• Title/Summary/Keyword: 제어 통신

Search Result 8,215, Processing Time 0.032 seconds

A Study on Characteristic Analysis of Single-Stage High Frequency Resonant Inverter Link Type DC-DC Converter (단일 전력단 고주파 공진 인버터 링크형 DC-DC 컨버터의 특성해석에 관한 연구)

  • Won, Jae-Sun;Park, Jae-Wook;Seo, Cheol-Sik;Cho, Gyu-Pan;Jung, Do-Young;Kim, Dong-Hee
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.2
    • /
    • pp.16-23
    • /
    • 2006
  • This paper presents a novel single-stage high frequency resonant inverter link type DC-DC converter using zero voltage switching with high power-factor. The proposed topology is integrated half-bridge boost rectifier as power factor corrector(PFC) and half-bridge high frequency resonant converter into a single-stage. The input stage of the half-bridge boost rectifier works in discontinuous conduction mode(DCM) with constant duty cycle and variable switching frequency. So that a boost converter makes the line current follow naturally the sinusoidal line voltage waveform. Simulation results have demonstrated the feasibility of the proposed high frequency resonant converter. Characteristics values based on characteristics analysis through circuit analysis is given as basis data in design procedure. Also, experimental results are presented to verify theoretical discussion. This proposed inverter will be able to be practically used as a power supply in various fields as induction heating applications, fluorescent lamp and DC-DC converter etc.

Implementation of a Sensor Node with Convolutional Channel Coding Capability (컨벌루션 채널코딩 기능의 센서노드 구현)

  • Jin, Young Suk;Moon, Byung Hyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.1
    • /
    • pp.13-18
    • /
    • 2014
  • Sensor nodes are used for monitoring and collecting the environmental data via wireless sensor network. The wireless sensor network with various sensor nodes draws attention as a key technology in ubiquitous computing. Sensor nodes has very small memory capacity and limited power resource. Thus, it is essential to have energy efficient strategy for the sensor nodes. Since the sensor nodes are operating on the same frequency bands with ISM frequency bands, the interference by the devices operating on the ISM band degrades the quality of communication integrity. In this paper, the convolutional code is proposed instead of ARQ for the error control for the sensor network. The proposed convolutional code was implemented and the BER performance is measured. For the fixed transmitting powers of -19.2 dBm and -25dBm, the BER with various communication distances are measured. The packet loss rate and the retransmission rate are calculated from the measured BER. It is shown that the porposed method obtained about 9~12% and 12-19% reduction in retransmission rate for -19.2 dBm and -25 dBm respectively.

Trust Management and Privacy Protection for Mobile Digital ill Wallets (모바일 전자 ID 지갑에 적합한 신뢰 관리 및 개인 정보보호 방안)

  • Jang, Gong-Soo;Yun, Ju-Seung;Lee, Hang-Suk;Jung, Han-Wul;Park, Young-Su;Choi, Dea-Sun;Jin, Seung-Hun
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.297-308
    • /
    • 2009
  • In 2008, ETRI developed a new mobile digital ID wallet, in which anyone can store personal information and PKI credential. When the wallet is used, privacy protection is one of the most important problems and personal information should be protected under various usage scenarios such as exchanging sensitive information in on/off-line environments, joining as a new member in the web site, etc. In this paper, we propose a triangular trust management scheme that can effectively manage trustness and also protect sensitive personal information. This scheme relies on three techniques: PKI, reputation and condition (situation context). We implemented prototype of our scheme, and tested it under various scenarios, which showed that the proposed scheme can effectively be used for diverse cases.

A Study on the High Speed Train Localization Using Doppler Frequency in the Wireless Communication (무선통신 도플러 주파수를 이용한고속열차 위치 추정에 관한 연구)

  • Kim, Jungtai
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.826-833
    • /
    • 2017
  • It is important to localize trains precisely for the purpose of controlling them and there have been many studies designed to accomplish this without the need for wayside systems. Since trains run on fixed railway lines, it is possible to search in one direction to localize them. Moreover, it is also possible to know the shape of the line in advance. In the case of high speed trains, their speed and, therefore, their Doppler frequency is relatively high and the railway line is either linear or circular with a large radius. In this study, we utilize these features and propose a train localization method using the Doppler frequency of the signals transmitted from two points (base stations). We derive localization equations for a linear line, circular line, and mixed line (linear plus circular) respectively. Though Doppler radars are usually used to measure speed, the proposed method obtains the location information and the speed successively using the ratio of the doppler frequencies of two signals without knowing the location information or the speed. Computer simulations are performed to show the variation of the estimation error according to the train's location and the measurement error level. The conditions required to obtain the target error level and the increase in the estimation error according to the measurement error are compared between the proposed and conventional methods. The results show the superior performance and robustness of the proposed method.

Distributed Construction of the Multiple-Ring Topology of the Connected Dominating Set for the Mobile Ad Hoc Networks: Boltzmann Machine Approach (무선 애드혹 망을 위한 연결 지배 집합 다중-링 위상의 분산적 구성-볼츠만 기계적 접근)

  • Park, Jae-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.3
    • /
    • pp.226-238
    • /
    • 2007
  • In this paper, we present a novel fully distributed topology control protocol that can construct the multiple-ring topology of Minimal Connected Dominating Set (MCDS) as the transport backbone for mobile ad hoc networks. It makes a topology from the minimal nodes that are chosen from all the nodes, and the constructed topology is comprised of the minimal physical links while preserving connectivity. This topology reduces the interference. The all nodes work as the nodes of the distributed parallel Boltzmann machine, of which the objective function is consisted of two Boltzmann factors: the link degree and the connection domination degree. To define these Boltzmann factors, we extend the Connected Dominating Set into a fuzzy set, and also define the fuzzy set of nodes by which the multiple-ring topology can be constructed. To construct the transport backbone of the mobile ad hoc network, the proposed protocol chooses the nodes that are the strong members of these two fuzzy sets as the clusterheads. We also ran simulations to provide the quantitative comparison against the related works in terms of the packet loss rate and the energy consumption rate. As a result, we show that the network that is constructed by the proposed protocol has far better than the other ones with respect to the packet loss rate and the energy consumption rate.

Reducing Flooding Latency in Power Save Mode of IEEE 802.11-based Mobile Ad hoc Networks (IEEE 802.11 기반 이동 애드혹 망의 전력 절감 모드에서 플러딩 지연의 개선)

  • 윤현주;서명환;마중수
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.532-543
    • /
    • 2004
  • Mobile Ad hoc NETworks (MANET) consist of mobile nodes which are usually powered by battery Approaches for minimizing power consumption have been proposed for all network layers and devices. IEEE 802.11 DCF (Distributed Coordination Function), a well-known medium access control protocol for MANETS, also defines a power save mode operation. The nodes in power save mode periodically repeat the awake state and the doze state in synchronized fashion. When all nodes are in the awake state, the exchange the announcements for the subsequent message transmission with neighbors. The nodes that send or receive the announcements stay awake for data transmission, and others go into the dole state. The previous works for enhancing the power save mode operation have focused on shortening the duration of the awake state. We observed that the longer sleeping period results in seriously long delivery latency and the consequent unnecessary power consumption as well, because the packets can move forward only one hop for a fixed interval. In this paper, we propose an improved protocol for the power save mode of IEEE 802.11 DCF, which allows the flooding packets to be forwarded several hops in a transmission period. Our approach does not reduce the duration of compulsory awake period, but maximizes its utilization. Each node propagates the announcements for next flooding to nodes of several hops away, thus the packets can travel multiple hops during one interval. Simulation results of comparison between our scheme and the standard show a reduction in flooding delay maximum 80%, and the unicasting latency with accompanying flooding flows near 50%, with slight increase of energy consumption.

An Efficient TCP Buffer Tuning Algorithm based on Packet Loss Ratio(TBT-PLR) (패킷 손실률에 기반한 효율적인 TCP Buffer Tuning 알고리즘)

  • Yoo Gi-Chul;Kim Dong-kyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.121-128
    • /
    • 2005
  • Tho existing TCP(Transmission Control Protocol) is known to be unsuitable for a network with the characteristics of high RDP(Bandwidth-Delay Product) because of the fixed small or large buffer size at the TCP sender and receiver. Thus, some trial cases of adjusting the buffer sizes automatically with respect to network condition have been proposed to improve the end-to-end TCP throughput. ATBT(Automatic TCP fluffer Tuning) attempts to assure the buffer size of TCP sender according to its current congestion window size but the ATBT assumes that the buffer size of TCP receiver is maximum value that operating system defines. In DRS(Dynamic Right Sizing), by estimating the TCP arrival data of two times the amount TCP data received previously, the TCP receiver simply reserves the buffer size for the next arrival, accordingly. However, we do not need to reserve exactly two times of buffer size because of the possibility of TCP segment loss. We propose an efficient TCP buffer tuning technique(called TBT-PLR: TCP buffer tuning algorithm based on packet loss ratio) since we adopt the ATBT mechanism and the TBT-PLR mechanism for the TCP sender and the TCP receiver, respectively. For the purpose of testing the actual TCP performance, we implemented our TBT-PLR by modifying the linux kernel version 2.4.18 and evaluated the TCP performance by comparing TBT-PLR with the TCP schemes of the fixed buffer size. As a result, more balanced usage among TCP connections was obtained.

Lightweight Authentication Scheme for Secure Data Transmission in Terrestrial CNPC Links (지상 CNPC 링크에서 안전한 데이터 전송을 위한 경량화된 인증기법)

  • Kim, Man Sik;Jun, Moon-Seog;Kang, Jung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.9
    • /
    • pp.429-436
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) that are piloted without human pilots can be commanded remotely via frequencies or perform pre-inputted missions. UAVs have been mainly used for military purposes, but due to the development of ICT technology, they are now widely used in the private sector. Teal Group's 2014 World UAV Forecast predicts that the UAV market will grow by 10% annually over the next decade, reaching $ 12.5 billion by 2023. However, because UAVs are primarily remotely controlled, if a malicious user accesses a remotely controlled UAV, it could seriously infringe privacy and cause financial loss or even loss of life. To solve this problem, a secure channel must be established through mutual authentication between the UAV and the control center. However, existing security techniques require a lot of computing resources and power, and because communication distances, infrastructure, and data flow are different from UAV networks, it is unsuitable for application in UAV environments. To resolve this problem, the study presents a lightweight UAV authentication method based on Physical Unclonable Functions (PUFs) that requires less computing resources in the ground Control and Non-Payload Communication (CNPC) environment, where recently, technology standardization is actively under progress.

Driver's Status Recognition Using Multiple Wearable Sensors (다중 웨어러블 센서를 활용한 운전자 상태 인식)

  • Shin, Euiseob;Kim, Myong-Guk;Lee, Changook;Kang, Hang-Bong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.6
    • /
    • pp.271-280
    • /
    • 2017
  • In this paper, we propose a new safety system composed of wearable devices, driver's seat belt, and integrating controllers. The wearable device and driver's seat belt capture driver's biological information, while the integrating controller analyzes captured signal to alarm the driver or directly control the car appropriately according to the status of the driver. Previous studies regarding driver's safety from driver's seat, steering wheel, or facial camera to capture driver's physiological signal and facial information had difficulties in gathering accurate and continuous signals because the sensors required the upright posture of the driver. Utilizing wearable sensors, however, our proposed system can obtain continuous and highly accurate signals compared to the previous researches. Our advanced wearable apparatus features a sensor that measures the heart rate, skin conductivity, and skin temperature and applies filters to eliminate the noise generated by the automobile. Moreover, the acceleration sensor and the gyro sensor in our wearable device enable the reduction of the measurement errors. Based on the collected bio-signals, the criteria for identifying the driver's condition were presented. The accredited certification body has verified that the devices has the accuracy of the level of medical care. The laboratory test and the real automobile test demonstrate that our proposed system is good for the measurement of the driver's condition.

유리반도체

  • 박창엽
    • 전기의세계
    • /
    • v.24 no.4
    • /
    • pp.6-10
    • /
    • 1975
  • 반도체와 그의 응용소자는 지난 20여년간 눈부식 발전을 이룩하였다. 이는 주로 단결정의 제작기술 진보에 의한 것으로 본다. 그러나 최근 단결정과는 전연 다른 유리질반도체가 국제회의에서도 그 우수성을 의논하기에 이르렀다. 유리질 반도체가 주목을 끌게 된겻은 1968년 Ovshinsky가 "무질서 구조에 있어서 가역적 스위칭현상"이라는 논문이 발표되고 유리질 반도체를 사용한 Ovonic 스위칭 소자의 출현에 기인된다. 유리질 반도체가 전기스위칭 작용, 기억작용을 나타낸다고 하는 Ovshinsky의 발표는 전자제치로서의 응용에 대해 찬반되는 의견이 있었지만 물성적 연구의 교량적인 역할을했다고 할 수 있다. 이런 반도체에 속하는 재료는 호칭도 여러가지로 유리질반도체, 비정질반도체 무정형반도체등으로 불리어진다. 단결정체가 각 격자간에 장거리질서를 갖는 반면 유리질 반도체는 무질서한 구조로 각 격자간에 단거리 질서를 갖는 것이 단결정과는 본질적으로 다른 점이라 본다. 유리 반도체의 종류는 첫째, 원소성 유리반도체로서 Ge, Si, Se, Te 들과 같이 단일원소로 된 겻과, 둘째 IV, V, VI족 원소로 된 공유결합 합금인 As$_{2}$Se$_{3}$-As$_{2}$Te$_{3}$ 계 Ge Si As Te계등의 칼코게나이드 유리등으로 금지대는 어느 것이나 2eV이하이다. 셋째 이론결합인 SiO $Al_{2}$O$_{3}$ Ta$_{2}$O$_{3}$Si$_{3}$N$_{4}$등의 산화물 및 질화물로 대표되는 분자성 비정질 물질로서 금지대는 2eV보다 큰 세종류로 크게 분류할 수 있다. 분류할 수 있다. 한다. 단 개개의 문제에 관한 구체적인 해석 또는 검토에 관하여는 다음 기회에 미루기로하고, 우선 여기서는 당면문제로서 대처하지 않으면 안될 자동주파수제어문제및 계통의 경제운용문제만에 한정하여, 이것을 우리나라의 현상과 관련시켜 개설하고, 이들의 자동화에 관한 기본적인 문제를 간단히 적어 보겠다. 가능하다. 제작완료된 ASIC은 기능시험을 완료했으며 실제 line-of-sight(LOS) 시스템 구현에 적용중이다. 시대를 살아 갈 회원들이다. '컨텐츠의 시대'가 개막되는 것이며, 신세기통신과 SK텔레콤은 선의의 경쟁 과 협력을 통해 이동인터넷 서비스의 컨텐츠를 개발해 나가게 될 것이다. 3배가 높았다. 효소 활성에 필수적인 물의 양에 따른 DIAION WA30의 라세미화 효율에 관하여 실험한 결과, 물의 양이 증가할수록 그 효율은 감소하였다. DIAION WA30을 라세미화 촉매로 사용하여 아이소옥탄 내에서 라세믹 나프록센 2,2,2-트리플로로에틸 씨오에스터의 효소적 DKR 반응을 수행해 보았다. 그 결과 DIAION WA30을 사용하지 않은 경우에 비해 반응 전환율과 생성물의 광학 순도는 급격히 향상되었다. 전통적 광학분할 반응의 최대 50%라는 전환율의 제한이 본 연구에서 찾은 DIAION WA30을 첨가함으로써 성공적으로 극복되었다. 또한 고체 염기촉매인 DIAION WA30의 사용은 라세미화 촉매의 회수 및 재사용이 가능하게 해준다.해준다.다. TN5 세포주를 0.2 L 규모 (1 L spinner flask)oJl에서 세포간의 응집현상 없이 부유배양에 적응,배양시킨 후 세포성장 시기에 따른 발현을 조사한 결과 1 MOI의 감염조건 하에서는 $0.6\times10^6$cell/mL의 early exponential시기의 세포밀도에서 72시간 배양하였을 대 최대 발현양을

  • PDF