• Title/Summary/Keyword: 연구리소스

Search Result 335, Processing Time 0.026 seconds

Implementation of Windows Based Underground Pipe Network Monitoring System Reproduced with Embedded Program (임베디드 프로그램으로 재구성한 윈도우 기반 지하관망 모니터링 시스템의 구현)

  • Park, Jun-Tae;Hong, In-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1041-1049
    • /
    • 2011
  • According to the development of society and infrastructure, effective underground facility management is growing more important them ever. In the process various monitoring systems are studied and developed for water works pipe-network. Especially, RTD-1000 system with the based on Pc. Reflector-monitoring device is constructed and steered by several local governments. But, this system have to be improved result from based on PC system structure at the point of resource management, heat, power consumption and size. In this paper, RTD-2000 is proposed are a substitution of improved RTD-1000 with many respect and portable one. This system is designed and implemented with ARM-9 development kit based on WinCE and LCD eliminate TDR(Time Domain Reflector-Meter). Various surveillance programs based on windows are mounted on RTD-1000 are replaced with dedicated embedded application softwares. Simulation and evaluation for performance comparison are performed for the prove of effectiveness of RTD-2000.

Dynamic Channel-Time Assignments based on the link status in IEEE 802.15.3 High-rate WPAN (IEEE 802.15.3 고속 무선 PAN(Personal Area Network)에서 링크상태에 따른 동적 채널할당)

  • 곽동원;이승형
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7A
    • /
    • pp.844-851
    • /
    • 2004
  • Various types of error are caused due to many factors of various environment in air interface channel of wireless communications. In this case, the reliability of the channel is much lower than that of wired case. IEEE 802.15.3 high-rate WPAN, which operates in an ad hoc networking environment, is more susceptible to such errors. The problem has been investigated for wireless LANs, for example, as follows. If the queue size of a certain node is longer than that of other nodes, the node estimates that its channel state is bad and the resource of the node is decreased. However this method has a disadvantage that a central controller must always monitor the status. To avoid this disadvantage, in this paper, a new MAC protocol that the throughput of overall piconet is increased by LDS (Link-status Dependent Scheduling) is proposed.

A Markov Approximation-Based Approach for Network Service Chain Embedding (Markov Approximation 프레임워크 기반 네트워크 서비스 체인 임베딩 기법 연구)

  • Chuan, Pham;Nguyen, Minh N.H.;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.44 no.7
    • /
    • pp.719-725
    • /
    • 2017
  • To reduce management costs and improve performance, the European Telecommunication Standards Institute (ETSI) introduced the concept of network function virtualization (NFV), which can implement network functions (NFs) on cloud/datacenters. Within the NFV architecture, NFs can share physical resources by hosting NFs on physical nodes (commodity servers). For network service providers who support NFV architectures, an efficient resource allocation method finds utility in being able to reduce operating expenses (OPEX) and capital expenses (CAPEX). Thus, in this paper, we analyzed the network service chain embedding problem via an optimization formulation and found a close-optimal solution based on the Markov approximation framework. Our simulation results show that our approach could increases on average CPU utilization by up to 73% and link utilization up to 53%.

Schemes for Managing Semantic Web Data in Ubiquitous Environment (유비쿼터스 환경을 고려한 시맨틱 웹 데이터 관리 기법 연구)

  • Kim, Youn-Hee;Kim, Jee-Hyun
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.1-10
    • /
    • 2009
  • One important issue to generalize the ubiquitous paradigm is the development of user-centralized and intelligent ubiquitous computing systems. Sharing knowledge and correct communication between users and devices are needed to be aware of continuous changed context information and infer services for which users are suited. The goal of this paper is to describe and manage effectively the meaning of services or data which each device offers for interaction between users and devices based on semantic relationships and reasoning. In this paper, we represent semantic data using OWL and design a ubiquitous based intelligent system. We propose some index structures and strategies to process queries classified by each subsystem and adopt labeling schemes to identify classes and resources in the semantic data. We can find devices which satisfies various user's requests exactly and quickly using the proposed strategies.

  • PDF

Experimental Study of Keyword-Based Exploratory Testing (키워드 기반 탐색적 테스트의 실험적 연구)

  • Hwang, Jun Sun;Choi, Eun Man
    • Journal of Software Engineering Society
    • /
    • v.29 no.2
    • /
    • pp.13-20
    • /
    • 2020
  • The exploratory test was introduced as a desirable test method due to its fast development cycle, but it is not actively adopted because documentation and analysis of the test range are required for application. On the other hand, keyword-based testing has been introduced as a way to save resources and facilitate maintenance, but it is difficult to plan tests in advance due to the large number of variables such as data, settings, interactions, sequence and timing. However, in keyword-based testing, you can create a test case based on keywords by presenting clear criteria and methods for creating keywords and applying the exploration testing process. In this paper, we propose a model that automates exploratory tests based on keywords. To verify the effectiveness, we compared the general keyword-based test(KBT) and keyword-based exploratory test(KBET), and compared with the exploratory normal test case(ETC) and keyword-based exploratory test(KBET).

Construction Cost-Schedule Integration Management Methodolgy by using Progress Integration Unit (성과측정유닛을 활용한 건설 비용 - 일정 통합관리 방안)

  • Kang, Namhee;Choi, Jaehyun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.18 no.3
    • /
    • pp.42-51
    • /
    • 2017
  • Measuring and evaluating project progress and performance are the key element of the construction project success. Construction progress is typically measured quantitatively by evaluating cost and time allocated to the project deliverable, and thus properly integrating cost and time is essential to the project management. This research was performed to propose an alternative methodology to integrate the cost and time and provide a framework for the progress measurement. The researchers developed a typical work process for the cost and schedule planning and also developed an alternative cost-schedule integration method by using progress integration units (PIU). A discipline of a construction phase served as a common level for WBS and CBS integration, so the PIUs'were defined under discipline. A case study project was selected to validate the developed methodology. The result showed the proposed method improved efficiency of cost and time integration. The result also showed the excluding material for the progress measurement purpose significantly reduced the bias of progress measurement.

Research on Effective Security Control Measures Against DDoS Attacks (DDoS 공격에 대한 효과적인 보안 관제 방안)

  • Jung, Il-Kwon;Kim, Jeom-Gu;Kim, Kiu-Nam;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.7-12
    • /
    • 2009
  • It is very difficult to completely block the DDoS attack, which paralyzes services by depleting resources or occupying the network bandwidth by transmitting a vast amount of traffic to the specific website or server from normal users' PCs that have been already infected by an outside attacker. In order to defense or endure the DDoS attack, we usually use various solutions such as IDS (Intrusion Detection System), IPS (Intrusion Prevention System), ITS (Intrusion Tolerance System), FW (Firewall), and the dedicated security equipment against DDoS attack. However, diverse types of security appliances cause the cost problem, besides, the full function of the equipments are not performed well owing to the unproper setting without considering connectivity among systems. In this paper, we present the effective connectivity of security equipments and countermeasure methodology against DDoS attack. In practice, it is approved by experimentation that this designed methdology is better than existing network structure in the efficiency of block and endurance. Therefore, we would like to propose the effective security control measures responding and enduring against discriminated DDoS attacks through this research.

  • PDF

Human Activity Recognition Using Sensor Fusion and Kernel Discriminant Analysis on Smartphones (스마트폰에서 센서 융합과 커널 판별 분석을 이용한 인간 활동 인식)

  • Cho, Jung-Gil
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.5
    • /
    • pp.9-17
    • /
    • 2020
  • Human activity recognition(HAR) using smartphones is a hot research topic in computational intelligence. Smartphones are equipped with a variety of sensors. Fusing the data of these sensors could enable applications to recognize a large number of activities. However, these devices have fewer resources because of the limited number of sensors available, and feature selection and classification methods are required to achieve optimal performance and efficient feature extraction. This paper proposes a smartphone-based HAR scheme according to these requirements. The proposed method in this paper extracts time-domain features from acceleration sensors, gyro sensors, and barometer sensors, and recognizes activities with high accuracy by applying KDA and SVM. This approach selects the most relevant feature of each sensor for each activity. Our comparison results shows that the proposed system outperforms previous smartphone-based HAR systems.

A Study on the Evaluation of MPEG-4 Video Decoding Complexity for HDTV (HDTV를 위한 MPEG-4 비디오 디코딩 복잡도의 평가에 관한 연구)

  • Ahn, Seong-Yeol;Park, Won-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.595-598
    • /
    • 2005
  • MPEG-4 Visual is, and international standard for the object-based video compression, designed for supporting a wide range of applications from multimedia communication to HDTV. To control the minimum decoding complexity required at the decoder, the MPEG-4 Visual standard defines the co-called video buffering mechanism, which includes three video buffer models. Among them, the VCV(Video Complexity Verifier) defines the control of the processing speed for decoding of a macroblock, there are two models: VCV and B-VCV distinguishing the boundary and non-boundary MB. This paper presents the evaluation results of decoding complexity by measuring decoding time of a MB for rectangular, arbitrarily shaped video objects and the various types of objects supporting the resolution of HDTV using the optimized MPEG-4 Reference Software. The experimental results shows that decoding complexity varies depending on the coding type and more effective usage of decoding resources may be possible.

  • PDF

Development of Functional USB Solution to Contain Executable Software Using Scanning Mechanism (스캐닝 기법을 이용한 실행 소프트웨어를 담을 수 있는 기능성 USB 솔루션 개발)

  • Kim, Nam-Ho;Hwang, Bu-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.947-952
    • /
    • 2012
  • The technology suggested in this study is the method to contain executable software in a portable storage devices like the USB and install an application program to operate it in any client devices. To solve this problem, we can store pre-scanned information on the above client's files, registry, and services in the device before installing the proper application program to be installed using the scanning method and manage in the USB the resources that generated and changed by post-scanning the information after installing the above application program in the client's device. After that, necessary files in the client to be used can be copied for using, and after use, related files are deleted, and it also includes the process to return to the previous system environment. This method is advantageous in that once any sort of application programs needed to be installed gets to be installed in an external portable storage devices like the USB, the application program installed can be operated in any computer not raising any issues like illegal copy.