• Title/Summary/Keyword: Address system

Search Result 2,377, Processing Time 0.028 seconds

Application of SE Management Techniques for space Launch System Development (우주발사체 시스템 개발에 있어서의 SE관리기법 적용)

  • Jo, Mi-Ok;Jo, Byeong-Gyu;O, Beom-Seok;Park, Jeong-Ju;Jo, Gwang-Rae
    • 시스템엔지니어링워크숍
    • /
    • s.4
    • /
    • pp.90-94
    • /
    • 2004
  • System engineering(SE) management techniques applied for space launch system development are introduced to assess the current status and address the effwctiveness of these techniques. Management plans and guides are prepared for the work breakdown structure , data, comfiguration, interface control, Quality assurance, procurement, reliability, risk and verification/validation . Further improvement is required for the system engineering management plan(SEMP) to merge the international cooperation into current engineering managment system.

  • PDF

Multi-interface Wireless Mesh Network Testbed using Wireless Distribution System (무선 분산 시스템을 이용한 멀티 인터페이스 무선 메쉬 네트워크 테스트베드)

  • Yoon, Mi-Kyung;Yang, Seung-Chur;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1077-1082
    • /
    • 2009
  • Wireless Mesh Network(WMN) is wireless backbone networks technique which has ease of network configuration and cost of advantage. Recently, WNM released a new product, but most of existing research and technology analysis the performance through the simulation. This paper build the wireless mesh network testbed for actual situation. Testbed supports multi-channel multi-interface using bridge, the Wireless Distribution System and dynamic location-based routing protocol. This routing protocol strongly design against wireless interference using metric for link channel change and real distance. Then, the address of mesh clients assigned by the centralized address management server. Mesh clients is designed and implemented to manage network through Simple Network Management Protocol.

The Implementation of Kernel Hardening Function by Recovering the Stack Frame of Malfunction Address on the Linux Operating System (리눅스 운영체제에서 주소값 오류시 스택 복구를 통한 커널 하드닝 기능 구현)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.173-180
    • /
    • 2007
  • This paper designs the kernel hardening function by recovering the kernel stack fame to reduce the system error or panic due to the kernel code error. The suggested kernel hardening function guarantees normal system operation by recovering the incorrect address of the kernel stack kernel. The suggesting kernel hardening mechanism is applied to the network module of Linux which is much using put. I experimented the kernel hardening function at the network module of the Linux by forcing panic code.

The Development of an Intelligent Home Energy Management System Integrated with a Vehicle-to-Home Unit using a Reinforcement Learning Approach

  • Ohoud Almughram;Sami Ben Slama;Bassam Zafar
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.87-106
    • /
    • 2024
  • Vehicle-to-Home (V2H) and Home Centralized Photovoltaic (HCPV) systems can address various energy storage issues and enhance demand response programs. Renewable energy, such as solar energy and wind turbines, address the energy gap. However, no energy management system is currently available to regulate the uncertainty of renewable energy sources, electric vehicles, and appliance consumption within a smart microgrid. Therefore, this study investigated the impact of solar photovoltaic (PV) panels, electric vehicles, and Micro-Grid (MG) storage on maximum solar radiation hours. Several Deep Learning (DL) algorithms were applied to account for the uncertainty. Moreover, a Reinforcement Learning HCPV (RL-HCPV) algorithm was created for efficient real-time energy scheduling decisions. The proposed algorithm managed the energy demand between PV solar energy generation and vehicle energy storage. RL-HCPV was modeled according to several constraints to meet household electricity demands in sunny and cloudy weather. Simulations demonstrated how the proposed RL-HCPV system could efficiently handle the demand response and how V2H can help to smooth the appliance load profile and reduce power consumption costs with sustainable power generation. The results demonstrated the advantages of utilizing RL and V2H as potential storage technology for smart buildings.

Addressing Mobile Agent Security through Agent Collaboration

  • Jean, Evens;Jiao, Yu;Hurson, Ali-R.
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.43-53
    • /
    • 2007
  • The use of agent paradigm in today's applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.

Customer Barcode Support System for the Cost Saving of Mail Items (우편물 처리원가 절감을 위한 고객 바코드 지원 시스템)

  • Hwang, Jae-Gak;Park, Moon-Sung;Song, Jae-Gwan;Woo, Dong-Chin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.10
    • /
    • pp.2563-2573
    • /
    • 1999
  • In most mail automatic processing centers, after facing and canceling, letter mails are passed through an Optical Character Recognition/Barcode Sorter(OCR/BS) to read the postal code and 3 of 5 fluorescent (luminescent) barcode is applied. Normally, 31%∼35% of this mails are rejected. The main reasons for reading failures are poor printing quality of addresses and barcodes, script printing, writing in a cursive hand, variety fonts, and failure to locate the address. Our goal is to provide mailer with top quality service and customer barcode service as we move toward 100% barcoding automation of letter mail. In this paper, we propose a method of printing 3 of 5 customer barcode, postal code management, and detection of postal code based on postal address for increase the performance of automatic processing system in mail items. Using postal code generating rules, which are automatically extracted from postal addresses and address numbers, creates postal codes. The customer barcode support system is implemented by C++ language and runs on IBM PC under Windows 95.

  • PDF

A study on alarm broadcasting method using public data and IoT sensing data (공공데이터와 IoT 센싱 데이터를 활용한 경보방송 방법에 관한 연구)

  • Ryu, Taeha;Kim, Seungcheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.1
    • /
    • pp.21-27
    • /
    • 2022
  • As society develops and becomes more complex, new and diverse types of disasters such as fine dust and infectious diseases are occurring. However, in the past, there was no PA(Public Address) system that provided accurate information to prepare for such a disaster. In this paper, we propose a public address system that automatically broadcasts an alarm by analyzing polluted air quality data collected from public data and IoT sensors. The warning level varies depending on the air quality, and the information provided by public data may show a significantly different result from the guide area due to various factors such as the distance from the measuring station or the wind direction. To compensate for this, we are going to propose a method for broadcasting by comparing and analyzing data obtained from public data and data from on-site IoT sensors.

Document Management System based on SGML (SGML 을 기반으로 하는 문서관리시스템 개발)

  • Park, Nam-Kyu;Shin, D.S.
    • IE interfaces
    • /
    • v.10 no.3
    • /
    • pp.109-116
    • /
    • 1997
  • Document management system is a tool, based on the document life cycle concept, for structured management of various documents within an organization. In this paper, we address a development process of document management system based on SGML. We have developed a document management system which can support a variety of types in documents such as informal data, HTML, CGI and so on. Using the developed system, users can access documents in the system through an internet browser, and also add or modify existing documents.

  • PDF

A Study on Geographical Category Classification of Road Names of New Address System : in the Case of Cheongju City (새주소 체계 도로명의 지리적 유형 분류에 관한 연구 - 청주시를 사례로 -)

  • Hong, Seon-il;Kim, Young-Hoon
    • Journal of the Korean association of regional geographers
    • /
    • v.21 no.3
    • /
    • pp.553-568
    • /
    • 2015
  • This paper focuses on the geographical characteristics and the spatial distributions and patterns of the road names in the new address system for which all the 183 road names of Cheongju City has been used. All 183 road names in Cheongju City and their textural information are analyzed and classified into four main categories and six divisions as sub-category. Each type is mapped and its spatial patterns are discussed in order to identify the interaction between the road name and the geographical characteristics of each type. From the discussion stated in the paper, it can be inferred that the road name is not only a representative place name in an area, but also presents an important geographical feature reflecting the toponymy of the cultural and historical backgrounds of an area. Therefore, it is necessary to recognize that for road naming, various aspects such as geographical backgrounds and characteristics should be considered. These are directly related to the publicity and utilization of the road names to the public who is still unfamiliar with the new address system to be used. Finally, various geographical topics and approaches such as toponymy and spatial analysis are proposed for further geographical research, which will contribute to the extent of geographical research scopes.

  • PDF

A Study on Efficient IPv6 Address Allocation for Future Military (미래 군을 위한 효율적인 IPv6 주소 할당에 관한 연구)

  • Hanwoo Lee;Suhwan Kim;Gunwoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.613-618
    • /
    • 2023
  • The advancement of Information and Communication Technology (ICT) is accelerating innovation across society, and the defense sector is no exception as it adopts technologies aligned with the Fourth Industrial Revolution. In particular, the Army is making efforts to establish an advanced Army TIGER 4.0 system, aiming to create highly intelligent and interconnected mobile units. To achieve this, the Army is integrating cutting-edge scientific and technological advancements from the Fourth Industrial Revolution to enhance mobility, networking, and intelligence. However, the existing addressing system, IPv4, has limitations in meeting the exponentially increasing demands for network IP addresses. Consequently, the military considers IPv6 address allocation as an essential process to ensure efficient network management and address space provisioning. This study proposes an approach for IPv6 address allocation for the future military, considering the Army TIGER system. The proposal outlines how the application networks of the Army can be differentiated, and IP addresses can be allocated to future unit structures of the Army, Navy, and Air Force, from the Ministry of National Defense and the Joint Chiefs of Staff. Through this approach, the Army's advanced ground combat system, Army TIGER 4.0, is expected to operate more efficiently in network environments, enhancing overall information exchange and mobility for the future military.