• Title/Summary/Keyword: 신뢰성 전송

Search Result 1,123, Processing Time 0.025 seconds

Energy-Efficient Multipath Routing Protocol for Supporting Mobile Events in Wireless Sensor Networks (무선 센서 네트워크에서 이동 이벤트를 지원하기 위한 에너지 효율적인 멀티패스 라우팅 프로토콜)

  • Kim, Hoewon;Lee, Euisin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.455-462
    • /
    • 2016
  • Wireless sensor networks have been researched to gather data about events on sensor fields from sources at sinks. Multipath routing is one of attractive approaches to reliably send data against the problem of frequent breakages on paths from sources to sinks due to node and link failures. As mobile events such as humans, animals, and vehicles are considered, sources may be continuously generated according to the movement of the mobile event. Thus, mobile events provide new challenging issue in multipath routing. However, the research on multipath routing mainly focus on both efficient multipath construction from sources to static sinks and fast multipath reconstruction against path breakages. Accordingly, the previous multipath routing protocols request each source continuously generated by a mobile event to construct individual multipath from the source to sinks. This induces the increase of multipath construction cost in the previous protocols in proportion to the number of source. Therefore, we propose efficient multipath routing protocol for supporting continuous sources generated by mobile events. In the proposed protocol, new source efficiently reconstructs its multipath by exploiting the existing multipath of previous sources. To do this, the proposed protocol selects one among three reconstruction methods: a local reconstruction, a global partial one, and a global full one. For a selection decision, we provide an analytical energy consumption cost model that calculates the summation of both the multipath reconstruction cost and the data forwarding cost. Simulation results show that the proposed protocol has better performance than the previous protocol to provide multipath routing for mobile events.

Common Services Platform for M2M Supporting Security Standards (보안 표준 지원 M2M 공통 서비스 플랫폼)

  • Vakkosov, Sardorjon;Namgung, Jung-Il;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.3
    • /
    • pp.76-88
    • /
    • 2016
  • Machine to Machine (M2M) is a technology that presents communication between two or more devices with or without human intervention. M2M communications can be applied for various use cases such as environmental monitoring, health care, smart metering and etc. In most use cases, M2M utilizes sensor nodes to collect data from the intended environment and the data is transmitted back to M2M application through other devices (gateways, sink nodes). In some use cases, M2M devices are being designed to store and process sensor data for improving the reliability of the service; Gateways and sink nodes are also intended to store and process the gathered data from sensor nodes. This kind of approach is very challenging for both academy and industry. In order to enhance the performance of this approach, in this paper, we propose our Common Service Security Platform (CSSP) for M2M devices and gateways. CSSP platform presents solutions for the devices and gateways by making them operate more accurately and efficiently. Besides, we present a comparative analysis of communication protocols and present their performance in accordance with selected metrics.

The Development of 1G-PON Reach Extender based on Wavelength Division Multiplexing for Reduction of Optical Core (국사 광역화와 광코어 절감을 위한 파장분할다중 기반의 1기가급 수동 광가입자망 Reach Extender 효율 극대화 기술 개발)

  • Lee, Kyu-Man;Kwon, Taek-Won
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.229-235
    • /
    • 2019
  • As the demand for broadband multimedia including the Internet explosively increases, the advancement of the subscriber network is becoming the biggest issue in the telecommunication industry due to the surge of data traffic caused by the emergence of new services such as smart phone, IPTV, VoIP, VOD and cloud services. In this paper, we have developed WDM(Wavelength Division Multiplexing)-PON(passive optical network) based on the 1-Gigabit Reach Externder (RE) technique to reduce optical core. Particularly, in order to strengthen the market competitiveness, we considered low cost, miniaturization, integration technique, and low power of optical parts. In addition, we have developed a batch system by integrating all techniques for reliability, remote management through the development of transmission distance extension and development of capacity increase of optical line by using RE technology in existing PON network. Based on system interworking with existing commercial 1G PON devices, it can be worthy of achievement of wide nationalization and optical core reduction by using this developed system. Based on these results, we are studying development of 10G PON technology.

Digital Twin-Based Communication Optimization Method for Mission Validation of Swarm Robot (군집 로봇의 임무 검증 지원을 위한 디지털 트윈 기반 통신 최적화 기법)

  • Gwanhyeok, Kim;Hanjin, Kim;Junhyung, Kwon;Beomsu, Ha;Seok Haeng, Huh;Jee Hoon, Koo;Ho Jung, Sohn;Won-Tae, Kim
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.1
    • /
    • pp.9-16
    • /
    • 2023
  • Robots are expected to expand their scope of application to the military field and take on important missions such as surveillance and enemy detection in the coming future warfare. Swarm robots can perform tasks that are difficult or time-consuming for a single robot to be performed more efficiently due to the advantage of having multiple robots. Swarm robots require mutual recognition and collaboration. So they send and receive vast amounts of data, making it increasingly difficult to verify SW. Hardware-in-the-loop simulation used to increase the reliability of mission verification enables SW verification of complex swarm robots, but the amount of verification data exchanged between the HILS device and the simulator increases exponentially according to the number of systems to be verified. So communication overload may occur. In this paper, we propose a digital twin-based communication optimization technique to solve the communication overload problem that occurs in mission verification of swarm robots. Under the proposed Digital Twin based Multi HILS Framework, Network DT can efficiently allocate network resources to each robot according to the mission scenario through the Network Controller algorithm, and can satisfy all sensor generation rates required by individual robots participating in the group. In addition, as a result of an experiment on packet loss rate, it was possible to reduce the packet loss rate from 15.7% to 0.2%.

Urban Runoff Network Flow Velocity Monitoring System Using Ubiquitous Technique and GIS (Ubiquitous 기술과 GIS를 이용한 도시배수관망 유속측정 시스템 개발)

  • Choi, Changwon;Yi, Jaeeung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.5B
    • /
    • pp.479-486
    • /
    • 2010
  • Reliable hydrologic data acquisition is the basic and essential requirement for efficient water management. Especially the acquisition of various stream data in a certain location is very important to construct on alarm system to response an urban flood which occurs frequently due to the effect of climate change. Although the frequency of stream inundation flood occurrence becomes low owing to the consistent stream improvement, the urban flood due to the drainage system problems such as deterioration and bad management occurs continuously. The consistent management and current status understanding of the urban drainage system is essential to reduce the urban flood. The purpose of this study is to develop the urban runoff network flow velocity monitoring system which has the capability of collecting stream data whenever, wherever and to whomever without expert knowledge using Code Division Multiple Access technique and Bluetooth near-distance wireless communication technique. The urban runoff network flow velocity monitoring system consists of three stages. In the first stage, the stream information obtained by using ubiquitous floater is transferred to the server computer. In the second stage, the current state of the urban drainage system is assessed through the server computer. In the last stage, the information is provided to the user through a GUI. As a result of applying, the developed urban runoff network flow velocity monitoring system to Woncheon-Stream in Suwon, the information necessary for urban drainage management can be managed in real time.

Study on the Smart 1RM System Development and Effect Verification for Health Improvement and Management of National Healthcare (국민 건강관리 및 체력증진을 위한 스마트 1RM 시스템 개발 및 효과 검증에 관한 연구)

  • Woo, Kyung-Min;Shin, Mi-Yeon;Yu, Chang-Ho
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.12 no.1
    • /
    • pp.53-62
    • /
    • 2018
  • In this study, we developed a smart 1RM system for national health management and physical fitness, which enables quantitative 1RM measurement in various types of exercise using digital pulley technology, and to test the effect on training by using it. We developed the smart 1RM system, which is composed of portable muscle strength measuring device, Bluetooth communication based mobile phone data transmission and circuit diagram, and height adjustable system body. We recruited the 30 participants with 20th aged and divided into training and non-performing groups with 15 participants randomly. The participants performed 5 sets of elbow, lumbar, knee extension / flexion 10 times using smart 1RM system and the experimental period was 3 days a week for a total of 8 weeks. The experimental results showed that the maximum strength of the elbow, lumbar, and knee joints was significantly improved before and after maximal muscle strength training in the training group. Oxygen intakes during 1RM exercise mode showed 10.91% than endurance. To verify the validity of the smart 1RM maximal strength data, the reliability was 0.895 (* p <0.00). This study can be applied to the early rehabilitation treatment of the elderly and rehabilitation patients more quantitatively using the national health care.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

Evaluation of Standardized Uptake Value and Metabolic Tumor Volume between Reconstructed data and Re-sliced data in PET Study (PET 검사 시 Reconstructed data와 Re-sliced data의 표준섭취계수와 Metabolic Tumor Volume의 비교 평가)

  • Do, Yong Ho;Lee, Hong Jae;Kim, Jin Eui
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.20 no.2
    • /
    • pp.3-8
    • /
    • 2016
  • Purpose SUV is one of the parameters that assist diagnosis in origin, metastasis and staging of cancer. Specially, it is important to compare SUV before and after chemo or radiation therapy to find out effectiveness of treatment. Storing PET data which has no quantitative change is needed for SUV comparison. However, there is a possibility to loss the data in external hard drive or MINIpacs that are managed by department of nuclear medicine. The aim of this study is to evaluate SUV and metabolic tumor volume (MTV) among reconstructed data (R-D) in workstation, R-D and re-sliced data (S-D) in PACS. Materials and Methods Data of 20 patients (aged $60.5{\pm}8.3y$) underwent $^{18}F-FDG$ PET (Biograph truepoint 40, mCT 40, mCT 64, mMR, Siemens) study were analysed. $SUV_{max}$, $SUV_{peak}$ and MTV were measured in liver, aorta and tumor after sending R-D in workstation, R-D and S-D in PACS to syngo.via software. Results R-D of workstation and PACS showed the same value as mean $SUV_{max}$ in liver, aorta and tumor were $2.95{\pm}0.59$, $2.35{\pm}0.61$, $10.36{\pm}6.15$ and $SUV_{peak}$ were $2.70{\pm}0.51$, $2.07{\pm}0.43$, $7.67{\pm}3.73$(p>0.05) respectively. Mean $SUV_{max}$ of S-D in PACS were decreased by 5.18%, 7.22%, 12.11% and $SUV_{peak}$ 2.61%, 3.63%, 10.07%(p<0.05). Correlation between R-D and S-D were $SUV_{max}$ 0.99, 0.96, 0.99 and $SUV_{peak}$ 0.99, 0.99, 0.99. And 2SD in balnd-altman analysis were $SUV_{max}$ 0.125, 0.290, 1.864 and $SUV_{peak}$ 0.053, 0.103, 0.826. MTV of R-D in workstation and PACS show the same value as $14.21{\pm}12.72cm^3$(p>0.05). MTV in PACS was decreased by 0.12% compared to R-D(p>0.05). Correlation and 2SD between R-D and S-D were 0.99 and 2.243. Conclusion $SUV_{max}$, $SUV_{peak}$, MTV showed the same value in both of R-D in workstation and PACS. However, there was statistically difference in $SUV_{max}$, $SUV_{peak}$ of S-D compare to R-D despite of high correlation. It is possible to analyse reliable pre and post SUV if storing R-D in main hospital PACS system.

  • PDF

Interoperability Framework between GRID and PACS based on Web Services (웹서비스 기반의 Grid-PACS 상호운용성 프레임워크)

  • Lee, Bong-Hwan;Cho, Hyun-Sug
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1799-1808
    • /
    • 2010
  • Recently the increasing collaborative research requires the remote medical and clinical data sharing and access of external institutions. In this paper, an interoperability framework between Grid and PACS using Web services is proposed and implemented in order to provide flexible and efficient medical data management. The Digital Imaging and Communications in Medicine(DICOM) standard defines medical image data exchange and transfer between PACSs and image databases. However, medical data exchange between hospitals is limited within the trusted and static environments. Moreover, DICOM does not provide medical data management and the Grid middleware does not include standard toolkit to access DICOM data. To address this issue, a Web services-based Grid Service Mediator (WGSM) which provides PACS integration and medical image data management is developed. The WGSM consists of several service mediators such as compress mediator, GridFTP mediator, RFT mediator, MyProxy mediator, MDS mediator, and RLS mediator and others. The proposed Web services-based framework provides user authentication and secure data access between PACSs in collaborative environments. In particular, the WGSM allows ordinary users to access remote PACS data in a simple and efficient manner without any the knowledge about underlying Grid middleware.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF