• Title/Summary/Keyword: route server

Search Result 70, Processing Time 0.025 seconds

Implementation of Autonomous Mobile Wheeled Robot for Path Correction through Deep Learning Object Recognition (딥러닝 객체인식을 통한 경로보정 자율 주행 로봇의 구현)

  • Lee, Hyeong-il;Kim, Jin-myeong;Lee, Jai-weun
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.164-172
    • /
    • 2019
  • In this paper, we implement a wheeled mobile robot that accurately and autonomously finds the optimal route from the starting point to the destination point based on computer vision in a complex indoor environment. We get a number of waypoints from the starting point to get the best route to the target through deep reinforcement learning. However, in the case of autonomous driving, the majority of cases do not reach their destination accurately due to external factors such as surface curvature and foreign objects. Therefore, we propose an algorithm to deepen the waypoints and destinations included in the planned route and then correct the route through the waypoint recognition while driving to reach the planned destination. We built an autonomous wheeled mobile robot controlled by Arduino and equipped with Raspberry Pi and Pycamera and tested the planned route in the indoor environment using the proposed algorithm through real-time linkage with the server in the OSX environment.

Multi-level Protection Infrastructure for Virus Protection (다단계 바이러스 차단 구조 연구)

  • 노시춘;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.187-198
    • /
    • 2004
  • Virus protection infrastructure management is network infrastructure management, traffic route management, virus protection zone expansion, and virus protection management for gateway area. This research paper provides a diagnosis of characteristics and weaknesses of the structure of existing virus protection infrastructure, and recommends an improved multi-level virus protection infrastructure as a measure for correcting these weaknesses. Unproved virus protection infrastructure fitters unnecessary mail at the gateway stage to reduce the toad on server. As a result, number of transmission accumulation decreases due to the reduction in the CPU load on the Virus wall and increase in virus treatment rate.

  • PDF

A study on an Infrastructure for Virus Protection (바이러스 차단 인프라 구조에 관한 연구)

  • Noh, Si-Choon;Kim, Su-Hee;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.53-62
    • /
    • 2005
  • Virus protection infrastructure managementis network infrastructure management, traffic route management, virus protection zone expansion, and virus protection management for gateway area. This research paper provides a diagnosis of characteristics and weaknesses of the structure of existing virus protection infrastructure, and recommends an improved multi-level virus protection infrastructure as a measure for correcting these weaknesses. Improved virus protection infrastructure filters unnecessary mail at the gateway stage to reduce the load on server. As a result, numberof transmission accumulation decreases due to the reduction in the CPU load on the Virus wall and increase in virus treatment rate.

  • PDF

User Route analysis of using GPS on a Mobile Device and Moving Route Recommendation System (모바일장치의 GPS를 이용한 사용자 이동경로 분석 및 이동경로 추천 시스템)

  • Kim, Sun-Yong;Park, Bum-Jun;Jung, Jai-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.135-141
    • /
    • 2011
  • Mobile communication technology in the field of ubiquitous computing is one of important technologies. The development of GPS technology in mobile communications technology and PDA, the vast majority of mobile devices such as smart phones also being equipped with GPS functionality. This user where they are located where they are based on the number of through services were able to receive information. In this paper, mounted on a mobile device user's location using GPS capabilities to track the migration routes and the accumulated user to determine the migratory path of the system used to recommend the proposed route of the proposed method and system Designs. The services offered by tracking the location of the user to move the user to route data to create and upload to the server. Upload a migration path to move data from where they currently reside to the user is recommended to go to your destination. The services offered by the users do not know where to travel or go to your destination, etc. If you do not remember the path can be useful.

A Location Recognition System of RFID Tag for Parking Control (주차관제를 위한 RFID 태그 객체의 위치 인식 시스템)

  • Kang, Ku-An;Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.1
    • /
    • pp.99-107
    • /
    • 2008
  • Recently route guiding system using GPS is spread widely. In the parking management system of complex mall, RFID is mainly used to control status of parking lots. However, in a case that a vehicle only with RFID tag enters into small market-populated district with service of parking lots, there is no parking route guiding system optimized with information of real tine status of parking lots and the system only with GPS can't provide a function of using real time status of parking lots. This paper proposes a location recognizing method of RFID tag object for parking control system to integrated several parking lots in the business district and database-linked route guiding system optimized for parking. The proposed location recognizing method makes the search of optimized parking route possible by abstracting decoding order of tag and antenna number and recognizing direction of tag linked with database. Ihe implemented system that is composed of RFID tag, reader, middleware, server, parking lot clients and mobile clients shows that the proposed method works well and it will be useful for integrated parking control system.

Fake GPS Detection for the Online Game Service on Server-Side (모의 위치 서비스를 이용한 온라인 게임 악용 탐지 방안)

  • Han, Jaehyeok;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1069-1076
    • /
    • 2017
  • Recently $Pok\acute{e}mon$ GO implements an online game with location-based real time augmented reality on mobile. The correct play of this game should be based on collecting the $Pok\acute{e}mon$ that appears as the user moves around by foot, but as the popularity increases, it appears an abuse to play easily. Many people have used an application that provides a mock location service such as Fake GPS, and these applications can be judged to be cheating in online games because they can play games in the house without moving. Detection of such cheating from a client point of view (mobile device) can consume a large amount of resources, which can reduce the speed of the game. It is difficult for developers to apply detection methods that negatively affect game usage and user's satisfaction. Therefore, in this paper, we propose a method to detect users abusing mock location service in online game by route analysis using GPS location record from the server point of view.

Design and Implementation of Smart Bus Information System(SBIS) based on Smartphone Server Network (스마트폰 서버 네트워크 기반의 스마트 버스운행정보시스템)

  • Moon, Jae Young;Im, Kwang Hyuk
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.8
    • /
    • pp.458-465
    • /
    • 2013
  • The purpose of this research is possible to reduce cost of management and maintenance to realization of smartphone and using data server network technology instead of GPS. Former wireless bus information system was focused on supply side management structure and national spread thus it needs to establish GPS terminal, Windows CE, Window XP embedded and LCD panels which provide only one way communication of information of public traffic information. Therefore, former system management and maintenance cost are very expansive. This research is not use GPS terminal and other hardware equipment but design and realization using smartphone and data network server. This system also provides low cost of management and maintenance. It is not only service downtown area but also out of town and small and medium-sized cities. This system functionally gets a satisfying result user convenience and satisfaction using function of set-up route map, real-time display, and running statically analysis.

Development of a Control System for E-Bike Based on IOT (IOT 기반의 전기 자전거 제어 시스템 개발)

  • Park, Jong-Jin;Cho, Bum-Dong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.150-157
    • /
    • 2016
  • In this paper, a control system for E-bike based on IOT was developed, which collects and monitors information of states of E-bike and surrounding environments from several sensors and control devices in E-bike, and informs the possible dangers to rider when riding the E-bike. Developed electronic control system can manage battery efficiently, obtain battery's remaining power in real-time and provide possible riding distance to rider. It makes possible for rider to schedule near optimal riding route in terms of battery usage and respond quickly to battery discharge. Results of applying developed system to E-bike show that according to driving-mode, possible driving distance can be calculated efficiently and using user application App, real-time driver position marking and driving route searching functions lead to energy efficient E-bike driving. Later we will endeavor to integrate BMS, ECU, smart-phone and PC(server) to provide stable driving system based on various driving information of E-bike.

Mobility Support Architecture in Locator-ID Separation based Future Internet using Proxy Mobile IPv6

  • Seok, Seung-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.2
    • /
    • pp.209-217
    • /
    • 2014
  • Of several approaches for future Internet, separating two properties of IP address into locator and identifier, is being considered as a highly likely solution. IETF's LISP (Locator ID Separation Protocol) is proposed for this architecture. In particular, the LISP model easily allows for device mobility through simple update of information at MS (Mapping Server) without a separate protocol. In recent years, some of the models supporting device mobility using such LISP attributes have emerged; however, most of them have the limitation for seamless mobility support due to the frequent MS information updates and the time required for the updates. In this paper, PMIPv6 (Proxy Mobile IPv6) model is applied for mobility support in LISP model. PMIPv6 is a method that can support mobility based on network without the help of device; thus, this we define anew the behavior of functional modules (LMA, MAG and MS) to fit this model to the LISP environment and present specifically procedures of device registration, data transfer, route optimization and handover. In addition, our approach improves the communication performance using three tunnels identified with locators between mobile node and corresponding node and using a route optimized tunnel between MN's MAG and CN's MAG. Finally, it allows for seamless mobility by designing a sophisticated handover procedure.

A Study for the Designing and Efficiency Measuring Methods of Integrated Multi-level Network Security Domain Architecture (Multi-level 네트워크의 보안 도메인을 위한 통합 아키텍쳐 설계 및 효율성 측정방법 연구)

  • Na, Sang Yeob;Noh, Si Choon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.87-97
    • /
    • 2009
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. This study is based on analysis of diagnostic weakness structure in the network security domain. We propose an improved integrated multi-level protection domain for in the internal route of groupware. This paper's protection domain is designed to handle the malicious data traffic in the groupware and finally leads to lighten the load of data traffic and improve network security in the groupware. Infrastructure of protection domain is transformed into five-stage blocking domain from two or three-stage blocking. Filtering and protections are executed for the entire server at the gateway level and internet traffic route ensures differentiated protection by dividing into five-stage. Five-stage multi-level network security domain's malicious data traffic protection performance is better than former one. In this paper, we use a trust evaluation metric for measuring the security domain's performance and suggested algorithm.