• Title/Summary/Keyword: Computer terminals

Search Result 246, Processing Time 0.031 seconds

Routing of ALVs under Uncertainty in Automated Container Terminals (컨테이너 터미널의 불확실한 환경 하에서의 ALV 주행 계획 수립방안)

  • Kim, Jeongmin;Lee, Donggyun;Ryu, Kwang Ryel
    • Journal of Navigation and Port Research
    • /
    • v.38 no.5
    • /
    • pp.493-501
    • /
    • 2014
  • An automated lifting vehicle(ALV) used in an automated container terminal is a type of unmanned vehicle that can self-lift a container as well as self-transport it to a destination. To operate a fleet of ALVs efficiently, one needs to be able to determine a minimum-time route to a given destination whenever an ALV is to start its transport job. To find a route free from any collision or deadlock, the occupation time of the ALV on each segment of the route should be carefully scheduled to avoid any such hazard. However, it is not easy because not only the travel times of ALVs are uncertain due to traffic condition but also the operation times of cranes en route are not predicted precisely. In this paper, we propose a routing method based on an ant colony optimization algorithm that takes into account these uncertainties. The result of simulation experiment shows that the proposed method can effectively find good routes under uncertainty.

Design and Implementation of H.323 Gatekeeper based on Direct Model for Multimedia Conference Service (멀티미디어 회의 서비스의 직접모델 방식에 의한 H.323 게이트키퍼의 설계 및 구현)

  • Kim, Gi-Yong;Seong, Dong-Su;Lee, Geon-Bae
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.501-510
    • /
    • 2002
  • A various multimedia application services should be developed with techniques of high speed networks and computer. Among these, video-conference system over Internet is useful and important, and the standardization for it should be showed in ITU-T H.323. H.323 standardization consists of four components such as Terminal, MCU(Multipoint Control Unit), Gatekeeper, and Gateway. Among these, the functions of Gatekeeper are as follows, firstly the address translation service to translate the alias address into the IP address, secondary conference admission control service to control of conference start and termination, thirdly bandwidth management service for H.323 terminals. In this paper, we implemented the Gatekeeper for an efficient management of video-conference components in Internet environment, and will introduce our system. As the experimental results with CUSeeMe and Netmeeting which are well-known H.323 terminal, it is known that our gatekeeper should be satisfied with H.323 standardization.

An Enhanced Instantaneous Circulating Current Control for Reactive Power and Harmonic Load Sharing in Islanded Microgrids

  • Lorzadeh, Iman;Abyaneh, Hossein Askarian;Savaghebi, Mehdi;Lorzadeh, Omid;Bakhshai, Alireza;Guerrero, Josep M.
    • Journal of Power Electronics
    • /
    • v.17 no.6
    • /
    • pp.1658-1671
    • /
    • 2017
  • To address the inaccurate load demand sharing problems among parallel inverter-interfaced voltage-controlled distributed generation (DG) units in islanded microgrids (MGs) with different DG power ratings and mismatched feeder impedances, an enhanced voltage control scheme based on the active compensation of circulating voltage drops is proposed in this paper. Using the proposed strategy, reactive power and harmonic currents are shared accurately and proportionally without knowledge of the feeder impedances. Since the proposed local controller consists of two well-separated fundamental and harmonic voltage control branches, the reactive power and harmonic currents can be independently shared without having a remarkable effect on the amplitude or quality of the DGs voltage, even if nonlinear (harmonic) loads are directly connected at the output terminals of the units. In addition, accurate load sharing can also be attained when the plug-and-play performance of DGs and various loading conditions are applied to MGs. The effects of communication failures and latency on the performance of the proposed strategy are also explored. The design process of the proposed control system is presented in detail and comprehensive simulation studies on a three-phase MG are provided to validate the effectiveness of the proposed control method.

Global Wireless LAN Roaming Status in Korea and Its Development Methods (국내 글로벌 무선랜 로밍 구축 현황 및 발전 방안)

  • Wang, Gicheol;Cho, Jinoh;Cho, Gihwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.15-21
    • /
    • 2015
  • Due to the appearance of various mobile terminals like smartphone, smartpad, and smartwatch and tremendous development of WiFi technology, data utilization rate on WiFi network is significantly increasing. As a result, users are wanting to use WiFi network using only a simple identification at a visited place as if they are at their home institute. In this paper, we review the domestic status of eduroam service which supports global extension of wireless network access environment and present the future development perspective of the service in Korea. Besides, we shed light on the current status of WiFi sharing service between domestic universities and propose some methods to facilitate the join of domestic universities in eduroam service.

Design and Analysis of Technical Management System of Personal Information Security using Web Crawer (웹 크롤러를 이용한 개인정보보호의 기술적 관리 체계 설계와 해석)

  • Park, In-pyo;Jeon, Sang-june;Kim, Jeong-ho
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.69-77
    • /
    • 2018
  • In the case of personal information files containing personal information, there is insufficient awareness of personal information protection in end-point areas such as personal computers, smart terminals, and personal storage devices. In this study, we use Diffie-Hellman method to securely retrieve personal information files generated by web crawler. We designed SEED and ARIA using hybrid slicing to protect against attack on personal information file. The encryption performance of the personal information file collected by the Web crawling method is compared with the encryption decryption rate according to the key generation and the encryption decryption sharing according to the user key level. The simulation was performed on the personal information file delivered to the external agency transmission process. As a result, we compared the performance of existing methods and found that the detection rate is improved by 4.64 times and the information protection rate is improved by 18.3%.

Analysis of Cyber Incident Artifact Data Enrichment Mechanism for SIEM (SIEM 기반 사이버 침해사고 대응을 위한 데이터 보완 메커니즘 비교 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • As various services are linked to IoT(Internet of Things) and portable communication terminals, cyber attacks that exploit security vulnerabilities of the devices are rapidly increasing. In particular, cyber attacks targeting heterogeneous devices in large-scale network environments through advanced persistent threat (APT) attacks are on the rise. Therefore, in order to improve the effectiveness of the response system in the event of a breach, it is necessary to apply a data enrichment mechanism for the collected artifact data to improve threat analysis and detection performance. Therefore, in this study, by analyzing the data supplementation common elements performed in the existing incident management framework for the artifacts collected for the analysis of intrusion accidents, characteristic elements applicable to the actual system were derived, and based on this, an improved accident analysis framework The prototype structure was presented and the suitability of the derived data supplementary extension elements was verified. Through this, it is expected to improve the detection performance when analyzing cyber incidents targeting artifacts collected from heterogeneous devices.

A Design of AI Cloud Platform for Safety Management on High-risk Environment (고위험 현장의 안전관리를 위한 AI 클라우드 플랫폼 설계)

  • Ki-Bong, Kim
    • Journal of Advanced Technology Convergence
    • /
    • v.1 no.2
    • /
    • pp.01-09
    • /
    • 2022
  • Recently, safety issues in companies and public institutions are no longer a task that can be postponed, and when a major safety accident occurs, not only direct financial loss, but also indirect loss of social trust in the company and public institution is greatly increased. In particular, in the case of a fatal accident, the damage is even more serious. Accordingly, as companies and public institutions expand their investments in industrial safety education and prevention, open AI learning model creation technology that enables safety management services without being affected by user behavior in industrial sites where high-risk situations exist, edge terminals System development using inter-AI collaboration technology, cloud-edge terminal linkage technology, multi-modal risk situation determination technology, and AI model learning support technology is underway. In particular, with the development and spread of artificial intelligence technology, research to apply the technology to safety issues is becoming active. Therefore, in this paper, an open cloud platform design method that can support AI model learning for high-risk site safety management is presented.

Cryptography Module Detection and Identification Mechanism on Malicious Ransomware Software (악성 랜섬웨어 SW에 사용된 암호화 모듈에 대한 탐지 및 식별 메커니즘)

  • Hyung-Woo Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Cases in which personal terminals or servers are infected by ransomware are rapidly increasing. Ransomware uses a self-developed encryption module or combines existing symmetric key/public key encryption modules to illegally encrypt files stored in the victim system using a key known only to the attacker. Therefore, in order to decrypt it, it is necessary to know the value of the key used, and since the process of finding the decryption key takes a lot of time, financial costs are eventually paid. At this time, most of the ransomware malware is included in a hidden form in binary files, so when the program is executed, the user is infected with the malicious code without even knowing it. Therefore, in order to respond to ransomware attacks in the form of binary files, it is necessary to identify the encryption module used. Therefore, in this study, we developed a mechanism that can detect and identify by reverse analyzing the encryption module applied to the malicious code hidden in the binary file.

Changes in the visual display terminal syndrome of college students in online classes during the COVID-19 pandemic (COVID-19 팬데믹 상황에서 온라인 수업 중인 대학생의 영상표시단말기 증후군의 변화)

  • Jang, Keong Sook;Jung, Young-Mi
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.29 no.1
    • /
    • pp.60-71
    • /
    • 2023
  • Purpose: The purpose of this study was to identify changes in the experience rate and level of symptoms of visual display terminal syndrome in college students attending online classes during the COVID-19 pandemic. Methods: Data were collected from February 22 to June 8, 2021 at three measurement points. A total of 117 college students were administered a visual display terminal syndrome survey just before online classes (T1), one month after the start of online classes (T2), and three months after the start of online classes (T3). The collected data were analyzed by frequency and percentage, paired t-test, McNemar test, and repeated measures analysis of variance using the IBM SPSS 25.0 program. Results: The intensity of college students' visual display terminal syndrome during online classes increased at T2 and T3 compared to T1. The rate of experiencing back discomfort or pain increased abruptly at T2 compared to T1. The intensity of college students' eye related symptoms and skin related symptoms increased at T2 and T3 compared to T1, while the intensity of college students' psychological symptoms, general body discomfort, and musculoskeletal symptoms increased at T3 compared to T1. Conclusion: The results of this study suggest that self-care programs are needed to prevent visual display terminal syndrome in college students who are in long-term online classes.

A Prioritized Call Admission Control using Prediction-Based Adaptive Bandwidth Reservation in High-Speed Multimedia Wireless Networks (고속 멀티미디어 무선 망에서 예측 기반의 적응적 대역폭 예약을 이용한 우선순위 호수락 제어)

  • Kim, Mi-Hui;Chae, Gi-Jun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.8
    • /
    • pp.984-998
    • /
    • 1999
  • 최근 개인 휴대 통신에 대한 관심도가 증가하면서 B-ISDN (Broadband Integrated Services Digital Network)과 같은 기존의 유선 망에서 제공하던 다양한 멀티미디어 응용 지원을 무선 망으로 확장시키기 위한 연구가 활발히 진행되고 있다. 그러나 기존의 유선 망에서는 멀티미디어 응용 지원을 위해 QoS (Quality of Service) Provisioning에 관한 많은 연구가 되어 있으나 무선 망에서는 이동성과 무선 전파의 열악한 전송으로 인해 새로운 QoS Provisioning 방법에 관한 연구가 필수적이다. 본 논문에서는 이러한 무선 망의 특수성으로 인해 발생할 수 있는 서비스의 질 저하와 강제 종료를 줄임으로써 지속적인 QoS를 보장해 주고 한정된 무선 자원을 효율적으로 사용하며 처리에 의한 오버헤드를 줄이기 위하여 다음과 같은 세 가지 방법을 제안하였다. 첫째, 핸드오프 강제 종료율을 줄이기 위하여 대역폭 예약 방법을 사용하되 특정 셀의 트래픽 특성에 맞게 또한 시간대에 따른 트래픽 특성에 따라 예약 대역폭의 양을 조절하는 적응적 대역폭 예약 방법이다. 둘째, 많은 경우 각 셀의 트랙픽 변화는 일정한 주기로 변화한다는 특성에 따라 과거의 트래픽 정보를 이용하는 예측 기반의 대역폭 예약 방법이다. 마지막으로 호의 종류, 트래픽 특성, 단말기의 이동 속도에 따라 다른 우선 순위에 의해 호 수락 제어를 수행하는 우선 순위 기반의 호 수락 제어를 제안하였다. 시뮬레이션을 통하여 기존에 제안된 방법과 성능 비교하여, 요구되는 수준의 QoS 보장과 효율적인 자원의 사용, 요구되는 처리비용의 최소화를 통해 전체 시스템의 성능 향상을 입증하였다.Abstract As interest in wireless hand-held terminals and in personal communications services increases recently, there have been broad studies on the ways to support multimedia applications provided in wired networks such as B-ISDN (Broadband Integrated Services Digital Network) in wireless networks. However, since many studies have focused on Quality of Service (QoS) Provisioning in wired networks to provide multimedia applications, new methods of QoS Provisioning are needed in wireless networks to resolve the problem of wireless channel fading and the difficulty of mobility occurred in wireless networks. This paper proposes three schemes of QoS Provisioning in wireless networks which will make continuous QoS guarantee and efficient use of limited wireless resources possible. The first scheme reserves bandwidth in proportion to the amount of real-time traffic in the neighbor cells to decrease the handoff dropping rate of delay sensitive real-time connections, adapting reserved bandwidth for efficient resource utilization. The second scheme is predictive bandwidth reservation scheme that utilizes the past handoff information. It can decrease overheads required to adapt bandwidth reservation. The last scheme is priority-based call admission control prioritizing traffic type (real-time traffic/ non-real-time traffic), connection type (new connection /handoff connection), and mobile terminal speed (fast mobile/slow mobile). Simulation results show that the proposed QoS Provisioning schemes improve the total system performance by achieving three goals - required QoS guarantee, higher bandwidth utilization and less overhead.