• Title/Summary/Keyword: Automatic Access

Search Result 268, Processing Time 0.026 seconds

A Study about Finding Optimal Path Using HAS Dynamic Programming (RAS Dynamic Programming을 이용한 최적 경로 탐색에 관한 연구)

  • Kim, Jeong-Tae;Cho, Hyun-Chul;Lee, Kwon-Soon
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2007.12a
    • /
    • pp.226-227
    • /
    • 2007
  • Significant increase of container flows in marine terminals requires more efficient automatic port systems. This paper presents a novel routing and collision avoidance algorithm of linear motor based shuttle cars using random access sequence dynamic programming (RAS DP). The proposed RAS DP is accomplished online for determining optimal paths for each shuttle car.

  • PDF

Research for Adaptive Wireless AP Profile selection via Efficient network connection of Android System-based (안드로이드 시스템 기반의 적응적 무선 AP 프로파일 선택을 통한 효율적 네트워크 연결에 관한 연구)

  • Back, Jong-Kyung;Han, Kyung-Sik;Sonh, Seung-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.632-634
    • /
    • 2012
  • In order for the connection to the wireless network from the list of priorities of the wireless AP to AP profile automatic connection by selecting the preferred method to register a profile, which is determined at the time of the change, the user does not respond to the demands of the part. In this study, the frequency of the user's access in accordance with the wireless AP, and by creating a profile, the user needs to meet with regard to network access adaptive research.

  • PDF

On the Comparison of Call Overload Control Methodologies in ATM Networks (ATM 통신망에서의 호 과부하 제어방식 비교)

  • Song, Ki-Sang;Lee, Jean
    • IE interfaces
    • /
    • v.9 no.3
    • /
    • pp.168-179
    • /
    • 1996
  • Automatic repeated recalling from individual computing equipments such as PC and workstations, to access ATM networks may result in call overload to networks. Call overload causes to waste network resources and fail to meet user call processing QoS requirements. We evaluate two call connection request methods: the back-off recall method(BRM) which makes recall with random waiting time after rejection, and the direct recall method(DRM) which repeats call connection request whenever call request is rejected. We evaluate their performances by simulation and it shows that as the total number of attached terminals to each access node increases, BRM performs better than DRM in terms of the call acceptance level and effective network bandwidth utilization.

  • PDF

The SOTDMA Algorithm Development and Verification for AIS (AIS용 SOTDMA알고리즘 구현 및 검증에 관한 연구)

  • Lee, Sang-Hoey;Lee, Hyo-Sung;Lim, Yong-Kon;Lee, Heung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.3037-3039
    • /
    • 2005
  • The AIS(Automatic Identification System) transmits the position of ships and other information to prevent accidents which could occur in the sea. It has to be developed SOTDMA(Self-Organized Time Division Multiple Access) Algorithm which is important on wireless communication method for the AIS because It is based on ITU(International Telecommunication Union) M.1371-1 of the international standard therefore, we need to develop a performance evaluation simulator efficiently to develop and analyze SOTDMA Algorithm. this paper shows the method of designing it. Real ships access The VHF maritime mobile band but in this performance evaluation simulator several ship objects access the shared memory. Real ships are designed as the object and the wireless communication channel is designed as the shared memory. The ships apply for real virtual data which got from assistance hardware and The SOTDMA Algorithm driving state verifies the performance evaluation simulator by IEC(International Electrotechnical commission) 61993-2. After verifying results the performance evaluation simulator is correctly satisfied with IEC 61993-2. So we expect that it helps not only the AIS technology developed but also verify new SOTDMA Algorithm

  • PDF

Development of Simulator for AIS Algorithm Verification (AIS 알고리즘 검증용 시뮬레이터 개발)

  • Lee, Hyo-Sung;Lee, Seung-Min;Lee, Heung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.478-480
    • /
    • 2005
  • The AIS(Automatic Identification System) transmits the position of ships and other information to prevent accidents which could occur in the sea. It has to be developed SOTDMA(Self-Organized Time Division Multiple Access) Algorithm which is important on wireless communication method for the AIS because It is based on ITU(International Telecommunication Union) M.1371-1 of the international standard therefore, we need to develop a performance evaluation simulator efficiently to develop and analyze SOTDMA Algorithm. This paper shows the method of designing it. Real ships access The VHF maritime mobile band but in this performance evaluation simulator several ship objects access the shared memory. Real ships are designed as the object and the wireless communication channel is designed as the shared memory. The ships apply for real virtual data which got from assistance hardware and The SOTDMA Algorithm driving state verifies the performance evaluation simulator by IEC(International Electrotechnical commission) 61993-2. After verifying results the performance evaluation simulator is correctly satisfied with IEC 61993-2. So we expect that it helps not only the AIS technology developed but also verify new SOTDMA Algorithm.

  • PDF

Development of Control System of High-speed ATC of Machining Center (Machining Center의 고속 ATC 제어 시스템의 개발)

  • Han, Dong-Chang;Lee, Dong-Il;Song, Yong-Tae;Lee, Seok-Gyu
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.19 no.9
    • /
    • pp.125-132
    • /
    • 2002
  • We use a compound-cam twin arm structure and random tool access method to achieve a faster ATC (Automatic Tool Changer) system for the accurate position and rotation control of a tool magazine and an exchange am. Based on the data obtained from various sensors, it is possible to follow the sequence of commands in each control step for an exchange arm. However, it is not so easy to reduce the exchange time of the system because of the slow responses of the sensors and execution mode delays of PLC (Programmable Logic Controller) scan time. In this paper, we propose a new programmed limit-switch position control method to obtain the shortest possible delays for the random tool access method and compound-cam twin arm structure. With some experimental results, we have achieved below 0.9sec tool exchange time with the proposed method.

Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare (유헬스케어의 무선환경에 적합한 WiMAX 보안 측정 및 분석)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.279-284
    • /
    • 2013
  • Wireless access network section needs strong security which supports high data rate and mobility not to invade patient's privacy by exposing patient's sensitive biometric from automatic implantable device that is adapted to u-healthcare service. This paper builds test bed and performs assessment and measurement of security ability of WiMAX network to transmit and receive mobile patient's biometric by building WiMAX network in wireless access network not to expose paitne's biometirc at wireless access network section to the third person. Specially, this paper compares and assesses data security, MAC control message security, handover conection delay, and frame loss and bandwidth of ECDH at the layer of WiMAX security compliance, WiMAX MAC IPSec, and MAC.

Network 2-Factor Access Control system based on RFID security control system (RFID 출입통제시스템과 연동한 네트워크 이중 접근통제 시스템)

  • Choi, Kyong-Ho;Kim, Jong-Min;Lee, Dae-Sung
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.53-58
    • /
    • 2012
  • Network Access Control System that is one of the efforts to protect the information of internal applies to effectively control of insider and automatic network management and security. However, it has some problems : spoofing the authorized PC or mobile devices, connect to the internal network using a system that authorized users are away. In addition, information leakage due to malicious code in the same system. So in this paper, Network 2-Factor Access Control System based on RFID security control system is proposed for safety communication environment that performing a two-factor authentication using authorized user and devices to connect to the internal network.

Design and Implementation of GT4 based Database Access and Integration Service in Grid Environment (그리드 환경에서 글로버스 툴킷 4 기반 데이터베이스 접근 및 통합 서비스 설계 및 구현)

  • Hyuk-Ho Kim;Ha-Na Lee;Pil-Woo, Lee;Yang-Woo Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1103-1106
    • /
    • 2008
  • Data Grid is a kind of Grid computing provides the cooperative environment through the distributed data sharing, and can manage the massive data easily and efficiently. We designed and implemented Globus Toolkit4 (GT4) based database access and integration service (GDAIS). This service was implemented as Grid service for run on the GT4 which is Grid middleware. And it provides functions which are automatic registration of database in virtual organization, distributed query service, and the unified user interface. Also this system can use components which are provided from GT4. Therefore it can improve the efficiency to distribute and manage databases, can easily access and integrate of the distributed heterogeneous data in Grid environments.

A GateSensor for Effective and Efficient Entering/Taking Management of Vehicles for Construction Logistics (건설 자재 반출입 차량 관리 효율화를 위한 게이트센서)

  • Yoon, Su-Won;Song, Jae-Hong;Shin, Tae-Hong;Chin, Sang-Yoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.1
    • /
    • pp.85-96
    • /
    • 2011
  • The access monitoring and control system of vehicles involved in construction logistics has been evolved from paper-based through bar code-based and to RFID-based management with pursuing automatic data collection and management. However, existing management methods have a limit that they still need manpower allocation for access control of vehicles. Therefore this research has proposed an framework that includes devices and an information system for effective and efficient data collection for access control of vehicles for construction logistics. And the proposed framework has been verified through a laboratory test using a prototype system developed in this research. It is expected that the installation methods of RFID antenna and tag for the framework could be applied to not only the access control of construction site but also various RFID applications at construction sites.