• Title/Summary/Keyword: 접속형태

Search Result 488, Processing Time 0.02 seconds

Analysis of the monopole antenna characteristcs of handy phone using Finite Difference Time Domain(FDTD) Method (시간영역 유한차분법을 이용한 휴대용 전화기의 모노폴 안테나 특성해석)

  • 손영수;윤현보
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.6 no.3
    • /
    • pp.3-14
    • /
    • 1995
  • The broadband input impedance, the input power and the radiation pattern of the monopole antenna attached to the handy phone operated at 800MHz are calculated by using the Finite Difference Time Domain(FDTD) Method. For the FDTD analysis of frequency characteristics of monopole antenna, the handy phone is modeled with the geometry that the monopole antenna is connected to a conducting box, and the modified FDTD algorithm[11] used the thin wire appproximation method and the Maxwell's integral equation from the original Yee algorithm is applied for the analysis of the wire structure. Also, by means of finding the current distribution directly from circumferencial magnetic filelds around the monopole antenna and the conducting box, the radiation pattern is calculated to observe the influence of the conducting box, and is compared with the results of the known mothod for the FDTD calculation of radiation pattern, For the experiments, the handy phone of which full length including antenna is .lambda. $\lambda$/2 is manufactured and we confirm that all computation results are agree well with the mea- sured values.

  • PDF

Detecting Jamming Attacks in MANET (MANET에서의 전파방해 공격 탐지)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.482-488
    • /
    • 2009
  • Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.

Design of Optical Filter with Multilayer Slab/Fiber Structure (다층 슬랩-광섬유접속구조를 갖는 광필터의 설계)

  • Jeoung, Chan-Gwoun;Kang, Young-Jin;Kim, Sun-Youb
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1369-1375
    • /
    • 2007
  • The recent, a large capacity of telecommunication networks is required in order to it is in proportion to capacity of information communication increase and to satisfy a demand because of the demand about Internet, a multimedia service of internet, Video of internet protocol(VoIP), Audio/Video streaming. As a result, DWDM(Dense Wavelength Division Multiplexing)technologies are emerging to be a prevailing the method of solving it without additional optical fiber network building and high-speed equipment. Therefore this thesis proposed the optical filter of fiber/multilayer slab coupled structure combining it to multilayer slab waveguide by polishing the cladding of one side of fiber to design the optical filter having these functions. When a separation distance of fiber and slab was $3{\mu}m$, The optical filter proposed as the simulation result was satisfied with a DWDM filter characteristic with FWHM of 0.1nm on TM mode and TE mode as 32nm polarization independence in a communication window of $1.3{\mu}m$ when center wavelength was each ${\lambda}_0=1.274755{\mu}m$ and ${\lambda}_0=1.30591{\mu}m$.

  • PDF

Integrated Management Middleware for the Servers supporting the terminal-independent (단말기 독립형 서버 통합 관리 미들웨어)

  • Kim Jeong-Hee;Kwak Ho-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1106-1118
    • /
    • 2006
  • The Internet has become an important instrument for providing many pieces of information to us. And server systems offer the various services after processing a volume of information, it's network topology also has been complex for providing information. Therefore this expansion means the importance of fast and sustained management of server systems. But most of server systems are located in fire-walls to allow only restricted access. Moreover, due to the difference of management based on the different operating system of each server system, management of server system is not to efficiency. That is, sever administrators have to manage by themselves many kinds of servers by using local-based or socket-based single access applications. Therefore, we design and implement a middleware system which allows to manage many kinds of severs integrally ruling XML-based Web Services which have distributed object technology such as CORBA, Java RMI and DCOM, but are free from platforms or development languages. System also provides location transparency and terminal independence and calls a server system management command to manage systems.

The Trace Analysis of SaaS from a Client's Perspective (클라이언트관점의 SaaS 사용 흔적 분석)

  • Kang, Sung-Lim;Park, Jung-Heum;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.1-8
    • /
    • 2012
  • Recently, due to the development of broadband, there is a significant increase in utilizing on-demand Saas (Software as a Service) which takes advantage of the technology. Nevertheless, the academic and practical levels of digital forensics have not yet been established in cloud computing environment. In addition, the data of user behavior is not likely to be stored on the local system. The relevant data may be stored across the various remote servers. Therefore, the investigators may encounter some problems in performing digital forensics in cloud computing environment. it is important to analysis History files, Cookie files, Temporary Internet Files, physical memory, etc. in a viewpoint of client, since the SaaS basically uses the web to connects the internet service. In this paper, we propose the method that analysis the usuage trace of the Saas which is the one of the most popular cloud computing services.

Design and Implementation of Multimedia Authoring System using Temporal/Spatial Synchronization Manager (시공간 동기화 관리기를 이용한 멀티미디어 저작 시스템의 설계 및 구현)

  • Yeu, In-Kook;Hwang, Dae-Hoon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2679-2689
    • /
    • 1997
  • In this paper, a multimedia authoring system using temporal/spatial synchronization manager is designed and implemented to support easy and efficient generation of multimedia title. For this goal, a flowchart-oriented logic generator which represents a title author's design intent into a practical title composition logic without extra translation process, and a logic interpreter which translate and implement the generated title logic, are designed. Furthermore, a temporal/spatial synchronization manager which manages temporal/spatial synchronization information between media data for multimedia representation, is designed. Especially, a temporal specification model and MRL, a formal language for the model, are designed to synchronize the temporal relation between media objects. The MRL represents a complex temporal relation by simple and clear form, and synchronizes efficiently multimedia representation according to the author's intent. A presentation frame editor which makes coincidence between visible size of representation media and attachment point, is implemented for spatial synchronization.

  • PDF

Impact Evaluation of Plug-in Electric Vehicle Loading on Distribution Systems in North America (북미 배전계통에서의 플러그인 전기자동차에 대한 계통영향 평가)

  • Kook, Kyung-Soo;Maitra, Arindam
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2236-2245
    • /
    • 2009
  • This paper proposes the process for evaluating the impact of charging the PHEV(Plug-In Hybrid Electric Vehicle) on the distribution systems, and analyzes the study results employing the actual systems as the PHEV is highly expected to increase in the automobile industries in North America in the near future. Since the charging load of the PHEV directly connected to the distribution systems would consume electric power much more than any other existing electric product of residential customers, the new modeling and process would be required to consider the PHEV in distribution systems planning. The EPRI(Electric Power Research Institute) is collaboratively conducting the impact study of PHEV on the distribution systems with power utilities in North America. This study models distribution systems and the charging load of the PHEV using OpenDSS software, and analyzes the impact of PHEV on the distribution systems by assuming various scenarios with different charging time and PHEV types.

시뮬레이션 도구 SMPLE의 개발 및 활용

  • 조성만
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1992.10a
    • /
    • pp.3-3
    • /
    • 1992
  • 컴퓨터 시스템의 개발 및 분석에 많이 활용되는 시뮬레이션 모델을 구축하는데 있어서 SIMSCRIT, GISS, SIMAN, SLA II등과 같은 시뮬레이션 전용언어가 많이 사용되지만, 이들은 새로운 전용언어의 습득, 시스템 프로그램과의 접속, 시뮬레이션 수행 속도면에서 부담을 주어왔다. 본 연구에서는 기존의 C언어 사용자들이 손쉽게 시뮬레이션 모델을 구축할 수 있도록 기존의 smpl을 확장하여 SMPLE(smpl extended)를 개발하였다. SMPLE의 모체의 smpl은 컴퓨터 시스템의 시뮬레이션 모델을 구현하기 위해 MIT에서 C언어를 이용하여 고안되었으며, C언어의 기능적인 확장으로서 라이브러리 함수들의 집합 형태를 갖는 시뮬레이션 서브 시스템이다. 이러한 라이브러리 함수들의 집합인 smpl 시뮬레이션 서브 시스템은 C언어 자체와 더불어 사건중심(event-oriented) 시뮬레이션 언어를 구성하며, smpl 시뮬레이터는 C 언어 프로그램으로 구현되다. smpl은 시뮬레이션하기 위한 설비(facility)들을 정의, 예약, 해제하거나 상태를 알아보는 함수를 제공하며, 시간의 관점에서 보면 토큰의 흐름은 일련의 대기시간과 활동시간에 의하여 나타낼 수 있게 된다. smpl은 사건의 스케쥴링(scheduling), 확률변수의 생성, 통계자료 수집 등에 관한 함수의 제공과, 시뮬레이션 시간의 전진과 사건발생의 순서를 조절해주는 기능을 제공한다. smpl 시뮬레이션 프로그램은 초기화루틴, 제어루틴 및 결과출력루틴으로 구성된다. 기존의 smpl에서 사용되는 프로그램의 자료구조(data structure)는 배열과 인덱스 구조가 사용되었다. 이러한 구조는 이미 완성되어 있는 프로그램 내에서는 효율성 면에서 좋겠지만, 변경이나 확장하기 위해 이 프로그램을 분석한다거나 필요한 기능을 추가하기 위해서는 매우 많은 어려움이 따르게 된다. 본 논문에서는 배열을 기반으로 하고 있는 smpl의 자료구조를 C의 structure와 pointer를 기반으로 하게끔 변경시키고 이에 따르는 제반 변경 사항을 수정 보완하여 프로그램의 분석을 용이하게 하며 기능의 변경 및 추가가 수월하게 하였고 메모리를 동적으로 관리할 수 있게 하였다. 또한 기존의 smpl에 디버깅용 함수 및 설비(facility) 제어용 함수를 추가하여 시뮬레이션 프로그램 작성을 용이하게 하였다. 예를 들면 who_server(), who_queue(), pop_Q(), push_Q(), pop_server(), push_server(), we(), wf(), printfct() 같은 함수들이다. 또한 동시에 발생되는 사건들의 순서를 조종하기 위해, 동시에 발생할 수 있는 각각의 사건에 우선순위를 두어 이 우선 순위에 의하여 사건 리스트(event list)에서 자동적으로 사건들의 순서가 결정되도록 확장하였으며, 설비 제어방식에 있어서도 FIFO, LIFO, 우선 순위 방식등을 선택할 수 있도록 확장하였다. SIMPLE는 자료구조 및 프로그램이 공개되어 있으므로 프로그래머가 원하는 기능을 쉽게 추가할 수 있는 장점도 있다. 아울러 SMPLE에서 새로이 추가된 자료구조와 함수 및 설비제어 방식등을 활용하여 실제 중형급 시스템에 대한 시뮬레이션 구현과 시스템 분석의 예를 보인다.

  • PDF

Numerical Study on the Behavior of Ground and Structure in Geosynthetic-Reinforced Soil (GRS) Integral Bridges

  • Sim, Youngjong;Jin, Kyu-Nam;Hong, Eun-Soo;Kim, Hansung;Park, Jun Kyung
    • Land and Housing Review
    • /
    • v.12 no.3
    • /
    • pp.97-108
    • /
    • 2021
  • In bridge abutment structures, lateral squeeze due to lateral stress of embankment placement and thermal movement of the bridge structure leads to failure of approach slabs, girders, and bridge bearings. Recently, GRS (Geosynthetic-Reinforced Soil) integral bridge has been proposed as a new countermeasure. The GRS integral bridge is a combining structure of a GRS retaining wall and an integral abutment bridge. In this study, numerical analyses which considered construction sequences and earthquake loading conditions are performed to compare the behaviors of conventional PSC (Pre-Stressed Concrete) girder bridge, traditional GRS integral bridge structure and GRS integral bridge with bracket structures (newly developed LH-type GRS integral bridge). The analysis results show that the GRS integral bridge with bracket structures is most stable compared with the others in an aspect of stress concentration and deformation on foundation ground including differential settlements between abutment and backfill. Furthermore, the GRS integral bridge with/without bracket structures was found to show the best performance in terms of seismic stability.

Security Improvement of User Authentication Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment (Heterogeneous Wireless Sensor Networks 환경에서의 안전한 사용자 인증 프로토콜)

  • Lee, Young sook
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.55-62
    • /
    • 2021
  • Recently, the use of sensor devices is gradually increasing. As various sensor device emerge and the related technologies advance, there has been a dramatic increase in the interest in heterogeneous wireless sensor networks (WSNs). While sensor device provide us many valuable benefits, automatically and remotely supported services offered and accessed remotely through WSNs also exposes us to many different types of security threats. Most security threats were just related to information leakage and the loss of authentication among the involved parties: users, sensors and gateways. An user authentication protocol for wireless sensor networks is designed to restrict access to the sensor data only to user. In 2019, Chen et al. proposed an efficient user authentication protocol. However, Ryu et al. show that it's scheme still unstable and inefficient. It cannot resist offline password guessing attack and session key attack. In this paper, we propose an improved protocol to overcome these security weaknesses by storing secret data in device. In addition, security properties like session-key security, perfect forward secrecy, known-key security and resistance against offline password attacks are implied by our protocol.