• Title/Summary/Keyword: server

Search Result 7,891, Processing Time 0.036 seconds

An Effective Routing of Zone Routing Protocol for Mobile Ad Hoc Networks (MANET을 위한 존 라우팅 프로토콜의 효율적인 경로 설정)

  • Chu, Seong-Eun;Kim, Jae-Nam;Kang, Dae-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1547-1550
    • /
    • 2002
  • MANET은 전형적인 무선 네트워킹과는 다른 새로운 무선 네트워킹 파라다임으로써 기존 유선 망의 하부 구조에 의존하지 않고 이동 호스트틀로만 구성된 네트워크이다. Ad Hoc망에서 통신을 하기 위해서는 출발지 노드에서 목적지 노드까지 데이터 전송을 위한 라우팅에 관한 문제이다. Ad Hoc망에서는 모든 단말기의 위치변화가 가능하기 때문에 경로설정에 어려움이 따른다. 노드간에 정보를 보내고자 할 때 노트가 인접한 상태가 아니면 정보를 직전 보낼 수 없고 여러 중간 노드들을 거쳐서 정보를 보내는 다중-홉 라우팅 방식을 사용해야 한다. 따라서 중간 노드들은 패킷 라우터의 역할을 해야하는데 무선 통신 자체가 좁은 대역폭과 한정된 채널을 가지고 전송 범위가 제한되는 문제가 있다. 또한 노트 자체의 이동성과 전력 소모 등으로 인한 이탈은 망 위상을 수시로 변화시키므로 노트간에 정보를 전송하는데 가장 종은 경로는 수시로 변경될 수 있으므로 많은 어려움이 따르게 된다. 본 논문에서는 이러한 문제의 해결방안으로 경로유지 과정에서 Ad Hoc망 내의 노드들은 이동성의 특성으로 인해 현재 사용되는 경로 보다 더 짧고 효율적인 경로가 발생하고 중간 노트가 이동 될 때 새로운 경로로 갱신하여 솔기없는 최적의 경로를 유지할 수 있는 방법을 제안한다. 제안 방법은 ZRP의 IERP에서 감청모드를 통하여 사공중인 경로보다 최적의 경로를 감지하여 새로운 경로로 갱신하는 방법과 중간 노드가 이동하여 경로가 깨진 경우 부분적으로 경로를 복구하는 방법을 제시하여 항상 최적화된 경로를 유지함으로써 Ad Hoc망의 위상변화에 대한 적응성을 높일 수 있도록 한다. SQL Server 2000 그리고 LSF를 이용하였다. 그리고 구현 환경과 구성요소에 대한 수행 화면을 보였다.ool)을 사용하더라도 단순 다중 쓰레드 모델보다 더 많은 수의 클라이언트를 수용할 수 있는 장점이 있다. 이러한 결과를 바탕으로 본 연구팀에서 수행중인 MoIM-Messge서버의 네트워크 모듈로 다중 쓰레드 소켓폴링 모델을 적용하였다.n rate compared with conventional face recognition algorithms. 아니라 실내에서도 발생하고 있었다. 정량한 8개 화합물 각각과 총 휘발성 유기화합물의 스피어만 상관계수는 벤젠을 제외하고는 모두 유의하였다. 이중 톨루엔과 크실렌은 총 휘발성 유기화합물과 좋은 상관성 (톨루엔 0.76, 크실렌, 0.87)을 나타내었다. 이 연구는 톨루엔과 크실렌이 총 휘발성 유기화합물의 좋은 지표를 사용될 있고, 톨루엔, 에틸벤젠, 크실렌 등 많은 휘발성 유기화합물의 발생원은 실외뿐 아니라 실내에도 있음을 나타내고 있다.>10)의 $[^{18}F]F_2$를 얻었다. 결론: $^{18}O(p,n)^{18}F$ 핵반응을 이용하여 친전자성 방사성동위원소 $[^{18}F]F_2$를 생산하였다. 표적 챔버는 알루미늄으로 제작하였으며 본 연구에서 연구된 $[^{18}F]F_2$가스는 친핵성 치환반응으로 방사성동위원소를 도입하기 어려운 다양한 방사성의 약품개발에 유용하게 이용될 수 있을 것이다.었으나 움직임 보정 후 영상을 이용하여 비교한 경우, 결합능 변화가 선조체 영역에서 국한되어 나타나며 그 유

  • PDF

CCTV-Aided Accident Detection System on Four Lane Highway with Calogero-Moser System (칼로게로 모제 시스템을 활용한 4차선 도로의 사고검지 폐쇄회로 카메라 시스템)

  • Lee, In Jeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.3
    • /
    • pp.255-263
    • /
    • 2014
  • Today, a number of CCTV on the highway is to observe the flow of traffics. There have been a number of studies where traffic data (e.g., the speed of vehicles and the amount of traffic on the road) are transferred back to the centralized server so that an appropriate action can be taken. This paper introduces a system that detects the changes of traffic flows caused by an accident or unexpected stopping (i.e., vehicle remains idle) by monitoring each lane separately. The traffic flows of each lane are level spacing curve that shows Wigner distribution for location vector. Applying calogero-moser system and Hamiltonian system, probability equation for each level-spacing curve is derived. The high level of modification of the signal means that the lane is in accident situation. This is different from previous studies in that it does more than looking for the signal from only one lane, now it is able to detect an accident in entire flow of traffic. In process of monitoring traffic flow of each lane, when camera recognizes a shadow of vehicle as a vehicle, it will affect the accident detecting capability. To prevent this from happening, the study introduces how to get rid of such shadow. The system using Basian network method is being compared for capability evaluation of the system of the study. As a result, the system of the study appeared to be better in performance in detecting the modification of traffic flow caused by idle vehicle.

Development of Unique Naming Algorithm for 3D Straight Bridge Model Using Object Identification (3차원 직선교 모델 객체의 인식을 통한 고유 명칭부여 알고리즘 개발)

  • Park, Junwon;Park, Sang Il;Kim, Bong-Geun;Yoon, Young-Cheol;Lee, Sang-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.27 no.6
    • /
    • pp.557-564
    • /
    • 2014
  • In this study, we present an algorithm that conducts an unique naming process for the bridge object through the solid object identification focused on 3D straight bridge model. For the recognition of 3D objects, the numerical algorithm utilizes centroid point, and solid object on the local coordination system. It classifies the object feature set by classifying the objects and members based on the bridge direction. By doing so, unique names, which contain the information about span, members and order of the object, were determined and the suitability of this naming algorithm was examined through a truss bridge model and a bridge model with different coordinate systems. Also, the naming process based on the object feature set was carried out for the real 3D bridge model and then was applied to the module on local server and mobile device for real bridge inspection work. From the comparison of the developed naming algorithm based on object identification and the conventional one based on field inspection, it was shown that the conventional field inspection work can be effectively improved.

A Study on the Statistical GIS for Regional Analysis (지역분석을 위한 웹 기반 통계GIS 연구)

  • 박기호;이양원
    • Spatial Information Research
    • /
    • v.9 no.2
    • /
    • pp.239-261
    • /
    • 2001
  • A large suite of official statistical data sets has been compiled for geographical units under the national directives, and it is the quantitative regional analysis procedures that could add values to them. This paper reports our attempts at prototyping a statistical GIS which is capable of serving over the Web a variety of regional analysis routines as well as value-added statistics and maps. A pilot database of some major statistical data was ingested for the city of Seoul. The baseline subset of regional analysis methods of practical usage was selected and accommodated into the business logic of the target system, which ranges from descriptive statistics, regional structure/inequality measures, spatial ANOVA, spatial (auto) correlation to regression and residual analysis. The leading-edge information technologies including the application server were adopted in the system design and implementation so that the database, analysis modules and analytic mapping components may cooperate seamlessly behind the Web front-end. The prototyped system supports tables, maps, and files of downloadable format for input and output of the analyses. One of the most salient features of out proposed system is that both the database and analysis modules are extensible via the bi-directional interface for end users; The system provides users with operators and parsers for algebraic formulae such that the stored statistical variables may be transformed and combined into the newly-derived set of variables. This functionality eventually leads to on-the-fly fabrication of user-defined regional analysis algorithms. The stored dataset may also be temporarily augmented by user-uploaded dataset; The extension of this form, in essence, results in a virtual database which awaits for users commands as usual. An initial evaluation of the proposed system confirms that the issues involving the usage and dissemination of information can be addressed with success.

  • PDF

Design and Implementation of a Mapping Middleware for Wireless Internet Map Service (무선인터넷 지도서비스를 위한 매핑 미들웨어의 설계와 구현)

  • 이양원;박기호
    • Spatial Information Research
    • /
    • v.12 no.2
    • /
    • pp.165-179
    • /
    • 2004
  • With the spread of wireless internet, the interest in mobile applications and services is increasing. Korea Wireless Internet Standardization Forum has been establishing the standards for mobile platform and map service in the wireless internet environment. This study aims to present a paragon of mapping middleware that plays the role of broker for wireless internet map service: in particular, it focuses on the interoperability with generic map servers. In this study, we developed a method for applying current map servers to the wireless internet map service, and analyzed the request/response structure of the map servers which have different operation characteristics in order to allow our middleware to fully utilize the functionalities of the map servers. The middleware we developed is composed of .NET-based XML Web Services: it has a lightweight module for image map and a map representation module for choropleth map, symbol map, chart map, etc. This mapping middleware is a broker between mobile client and generic map server, and supports .NET clients and Java clients as well. Its component-based interoperability grants the extensibility for the wireless internet dedicated map servers of the future in addition to the current generic map servers.

  • PDF

Site Monitoring of Crews and Passengers on Board by the BLE and PLM Combination (BLE와 PLM 조합의 승선자 위치 모니터링)

  • Kwon, Hyuk-Joo;Yang, Hyun-Suk;Lee, Sung-Geun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.4
    • /
    • pp.463-467
    • /
    • 2015
  • When unforeseen accidents occur in a ship, it is important to save passengers safely and remove them from the accident area quickly. To solve such a situation, site information of passengers on board always must be identified. This paper implemented a site monitoring of crews and passengers based on the BLE and PLM combination, to prepare for unexpected accidents of the ships. This system was composed of BLE tag for crews, passengers and each room, PLM networks, data server, and monitoring PC. In this system, site information derived from the tag attached to the bodies and cabins of crews and passengers are transmitted through a power line network, and monitored on the screen of a monitoring PC. The proposed system guides them into the only authorized area considering the ship security and passengers' safety, and even has a special alarm call to warn them after entering an unauthorized area. This system enables the BLE-embedded tag battery to use for a long time because the BLE consumes low electric power, and can gain an economic advantage.

Development of Stand-Alone Risk Assessment Software for Optimized Maintenance Planning of Power Plant Facilities (발전설비 최적 정비를 위한 독립형 위험도 평가 소프트웨어 개발)

  • Choi, Woo Sung;Song, Gee Wook;Kim, Bum Shin;Chang, Sung Ho;Lee, Sang Min
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.39 no.11
    • /
    • pp.1169-1174
    • /
    • 2015
  • Risk-Risk-based inspection (RBI) has been developed in order to identify risky equipments that can cause major accidents or damages in large-scale plants. This assessment evaluates the equipment's risk, categorizes their priorities based on risk level, and then determines the urgency of their maintenance or allocates maintenance resources. An earlier version of the risk-based assessment software is already installed within the equipment management system; however, the assessment is based on examination by an inspector, and the results can be influenced by his subjective judgment, rather than assessment being based on failure probability. Moreover, the system is housed within a server, which limits the inspector's work space and time, and such a system can be used only on site. In this paper, the development of independent risk-based assessment software is introduced; this software calculates the failure probability by an analytical method, and analyzes the field inspection results, as well as inspection effectiveness. It can also operate on site, since it can be installed on an independent platform, and has the ability to generate an I/O function for the field inspection results regarding the period for an optimum maintenance cycle. This program will provide useful information not only to the field users who are participating in maintenance, but also to the engineers who need to decide whether to extend the lifecycle of the power machinery or replace only specific components.

Acceleration sensor, and embedded system using location-aware (가속센서를 이용한 위치인식과 임베디드시스템)

  • Roh, Chang-Bae;Na, Won-Shik
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.51-56
    • /
    • 2013
  • Real-time processing of sensor data network, is one of the important factors. Each node in the detected data are required to be transmitted within a certain time since the accurate processing is possible. Thus, the data nodes are successfully delivered within a specified time, it is very important to check whether the. Recently more and more accurate real-time embedded systems are reliable and haejyeoseo been able to provide sophisticated services. Because of the inherent complexity of embedded systems in the physical world and the difficulty of predicting the difficulty of a safe design constraints on the runtime violation of system as to cause unexpected causes. Each node data in time detected by the time required to be passed in the appropriate processing is possible because the data transfer time in this paper, the monitoring of the sensor network through a node are allowed to exist within the time range and transmits data to the server Analysis of the data transfer time for checking whether the system was implemented. Implementation of the data transmission time to the process for analyzing and presenting, according to the procedure suggested by the transit time required for analysis a time difference analysis method, a data collection method and a data transmission time and transmission time calculating method presented.

  • PDF

An efficient cloud security scheme for multiple users (다중 사용자를 위한 효율적인 클라우드 보안 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.77-82
    • /
    • 2018
  • Recently, as cloud services become popular with general users, users' information is freely transmitted and received among the information used in the cloud environment, so security problems related to user information disclosure are occurring. we propose a method to secure personal information of multiple users by making personal information stored in the cloud server and a key for accessing the shared information so that the privacy information of the multi users using the cloud service can be prevented in advance do. The first key used in the proposed scheme is a key for accessing the user 's personal information, and is used to operate the information related to the personal information in the form of a multi - layer. The second key is the key to accessing information that is open to other users than to personal information, and is necessary to associate with other users of the cloud. The proposed scheme is constructed to anonymize personal information with multiple hash chains to process multiple kinds of information used in the cloud environment. As a result of the performance evaluation, the proposed method works by allowing third parties to safely access and process the personal information of multiple users processed by the multi - type structure, resulting in a reduction of the personal information management cost by 13.4%. The efficiency of the proposed method is 19.5% higher than that of the existing method.

Dynamic Evaluation Methods for SMS Phishing Blocking App Based on Detection Setup Function (감지설정기능을 적용한 스미싱 차단앱의 동적 평가방법에 관한 연구)

  • Kim, Jang Il;Kim, Myung Gwan;Kwon, Young Man;Jung, Yong Gyu
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.111-118
    • /
    • 2015
  • Although the development of mobile devices are made us a free life, they were displayed the subject of this financial crime and attacking forces in the other side. Among finance-related crime is become a serious crime that are targeting smartphones by SMS phishing, phishing, pharming, voice phishing etc. In particular, SMS phishing is increased according to phenomenon using the nature of a text message in the mobile. SMS phishing is become new crime due to the burden to the smartphone user. Their crime is also the advanced way from the existing fraud, such as making the malicious apps. Especially it generates loopholes in the law by a method such as using a foreign server. For safe from SMS phishing attacks, proactive pre-diagnosis is even more important rather than post responses. It is necessary to deploy blocking programs for detecting SMS phishing attacks in advance to do this. In this paper we are investigating the process of block types and block apps that are currently deployed and presenting the evaluation of the application of the detection block setting app.