• Title/Summary/Keyword: transmitted

Search Result 5,160, Processing Time 0.033 seconds

Clustering Technique of Intelligent Distance Estimation for Mobile Ad-hoc Network (이동 Ad-hoc 통신을 위한 지능형 거리추정 클러스터방식)

  • Park, Ki-Hong;Shin, Seong-Yoon;Rhee, Yang-Won;Lee, Jong-Chan;Lee, Jin-Kwan;Jang, Hye-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.11
    • /
    • pp.105-111
    • /
    • 2009
  • The study aims to propose the intelligent clustering technique that calculates the distance by improving the problems of multi-hop clustering technique for inter-vehicular secure communications. After calculating the distance between vehicles with no connection for rapid transit and clustering it, the connection between nodes is created through a set distance vale. Header is selected by the distance value between nodes that become the identical members, and the information within a group is transmitted to the member nodes. After selecting the header, when the header is separated due to its mobility, the urgent situation may occur. At this time, the information transfer is prepared to select the new cluster header and transmit it through using the intelligent cluster provided from node by the execution of programs included in packet. The study proposes the cluster technique of the intelligent distance estimation for the mobile Ad-hoc network that calculates the cluster with the Store-Compute-Forward method that adds computing ability to the existing Store-and-Forward routing scheme. The cluster technique of intelligent distance estimation for the mobile Ad-hoc network suggested in the study is the active and intelligent multi-hop cluster routing protocol to make secure communications.

An Analysis Study on the Current Status and Integration Methods of the Domestic Early Warning System (국내 재난 예경보 시스템 현황 및 통합 방안에 대한 분석 연구)

  • Hwang, Woosuk;Pyo, Kyungsoo
    • Journal of Broadcast Engineering
    • /
    • v.27 no.1
    • /
    • pp.80-90
    • /
    • 2022
  • Currently, the domestic early warning system is issued differently for each disaster, and is operated independently by relevant organizations from central government to local governments. Representative domestic disaster warning systems include disaster broadcasting using CBS(Cell Broadcasting Service) and DMB(Digital Multimedia Broadcasting) Automatic Emergency Alert Service, DITS(Disaster Information Transform System) transmitted and displayed on TV screens, automatic response system, automated rainfall warning system, and disaster message board. However, due to the difference in the method of issuing each emergency alert at the site of an emergency disaster, the alerts are issued at different times for each media, and the delivered content is also not integrated. If these systems are integrated, it is expected that damage to people's property and lives will be minimized by sharing and integrated management of disaster information such as voice, video, and data to comprehensively judge and make decisions about disaster situations. Therefore, in this study, we present a plan for the integration of the disaster warning system along with the analysis of the operation status of the domestic early warning system.

Manufacturing of a Treatment Agent for Corrosion Oxides of Iron Relics (철기 유물 부식 산화물 처리제의 제조)

  • Yang, Eun Hee;Han, Won-Sik;Choi, Kwang-Sun;Hong, Tae-Kee
    • Korea Science and Art Forum
    • /
    • v.30
    • /
    • pp.251-261
    • /
    • 2017
  • Metal is a material that has exerted a lot of influence on the development of human cultures, and has closely connected with our life from the past to the present. Types of metal we have used from the prehistoric times are varied, and iron relics take the largest percentage of metal relics excavated in our country. The biggest threat to the existence of iron relics ranging from excavated relics to the ones that are transmitted is the process of corrosion, and physical removal has been used the most for removing corroded oxides. For details for removal of corrosion oxides, this thesis aimed to research on the chemical corrosion oxides remover that protects parent material of iron relics but treats corrosion oxides only. For safe and effective removal of corrosion oxides of iron relics, this study was conducted aiming at finding the possibility of and optimized composition for removal of iron relics corrosion oxides by manufacturing new acid, alkaline and neutral oxides removers and changing their composition variously, exploring the possibility by applying the agents to modern relics. The results of this study are as follows: First, the acid solution removed only some part of corrosive substance oxidized on the surface of metal specimen. Second, the application of each of alkaline and neutral solution resulted in remaining black-colored corrosive substance, but it was removed when the quantity of the solution and the duration of application are increased. Third, All the three solutions did not cause any damage to parent material in the course of application, and showed the result that they are capable of removing unstable oxide layer while protecting parent material and stable corrosive layer as the solutions would be able to deal with situation by a relic only through the control of concentration of solution and duration of application.

Improvement of Encoding Detection Algorithm for Multi-byte Encoded Data with Errors (오류가 발생한 멀티바이트 인코딩 데이터의 인코딩 기법 판별 알고리즘 개선)

  • Bae, Junwoo;Kim, Seonbeom;Park, Heejin
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.2
    • /
    • pp.18-25
    • /
    • 2017
  • In computer science, an encoding is a standardization of converting information to one format for audio, video or text. Therefore, the encoding information of the data should be known to open and read it and there are algorithms detecting encoder of the data. However, some informations of data could be disappeared by packet loss when transmitted on network, especially, if the data is snatched by packet sniffing or eavesdropping from wireless communications. In this paper, we improve the performance of encoding detection algorithm of 'uchardet' program for multi-byte encoded data with errors based on bit-shift algorithm. To simulate the performance, we generated Korean and Japanese text data with errors that is removed some random bits at random positions. Then the detection algorithm are tested using the data and 'uchardet-bitshift' showed better performance than 'uchardet'. When Korean texts are used, 'uchardet' could detect perfectly with ≤0.005% errors but it showed 0% detection rate with ≥1% errors while 'uchardet-bitshift' detected perfectly with ≤0.05% errors and it showed correct detection cases with ≥1% errors. Japanese texts with errors tend to report falsely as Chinese encoding because Japanese texts include lots of Chinese characters. As a results, we improved encoding detection algorithms by applying bit shift operation.

Study on security method for scenario-based smartphone vulnerability (시나리오 기반의 스마트폰 취약점에 대한 보안방안 연구)

  • Lee, Jaeho;Son, Minwoo;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.835-844
    • /
    • 2018
  • Recently, as the number of smartphone users has been increasing worldwide, various services such as electronic payment, internet use, and financial settlement are being used as a smartphone. In addition, researches for home appliance control and automobile control using smartphone are conducted. As such, smartphone users can enjoy a more convenient life, but by hacking smartphones, tapping texts and conversations on smartphones, tracking location through spy apps, DDoS attacks using smartphones, and malicious apps When a message is received at a specific telephone number when using a micropayment, the corresponding text message is transmitted to a remote server, thereby increasing the risk of leakage of personal information and the like. Therefore, in this paper, we define the risk factors of the smartphone that are caused by the internal and external environmental, physical, contents (apps) of the smartphone through the smartphone that we use in real life, We propose a method to check vulnerability of smartphone security solution such as CC evaluation and the most effective response technique for each risk of smartphone by defining the technique.

The Results of the Application of a Real-time Chemical Exposure Monitoring System in a Workplace (스마트 센서 세트를 활용한 화학물질 상시모니터링 시스템의 작업현장 적용 결과)

  • Wook Kim;Jangjin Ryoo;Jongdeok Jung;Gwihyun Park;Giyeong Kim;Jinju Kang;Kihyo Jung;Seunghon Ham
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.33 no.2
    • /
    • pp.215-229
    • /
    • 2023
  • Objectives: To validate the effectiveness of a real-time chemical exposure monitoring system developed by KOSHA (Korea Occupational Safety and Health Agency), we applied the system to a workplace in the electronics industry for 153 days. Methods: The monitoring system consisted of a PID chemical sensor, a LTE communication equipment, and a web-based platform. To monitor chemical exposure, four sets of sensors were placed in two manufacturing tasks - inspection and jig cleaning - which used TCE as a degreasing agent. We reviewed previous reports of work environment measurements and conducted a new work environment measurement on one day during the period. The PID sensor systems detected the chemical exposure levels in the workplace every second and transmitted it to the platform. Daily average and maximum chemical exposure levels were also recorded. Results: We compared the results from the real-time monitoring system and the work environment measurement by traditional methods. Generally, the data from the real-time monitoring system showed a higher level because the sensors were closer to the chemical source. We found that 28% of jig cleaning task data exceeded the STEL. Peak exposure levels of sensor data were useful for understanding the characteristics of the task's chemical use. Limitations and implications were reviewed for the adoption of the system for preventing poisoning caused by chemical substances. Conclusions: We found that the real-time chemical exposure monitoring system was an efficient tool for preventing occupational diseases caused by chemical exposure, such as acute poisoning. Further research is needed to improve the reliability and applicability of the system. We also believe that forming a social consensus around the system is essential.

Effect of Weather, Flight, and Time Conditions on Anxiety and Time Perception of Helicopter Pilots in Flight (기상, 비행 및 시간 조건이 조종 중인 헬리콥터 조종사의 불안 및 시간지각에 미치는 영향)

  • MunSeong Kim;ShinWoo Kim;Hyung-Chul O. Li
    • Science of Emotion and Sensibility
    • /
    • v.26 no.1
    • /
    • pp.65-78
    • /
    • 2023
  • Aircraft are representative of human-machine systems. There is a delay between the human operation and the completion of the machine operation such as when the machine starts to operate and when the force is transmitted to the machine and completed. Time perception is an important component of timing tasks and is known to be affected by the anxiety associated with high arousal. This research verified the impact of weather, flight, and time conditions on the anxiety and time perception of in-service pilots in a virtual reality area. Weather conditions were divided into visual flight weather conditions and very low visibility conditions. Experiments 1 and 2 were performed with different flight and time conditions. In Experiment 1, time perception was measured by employing a button added to the control rod in the scenario of hovering and level flight with relatively little transformed in momentum and little delay. In Experiment 2, time perception was measured in the procedure of naturally taking off the helicopter by employing only the control stick in a takeoff scenario where there was a lot of transformation in momentum and a lot of delays. As a result of the experiment, it was reported that anxiety and heart rate increased in very low visibility conditions In particular, among all flight conditions in Experiments 1 and 2, it was reported that time was overestimated in the scenario of increased anxiety. This outcome can lead to overestimation of time under the impact of anxiety and failure of the timing task, which may lead to challenges in maneuvering and possibly lead to accidents.

A Study on the Real-time Recognition Methodology for IoT-based Traffic Accidents (IoT 기반 교통사고 실시간 인지방법론 연구)

  • Oh, Sung Hoon;Jeon, Young Jun;Kwon, Young Woo;Jeong, Seok Chan
    • The Journal of Bigdata
    • /
    • v.7 no.1
    • /
    • pp.15-27
    • /
    • 2022
  • In the past five years, the fatality rate of single-vehicle accidents has been 4.7 times higher than that of all accidents, so it is necessary to establish a system that can detect and respond to single-vehicle accidents immediately. The IoT(Internet of Thing)-based real-time traffic accident recognition system proposed in this study is as following. By attaching an IoT sensor which detects the impact and vehicle ingress to the guardrail, when an impact occurs to the guardrail, the image of the accident site is analyzed through artificial intelligence technology and transmitted to a rescue organization to perform quick rescue operations to damage minimization. An IoT sensor module that recognizes vehicles entering the monitoring area and detects the impact of a guardrail and an AI-based object detection module based on vehicle image data learning were implemented. In addition, a monitoring and operation module that imanages sensor information and image data in integrate was also implemented. For the validation of the system, it was confirmed that the target values were all met by measuring the shock detection transmission speed, the object detection accuracy of vehicles and people, and the sensor failure detection accuracy. In the future, we plan to apply it to actual roads to verify the validity using real data and to commercialize it. This system will contribute to improving road safety.

Adaptive-learning Code Allocation Technique for Improving Dimming Level and Reducing Flicker in Visible Light Communication (가시광통신에서 Dimming Level 향상 및 Flicker 감소를 위한 적응-학습 코드할당 기법)

  • Lee, Kyu-Jin;Han, Doo-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.30-36
    • /
    • 2022
  • In this paper, when the lighting and communication functions of the visible light communication system are used at the same time, we propose a technique to reduce the dimming level and flicker of the lighting. Visible light communication must satisfy both communication and lighting performance. However, the existing data code method results in reducing the brightness of the entire lighting. This causes deterioration of lighting performance and flicker phenomenon. To solve this problem, in this paper, we propose an adaptive learning code allocation technique that allocates binary codes to transmitted characters and optimizes and matches the binary codes allocated according to the frequency of occurrence of alphabets in character strings. Through this, we studied a technique that can faithfully play the role of lighting as well as communication function by allocating codes so that the 'OFF' pattern does not occur continuously while maintaining the maximum dimming level of each character string. As a result of the performance evaluation, the frequency of occurrence of '1' increased significantly without significantly affecting the overall communication performance, and on the contrary, the frequency of consecutive '0' decreased, indicating that the lighting performance of the system was greatly improved.

The Phase Difference Effects on 3-D Structure of Wave Pressure Acting on a Composite Breakwater (혼성방파제에 작용하는 3차원 파압구조에 미치는 위상차의 영향)

  • Hur, Dong-Soo;Yeom, Gyeong-Seon;Bae, Ki-Seong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.5B
    • /
    • pp.563-572
    • /
    • 2006
  • In designing the coastal structures, the accurate estimation of wave forces on them is very important. Recently, the empirical formulae such as Goda formula are widely used to estimate wave forces, as well as 2-D hydraulic and numerical model tests. But, sometimes, these estimation methods mentioned above seem to be unreasonable to predict 3-D structure of wave pressure on the coastal structures with 3-D plane arrangement in the real coastal area. Especially, in case of consideration of phase difference at harbor and seaward sides of the large-sized coastal structures like a composite breakwater, it is easily expected that the real wave pressures on each section of coastal structure have 3-D distribution. A new numerical model of 3-D Large Eddy Simulation, which is applicable to permeable structure, is developed to clarify the 3-D structure of wave pressures acting on coastal structure. The calculated wave forces on 3-D structure installed on the submerged breakwater show in good agreement with the measured values. In this study, the composite breakwater is adopted as a representative structure among the large-sized coastal structures and the 3-D structure of wave pressures on it is discussed in relation to the phase difference at harbor and seaward sides of it due to wave diffraction and transmitted wave through rubble mound.