• Title/Summary/Keyword: 정보통신 표준화

Search Result 2,952, Processing Time 0.033 seconds

Analysis of ERTMS/ETCS Baseline 3 for The KTCS Function Improvement (KTCS 기능개선을 위한 ERTMS/ETCS Baseline 3 상호호환성 분석)

  • Hwang, Kyung-Hwan;Woo, Hyung-Nam;Sung, Dong-Il;Lee, Key-Seo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.5
    • /
    • pp.375-384
    • /
    • 2021
  • The development of the European Railway Traffic Management System (ERTMS) began in 1989 as part of the European Union policy to establish a unified and interoperable railway route in Europe. It is a trend that ERTMS/ETCS(European Train Control System) is becoming an international standard in the railway signaling system. As the solution to this situation, the domestic railway signaling field is also at a time when it is more necessary to develop the technology of the train control system considering interoperability. The European Railway Agency (ERA) has proposed B3R2 (Baseline 3 Release 2) for new ETCS-equipped trains after 2020.12.31. In Korea, Baseline 2.2.0 to 2.3.0d on Gyeongbu Line, Honam Line, Jeolla Line, and Gyeongchun Line was installed and now is under operating. As the Baseline upgrade continues, technical considerations and economic considerations are an occurring trend. In this paper, we analyzed the main functions and compatibility of the currently distributed European standard ERTMS/ETCS Baseline 3 and presented a plan to apply the domestic KTCS(Korean Train Control System) Baseline in the near future.

Design and Manufacture of Triple-Band Antennas with Modified Rectangular Ring and Rectangular Patch for WLAN/WiMAX system applications (변형된 사각 링과 사각 패치를 갖는 WLAN/WiMAX 시스템에 적용 가능한 삼중대역 안테나 설계 및 제작)

  • Kim, Woo-Su;Yoon, Joong-Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.3
    • /
    • pp.341-348
    • /
    • 2019
  • In this paper, a monopole type antenna applicable to WLAN and WiMAX standard frequency bands is designed and fabricated. The proposed antenna is designed to have rectangular ring and rectangular patch based on microstrip feeding for triple band characteristics and inserted two stub in the top of the rectangular ring patch to enhance impedance bandwidth characteristics. The proposed antenna has $18.0mm(2W_1+W_2){\times}33.0mm(L_7+L_8+L_9)$ on a dielectric substrate of $27.0mm(W_1){\times}44mm(L_1){\times}1.0mm$ size. From the fabrication and measurement results, impedance bandwidths of 660MHz (2,08 to 2.74GHz) for 2.4/2.5MHz band, 488MHz (3.40 to 3.88GHz) for 3.5MHz band, and 2,180MHz (4.61 to 6.79GHz) for 5,000MHz band were obtained based on the impedance bandwidth. The proposed antenna also obtained the measured gain and radiation pattern in the anechoic chamber.

NCS proposal for industrial security (산업보안 분야에 대한 NCS 제안)

  • Park, Jong-Chan;Ahn, Jung-Hyun;Choi, Young-Pyul;Lee, Seung-Hoon;Baik, Nam-Kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.358-360
    • /
    • 2022
  • Modern society is developing rapidly and technologies that provide convenience in living are developing day by day. On the other hand, the development of cyber attacks that threaten cybersecurity is developing faster, and it still adversely affects the industrial environment, and industrial damage is steadily occurring every year. Industrial security is an activity that safely protects major assets or technologies of companies and organizations from these attacks. Therefore, it is a situation that requires professional manpower for security. Currently, the manpower situation for security is staffed, but knowledge of the understanding and concept of industrial security jobs is insufficient. In other words, there is a lack of professional manpower for industrial security. It is the NCS that came out to solve this problem. NCS is the state standardized ability (knowledge, attitude, skills, etc.) necessary to perform duties in the industrial field. NCS can systematically design the curriculum using NCS as well as help in hiring personnel, and NCS can be applied to the national qualification system. However, in the field of industrial security, NCS has not yet been developed and is still having difficulties in hiring personnel and curriculum. Although the NCS system in the field of industrial security has not been developed, this paper proposes the industrial security NCS to solve the problem of hiring professionals later and to help the field of industrial security NCS to be established later.

  • PDF

A Node Mobility-based Adaptive Route Optimization Scheme for Hierarchical Mobile IPv6 Networks (노드 이동성을 고려한 계층적 이동 IPv6 네트워크에서의 적응적 경로 최적화 방안)

  • 황승희;이보경;황종선;한연희
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.474-483
    • /
    • 2003
  • The secret sharing is the basic concept of the threshold cryptosystem and has an important position in the modern cryptography. At 1995, Jarecki proposed the proactive secret sharing to be a solution of existing the mobile adversary and also proposed the share renewal scheme for (k, n) threshold scheme. For n participants in the protocol, his method needs O($n^2$) modular exponentiation per one participant. It is very high computational cost and is not fit for the scalable cryptosystem. In this paper, we propose the efficient share renewal scheme that need only O(n) modular exponentiation per participant. And we prove our scheme is secure if less that ${\frac}\frac{1}{2}n-1$ adversaries exist and they static adversary.

BPAF2.0: Extended Business Process Analytics Format for Mining Process-driven Social Networks (BPAF2.0: 프로세스기반 소셜 네트워크 마이닝을 위한 비즈니스 프로세스 분석로그 포맷의 확장 표준)

  • Jeon, Myung-Hoon;Ahn, Hyun;Kim, Kwang-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1509-1521
    • /
    • 2011
  • WfMC, which is one of the international standardization organizations leading the business process and workflow technologies, has been officially released the BPAF1.0 that is a standard format to record process instances' event logs according as the business process intelligence mining technologies have recently issued in the business process and workflow literature. The business process mining technologies consist of two groups of algorithms and their analysis techniques; one is to rediscover flow-oriented process-intelligence, such as control-flow, data-flow, role-flow, and actor-flow intelligence, from process instances' event logs, and the other has something to do with rediscovering relation-oriented process-intelligence like process-driven social networks and process-driven affiliation networks from the event logs. The current standardized format of BPAF1.0 aims at only supporting the control-flow oriented process-intelligence mining techniques, and so it is unable to properly support the relation-oriented process-intelligence mining techniques. Therefore, this paper tries to extend the BPAF1.0 so as to reasonably support the relation-oriented process-intelligence mining techniques, and the extended BPAF is termed BPAF2.0. Particularly, we have a plan to standardize the extended BPAF2.0 as not only the national standard specifications through the e-Business project group of TTA, but also the international standard specifications of WfMC.

A Vector Perturbation Based User Selection for Multi-antenna Downlink Channels (다중안테나 하향채널에서의 Vector Perturbation 기반 사용자 선택 기법)

  • Lee, Byung-Ju;Lim, Chae-Hee;Shim, Byong-Hyo
    • Journal of Broadcast Engineering
    • /
    • v.16 no.6
    • /
    • pp.977-985
    • /
    • 2011
  • Recent works on multiuser transmission techniques have shown that the linear growth of capacity in single user MIMO system can be translated to the multiuser MIMO scenario as well. In this paper, we propose a method pursuing performance gain of vector perturbation in multiuser downlink systems. Instead of employing maximum number of mobile users for communication, we use small part of them as virtual users for improving reliability of users participating communication. By controlling parameters of virtual users including information and perturbation vector, we obtain considerable improvement in the effective SNR, resulting in large gain in bit error rate performance. Simulation results on the realistic multiuser downlink systems show that the proposed method brings substantial performance gain over the standard vector perturbation with marginal overhead in computations.

정보통신표준화 전략계획수립을 위한 방법론연구-표준화대상의 우선순위 결정을 중심으로-

  • 구경철;박기식;송기평;임채연
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1995.04a
    • /
    • pp.847-864
    • /
    • 1995
  • In this paper we present an integrated methodology for strategic planning in telecommunications standardization. Especially this paper focuses on the method of setting priorities for telecommunications SWAs(Standardization Work Areas) and related SWls(Standardization Work Items). To make a strategic plan for telecommunications standardization in which usually includes prioritization, resource allocation, standardization schedule for each SWA is based on prioritization of SWAs. Our methodology integrated various existing methods including the Analytic Hierarchy Process(AHP) and a modified Delphi technique. Recently, rapid technology evolution in telecommunications fields increases the necessity of developing more and more new standards. Also increased complexity of those technologies makes standards more complicated, more specified and more thick than the past ones. As a result, the number of SWAs and SWIs are being increased constantly. Furthermore, rapid telecommunication environment changes such as deregulation, liberalization, privatization, regionalization, and globalization surrounding standardization bring about new challenges and opportunities. Due to all these trends, strategic planning for telecommunications standardization grows more and more important. To cope with these challenges and also to make the more efficient use of the limited standardization resources including time, financial, human resources, we suggest more logical and rational approach that will be a backbone of strategic plan for telecommunications standardization. The telecommunications standardization planning process involves a MCDM(Multi-Criteria Decision Making) process. The Analytic Hierarchy Process(AHP) is a kind of MCDM approaches. Our method is based on a combination of a modified Delphi technique and an application of AHP(Liberator's spreadsheet model). Analyzed data from Delphi technique is used as inputs to ABP. In addition, we also focus on the technique how to combine group judgments and to handle a large number of comparisons. We present analyzed results including Pilot and Full Scale Survey according to the proposed process. The result of this study will be useful input for telecommunications standardization policy making and practical implementation.

  • PDF

A Study on the Characteristic of Ubiquitous Infrastructure for u-City (u-City 도시기반시절의 특성에 관한 연구)

  • Eum, Min-Kyung;Song, Seung-Min;Kim, Do-Nyun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.5
    • /
    • pp.93-102
    • /
    • 2011
  • IT technologies applied in the urban places are being promoted in each area. Especially infrastructure is performed in the central role of technical support in urban area. However, u-City infrastructure has lack of integrated way and concentrated on only feasible technology which cause frequent substitution and the nested technology in urban area. Therefore this study sheds light on infrastructure through a overall considerations of urban compositional elements and interactions, and apply technology in the process of the industrial era, the domestic supply of urban infrastructure and the cycle comparison-analysis deal with the domestic implications when applied. The results of the study, first, the u-City infrastructure should be supplied by public. Second, u-City infrastructure is in need of the agile character, and standardization of the subtleties is needed. Third, a new system of integrated-macroscopic perspective should be established by changes that influenced by convergences of IT technologies and infrastructures. Fourth, u-City infrastructures planning should consider interactions of services, devices and systems.

Study on ″Policy-based Network service Management System for DEN″ (DEN 서비스를 위한 PBNM 개발)

  • 전준현;백성혁;구태원
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.4
    • /
    • pp.1-10
    • /
    • 2004
  • In NGNs(Next Generation Networks), It is necessary for Integrated management of resource and information to satisfy high-quality users'demands, such as stable speed, guarantee of high level service and service requirement in various fields. In relation to this, technology for efficiently using limited resources is becoming interesting things more and more. Therefore policy of network service is dealt essentially. Recently, DEN(Directory Enabled Network)-based personalization service is user-dependent services in NGNs, and integrated management and efficient use of limited resources. Also, PBNM(Policy-Based Network Management) is new technology defined and applied by policies of communication service environments and users on demand. Subsequently to study on how to optimizing the PBNM is of great importance. In this paper, we propose a technology of the PBNM based on DEN standardized in DMTF(Distributed Management Task Force).

Design and Implementation of a Protocol for u-Safety Service (u-안심 서비스 프로토콜 설계 및 구현)

  • Cho, Byung Soon;Lee, Jae Min
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.12
    • /
    • pp.117-128
    • /
    • 2013
  • u-safety service system inter-works with the diverse operation agencies, through CCTV network, such as the emergency call terminal with built-in GPS, the mobile communication network, u-safety service provider, relay system and CCTV control center. In the case of the emergency call, this service searches the location of caller in real time, and then continues to search the location of caller through the control of CCTV in the searched place, and can provide the several agencies like guardian, police office, fire station, hospitals, relief organizations and municipalities, with the diverse information necessary for the secure rescue through SMS and wired network. In this paper, a new protocol and specification for u-safety service relay system is designed and implemented. The effectiveness of presented protocol is verified by computer simulation. The designed protocol of u-safety service is applied to real 3GPP and 3GPP2 mobile communication networks to verify its performance.