• Title/Summary/Keyword: 충돌 감지

Search Result 228, Processing Time 0.025 seconds

MAC Protocol Design for Visual Light LAN using LED Light (LED 조명 기반의 무선 가시광 LAN 통신을 위한 MAC 프로토콜 설계)

  • Jeon, Jong-Bae;Choi, Jung-Ho;Kim, Sung-Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4B
    • /
    • pp.391-398
    • /
    • 2011
  • In this paper, we propose a MAC protocol for visible light wireless LAN using LED light. The proposed MAC protocol has a function of automatic direction optimization for LED transceiver. There is periodical time slot for broadcasting and registration in the proposed MAC protocol. We used polling method for data transfer in the protocol since visible light is hard to detect carrier and collision by other mobile stations; thus we cannot use CSMA/CD method in visible light LAN. We also amended the MAC frame of IEEE 802.11 to propose a revised version for visible light wireless LAN using LED light. We investigate the performance of the proposed MAC protocol. When the bit rate of physical layer is 100 Mb/s, the net data throughput using the proposed MAC protocol is estimated to 94.386 Mb/s.

Probabilistic Neighbor Discovery Algorithm in Wireless Ad Hoc Networks (무선 애드혹 네트워크에서의 확률적 이웃 탐색 기법)

  • Song, Taewon;Park, Hyunhee;Pack, Sangheon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.9
    • /
    • pp.561-569
    • /
    • 2014
  • In wireless ad hoc networks, neighbor discovery is essential in the network initialization and the design of routing, topology control, and medium access control algorithms. Therefore, efficient neighbor discovery algorithms should be devised for self-organization in wireless ad hoc networks. In this paper, we propose a probabilistic neighbor discovery (PND) algorithm, which aims at reducing the neighbor discovery time by adjusting the transmission probability of advertisement messages through the multiplicative-increase/multiplicative-decrease (MIMD) policy. To further improve PND, we consider the collision detection (CD) capability in which a device can distinguish between successful reception and collision of advertisement messages. Simulation results show that the transmission probabilities of PND and PND with CD converge on the optimal value quickly although the number of devices is unknown. As a result, PND and PND with CD can reduce the neighbor discovery time by 15.6% to 57.0% compared with the ALOHA-like neighbor discovery algorithm.

Design of Application Sharing System for Collaborative Works in 3D Virtual Environment supporting Multi-Participants (다중 참여자를 지원하는 3차원 가상환경에서 공동작업을 위한 어플리케이션 공유 시스템 설계)

  • Tak, Jin-Hyun;Lee, Sei-Hoon;Wang, Chang-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2
    • /
    • pp.355-364
    • /
    • 2000
  • Application sharing for collaborative works make multiple participants to be capable of collaborative developments through sharing development tools and applications which is distributed to various system without spatial restriction. However, applying legacy application sharing to CSCW based virtual environment has a problem because it dont consider 3D space and it disturbs the harmonic interaction of participants. In this study, we designed application sharing system for collaborative works in 3D virtual environment to share application effectively on collaborative virtual environment. The designed application sharing system for collaborative works in 3D virtual environment consist of application sharing manager, group manager and communication manager. This system is able to perceive event of 3D space about application of participant on 3D virtual environment by agent which moves to participant sites and get an ordered events and conflict among participants through scheduling. Therefore, designed application sharing system for collaborative work in 3D virtual environment can support efficient collaborative works and improve reusability of legacy application through using easily legacy application in 3D virtual environment when CSCW application development for virtual environments.

  • PDF

A Study of Internet Address Collision Detection Method (인터넷 주소 충돌 감지에 관한 연구)

  • 위선정;임영희;이태헌;박기홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.545-547
    • /
    • 2004
  • Currently possibility of the change of seal computer it increases geometrical progression and the general individuals the knowledge which is special regarding the ip are using the flow child blood which it Provides without from the isp enterprise. But most of the case peon of the school which uses the fixation child blood or the company because is not the knowledge against a TCP/IP address is not oneself at deliberation or real income and it will use the TCP/IP address of the different user and the network whole it will paralyze, the original user will not be able to use the network and it makes. With information where address information where the network administrator present time after data base anger one uses address information of the civil official objective personal computers and network systems of the watch inside in the dictionary is stored will be same from the dissertation which it sees hereupon and the web which it will yell it leads and packet it detects, the use of the TCP/IP address which goes wrong in the user and it notifies the method which is the possibility of closing the paralysis of the network system which it follows in the IP address fringe land due to a deliberation or a real income to sleep it presents it does.

  • PDF

Assessment technology for spatial interaction of Artificial Monitoring System through 3-dimensional Simulation (3차원 시뮬레이션을 이용한 인위감시체계의 공간대응성능 평가기술)

  • Kim, Suk-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.1426-1433
    • /
    • 2015
  • CCTV-applied monitoring is an effective measure to suppress potential crimes and record objective relationship; however, there is no methodology that can quantitatively compare and assess the afore-mentioned effects. Thus, this study intended to construct the methodology and analysis application that can measure the changes in the space-corresponding performance of CCTVs depending on installation measures by using 3-dimenstional virtual simulation technology. For analysis, the raster-based Isovist theory was 3-dimensionally expanded and the amount of incident sight line to each point was accumulated. At the same time, the amount of overlapped monitoring in the CCTV cameras that were connected to each measurement node was accumulated for cross-analysis. By applying the examples and analyzing the results, it was possible to construct an analysis application in use of collision detection model and quantify the changes of monitoring performance depending on positioning alternative of the cameras. Moreover, it enabled intuitive review and supplementation by reproducing visible shadow areas in a graph.

Vision-based Real-time Vehicle Detection and Tracking Algorithm for Forward Collision Warning (전방 추돌 경보를 위한 영상 기반 실시간 차량 검출 및 추적 알고리즘)

  • Hong, Sunghoon;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.962-970
    • /
    • 2021
  • The cause of the majority of vehicle accidents is a safety issue due to the driver's inattention, such as drowsy driving. A forward collision warning system (FCWS) can significantly reduce the number and severity of accidents by detecting the risk of collision with vehicles in front and providing an advanced warning signal to the driver. This paper describes a low power embedded system based FCWS for safety. The algorithm computes time to collision (TTC) through detection, tracking, distance calculation for the vehicle ahead and current vehicle speed information with a single camera. Additionally, in order to operate in real time even in a low-performance embedded system, an optimization technique in the program with high and low levels will be introduced. The system has been tested through the driving video of the vehicle in the embedded system. As a result of using the optimization technique, the execution time was about 170 times faster than that when using the previous non-optimized process.

Real-time Path Replanning for Unmanned Aerial Vehicles: Considering Environmental Changes using RRT* and LOSPO (무인 항공기를 위한 실시간 경로 재계획 기법: RRT*와 LOSPO를 활용한 환경 변화 고려)

  • Jung Woo An;Ji Won Woo;Hyeon Seop Kim;Sang Yun Park;Gyeon Rae Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.4
    • /
    • pp.365-373
    • /
    • 2023
  • Unmanned aerial vehicles are widely used in various fields, and real-time path replanning is a critical factor in enhancing the safety and efficiency of these devices. In this paper, we propose a real-time path replanning technique based on RRT* and LOSPO. The proposed technique first generates an initial path using the RRT* algorithm and then optimizes the path using LOSPO. Additionally, the optimized path can be converted into a trajectory that considers actual time and the dynamic limits of the aircraft. In this process, environmental changes and collision risks are detected in real-time, and the path is replanned as needed to maintain safe operation. This method has been verified through simulation-based experiments. The results of this paper make a significant contribution to the research on real-time path replanning for UAVs, and by applying this technique to various situations, the safety and efficiency of UAVs can be improved.

An Experimental Study on the Automobile Engine Room Fire Using the Extinguishing Agents (소화약제를 이용한 자동차 엔진룸 화재 실험에 관한 연구)

  • Han, Yong-Taek;Kim, Dong-Ho;Kwon, Sung-Pil
    • Fire Science and Engineering
    • /
    • v.28 no.4
    • /
    • pp.1-7
    • /
    • 2014
  • Several complex devices and equipments are installed in the car's engine room, including various kind of oils or other flammable materials. So re-ignition is very likely to take place in it. In addition, it is restrictive for the driver or the occupant to open the bonnet and to spray the fire extinguisher in the engine room due to the high possibility of explosion. Therefore, a fire extinguishing system, which can detect a fire and inject the fire extinguishing agent to extinguish it, and fire extinguishing agents including HFC-227ea, which can stand the high temperature within the engine room and hold the viscosity sufficient to keep it in the kind of foam, were developed and tested. And the suffocation effect and the cooling effect come from the fire extinguishing principle of the foam fire extinguishing agent and the inhibiter catalyst effect come from the one of HFC-227ea was led simultaneously, and fire extinguishing agents without the secondary damage caused by residuals after the fire extinguishment like a case of the powder fire extinguishing agent, were developed. And experiments using a vehicle collision after the discharge is complete, foreign material can be removed without extinguishing the advantage that experimental results obtained.

Rollback Dependency Detection and Management with Data Consistency in Collaborative Transactional Workflows (협력 트랜잭셔널 워크플로우에서 데이터 일관성을 고려한 철회 종속성 감지 및 관리)

  • Byun, Chang-Woo;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.30 no.2
    • /
    • pp.197-208
    • /
    • 2003
  • Abstract Workflow is not appropriately applied to coordinated execution of applications(steps) that comprise business process such as a collaborative series of tasks because of the lacks of network infra, standard of information exchange and data consistency management with conflict mode of shared data. Particularly we have not mentioned the problem which can be occurred by shared data with conflict mode. In this paper, to handle data consistency in the process of rollback for failure handling or recovery policy, we have classified rollback dependency into three types such as implicit rollback dependency in a transactional workflow, implicit rollback dependency in collaborative transactional workflows and explicit rollback dependency in collaborative transactional workflows. Also, we have proposed the rollback dependency compiler that determines above three types of rollback dependency. A workflow designer specifies the workflow schema and the resources accessed by the steps from a global database of resources. The rollback dependency compiler generates the enhanced workflow schema with the rollback dependency specification. The run-time system interprets this specification and executes the rollback policy with data consistency if failure of steps is occurred. After all, this paper can offer better correctness and performance than state-of-the-art WFMSs.

A Study on Verification of the effectiveness of Mutually Recognizable Traffic Safety Facilities (상호인식 교통안전시설물 현장적용에 따른 효과검증 연구)

  • Kim, Ki-Nam;Jeong, Yong-Ho;Lee, Min-jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.468-474
    • /
    • 2019
  • Korea had the highest accident rate among OECD countries in 2018, with 8.4 per 100,000 population, ranking 4th among 35 countries. In addition, the accident rate of traffic with children and the elderly was also high. This study reviewed the relevant literature and analyzed the traffic-accident analysis system. Customized traffic safety facilities were developed. In addition, by measuring the visibility of the traffic safety facilities by installing a test bed, this study measured the forward driving frequency and vehicle driving speed while driving. As a result of applying the "pedestrian pedestrian model" collision test model, the possibility of serious injury after installing the facility was reduced greatly to 4.6%. In this study, the visibility of traffic safety facilities and the effect of reducing the traffic speed were verified through test beds. Recognizing traffic safety facilities will reduce traffic accidents.