• Title/Summary/Keyword: 접속률

Search Result 267, Processing Time 0.023 seconds

Development of Vessel Communication System for Integrated Management and Inter-exchange of Maritime Data (해상 데이터 통합 관리 및 상호교환을 위한 선박 통신 시스템 개발)

  • Kang, Nam-seon;Kim, Ji-goo;Lee, Seon-ho
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.354-362
    • /
    • 2015
  • In this study, for integrated management and inter-exchange of operational data generated by ships and land-side information on safe and business, a vessel communication system with modular functions was designed that applied high efficiency compression, least-cost algorithms and Inmarsat FBB connection automation system. Performance test at the KTsat Kumsan satellite earth station; system was found to delivered an average transfer speed of 7 kB/S, which was significant improvement from the existing commercial product's average speed of 5 kB/S. It also delivered twice the efficiency of the existing product in terms of compression rate and transfer of the most widely used office files in maritime businesses.

Reconstructing Web Broadcasting Information based on User Retrieval Pattern (무선 환경에서 사용자 검색 성향을 반영한 웹 방송 정보 재구성 기법)

  • Kim, Won-Cheol;Lee, Soo-Cheol;Hwang, Een-Jun;Byeon, Kwang-Jun
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1149-1158
    • /
    • 2004
  • Today the fastest growing communities of web users are mobile visitors who browse web page with wireless PDAs and cellular phones. However, most web pages are optimiaed exclusively for desktop clients on the broadband network and are inconvenient to users with small screen mobile devices. They display only a few lines of text and cannot run client-side programs or scripts due to lack of system resource. Even worse, their connections are usually slow to support most of the data-intensive applications. In this paper, we propose a pageslet scheme that makes it feasible to browse ordinary web pages on small screen mobile devices. It extracts broadcasting sections of user preference from broadcasting web pages and automatically reorganizes the extracted sections for convenient browsing on mobile devices.

Analysis and Design Optimization of Interconnects for High-Speed LVDS Applications (고속 LVDS 응용을 위한 전송선 분석 및 설계 최적화)

  • Ryu, Jee-Youl;Noh, Seok-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.10
    • /
    • pp.70-78
    • /
    • 2009
  • This paper addresses the analysis and the design optimization of differential interconnects for high-speed Low-Voltage Differential Signaling (LVDS) applications. Thanks to the differential transmission and the low voltage swing, LVDS offers high data rates and improved noise immunity with significantly reduced power consumption in data communications, high-resolution display, and flat panel display. We present an improved model and new equations to reduce impedance mismatch and signal degradation in cascaded interconnects using optimization of interconnect design parameters such as trace width, trace height and trace space in differential printed circuit board (FPCB) transmission lines. We have carried out frequency-domain full-wave electromagnetic simulations, and time-domain transient simulations to evaluate the high-frequency characteristics of the differential FPCB interconnects. We believe that the proposed approach is very helpful to optimize high-speed differential FPCB interconnects for LVDS applications.

An Email Vaccine Cloud System for Detecting Malcode-Bearing Documents (악성코드 은닉 문서파일 탐지를 위한 이메일 백신 클라우드 시스템)

  • Park, Choon-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.754-762
    • /
    • 2010
  • Nowadays, email-based targeted attacks using malcode-bearing documents have been steadily increased. To improve the success rate of the attack and avoid anti-viruses, attackers mainly employ zero-day exploits and relevant social engineering techniques. In this paper, we propose an architecture of the email vaccine cloud system to prevent targeted attacks using malcode-bearing documents. The system extracts attached document files from email messages, performs behavior analysis as well as signature-based detection in the virtual machine environment, and completely removes malicious documents from the messages. In the process of behavior analysis, the documents are regarded as malicious ones in cases of creating executable files, launching new processes, accessing critical registry entries, connecting to the Internet. The email vaccine cloud system will help prevent various cyber terrors such as information leakages by preventing email based targeted attacks.

PHR Profiling System Based on FHIR (FHIR 기반 개인건강기록 프로파일링 시스템 개발방법)

  • Kim, Young Sik;Kim, Il Kon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.7
    • /
    • pp.277-282
    • /
    • 2015
  • HL7 released V3 CDA(Clinical Document Architecture) and V2.x message standards for medical information exchange. Currently, these standards are successfully adopted by a number of nations across the globe. However, substantial amount of time is required to develop and implement these standards. Moreover, developers need a lot of time to understand these standards. To solve these issues from 2011, the HL7 standard framework started to discuss Fast Healthcare Interoperability Resources(FHIR) as next generation standard of healthcare information exchange. People's interests toward personal health record and smartphone penetration rate are growing and increasing rapidly. Therefore, our research team believes it is necessary to develop a PHR profiling system which could be accessed by using a smartphone and we developed the system. Through a FHIR Profile editor tool developed in Furore, we found that improvements could be made in generating and changing the profile. In order to build the PHR Profiling system, an Open-API on FHIR is used for exchanging information between electronic medical record system and PHR Profiling system. In the PHR Profiling system, the transactions of information between two systems are provided by RESTful service. In this study, we verify the efficiency of development of the PHR Profiling system through FHIR.

CPVC Valve Tightening Torque Impact Sockets on the Leaks (CPVC 밸브소켓 체결토크가 누수발생에 미치는 영향)

  • Lim, Chun-Ki;Baek, Eun-Sun
    • Fire Science and Engineering
    • /
    • v.30 no.4
    • /
    • pp.46-58
    • /
    • 2016
  • In this study, the stress applied to screw section, strain, displacement, von Mises stress, and the compression stress applied to the rubber packing for watertightness are estimated with computer simulation when the tightening torque of valve socket is in the range of $10{\sim}130N{\cdot}m$ in order to analyze the influence of valve socket screw section in accordance with the excessive tightening which is supposed to be the cause of water leakage from the synthetic resin piping for fire fighting application of sprinkler equipment, and for the sake of verifying this, adequate value of tightening torque and the value of the compression stress of rubber packing are investigated by examining the number of connected thread for each tightening torque, the deformation state of valve socket and rubber packing and conducting the water hammering test. The result of this test is expected to be utilized as the data required for revising the standard or technical criteria to prevent the water leakage of the synthetic resin piping for fire fighting application.

Effective Emergency-Warning Message Transmission in the Vehicle-to-Vehicle Communication Environment (차량 간 통신 환경에서 효과적인 위험 경고 메시지 전송 방안)

  • Byun, Jae-Uk;Kwon, Sung-Oh
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1B
    • /
    • pp.1-8
    • /
    • 2012
  • In this paper, we propose an algorithm to improve collision avoidance in Vehicle-to-Vehicle (V2V) networks based on IEEE 802.11p. Since IEEE 802.11p adopts CSMA/CA as a multiple access scheme and an emergency warning message (EWM) is delivered to behind vehicles in a multi-hop manner, due to transmission collision, the more vehicles in the vehicle chain results in a longer delay. The longer delay increases the possibility of a rear-end collision. In order to ensure message reception with low latency, we consider implicit acknowledgement of a broadcasted EWM message and propose an algorithm to reduce redundant message transactions, called Two-Way Implicit Acknowledgement (TWIA). By simulations, we show that our proposed algorithm can reduce the latency until the last car receives the message by 9% and the success rate every car receives the message within 0.7sec by 12% at 100 fixed-number-of-car environment.

VHDL Implementation of GEN2 Protocol for UHF RFID Tag (RFID GEN2 태그 표준의 VHDL 설계)

  • Jang, Il-Su;Yang, Hoon-Gee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1311-1319
    • /
    • 2007
  • This paper presents the VHDL implementation procedure of the passive RFID tag operating in Ultra High Frequency. The operation of the tag compatible with the EPCglobal Class1 Generation2(GEN2) protocol is verified by timing simulation after synthesis and implementation. Due to the reading range with relatively large distance, a passive tag needs digital processor which facilitates faster decoding, encoding and state transition for enhancement of an interrogation rate. In order to satisfy linking time, the pipe-line structure is used, which can minimize latency to serial input data stream. We also propose the sampling strategy to decode the Preamble, the Frame-sync and PIE symbols in reader commands. The simulation results with the fastest data rate and multi tags environment scenario show that the VHDL implemented tag performs faster operation than GEN2 proposed.

Cross-layer Design and its Performance Evaluation of Joint Routing and Scheduling for Maximizing Network Capacity of Wireless Mesh Networks (무선 메쉬 네트워크의 최대 전송 성능을 위한 라우팅과 스케쥴링의 계층 교차적 설계 및 성능 분석)

  • Min, Seokhong;Kim, Byungchul;Lee, Jaeyong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.30-45
    • /
    • 2014
  • Recently, multimedia application users who demand for ubiquitous computing environment are rapidly increasing, and wireless mesh network is receiving attention as a cost-effective key technology for next generation wireless networking. When multiple flows are transmitting data at the same time in the network, routing for path selection of each flow and link resource allocation for data transmission of each flow are one of the key factors that influence to the effectiveness of the network directly. In this paper, we consider problems for path discovery and resource allocation of links at the same time and we propose an algorithm based on mathematical modeling using a technique for cross-layer optimization design in STDMA-based wireless mesh networks that can enhance transfer performance for each flow. We show by performance analysis that the proposed algorithm can enhance the throughput performance by maximally utilizing given bandwidth resources when the number of flows increase in multi-hop wireless mesh networks.

An Enhanced Fuzzy ART Algorithm for The Effective Identifier Recognition From Shipping Container Image (효과적인 운송 컨테이너 영상의 식별자 인식을 위한 개선된 퍼지 ART 알고리즘)

  • 김광백
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5C
    • /
    • pp.486-492
    • /
    • 2003
  • The vigilance threshold of conventional fuzzy ART algorithm decide whether to permit the mismatch between any input pattern and stored pattern. If the vigilance threshold was large, despite of little difference among input and stored patterns, the input pattern may be classified to new category. On the other hand, if the vigilance threshold was small, the similarity between two patterns may be accepted in spite of lots of difference and the input pattern are classified to category of the stored pattern. Therefore, the vigilance threshold for the image recognition must be experientially set for the good result. Moreover, it may occur in the fuzzy ART algorithm that the information of stored patterns is lost in the weight-adjusting process and the rate of pattern recognition is dropped. In this paper, I proposed the enhanced fuzzy ART algorithm that supports the dynamical setting of the vigilance threshold using the generalized intersection operator of fuzzy logic and the weight value being adaptively set in proportional to the current weight change and the previous weight by reflecting the frequency of the selection of winner node. For the performance evaluation of the proposed method, we applied to the recognition of container identifiers from shipping container images. The experiment showed that the proposed method produced fewer clusters than conventional ART2 and fuzzy ART algorithm. and had tile higher recognition rate.