Abstract:
PURPOSE: A web based software debugging device for remote debugging and a method thereof are provided to connect remote software debugging of a target system using a host computer to a web interface, thereby increasing convenience of a software developer. CONSTITUTION: A web interface(10) provides a web browser. A user requests a debugging service for software executed in a remote target system and checks a debugging result of the software. A debugger client(30) receives a debugging service request about the software through the web interface. The debugger client provides the debugging result of the software to the web interface.
Abstract:
PURPOSE: A topology control algorithm based on location recognition through wireless sensor network is provided to increase and maintain the packet transfer rate of network by reducing collision and the number of nodes. CONSTITUTION: A topology control algorithm based on location recognition through wireless sensor network is as follows. The node density of FFD nodes is calculated on network. The transmission range of an FFD node is classified in a border and core by using node density. The maximum angle and minimum angle between the node of the border area are calculated. The maximum angle and minimum angle are determined as algorithm range.
Abstract:
A query based zigbee mesh routing method is provided to obtain the shortest path through a query with a zigbee coordinator, thereby removing a broadcasting process. A zigbee coordinator performs management about a zigbee network topology(10). A source node asks the zigbee coordinator of the optimum path for data transmission to a destination node. And data is transmitted based on the optimal path delivered from the zigbee coordinator to the destination node(20).
Abstract:
A method for mutual authentication and secure data communication in an RFID(Radio Frequency IDentification) system is provided to offer high security reliability by realizing bidirectional authentication between a tag and a reader, and secure all information in entire section from the authentication and the data communication by making the data communication safe after the authentication. The reader recognizes an ID of the tag. The reader authenticates the tag(S200). The tag authenticates the reader(S300). The data communication between the tag and the reader is performed with communication security(S400). The ID and key information of the tag are stored in a RAM or a security EEPROM(Electronically Erasable Programmable ROM) of the tag, and a tag database connected to the reader through the network.
Abstract:
프라이버시 보호 서비스를 제공하는 메시지 서버의 동작 방법이 개시된다. 일 실시예는 전자 메시지의 송신 요청에 포함된 데이터 필드 중 적어도 하나의 원소를 추출하고, 추출된 적어도 하나의 원소에 기초하여 프라이버시 데이터를 생성하며, 프라이버시 데이터를 미리 구비된 데이터베이스에 저장하고, 프라이버시 데이터에 접근하기 위한 링크를 생성하는 단계들을 포함한다.
Abstract:
본 발명은 로봇이 사용되는 환경 즉 로봇이 설치되거나 작동되는 로봇 외부의 환경이나 로봇 내부의 컴포넌트 등의 이상과 같이 내부 환경이 변하는 경우 특히, 로봇이 구동중에 외부 환경 또는 내부 환경이 변하는 경우라 하더라도 이러한 환경 변화를 동적으로 로봇이 인지하여 인지된 환경의 변화에 동적으로 대응하여 주어진 명령을 수행 가능하도록 컴포넌트 관련 구동 프로그램이나 구동 환경 설정 등을 스스로 최적화하여 재구성하는 것이 가능한 로봇 장치 및 내부 환경 재구성 방법을 제공하고자 한다.