• Title/Summary/Keyword: information module

Search Result 4,578, Processing Time 0.036 seconds

Design and Implementation of ASTERIX Parsing Module Based on Pattern Matching for Air Traffic Control Display System (항공관제용 현시시스템을 위한 패턴매칭 기반의 ASTERIX 파싱 모듈 설계 및 구현)

  • Kim, Kanghee;Kim, Hojoong;Yin, Run Dong;Choi, SangBang
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.3
    • /
    • pp.89-101
    • /
    • 2014
  • Recently, as domestic air traffic dramatically increases, the need of ATC(air traffic control) systems has grown for safe and efficient ATM(air traffic management). Especially, for smooth ATC, it is far more important that performance of display system which should show all air traffic situation in FIR(Flight Information Region) without additional latency is guaranteed. In this paper, we design a ASTERIX(All purpose STructured Eurocontrol suRveillance Information eXchange) parsing module to promote stable ATC by minimizing system loads, which is connected with reducing overheads arisen when we parse ASTERIX message. Our ASTERIX parsing module based on pattern matching creates patterns by analyzing received ASTERIX data, and handles following received ASTERIX data using pre-defined procedure through patterns. This module minimizes display errors by rapidly extracting only necessary information for display different from existing parsing module containing unnecessary parsing procedure. Therefore, this designed module is to enable controllers to operate stable ATC. The comparison with existing general bit level ASTERIX parsing module shows that ASTERIX parsing module based on pattern matching has shorter processing delay, higher throughput, and lower CPU usage.

A New Concept of Manipulator Modeling

  • Roh, Ho-Sik;Kim, Jin-Oh
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2546-2550
    • /
    • 2003
  • We propose a new method of robot manipulator modeling. Different from existing modelers, our modeler provides a convenient robot modeling configured from modules from module library or module modeling. In addition, a way of using D-H parameters to configure a robot is proposed. These additional functions of robot modeling can be a powerful and flexible tool for various needs of robot modeling. We show an example of modeling with our approach.

  • PDF

Analysis of TCP packet by Protocol Analysis module Design (프로토콜 분석모듈 설계에 의한 TCP 패킷 분석)

  • Eom, Gum-Yong
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.234-236
    • /
    • 2004
  • Transmission control protocol(TCP) is protocol used in internet. TCP is seldom transmission error and is protocol based on wire environment. TCP uses 3 way handshake ways, data transmission control through windows size, data transmission control through reception confirmation, sliding window for packet delivery. In this study, designed TCP packet ion module for analyze the TCP segments & correct information about TCP. TCP capture in internet using designed TCP module and analysed TCP segments composition. Through this, could analyze the correct information of protocol in network.

  • PDF

A Design of Loadable Kernel Module enhancing the security on Solaris 8 (Solaris 8 기반의 보안 강화용 LKM(loadable Kernel Module) 설계)

  • 최은정;심원태;김명주
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.853-855
    • /
    • 2002
  • 안전한 운영체제(Secure Operating System)는 컴퓨터 운영체제의 보안상 결함으로 인하여 발생 가능한 각종 해킹으로부터 시스템을 보호하기 위하여 기존의 운영체제 내에 보안 기능을 통합시킨 보안 커널(Security Kernel)을 추가로 이식한 운영체제이다. 본 논문에서는 polaris 8에서 동작하는 보안 커널을 설계하기 위해 안전한 운영체제와 보안 커널 개발 기술, 솔라리스 운영체제 및 커널 기술을 살펴본다. 이를 토대로 RBAC(Role-Based Access Control)을 지원하고 시스템의 취약점을 감시하는 Solaris 8 기반의 보안 강화용 LKM(Loadable Kernel Module)을 설계한다.

  • PDF

A Study on the Security Module for Data Integrity of Mobile Client (모바일 클라이언트의 데이터 무결성 보장을 위한 보안모듈에 관한 연구)

  • Joo, Hae-Jong;Hong, Bong-Hwa
    • The Journal of Information Technology
    • /
    • v.10 no.3
    • /
    • pp.77-92
    • /
    • 2007
  • This study aims to suggest an implementation methodology of security module for data integrity of mobile internet terminal. This is based on the WTLS(Wileless Transport Layer Security) of WAP Protocol. This security module is expected to achieve central role in conversion of wireless internet environment and emphasis of encryption technology and safe and calculable wireless communication environment construction.

  • PDF

A development of multiple PLC communication module for near field control and measurement (근거리 원격 계측 및 제어를 위한 다중 PLC용 통신 모듈 개발)

  • 박종석;현웅근
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.661-664
    • /
    • 2000
  • A winless communication module for multiple PLC was developed. The function of the developed system are dual communication, concurrent multiple communication PLC control ,d interpretation of RC command, and A/D D/A converting. The multiple communication approach is based on master-slave control concept To show validity of the developed module, severial experiments are illustrated.

  • PDF

Design and Implementation of Key Exchange System for IPv6 Hardware IPsec (IPv6용 하드웨어 IPsec을 위한 키 교환 시스템의 설계 및 구현)

  • 박동익;류준우;공인엽;이정태
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.415-417
    • /
    • 2002
  • 운영체제가 지원되지 않는 소규모 기기에서 IPv6의 보안기능을 고성능으로 제공하기 위해본 연구실에서는 IPv6용 IPsec 프로토콜과 암호화 알고리즘을 하드웨어로 구현하였다. 이러한 IPv6용 하드웨어 IPsec을 기반으로 한 보안 서비스를 제공하기 위해서는 안전한 키의 교환과 인증이 중요하다. 이를 위하여 본 논문에서는 IPv6용 하드웨어 IPsec을 위한 키 교환시스템으로서 IKE Module을 설계하여 드라이버 프로그램으로 구현하였다. 그리고 구현된 IKE Module을 IPv6용 하드웨어 IPsec의 드라이버로 탑재하여 기존의 소프트웨어 IKE Module과의 테스트를 통하여 기능을 검증하였다.

  • PDF

Analyses of additive Crypto-module Architecture for a Sensor Network (센서 네트워크를 위한 부가적인 암호모듈의 구조 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.795-798
    • /
    • 2005
  • In this paper, we analyses of additive crypto-module architecture for a sensor network. Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the development of a large number of sensor devices in the field. Limitations in processing power, battery life, communication bandwidth and memoryconstrain devices. A mismatch between wide arithmetic for security and embedded data buscombined with lack of certain operations. Then, we compared the architecture of crypto-module in this paper.

  • PDF

Understanding and Designing Teachable Agent (교수가능 에이전트(Teachable Agent)의 개념적 이해와 설계방안)

  • 김성일;김원식;윤미선;소연희;권은주;최정선;김문숙;이명진;박태진
    • Korean Journal of Cognitive Science
    • /
    • v.14 no.3
    • /
    • pp.13-21
    • /
    • 2003
  • This study presents a design of Teachable Agent(TA) and its theoretical background. TA is an intelligent agent to which students as tutors teach, pose questions, and provide feedbacks using a concept map. TA consists of four independent Modules, Teach Module, Q&A Module, Test Module, and Resource Module. In Teach Module, students teach TA by constructing concept map. In Q&A Module, both students and TA ask questions and answer questions each other through an interactive window. To assess TA's knowledge and provide feedback to students, Test Module consists of a set of predetermined questions which TA should pass. From Resource Module, students can search and look up important information to teach, ask questions, and provide feedbacks whenever they want. It is expected that TA should provide student tutors with an active role in learning and positive attitude toward the subject matter by enhancing their cognition as well as motivation.

  • PDF