• Title/Summary/Keyword: Control Area Network

Search Result 948, Processing Time 0.028 seconds

Development of Livestock Traceability System Based on Implantable RFID Sensor Tag with MFAN (MFAN/RFID 생체 삽입형 센서 태그 기반 가축 이력 관리 시스템 개발)

  • Won, Yun-Jae;Kim, Young-Han;Lim, Yongseok;Moon, Yeon-Kug;Lim, Seung-Ok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1318-1327
    • /
    • 2012
  • With the recent increased risk of livestock disease spread and human infection, livestock disease control has become very important. Consequently, there has been an increased attention on an implantable real-time monitoring and traceability system for individual cattle. Therefore, we have developed a robust monitoring and traceability system based on an implantable MFAN/RFID sensor tag. Our design combines the MFAN technology that is capable of robust wireless communication within cattle sheds and the 900MHz RFID technology that is capable of wireless communication without battery. In MFAN/RFID implantable sensor tag monitoring system, UHF sensor tag is implanted under the skin and accurately monitors the body temperature and biological changes without being affected by external environment. In order to acquire power needed by the tag, we install a MFAN/RFID tranceiver on the neck of cattle. The MFAN coordinator passes through the MFAN node and the RFID-reader-combined MFAN/RFID transceiver and transmits/receives the data and power for the sensor tag. The data stored in the MFAN coordinator is transmitted via the internet to the livestock history monitoring system, where it is stored and managed. By developing this system, we hope to alleviate the problems related to livestock disease control.

Design of pHEMT channel structure for single-pole-double-throw MMIC switches (SPDT 단일고주파집적회로 스위치용 pHEMT 채널구조 설계)

  • Mun Jae Kyoung;Lim Jong Won;Jang Woo Jin;Ji, Hong Gu;Ahn Ho Kyun;Kim Hae Cheon;Park Chong Ook
    • Journal of the Korean Vacuum Society
    • /
    • v.14 no.4
    • /
    • pp.207-214
    • /
    • 2005
  • This paper presents a channel structure for promising high performance pseudomorphic high electron mobility transistor(pHEMT) switching device for design and fabricating of microwave control circuits, such as switches, phase shifters, attenuators, limiters, for application in personal mobile communication systems. Using the designed epitaxial channel layer structure and ETRI's $0.5\mu$m pHEMT switch process, single pole double throw (SPDT) Tx/Rx monolithic microwave integrated circuit (MMIC) switch was fabricated for 2.4 GHz and 5 GHz band wireless local area network (WLAN) systems. The SPDT switch exhibits a low insertion loss of 0.849 dB, high isolation of 32.638 dB, return loss of 11.006 dB, power transfer capability of 25dBm, and 3rd order intercept point of 42dBm at frequency of 5.8GHz and control voltage of 0/-3V These performances are enough for an application to 5 GHz band WLAN systems.

The Development of Protocol for Construction of Smart Factory (스마트 팩토리 구축을 위한 프로토콜 개발)

  • Lee, Yong-Min;Lee, Won-Bog;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.23 no.3
    • /
    • pp.1096-1099
    • /
    • 2019
  • In this paper, we propose the protocol for construction of smart factory. The proposed protocol for construction of smart factory consists of an OPC UA Server/Client, a technology of TSN realtime communication, a NTP & PTP time synchronization protocol, a FieldBus protocol and conversion module, a technology of saving data for data transmit latency and synchronization protocol. OPC UA server/client is a system integration protocol which makes interface industrial hardware device and supports standardization which allows in all around area and also in not independent from any platform. A technology of TSN realtime communication provides an high sensitive time management and control technology in a way of sharing specific time between devices in the field of high speed network. NTP & PTP time synchronization protocol supports IEEE1588 standardization. A fieldbus protocol and conversion module provide an extendable connectivity by converting industrial protocol to OPC. A technology of saving data for data transmit latency and synchronization protocol provide a resolution function for a loss and latency of data. Results from testing agencies to assess the performance of proposed protocol for construction of smart factory, response time was 0.1367ms, synchronization time was 0.404ms, quantity of concurrent access was 100ea, quantity of interacting protocol was 5ea, data saving and synchronization was 1,000 nodes. It produced the same result as the world's highest level.

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

A Study on the Institutional Conditions and Problems for the Transition of North Korean Economic System (북한 경제체제전환을 위한 제도적 조건과 문제점에 관한 연구)

  • Kang, Chae-Yeon;Kwak, In-ok
    • International Area Studies Review
    • /
    • v.22 no.2
    • /
    • pp.163-186
    • /
    • 2018
  • The purpose of this study is to analyze the institutional conditions and problems for the transition to the North Korean economic system. As a research method, we first analyzed the legislative processes of 4th stage market reform policies (liberalization, privatization, privatization, and corporation) by major economic transition countries. And we found out the difference with North Korea. Based on this, it analyzed the process of institutionalization of North Korea's 4th stage economic reform policies (7.1 measures, comprehensive market policies, Currency reform, 6.28 policy). According to research, There are three important conditions that can not compare the changes of the North Korean market economy with those of the transition economies. First, the internal and external conditions and environment for the transition of the economic system and the role of the state and civil society are very different. Second, the means and objectives of the policy decision process and the implementation process are different. Third, it differs absolutely in terms of the nature and effectiveness of the nation's political and economic policies. Fourth, the priority, contents, and legislation process of economic policies for economic reform differ considerably from those of North Korea. Especially, when discussing the possibility of transition to the 'Chinese model', it is accompanied a considerable risk. It is because the purpose of market entry of control power in North Korea and their survival network are quite unique. In addition, China's domestic market size, population size, and type of control are quite different from North Korea. A necessary and sufficient condition for the transition of the North Korean economic system is the relaxation of physical control mechanisms and institutions in the market area. Next, it is necessary to make a legitimate institutionalization as well as an entire survey on the illegal ownership market. Based on this, it is necessary to gradually change the dependence of the domestic market on China to South Korea. In other words, this is a paradigm shift in the semi-controlled power exclusion, post-automation and domestic market.

Improvement in facies discrimination using multiple seismic attributes for permeability modelling of the Athabasca Oil Sands, Canada (캐나다 Athabasca 오일샌드의 투수도 모델링을 위한 다양한 탄성파 속성들을 이용한 상 구분 향상)

  • Kashihara, Koji;Tsuji, Takashi
    • Geophysics and Geophysical Exploration
    • /
    • v.13 no.1
    • /
    • pp.80-87
    • /
    • 2010
  • This study was conducted to develop a reservoir modelling workflow to reproduce the heterogeneous distribution of effective permeability that impacts on the performance of SAGD (Steam Assisted Gravity Drainage), the in-situ bitumen recovery technique in the Athabasca Oil Sands. Lithologic facies distribution is the main cause of the heterogeneity in bitumen reservoirs in the study area. The target formation consists of sand with mudstone facies in a fluvial-to-estuary channel system, where the mudstone interrupts fluid flow and reduces effective permeability. In this study, the lithologic facies is classified into three classes having different characteristics of effective permeability, depending on the shapes of mudstones. The reservoir modelling workflow of this study consists of two main modules; facies modelling and permeability modelling. The facies modelling provides an identification of the three lithologic facies, using a stochastic approach, which mainly control the effective permeability. The permeability modelling populates mudstone volume fraction first, then transforms it into effective permeability. A series of flow simulations applied to mini-models of the lithologic facies obtains the transformation functions of the mudstone volume fraction into the effective permeability. Seismic data contribute to the facies modelling via providing prior probability of facies, which is incorporated in the facies models by geostatistical techniques. In particular, this study employs a probabilistic neural network utilising multiple seismic attributes in facies prediction that improves the prior probability of facies. The result of using the improved prior probability in facies modelling is compared to the conventional method using a single seismic attribute to demonstrate the improvement in the facies discrimination. Using P-wave velocity in combination with density in the multiple seismic attributes is the essence of the improved facies discrimination. This paper also discusses sand matrix porosity that makes P-wave velocity differ between the different facies in the study area, where the sand matrix porosity is uniquely evaluated using log-derived porosity, P-wave velocity and photographically-predicted mudstone volume.

A Phylogenetic Analysis of Otters (Lutra lutra) Inhabiting in the Gyeongnam Area Using D-Loop Sequence of mtDNA and Microsatellite Markers (경남지역 수달(Lutra lutra)의 mitochondrial DNA D-loop지역과 microsatellite marker를 이용한 계통유전학적 유연관계 분석)

  • Park, Moon-Sung;Lim, Hyun-Tae;Oh, Ki-Cheol;Moon, Young-Rok;Kim, Jong-Gap;Jeon, Jin-Tae
    • Journal of Life Science
    • /
    • v.21 no.3
    • /
    • pp.385-392
    • /
    • 2011
  • The otter (Lutra lutra) in Korea is classified as a first grade endangered species and is managed under state control. We performed a phylogenetic analysis of the otter that inhabits the Changnyeong, Jinju, and Geoje areas in Gyeongsangnamdo, Korea using mtDNA and microsatellite (MS) markers. As a result of the analysis using the 676-bp D-loop sequence of mtDNA, six haplotypes were estimated from five single nucleotide polymorphisms. The genetic distance between the Jinju and Geoje areas was greater than distances within the areas, and the distance between Jinju and Geoje was especially clear. From the phylogenetic tree estimated using the Bayesian Markov chain Monte Carlo analysis by the MrBays program, two subgroups, one containing samples from Jinju and the other containing samples from the Changnyeong and Geoje areas were clearly identified. The result of a parsimonious median-joining network analysis also showed two clear subgroups, supporting the result of the phylogenetic analysis. On the other hand, in the consensus tree estimated using the genetic distances estimated from the genotypes of 13 MS markers, there were clear two subgroups, one containing samples from the Jinju, Geoje and Changnyeong areas and the other containing samples from only the Jinju area. The samples were not identically classified into each subgroup defined by mtDNA and MS markers. It could be inferred that the differential classification of samples by the two different marker systems was because of the different characteristics of the marker systems used, that is, the mtDNA was for detecting maternal lineage and the MS markers were for estimating autosomal genetic distances. Nonetheless, the results from the two marker systems showed that there has been a progressive genetic fixation according to the habitats of the otters. Further analyses using not only newly developed MS markers that will possess more analytical power but also the whole mtDNA are needed. Expansion of the phylogenetic analysis using otter samples collected from the major habitats in Korea should be helpful in scientifically and efficiently maintaining and preserving them.

A Study on the Application of RTLS Technology for the Automation of Spray-Applied Fire Resistive Covering Work (뿜칠내화피복 작업 자동화시스템을 위한 RTLS 기술 적용에 관한 연구)

  • Kim, Kyoon-Tai
    • Journal of the Korea Institute of Building Construction
    • /
    • v.9 no.5
    • /
    • pp.79-86
    • /
    • 2009
  • In a steel structure, spray-applied fire resistive materials are crucial in preventing structural strength from being weakened in the event of a fire. The quality control of such materials, however, is difficult for manual workers, who can frequently be in short supply. These skilled workers are also very likely to be exposed to environmental hazards. Problems with construction work such as this, which are specifically the difficulty of achieving quality control and the dangerous nature of the work itself, can be solved to some degree by the introduction of automated equipment. It is, however, very difficult to automate the work process, from operation to the selection of a location for the equipment, as the environment of a construction site has not yet been structured to accommodate automation. This is a fundamental study on the possibility of the automation of spray-applied fire resistive coating work. In this study, the linkability of the cutting-edge RTLS to an automation system is reviewed, and a scenario for the automation of spray-applied fire resistive coating work and system composition is presented. The system suggested in this study is still in a conceptual stage, and as such, there are many restrictions still to be resolved. Despite this fact, automation is expected to have good effectiveness in terms of preventing fire from spreading by maintaining a certain level of strength at a high temperature when a fire occurs, as it maintains the thickness of the fire-resistive coating at a specified level, and secures the integrity of the coating with the steel structure, thereby enhancing the fire-resistive performance. It also expected that if future research is conducted in this area in relation to a cutting-edge monitoring TRS, such as the ubiquitous sensor network (USN) and/or building information model (BIM), it will contribute to raising the level of construction automation in Korea, reducing costs through the systematic and efficient management of construction resources, shortening construction periods, and implementing more precise construction

Interaction Between TCP and MAC-layer to Improve TCP Flow Performance over WLANs (유무선랜 환경에서 TCP Flow의 성능향상을 위한 MAC 계층과 TCP 계층의 연동기법)

  • Kim, Jae-Hoon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.99-111
    • /
    • 2008
  • In recent years, the needs for WLANs(Wireless Local Area Networks) technology which can access to Internet anywhere have been dramatically increased particularly in SOHO(Small Office Home Office) and Hot Spot. However, unlike wired networks, there are some unique characteristics of wireless networks. These characteristics include the burst packet losses due to unreliable wireless channel. Note that burst packet losses, which occur when the distance between the wireless station and the AP(Access Point) increase or when obstacles move temporarily between the station and AP, are very frequent in 802.11 networks. Conversely, due to burst packet losses, the performance of 802.11 networks are not always as sufficient as the current application require, particularly when they use TCP at the transport layer. The high packet loss rate over wireless links can trigger unnecessary execution of TCP congestion control algorithm, resulting in performance degradation. In order to overcome the limitations of WLANs environment, MAC-layer LDA(Loss Differentiation Algorithm)has been proposed. MAC-layer LDA prevents TCP's timeout by increasing CRD(Consecutive Retry Duration) higher than burst packet loss duration. However, in the wireless channel with high packet loss rate, MAC-layer LDA does not work well because of two reason: (a) If the CRD is lower than burst packet loss duration due to the limited increase of retry limit, end-to-end performance is degraded. (b) energy of mobile device and bandwidth utilization in the wireless link are wasted unnecessarily by Reducing the drainage speed of the network buffer due to the increase of CRD. In this paper, we propose a new retransmission module based on Cross-layer approach, called BLD(Burst Loss Detection) module, to solve the limitation of previous link layer retransmission schemes. BLD module's algorithm is retransmission mechanism at IEEE 802.11 networks and performs retransmission based on the interaction between retransmission mechanisms of the MAC layer and TCP. From the simulation by using ns-2(Network Simulator), we could see more improved TCP throughput and energy efficiency with the proposed scheme than previous mechanisms.

A Study on EC Acceptance of Virtual Community Users (가상 공동체 사용자의 전자상거래 수용에 대한 연구)

  • Lee, Hyoung-Yong;Ahn, Hyun-Chul
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.147-165
    • /
    • 2009
  • Virtual community(VC) will increasingly be organized as commercial enterprises, with the objective of earning an attractive financial return by providing members with valuable resources and environment. For example, Cyworld.com in Korea uses several community services to enable customers of Cyworld to take control of their own value as potential purchasers of products and services. Although initial adoption is important for online network service success, it does not necessarily result in the desired managerial performance unless the initial usage is continuously related to the continuous usage and purchase. Particularly, the customer who receives relevant online services and is well equipped with online network services, will trust the online service provider and perceive less risk and experience more activities such as continuous usage and purchase. Thus, how to promote continued online service usage or, alternatively, how to prevent discontinuance is a critical issue for VC service providers to consider. By aggregating a wide range of information and online environments for customers and providing trust to its members, the service providers of virtual communities help to reduce the perceived risk of continuous usage and purchase. Drill down, online service managers realize that achieving strong and sustained customers who continuously use online service and purchase on it is crucial. Therefore, the research into this online service continuance will identify the relationship between the initial usage and the continuous usage and purchase. The research of continuous usage or post adoption has recently emerged as an important issue in the IS literature. Individuals' information systems(IS) continuous usage decisions are congruent with consumers' repeat purchase decisions. The TAM(Technology Acceptance Model) paradigm has been strongly confirmed across a wide range from product purchase on EC to online service usage contexts. The analysis of IS usage based on TAM has proven to be successful across almost online service contexts. However, most of previous studies have focused on only an area (i.e., VC or EC). Just little research has tried to analyze the relationship between VC and EC. The effect of some factors on user intention, captured through several theories such as TAM, has been demonstrated. Yet, few studies have explored the salient relationships of VC users' EC acceptance. To fill this gap between VC and EC research, this paper attempts to develop a research model that extends the TAM perspective in view of the additional contributions of trust in the service provider and trust in members on some factors that affect EC and VC adoption. In this extension, we applied the TAM-to-TAM(T2T) model, and analyzed the transfer effect of trust between these two TAMs. The research model was empirically tested on the context of a social network service. The model was to extend TAM with the trust concept for the virtual community environment from the perspective of tasks. By building an extended model of TAM and examining the relationships between trust and the existing variables of TAM, it is aimed to explain a user's continuous intention to use VC and purchase on EC. The unit of analysis in this paper is an individual user of a virtual community. The population of interest is the individual with the experiences in virtual community. The data for this paper was made available via a Web survey of VC users. In total, 281 cases were gathered for about one week, but there were some missing values in the sample and there were some inappropriate cases. Thus, only 248 cases were finally analyzed. We chose the structural equation analysis to test the hypotheses and it is better suited for explaining complex relationships than the other methods. In this test, AMOS was used to test the Structural Equation Model (SEM). Noticeable results have been found in the T2T model regarding the factors affecting the intention to use of virtual community and loyalty. Our result showed that trust transfer plays a key role in forming the two adoption beliefs. Overall, this study preliminarily confirms the salience of trust transfer in online service.