• Title/Summary/Keyword: Protocol Design

Search Result 2,595, Processing Time 0.025 seconds

Design and Implementation of ontology based context-awareness platform using driver intent information (운전자 의도정보를 이용한 온톨로지 기반 지능형자동차 상황인식 플랫폼 설계 및 구현)

  • Ko, Jae-Jin;Choi, Ki-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.1
    • /
    • pp.14-21
    • /
    • 2014
  • In this paper, we devise a new ontology-based context-aware system to recognize the smart car information, in which driver's intent is utilized by information of car, driver, environment as well as driving state, driver state. So proposed system can handle dynamically risk changes by adding real-time situational awareness information. We utilize the camera image recognition technology for context-aware intelligent vehicle driving information, and implement information acquisition scheme OBD-II protocol to acquire vehicle's information. Experiments confirm that the proposed advanced driver safety assist system outperforms the conventional system, which only utilizes the information of vehicle, driver, and environmental information, to support the service of a high-speed driving, lane-departure service and emergency braking situation awareness.

A Design and Implementation of a Remote Status Monitor and Control System for an ADS-B System (ADS-B 시스템 상태 감시 및 원격 제어 시스템의 설계와 구현)

  • Jang, Eunmee;Song, Inseong;Yoon, Wanoh;Choi, Sangbang
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.4
    • /
    • pp.325-333
    • /
    • 2014
  • An ADS-B system, which is a critical technology in surveillance area of the CNS/ATM, can replace or compensate a conventional radar based surveillance system through the communications among aircrafts. An ADS-B ground system which is to use the ADS-B on the ground air traffic management system consists of various subsystem devices such as ground stations that communicate with the aircrafts, and ADS-B/TIS-B/FIS-B servers. The ADS-B ground system has a form of distributed system and is interconnected through the network. Therefore, a system which can monitor and control the status of the multiple subsystem devices of the ADS-B ground system is essential. In this paper, we designed and implemented a remote status monitor and control system for the ADS-B system that can monitor and control the subsystem devices of the ADS-B system in remote place via SNMP protocol.

Design and Implementation of Mobile VNC System for GUI Control and Monitoring of Remote Computer (원격 컴퓨터의 GUI 제어와 모니터링을 위한 Mobile VNC 시스템 설계 및 구현)

  • Chon Hee-ja;Seo Jung-Hee;Park Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.912-919
    • /
    • 2005
  • The Growth in wireless Internet has made Networking possible at anytime and anywhere. So mobile devices like cellular phone and PDA are now used in various fields. In particular, the mobility of mobile devices has a great advantage in remote control. This paper designed and implemented a Mobile VNC system that transmitted the screen image of a remote computer, control the remote computer GU and monitor all by cellular phone. The proposed system consists of a Mobile Viewer un on the cellular phone, VNC Server m on a number of remote computers and a VNC Monitor. For communication between the VNC Server and the Mobile Viewer the MRFB protocol is used. The screen image transmitted to the Mobile Viewer is encoded in the PNG format supported by SK-VM, the Java execution environment of the Cellular phone. According to implementation results, the image is about $2KB\~8KB$. According to the 65 times transmission test, the average frame per second is 4.93fps in the emulator and a real cellular phone takes 0.8fps. Therefore, the proposed system is more efficient than existing systems.

A Design and Implementation of the DMB Data Inserter System for terrestrial DMB data Broadcasting (지상파 DMB 데이터 방송을 위한 DMB 데이터 인서터 시스템 설계 및 구현)

  • Song Jong-Chul;Kim Chang-Su;Jung Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1218-1225
    • /
    • 2005
  • The effort to expand digital contents market and get more users is growing. This is being done by interconnecting the existing broadcasting data services and two-way data services in mobile network with the terrestrial DMB transmitting system. However, the interconnection is not easy because various data service system uses difference protocols to transmit digital contents and the receiving protocol of terrestrial DMB system is the standardized one. In this paper, we designed and implemented the middleware structured system, trying to minimize problems and difficulties in the interconnection of the data service system and terrestrial DMB transmitting system. We considered the readiness of the extension of the various transmitting method in the various data service systems and also implemented Terrestrial DMB Data Inserter system that transmits contents data on the broadcasting schedule.

The Design and Implementation of Conditional Access Authentication and Management System for IPTV Service (IPTV 서비스를 위한 수신권한 인증 및 관리 시스템 설계 및 구현)

  • Cho, Yong-Soon;Jin, Du-Seok;Choi, Bong-Kyu;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.516-519
    • /
    • 2008
  • Currently broadcasting and telecommunication has integrated, And IPTV Service has appeared who called TPS(Triple Play Service) which integrated with broadcasting, telecommunication and Phone Service. IPTV provide broadcasting service and VOD(Video on Demand) service, and it must be satisfied digital content security. For this condition, IPTV Forum working on standardization of interface for digital content security. The Security solution for broadcasting and VOD are CAS(Conditional Access System) and DRM(Digital Rights Management). But these solutions manufactured by many vendors, so there is no inter-operablity. And after finished standardization of interface for CAS and DRM system, the problem of inter-operability with them will be issued. For this reason, Rights management system which possible to operate independently with platform is necessary. In this paper, To protect multimedia digital content, we designed and implemented Conditional Access Management System.

  • PDF

A Study on the Physiological Properties of Skating Players : Skin Temperature and Clothing Temperature in Body Parts

  • Jeon, Hyang-ran
    • The Korean Fashion and Textile Research Journal
    • /
    • v.2 no.5
    • /
    • pp.423-429
    • /
    • 2000
  • This study was conducted to find out the relationship between skin temperature and clothing temperature in body parts. Four different kinds of fabrics were used in this experiment. These fabrics were a (Ny/Spun, 81.8/18.2%), b (Wool/Poly/span, 50/45/5%), (Wool/Ny/Span70/25/5) and d (Wool/Poly/Span 45/45/10%). The subjects skated at indoor ice rink where the length was 111.12 m, the temperature was $11{\pm}1^{\circ}C$ and the humidity was $70{\pm}10%$. The four an male professional skaters speed was $17{\pm}1$ seclm/lap. Physiological parameters were skin temperature at 4 body points (chest, upper arm, thigh, leg) and clothing temperature at chest was measured every 15 second. Experiment protocol was as follows: resting before skating (5 min.), skating (5 min.), and resting after skating (10 min.). The results were as follows; The mean skin temperature by fabrics shows b > a > d > c. The mean skin temperature began to decline little by little as soon as the subjects entered the indoor ice rink. After they rested for five minutes, they started skating and the mean skin temperature declined widely. After skating, the mean skin temperature increased step by step. It maintained the similar temperature. The value of skin temperature at body points shows Leg > Chest > Upper arm > Thigh. Because of the characteristics of skating uniforms, the skin temperature of the leg is the highest. The skating uniform was designed to have a protective portion in the leg. The chest produces the highest temperature in the body. The comparison of difference values in skin temperature show Thigh > Upper arm > Chest > Leg. While skating in a cold atmosphere, the largest difference value is clothing temperature. The clothing temperature is lower than the skin temperature during skating. The difference value of clothing temperature is larger than the skin temperature of the chest.

  • PDF

Design and Implementation of a ubiquitous health care system (유비쿼터스 헬스 케어 시스템의 설계 및 구현)

  • Kim, Jeong-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.921-924
    • /
    • 2007
  • In this paper, we have implemented a ubiquitous healthcare system that can measure and check human's health in anytime and anywhere. The implemented prototype are composed of both front-end and back-end. The front-end have several groups: environment sensor group such as temperature, humidity, photo, voice sensor, health sensor group such as blood pressure, heart beat, electrocardiogram, spo2 sensor, gateway for wired/wireless communication, and RFlD reader to identify personal. The back-end has a serial forwarder to propagate measurment results, monitor program, and medical information server. The implemented sensor node constructs a sensor network using the Zigbee protocol and is ported the TinyOS. The data gathering base node is linux-based terminal that can transfer a sensed medial data through wireless LAN. And, the medical information server stores the processed medical data and can promptly notify the urgent status to the connected medical team. Through our experiments, we've confirmed the possibility of ubiquitous healthcare system based on sensor network using the Zigbee.

  • PDF

The DSTM TEP for IPv4 and IPv6 Interoperability (IPv4/IPv6의 연동을 위한 DSTM TEP의 기능)

  • 진재경;최영지;민상원
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.5
    • /
    • pp.578-587
    • /
    • 2003
  • The DSTM (Dual Stack Transition Mechanism), one of tunneling mechanism, is considered as the best solution in IPv4/IPv6 transition recently. The DSTM provides a method to assure IPv4/v6 connectivity based on 4over6 (IPv4-over-IPv6) tunneling and temporal allocation of a global IPv4 address to a host requiring such communication. A TEP (Tunnel End Point) operates as a border router between IPv6 domain and IPv4 Internet, which performs encapsulation and decapsulation of 4over6 tunneling packets to assure hi-directional forwarding between both networks. In this paper, we analyze basic standards of the IPv6 protocol. And, we design and implement a DSTM TEP daemon block. The TEP daemon analyzes a fevers tunneling packet that is forwarded by the DSTM node, establishes the TEP's 4over6 interface, and supplies communication between a DSTM and a IPv4-only node. Finally, we construct a DSTM testbed and measure performance of the DSTM TEP. Our observation results show that performance of TEP supports the DSTM service.

Design and Implementation of Flying-object Tracking Management System by using Radar Data (레이더 자료를 이용한 항적추적관리시스템 설계 및 구현)

  • Lee Moo-Eun;Ryu Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.13D no.2 s.105
    • /
    • pp.175-182
    • /
    • 2006
  • Radars are used to detect the motion of the low flying enemy planes in the military. Radar-detected raw data are first processed and then inserted into the ground tactical C4I system. Next, these data we analyzed and broadcasted to the Shooter system in real time. But the accuracy of information and time spent on the displaying and graphical computation are dependent on the operator's capability. In this paper, we propose the Flying Object Tracking Management System that allows the displaying of the objects' trails in real time by using data received from the radars. We apply the coordinate system translation algorithm, existing communication protocol improvements with communication equipment, and signal and information computation process. Especially, radar signal duplication computation and synchronization algorithm is developed to display the objects' coordinates and thus we can improve the Tactical Air control system's reliability, efficiency, and easy-of-usage.

A Design of Permission Management System Based on Group Key in Hadoop Distributed File System (하둡 분산 파일 시스템에서 그룹키 기반 Permission Management 시스템 설계)

  • Kim, Hyungjoo;Kang, Jungho;You, Hanna;Jun, Moonseog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.141-146
    • /
    • 2015
  • Data have been increased enormously due to the development of IT technology such as recent smart equipments, social network services and streaming services. To meet these environments the technologies that can treat mass data have received attention, and the typical one is Hadoop. Hadoop is on the basis of open source, and it has been designed to be used at general purpose computers on the basis of Linux. To initial Hadoop nearly no security was introduced, but as the number of users increased data that need security increased and there appeared new version that introduced Kerberos and Token system in 2009. But in this method there was a problem that only one secret key can be used and access permission to blocks cannot be authenticated to each user, and there were weak points that replay attack and spoofing attack were possible. Hence, to supplement these weak points and to maintain efficiency a protocol on the basis of group key, in which users are authenticated in logical group and then this is reflected to token, is proposed in this paper. The result shows that it has solved the weak points and there is no big overhead in terms of efficiency.