• Title/Summary/Keyword: Access to Information (A2I)

Search Result 195, Processing Time 0.029 seconds

Algorithm Design and Implementation for Safe Left Turn at an Intersection Based on Vehicle-to-Vehicle Communications (교차로에서의 안전 좌회전을 위한 차량간 통신 기반 알고리즘 설계 및 구현)

  • Seo, Hyun-Soo;Kim, Hyo-Un;Noh, Dong-Gyu;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.165-171
    • /
    • 2013
  • WAVE(Wireless Access in Vehicular Environments) is a representative V2V communication protocol and its standards of MAC and PHY parts except for security were published. In order to control traffic flow and ensure driver's safety using V2V communication, various projects are conducting. In particular, safety application has been researched. Therefore, in this paper, we designed the safety application algorithm, which informs a driver of the dangerous status when driver tries to turn left in an intersection and we also implemented the algorithm. Proposed algorithm configures a model for a host vehicle and a vehicle coming in opposite lane and in case that there is collision hazard it provides warning message to driver by using HMI. In order to evaluate the proposed algorithm's performance, we configured the test bed using test vehicles and we tested the algorithm on proving ground with the composed test scenarios. As test results, our system showed excellent performance. If the infrastructures for V2I communications are constructed, we will optimize our system more precisely and stably.

Proposal and Simulation of Flow Control and Error Recovery in EAP for Performance Improvement (EAP 성능 향상을 위한 흐름 제어 및 오류 복구 방식의 제안과 시뮬레이션)

  • Cha, Eun-Chul;Han, Chan-Kyu;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.299-306
    • /
    • 2009
  • Followed by the popularity of the Internet, a number of access technologies to the Internet have been developed. EAP is an authentication framework. It is designed to provide the authentication functionality in the access network. Because of its flexibility and extensibility EAP poses a global solution for the authentication supported by many access networks. However, EAP has critical weaknesses in the protocol which may, in turn, decrease the EAP performance. Some of the weaknesses are caused by the "lock-step" flow control which only supports a single packet in flight. Considering the weaknesses, we propose a solution for the flow control. Using simulation we prove that our solutions improve the EAP performance.

Speed-optimized Implementation of HIGHT Block Cipher Algorithm (HIGHT 블록 암호 알고리즘의 고속화 구현)

  • Baek, Eun-Tae;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.495-504
    • /
    • 2012
  • This paper presents various speed optimization techniques for software implementation of the HIGHT block cipher on CPUs and GPUs. We considered 32-bit and 64-bit operating systems for CPU implementations. After we applied the bit-slicing and byte-slicing techniques to HIGHT, the encryption speed recorded 1.48Gbps over the intel core i7 920 CPU with a 64-bit operating system, which is up to 2.4 times faster than the previous implementation. We also implemented HIGHT on an NVIDIA GPU equipped with CUDA, and applied various optimization techniques, such as storing most frequently used data like subkeys and the F lookup table in the shared memory; and using coalesced access when reading data from the global memory. To our knowledge, this is the first result that implements and optimizes HIGHT on a GPU. We verified that the byte-slicing technique guarantees a speed-up of more than 20%, resulting a speed which is 31 times faster than that on a CPU.

A Critical Analysis of the Studies on Children's and Adolescents' Information Seeking and Use Part I: Focusing on Information Seeking and Use for Learning (어린이와 청소년의 정보이용에 관한 연구의 비판적 분석 I - 학습을 위한 정보이용을 중심으로 -)

  • Chung, Jin-Soo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.20 no.2
    • /
    • pp.143-153
    • /
    • 2009
  • This paper identifies some natural habits and patterns of children's and adolescents' information seeking and use by drawing a wide range of studies conducted with children and adolescents as study participants. The patterns reported here indicate that children's and adolescents' information seeking and use are affected by the nature of information tasks, the qualities of access tools, their cognitive ability to seek and use information, and their prior knowledge and experience about the tasks and topics given. The findings should provide insights for identifying future research issues as well as for programming the information environments particularly conducive to learning.

WWW Based Instruction Systems for English Learning: GAIA

  • Park, Phan-Woo
    • Journal of The Korean Association of Information Education
    • /
    • v.3 no.2
    • /
    • pp.113-119
    • /
    • 2000
  • I studied a distance education model for English learning on the Internet. Basic WWW files, that contain courseware, are constructed with HTML, and functions, which are required in learning, are implemented with Java. Students and educators can access the preferred unit composed of the appropriate text, voice and image data by using a WWW browser at any time. The education system supports the automatic generation facility of English problems to practice reading and writing by making good use of the courseware data or various English text resources located on the Internet. Our system has functions to manage and control the flow of distance learning and to offer interaction between students and the system in a distributed environment. Educators can manage students' learning and can immediately be aware of who is attending and who is quitting the lesson in virtual space. Also, students and educators in different places can communicate and discuss a topic through the server. I implemented these functions, which are required in a client/server environment of distance education, with the use of Java. The URL for this system is "http://park.taegu-e.ac.kr" in the name of GAIA.

  • PDF

Design and Parameter Optimization of Virtual Storage Protocol (iATA) for Mobile Devices (모바일 기기를 위한 가상 스토리지 프로토콜(iATA)의 설계 및 파라메터 최적화)

  • Yeoh, Chee-Min;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.267-276
    • /
    • 2009
  • Nowadays, numerous of valuable internet services are available not only for personal computer but also for mobile appliances in wireless network environment. Therefore, as the amount of contents is increased for those services, the storage limitation on mobile devices has became a significant issue. In this paper, we present a new block-level storage network protocol, iATA (Internet Advanced Technology Attachment) as a solution to the above problem. iATA is designed to transport ATA block-level data and command over the ubiquitous TCP/IP network. With iATA, a mobile appliance is able to access and control the ATA storage devices natively through network from anywhere and at anytime as if the storage devices is attached locally. We describe the concepts, design and diverse consideration of iATA protocol. Based on the benchmark experiments and application exploitation, we strongly believe that iATA as a light-weight protocol is efficient and cost-effective to be used as a storage network protocol on a resource limited device that utilizes common-off-the-shelf storage hardware and existing IP infrastructure.

Design of Access Security System in conjunction with SNS Service based on the Physical Computing (피지컬 컴퓨팅 기반에서의 SNS 서비스를 연계한 출입 보안 시스템 설계)

  • Kim, Heewan;Jung, Gillyoung
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.93-101
    • /
    • 2015
  • Today, various access security technology appeared in this society as a result of the informatization and automation. Most building, floor, or door security certification system for the office units are installed, but there are many inconvenient matters. In order to minimises this, we used the face recognition function via the camera, and various sensors. In this paper, I designed the access security system through physical computing which Arduino offered, facial recognition program, and Twitter. Check that the personal information stored in the individual RFID tag is matched to the personal information stored on the existing server. Face recognition program input the face using a camera, and allow to confirm the identity. The system's abnormal or when the unauthenticated person is to penetrate, the system transmits the Twitter status message to the manager. It was designed continuously to monitor the status in real time in this way.

A Study on the Spatial Indexing Scheme in Geographic Information System (지리정보시스템에서 공간 색인기법에 관한 연구)

  • 황병연
    • Spatial Information Research
    • /
    • v.6 no.2
    • /
    • pp.125-132
    • /
    • 1998
  • The I/O performance for spatial queries is extremely important since the handling of huge amount of multidimensional data is required in spatial databases for geographic information systems. Therefore, we describe representative spatial access methods handling complex spatial objects, z-transform B tree, KDB tree, R tree, MAX tree, to increase I/O performance. In addition, we measure the performance of spatial indexing schemes by testing against various realistic data and query sets. Results from the benchmark test indicates that MAX outperforms other indexing schemes on insertion, range query, spatial join. MAX tree is expected to use as index scheme organizing storage system of GIS in the future.

  • PDF

Usability Study on Public Access Defibrillator (공공설치용 자동제세동기의 사용성 연구)

  • Oh, Young-Jin
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.32 no.1
    • /
    • pp.61-66
    • /
    • 2009
  • Usability study of the CU Medical "i-PAD" AED was conducted to validate the usability of the device, primarily focused on the trained user as well as the utility of the training material. Comparing these results of the trained participants to those obtained by Callejas et al. (2004), who studied video-trained users of two commercially available Philips AEDs (FR2 and HS1) using a male manikin only, the participants in this study were more successful (100% vs. 85.7%-FR2 vs. 88.9%-HS1) and faster to shock (58.5s-i-PAD vs. 91s-FR2 vs. 90s-HS1). While the focus of this study was on validating ease of use for trained bystanders, the results of the untrained condition showed that, from a usability perspective, these devices perform as well as any other AEDs already approved and available for purchase for untrained bystander use, as evidenced by the comparison to various published research results.

A Study on the Design of High speed LIne Memory Circuit for HDTV (HDTV용 고속 라인 메모리 회로 설계에 관한 연구)

  • 김대순;정우열;김태형;백덕수;김환용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.5
    • /
    • pp.529-538
    • /
    • 1992
  • Recently, image signal processing techniques for HDTV signal have been drastically developed. This kind of skill improvement on signal processing need specific memory device for video signal. in this paper, data latch scheme which implements CMOS flip-flop to hold Information from in-put strobe and new reading method is devised to attain a proper access time suitable for HDTY signal. Compared with conventional write scheme, data latch method has two procedures to complete write operation : bit line write and storage cell write, enabling concurrent I /0 operation at the same address. Also, fast read access is possible through the method similar to static column mode and the separated read word line.

  • PDF