• Title/Summary/Keyword: Communication failure

Search Result 830, Processing Time 0.025 seconds

Reliable Asynchronous Image Transfer Protocol In Wireless Multimedia Sensor Network (무선 멀티미디어 센서 네트워크에서의 신뢰성 있는 비동기적 이미지 전송 프로토콜)

  • Lee, Joa-Hyoung;Seon, Ju-Ho;Jung, In-Bum
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.281-288
    • /
    • 2008
  • Recently, the advance of multimedia hardware has fostered the development of wireless multimedia sensor network which is able to ubiquitously obtain multimedia content such as image or audio from the environment. The multimedia data which has several characteristics such as large size and correlation between the data requires reliability in transmission. However, the existing solution which take the focus on the efficiency of network mainly, is not appropriate to transmit the multimedia data. In the paper, we proposes a reliable asynchronous image transfer protocol, RAIT. RAIT applies double sliding window method in node-to-node image tansfer to prevent the packet loss caused by network congestion. The double sliding window consists of one sliding window for the receiving queue, which is used for prevention of packet loss caused by communication failure between nodes and the other sliding window for the sending queue which prevents the packet loss caused by network congestion. the routing node prevents the packet loss and guarantees the fairness between the nodes by scheduling the packets based on the image non-preemptively. The RAIT implements the double sliding window method by cross layer design between RAIT layer, routing layer, and queue layer. The experiment shows that RAIT guarantees the reliability of image transmission compared with the existing protocol.

Policy and Strategy for Intelligence Information Education and Technology (지능정보 교육과 기술 지원 정책 및 전략)

  • Lee, Tae-Gyu;Jung, Dae-Chul;Kim, Yong-Kab
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.8
    • /
    • pp.359-368
    • /
    • 2017
  • What is the term "intelligence information society", which is a term that has been continuously discussed recently? This means that the automation beyond the limits of human ability in the whole societies based on intelligent information technology is a universalized social future. In particular, it is a concept that minimizes human intervention and continuously pursues evolution to data (or big data) -based automation. For example, autonomous automation is constantly aiming at unmanned vehicles with artificial intelligence as a key element. However, until now, intelligent information research has focused on the intelligence itself and has made an effort to improve intelligence logic and replace human brain and intelligence. On the other hand, in order to replace the human labor force, we have continued to make efforts to replace workers with robots by analyzing the working principles of workers and developing optimized simple logic. This study proposes important strategies and directions to implement intelligent information education policy and intelligent information technology research strategy by suggesting access strategy, education method and detailed policy road map for intelligent information technology research strategy and educational service. In particular, we propose a phased approach to intelligent information education such as basic intelligence education, intelligent content education, and intelligent application education. In addition, we propose education policy plan for the improvement of intelligent information technology, intelligent education contents, and intelligent education system as an important factor for success and failure of the 4th industrial revolution, which is centered on intelligence and automation.

Deployment Strategies of Cloud Computing System for Defense Infrastructure Enhanced with High Availability (고가용성 보장형 국방 클라우드 시스템 도입 전략)

  • Kang, Ki-Wan;Park, Jun-Gyu;Lee, Sang-Hoon;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.3
    • /
    • pp.7-15
    • /
    • 2019
  • Cloud computing markets are rapidly growing as cost savings and business innovation are being carried out through ICT worldwide. In line with this paradigm, the nation is striving to introduce cloud computing in various areas, including the public sector and defense sector, through various research. In the defense sector, DIDC was established in 2015 by integrating military, naval, air and military computing centers, and it provides cloud services in the form of IaaS to some systems in the center. In DIDC and various future cloud defense systems, It is an important issue to ensure availability in cloud defense systems in the defense sector because system failures such as network delays and system resource failures are directly linked to the results of battlefields. However, ensuring the highest levels of availability for all systems in the defense cloud can be inefficient, and the efficiency that can be gained from deploying a cloud system can be reduced. In this paper, we classify and define the level of availability of defense cloud systems step by step, and propose the strategy of introducing Erasure coding and failure acceptance systems, and disaster recovery system technology according to each level of availability acquisition.

A Study for Fire Examples Involved in Engine Coolant leakage, Brake and Exhaust System Over-Heating of Heavy-Duty Truck Vehicle (대형 트럭 자동차의 엔진냉각수 누출, 제동 및 배기시스템 과열에 관련된 화재사례 고찰)

  • Lee, IL Kwon;Kook, Chang Ho;Ham, Sung Hoon;Lee, Young Suk;Hwang, Han Sub;You, Chang Bae;Moon, Hak Hoon;Jung, Dong Hwa;Ahn, Ho Cheol;Lee, Jeong Ho
    • Journal of the Korean Institute of Gas
    • /
    • v.23 no.4
    • /
    • pp.40-45
    • /
    • 2019
  • This paper is a purpose to study the failure example for heavy-duty vehicle fire. The first example, the researcher found the engine over-heating phenomenon causing a coolant leakage by the sealing poor of head-gasket because of D-ring part deformation contacting with cylinder liner top-part and cylinder head. He certified a fire breakout by short transferred to surrounding wiring of air-cleaner. The second example, a brake lining by return fault of break operating S cam causing with much wear of a rear 4 wheel brake lining repeatably was worn by friction. In the long run, it became the cause of fire. The third example, the researcher knew the fire cause was came about the short of wire by overload of tilting motor when the driver tilted up the cap to inspect a engine. Therefore, a heavy-duty fire must minimize the fire occurrence by thorough controlling.

Feasibility Study on Integration of SSR Correction into Network RTK to Provide More Robust Service

  • Lim, Cheol-Soon;Park, Byungwoon;Kim, Dong-Uk;Kee, Chang-Don;Park, Kwan-Dong;Seo, Seungwoo;So, Hyoungmin;Park, Junpyo
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.7 no.4
    • /
    • pp.295-305
    • /
    • 2018
  • Network RTK is a highly practical technology that can provide high positioning accuracy at levels between cm~dm regardless of user location in the network by extending the available range of RTK using reference station network. In particular, unlike other carrier-based positioning techniques such as PPP, users are able to acquire high-accuracy positions within a short initialization time of a few or tens of seconds, which increases its value as a future navigation system. However, corrections must be continuously received to maintain a high level of positioning accuracy, and when a time delay of more than 30 seconds occurs, the accuracy may be reduced to the code-based positioning level of meters. In case of SSR, which is currently in the process of standardization for PPP service, the corrections by each error source are transmitted in different transmission intervals, and the rate of change of each correction is transmitted together to compensate the time delay. Using these features of SSR correction is expected to reduce the performance degradation even if users do not receive the network RTK corrections for more than 30 seconds. In this paper, the simulation data were generated from 5 domestic reference stations in Gunwi, Yeongdoek, Daegu, Gimcheon, and Yecheon, and the network RTK and SSR corrections were generated for the corresponding data and applied to the simulation data from Cheongsong reference station, assumed as the user. As a result of the experiment assuming 30 seconds of missing data, the positioning performance compensating for time delay by SSR was analyzed to be horizontal RMS (about 5 cm) and vertical RMS (about 8 cm), and the 95% error was 8.7 cm horizontal and 1cm vertical. This is a significant amount when compared to the horizontal and vertical RMS of 0.3 cm and 0.6 cm, respectively, for Network RTK without time delay for the same data, but is considerably smaller compared to the 0.5 ~ 1 m accuracy level of DGPS or SBAS. Therefore, maintaining Network RTK mode using SSR rather than switching to code-based DGPS or SBAS mode due to failure to receive the network RTK corrections for 30 seconds is considered to be favorable in terms of maintaining position accuracy and recovering performance by quickly resolving the integer ambiguity when the communication channel is recovered.

A Study on the Risk Analysis and Fail-safe Verification of Autonomous Vehicles Using V2X Based on Intersection Scenarios (교차로 시나리오 기반 V2X를 활용한 자율주행차량의 위험성 분석 및 고장안전성 검증 연구)

  • Baek, Yunseok;Shin, Seong-Geun;Park, Jong-ki;Lee, Hyuck-Kee;Eom, Sung-wook;Cho, Seong-woo;Shin, Jae-kon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.6
    • /
    • pp.299-312
    • /
    • 2021
  • Autonomous vehicles using V2X can drive safely information on areas outside the sensor coverage of autonomous vehicles conventional autonomous vehicles. As V2X technology has emerged as a key component of autonomous vehicles, research on V2X security is actively underway research on risk analysis due to failure of V2X communication is insufficient. In this paper, the service scenario and function of autonomous driving system V2X were derived by presenting the intersection scenario of the autonomous vehicle, the malfunction was defined by analyzing the hazard of V2X. he ISO26262 Part3 process was used to analyze the risk of malfunction of autonomous vehicle V2X. In addition, a fault injection scenario was presented to verify the fail-safe of the simulation-based intersection scenario.

The Effect of BTS Preference on Fandom Star & Fan Community Identification and Purchase Intention - Focused on Korean and Southeast Asian - (BTS의 선호요인이 팬덤 동일시욕구와 구매의도에 미치는 영향 - 한국 및 동남아 팬을 중심으로 -)

  • Kim, Yoon-Chul
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.2
    • /
    • pp.1-14
    • /
    • 2020
  • This study was initiated by the interest in identifying what the characteristics of BTS' preference is in the expanded K-Pop market. For this study, a survey was conducted to Taiwan, Thailand, Vietnam, and Korea where BTS is popular. The results of this study show that Vietnam and Thailand have the most positive perceptions of most of the BTS preferences, and the factors affecting the highest quality were analyzed by the differentiating sense of BTS. BTS' preference is an independent variable consisting of five factors: singers and music, a discriminative sense, global communication, meditative lyrics and Korean sentiment. And it has been shown to have a statistically significant influence on both the fandom star and the fan community at a high level. In particular, the Identification desire for fandom star shows that the discriminative sense and meditative lyrics affect the positive at a high level. Also, the identification desire for the fan community's found that the attraction of singers and music affects the highest level of affection. This study was extended to Southeast Asian and Korean fans through a wide range of survey participants, and it is meaningful that a new perspective on the BTS preference was available. Nonetheless, Failure to take into account the various variables that may affect the fandom effect and the intent to purchase, and the lack of a survey of fans in the U.S. and Europe, which has more fans worldwide, could be a limitation of the study.

Update on the Taxonomy of Clinically Important Anaerobic Bacteria (임상적으로 중요한 무산소성 세균의 분류 업데이트)

  • Myungsook, Kim
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.54 no.4
    • /
    • pp.239-248
    • /
    • 2022
  • The taxonomy of bacteria in the field of clinical microbiology is in a state of constant flux. A large-scale revamping of the classification and nomenclature of anaerobic bacteria has taken place over the past few decades, mainly due to advances in molecular techniques such as 16S rRNA and whole genome sequencing (WGS). New genera and species have been added, and existing genera and species have been reclassified or renamed. A major role of the clinical microbiological laboratories (CMLs) is the accurate identification (ID) and appropriate antimicrobial susceptibility testing (AST) for clinically important bacteria, and rapid reporting and communication of the same to the clinician. Taxonomic changes in anaerobic bacteria could potentially affect the choice of appropriate antimicrobial agents and the antimicrobial breakpoints to use. Furthermore, current taxonomy is important to prevent treatment failures of emerging pathogenic anaerobes with antimicrobial resistance. Therefore, CMLs should periodically update themselves on the changes in the taxonomy of anaerobic bacteria and suitably inform clinicians of these changes for optimum patient care. This article presents an update on the taxonomy of clinically important anaerobic bacteria, together with the previous names or synonyms. This taxonomy update can help guide antimicrobial therapy for anaerobic bacterial infections and prevent treatment failure and can be a useful tool for both CMLs and clinicians.

The Study on Control Algorithm of Elevator EDLC Emergency Power Converter (승강기 EDLC 비상전원 전력변환장치 제어 알고리즘 연구)

  • Lee, Sang-min;Kim, IL-Song;Kim, Nam
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.709-718
    • /
    • 2017
  • The installation of the elevator ARD(Automatic Rescue Device) system has been forced into law in these days in order to safely rescue passengers during power failure. The configuration of the ARD system consists of energy storage device, power converter and control systems. The EDLC(Electric Double Layer Capacitor) are used as energy storage device for rapid charge/discharge purposes. The power conditioning system (PCS) consists of bi-directional converter, 3-phase converter and control system. The dead-beat control system is adopted for most systems however it requires complex mathematical calculations, the high performance microprocessors are mandatory and thus it can be a cause of high manufacturing cost. In this paper the new control method for average current mode control is presented for simple structure. The control algorithm is applied to the single phase system and then expands to three phase system to meet the sysem requirements. The mathematical modeling using average modeling method is presented and analysed by PSIM computer simulation to verifie the validity of the proposed control methods.

The gene expression programming method to generate an equation to estimate fracture toughness of reinforced concrete

  • Ahmadreza Khodayari;Danial Fakhri;Adil Hussein, Mohammed;Ibrahim Albaijan;Arsalan Mahmoodzadeh;Hawkar Hashim Ibrahim;Ahmed Babeker Elhag;Shima Rashidi
    • Steel and Composite Structures
    • /
    • v.48 no.2
    • /
    • pp.163-177
    • /
    • 2023
  • Complex and intricate preparation techniques, the imperative for utmost precision and sensitivity in instrumentation, premature sample failure, and fragile specimens collectively contribute to the arduous task of measuring the fracture toughness of concrete in the laboratory. The objective of this research is to introduce and refine an equation based on the gene expression programming (GEP) method to calculate the fracture toughness of reinforced concrete, thereby minimizing the need for costly and time-consuming laboratory experiments. To accomplish this, various types of reinforced concrete, each incorporating distinct ratios of fibers and additives, were subjected to diverse loading angles relative to the initial crack (α) in order to ascertain the effective fracture toughness (Keff) of 660 samples utilizing the central straight notched Brazilian disc (CSNBD) test. Within the datasets, six pivotal input factors influencing the Keff of concrete, namely sample type (ST), diameter (D), thickness (t), length (L), force (F), and α, were taken into account. The ST and α parameters represent crucial inputs in the model presented in this study, marking the first instance that their influence has been examined via the CSNBD test. Of the 660 datasets, 460 were utilized for training purposes, while 100 each were allotted for testing and validation of the model. The GEP model was fine-tuned based on the training datasets, and its efficacy was evaluated using the separate test and validation datasets. In subsequent stages, the GEP model was optimized, yielding the most robust models. Ultimately, an equation was derived by averaging the most exemplary models, providing a means to predict the Keff parameter. This averaged equation exhibited exceptional proficiency in predicting the Keff of concrete. The significance of this work lies in the possibility of obtaining the Keff parameter without investing copious amounts of time and resources into the CSNBD test, simply by inputting the relevant parameters into the equation derived for diverse samples of reinforced concrete subject to varied loading angles.