• Title/Summary/Keyword: Continuous message

Search Result 78, Processing Time 0.029 seconds

Learning Rules for AMR of Collision Avoidance using Fuzzy Classifier System (퍼지 분류자 시스템을 이용한 자율이동로봇의 충돌 회피 학습)

  • 반창봉;전효병;심귀보
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2000.05a
    • /
    • pp.179-182
    • /
    • 2000
  • A Classifier System processes a discrete coded information from the environment. When the system codes the information to discontinuous data, it loses excessively the information of the environment. The Fuzzy Classifier System(FCS) makes the classifier system be able to carry out the mapping from continuous inputs to outputs. It is the FCS that applies this ability of the machine learning to the concept of fuzzy controller. It is that the antecedent and consequent of classifier is same as a fuzzy rule of the rule base. In this paper, the FCS is the Michigan style and fuzzifies the input values to create the messages. The system stores those messages in the message list and uses the implicit Bucket Brigade Algorithms. Also the FCS employs the Genetic Algorithms(GAs) to make new rules and modify rules when performance of the system needs to be improved. We will verify the effectiveness of the proposed FCS by applying it to AMR avoiding the obstacle.

  • PDF

Secret Key and Tag Generation for IIoT Systems Based on Edge Computing

  • Koh, Giheon;Yu, Heungsik;Kim, Sungun
    • Journal of Multimedia Information System
    • /
    • v.8 no.1
    • /
    • pp.57-60
    • /
    • 2021
  • Industry 4.0 is continuous automation by applying the latest smart technologies to traditional manufacturing industries. It means that large-scale M2M (Machine-to-Machine) communication and IoT (Internet of Things) technologies are well integrated to build efficient production systems by analyzing and diagnosing various issues without human intervention. Edge computing is widely used for M2M services that handle real-time interactions between devices at industrial machinery tool sites. Here, secure data transmission is required while interacting. Thus, this paper focused on a method of creating and maintaining secret key and security tag used for message authentication between end-devices and edge-device.

Design of Encryption/Decryption Core for Block Cipher HIGHT (블록 암호 HIGHT를 위한 암·복호화기 코어 설계)

  • Sonh, Seung-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.778-784
    • /
    • 2012
  • A symmetric block cryptosystem uses an identical cryptographic key at encryption and decryption processes. HIGHT cipher algorithm is 64-bit block cryptographic technology for mobile device that was authorized as international standard by ISO/IEC on 2010. In this paper, block cipher HIGHT algorithm is designed using Verilog-HDL. Four modes of operation for block cipher such as ECB, CBC, OFB and CTR are supported. When continuous message blocks of fixed size are encrypted or decrypted, the desigend HIGHT core can process a 64-bit message block in every 34-clock cycle. The cryptographic processor designed in this paper operates at 144MHz on vertex chip of Xilinx, Inc. and the maximum throughput is 271Mbps. The designed cryptographic processor is applicable to security module of the areas such as PDA, smart card, internet banking and satellite broadcasting.

Mobility Information based Routing for Delay and Disruption Tolerant Network (이동성 정보를 이용한 DTN 네트워크 라우팅 프로토콜)

  • Chang, Duk-Hyun;Shim, Yoon-Bo;Kim, Gil-Soo;Choi, Nak-Jung;Ryu, Ji-Ho;Kwon, Tae-Kyoung;Choi, Yang-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.2
    • /
    • pp.130-136
    • /
    • 2009
  • Delay and Disruption Tolerant Network (DTN) employs message delivery based on a store-and-forward method to conquer no guarantee of continuous end-to-end connectivity. Different from general networks, it is hard for the existing TCP/IP-based routing protocols to correctly work, due to the characteristics such as large latency and unstable link connectivity. Thus, many recent studies focus on routing protocols for DTN. In this paper, we propose a novel routing protocol for DTN with efficient message delivery utilizing mobility information such as direction or destination of mobile nodes. And this protocol is enhanced in terms of delivery ratio, decreases latency and overhead compared to the previously proposed solutions. Simulation results prove its superiority.

Design and Implementation of RTLS based on a Spatial DSMS (공간 DSMS 기반 RTLS의 설계 및 구현)

  • Kim, Joung-Joon;Kim, Pan-Gyu;Kim, Dong-Oh;Lee, Ki-Young;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.4
    • /
    • pp.47-58
    • /
    • 2008
  • With the recent development of the ubiquitous computing technology, there are increasing interest and research in technologies such as sensors and RFID related to information recognition and location positioning in various ubiquitous fields. Especially, a standard specification was required for compatibility and interoperability in various RTLS(Real-Time Locating Systems) according to the development of RTLS to provide location and status information of moving objects using the RFID Tag. For these reasons, the ISO/IEC published the RTLS standard specification for compatibility and interoperability in RTLS. Therefore, in this paper, we designed and im plemented RTLS based on the spatial DSMS(Data Stream Management Stream) for efficiently managing and searching the incoming data stream of moving objects. The spatial DSMS is an extended system of STREAM(STanford stREam datA Manager) developed by Standford University to make various spatial operations possible. RTLS based on the spatial DSMS uses the SOAP(Simple Object Access Protocol) message between client and server for interoperability and translates client's SOAP message into CQL(Continuous Query Language) of the spatial DSMS. Finally, we proved the efficiency of RTLS based on the spatial DSMS by applying it for the staff location management service.

  • PDF

Articulated Human Body Tracking Using Belief Propagation with Disparity Map (신뢰 전파와 디스패리티 맵을 사용한 다관절체 사람 추적)

  • Yoon, Kwang-Jin;Kim, Tae-Yong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.49 no.3
    • /
    • pp.51-59
    • /
    • 2012
  • This paper suggests an efficient method which tracks articulated human body modeled with markov network using disparity map derived from stereo images. The conventional methods which only use color information to calculate likelihood for energy function tend to fail when background has same colors with objects or appearances of object are changed during the movement. In this paper, we present a method evaluating likelihood with both disparity information and color information to find human body parts. Since the human body part are cylinder projected to rectangles in 2D image plane, we use the properties of distribution of disparity of those rectangles that do not have discontinuous distribution. In addition to that we suggest a conditional-messages-update that is able to reduce unnecessary message update of belief propagation. Since the message update has comprised over 80% of the whole computation in belief propagation, the conditional-message-update yields 9~45% of improvements of computational time. Furthermore, we also propose an another speed up method called three dimensional dynamic models assumed the body motion is continuous. The experiment results show that the proposed method reduces the computational time as well as it increases tracking accuracy.

Evaluating Level of Information Provided According to User Satisfaction of VMS on the Continuous Traffic Flow (연속류 도로 VMS의 이용자를 고려한 정보제공수준 평가)

  • Sin, So-Yeong;Lee, Su-Beom;Im, Jun-Beom;Hong, Ji-Yeon
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.3
    • /
    • pp.49-58
    • /
    • 2011
  • As a part of the ITS, the traffic information system is more widely adopted to deliver traffic information to vehicle drivers via various types of media. As the ITS system establishment has been recognized as somewhat accomplished, the focus has shifted to the efficient operation and maintenance of the system. In this paper, we propose a method for evaluating a VMS traffic information service system from a user's perspective. In particular, relational expressions for the level of information provided and the level of user satisfaction are generated for the evaluation to take place from the user psychological satisfaction aspect of all other beneficial features of the system. As continuous flow facility is the one that has limited entry and exit, the traffic information of VMS plays a significant role for vehicle drivers to make their decisions. A method suggested in this paper could be used for evaluating an existing system as well as setting up the target service level of the system of a new system. If individual system properties are considered along with various VMS functions being as supplement of this research, more systematic evaluation method could be arranged.

Review of GPS and Galileo Integrity Assurance Procedure (GPS와 Galileo의 무결성 보장 방법 조사)

  • Namkyu Woo;Gihun Nam;Heonho Choi;Jiyun Lee
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.13 no.1
    • /
    • pp.53-61
    • /
    • 2024
  • Global Navigation Satellite Systems are expected to meet system-defined integrity requirements when users utilize the system for safety critical applications. While the guaranteed integrity performance of GPS and Galileo is publicly available, their integrity assurance procedure and related methodology have not been released to the public in an official document format. This paper summarizes the integrity assurance procedures of Global Positioning System (GPS) and Galileo, which were utilized during their system development, through a literature survey of their integrity assurance methodology. GPS Block II assures system integrity using the following methods: continuous performance monitoring and maintenance on Space Segment (SS) and Control Segment (CS), through a cause and effect analysis of anomalies and a failure analysis. In GPS Block III, to achieve more stringent integrity performance, safety requirements are integrated into the system design and development from its starting phase to the final phase. Galileo's integrity performance is provided in the Integrity Support Message (ISM) format, as Galileo utilizes a Dual Frequency Multi Constellation (DFMC) Satellite Based Augmentation System (SBAS) and Advanced Receiver Autonomous Integrity Monitoring (ARAIM) to serve safety critical applications. The integrity performance of Galileo is ensured by using a methodology similar to GPS Block II (i.e. continuous performance monitoring and maintenance on the system). The integrity assurance procedures reviewed in this paper can be utilized for a new satellite navigation system that will be developed in the near future.

Firing Offset Adjustment of Bio-Inspired DESYNC-TDMA to Improve Slot Utilization Performances in Wireless Sensor Networks

  • Kim, Kwangsoo;Shin, Seung-hun;Roh, Byeong-hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1492-1509
    • /
    • 2017
  • The wireless sensor network (WSN) is a key technology to support the Internet of things (IoT) paradigm. The efficiency of the MAC protocol in WSN is very important to take scalability with restricted wireless resources. The DESYNC-TDMA has an advantage of simple distributed slot allocation inspired by nature, but there is a critical disadvantage of split slots by firing message. The basic split slot model has less efficiency for continuous packet transmitting because of wasting of the slots less than the packet size. In this paper, we propose a firing offset adjustment scheme to improve the efficiency of slot utilizations, which can manage the slot assigned to each node as a single large block, called the single slot model. The performance analysis models for both the existing and the proposed schemes are also derived. Experimental results show that the proposed method provide better efficiency of slot utilization than the existing schemes without any loss of the nature of the desynchronization.

Design and Implementation of Firewall Log Message Analysis System based on XML (XML 기반의 침입차단 로그 메시지 분석 시스템 설계 및 구현)

  • 전석훈;김석훈;손우용;이창우;송정길
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.125-130
    • /
    • 2004
  • The Internet is aggregate of trustless networks essentially. Because the Internet is very difficult to control flowing of information, taking advantage of enough sporadic resource, security problem that can protect internal important stock from the Internet is risen seriously. Recently, virus accident and generation rate about system intrusion that happen become much higher and various than past. On these time, is progressing researcher for invasion cutout to keep away illegal act vigorouslyand do continuous development. In this paper, reporting administrator log information about invader's illegal act depending on XML format form, and I wished to solve problem that happen in administration side developing invasion interception system that can control to remote.

  • PDF