• Title/Summary/Keyword: 자동설계 시스템

Search Result 2,344, Processing Time 0.026 seconds

Design and Implementation of a Dual Mode Terminal for Fast Handoff between WLAN and Cdma2000 Mobile Networks (무선랜과 Cdma2000 이동통신망간 고속 핸드오프를 위한 이중 모드 단말의 설계 및 구현)

  • Kim, Jun-Ha;Cho, Jin-Sung;Kim, Tae-Hyoun;Lee, Ji-Cheol;Lee, Sang-Do;Lee, Sung-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4B
    • /
    • pp.183-190
    • /
    • 2007
  • The cdma2000 mobile network covers a wide area but its characteristics are high cost and low bandwidth. On the other hand, WLAN covers a small area like a hot spot area but its characteristics are large bandwidth and low cost. Thus we can provide efficient services when we employ an integration network between WLAN and cdma2000 mobile networks. In this paper, we propose an integration scheme between WLAN and cdma2000 mobile networks. In addition, we design and implement the dual mode terminal which receives seamless data services in the integrated network. The proposed dual mode terminal manages connections by monitoring the signal strength of WLAN and selecting a proper network. We validate the functions through the implementation of VOD and show the effectiveness through the performance measurement.

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.

A Study on the Realization of ADS-B 1090ES Ground Station Receivers (ADS-B 1090ES 지상국 수신기 구현에 관한 연구)

  • Park, Chan-Sub;Yoon, Jun-Chul;Cho, Ju-Yong;Shin, Hee-Sung;Seo, Jong-Deok;Park, Hyo-Dal;Kang, Suk-Youb
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.79-88
    • /
    • 2015
  • This paper introduces surveillance equipment "ADS-B", the core subject of traffic control system and study of ADS-B 1090ES ground receiver. The standard is set not only for functional but also its reliability by analyzing international standard documents and existing products. The Bias circuit is designed for less power consumption, low noise and high gain for RF module. The signal processing is capable of overcoming its bad conditions. MCU part is configured with the latest CPU for high speed communication with external parts and SNMP is selected for remote control communication. The performance of developed receiver satisfies national and international standards and its functions are more advanced compared to foreign receivers.

A Study on the Development of RSS Reader Module Based on Ajax for Web 2.0 (웹 2.0을 위한 Ajax기반 RSS리더 모듈 개발에 관한 연구)

  • Kwon, Young-Jae;Kim, Cha-Jong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.7
    • /
    • pp.1263-1270
    • /
    • 2008
  • Recently, it is increasing the interest in previous web and web 2.0 which mean differentiation. The previous system is typical Static web based on client and server model, while web 2.0 mean next generation web which web change and evolve fundamentally. In this paper, I suggest that the module on RSS reader available under web 2.0 standards. A currently used RSS feed do correct the part distortion which ran be possible resolve the encoding problem of Hanguel and third-world language. The suggested module is implemented using Ajax. I developed the module for the use of effective contents on web 2.0 through the DragBox module based on the programming on mobility of Ajax and the design and implementation of automatic update module of RSS feed.

Design of a Binary Adder Structure Suitable for High-Security Public Key Cryptography Processor (고비도 공개키 암호화 프로세서에 적합한 이진 덧셈기의 구조 연구)

  • Moon, Sang-Gook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1976-1979
    • /
    • 2008
  • Studies on binary adder have been variously developed. According to those studies of critical worst delay and mean delay time of asynchronous binary adders, carry select adders (CSA) based on hybrid structure showed 17% better performance than ripple carry adders (RCA) in 32 bit asynchronous processors, and 23% better than in 64 bit microprocessor implemented. In the complicated signal processing systems such as RSA, it is essential to optimize the performance of binary adders which play fundamental roles. The researches which have been studied so far were subject mostly to addition algorithms or adder structures. In this study, we analyzed and designed adders in an asp;ect of synthesis method. We divided the ways of implementing adders into groups, each of which was synthesized with different synthesis options. Also, we analyzed the variously implemented adders to evaluate the performance and area so that we can propose a different approach of designing optimal binary adders.

Design Review of Inter-Modal Terminal Platform for Temperature Load (온도하중을 고려한 인터모달 터미널 플랫폼의 설계 검토)

  • Kim, Kyoung-Su;Kim, Da-Ae;Kim, Heung-Rae;Hyun, Eun-Tack
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.32 no.5
    • /
    • pp.305-311
    • /
    • 2019
  • In this study, we examined the proper spacing between the expansion joints according to the temperature load of the inter-modal terminal platform infrastructure to implement a new inter-modal automated freight transport system, which we intend to introduce in Korea. To review the proper expansion joint spacing of the terminal platforms, we set the maximum expansion joint spacing according to the regional temperature changes using the equation proposed by the Federal Construction Council (FCC) of the United States. Then, the maximum displacement value, which was calculated through the structural analysis program, and the limit of the horizontal displacement of the building structure were compared. The proper expansion joint spacing was selected as the slab length at which the maximum displacement of the structure, due to temperature changes, was below the horizontal displacement limit. Based on the application of maximum expansion joint spacing for each region calculated through the FCC's suggestion, the maximum displacement that could occur within the limit of the lateral displacement of the structure was determined.

Calculation of Probabilistic Damage Stability Based on Grid Model (격자모델을 이용한 확률론적 손상복원력 계산의 전산화)

  • Jong-Ho Nam;Won-Don Kim;Kwang-Wook Kim
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.31 no.1
    • /
    • pp.14-21
    • /
    • 1994
  • The studios on the stability of damaged ships have been carried out continuously to prevent frequent damages or sinkings which cause large loss of life and fortunes. For dry cargo ships, continuing losses have resulted in new legislation of the probabilistic damage stability. IMO has developed requirements for the subdivison and damage stability of dry cargo ships based on probabilistic concepts. The calculation of the probabilistc damage stability is a complicated and iterative job hence development of computer programs is indispensable. In this research, programming of the probabilistic damage stability according to new requirements has been done and the results were compared with those carried out by the other foreign packages. New algorithm using a grid model in a transversal section was introduced to reduce efforts in preparing input data for damage scenarios and as a result, has brought significant improvement in efficiency and performance.

  • PDF

Implementation of Smart Companion Dog Lead Line Integration Module using Heterogeneous Sensor Signal Monitoring (이기종 센서 신호 모니터링을 적용한 스마트 반려견 리드줄 통합 모듈 구현)

  • Cho, Joon-Ho;Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.183-188
    • /
    • 2019
  • As social perceptions of pets change, cultural attitudes toward pets are becoming more friendly. In particular, dogs have been living familiarly and closely with humans for a long time. In the changing times, various services are being used to improve the understanding of dogs and to prevent companion dogs and increase awareness of respect for life. Therefore, in this paper, we implemented a smart lead line in which IoT service and application technology are linked to the walking dog's automatic lead line. To do this, we developed a smart dog lead line by designing and implementing an integrated module in connection with heterogeneous sensors and linking it with a dog lead line. Finally, a smart dog lead line was used to collect the dog's biological signals in real time, identify the location of the dog, and provide a notification system. Through this, we believe that the culture of dog culture can be further grown.

Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems (UHF 수동형 RFID 시스템에 적합한 경량 고속의 보안 프로토콜 설계 및 구현)

  • Kang, You-Sung;Choi, Yong-Je;Choi, Doo-Ho;Lee, Sang-Yeoun;Lee, Heyung-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.117-134
    • /
    • 2010
  • A passive RFID tag which received attention as a future technology for automatic and quick identification faces some difficulties about security problems such as tag authentication, reader authentication, data protection, and untraceability in addition to cost and reliable identification. A representative passive RFID technology is the ISO/IEC 18000-6 Type C which is an international standard for 900 MHz UHF-band. This standard has some difficulties in applying to the security services such as originality verification, tag's internal information protection, and untraceability, because it does not provide high-level security solution. In this paper, we summarize security requirements of ISO/IEC ITC 1/SC 31 international standardization group, propose security protocols suitable for the UHF-band passive RFID system using a crypto engine, and analyze its security strength. In addition, we verify that it is possible to implement a tag conforming with the proposed security protocols by presenting concrete command/response pairs and cryptographic method.

A Study on the Quality Control Method for Geotechnical Information Using AI (AI를 이용한 지반정보 품질관리 방안에 관한 연구)

  • Park, Ka-Hyun;Kim, Jongkwan;Lee, Seokhyung;Kim, Min-Ki;Lee, Kyung-Ryoon;Han, Jin-Tae
    • Journal of the Korean Geotechnical Society
    • /
    • v.38 no.11
    • /
    • pp.87-95
    • /
    • 2022
  • The geotechnical information constructed in the National Geotechnical Information DB System has been extensively used in design, construction, underground safety management, and disaster assessment. However, it is necessary to refine the geotechnical information because it has nearly 300,000 established cases containing a lot of missing or incorrect information. This research proposes a method for automatic quality control of geotechnical information using a fully connected neural network. Significantly, the anomalies in geotechnical information were detected using a database combining the standard penetration test results and strata information of Seoul. Consequently, the misclassification rate for the verification data is confirmed as 5.4%. Overall, the studied algorithm is expected to detect outliers of geotechnical information effectively.