• 제목/요약/키워드: External network

검색결과 1,000건 처리시간 0.052초

영상 정보와 센서 정보의 협업에 의한 모니터링시스템 개발 (Development of a Monitoring System Based on the Cooperation of Image and Sensor Information)

  • 권차욱;차경애;김주성
    • 대한임베디드공학회논문지
    • /
    • 제5권2호
    • /
    • pp.46-56
    • /
    • 2010
  • This study proposes a monitoring system by cooperating the image information and the sensor information in a sensor network system. The monitoring system proposed in this study is divided into internal spaces, such as offices and laboratories, and external spaces including other various spaces. In the internal spaces, motions in objects are detected through cameras while some peripherals like lights are controlled by analyzing some temperature, humidity, and illuminance data detected by sensor nodes. In the external spaces, it is to watch certain intruders to the internal spaces through the interested region for exceptional time by installing cameras, motion detectors, and body detectors in such interested regions. In the results of the test that was applied to a practically limited environment by implementing some interfaces for the proposed system, it was considered that it is possible to watch surroundings effectively using the image information obtained from cameras and sensor information acquisited from sensor nodes.

임베디드 과적 차량 단속시스템 구축방안에 대한 연구 (A Study On Development of Embedded Overload Regulation System)

  • 조병완;윤광원;이동윤;김윤기;김도;최지선;강석원
    • 한국전산구조공학회:학술대회논문집
    • /
    • 한국전산구조공학회 2011년도 정기 학술대회
    • /
    • pp.429-432
    • /
    • 2011
  • 과적차량은 도로 및 교량 구조물과 도로 횡단 시설물 등에 손상요인으로 작용하며 기존의 단속 시스템은 축조작 및 인력부족등 많은 문제점을 내포하고 있어서 이에 대한 대처방안이 요구되고 있다. 이에 본 논문에서는 주행중인 과적차량의 지능형 임베디드 단속 시스템 개발을 위하여 유전자 알고리즘 기법을 적용, 도로자체를 저울로 하여 주행중인 차량의 하중 및 주행정보를 분석을 연구하였으며 이를 통하여 효율적인 과적 단속이 이루어 질 수 있다고 판단된다. 또한 USN구성을 위한 임베디드 센서와 함께 Internal/External Network의 무선화 시스템을 통한 사용자 중심의 시스템을 구축하는 것이 최종 목적이므로 향후 WCDMA/HSDPA를 이용한 External Network의 구성과 실제 과적 단속 적용을 위하여 Test Bed를 통한 실험이 실시되어야 할 것이다.

  • PDF

ARP Spoofing을 이용한 LAN 클라이언트 접속 제어 기법 (Mechanism for Access Control to Clients in Intranet with Using ARP Spoofing)

  • 이건우;구상수
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2018년도 추계학술대회
    • /
    • pp.15-18
    • /
    • 2018
  • 본 논문에서는 교육기관에서 이루어지는 컴퓨터 실습 등과 같이 사용자 호스트의 외부망 접속 제한이 필요한 때에, 저비용으로 간단히 접속 제어 시스템을 구축하는 기법을 제안한다. 제안된 기법은 중 간자 공격 기법(Man In The Middle, MITM) 중 하나인 ARP Spoofing을 이용하여 LAN 클라이언트에서 출발한 패킷이 게이트웨이 바깥으로 포워딩되지 않도록 하는 방식으로 클라이언트의 외부망 접속을 차단한다. 따라서 클라이언트 호스트에 별도의 방화벽이나 Agent를 설치할 필요가 없기 때문에 간편하고 경제적인 시스템 구축이 가능하다.

  • PDF

Robust Control of Planar Biped Robots in Single Support Phase Using Intelligent Adaptive Backstepping Technique

  • Yoo, Sung-Jin;Park, Jin-Rae;Choi, Yoon-Ho
    • International Journal of Control, Automation, and Systems
    • /
    • 제5권3호
    • /
    • pp.269-282
    • /
    • 2007
  • This paper presents a robust control method via the intelligent adaptive backstepping design technique for stable walking of nine-link biped robots with unknown model uncertainties and external disturbances. In our control structure, the self recurrent wavelet neural network(SRWNN) which has the information storage ability is used to observe the uncertainties of the biped robots. The adaptation laws for all weights of the SRWNN are induced from the Lyapunov stability theorem, which are used for on-line controlling biped robots. Also, we prove that all signals in the closed-loop adaptive system are uniformly ultimately bounded. Through computer simulations of a nine-link biped robot with model uncertainties and external disturbances, we illustrate the effectiveness of the proposed control system.

흉부 CT 영상에서 비소세포폐암 환자의 재발 예측을 위한 종양 내외부 영상 패치 기반 앙상블 학습 (Ensemble Learning Based on Tumor Internal and External Imaging Patch to Predict the Recurrence of Non-small Cell Lung Cancer Patients in Chest CT Image)

  • 이예슬;조아현;홍헬렌
    • 한국멀티미디어학회논문지
    • /
    • 제24권3호
    • /
    • pp.373-381
    • /
    • 2021
  • In this paper, we propose a classification model based on convolutional neural network(CNN) for predicting 2-year recurrence in non-small cell lung cancer(NSCLC) patients using preoperative chest CT images. Based on the region of interest(ROI) defined as the tumor internal and external area, the input images consist of an intratumoral patch, a peritumoral patch and a peritumoral texture patch focusing on the texture information of the peritumoral patch. Each patch is trained through AlexNet pretrained on ImageNet to explore the usefulness and performance of various patches. Additionally, ensemble learning of network trained with each patch analyzes the performance of different patch combination. Compared with all results, the ensemble model with intratumoral and peritumoral patches achieved the best performance (ACC=98.28%, Sensitivity=100%, NPV=100%).

수리용량의 제한이 있는 수리가능한 부품의 3단계 재고시스템에 관한 연구 (A Three-Echelon Inventory Model for Repairable Items with Capacity Constraint)

  • 김지승
    • 산업경영시스템학회지
    • /
    • 제20권43호
    • /
    • pp.99-107
    • /
    • 1997
  • We consider a multiechelon repairable-item inventory system where several bases are supported by a central depot and the external repair facilities. Unlike METRIC- based models, there are only a finite number of repair channels at each base, central depot and the external repair facilities. It is desired to find repair capacities and spares level which together guarantee a specified service level at minimum cost. Closed queueing network theory is used to model the stochastic process. The purpose of this paper is to derive the steady-state distributions of this system.

  • PDF

Effects of Social Media Utilization on Labor Union Social Capital in South Korea

  • Lee, Ji-Heon;Jung, Hoe-Kyung
    • International journal of advanced smart convergence
    • /
    • 제6권2호
    • /
    • pp.34-50
    • /
    • 2017
  • This study delved into the effects of labor union members' social media utilization for the formation of labor union social capital. Specifically, this study aimed to identify the effects of labor union-related social media use and participation on the labor union's social capital formation through quantitative and qualitative research. It set up trust, network, and participation as social capital components and as dependent variables. Network, in particular, was divided into bonding and bridging aspect. There is the correlation between labor union-related social media use and the formation of labor union social capital. As participation in the group type social media operated by a labor union becomes more active, evaluation on labor union social capital throughout trust, network, and participation is higher. Especially, the correlation between bonding network and bridging network was high. This proves that a labor union's bond enhancement does not result in the labor union's selfishness, but it can build a cooperative system with an external network.

Development of High Performance Backlight Unit Employing EEFL

  • Yoo, Hyeong-Suk;Kang, Moon-Shik;Lim, Jong-Sun;Lee, Keun-Woo;Oh, Weon-Sik;Park, Jong-Dae;Kang, Sung-Chul
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 한국정보디스플레이학회 2002년도 International Meeting on Information Display
    • /
    • pp.835-837
    • /
    • 2002
  • The 17" Backlight Unit (BLU) employing twelve EEFLs (External Electrode Fluorescent Lamp) has been developed for LCD-TV The characteristics of the EEFL BLU without dual brightness enhancement film (DBEF) were equivalent to those of CCFL (Cold cathode Fluorescent Lamp) BLU employing eight CCFLs with DBEF. Luminance, power consumption and uniformity were 12,000nits, 32watt and 80%, respectively. The inverter of EEFL Backlight Unit is composed of 2 transformers and driven by the sinusoidal waveform.

  • PDF

A Systematic Study of Network Firewall and Its Implementation

  • Alsaqour, Raed;Motmi, Ahmed;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.199-208
    • /
    • 2021
  • This is an era of technology and with the rapid growth of the Internet, networks are continuously growing. Companies are shifting from simple to more complex networks. Since networks are responsible to transmit huge data which is often sensitive and a point of concern for hackers. Despite the sizes of the networks, all networks are subject to several threats. Companies deploy several security measures to protect their networks from unauthorized access. These security measures are implemented from the device level to the network level. Every security layer adds more to the security of the company's network. Firewalls are the piece of software that provides internal and external security of the network. Firewalls aim to enhance the device level as well as network-level security. This paper aims to investigate the different types of firewalls, their architecture, and vulnerabilities of the firewall. This paper improves the understanding of firewall and its various types of architecture.

SOCIAL NETWORK THEORY AND PRIVATE HOUSING DEVELOPERS IN MALAYSIA

  • Muhammad Hijas Sahari;Mastura Jaafar;Abdul Rashid Abdul Aziz
    • 국제학술발표논문집
    • /
    • The 2th International Conference on Construction Engineering and Project Management
    • /
    • pp.704-710
    • /
    • 2007
  • This paper examines the operations of private housing developers (PHDs) based on Social Network Theory. PHDs need to choose the best consultants, contractors and suppliers (CCS) to make sure the project run and complete successfully. PHDs gather the scarce resources from the external environment through personal network. This research used the social network method which relies on alliances based on network, social, tie and trust. The more people/firm PHDs network with, the better chances of finding the right CCS.

  • PDF