• Title/Summary/Keyword: Deployment Information

검색결과 1,014건 처리시간 0.027초

차기 이동통신 시장을 향한 3GPP LTE 업계의 최근동향 (On Recent Industry Activities for 3GPP Long Term Evolution (LTE) toward the Next Generation Mobile Communication Markets)

  • 김민구
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2008년도 하계종합학술대회
    • /
    • pp.5-6
    • /
    • 2008
  • With the continued evolution of third-generation cellular systems and the introduction of 3GP P LTE, there is considerable progress for the new mobile wireless markets. Recently, 3GPP LTE standards are accelerated by mobile operators supporting LTE deployment and special working groups such as LSTI are working for LTE IOT and trials. In this paper, we introduce the current status of LTE activities in the mobile communications industry.

  • PDF

신.재생에너지 시장 확장의 동태적 분석 (A Dynamic Analysis of The Deployment of Korean Renewable Energy Market)

  • 유재국;곽상만
    • 한국시스템다이내믹스연구
    • /
    • 제6권2호
    • /
    • pp.95-116
    • /
    • 2005
  • The purpose of this study is to analyze the structure of renewable energy market in order to deploy more renewable energy in Korea on the basis of information asymmetry between suppliers and demanders. To attain this purpose we develop the model to analyze and simulate the renewable market using system dynamics. This model is developed not to forecast the accurate size of market but to learn more structure of market using our limited data, mental model and knowledge of market.

  • PDF

FTTH 기술 발전 동향 (Technical reviews in fiber to the home (FTTH))

  • 신병곤;박재형;김진희
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.283-286
    • /
    • 2008
  • This article describes developments in fiber to the home (FTTH), and introduces the technical reviews for the various types to realize FTTH. Also, we have presented the results of each EPON, GPON and WDM-PON standardization by each IEEE, ITU-T and TTA. Finally, based on the above results, we proposed the trend of FTTH service deployment strategies.

  • PDF

지능형 차량 이동네트워크 환경에서 차량과 통신설비간의 효율적인 인증프로토콜 (An Efficient Authentication Protocol between Vehicle and Communication Infrastructure for Intelligent Vehicular Networks)

  • 황병희;김범한;이동훈
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.500-503
    • /
    • 2008
  • Vehicular Ad hoc Networks have attracted extensive attentions in recent years for their promises in improving safety and enabling other value-added services. Security and privacy are two integrated issues in the deployment of vehicular networks. Privacy-preserving authentication is a key technique in addressing these two issues. We propose a hash chain based authentication protocol that preserves the user privacy. We show that the our scheme can efficiently authenticate users. Name of Our protocol is

  • PDF

설계.생산 통합 정보시스템 개발을 위한 QFD 기반 기능 분석 (A QFD-Based Requirements Analysis for the Development of Integrated Design &Manufacturing Information System)

  • 한관희;박찬우
    • 산업공학
    • /
    • 제17권3호
    • /
    • pp.261-268
    • /
    • 2004
  • The primary goal of the requirement analysis phase during information system development is to identify and document what is really needed, in a form that clearly communicates to the user and to development team members. Presented in this paper is a QFD(Quality Function Deployment)-based requirement analysis method and procedure for developing a large-scale enterprise information system. For the purpose of elicitation of software functional requirements, this paper adopts the method of HOQ(House Of Quality) and proposes a simplified HOQ which is more suitable for the software requirement analysis. As a result of this paper, it suggests desired functionalities for an integrated design &manufacturing information system.

A Revocable Fingerprint Template for Security and Privacy Preserving

  • Jin, Zhe;Teoh, Andrew Beng Jin;Ong, Thian Song;Tee, Connie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권6호
    • /
    • pp.1327-1342
    • /
    • 2010
  • With the wide deployment of biometric authentication systems, several issues pertaining security and privacy of the biometric template have gained great attention from the research community. To resolve these issues, a number of biometric template protection methods have been proposed. However, the design of a template protection method to satisfy four criteria, namely diversity, revocability and non-invertibility is still a challenging task, especially performance degradation when template protection method is employed. In this paper, we propose a novel method to generate a revocable minutiae-based fingerprint template. The proposed method consists of feature extraction from fingerprint minutiae pairs, quantization, histogram binning, binarization and eventually binary bit-string generation. The contributions of our method are two fold: alignment-free and good performance. Various experiments on FVC2004 DB1 demonstrated the effectiveness of the proposed methods.

A Single Mobile Target Tracking in Voronoi-based Clustered Wireless Sensor Network

  • Chen, Jiehui;Salim, Mariam B.;Matsumoto, Mitsuji
    • Journal of Information Processing Systems
    • /
    • 제7권1호
    • /
    • pp.17-28
    • /
    • 2011
  • Despite the fact that the deployment of sensor networks and target tracking could both be managed by taking full advantage of Voronoi diagrams, very little few have been made in this regard. In this paper, we designed an optimized barrier coverage and an energy-efficient clustering algorithm for forming Vonoroi-based Wireless Sensor Networks(WSN) in which we proposed a mobile target tracking scheme (CTT&MAV) that takes full advantage of Voronoi-diagram boundary to improve detectability. Simulations verified that CTT&MAV outperforms random walk, random waypoint, random direction and Gauss-Markov in terms of both the average hop distance that the mobile target moved before being detected and lower sensor death rate. Moreover, we demonstrate that our results are robust as realistic sensing models and also validate our observations through extensive simulations.

Access Policy Transfer Between Active Nodes Using Identities

  • Kim, Young-Soo;Han, Jong-Wook;Seo, Dong-Il;Sohn, Seung-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2178-2181
    • /
    • 2003
  • Active networks allow active node’s functionality to be extended dynamically through the use of active extensions. This flexible architecture facilitates the deployment of new network protocols and services. However, the active nature of a network also raises serious safety and security concerns. These concerns must be addressed before active networks can be deployed. In this paper we look at how we can control active extension’s access to different active nodes. Specifically, the authentication between active nodes is very important in this case. We use unique identity each node has for transferring access policies between active nodes. In this paper, we suggest a new method of transferring access policies performing authentications using identities between active nodes.

  • PDF

정보량에 의한 굴삭기 설계 전문가 지식의 평가 (The Evaluation of Expert Knowledge for the Excavator Design Using Measure of Information)

  • 장준현;전찬모;노태성
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 2005년도 춘계학술대회 논문집
    • /
    • pp.123-126
    • /
    • 2005
  • We develop the evaluation method of functional requirements for excavator design. The functional requirement of the product can be deduced from voice of customer. QFD method is used in order to convert customer requirement to functional requirement. The measure of information index is used to evaluate quantitatively the product quality characteristics. The correlation score between customer requirements and functional requirements and benchmarking score of competitors are basic data for the measure of information.

  • PDF

A Simple Energy Harvesting Algorithm for Wireless Sensor Networks

  • Encarnacion, Nico N.;Yang, Hyunho
    • Journal of information and communication convergence engineering
    • /
    • 제10권4호
    • /
    • pp.359-364
    • /
    • 2012
  • Harvesting energy from the environment is essential for many applications to slow down the deterioration of energy of the devices in sensor networks and in general, the network itself. Energy from the environment is an inexhaustible supply which, if properly managed and harvested from the sources, can allow the system to last for a longer period - more than the expected lifetime at the time of deployment, or even last indefinitely. The goal of this study is to develop a simple algorithm for ns-2 to simulate energy harvesting in wireless sensor network simulations. The algorithm is implemented in the energy module of the simulator. Energy harvesting algorithms have not yet been developed for ns-2. This study will greatly contribute to the existing knowledge of simulating wireless sensor networks with energy harvesting capabilities in ns-2. This paper will also serve as a basis for future research papers that make use of energy harvesting.