• Title/Summary/Keyword: Access Point Control

Search Result 280, Processing Time 0.034 seconds

Application of HACCP principles to MAR-based drinking water supply system (MAR기반 음용수 공급 시스템에의 HACCP 원리 적용)

  • Ji, Hyon Wook;Lee, Sang-Il
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.30 no.5
    • /
    • pp.533-543
    • /
    • 2016
  • Supplying clean and safe water to people is facing both quantitative and qualitative challenges. Due to climate change, access to freshwater becomes increasingly difficult, while pollution from various sources decreases the public trust in water quality. Managed aquifer recharge (MAR) which stores and uses surface water in aquifer is receiving attention as a new technology to secure freshwater. Recently, there is a global expansion in the attempt to combine general purification plants and hazard analysis and critical control point (HACCP) which manages all the process from raw material to consumer for food safety. This research is about an attempt to apply HACCP to the drinking water supply process using MAR to secure both quantity and quality of drinking water. The study site is a MAR plant being constructed in the downstream area of the Nakdong River Basin, South Korea. The incorporation of HACCP with MAR-based water supply system is expected to enhance the safety and reliability of drinking water.

Analysis on a Hip Joint System of New RGO Using Accelerometers (가속도계를 이용한 왕복보행보조기의 고관절 시스템 해석 -인체 진동해석과 FEM 해석을 중심으로-)

  • 김명회;장대진;장영재;박영필
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2003.05a
    • /
    • pp.882-887
    • /
    • 2003
  • This paper presented a design and control of a new RGO(reciprocating gait orthosis)and its simulation. The new RGO was distinguished from the other one by which had a very light-weight and a new RGO(reciprocating gait orthosis) system. The vibration evaluation of the hip joint system on the new RGO(reciprocating gait orthosis)was used to access by the 3-axis accelerometer with a low frequency vibration of less than 30 ㎐. The gait of the new RGO depended on the constrains of mechanical kinematics and the initial posture. The stability of dynamic walking was investigated by analyzing the ZMP (zero moment point) of the new RGO. It was designed according to the human wear type and was able to accomodate itself to the environments of S.C.I. Patients. The joints of each leg were adopted with a good kinematic characteristics. To analyse joint kinematic properties, we made the hip joint system of FEM and the hip joint system by 1-axis and 3-axis Accelerometers.

  • PDF

Beamforming Optimization for Multiuser Two-Tier Networks

  • Jeong, Young-Min;Quek, Tony Q.S.;Shin, Hyun-Dong
    • Journal of Communications and Networks
    • /
    • v.13 no.4
    • /
    • pp.327-338
    • /
    • 2011
  • With the incitation to reduce power consumption and the aggressive reuse of spectral resources, there is an inevitable trend towards the deployment of small-cell networks by decomposing a traditional single-tier network into a multi-tier network with very high throughput per network area. However, this cell size reduction increases the complexity of network operation and the severity of cross-tier interference. In this paper, we consider a downlink two-tier network comprising of a multiple-antenna macrocell base station and a single femtocell access point, each serving multiples users with a single antenna. In this scenario, we treat the following beamforming optimization problems: i) Total transmit power minimization problem; ii) mean-square error balancing problem; and iii) interference power minimization problem. In the presence of perfect channel state information (CSI), we formulate the optimization algorithms in a centralized manner and determine the optimal beamformers using standard convex optimization techniques. In addition, we propose semi-decentralized algorithms to overcome the drawback of centralized design by introducing the signal-to-leakage plus noise ratio criteria. Taking into account imperfect CSI for both centralized and semi-decentralized approaches, we also propose robust algorithms tailored by the worst-case design to mitigate the effect of channel uncertainty. Finally, numerical results are presented to validate our proposed algorithms.

Safety Confirmation of Ship's Crew Using Cell-phone with GPS Receiver and Wireless LAN.

  • Umeno, Chie;Namie, Hiromune;Susuki, Osamu;Yasuda, Akio
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.317-320
    • /
    • 2006
  • Ships and their cargos have been managed safely by positioning report system. However, little attention has been paid to safety of crew's works with danger. The attempt that used PHS inboard was before by the present authors. However, the functions were just voice call and mail exchange. The data acquisition from the terminal by proper control was not possible. Thus the position of the terminal was not available. As for the cell phone of next generation, GPS receiver and wireless LAN are installed by manufacturers. Therefore, we propose a system which uses a cell-phone with GPS receiver on a ship in order to promote the safety of ship's crew. We checked the availability of cell-phone GPS receiver at thirty different points inboard. The positioning was not possible in the areas further than 4m from the window. Then, we proposed the system which follows the positions of the crews and confirms their safety inboard by using the VoIP (Voice over Internet Protocol) function by wireless LAN.

  • PDF

Polling Scheme Adapted to Unbalanced Traffic Load in IEEE 802.11x Wireless LAN (IEEE 802.11x Wireless LAN에서 불균형한 트래픽 부하에 적응적인 폴링 기법)

  • Shin Soo-Young;Park Soo-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.387-394
    • /
    • 2005
  • Every MAC (Medium Access Control) sub-layers of IEEE 802.11x, including IEEE 802.11e, defines Connection-based and CF (Contention Free)-based service functions in common. In this paper, a New-CF method is proposed. In the proposed method, conventional Round Robin method, which is used as a polling method by IEEE 802.11x PCF (Point Coordination Function) or IEE 802.11e HCCA, is modified to give weights to channels with heavier traffic load and to provide those weighted channels with more services. Based on NS-2 simulations, it is verified the proposed method shows better throughput in general, particularly under unbalanced traffic load conditions.

Laser Diagnostics of Spray and Combustion Characteristics Using Multi-Component Mixed Fuels in a D.I. Diesel Engine (다성분 혼합연료를 이용한 디젤 분무 및 연소특성의 광계측 진단)

  • Yoon, Jun-Kyu;Myong, Kwang-Jae;Senda, Jiro;Fujimoto, Hajime;Cha, Kyung-Ok
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.14 no.5
    • /
    • pp.172-180
    • /
    • 2006
  • This study was to analyze the effect of mixed fuel composition and mass fraction on the characteristics of evaporating diesel spray and combustion under the various ambient conditions. The characteristics of vaporization distribution and combustion were visualized by laser induced fluorescent method and direct photography. The experiments were conducted in the constant volume vessel and rapid compression expansion machine with optical access. Multi-component fuels mixed i-octane, n-dodecane and n-hexadecane were injected the vessel and rapid compression expansion machine with electronically controlled common rail injector. Experimental results show that fuel vapor formed stratified distribution. And vaporization and diffusion are become actively increasing in mass fraction of low boiling point component. Consequently multi-component fuels were expected to control the evaporating behavior according to their suitable mass fraction.

Throughput Analysis of ETSI BRAN HIPERLAN/2 MAC Protocol Taking Guard Timing Spaces into Consideration

  • Ko, You-Chang;Son, Yong-Tae;Shin, Yong-Eok;Lee, Hyong-Woo;Cho, Choong-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.515-517
    • /
    • 2003
  • In this paper we examine the effects of the required portions of guard timing spaces in a MAC frame of ETSI BRAN HIPERLAN/2 system such as inter-mobile guard timing space in UL(Up Link) duration, inter-RCH(Random CHannel) guard timing space, sector switch guard timing space. In particular, we calculate the number of OFDM(Orthogonal Frequency Division Multiplexing) symbols required for these guard timing spaces in a MAC frame. We them evaluate the throughput of HIPERLAN/2 system as we vary parameter such as the guard time values defined in [2], the number of DLCCs(Data Link Control Connections), and the number of RCHs. Finally we show by numerical results that the portions for the 새심 summation of required guard timing spaces in a MAC frame are not negligible, and that they should be properly considered when trying to evaluate the performance of MAC protocol of HIPERLAN/2 system and also when determining the number of RCHs as well as the number of DLCCs in UL PDU trains at an AP/CC(Access Point/Central Controller).

  • PDF

A Remote Radio Door Control System Using Smart Phone (스마트폰을 이용한 원격 무선 출입문 관리 시스템)

  • Jang, Seokhun;Lee, Taewoo;Son, Minhan;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.33-35
    • /
    • 2012
  • 최근 와이파이, 블루투스 등 근거리 무선 통신 기술의 발달로 홈네트워크, U-City, 홈오토메이션 등의 실생활 적용이 가능해졌다. 이미 삼성, LG 등의 기업에서는 관련 제품을 양산 및 판매하고 있으며 그 기술의 관련연구 또한 활발하게 진행되고 있다. 하지만 이러한 기존 제품 및 시스템들은 가격이 높고 인터넷을 기반으로 운용되기 때문에 AP (Access Point)가 반드시 존재하여야 하며 가정 내의 모든 전자기기들을 연동시키기 위해 구현이 복잡하다는 문제점을 갖는다. 본 논문에서는 이를 해결하기 위해 기존 와이파이 다이렉트 및 블루투스의 D2D (Device-to-Device) 기술을 적용하여 AP의 필요성을 없애고 불필요한 연동을 제외하며 간단한 구현을 요구하는 저가의 제품을 개발하고자 한다. 실험적인 구현을 위해 모터 및 카메라 제어, 타이머, 통신 등이 가능한 AVR ATmega169 마이크로 컨트롤러와 스마트폰을 사용하여 원격 디지털도어락 관리 시스템을 제안한다.

Shuffling of Elliptic Curve Cryptography Key on Device Payment

  • Kennedy, Chinyere Grace;Cho, Dongsub
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.4
    • /
    • pp.463-471
    • /
    • 2019
  • The growth of mobile technology particularly smartphone applications such as ticketing, access control, and making payments are on the increase. Elliptic Curve Cryptography (ECC)-based systems have also become widely available in the market offering various convenient services by bringing smartphones in proximity to ECC-enabled objects. When a system user attempts to establish a connection, the AIK sends hashes to a server that then verifies the values. ECC can be used with various operating systems in conjunction with other technologies such as biometric verification systems, smart cards, anti-virus programs, and firewalls. The use of Elliptic-curve cryptography ensures efficient verification and signing of security status verification reports which allows the system to take advantage of Trusted Computing Technologies. This paper proposes a device payment method based on ECC and Shuffling based on distributed key exchange. Our study focuses on the secure and efficient implementation of ECC in payment device. This novel approach is well secure against intruders and will prevent the unauthorized extraction of information from communication. It converts plaintext into ASCII value that leads to the point of curve, then after, it performs shuffling to encrypt and decrypt the data to generate secret shared key used by both sender and receiver.

A Study on IoT Devices Vulnerability and Security (IoT 디바이스 보안위협 및 대응방안 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.9-17
    • /
    • 2021
  • Numerous IoT devices are connected to a wireless network environment to collect and transmit data without time and space limitations, but many security vulnerabilities are exposed in these process. But IoT security is not easy to create feasible security standards and device authentication due to differences in the approach or implementation of devices and networks. However, it is clear that the improvement and application of the standard framework for enhancing the security level of the device is the starting point to help the most successful security effect. In this study, we investigate the confidentiality, integrity, availability, and access control implementation plans for IoT devices (which are the basic goals of information security), and standardized security evaluation criteria for IoT devices, and study ways to improve them.