• Title/Summary/Keyword: existing network

Search Result 5,697, Processing Time 0.036 seconds

Low-Cost Remote Power-Quality-Failure Monitoring System using Android APP and MCU (안드로이드 앱과 MCU를 이용한 저가형 원격 전원품질이상 감시 시스템)

  • Lim, Ho-Kyoun;Kim, Seo-Hwi;Lee, Seung-Hyeon;Choe, Sangho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.144-155
    • /
    • 2013
  • This paper presents a low-cost remote power-quality-failure monitoring system (RPMS) using Android App and TI MCU (micro-controller unit), which is appliable to a micro-grid. The designed RPMS testbed consists of smart nodes, a server, and Android APPs. Especially, the C2000-series MCU-based RPMS smart node that is low-cost compared to existing monitoring systems has both a signal processing function for power signal processing and a data transmission function for power-quality monitoring data transmission. The signal processing function implements both a wavelet-based power failure detection algorithm including sag, swell, and interruption, and a FFT-based power failure detection algorithm including harmonics such that reliable and real-time power quality monitoring is guaranteed. The data transmission function implements a low-complexity RPMS transmission protocol and defines a simple data format (msg_Diag) for power monitoring message transmission. We may watch the monitoring data in real time both at a server and Android phone Apps connected to the WiFi network (or WAN). We use RS-232 (or Bluetooth) as the wired (or wireless) communication media between a server and nodes. We program the RPMS power-quality-failure monitoring algorithm using C language in the CCS (Code Composer Studio) 3.3 environment.

Implementation of Smart Metering System Based on Deep Learning (딥 러닝 기반 스마트 미터기 구현)

  • Sun, Young Ghyu;Kim, Soo Hyun;Lee, Dong Gu;Park, Sang Hoo;Sim, Issac;Hwang, Yu Min;Kim, Jin Young
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.829-835
    • /
    • 2018
  • Recently, studies have been actively conducted to reduce spare power that is unnecessarily generated or wasted in existing power systems and to improve energy use efficiency. In this study, smart meter, which is one of the element technologies of smart grid, is implemented to improve the efficiency of energy use by controlling power of electric devices, and predicting trends of energy usage based on deep learning. We propose and develop an algorithm that controls the power of the electric devices by comparing the predicted power consumption with the real-time power consumption. To verify the performance of the proposed smart meter based on the deep running, we constructed the actual power consumption environment and obtained the power usage data in real time, and predicted the power consumption based on the deep learning model. We confirmed that the unnecessary power consumption can be reduced and the energy use efficiency increases through the proposed deep learning-based smart meter.

Location Recognition Mechanism of Mobile Node for Fast Handover on Proxy Mobile IPv6 (프록시 모바일 IPv6에서 빠른 핸드오버를 위한 이동단말의 위치인지 메커니즘)

  • Bae, Sang-Wook;Kim, Hee-Min;Oudom, Keo;Han, Sun-Young
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.459-465
    • /
    • 2010
  • Mobile IPv6(MIPv6) features have several defects such as overloading of nodes, loss of wireless signals, packet loss, movement problem and so forth. Proxy Mobile IPv6 (PMIPv6) got over the limit of MIPv6 problems. MIPv6 features have several defects such as overloading of nodes, loss of wireless signals, packet loss, movement problem and so forth. Research on PMIPv6, which features network-based mobility is actively in progress in order to resolve these issues. PMIPv6 is emerging as a new paradigm that can overcome the limitations of the existing MIPv6. Nevertheless, such PMIPv6 also incurs problems during hand-over. While it offers a solution to node-based problems, it does, too, create long delay times during hand-over. Since MN (Mobile Node) has been sensing its own movements on MIPv6, fast handover can be done easily. However it can't apply fast handover like MIPv6, as it can't apply fast handover like MIPv6 In this paper, the author solved hand-over problem on MIPv6. MAG knows location information of MN and if MN moves into other MAG's area, Location Server gives MN information to the MAG. Therefore, this mechanism makes hand-over process easier.

An analysis of trends in wetland function assessments and further suggestions (습지 기능 평가의 동향 분석 및 제언)

  • Hong, Mun Gi;Kim, Jae Geun
    • Journal of Wetlands Research
    • /
    • v.19 no.1
    • /
    • pp.1-15
    • /
    • 2017
  • Wetland function assessment is not only a basic step to understand wetland ecosystems in detail but also an important process as a base of the term, ecosystem service to recognize wetland ecosystems as valuable and useful resources and goods for human being. WET (wetland evaluation technique), EMAP (environmental monitoring assessment program)-wetlands, and HGM (hydrogeomorphic method) were developed as pioneer wetland function assessments in U.S. at the end of $20^{th}$-century. RAMs (rapid assessment methods) became a major function assessment tool which is relatively simpler and easier assessment tool at the beginning of $21^{th}$-century. After that, the hierarchy of three levels of assessment (landscape assessment, rapid assessment, and intensive assesment) has been prepared and strategically utilized according to the objectives and purposes of function assessments. In South Korea, RAM and HGM were used to assess wetland functions with reforming a couple of items and contents at 2001. And, modified and reformed function assessments have been developed to complement and improve upon the existing RAMs and HGMs. Via the trend analysis on wetland function assessments, some needs which require supplements in terms of function assessment are pointed out: 1) wetland function assessments using useful indicators such as birds are needed with considering our environmental characteristics. 2) optimized wetland function assessments for coastal wetlands are also needed. 3) the network construction and further expansion to lead communications and co-operations between researchers and policy makers is needed in the field of wetland function assessment.

Timestamps based sequential Localization for Linear Wireless Sensor Networks (선형 무선 센서 네트워크를 위한 시각소인 기반의 순차적 거리측정 기법)

  • Park, Sangjun;Kang, Jungho;Kim, Yongchul;Kim, Young-Joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1840-1848
    • /
    • 2017
  • Linear wireless sensor networks typically construct a network topology with a high reliability through sequential 1:1 mapping among sensor nodes, so that they are used in various surveillance applications of major national infrastructures. Most existing techniques for identifying sensor nodes in those networks are using GPS, AOA, and RSSI mechanisms. However, GPS or AOA based node identification techniques affect the size or production cost of the nodes so that it is not easy to construct practical sensor networks. RSSI based techniques may have a high deviation regrading location identification according to propagation environments and equipment quality so that complexity of error correction algorithm may increase. We propose a timestamps based sequential localization algorithm that uses transmit and receive timestamps in a message between sensor nodes without using GPS, AOA, and RSSI techniques. The algorithms for distance measurement between each node are expected to measure distance within up to 1 meter in case of an crystal oscillator of 300MHz or more.

Web application firewall technology trends and testing methodology (웹방화벽 기술동향 파악 및 시험방법론)

  • Jo, In-june;Kim, Sun-young;Kim, Chan-joong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.132-138
    • /
    • 2012
  • Existing network layer firewall security support is one that does not support the higher layer, the application layer of a vulnerable web application security. Under these circumstances, the vulnerability of web applications to be able to defend a Web Application Firewall is positioned as a solver to solve the important security issues of businesses spotlighted in the next generation of security systems, and a very active market in the market other than domestic is expected to be formed. However, Firewall Web has not yet proposed a standard which can be used to test the performance of the Web Application Firewall Web Application Firewall and select the products of trust hardly Companies in BMT conduct their own individual problems and the cost of performance testing technologies, there is a limit. In this study, practically usable BMT model was developed to evaluate the firewall vendor. Product ratings ISO / IEC 9126, eight product characteristics meet the performance and characteristics of a web application firewall entries are derived. This can relieve the burden on the need to be evaluated in its performance testing of Web firewall, and can enhance the competitiveness of domestic-related sectors, by restoring confidence in the product can reduce the dependence on foreign products.

  • PDF

Development of Win32 API Message Authorization System for Windows based Application Provision Service (윈도우 기반 응용프로그램 제공 서비스를 위한 Win32 API 메시지 인가 시스템의 개발)

  • Kim, Young-Ho;Jung, Mi-Na;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.47-54
    • /
    • 2004
  • The growth of computer resource and network speed has increased requests for the use of remotely located computer systems by connecting through computer networks. This phenomenon has hoisted research activities for application service provision that uses server-based remote computing paradigm. The server-based remote computing paradigm has been developed as the ASP (Application Service Provision) model, which provides remote users through application sharing protocol to application programs. Security requirement such as confidentiality, availability, integrity should be satisfied to provide ASP service using centralized computing system. Existing Telnet or FTP service for a remote computing systems have satisfied security requirement by a simple access control to files and/or data. But windows-based centralized computing system is vulnerable to confidentiality, availability, integrity where many users use the same application program installed in the same computer. In other words, the computing system needs detailed security level for each user different from others, such that only authorized user or group of users can run some specific functional commands for the program. In this paper, we propose windows based centralized computing system that sets security policies for each user for the use of instructions of the application programs, and performs access control to the instructions based on the security policies. The system monitors all user messages which are executed through graphical user interface by the users connecting to the system. Ail Instructions, i.e. messages, for the application program are now passed to authorization process that decides if an Instruction is delivered to the application program based on the pre-defined security polices. This system can be used as security clearance for each user for the shared computing resource as well as shared application programs.

An Efficient P2P Based Proxy Patching Scheme for Large Scale VOD Systems (대규모 VOD 시스템을 위한 효율적인 P2P 기반의 프록시 패칭 기법)

  • Kwon, Chun-Ja;Choi, Hwang-Kyu
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.341-354
    • /
    • 2005
  • The main bottleneck for large scale VOD systems is bandwidth of storage or network I/O due to the large number of client requests simultaneously, and then efficient techniques are required to solve the bottleneck problem of the VOD system. Patching is one of the most efficient techniques to overcome the bottleneck of the VOD system through the use of multicast scheme. In this paper, we propose a new patching scheme, called P2P proxy patching, for improving the typical patching technique by jointly using the prefix caching and P2P proxy. In our proposed scheme, each client plays a role in a proxy to multicast a regular stream to other clients that request the same video stream. Due to the use of the P2P proxy and the prefix caching, the client requests that ive out of the patching window range can receive the regular stream from other clients in the previous patching group without allocating the new regular channels from the VOD server to the clients. In the performance study, we show that our patching scheme can reduce the server bandwidth requirement about $33\%$ less than that of the existing patching technique with respect to prefix size and request interval.

Design and Implementation of Lesson Plan System for teacher-student based on XML (XML 기반 교수-학생 학습지도 시스템의 설계 및 구현)

  • Choi, Mun-Kyoung;Kim, Haeng-Kon
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1055-1062
    • /
    • 2002
  • Recently, the lesson plan document that is imported in the educational area is not provided to the educational information systematically, and the teachers are not easy to compose the lessen plan documentation. So, it needs additional time and effort to develope the lesson plan documents. Because of increasing the distributing network. web-based lesson plan system is required to all of the education area. Therefore, we need to compose the lesson plan that is possible to obtain the various teacher's requirement by providing creation, retrival, and reusability of document using the standard XML on web. In this paper, we developed the system for creating the common DTD (Document Type Definition), providing the standard XML document through the common DTD over the lesson plan analysis. In this system, it provides the editor to compose the lesson plan and supports the searching function to improvement of reusability on the existing lesson plan. We design the searching functions such as the structure base, facet and keyword. The composed lesson plans are interoperated with Database. Consequently, we can share the information on web by composing the lesson plan using the XML and save the time and cost by directly writing the lesson plan on web. We can also provide the improved learning environment.

Cache Replacement Strategies considering Location and Region Properties of Data in Mobile Database Systems (이동 데이타베이스 시스템에서 데이타의 위치와 영역 특성을 고려한 캐쉬 교체 기법)

  • Kim, Ho-Sook;Yong, Hwan-Seung
    • Journal of KIISE:Databases
    • /
    • v.27 no.1
    • /
    • pp.53-63
    • /
    • 2000
  • The mobile computing service market is increasing rapidly due to the development of low-cost wireless network technology and the high-performance mobile computing devices. In recent years, several methods have been proposed to effectively deal with restrictions of the mobile computing environment such as limited bandwidth, frequent disconnection and short-lived batteries. Amongst those methods, much study is being done on the caching method - among the data transmitted from a mobile support station, it selects those that are likely to be accessed in the near future and stores them in the local cache of a mobile host. Existing cache replacement methods have some limitations in efficiency because they do not take into consideration the characteristics of user mobility and spatial attributes of geographical data. In this paper, we show that the value and the semantic of the data, which are stored in the cache of a mobile host, changes according to the movement of the mobile host. We argue it is because data that are geographically near are better suited to provide an answer to a users query in the mobile environment. Also, we define spatial location of geographical data has effect on, using the spatial attributes of data. Finally, we propose two new cache replacement methods that efficiently support user mobility and spatial attributes of data. One is based on the location of data and the other on the meaningful region of data. From the comparative analysis of the previous methods and that they improve the cache hit ratio. Also we show that performance varies according to data density using this, we argue different cache replacement methods are required for regions with varying density of data.

  • PDF