• Title/Summary/Keyword: 연동제어

Search Result 902, Processing Time 0.026 seconds

Actual State of Structures and Environmental Control Facilities for Tomato Greenhouses in Chungnam Region (충남지역 토마토 재배온실의 구조와 환경조절설비 실태분석)

  • Nam, Sang-Woon;Kim, Young-Shik
    • Korean Journal of Agricultural Science
    • /
    • v.36 no.1
    • /
    • pp.73-85
    • /
    • 2009
  • An investigation was conducted to get the basic data for establishing structural safety and environmental management of tomato greenhouses in Chungnam region. The contents of the investigation consisted of actual state of greenhouse structures and environmental control facilities. Most of greenhouses were arch type single-span plastic houses and they had too low height for growing tomatoes. Frameworks of multi-span greenhouses were suitable, but those of single-span were mostly insufficient. Every greenhouse had thermal curtain movable or covering fixed inside the greenhouse for energy saving, and heating facilities were mostly warm air heater. Irrigation facilities were mostly drip tube and controlled by manual operation or timer. Almost all of the greenhouses didn't install high level of environmental control facilities such as ventilator, air circulation fan, $CO_2$ fertilizer, insect screen, supplemental light, and cooling device.

  • PDF

Conceptual Design on the ISDN Service Node for Multi-party Connection Services -Part II. A Study on the Control Procedures for the Service Node - (ISDN에서의 다자간 접속 서비스 제공을 위한 서비스노드의 개념적 설계 - 제2부 : 서비스노드 제어절차에 관한 연구 -)

  • 옥승수;강민석;조규섭;박병철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.2
    • /
    • pp.242-253
    • /
    • 1994
  • For the implementation of a Service Node, which is proposed in the companion paper to provide multiparty conference type sevices in the ISDN, we define some technical aspects such as connection control, service control procedure and control messages in this paper. Additional connection control procedures for the multiparty connections are annexed to the CCITT Rec. Q.931 and Q.764 for the ISDN subscriber and common channel interoffice signaling. A new set of service control procedures is also established according to the necessary service control functions. The messages for these procedures are formatted using user-to-user signaling parts of Q.931 and Q.763 messages not to affect on the existing signaling system. Some technical requirements of subscriber terminal for the multiparty services are also deduced.

  • PDF

Android Storage Access Control for Personal Information Security (개인정보를 위한 안드로이드 저장장치 접근제어)

  • You, Jae-Man;Park, In-Kyoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.123-129
    • /
    • 2013
  • Android file system is vulnerable to the external access of system resources via its arbitrary access mode and need user's control for SD and UMS medias due to its open architecture. In response to the device control, there is a drawback that its controlability is valid only in the case of embedded linux kernel with VDC function. Hence the solution is to directly implement VDC through system call, with another security module for device storage than system module being added to android system. In this paper the new method of android storage access control for personal information is proposed via VDC for mount system of storage. The access method for SD and UMS were implemented using VDC and mount mechanism. This access control system has been designed to control the granted users in kernel level if files are flowed out by copying. As a result, it was proved through testing that the access control system has exactly detected the write access operation.

A Study on Robotic Arm Control Method Based on Upper Extremity Electromyogram (상지 근전도 기반의 로봇 팔 제어방법에 대한 연구)

  • Kang, S.Y.;Eom, S.H.;Jang, M.S.;Lee, E.H.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.9 no.1
    • /
    • pp.73-80
    • /
    • 2015
  • In this paper, we propose the robotic arm control method based on upper extremity electromyogram for lower upper extremity amputation patient. The muscle activity of the forearm flexor, forearm extensor and biceps was analyzed to utilize distribution of muscle activity to a specific position in order to the control input. This control input is converted into a control command for controlling the robotic arm through the algorithm. For the experiment and verify the proposed method, 5DoF robotic arm control system was constructed with 1 channel EMG Module and PC applications through the interworking with each module to perform a three-channel EMG analysis. For accuracy and performance evaluation of control, Experiments were performed with robotic arms moving objects. As a result of experiments which after training for 10 hours by middle 20's man, Validity of the proposed method was evaluated based an average accuracy of 92.5%.

  • PDF

Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system (유닉스 시스템에서 다양한 접근제어 정책을 이용한 커널 수준의 자동 암호화 기법)

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.387-396
    • /
    • 2003
  • Many studies have been done on secure kernel and encryption filesystem for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policy like ACL, MAC, RBAC and so on, but cannot protect user or system data from stealing backup media or disk itself. In addition to access control policy, there are many studies on encryption filesystem that encrypt file data within system level. However few studies have been done on combining access control policy and encryption filesystem. In this paper we proposed a new encryption filesystem that provides a transparency to the user by integrating encryption service into virtual filesystem layer within secure kernel that has various access control policies. Proposed encryption filesystem can provide a simple encryption key management architecture by using encryption keys based on classes of MAC policy and overcome a limit of physical data security of access control policy for stealing.

Device Control System based on Brain Wave Data (뇌파데이터 기반의 디바이스 제어 시스템)

  • Lee, So-Hyun;Lee, Ye-Jeong;Lee, Seok-cheol;Seo, Jeongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.813-815
    • /
    • 2016
  • This paper implements a device control system based on the brain wave data. Brain-Computer Interface (BCI) technology can pass directly to the system without going through the operation of the language or body. By controlling the device to detect brain waves in real time according to the change of status it helps to ease life for a variety of services, such as disabled people with limited mobility or students, people who need multi-tasking. In addition, it is possible to develop an application service such as the home device control system. A device control system implemented in the paper based on the data collected from the EEG Headset associated to control the power of the smart phone and audio. Control the power ON / OFF operation by the Attention, and support service functions to control the audio by the Meditation and Eye blink. It was confirmed that the device control using the brain wave data to be operated through a laboratory test successfully.

  • PDF

A Scenario-Based User-Oriented Integrated Architecture for Supporting Interoperability among Heterogeneous Home Network Middlewares (이질적인 홈 네트워크 미들웨어 상호 연동성 지원을 위한 사용자 중심의 시나리오 기반 통합 구조)

  • Kim, Min-Chan;Lee, Hark-Jin;Kim, Sung-Jo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.1
    • /
    • pp.59-73
    • /
    • 2007
  • Although there exist many middlewares such as Havi, Jini, LonWorks, UPnP, and SLP, new middlewares specialized for diverse information appliances are expected to appear continuously as home networks evolve. In this paper, we examine an integrated architecture for supporting interoperability among heterogeneous middlewares under home network, we also propose and implement a scenario-based user-oriented integrated architecture for efficient home automation which is different from existing methods. HOMI(Homenetwork Middleware for Interoperability) architecture proposed in this paper provides interfaces that assist users with designing and modifying desirable scenarios using a script interpreter language HOMIL(HOMI Language). Different from an existing integrated middleware architecture, HOMI improves efficiency and convenience of interoperation between heterogeneous appliances for home automation allowing users to design and organize scenarios through these interfaces. HOMI classifies interoperation services into time contort, synchronization context, and asynchronization context and helps to execute next services considering contexts when a specific event occurs. Applying modified scenarios immediately to home network environment, HOMI provides users with seamless services without installing new applications, updating the server, or rebooting in order to adopt new scenarios. Lastly, distribution agents into several devices, we solved the overhead problem occurred in a centralized architecture for integrated middleware.

A Study on Smart Home Service Bundle Architecture based on OSGi(Open Service Gateway Initiative) (OSGi(Open Service Gateway Initiative)기반의 Smart Home Service Bundle 연구)

  • 손민우;최종화;김건희;박병철;신동일;신동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10b
    • /
    • pp.586-588
    • /
    • 2004
  • 가정 내의 가전기기들이 디지털화되고 있고, 이것들을 네트워크로 연결하여 원격지에서 제어하는 스마트 홈 관련 기술들이 현실화되고 있다. 이러한 환경에서의 컴퓨팅을 위해서는 응용 프로그램간의 호환성 뿐 아니라 데이터의 호환성, 그리고 이종의 프로토콜간의 연동이 필수적이다 따라서 이를 위한 소프트웨어가 바로 스마트 홈 미들웨어이다. OSGi(Open Service Gateway Initiative)(8)는 장비 연결 및 제어로 얻을 수 있는 유효한 서비스나 여러 미들웨어들 간의 통합을 위한 제반 환경 제공을 목표로 하는 비 표준화 단체로써 OSGi 프레임워크 환경에서 서비스들은 서비스 게이트웨이와 서비스 번들의 life-cycle을 따라 동적으로 전개된다. 본 저자들은 SMF(Service Management framework)(9)를 사용하여 OSGi를 기반으로 한 Smart Home Service Bundle에 관해서 연구하였다.

  • PDF

Coordination among the Security Systems using the Blackboard Architecture (블랙보드구조를 활용한 보안 모델의 연동)

  • 서희석;조대호
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.9 no.4
    • /
    • pp.310-319
    • /
    • 2003
  • As the importance and the need for network security are increased, many organizations use the various security systems. They enable to construct the consistent integrated security environment by sharing the network vulnerable information among IDS (Intrusion Detection System), firewall and vulnerable scanner. The multiple IDSes coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (Blackboard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (Blackboard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete Event system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses to these detection information.

The design of Next Generation Telematics Mobile Platform Architecture (차세대 텔레매틱스 모바일 플랫폼 구조 설계)

  • Shin Chang-Sub;Lee Hyun;Lee In-Whan;Oh Hyun-Seo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.3 no.1 s.4
    • /
    • pp.67-74
    • /
    • 2004
  • Next generation telematics technology, offering new and diverse multimedia service by connecting car and wireless access network, has been presented with promising industry. Telematics technology was simply to monitor and control the in-vehicle devices and to navigate the road in the early days but nowadays, telematics technology has provided the mobile internet access service, LBS service, agent rescue service and multimedia service to us using connection of wireless access network. In this paper, telematics mobile platform architecture is proposed for service promotion and efficiency.

  • PDF