• Title/Summary/Keyword: Device Network

Search Result 2,401, Processing Time 0.031 seconds

Fiber Classification and Detection Technique Proposed for Applying on the PVA-ECC Sectional Image (PVA-ECC단면 이미지의 섬유 분류 및 검출 기법)

  • Kim, Yun-Yong;Lee, Bang-Yeon;Kim, Jin-Keun
    • Journal of the Korea Concrete Institute
    • /
    • v.20 no.4
    • /
    • pp.513-522
    • /
    • 2008
  • The fiber dispersion performance in fiber-reinforced cementitious composites is a crucial factor with respect to achieving desired mechanical performance. However, evaluation of the fiber dispersion performance in the composite PVA-ECC (Polyvinyl alcohol-Engineered Cementitious Composite) is extremely challenging because of the low contrast of PVA fibers with the cement-based matrix. In the present work, an enhanced fiber detection technique is developed and demonstrated. Using a fluorescence technique on the PVA-ECC, PVA fibers are observed as green dots in the cross-section of the composite. After capturing the fluorescence image with a Charged Couple Device (CCD) camera through a microscope. The fibers are more accurately detected by employing a series of process based on a categorization, watershed segmentation, and morphological reconstruction.

Implementation of LDPC Decoder using High-speed Algorithms in Standard of Wireless LAN (무선 랜 규격에서의 고속 알고리즘을 이용한 LDPC 복호기 구현)

  • Kim, Chul-Seung;Kim, Min-Hyuk;Park, Tae-Doo;Jung, Ji-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2783-2790
    • /
    • 2010
  • In this paper, we first review LDPC codes in general and a belief propagation algorithm that works in logarithm domain. LDPC codes, which is chosen 802.11n for wireless local access network(WLAN) standard, require a large number of computation due to large size of coded block and iteration. Therefore, we presented three kinds of low computational algorithms for LDPC codes. First, sequential decoding with partial group is proposed. It has the same H/W complexity, and fewer number of iterations are required with the same performance in comparison with conventional decoder algorithm. Secondly, we have apply early stop algorithm. This method reduces number of unnecessary iterations. Third, early detection method for reducing the computational complexity is proposed. Using a confidence criterion, some bit nodes and check node edges are detected early on during decoding. Through the simulation, we knew that the iteration number are reduced by half using subset algorithm and early stop algorithm is reduced more than one iteration and computational complexity of early detected method is about 30% offs in case of check node update, 94% offs in case of check node update compared to conventional scheme. The LDPC decoder have been implemented in Xilinx System Generator and targeted to a Xilinx Virtx5-xc5vlx155t FPGA. When three algorithms are used, amount of device is about 45% off and the decoding speed is about two times faster than convectional scheme.

Development of Automatic Sorting System for Black Plastics Using Laser Induced Breakdown Spectroscopy (LIBS) (LIBS를 이용한 흑색 플라스틱의 자동선별 시스템 개발)

  • Park, Eun Kyu;Jung, Bam Bit;Choi, Woo Zin;Oh, Sung Kwun
    • Resources Recycling
    • /
    • v.26 no.6
    • /
    • pp.73-83
    • /
    • 2017
  • Used small household appliances have a wide variety of product types and component materials, and contain high percentage of black plastics. However, they are not being recycled efficiently as conventional sensors such as near-infrared ray (NIR), etc. are not able to detect black plastic by types. In the present study, an automatic sorting system was developed based on laser-induced breakdown spectroscopy (LIBS) to promote the recycling of waste plastics. The system we developed mainly consists of sample feeder, automatic position recognition system, LIBS device, separator and control unit. By applying laser pulse on the target sample, characteristic spectral data can be obtained and analyzed by using CCD detectors. The obtained data was then treated by using a classifier, which was developed based on artificial intelligent algorithm. The separation tests on waste plastics also were carried out by using a lab-scale automatic sorting system and the test results will be discussed. The classification rate of the radial basis neural network (RBFNNs) classifier developed in this study was about > 97%. The recognition rate of the black plastic by types with the automatic sorting system was more than 94.0% and the sorting efficiency was more than 80.0%. Automatic sorting system based on LIBS technology is in its infant stage and it has a high potential for utilization in and outside Korea due to its excellent economic efficiency.

Shape Optimization of Three-Way Reversing Valve for Cavitation Reduction (3 방향 절환밸브의 공동현상 저감을 위한 형상최적화)

  • Lee, Myeong Gon;Lim, Cha Suk;Han, Seung Ho
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.39 no.11
    • /
    • pp.1123-1129
    • /
    • 2015
  • A pair of two-way valves typically is used in automotive washing machines, where the water flow direction is frequently reversed and highly pressurized clean water is sprayed to remove the oil and dirt remaining on machined engine and transmission blocks. Although this valve system has been widely used because of its competitive price, its application is sometimes restricted by surging effects, such as pressure ripples occurring in rapid changes in water flow caused by inaccurate valve control. As an alternative, one three-way reversing valve can replace the valve system because it provides rapid and accurate changes to the water flow direction without any precise control device. However, a cavitation effect occurs because of the complicated bottom plug shape of the valve. In this study, the cavitation index and percent of cavitation (POC) were introduced to numerically evaluate fluid flows via computational fluid dynamics (CFD) analysis. To reduce the cavitation effect generated by the bottom plug, the optimal shape design was carried out through a parametric study, in which a simple computer-aided engineering (CAE) model was applied to avoid time-consuming CFD analysis and difficulties in achieving convergence. The optimal shape design process using full factorial design of experiments (DOEs) and an artificial neural network meta-model yielded the optimal waist and tail length of the bottom plug with a POC value of less than 30%, which meets the requirement of no cavitation occurrence. The optimal waist length, tail length and POC value were found to 6.42 mm, 6.96 mm and 27%, respectively.

The cancellation performance of loop-back signal in wireless USN multihop relay node (무선 USN 멀티홉 중계 노드에서 루프백 신호의 제거 성능)

  • Lim, Seung-Gag;Kang, Dae-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.17-24
    • /
    • 2009
  • This paper deals with the cancellation performance of loop back interference signal in the case of multihop relay of 16-QAM received signal at the USN radio network. For this, it is necessary to the exchange of information with long distance located station by means of the relay function between the node in the USN environment. In the relay node, the loop-back interference signal which the retransmitting signal is feedback to the receiver side due to the antenna of transmitter and receiver are co-used or very colsely located or using the nonlinear device. Due to this signal, the performance of USN system are degraded which are using the limited resource of frequency and power. For improve this, it is necessary to applying the adaptive signal processing algorithm in order to cancellating the unwanted loop-back interference signal at the frontend of receiver in relaying node, we can get the better system and multi hop performance. In the adaptive signal processing, we considered the 16-QAM signal which has a good spectral efficiency, firstly, than, the QR-Array RLS algorithm was used that has a fairly good convergence property and the solving the finite length problem in the H/W implementation. Finaly, we confirmed that the good elimination performanc was confirmed by computer simulation in the learing cuved and received signal constellation compared to the conventional RLS.

  • PDF

IEEE 802.11-based Power-aware Location Tracking System (저전력을 고려한 IEEE 802.11 기반 위치 추적 시스템)

  • Son, Sang-Hyun;Baik, Jong-Chan;Baek, Yun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.7B
    • /
    • pp.578-585
    • /
    • 2012
  • Location tracking system through GPS and Wi-Fi is available at no additional cost in an environment of IEEE 802.11-based wireless network. It is useful for many applications in outdoor environment. However, a previous systems used for general device to tag. It is unsuitable for power aware location tracking system because general devices is more expensive and non-optimized for tracking. The hand-off method of IEEE 802.11 standard is not enough considering power consumption. This thesis analyzes the previous location tracking systems and proposes power aware system. First, we designed and implemented tag to optimize location tracking. Next, we propose low-power hand-off method and low-power behavior model in implemented tag. The proposed hand-off method resolve power problem by using the location information and behavior model minimize power consumption of tag through power-saving mode and the concept of duty cycle. To evaluating proposed methods and system performance, we perform simulations and experiments in real environment. And then, we calculate tag's power consumption based on the actual measured current consumption of each operation. In a simulation result, the proposed behavior model and hand-off method reduced about 98%, 59% than the standard's hand-off and default behavior model.

A Secure AIS Protocol Suggestion with Analyses of the Standard AIS Protocol (표준 AIS 프로토콜 분석을 통한 보안 AIS 프로토콜 제안)

  • Lee, Jung-Su;Heo, Ouk;Kim, Jae-Hwan;Chung, Sung-Wook
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.49-57
    • /
    • 2016
  • Recently, marine accidents such as the sinking accident Mongol freighter ship and the sinking accident of Sewol ferry in Jindo continuously happen. In order to decrease the number of these marine accidents, Korean ships are obliged to follow the AIS(Automatic Identification System) system. The AIS protocol includes all information for sailing ships. However, the standard AIS protocol does not provide any security function, In addition, it is possible to hijack the standard AIS protocol in case of using a satellite communication device called FUNcuve Dongle Pro+. Therefore, this paper analyzes weak points of the security in the standard AIS protocol. Furthermore, this paper ensures reliability by marking the MAC Address of sender and receiver for secure communication and suggests the protocol that can securely send data, using the VPN Tunnelling method. Therefore, the suggested AIS protocol provides the secure communication to the AIS protocol and protect the messages in the AIS protocol, which can serve safe voyages by decreasing the marine accidents.

Efficient Coverage Guided IoT Firmware Fuzzing Technique Using Combined Emulation (복합 에뮬레이션을 이용한 효율적인 커버리지 가이드 IoT 펌웨어 퍼징 기법)

  • Kim, Hyun-Wook;Kim, Ju-Hwan;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.847-857
    • /
    • 2020
  • As IoT equipment is commercialized, Bluetooth or wireless networks will be built into general living devices such as IP cameras, door locks, cars and TVs. Security for IoT equipment is becoming more important because IoT equipment shares a lot of information through the network and collects personal information and operates the system. In addition, web-based attacks and application attacks currently account for a significant portion of cyber threats, and security experts are analyzing the vulnerabilities of cyber attacks through manual analysis to secure them. However, since it is virtually impossible to analyze vulnerabilities with only manual analysis, researchers studying system security are currently working on automated vulnerability detection systems, and Firm-AFL, published recently in USENIX, proposed a system by conducting a study on fuzzing processing speed and efficiency using a coverage-based fuzzer. However, the existing tools were focused on the fuzzing processing speed of the firmware, and as a result, they did not find any vulnerability in various paths. In this paper, we propose IoTFirmFuzz, which finds more paths, resolves constraints, and discovers more crashes by strengthening the mutation process to find vulnerabilities in various paths not found in existing tools.

Location Estimation Method using Extended Kalman Filter with Frequency Offsets in CSS WPAN (CSS WPAN에서 주파수 편이를 보상하는 확장 Kalman 필터를 사용한 이동노드의 위치추정 방식)

  • Nam, Yoon-Seok
    • The KIPS Transactions:PartC
    • /
    • v.19C no.4
    • /
    • pp.239-246
    • /
    • 2012
  • The function of location estimation in WPAN has been studied and specified on the ultra wide band optionally. But the devices based on CSS(Chirp Spread Spectrum) specification has been used widely in the market because of its functionality, cheapness and support of development. As the CSS device uses 2.4GHz for a carrier frequency and the sampling frequency is lower than that of the UWB, the resolution of a timestamp is very coarse. Then actually the error of a measured distance is very large about 30cm~1m at 10 m depart. And the location error in ($10m{\times}10m$) environment is known as about 1m~2m. So for some applications which require more accurate location information, it is very natural and important to develop a sophisticated post processing algorithm after distance measurements. In this paper, we have studied extended Kalman filter with the frequency offsets of anchor nodes, and proposed a novel algorithm frequency offset compensated extended Kalman filter. The frequency offsets are composed with a variable as a common frequency offset and constants as individual frequency offsets. The proposed algorithm shows that the accurate location estimation, less than 10cm distance error, with CSS WPAN nodes is possible practically.

Design and Implementation of File Cloud Server by Using JAVA SDK (Java SDK를 이용한 파일 클라우드 시스템의 설계 및 구현)

  • Lee, Samuel Sangkon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.2
    • /
    • pp.86-100
    • /
    • 2015
  • Cloud computing is a computing term that evolved in the late 2000s, based on utility and consumption of computer resources. Google say that "Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store processed data on the cloud. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources." The cloud service is a smart and/or intelligent service to save private files in any device, anytime, anywhere. Dropbox, OAuth, PAClous are required that the accumulated user's data are archives with cloud service. Currently we suggest an implementation technique to process many tasks to the cloud server with a thread pooling. Thread pooling is one of efficient implementating technique for client and service environment. In this paper, to present the implementation technique we suggest three diagrams in the consideration of software engineering.