• Title/Summary/Keyword: frequent convergence

Search Result 205, Processing Time 0.018 seconds

A Study on the decision of Scattering distance by Shape of Fragments in LPG Tank lorry Explosion (LPG 탱크로리 폭발시 파편 형상에 따른 비산거리 산정에 관한 연구)

  • Lee, Young Jin;Hwang, Yong Woo;Lee, Ik Mo;Moon, Jin Young
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.2
    • /
    • pp.29-34
    • /
    • 2017
  • LPG is a substance that requires a lot of attention because it can cause fatal damage to people and environment when an accident occurs. LPG is frequently accidents in transportation facilities as well as fixed facilities, among which LPG tank lorries are the most frequent accidents. When the LPG tank is evacuated, the LP gas leaks into two phases, leaks mostly to the gas and leaks to some liquid. At this time, the leaked gas will also sink downward because it is heavier than air, and if it continues to leak, it may form an explosion and explode by the ignition source. The purpose of this study is to present the evacuation distance by analyzing the effect distance of the LPG liquefied petroleum gas in the event of explosion. As a result of calculation of the scattering radius of the fragment, the cylinder fragment was scattered up to 561 m. Therefore, it is appropriate to set the distance to be escaped when the LPG tanker leaks to 561m or more.

Lightweight Key Escrow Scheme for Internet of Battlefield Things Environment (사물인터넷 환경을 위한 경량화 키 위탁 기법)

  • Tuan, Vu Quoc;Lee, Minwoo;Lim, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.12
    • /
    • pp.1863-1871
    • /
    • 2022
  • In the era of Fourth Industrial Revolution, secure networking technology is playing an essential role in the defense weapon systems. Encryption technology is used for information security. The safety of cryptographic technology, according to Kerchoff's principles, is based on secure key management of cryptographic technology, not on cryptographic algorithms. However, traditional centralized key management is one of the problematic issues in battlefield environments since the frequent movement of the forces and the time-varying quality of tactical networks. Alternatively, the system resources of each node used in the IoBT(Internet of Battlefield Things) environment are limited in size, capacity, and performance, so a lightweight key management system with less computation and complexity is needed than a conventional key management algorithm. This paper proposes a novel key escrow scheme in a lightweight manner for the IoBT environment. The safety and performance of the proposed technique are verified through numerical analysis and simulations.

Efficient USN Routing Protocol using Sub-Clustering

  • Jeong, Su-Hyung;Yoo, Hae-Young
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.4
    • /
    • pp.466-469
    • /
    • 2008
  • The existing routing protocols in USN environment, PEGASIS is more efficient than LEACH, which is a hierarchical routing protocol, for network configuration based on power consumption. Despite its merit that it can reduce energy consumption per node, however, the PEGASIS protocol also has a weakness that it is less responsive to frequent changes that occur in the configuration of sensor network due to BS nodes that keep changing, which is a typical characteristic of the sensor network. To address this problem, this paper proposes to select sub-cluster heads and have them serve as intermediate nodes. This paper presents and analyses that this method can resolve the aforementioned problem of the PEGASIS algorithm.

IoT Industry & Security Technology Trends

  • Park, Se-Hwan;Park, Jong-Kyu
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2016
  • High-tech industries in a state well enough to troubleshoot hacking information introduction a big barrier to delay the growth of the market related to IoT(Internet of Things) as is likely to be on the rise. This early on, security issues introduced in the solution, a comprehensive solution, including the institutional laws/precautions needed. Recent examples of frequent security threats while IoT is the biggest issue of introducing state-of-the-art industry information due to the vulnerable security hacking. This high-tech industries in order to bridge the information responsible for the target attribute, target range, and the protection of security and how to protect the subject, IoT environment (domestic industrial environment) considering the approach is needed. IoTs with health care and a wide variety of services, such as wearable devices emerge. This ensures that RFID/USN-based P2P/P2M/M2M connection is the implementation of the community. In this study, the issue on the high-tech industrial information and the vulnerable security issues of IoT are described.

The Design of an Efficient Proxy-Based Framework for Mobile Cloud Computing

  • Zhang, Zhijun;Lim, HyoTaek;Lee, Hoon Jae
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.1
    • /
    • pp.15-20
    • /
    • 2015
  • The limited battery power in the mobile environment, lack of sufficient wireless bandwidth, limited resources of mobile terminals, and frequent breakdowns of the wireless network have become major hurdles in the development of mobile cloud computing (MCC). In order to solve the abovementioned problems, This paper propose a proxy-based MCC framework by adding a proxy server between mobile devices and cloud services to optimize the access to cloud services by mobile devices on the network transmission, application support, and service mode levels. Finally, we verify the effectiveness of the developed framework through an experimental analysis. This framework can ensure that mobile users have efficient access to cloud services.

Analysis of Success Factors for Mobile Commerce using Text Mining and PLS Regression

  • Kim, Yong-Hwan;Kim, Ja-Hee;Park, Ji hoon;Lee, Seung-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.11
    • /
    • pp.127-134
    • /
    • 2016
  • In this paper, we propose factors that influence on the mobile commerce satisfaction conducted by data mining and a PLS regression analysis. We extracted the most frequent words from mobile application reviews in which there are a large number of user's requests. We employed the content analysis to condense the large number of texts. We took a survey with the categories by which data are condensed and specified as factors that influence on the mobile commerce satisfaction. To avoid multicollinearity, we employed a PLS regression analysis instead of using a multiple regression analysis. Discovered factors that are potential consequences of customer satisfaction from direct requests by customers, the result may be an appropriate indicator for the mobile commerce market to improve its services.

A Brief Overview of Wireless Power Transfer Techniques

  • Kshatri, Dinesh Baniya;Shrestha, Surendra;Shrestha, Bhanu
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.1-5
    • /
    • 2015
  • The necessity to distribute energy wirelessly has been spurred by the tremendous growth in the use of portable devices. Mobile devices have become ubiquitous and the circuits within them have been optimized to consume extremely low amounts of power. Such portable electronic sets are in constant use and the frequent need to recharge them; using conventional wired mechanisms have hindered the mobility of users. Wireless transmission of energy to power-up devices has been proposed since the days of Tesla and since then many theories and methods have been invented. This paper discusses some of those techniques briefly.

Accelerating RFID Tag Identification Processes with Frame Size Constraint Relaxation

  • Park, Young-Jae;Kim, Young-Beom
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.3
    • /
    • pp.242-247
    • /
    • 2012
  • In the determination of suitable frame sizes associated with dynamic framed slotted Aloha used in radio frequency identification tag identification processes, the widely imposed constraint $L=2^Q$ often yields inappropriate values deviating far from the optimal values, while a straightforward use of the estimated optimal frame sizes causes frequent restarts of read procedures, both resulting in long identification delays. Taking a trade-off, in this paper, we propose a new method for determining effective frame sizes where the effective frame size changes in a multiple of a predetermined step size, namely ${\Delta}$. Through computer simulations, we show that the proposed scheme works fairly well in terms of identification delay.

A Clinical History Recording Management Scheme on the Multimedia Telemedicine

  • Kim Seok-Soo
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.3
    • /
    • pp.157-160
    • /
    • 2004
  • The paper's suggestion is about hereditary facts between family members. Diagnosing patients from the point of patients temporary conditions, and so performing primitive examinations and treatments, can lead not only to frequent wrong diagnoses, and to huge medical expenses and times to the patients, but even to critical situation of patients or taking lives away. As a means to cut these cases down to a minimum, sharing medical treatment information between family members is suggested. This approach makes possible understanding physical constitution and environment between family members, and can result in bringing a faster treatment effect if some family member suffers from a similar disease. This approach, since a participation in a family membership effectuates all of family members, can minimize the membership fees, thus enabling inter-family health care on a home doctor basis.

Current issues on Requirement Traceability Mechanism for Software Organization of the 4th Industrial Revolution

  • Kim, Janghwan;Kim, R. Young Chul
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.167-172
    • /
    • 2020
  • In the 4th industrial revolution, there are many projects for diverse software applications of smart city environments. Most of the stakeholders focus on considering software quality for their developed software. Nobody doesn't guarantee requirement satisfaction after complete development. At this time, we can only work on user acceptance testing for requirement satisfaction on frequently changing requirements. Why keeps the requirement traceability? This traceability is to identify risks related to requirements, to assure correct software development based on customer requirements. To solve this, we are researching how to implement requirement traceability across each artifact's relationship to each activity of a whole development lifecycle.