• Title/Summary/Keyword: PathFile

Search Result 113, Processing Time 0.03 seconds

Effective Routing Schemes for Double-Layered Peer-to-Peer Systems in MANET

  • Kim, Ji-Hoon;Lee, Kwang-Jo;Kim, Taek-Hun;Yang, Sung-Bong
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.19-31
    • /
    • 2011
  • In this paper, we propose two new routing schemes for double-layered peer-to-peer systems; a shorter-lower mobility routing scheme and a reverse path routing scheme. The shorter-lower mobility routing scheme first chooses shortest routing paths among possible routing paths and selects the path associated with the relay peer who has lower mobility to improve the reliability of the system. The reverse path routing scheme carries out unicasting (instead of multicasting) based on the reverse path information that can be obtained during the initial file search to further reduce network traffic. The experimental results showed that a double-layered peer-topeer system with the proposed hybrid scheme improved the reliability of the system about 1.5% over the hop count scheme and reduced network traffic by about 0.5% compared to the hop count scheme.

Contouring Tool Path Generation for Dieless CNC Forming using STL Offset (STL offset을 이용한 다이레스 CNC 포밍용 등고선 공구경로 생성)

  • Kang Jae-Gwan;Choi Dong-Woo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.23 no.2 s.179
    • /
    • pp.191-198
    • /
    • 2006
  • Dieless CNC forming is an innovative technology which can form various materials with complex shape by numerically controlled incremental forming process. In this paper, a method of NC tool path generation based on an STL file for dieless CNC forming is proposed. Tool trajectory adopts the principle of layered manufacturing in rapid prototyping technology, but it is necessary to consider STL offset because of the ball shaped tool with a radius. Vertex offset method which enables to compute offset STL directly is engaged for STL offset. The offseted STL is sliced by cutting planes to generate contouring tool path. Algorithm is implemented on a computer and experimented on a dieless CNC forming machine to show its validity.

Path Signatures : Path-oriented Query Processing System for XML document Retrieval (경로 서명 : XML문서 검색을 위한 경로-지향 질의처리 시스템)

  • Park, Hee-Sook;Park, Ju-Hyun;Cho, Woo-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1311-1317
    • /
    • 2007
  • Recently, due to the popularity and explosive growth of the Internet, the information exchange is increasing so rapidly over the Internet. Also the XML is becoming a standard as well as a major tool of data exchange on the Internet and thus we propose the new indexing technique for evaluating a path-oriented query and design and implementation of Path-oriented Query Processing System to give useful for users. In proposed indexing technique, which combined a binary trio structure with a path signature file to improve performance of XML document retrieval.

Method of estimating the deleted time of applications using Amcache.hve (앰캐시(Amcache.hve) 파일을 활용한 응용 프로그램 삭제시간 추정방법)

  • Kim, Moon-Ho;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.573-583
    • /
    • 2015
  • Amcache.hve file is a registry hive file regarding Program Compatibility Assistant, which stores the executed information of applications. With Amcache.hve file, We can know execution path, first executed time as well as deleted time. Since it checks both the first install time and deleted time, Amcache.hve file can be used to draw up the overall timeline of applications when used with the Prefetch files and Iconcache.db files. Amcache.hve file is also an important artifact to record the traces of anti-forensic programs, portable programs and external storage devices. This paper illustrates the features of Amcache.hve file and methods for utilization in digital forensics such as estimation of deleted time of applications.

Path planning for autonomous lawn mower tractor

  • Song, Mingzhang;Kabir, Md. Shaha Nur;Chung, Sun-Ok;Kim, Yong-Joo;Ha, Jong-Kyou;Lee, Kyeong-Hwan
    • Korean Journal of Agricultural Science
    • /
    • v.42 no.1
    • /
    • pp.63-71
    • /
    • 2015
  • Path planning is an essential part for traveling and mowing of autonomous lawn mower tractors. Objectives of the paper were to analyze operation patterns by a skilled farmer, to extract and optimize waypoints, and to demonstrate generation of formatted planned path for autonomous lawn mower tractors. A 27-HP mower tractor was operated by a skilled farmer on grass fields. To measure tractor travel and operation characteristics, an RTK-GPS antenna with a 6-cm RMS error, an inertia motion sensing unit, a gyro compass, a wheel angle sensor, and a mower on/off sensor were mounted on the mower tractor, and all the data were collected at a 10-Hz rate. All the sensor data were transferred through a software program to show the status immediately on the notebook. Planned path was generated using the program parameter settings, mileage and time calculations, and the travel path was plotted using developed software. Based on the human operation patterns, path planning algorithm was suggested for autonomous mower tractor. Finally path generation was demonstrated in a formatted file and graphic display. After optimizing the path planning, a decrease in distance about 13% and saving of the working time about 30% was achieved. Field test data showed some overlap, especially in the turning areas. Results of the study would be useful to implement an autonomous mower tractor, but further research needs to improve the performance.

Development of ISO14649 Compliant CNC Milling Machine Operated by STEP-NC in XML Format

    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.4 no.5
    • /
    • pp.27-33
    • /
    • 2003
  • G-code, another name of ISO6983, has been a popular commanding language for operating machine tools. This G-code, however, limits the usage of today's fast evolving high-performance hardware. For intelligent machines, the communications between machine and CAD/CAM departments become important, but the loss of information during generating G-code makes the production department isolated. The new standard for operating machine tools, named STEP-NC is just about to be standardized as ISO14649. As this new standard stores CAD/CAM information as well as operation commands of CNC machines, and this characteristic makes this machine able to exchange information with other departments. In this research, the new CNC machine operated by STEP-NC was built and tested. Unlike other prototypes of STEP-NC milling machines, this system uses the STEP-NC file in XML file form as data input. This machine loads information from XML file and deals with XML file structure. It is possible for this machine to exchange information to other databases using XML. The STEP-NC milling machines in this research loads information from the XML file, makes tool paths for two5D features with information of STEP-NC, and machines automatically without making G-code. All software is programmed with Visual $C^{++}$, and the milling machine is built with table milling machine, step motors, and motion control board for PC that can be directly controlled by Visual $C^{++}$ commands. All software and hardware modules are independent from each other; it allows convenient substitution and expansion of the milling machine. Example 1 in ISO14649-11 having the full geometry and machining information and example 2 having only the geometry and tool information were used to test the automatic machining capability of this system.

A Design for File Access in Storage Class Memory-based Computer Systems (스토리지 클래스 메모리에서의 파일 접근 설계)

  • Park, Sungmin;Won, Youjip;Kang, Sooyong
    • Journal of Digital Contents Society
    • /
    • v.14 no.2
    • /
    • pp.247-254
    • /
    • 2013
  • Storage Class Memory(SCM), such as PRAM, FRAM and MRAM, are expected to be comparable to DRAM in terms of access speed and to Flash memory in terms of capacity in a near future. In this paper, assuming that not only the secondary storage (HDD or Flash memory) but also the primary memory (DRAM) will be replaced by SCM in the future computer systems, we propose an efficient file access framework for the SCM based computer systems. The proposed framework do not assign exclusive area in the SCM to the file system and uses various memory-related techniques, such as unified data access path, zero-copy data read using file mapping, copy-on-write, and multiple page pre-faulting for file management. Based on the preliminary experimental results, we could conclude that the proposed framework can be an efficient baseline for designing a new operating system for the SCM based computer systems.

A Study on Development of Off-Line Path Programming for Footwear Buffing Robot

  • Lho, Tae-Jung;Kang, Dong-Joon;Che, Woo-Seung;Kim, Jung-Young;Kim, Min-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1469-1473
    • /
    • 2004
  • We suggest how to program off-line robot path along shoes' outsole shape in the footwear buffing process by a 5-axis microscribe system like robot arms. This microscribe system developed consists a 5-axis robot link with a turn table, signal processing circuit, PC and an application software program. It makes a robot path on the shoe's upper through the movement of a microscribe with many joints. To do this, first it reads 5-encoder's pulse values while a robot arm points a shoes' outsole shape from the initial status. This system developed calculates the encoder pulse values for the robot arm's rotation and transmits the angle pulse values to the PC through a circuit. Then, Denavit-Hartenberg's(D-H) direct kinematics is used to make the global coordinate from robot joint one. The determinant is obtained with kinematics equation and D-H variable representation. To drive the kinematics equation, we have to set up the standard coordinates first. The many links and the more complicated structure cause the difficult kinematics problem to solve in the geometrical way. Thus, we can solve the robot's kinematics problems efficiently and systematically by Denavit-Hartenberg's representation. Finally, with the coordinate values calculated above, it can draw a buffing gauge-line on the upper. Also, it can program off-line robot path on the shoes' upper. We are subjected to obtaining shoes' outline points, which are 2 outlines coupled with the points and the normal vector based on the points. These data is supposed to be transformed into .dxf file to be used for data of automatic buffing robot. This system developed is simulated by using spline curves coupled with each point from dxf file in Autocad. As a result of applying this system to the buffing robot in the flexible footwear manufacturing system, it can be used effectively to program the path of a real buffing robot.

  • PDF

An Efficient Overlay for Unstructured P2P File Sharing over MANET using Underlying Cluster-based Routing

  • Shah, Nadir;Qian, Depei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.799-818
    • /
    • 2010
  • In traditional unstructured P2P file sharing network, each peer establishes connections with a certain number of randomly chosen other peers. This would lead to redundant traffic and P2P network partition in mobile ad hoc network (MANET). We propose an approach to construct an efficient unstructured P2P overlay over MANET using underlying cluster-based routing (CBRP). One of the peers in the P2P network is used as a root-peer to connect all peers. Each peer maintains connection with physically closer peers such that it can reach the root-peer. The peer constructs a minimum-spanning tree consisting of itself, its directly connected neighbor peers and 2-hop away neighbor peers to remove far away redundant links and to build an overlay closer to the physical network. Due to on-demand nature of inter-cluster routing of CBRP, the positioning algorithm for MANET is used to retrieve the file by a peer from the source peer via shorter path in the physical network. We can show by simulation that our approach performs better in comparison with the existing approach.

A Study of Logical Network Partition and Behavior-based Detection System Using FTS (FTS를 이용한 논리적 망 분리와 행위기반 탐지 시스템에 관한 연구)

  • Kim, MinSu;Shin, SangIl;Ahn, ChungJoon;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.109-115
    • /
    • 2013
  • Security threats through e-mail service, a representative tool to convey information on the internet, are on the sharp rise. The security threats are made in the path where malicious codes are inserted into documents files attached and infect users' systems by taking advantage of the weak points of relevant application programs. Therefore, to block infection of camouflaged malicious codes in the course of file transfer, this work proposed an integrity-checking and behavior-based detection system using File Transfer System (FTS), logical network partition, and conducted a comparison analysis with the conventional security techniques.