• Title/Summary/Keyword: Industrial Protocol

Search Result 687, Processing Time 0.025 seconds

Assessment of Geothermal Power Generation Potential According to EGS Potential Protocol (EGS Potential Protocol에 따른 우리나라 지열발전 잠재량 산정)

  • Song, Yoonho;Baek, Seung-Gyun;Kim, Hyoung Chan;Lee, Tae Jong
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2011.11a
    • /
    • pp.144-144
    • /
    • 2011
  • We have estimated power generation potential in Korea following the recently announced EGS protocol. According to the protocol, we calculated the theoretical potential first, which assumes 30 year operation, minimum temperature being surface temperature+$80^{\circ}C$, depth range being from 3 km to 10 km. In this new assessment the in-land area was digitized by 1' by 1' blocks, which is much finer than suggestion of the protocol (5'by 5'). Thus estimated theoretical potential reaches 6,975 GWe which is 92 times of the total power generation capacity in 2010. In the estimation of technical potential, we limited the depth range down to 6.5 km, assumed recovery factor as 0.14 and also counted for temperature drawdown factor of $10^{\circ}C$ following the protocol. Accessible in-land area excluding steep mountains, residence and industrial region, wet area and others covers 40.7% of total area. Finally, we could come up with 19.6 GWe for technical potential, which would be 56 GWe if we do not account for the temperature drawdown factor. These are important results in that we made the first potential assessment for geothermal power generation.

  • PDF

A new experimental protocol to quantitatively assess the motor control capability of low-back pain patinents during dynamic trunk movement

  • Kim, J.Y.
    • Proceedings of the ESK Conference
    • /
    • 1995.10a
    • /
    • pp.156-163
    • /
    • 1995
  • An experimental protocol was developed and tested in this study in order to quantify the motor control capability of the trunk movement for both healthy subjects and low-back pain (LBP) patients. Information processing capacity (bits/second) (Fitts, 1954) and dynamic motor perfor- mance such as flexion/extension velocity and acceleration were measured as motor control parameters under the controlled range of motion (ROM). In this study, the original experimental propocol (Kim et al., 1993, 1994) was re-designed to reduce the length of the test via a series of statistical analyses for clinical application. The accuracy of the shortened protocol was statistically examined and indicated no difference conpared to the original protocol in terms of evaluating information processing capacity. This protocol was also tested among ten healthy subjects and ten LBP patients for validation purpose. The results showed that the information processing capacity was not significantly diffenent between two groups due to the large variation although there was an apparent mean difference. Average movement time showed a significant increase in LBP patients com- pared to healthy subjects. In conclusion, it was found that the new short experimental protocol could quantify the motor control capability of neuromuscular system of the trunk and also showed the applicability to patient population.

  • PDF

A Conversation Preference Profile for Web Services in Mobile Environment

  • Lee Kang-Chan;Lee Won-Suk;Jeon Jong-Hong;Lee Seung-Yun;Park Jong-Hun
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.1
    • /
    • pp.1-4
    • /
    • 2006
  • Recently Web Services choreography working group of W3C has published the working draft on WSCDL (Web Services Choreography Description Language) version 1.0 which defines reusable common rules to govern the ordering of exchanged messages between Web Services participants. This paper considers a computing environment where mobile clients are interacting with Web Services providers based on a WSCDL specification. In order to effectively cope with the user and device mobility of such an environment, in this paper we present an ongoing work to develop a framework through which a mobile client can specify its preference on how conversation should take place. The proposed framework provides a flexible means for mobile clients to minimize the number of message exchanges while allowing them to adhere to the required choreography.

Efficient Implementation of the MQTT Protocol for Embedded Systems

  • Deschambault, Olivier;Gherbi, Abdelouahed;Legare, Christian
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.26-39
    • /
    • 2017
  • The need for embedded devices to be able to exchange information with each other and with data centers is essential for the advent of the Internet of Things (IoT). Several existing communication protocols are designed for small devices including the message-queue telemetry transport (MQTT) protocol or the constrained application protocol (CoAP). However, most of the existing implementations are convenient for computers or smart phones but do not consider the strict constraints and limitations with regard resource usage, portability and configuration. In this paper, we report on an industrial research and development project which focuses on the design, implementation, testing and deployment of a MQTT module. The goal of this project is to develop this module for platforms having minimal RAM, flash code memory and processing power. This software module should be fully compliant with the MQTT protocol specification, portable, and inter-operable with other software stacks. In this paper, we present our approach based on abstraction layers to the design of the MQTT module and we discuss the compliance of the implementation with the requirements set including the MISRA static analysis requirements.

Energy Efficient Routing Protocol in Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율적인 라우팅 프로토콜)

  • 손병락;김중규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.2
    • /
    • pp.65-73
    • /
    • 2004
  • By the progress of communication and hardware technology, It is possible to organize wireless sensor nodes using the tiny sensor in recently. It is a critical aspect to minimize energy consumption for long-term lively sensor because wireless sensor nodes are associated with the available resources. The wireless sensor network is restricted in communication, exhaustion of power, and computation but it is very similar an Ad-Hoc network. Each sensor node products a few data and application layer of each sensor has slow transmitting feature. Unlike Ad-hoc, which is usually source or sink, base station of the each senor nodes works as sink and the other nodes except sink node works as source. Generally, wireless sensor network keep staying fixed state and observing circumstances continuously after setting up. It doesnt fit for the wireless sensor networks under functioning of existing ad-hoc networks because original Ad-Hoc network routing protocol couldnt operate for wireless sensor network features. This thesis propose the effective routing protocol way in the filed of the expanded routing protocol based on tree with considering on the characteristic of wireless sensor networks pattern.

  • PDF

Implementation of a Remote Authentication System Using Smartcards to Guarantee User Anonymity to Third Party (제 3자에게 사용자 익명성을 제공하는 스마트 카드 기반 원격 인증 시스템 구현)

  • Baek, Yi-Roo;Oh, Doo-Hwan;Gil, Kwang-Eun;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2750-2759
    • /
    • 2009
  • In this paper, we analyze vulnerabilities in a remote authentication protocol using smartcards which was proposed by Bindu et al. and propose an improved scheme. The proposed scheme can prevent from restricted replay attack and denial of service attack by replacing time stamp with random number. In addition, this protocol can guarantee user anonymity by transmitting encrypted user's ID using AES cipher algorithm. The computational load in our protocol is decreased by removing heavy exponentiation operations and user efficiency is enhanced due to addition of password change phase in which a user can freely change his password. Furthermore, we really implement the proposed authentication protocol using a STM smartcard and authentication server. Then we prove the correctness and effectiveness of the proposed remote authentication system.

Performance Evaluation of Multi-path Source Routing Protocol according to Mobility Model (이동성 모델에 따른 다중경로 소스 라우팅 프로토콜의 성능평가)

  • Kim, Su-Sun;Kim, Moon Jeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.8
    • /
    • pp.5559-5564
    • /
    • 2015
  • A variety of routing protocols targeted specifically at mobile ad-hoc network environments have been developed. Mobile ad-hoc network is a self-organizing temporary network, operating without the aid of any established wired infrastructure. The proposed protocol supports seamless communication services between the mobile hosts within a mobile ad-hoc network environments. In particular, our protocol makes faster route re-establishment possible by maintaining multiple paths in each mobile host, and also, the protocol provides reliable communication environments. We compare the performance of RWP model with that of LW model. This paper shows delivery ratio with single path and non-disjoint multiple path according to mobility model and node numbers.

A Router Auto-Configuration Protocol(RACP) for IPv6 Networks (IPv6 네트워크를 위한 라우터 자동 설정 프로토콜)

  • Lee Wan-Jik;Heo Seok-Yeol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.3
    • /
    • pp.47-58
    • /
    • 2006
  • Address Auto-configuration capability is one of important advantages of IPv6 protocol This function enables the IPv6 hosts to configure IPv6 networks automatically, while IPv6 routers still have to be configured manually. To solve this problem, we propose RACP(Router Auto-Configuration Protocol), a new address auto-configuration protocol which configures all routers of a small network consisting of several routers and sub-networks automatically. The RACP protocol can automatically create and deliver IPv6 prefixes and routing informations of all routers on the network by using the network's prefix assigned by ISP. The proposed RACP can be used to set up network automatically for a small IPv6 site such as a small office network, a home network without the assistance of network administrator.

  • PDF

Power Support Device (PSD) Based Authentication Protocol for Secure WiBro Services (안전한 WiBro 서비스를 위한 PSD(Power Support Device) 기반 인증 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.3
    • /
    • pp.727-733
    • /
    • 2008
  • An authentication between a user's terminal and a Access Control Router (ACR) is preceded so that a user receives secure WiBro services. Otherwise they can be exposed from many attack risks. So the Telecommunications Technology Association (TTA) constituted a mechanism of the mutual authentication for WiBro service. In mechanism a user executes the mutual authentication between a Portable Equipment (PE) and the ACR by using Portable Internet Subscriber Identity Module (PISIM). But this standard needs many message to authenticate the ACR and the users cann't use wireless Internet service. Therefore in this paper we propose the key agreement protocol between the PSS and the ACR to authenticate the PSS to ACR. At this time Power Support Device (PSD) fer supporting the calculated quantity of the PSS is participated in the key agreement protocol. The ACR sends a generated key to Key Authentication Server (KAS) via secure IPsec tunnel and then it preserves the identity of the PSS and the value of key after it enciphered them. In conclusion we analyze the security and efficiency of the proposed protocol.

A Study on the Minimum Route Cost Routing Protocol for 6LoWPAN (6LoWPAN을 위한 최소경로비용 라우팅 프로토콜에 관한 연구)

  • Kim, Won-Geun;Kim, Jung-Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.1
    • /
    • pp.1-14
    • /
    • 2010
  • It is recently issued scalability, mobility and external internet connection on Wire-less sensor network. The low power wireless sensor networks based on IPv6 technology 6LoWPAN technology is being standardized in the IETF. This paper for the 6LoWPAN environment based on the routing protocol LOAD, route cost applied the packet re-transmission rate which follows in Link Qualities price which uses at course expense and packet transmission Minimum route Cost routing protocol where does on the course wherethe smallest packet re-transmission becomes accomplished proposed. The technique which proposes compared and LOAD and AODV that about 13%, about 16% energy consumption is few respectively averagely, Energy of the entire network equally, used and energy effectiveness and improvement of network life time experiment led and confirmed.