• Title/Summary/Keyword: synchronization problem

Search Result 324, Processing Time 0.029 seconds

The development of asynchronous ranging scheme based on the virtual slot (가상슬롯 기반의 비동기 거리 추정 기법 개발)

  • Ko, Young-Wook;Kim, Hwan-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.31-37
    • /
    • 2016
  • Ranging is divided into a synchronous scheme and an asynchronous scheme according to the presence of global synchronization between nodes. In general, the asynchronous ranging is preferred over synchronous ranging because it does not require an expensive high-precision oscillator for the global synchronization. On the other hand, in a conventional asynchronous ranging scheme, the packets, which are generated by all nodes in a positioning system of a large-scale infrastructure and need to be sent for localization by reference nodes, are considerable, which cause an increase in network traffic as the number of nodes increases. The traffic congestion lowers the throughput of the network leading to a considerable loss of energy. To solve this problem, this paper proposes a ranging scheme, in which virtual transmission slots randomly and discretely selected by a plurality of nodes are used to reduce the overheads needed in synchronizing the nodes, and the ranging is performed asynchronously based on the virtual transmission slots, thereby decreasing the network traffic. In addition, a performance test proved that the proposed ranging scheme was stronger than the TWR and SDS-TWR on an error range, even though the intensity of traffic was very low.

Live Lines Tracing Method in Power Distribution System with 3-phase-4 wires (삼상 다중 접지 배전계통에서 활선로 추적 방법)

  • Zheng, Yan-peng;Byun, Hee-Jung;Shon, Sugoog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.559-562
    • /
    • 2017
  • In city, tracing of power transmission lines is difficult due to compound installation of overhead and underground lines, transposition, bad view caused by trees or big buildings. It is hard problem for electrical technician on site to trace power transformers or power lines to serve customers in 3 phase -4 wires power distribution systems. It is necessary that the correct and fast tracing method is required for load balancing among distribution lines. Old technology use to trace off-lines with high power impulse injection. Our proposed method use to trace live lines with very small power high frequency signal injection. Typical power transformers in the distribution system prevent propagating the higher frequency carrier signal. The proposed method uses the limited propagation ability to identify the power transformer to serve customers. Two end communication terminals are required to be synchronized between them for determination on electrically same phases. Challenging issue is to achieve synchronization without GPS providing synchronizing time. A novel power transformer and wire identification system is designed and implemented. The system consists of a transmitter and a receiver with power-line communication module. Some experiments are conducted to verify the theoretical concepts in a big commercial building. Also some simulations are done to help and understand the concepts by using MATLAB Simulink simulator.

  • PDF

Efficient Multiple Joins using the Synchronization of Page Execution Time in Limited Processors Environments (한정된 프로세서 환경에서 체이지 실행시간 동기화를 이용한 효율적인 다중 결합)

  • Lee, Kyu-Ock;Weon, Young-Sun;Hong, Man-Pyo
    • Journal of KIISE:Databases
    • /
    • v.28 no.4
    • /
    • pp.732-741
    • /
    • 2001
  • In the relational database systems the join operation is one of the most time-consuming query operations. Many parallel join algorithms have been developed 개 reduce the execution time Multiple hash join algorithm using allocation tree is one of the most efficient ones. However, it may have some delay on the processing each node of allocation tree, which is occurred in tuple-probing phase by the difference between one page reading time of outer relation and the processing time of already read one. This delay problem was solved by using the concept of synchronization of page execution time with we had proposed In this paper the effects of the performance improvements in each node of the allocation tree are extended to the whole allocation tree and the performance evaluation about that is processed. In addition we propose an efficient algorithm for multiple hash joins in limited number of processor environments according to the relationship between the number of input relations in the allocation tree and the number of processors allocated to the tree. Finally. we analyze the performance by building the analytical cost model and verify the validity of it by various performance comparison with previous method.

  • PDF

Design of an RFID Communication Protocol Using Synchronized Chaotic Systems (동기화된 혼돈시스템을 이용한 RFID 통신 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.451-457
    • /
    • 2016
  • To improve security in the data communication field, many studies on the application of chaotic signals to encryption have been conducted in recent years. In this study, a new security protocol where the initial value sensitivity and noise similarity of chaotic signals have been applied to an RFID communication channel was designed. In the case of chaotic systems, if the initial values become identical, the same signals are generated at the same time after that point even though the two systems have been calculated independently. Therefore, an unpredictable security channel can be produced based on such characteristics. However, a security channel can be produced only when an initial value is shared in advance, and thus there is a potential problem of infringement during the transmission of the initial value. To resolve this problem, a method in which a certain proportion of new chaotic signals are applied to two chaotic systems for communication and are then synchronized after some time was proposed. This new method can conceal the initial value, and thus can resolve the problem of the existing communication method using chaotic signals. The designed method was verified with the encryption and decryption of images. It is expected that a more secure RFID system could be established by applying the communication protocol proposed in this study to insecure RFID communication channels.

A Study of Teacher Libarians' Efficacy (사서 교사의 효능감에 관한 연구)

  • Kang, Bong-Suk;Song, Gi-Ho
    • Journal of Korean Library and Information Science Society
    • /
    • v.50 no.2
    • /
    • pp.149-168
    • /
    • 2019
  • The purpose of this study is to analyze the characteristics of teacher librarians' efficacy and to propose some ways to enhance their efficacy. To do this, questionnaires on 30 teacher librarians who participated in the level 1 certification program of K university in 2018 were conducted. The results showed that their average efficacy was 3.38, the efficacy of teaching method was 3.60, the collective efficacy was 3.38, and the personal efficacy was 3.18. They had high personal efficacy on classroom management, the willingness to lead poor students and the possibility of problem student guidance, and collective efficacy on conflict management with fellow teachers and parents. On the other hand, personal efficacy in problem analysis and guidance for problem students, difficult contents and course instruction were low. Also, the collective efficacy of the conflict between the manager and the education office was low. They have a strong willingness to improve teaching methods for students and showed high efficacy about student synchronization and preparation for teaching. However, they were aware of the lack of learning skills and the lack of various teaching methods. The variables influencing their efficacy were graduation, education level, school size, and degree. Especially, the higher the education level, the more confident and enthusiastic about teaching problemmatic students and disadvantaged students. In addition, teacher librarians with high academic standards showed high confidence in conflict resolution with peers and parents and teaching methods. The improvement direction to enhance their efficacy in this study are increasing the ratio of teacher education in the field of education, reforming teacher librarians training before appointment, establishing supervision organizations for school libraries and improving their professionalism by going to graduate school.

Understanding Problem-Solving Type Inquiry Learning and it's Effect on the Improvement of Ability to Design Experiments: A Case Study on Science-Gifted Students (문제해결형 탐구학습에 대한 인식과 학습이 실험 설계 능력에 미친 효과 : 과학 영재학생들에 대한 사례 연구)

  • Ju, Mi-Na;Kim, Hyun-Joo
    • Journal of The Korean Association For Science Education
    • /
    • v.33 no.2
    • /
    • pp.425-443
    • /
    • 2013
  • We developed problem-solving type inquiry learning programs reflecting scientists' research process and analyzed the activities of science-gifted high school students, and the understanding and the effects of the programs after implementation in class. For this study, twelve science-gifted students in the 10th grade participated in the program, which consisted of three different modules - making a cycloidal pendulum, surface growth, and synchronization using metronomes. Diet Cola Test (DCT) was used to find out the effect on the improvement of the ability to design experiments by comparing pre/post scores, with a survey and an interview being conducted after the class. Each module consisted of a series of processes such as questioning the phenomenon scientifically, designing experiments to find solutions, and doing activities to solve the problems. These enable students to experience problem-solving type research process through the program class. According to this analysis, most students were likely to understand the characteristics of problem-solving type inquiry learning programs reflecting the scientists' research process. According to the students, there are some differences between this program class and existing school class. The differences are: 'explaining phenomenon scientifically,' 'designing experiments for themselves,' and 'repeating the experiments several times.' During the class students have to think continuously, design several experiments, and carry them out to solve the problems they found at first. Then finally, they were able to solve the problems. While repeating this kind of activities they have been able to experience the scientists' research process. Also, they showed a positive attitude toward the scientists' research by understanding problem-solving type research process. These problem-solving type inquiry learning programs seem to have positive effects on students in designing experiments and offering the opportunity for critical argumentation on the causes of the phenomena. The results of comparing pre/post scores for DCT revealed that almost every student has improved his/her ability to design experiments. Students who were accustomed to following teacher's instructions have had difficulty in designing the experiments for themselves at the beginning of the class, but gradually, they become used to doing it through the class and finally were able to do it systematically.

Authentication Protocol based on Credential for Implantable Medical Device (체내 삽입장치를 위한 위임장 기반의 인증 프로토콜)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.259-264
    • /
    • 2014
  • Body insertion due to the recent development of sensor technology, the device is attached patients to receive medical services from anywhere, anytime environment is changing. Body insertion devices for the hospital, the patient's vital information attached personnel (doctors, nurses, pharmacists, etc.) to pass, however, when a problem occurs, a patient's information to a third party that can be exploited easily exposed. In this paper, we proposed signature authentication protocols mandate based on the patient's power of attorney from the center of the u-Healthcare services, hospital officials FormHelper third party disguised as a patient, the hospital patient information easily obtained from the officials to prevent. The proposed protocol, the patient's sensitive information to a third party, do not expose the patient's sensitive information to the random number generated by the u-Healthcare service centers and patients hash signature key to encrypt sensitive information of patients. From third parties to maintain synchronization between the patients and the hospital personnel in order to prevent patient information from being exploited illegally by the patient's vital information leakage can be prevented.

A Localization Using Multiple Round Trip Times in Wireless Sensor Networks (무선 센서 네트워크에서 다중 왕복시간차를 이용한 위치측정)

  • Jang, Sang-Wook;Ha, Rhan
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.370-378
    • /
    • 2007
  • In wireless sensor networks (WSNs), thousands of sensors are often deployed in a hostile environment. In such an environment, WSNs can be applied to various applications by using the absolute or relative location information of the sensors. Until now, the time-of-arrival (TOA) based localization method has been considered most accurate. In the TOA method, however, inaccuracy in distance estimation is caused by clock drift and clock skew between sensor nodes. To solve this problem, several numbers of periodic time synchronization methods were suggested while these methods introduced overheads to the packet traffic. In this paper, we propose a new localization method based on multiple round-trip times (RTOA) of a signal which gives more accurate distance and location estimation even in the presence of clock skew between sensor nodes. Our experimental results show that the Proposed RTOA method gives up to 93% more accurate location estimation.

An Efficient Data Structure for Queuing Jobs in Dynamic Priority Scheduling under the Stack Resource Policy (Stack Resource Policy를 사용하는 동적 우선순위 스케줄링에서 작업 큐잉을 위한 효율적인 자료구조)

  • Han Sang-Chul;Park Moon-Ju;Cho Yoo-Kun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.6
    • /
    • pp.337-343
    • /
    • 2006
  • The Stack Resource Policy (SRP) is a real-time synchronization protocol with some distinct properties. One of such properties is early blocking; the execution of a job is delayed instead of being blocked when requesting shared resources. If SRP is used with dynamic priority scheduling such as Earliest Deadline First (EDF), the early blocking requires that a scheduler should select the highest-priority job among the jobs that will not be blocked, incurring runtime overhead. In this paper, we analyze the runtime overhead of EDF scheduling when SRP is used. We find out that the overhead of job search using the conventional implementations of ready queue and job search algorithms becomes serious as the number of jobs increases. To solve this problem, we propose an alternative data structure for the ready queue and an efficient job-search algorithm with O([log$_2n$]) time complexity.

Indoor Localization Scheme of a Mobile Robot Applying REID Technology (RFID 응용 기술을 이용한 이동 로봇의 실내 위치 추정)

  • Kim Sung-Bu;Lee Dong-Hui;Lee Jang-Myung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.12
    • /
    • pp.996-1001
    • /
    • 2005
  • Recently, with the development of service robots and with the new concept of ubiquitous world, the position estimation of mobile objects has been raised to an important problem. As pre-liminary research results, some of the localization schemes are introduced, which provide the relative location of the moving objects subjected to accumulated errors. To implement a real time localization system, a new absolute position estimation method for a mobile robot in indoor environment is proposed in this paper. Design and implementation of the localization system comes from the usage of active beacon systems (based upon RFID technology). The active beacon system is composed of an RFID receiver and an ultra-sonic transmitter: 1. The RFID receiver gets the synchronization signal from the mobile robot and 2. The ultra-sonic transmitter sends out the traveling signal to be used for measuring the distance. Position of a mobile robot in a three dimensional space can be calculated basically from the distance information from. Three beacons and the absolute position information of the beacons themselves. In some case, the mobile robot can get the ultrasonic signals from only one or two beacons, because of the obstacles located along the moving path. Therefore, in this paper, as one of our dedicated contribution, the position estimation scheme with less than three sensors has been developed. Also, the extended Kalman filter algorithm is applied for the improvement of position estimation accuracy of the mobile robot.