• Title/Summary/Keyword: Reliable

Search Result 13,915, Processing Time 0.046 seconds

Policy-Based Identity Authentication and Transmission Architecture for Highly Reliable Emergency Bio-Data Management in Wireless Mesh Network for U-Healthcare (U-헬스케어를 위한 무선 매쉬 네트워크에서 고 신뢰성 있는 응급 생체 데이터 관리를 위한 정책기반의 신원 인증 및 전송 구조)

  • Chun, Seung-Man;Woo, Yeung-Kyung;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.21-29
    • /
    • 2013
  • This paper proposed the architecture of the authentication and the transmission for high reliable emergency data management based on U-healthcare wireless mesh networks. In U-healthcare monitoring service, the high reliable bio data management as well as the data transmission are required because the monitoring emergency bio data is related linked to life. More specifically, the technologies of the identity authentication of the measuring bio data, the personalized emergency status diagnosis who is authenticated the bio data and the emergency data transmission are important first of all. To do this, this paper presents the structure and protocol of the identity authentication management with using the extended IEEE 11073 PHD, the structure of policy-based management of the emergency bio data for the highly reliable management and the resilient routing protocol based on wireless mesh network for the reliable data transmission.

Comparison of the Multidetector-row Computed Tomographic Angiography Axial and Coronal Planes' Usefulness for Detecting Thoracodorsal Artery Perforators

  • Kim, Jong Gyu;Lee, Soo Hyang
    • Archives of Plastic Surgery
    • /
    • v.39 no.4
    • /
    • pp.354-359
    • /
    • 2012
  • Background During the planning of a thoracodorsal artery perforator (TDAP) free flap, preoperative multidetector-row computed tomographic (MDCT) angiography is valuable for predicting the locations of perforators. However, CT-based perforator mapping of the thoracodorsal artery is not easy because of its small diameter. Thus, we evaluated 1-mm-thick MDCT images in multiple planes to search for reliable perforators accurately. Methods Between July 2010 and October 2011, 19 consecutive patients (13 males, 6 females) who underwent MDCT prior to TDAP free flap operations were enrolled in this study. Patients ranged in age from 10 to 75 years (mean, 39.3 years). MDCT images were acquired at a thickness of 1 mm in the axial, coronal, and sagittal planes. Results The thoracodorsal artery perforators were detected in all 19 cases. The reliable perforators originating from the descending branch were found in 14 cases, of which 6 had transverse branches. The former were well identified in the coronal view, and the latter in the axial view. The location of the most reliable perforators on MDCT images corresponded well with the surgical findings. Conclusions Though MDCT has been widely used in performing the abdominal perforator free flap for detecting reliable perforating vessels, it is not popular in the TDAP free flap. The results of this study suggest that multiple planes of MDCT may increase the probability of detecting the most reliable perforators, along with decreasing the probability of missing available vessels.

A 2D FLIR Image-based 3D Target Recognition using Degree of Reliability of Contour (윤곽선의 신뢰도를 고려한 2차원 적외선 영상 기반의 3차원 목표물 인식 기법)

  • 이훈철;이청우;배성준;이광연;김성대
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2359-2368
    • /
    • 1999
  • In this paper we propose a 2D FLIR image-based 3D target recognition system which performs group-to-ground vehicle recognition using the target contour and its degree of reliability extracted from FLIR image. First we extract target from background in FLIR image. Then we define contour points of the extracted target which have high edge gradient magnitude and brightness value as reliable contour point and make reliable contour by grouping all reliable contour points. After that we extract corresponding reliable contours from model contour image and perform comparison between scene and model features which are calculated by DST(discrete sine transform) of reliable contours. Experiment shows that the proposed algorithm work well and even in case of imperfect target extraction it showed better performance then conventional 2D contour-based matching algorithms.

  • PDF

CRC8 Implementation using Direct Table Algorithm (테이블 기반 알고리즘을 이용한 CRC8의 구현)

  • Seo, Seok-Bae;Kim, Young-Sun;Park, Jong-Euk;Kong, Jong-Phil;Yong, Sang-Soon;Lee, Seung-Hoon
    • Aerospace Engineering and Technology
    • /
    • v.13 no.2
    • /
    • pp.38-46
    • /
    • 2014
  • CRC (Cyclic Redundancy Codes) is a error detection method for the date transmission, which is applied to the GRDDP (GOES-R Reliable Data Delivery Protocol) between satellite and GEMS (Geostationary Environmental Monitoring Sensor) on the GEO-KOMPSAT 2B development. This paper introduces a principle of the table based CRC, and explains software implementation results of the CRC8 applied to GEMS.

Robust and Reliable H$\infty$ State-Feedback Control : A Linear Matrix Inequality Approach

  • Kim, Seong-Woo;Kim, Byung-Kook;Seo, Chang-Jun
    • Transactions on Control, Automation and Systems Engineering
    • /
    • v.2 no.1
    • /
    • pp.31-39
    • /
    • 2000
  • We present a robust and reliable H$\infty$ state-feedback controller design for linear uncertain systems, which have norm-bounded time-varying uncertainty in the state matrix, and their prespecified sets of actuators are susceptible to failure. These controllers should guarantee robust stability of the systems and H$\infty$ norm bound against parameter uncertainty and/or actuator failures. Based on the linear matrix inequality (LMI) approach, two state-feedback controller design methods are constructed by formulating to a set of LMIs corresponding to all failure cases or a single LMI that covers all failure cases, with an additional costraint. Effectiveness and geometrical property of these controllers are validated via several numerical examples. Furthermore, the proposed LMI frameworks can be applied to multiobjective problems with additional constraints.

  • PDF

The Design of a CTI System for reliable video-conference (신뢰성있는 화상회의를 위한 CTI System 설계)

  • 이종열;정현우;박원배
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.225-228
    • /
    • 2000
  • In this paper, a design of the reliable video-conference system using CTI(Computer Telephony Integration) technology is proposed. When video-conference is run on the current existing Internet, the transmission delay problem for voice data traffic can be frequently occurred. In order to transmit the real-time voice data through the Internet efficiently, some complicated algorithms such as CODEC(Code/Decode) should be applied. It can cause further excessive processing delay which can affect the overall performance. The voice traffic is usually transmitted through the reliable PSTN(Public Switched Telephone Network) in the CTI system. In this paper a new architecture, in which PSTN for voice traffic and Internet for video traffic are used at the same time instead of using Internet by itself, is proposed to relieve the problems on a video conference.

  • PDF

A Reliable 2-mode Authentication Framework for Wireless Sensor Network (무선 센서네트워크를 위한 신뢰성 있는 2-모드 인증 프레임워크)

  • Huyen, Nguyen Thi Thanh;Huh, Eui-Nam
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.51-60
    • /
    • 2009
  • This paper proposes a reliable 2-mode authentication framework for probabilistic key pre-distribution in Wireless Sensor Network (WSN) that guarantees the safe defense against different kinds of attacks: Hello flood attacks, Wormhole attacks, Sinkhole attack, location deployment attacks, and Man in the middle attack. The mechanism storing the trust neighbor IDs reduces the dependence on the cluster head and as the result; it saves the power energy for the authentication process as well as provides peer-to-peer communication.

  • PDF

Uncertainty Analysis of Hyung San River Discharge due to the methods of Discharge Measurement (유량측정방법에 따른 형산강유량의 불확실도 분석)

  • Seo, Kyu-Woo;Kim, Su-Hyun;Kim, Dai-Gon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2005.05b
    • /
    • pp.1538-1542
    • /
    • 2005
  • This study is to secure more accurate data of the discharge on the measurement by gaining a reliable hydrological data through the comparison the present method of measuring them and the other way that is based ISO. This study suggests the applicable measurement method of the discharge that has reliance through general elements and the analysis of uncertainty by comparing and assaying the data of the Hyung San River that is measured by the present standard. The result of this study makes us realize that we should complement the measurement method of the discharge securing the reliable and accurate hydrological data Hydrological data is very important things to perform domestic river works or install some structure in river or coast. Securing reliable and accurate hydro-data and making a thesis should go on in other to do any construction in river or coast.

  • PDF

On the Local Identifiability of Load Model Parameters in Measurement-based Approach

  • Choi, Byoung-Kon;Chiang, Hsiao-Dong
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.2
    • /
    • pp.149-158
    • /
    • 2009
  • It is important to derive reliable parameter values in the measurement-based load model development of electric power systems. However parameter estimation tasks, in practice, often face the parameter identifiability issue; whether or not the model parameters can be estimated with a given input-output data set in reliable manner. This paper introduces concepts and practical definitions of the local identifiability of model parameters. A posteriori local identifiability is defined in the sense of nonlinear least squares. As numerical examples, local identifiability of third-order induction motor (IM) model and a Z-induction motor (Z-IM) model is studied. It is shown that parameter ill-conditioning can significantly affect on reliable parameter estimation task. Numerical studies show that local identifiability can be quite sensitive to input data and a given local solution. Finally, several countermeasures are proposed to overcome ill-conditioning problem in measurement-based load modeling.

Construction of Uninterruptible Power System by Reliable Incoming Dual-Power Line (상용2회선 수전방식을 적용한 무정전 수변전설비 구축방안 검토·제안연구)

  • Choi, Jin-Sung;Lee, Sang-Joong
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.12
    • /
    • pp.64-70
    • /
    • 2010
  • High capacity UPS and emergency generators are commonly employed at facilities where power interruption is not allowed. Nowadays, combinations of existing commercial incoming power and an emergency generator or combination of multiple generators and CTTS(Closed Transition Transfer Switch) is adopted sometimes for more reliable power supply. In this paper, application of CTTS and STS(Static Transfer Switch) to dual-power line is suggested for highly reliable uninterruptible power. By realizing such a system, construction of incoming power facilities, installation of emergency generator and large capacity UPS can be omitted, through which saving of the installation space and corresponding capital investment can be expected.