• Title/Summary/Keyword: Well-network system

Search Result 2,200, Processing Time 0.072 seconds

Porting Point-to-Point Protocol(PPP) Software to an Embedded System (임베디드 시스템으로의 Point-to-Point Protocol(PPP) 소프트웨어 이식)

  • Choe, Seong-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2135-2148
    • /
    • 2000
  • Developing network software in embedded systems, such as digital set-top boxes, requires coding under limited computing resources. This paper presents the porting of Point-to-point Protocol (PPP) software, PPPD, to an embedded system. The PPP is the most popular link layer protocol for the information appliance, to an embedded system. In order to achieve this, problems to be solved for the porting were identified and methods to solve the problems were described. First, PPP source codes were divided into modules. Next, functions of each module were analyzed and interfaces between the modules were delineated. With the analysis results, porting to the embedded system was described. The normal operation of the ported software was verified with the help of a network packet analyzer. Finally, experiences during the porting were presented. The method developed in th paper can be applied to the porting of software to an embedded system as well as the porting of network software.

  • PDF

Key Distribution Process for Encryption of SCADA Communication using Game Theory applied Multiagent System

  • Kim, Hak-Man;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.11
    • /
    • pp.34-43
    • /
    • 2009
  • SCADA (Supervisory Control and Data Acquisition) system has been used for remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks, SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, flexible key distribution concept is proposed for improving the security of SCADA network using Multiagent System (MAS).

Network Control for Virtual Robot in MSRS Simulation Environment (MSRS 시뮬레이션 환경에서 가상 로봇의 네트웍제어)

  • Shin, Dong-Gwan;Lee, Sung-Hun;Yi, Soo-Yeong;Choi, Byoung-Wook
    • The Journal of Korea Robotics Society
    • /
    • v.2 no.3
    • /
    • pp.242-248
    • /
    • 2007
  • Robot system development consists of several sub-tasks such as layout design, motion planing, and sensor programming etc. In general, on-line programming and debugging for such tasks demands burdensome time and labor costs, which motivates an off-line graphic simulation system. MSRS(Microsoft Robotics Studio) released in recent years is an appropriate tool for the graphic simulation system since it supports CCR(Concurrency and Coordination Runtime), DSS(Decentralized System Services), and dynamics simulation based on PhysX and graphic animation as well. In this paper, we developed an MSRS based network simulation system for quadruped walking robots, which controls virtual 3D graphic robots existing in remote side through internet.

  • PDF

Intelligent Control Algorithm for the Adjustment Process During Electronics Production (전자제품생산의 조정고정을 위한 지능형 제어알고리즘)

  • 장석호;구영모;고택범;우광방
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.4 no.4
    • /
    • pp.448-457
    • /
    • 1998
  • A neural network based control algorithm with fuzzy compensation is proposed for the automated adjustment in the production of electronic end-products. The process of adjustment is to tune the variable devices in order to examine the specified performances of the products ready prior to packing. Camcorder is considered as a target product. The required test and adjustment system is developed. The adjustment system consists of a NNC(neural network controller), a sub-NNC, and an auxiliary algorithm utilizing the fuzzy logic. The neural network is trained by means of errors between the outputs of the real system and the network, as well as on the errors between the changing rate of the outputs. Control algorithm is derived to speed up the learning dynamics and to avoid the local minima at higher energy level, and is able to converge to the global minimum at lower energy level. Many unexpected problems in the application of the real system are resolved by the auxiliary algorithms. As the adjustments of multiple items are related to each other, but the significant effect of performance by any specific item is not observed. The experimental result shows that the proposed method performs very effectively and are advantageous in simple architecture, extracting easily the training data without expertise, adapting to the unstable system that the input-output properties of each products are slightly different, with a wide application to other similar adjustment processes.

  • PDF

Implementation of User Interface and GeoSensor based Traveling Type Sub-Observation Prototype System for Monitoring of Groundwater (지하수 모니터링을 위한 GeoSensor 기반의 이동식 보조관측망 프로토타입 시스템 및 사용자 인터페이스 구현)

  • Kim, Kyung-Jong;Jung, Se-Hoon;Sim, Chun-Bo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.183-192
    • /
    • 2012
  • Although underground water resource has relatively less pollution rate compared with surface water, its recovery faces many difficulties due to poor management. Our country monitors underground water to manage it effectively through auxiliary observation network for underground water. In this paper, we suggest water-well auto measure system based on Geosensor for business efficiency increase of water-well management and realtime monitering. In this system is consist of user GUI(Graphic User Interface) composed with water-well information and movement sub-observation network prototype system composed with GPS(Global Positioning System) and wireless sensor node such as water temperature, water level, electrical conductivity. In this system is using the light of the sun for self-power, variety water-well information collected wireless sensor node was a wireless transmitting/receiving a using CDMA(Code Division Multiple Access) module. Also, for promote with user ease, user GUI express that water-well collected in GIS(Geographic Information System) map. For performance evaluation of the proposed system, we perform experiment using sensing information through designed sub-observation network. And we was proved superiority of the proposed system through qualitative evaluation with other paper.

Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Network

  • Zhang, Kenan;Li, Xingqian;Ding, Kai;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.241-247
    • /
    • 2022
  • Ad hoc network is self-organized network powered by battery. The reliability of virtual user identification and channel security are reduced when SNR is low due to limited user energy. In order to solve this problem, a joint virtual user identification and channel security en/decoding method is proposed in this paper. Transmitter-receiver-based virtual user identification code is generated by executing XOR operation between orthogonal address code of transmitter and pseudo random address code of receiver and encrypted by channel security code to acquire orthogonal random security sequence so as to improve channel security. In order to spread spectrum as well as improve transmission efficiency, data packet is divided into 6-bit symbols, each symbol is mapped with an orthogonal random security sequence. Subspace-based method is adopted by receiver to process received signal firstly, and then a judgment model is established to identify virtual users according to the previous processing results. Simulation results indicate that the proposed method obtains 1.6dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

Software Effort Estimation in Rapidly Changing Computng Environment

  • Eung S. Jun;Lee, Jae K.
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.133-141
    • /
    • 2001
  • Since the computing environment changes very rapidly, the estimation of software effort is very difficult because it is not easy to collect a sufficient number of relevant cases from the historical data. If we pinpoint the cases, the number of cases becomes too small. However is we adopt too many cases, the relevance declines. So in this paper we attempt to balance the number of cases and relevance. Since many researches on software effort estimation showed that the neural network models perform at least as well as the other approaches, so we selected the neural network model as the basic estimator. We propose a search method that finds the right level of relevant cases for the neural network model. For the selected case set. eliminating the qualitative input factors with the same values can reduce the scale of the neural network model. Since there exists a multitude of combinations of case sets, we need to search for the optimal reduced neural network model and corresponding case, set. To find the quasi-optimal model from the hierarchy of reduced neural network models, we adopted the beam search technique and devised the Case-Set Selection Algorithm. This algorithm can be adopted in the case-adaptive software effort estimation systems.

  • PDF

The Implement of Intelligent Home Network System on Smart Phone (스마트 폰을 이용한 지능형 홈 네트워크 시스템 구현)

  • Lee, Tae-Woong;Son, Cheol-Su;Kim, Won-Jung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.505-509
    • /
    • 2011
  • Home network system makes it available for controlling inside home and for controlling from outside as well with personal computer, cellular phone or smart phone, by connecting diverse information equipments within home such as lighting, gas, and heating equipments with network. Integrated server and wall-pad, which form home network system, have demerits as saying of being high-priced and of needing to implement network infrastructure. This study suggested the intelligent home network system, which uses smart phone of supplementing these merits of home network system. It substituted high-specification input & output equipment in the currently and widely supplied smart phone for display and touch screen, which are user interface part of the existing wall-pad, and implemented the common wall-pad with low cost by concentrating management and control function of home network on smart phone.

An integrated Bayesian network framework for reconstructing representative genetic regulatory networks.

  • Lee, Phil-Hyoun;Lee, Do-Heon;Lee, Kwang-Hyung
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2003.10a
    • /
    • pp.164-169
    • /
    • 2003
  • In this paper, we propose the integrated Bayesian network framework to reconstruct genetic regulatory networks from genome expression data. The proposed model overcomes the dimensionality problem of multivariate analysis by building coherent sub-networks from confined gene clusters and combining these networks via intermediary points. Gene Shaving algorithm is used to cluster genes that share a common function or co-regulation. Retrieved clusters incorporate prior biological knowledge such as Gene Ontology, pathway, and protein protein interaction information for extracting other related genes. With these extended gene list, system builds genetic sub-networks using Bayesian network with MDL score and Sparse Candidate algorithm. Identifying functional modules of genes is done by not only microarray data itself but also well-proved biological knowledge. This integrated approach can improve there liability of a network in that false relations due to the lack of data can be reduced. Another advantage is the decreased computational complexity by constrained gene sets. To evaluate the proposed system, S. Cerevisiae cell cycle data [1] is applied. The result analysis presents new hypotheses about novel genetic interactions as well as typical relationships known by previous researches [2].

  • PDF

Safety Assessment and Management Planning of Agricultural Facilities using Neural Network (신경망 이론을 이용한 농업 구조물의 안전도 평가 및 관리계획)

  • Kim, Min-Jong;Lee, Jeong-Jae;Su, Nam-Su
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 2001.10a
    • /
    • pp.156-161
    • /
    • 2001
  • Currently, agricultural facilities are evaluated using either basic inspections or detailed analysis. However, conventional analyses as well as methods based on fuzzy logic and rule of thumb have not been very successful in providing a clear relationship between rating and real state of agricultural facilities, because they can't provide exactly acceptable reliability of degraded structures with manager or supervisor. Therefore, in this stage, we must define probabilistic variables for representing degradation of structures being given damages during a survival time. This paper describes the application of neural network system in developing the relation between subjective ratings and parameters of agricultural reservoir as well as that between subjective and analytical ratings. It is shown that neural networks can be trained and used successfully in estimating a rating based on several parameters. The specific application problem for agricultural reservoir in the rural area of Korea is presented and database is constructed to maintain training data set, the information of inspection and facilities. This study showed that a successful training of a neural network could be useful, especially if the input data set for target problem contains parameters with a diverse combination of inter-correlation coefficients. And the networks had a prediction rating of about $^{\ast}^{\ast}^{\ast}%$. The neural network system is expected to show high performance fairly in estimate than statistical method to use equation that is consisted of very lowly interrelated variables.

  • PDF