formulated, making this technique especially useful for simulation analysis such as pathway design. However, it does require that the complete physical parameters of the fluid and the complete boundary conditions be known. If any of them are unknown, either the calculation will become impossible, or even if the calculation does converge, the reliability of the result will be low. Therefore, a means of more accurate acquisition of flow information is required. In this paper, we present techniques for estimating flow field from a constraint equation for image information and velocity field, based on the image intensity changes accompanying the motion of dye in waterway. In the equation, we entered a stabilizing term to suppress estimation error. We show the effectiveness of our method through experiments with generated and real images of a Karman vortex.

Limit State Assessment of SCH80 3-inch Steel Pipe Elbows Using Moment-Deformation Angle Relationship (모멘트-변형각의 관계를 이용한 SCH80 3인치 강재배관엘보의 한계상태 평가)

  • Kim, Sung-Wan;Yun, Da-Woon;Cheung, Jin-Hwan;Kim, Seong-Do
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.24 no.3
    • /
    • pp.122-129
    • /
    • 2020
  • To conduct probabilistic seismic fragility analysis for nuclear power plants, it is very important to define the failure modes and criteria that can represent actual serious accidents. The seismic design criteria for piping systems, however, cannot fully reflect serious accidents because they are based on plastic collapse and cannot express leakage, which is the actual limit state. Therefore, it is necessary to clearly define the limit state for reliable probabilistic seismic fragility analysis. Therefore, in this study, the limit state of the SCH80 3-inch steel pipe elbow, the vulnerable part of piping systems, was defined as leakage, and the in-plane cyclic loading test was conducted. Moreover, an attempt was made to quantify the failure criteria for the steel pipe elbow using the damage index, which was based on the dissipated energy that used the moment-deformation angle relationship.

Shape Optimization of Multilayer Bellows by Using Sequential Experimental Design (순차적 실험계획법을 적용한 다층관 벨로우즈 형상 최적설계)

  • Oh, Sang-Kyun;Lee, Kwang-Ki;Suh, Chang-Hee;Jung, Yun-Chul;Kim, Young-Suk
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.35 no.9
    • /
    • pp.1007-1013
    • /
    • 2011
  • Because of their high flexibility and durability, multilayer bellows are manufactured for use in commercial vehicles, while single-layer bellows are manufactured for use in passenger vehicles. A study based on the finite element method (FEM) and shape optimization for the single-layer bellows has been actively performed; however, until now, a study based on the FEM has rarely been performed for the multilayer bellows with gaps between the layers. This paper presents a finite-element modeling scheme for the multilayer bellows to improve simulation reliability during the evaluation of stress and flexibility. For performing shape optimization for the multilayer bellows, DOE (design of experiment) and the Kriging metamodel followed by the D-optimal method are used.

An Adaptive Person/Vehicle Detection Algorithm for PIR Sensor (적외선 센서 기반의 사람/차량 탐지 적응 알고리즘)

  • Kim, Young-Man;Park, Jang-Ho;Kim, Li-Hyung;Park, Hong-Jae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.8
    • /
    • pp.577-581
    • /
    • 2009
  • Recently, various new services based on ubiquitous computing and networking have been developed. In this paper, we contrive Adaptive PIR(Pyroelectric Infrared Radiation) Detection Algorithm (APIDA), a PIR-sensor based digital signal processing algorithm, that detects the movement of an invading object by the recognition of heat change in the detection area, since the object like person or car emits heat(i.e., infrared radition), We devised APIDA as a highly reliable signal processing algorithm that increases the successful detection rate and decreases the false alarm rate in the intruding object detection. According to performance evaluation experiment, APIDA shows the successful detection rate of 90% and low false alarm in the plain area.

Transformation Methodology from Specification of ESTELLE to VHDL (ESTELLE 명세에서 VHDL 명세로의 변환 방법론)

  • 이미경;이익섭;김선규;조준모;김성운
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.2
    • /
    • pp.174-183
    • /
    • 2000
  • Formal methods for protocol description of a system is based on the implementation id S/W. However, the importance of H/W implementation for a parts of protocol design is increasing. The combination between H/W and IP technology is needed since the implementation environment is changing from S/W to H/W for implementation of specific application protocol. H/W implementation method starting with formal description procedure is essential to guarantree correctness and reliability of the implemented H/W by characteristic of formal description language. Inthis paper, for an automated H/W implementations, ESTELLE, a formal description method, is adopted. A transformation method from specification of ESTELLE to VHDL is suggested. This is an conceptual method that comparing and analyzing similarities between basic units of protocol description such as computation and communication unit and inter processors in H/W. Then we describe transformation model, and suggest example of transformation from ESTELLE to VHDL with Inres protocol.

  • PDF

Development and application of river hydraulic analysis model for discontinuous flow simulation (불연속 흐름 모의를 위한 하천수리모형의 개발 및 적용)

  • Jeong, Anchul;Noh, Joonwoo;Kim, Yeonsu;Kim, Sunghoon;An, Hyunuk
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.291-291
    • /
    • 2018
  • 하천 및 수자원의 효율적인 관리와 더불어 다양한 수공구조물의 운영 및 관리를 위해서 구조물 주변에서 발생하는 불연속 흐름 및 급변류 등의 현상과 구조물 운영을 반영한 수치해석 기법을 이용한 모델 개발의 중요성이 커지고 있다. 본 연구에서는 하천의 불연속 흐름을 모의하기 위한 1차원 흐름해석 모형(K-River)을 개발하였다. 본 모형은 천이류와 급변류를 수치적으로 안정하게 처리하기 위하여 지배방정식을 보존형 Saint-Venant 방정식으로 선정하고, FVM과 Forward Euler 방법을 이용하여 이산화를 수행하였다. 수치흐름률을 계산하기 위해서 불규칙 단면과 하상의 급경사 등에 신뢰도가 높은 기법으로 판단되는 근사 Riemann해법 중 하나인 HLL flux를 이용하였다. 개발된 K-river 모형의 검증을 위해서 해석해가 존재하는 타원형의 하상융기가 있는 하도에 적용하였으며, 국내에서 하천 설계 및 관리를 위해서 광범위하게 이용되고 있는 1차원 흐름해석 모형인 FDM기반의 HEC-RAS 모의결과와 비교 검토를 수행하였다. 그 결과, FDM기법에서는 모의되지 않는 일부 급변류 패턴을 개발 모형을 통해 모의가능하였으며, 전체적으로 K-River가 기존 모형 보다 해석해에 근사한 결과를 나타내었다. 또한, 배수문을 비롯하여 합류부, 분류부, 펌프장, 암거 등이 설치되어 운영되고 있는 아라뱃길에 적용하여 K-River의 적용성을 평가하였다. K-River를 이용하여 아라뱃길의 흐름분석을 수행한 경우가 HEC-RAS를 이용한 경우보다 수위와 유량의 유동을 시간에 따라 세밀하게 모의하였으며, 이는 배수효과에 의한 파의 전달이 FDM기법 대비 정확히 모의되기 때문으로 판단된다. 추후 연구에서는 현재보다 시간간격을 상세화 하여 수집된 관측수위를 통해 추가적인 검증을 수행하고, 다양한 특성을 가진 타 하천 등에 적용하여 모형의 적용성을 확대하고자 한다.

  • PDF