• Title/Summary/Keyword: disconnection problem

Search Result 74, Processing Time 0.03 seconds

Development of Stable Walking Robot for Accident Condition Monitoring on Uneven Floors in a Nuclear Power Plant

  • Kim, Jong Seog;Jang, You Hyun
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.632-637
    • /
    • 2017
  • Even though the potential for an accident in nuclear power plants is very low, multiple emergency plans are necessary because the impact of such an accident to the public is enormous. One of these emergency plans involves a robotic system for investigating accidents under conditions of high radiation and contaminated air. To develop a robot suitable for operation in a nuclear power plant, we focused on eliminating the three major obstacles that challenge robots in such conditions: the disconnection of radio communication, falling on uneven floors, and loss of localization. To solve the radio problem, a Wi-Fi extender was used in radio shadow areas. To reinforce the walking, we developed two- and four-leg convertible walking, a floor adaptive foot, a roly-poly defensive falling design, and automatic standing recovery after falling methods were developed. To allow the robot to determine its location in the containment building, a bar code landmark reading method was chosen. When a severe accident occurs, this robot will be useful for accident condition monitoring. We also anticipate the robot can serve as a workman aid in a high radiation area during normal operations.

Design of Adaptive DCF algorithm for TCP Performance Enhancement in IEEE 802.11 based Mobile Ad-hoc Networks (IEEE 802.11 기반 이동 ad-hoc 망에서 TCP 성능 향상을 위한 적응적 DCF 알고리즘 설계)

  • Kim, Han-Jib;Lee, Gi-Ra;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.79-89
    • /
    • 2006
  • TCP is the most widely used transport protocol in Internet applications that guarantees a reliable data transfer. But, in the wireless multi-hop networks, TCP performance is degraded because it is designed for wired networks. The main reasons of TCP performance degradation are contention for wireless medium at the MAC layer, hidden terminal problem, exposed terminal problem, packet losses in the link layer, unfairness problem, reordering problem caused by path disconnection, bandwidth waste caused by exponential backoff of retransmission timer due to node's mobility and so on. Specially, in the mobile ad-hoc networks, discrepancy between a station's transmission range and interference range produces hidden terminal problem that decreases TCP performance greatly by limiting simultaneous transmission at a time. In this paper, we propose a new MAC algorithm for mobile ad-hoc networks to solve the problem that a node can not transmit and just increase CW by hidden terminal. In the IEEE 802.11 MAC DCF, a node increases CW exponentially when it fails to transmit, but the proposed algorithm, changes CW adaptively according to the reason of failure so we get a TCP performance enhancement. We show by ns-2 simulation that the proposed algorithm enhances the TCP performance by fairly distributing the transmission opportunity to the failed nodes by hidden terminal problems.

Service Platform Design for Smart Environment Disaster Management (스마트 환경재해 관리를 위한 서비스 플랫폼 설계)

  • Weon, Dalsoo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.3
    • /
    • pp.247-252
    • /
    • 2018
  • The problem of the environment is urgently coming to the world as a problem that humanity must solve. In particular, Korea is directly affected by air pollution and marine pollution due to its geopolitical position with China, and is also exposed to a great deal of pollution due to air, water, soil, and weather. In this situation, due to the disconnection between the management domain / service (system) related to the environment, the ability to quickly identify causes and cope with situations in the event of environmental pollution or disasters is weak, and duplication and investment are being faced. The development of a service platform for smart environment disaster management is designed to detect environmental disasters in an early stage through the management of smart environment disaster management at the national level, It will be a way to predict complex environmental disasters.

Design of Emergency Evacuation Guiding System with Serially Connected Multi-channel Speakers (직렬 스피커 연결을 이용한 비상 대피 유도 시스템의 설계)

  • Chung, Han-Vit;Kim, Tea-Wan;Chung, Yun-Mo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.4
    • /
    • pp.142-152
    • /
    • 2011
  • In general, existing emergency evacuation guiding systems depend on visual techniques like emergency lights or LEDs. Actually people in the case of fire emergency condition may not obtain a range of view because of smoke from the fire. This paper introduces a technique to design an emergency guiding system using directivity sound to cope with this problem. In this case all speakers are serially connected for audio signal transmission in a serial fashion to achieve convenient speaker installation. Floyd algorithm is used to find shortest evacuation paths. Because serially connected multi-channel speakers are weak in case of disconnection, this paper uses a technique to solve the diagnostic problem. In the proposed system, a PC based on the USB protocol is used for control and observation. The system has achievements, such as increasing evacuation rate under emergency conditions, and serial transmission of audio signal for easy maintenance and low installation cost.

A Case Study on the Development and Evaluation of an Web-based Learning Program (웹기반 교육 프로그램의 개발과 프로그램 운영에 따른 효과 고찰)

  • 이영미;장정옥;오유진
    • Journal of Nutrition and Health
    • /
    • v.35 no.8
    • /
    • pp.886-895
    • /
    • 2002
  • Introduction and application of virtual education has been rapidly increased in these days. A variation of information communication technology has an effect on education in interconnect with network as internet in the world that exceed the limit of time and regional. Computer and network communication technology through the medium of internet make an entrance cyber education as a new education paradigm. It must be affective on learner who have various educational characteristics and requirements. It begins to appear quality, quantity improvements of knowledge and the development of information technology that web based cyber education. This study was conducted to develop the web based education program and to evaluate the effectiveness of learning satisfaction and accomplishment and to compare the cyber lecture system with the traditional lecture system During the second semester of 2001, this study was investigated 317 registered students in a "Food and Culture" class at Kyungwon University. The data were obtained from pre and post-study with self-administered questionnaire. The evaluation and satisfaction score of students who were registered in cyberclass was negative tendency to compare pre with post-test scores, because of insuffciency of computer-aided lecture system. The major problem was inconvenient in checking system for connecting times in cyberclass which was one of evaluation point in final score. Another problem was frequently disconnection during cyber studying and not to concentrate each time in the cyber lecture because of eye fatigue, boring due to less interesting contents than other newly developed web-site. The students was prefer to mix type of the cyber and traditional lecture type class. The result of final score an each class, the score of cyber class (71.36 $\pm$ 22.44) was significantly lower than other groups (mixed type : 76.66 $\pm$ 19.99, traditional type :79.17 $\pm$ 15.72) (p < 0.05). Cyber class was attempted to present a useful and interesting teaching and learning tool which can be applied successfully in a longer term. The result suggest that various teaching and learning strategies should be developed considering the fact that the student learn alone most in time.t in time.

A Study on the possibility to apply the characteristics of New Urbanism and our country in a new city business seen from the point of view of modernism and post-modernism - Focus on Eunpyung Newtown No. 1 District - (모더니즘과 포스트모더니즘의 관점에서 본 뉴어바니즘의 특성과 우리나라 신도시 사업에 적용가능성에 관한 연구 - 은평 뉴타운 1지구 개발을 중심으로 -)

  • Park, Jong-Hyun;Lee, Jong-Ryul
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.12 no.4
    • /
    • pp.107-116
    • /
    • 2012
  • Planning a major change in the domestic residential complex 'complex' in the 'city' to the influx of urban space. So, considering a set of self-environmental complex of openness and connectivity between cities inflow from residential urban housing is formed. Complex-oriented development approach and apartment high-rise and high-density regions of space and social disconnection that causes a uniform methodology that can solve the problem of housing plan, however, a recent New Urbanism New Urbanism has been introduced. And intravenous forms of communal life that occurred in the United States prior to World War II, this value is based on the main form. Design reorganizes This modern lifestyle factors (such as housing, jobs, shopping, leisure space) to go back to the traditional lifestyles while Neotradiotional Planning exercise. New Urbanism in the late 20th century, some literature refers to a postmodern approach adopted in the field of urban planning, the specific case. Actually important feature of post-modernism in the New Urbanism has been expressed. Problem is very confusing, and the principles of New Urbanism, New Urbanism, even those who claim that have different social and design views. Therefore, this study explores the postmodern tendencies of the New Urbanism, and based on this, the possibilities for the development of new towns in Korea mainly affected on the theory of New Urbanism in South Korea in Eunpyeong examine.

Concurrency Control of RFID Tag Operations for Consistent Tag Memory Accesses (RFID 태그 메모리 접근의 일관성을 위한 태그 연산의 동시성 제어)

  • Ryu, Woo-Seok;Hong, Bong-Hee
    • Journal of KIISE:Databases
    • /
    • v.37 no.3
    • /
    • pp.171-175
    • /
    • 2010
  • This paper analyzes the tag data inconsistency problem caused by incomplete execution of the tag access operation to the RFID tag's memory and proposes a protocol to control consistent tag data accesses with finalizing the incomplete operation. Passive RFID tag cannot guarantee complete execution of the tag access operations because of uncertainty and unexpected disconnection of RF communications. This leads to the tag data inconsistency problem. To handle this, we propose a concurrency control protocol which defines incomplete tag operations as continuous queries and monitors the tags're-observation continuously. The protocol finalizes the incomplete operation when the tag is re-observed while it blocks inconsistent data accesses from other operations. We justify the proposed protocol by analyzing the completeness and consistency. The experiments show that the protocol shows better performance than the traditional lock-based concurrency control protocol.

Caching and Concurrency Control in a Mobile Client/Sever Computing Environment (이동 클라이언트/서버 컴퓨팅환경에서의 캐싱 및 동시성 제어)

  • Lee, Sang-Geun;Hwang, Jong-Seon;Lee, Won-Gyu;Yu, Heon-Chang
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.8
    • /
    • pp.974-987
    • /
    • 1999
  • 이동 컴퓨팅 환경에서 자주 접근하는 데이터에 대한 캐싱은 무선 채널의 좁은 대역폭에서 경쟁을 줄일 수 있는 유용한 기술이다. 그러나, 트랜잭션 캐시 일관성을 지원하는 전통적인 클라이언트/서버 전략은 클라이언트와 서버간에 많은 양의 통신을 필요로 하기 때문에 이동 클라이언트/서버 컴퓨팅 환경에서는 적절하지 않다. 본 논문에서는 브로드캐스트-기반 캐시 무효화 정책을 사용하면서 트랜잭션 캐시 일관성을 지원하는 OCC-UTS (Optimistic Concurrency Control with Update TimeStamp) 프로토콜을 제안한다. 접근한 데이터에 대한 일관성 검사 및 완료 프로토콜은 캐시 무효화 과정의 내부 과정으로 완전 분산 형태로 효율적으로 구현되며, 일관성 체크의 대부분이 이동 클라이언트에서 수행된다. 또한, 분석 모델에 기반한 성능 비교를 통해, 본 논문에서 제안하는 OCC-UTS 프로토콜이 다른 경쟁 프로토콜보다 높은 트랜잭션 처리율을 얻으며, 데이터 항목을 자주 접근하면 할수록 지역 캐시를 사용하는 OCC-UTS 프로토콜이 더 효율적임을 보인다. 이동 클라이언트의 접속 단절에 대해서는 무효화 브로드캐스트 윈도우를 크게 하여 접속 단절에 적절히 대처할 수 있다.Abstract In a mobile computing environment, caching of frequently accessed data has been shown to be a useful technique for reducing contention on the narrow bandwidth of the wireless channels. However, the traditional client/server strategies for supporting transactional cache consistency that require extensive communications between a client and a server are not appropriate in a mobile client/server computing environment. In this paper, we propose a new protocol, called OCC-UTS (Optimisitic Concurrency Control with Update TimeStamp), to support transactional cache consistency in a mobile client/server computing environment by utilizing the broadcast-based solutions for the problem of invalidating caches. The consistency check on accessed data and the commitment protocol are implemented in a truly distributed fashion as an integral part of cache invalidation process, with most burden of consistency check being downloaded to mobile clients. Also, our experiments based on an analytical model substantiate the basic idea and study the performance characteristics. Experimental results show that OCC-UTS protocol without local cache outperforms other competitor protocol, and the more frequent a mobile client accesses data items the more efficient OCC-UTS protocol with local cache is. With respect to disconnection, the tolerance to disconnection is improved if the invalidation broadcast window size is extended.

Update Frequency Cache Consistency for Reducing Wait Time in Mobile Computing (이동 컴퓨팅 환경에서 대기 시간을 감소시키는 갱신 빈도 캐쉬 일관성 기법)

  • Lee, Chan-Seob;Kim, Dong-Hyuk;Baek, Joo-Hyun;Choi, Eui-In
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1017-1024
    • /
    • 2002
  • According as mobile computing environment is generalized by development of wireless networking technology and communication device, mobile host uses local cache for extensibility and early response time. and reduction of limited bandwidth. This time, between mobile host and mobile support station cache need consistency interested person of done data accordingly much techniqueses propose. Existent consistency techniques because detection based techniqueses are used mainly and broadcast periodic invalid message considering frequent disconnection. However, these techniqueses increase abort step through increase or delay of transmission message number by accuracy examination of data. Therefore, because mobile host deletes cached data, and extensity are decreased. Techniques that is proposed in this paper did to perform refering update frequency about object that page request or when complete update operation happens to solve these problem. Therefore, have advantage that response is fast because could run write intention declaration or update by update frequency electively asynchronously when update operation consists and abort step decreases. Also, improved extensity running delete or propagation electively according to update frequency about periodic invalid message gone since disconnection.

Reduction of Authentication Cost Based on Key Caching for Inter-MME Handover Support (MME 도메인간 핸드오버 지원을 위한 키캐싱 기반 인증비용의 감소기법)

  • Hwang, Hakseon;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.209-220
    • /
    • 2013
  • Handover is the technology to minimize data lose of mobile devices and make continuous communication possible even if the device could be moved from one digital cell site to another one. That is, it is a function that enables the mobile user to avoid the disconnection of phone conversations when moving from a specific mobile communication area to another. Today, there are a lot of ongoing researches for fast and efficient hand-over, in order to address phone call's delay and disconnection which are believed to be the mobile network's biggest problems, and these should essentially be resolved in all mobile networks. Thanks to recent technology development in mobile network, the LTE network has been commercialized today and it has finally opened a new era that makes it possible for mobile phones to process data at high speed. In LTE network environment, however, a new authentication key must be generated for the hand-over. In this case, there can be a problem that the authentication process conducted by the hand-over incurs its authentication cost and delay time. This essay suggests an efficient key caching hand-over method which simplifies the authentication process: when UE makes hand-over from oMME to nMME, the oMME keeps the authentication key for a period of time, and if it returns to the previous MME within the key's lifetime, the saved key can be re-used.