• Title/Summary/Keyword: Application protocol

Search Result 1,507, Processing Time 0.033 seconds

Sensitivity and accuracy for rheological simulation of cement-based materials

  • Kim, Jae Hong;Jang, Hye Rim;Yim, Hong Jae
    • Computers and Concrete
    • /
    • v.15 no.6
    • /
    • pp.903-919
    • /
    • 2015
  • The flow of freshly mixed cement-based material shows thixotropy, which implies some difficulties on robust measurement of its rheological properties: The flow curve of thixotropic materials depends on the used protocol. For examples, higher viscosity is obtained when the rate of shear strain is more quickly increased. Even though precise measurement and modelling of the concrete rheology needs to consider the thixotropic effect, engineers in the concrete field prefer considering as a non-thixotropic Herschel-Bulkley fluid, even more simply Bingham fluid. That is due to robustness of the measurement and application in casting process. In the aspect of simplification, this papers attempts to mimic the thixoropic flow by the non-thixotropic Herschel-Bulkley model. Disregarding the thixotropy of cement based materials allows us to adopt the rheological concept in the field. An optimized protocol to measure the Bingham parameters was finally found based on the accuracy and reproducibility test of cement paste samples, which minimizes the error of simulation stemming from the assumption of non-thixotropy.

Implementation of Wireless PGN Analyzer for ISOBUS network

  • Tumenjargal, Enkhbaatar;Badarch, Luubaatar;Lee, Kangsan;Ham, Woonchul;Doopalam, Enkhzul;Togooch, Amartuvshin
    • Smart Media Journal
    • /
    • v.4 no.2
    • /
    • pp.46-54
    • /
    • 2015
  • Communication between ECUs (Electronic Control Units) in agricultural machineries tends to use IS011783 widely, that is PGN (Parameter Group Number) based communication protocol lays on CAN protocol by altering its identifier part. Messages in line are transferred and received between ECUs according to ISO11783 standard. This paper discusses about design of wireless monitoring system. We used an ARM Cortex-M3 microcontroller embedded development board and marvel8686 wireless module. The wireless ISOBUS monitoring system, attached to communication line, reads messages, interpret them, and display them on the screen in easily comprehendible form. It can be used to generate messages and monitor the traffic on physical bus systems. The monitoring system connected to ECUs, monitor and simulate real traffic of communication and functionality of the ECUs. In order to support our work, we have implemented the monitoring tool. The development consists of two parts: GUI of the application and firmware level programming. Hence the monitoring system is attached to the communication line and equipped by Wi-Fi module; farmer/dispatcher in a farm monitors all messages in communication line on personal computer and smart device.

IDENTITY-BASED AAA AUTHENTICATION PROTOCOL

  • Kim Dong-myung;Cho Young-bok;Lee Dong-heui;Lee Sang-ho
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.678-682
    • /
    • 2005
  • IETF suggested AAA for safe and reliable user authentication on various network and protocol caused by development in internet and increase in users. Diameter standard authentication system does not provide mutual authentication and non-repudiation. AAA authentication system using public key was suggested to supplement such Diameter authentication but application in mobile service control nodes is difficult due to overhead of communication and arithmetic. ID based AAA authentication system was suggested to overcome such weak point but it still has the weak point against collusion attack or forgery attack. In this thesis, new ID based AAA authentication system is suggested which is safe against collusion attack and forgery attack and reduces arithmetic quantity of mobile nodes with insufficient arithmetic and power performance. In this thesis, cryptological safety and arithmetical efficiency is tested to test the suggested system through comparison and assessment of current systems. Suggested system uses two random numbers to provide stability at authentication of mobile nodes. Also, in terms of power, it provides the advantage of seamless service by reducing authentication executing time by the performance of server through improving efficiency with reduced arithmetic at nodes.

  • PDF

End-to-end Transmission Performance of VoIP Traffics based on Mobility Pattern over MANET with IDS (IDS가 있는 MANET에서 이동패턴에 기반한 VoIP 트래픽의 종단간 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.7
    • /
    • pp.773-778
    • /
    • 2014
  • IDS(Intrusion Detection System) can be used as a countermeasure for blackhole attacks which cause degrade of transmission performance by causing of malicious intrusion to routing function of networks. In this paper, effects of IDS for transmission performance based on mobility patterns is analyzed for MANET(Mobile Ad-hoc Networks), a suggestion for effective countermeasure is considered. Computer simulation based on NS-2 is used in performance analysis, VoIP(Voice over Internet Protocol) as an application service is chosen for performance measure. MOS(Mean Opinion Score), call connection ratio and end-to-end delay is used as performance parameter.

A Study on the technical application of VoIP Service in e-Trade (전자무역의 VoIP 서비스기술 활용에 관한 연구)

  • Jeong Boon-Do
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1339-1346
    • /
    • 2006
  • This thesis outlines a preparation plan for e-Trade business service regarding tendency development in super-highway information network including internet, cable, and wireless communication. It also explains two perspectives in e-Trade market: changes of circumstances and consumerism, and revitalization devices of Von(Voice over Internet Protocol) service technology for creating new market in rapidly changing IP(Internet Protocol) environment. Plus it illustrates what core competence and progress business organizations must have in current situation, forecasts turns of future e-Trade market, and analyzes technological applications of VoIP service in an extended viewpoint of corporate strategy.

Design of the protocol for reporting sensor data on passenger ship (여객선 센서 및 장비 정보 전송을 위한 ASM 설계)

  • Kim, Kil-Yong;Jo, Gi-Jong;Lee, Seo-Jeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2016.05a
    • /
    • pp.62-63
    • /
    • 2016
  • A variety of sensors and equipment are installed on passenger ships. Data collection from these sensors and associated equipment is required for the safe navigation and behavior analysis of ships, but when the ship sails out of the area where it is not possible to use the LTE communication, other types of networks have to be able to support to transmit these information. such as AIS, satellite communication and MF/HF. In this paper, we survey data protocol of onboard sensors and design ASM messages to transfer sensor data on board to the shore-side system.

  • PDF

Study on Subscription Client System Based on .NET (.NET 기반의 예약 시스템에 관한 연구)

  • 최현주;장민석
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.740-744
    • /
    • 2003
  • Nowaday, a system development which does to the foundation is drawing the concern that new foundation technique for Web application development. Various terminal is a service supply is not easy. Because of the protocol to use differs for every each terminal, We must make a server program the each every protocol. A reservation system setup itself was not easy at the reason. Because of the importance of the field which is the mobile have been enlarged to a day, We have been raised in reality to the problem to solve. This facility which the technique supports in the paper to use, We can offer the service to server program. The design will try to implement about the reservation system besides.

  • PDF

NAT-PT Operation for IPv4 and IPv6 Nodes to Coexist (IPv4와 IPv6의 연동과 호환을 위한 NAT-PT에 관한 연구)

  • 이승민;민상원;김용진;박수홍
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.532-534
    • /
    • 2000
  • IPv4(Internet Protocol version 4)의 차세대 버전인 IPv6는 기존 IPv4의 문제점인 주소부족 및 새로운 부가기능 등의 필요성 때문에 IETF(Internet Engineering Task Force)에서 IPv4를 대체하기 위해 개발한 프로토콜이다. 하지만 IPv4를 어느 한순간에 IPv6로 대체하는 것은 불가능하기 때문에 기존 IPv4와의 호환 및 연동을 위한 터널링 및 기타 여러 가지 transition mechanism들이 고려되고 있다. 이러한 mechanism들 중에서 최근 표준으로 발표된 NAT-PT(Network Address Translation $\square$ Protocol Translation)는 DNS-ALG (Domain Name System $\square$ Application Level Gateway)라는 개념을 도입하여 IPv4와 IPv6간의 양방향 주소변환 및 프로토콜 변환기능을 수행한다. 각각의 기능에서 주소 변환은 주소크기와 형식이 다른 IPv4와 Pv6간의 서로 상대 노드를 엑세스할 수 있도록 하고 프로토콜 변환은 다른 버전의 프로토콜을 사용하는 노드들이 상대노드가 보낸 패킷의 헤더정보를 이해할 수 있도록 한다. 그리고 이러한 기본적인 변환 외에 헤더정보의 정확한 전달을 위해서는 기존의 path MTU(Maximum Transgfer Unit) discovery 그리고 pseudo header checksum 등도 고려되어야 한다.

  • PDF

Implementation of Integrated Interface based on Wire and Wireless Dual Network for Ensuring the Reliability of Intelligent LED Lighting System (지능형 LED 조명 시스템의 신뢰성 확보를 위한 유무선 이중망 통합 인터페이스 구현)

  • Lee, Un-Seon;Park, Tae-Jin;Park, Man-Gon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.2
    • /
    • pp.306-312
    • /
    • 2014
  • The ZigBee communication method, which is the most frequently applied to the LED lighting control system, has drawbacks of low-speed and low-capacity, and the communication failure possibility due to environmental influences is on the rise. Therefore, it is important to secure the communication reliability by applying an integrated interface with a wire-wireless dual-network. This paper developed a communication module, which has a platform converging and combining the ZigBee of USN environments with the PLC of power line communication environments, to implement a dualized communication interface system supporting the wire-wireless integrated protocol, and implemented a wire-wireless networking device and a control system software technology. As a result, it was automatically switched into the PLC communication within 4.4 seconds on average when there was an access failure in the ZigBee communication network, so a reliable communication network was built.

Design of KT′s Single Sign-On on Public Key Infrastructure (공개키 기반 구조에서 KT Single Sign-On 설계)

  • Yeon, Seung-Ho;Park, Hyun-Gyu;Oh, Hee-Soo;Kim, Yeong-Heon;Jun, Byoung-Min
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.231-239
    • /
    • 2002
  • This paper gives a comprehensive overview of the SSO solution design on the intranet. SSO described in this paper is based on LDAP, PKI and CA. We designed the data structure to hold many various application services by changing the attribute and DN of LDAP DB. We built LDAP DB using the employee records stored in our organization database. LDAP DB is routinely updated from the database. CA Server that depends on PKI is used to issue the certificates. SHTTP based on SSL is used to protect the data between certificate server and the intranet users.