• Title/Summary/Keyword: Deployment Information

Search Result 1,014, Processing Time 0.027 seconds

An Energy Efficient RF Protocol Structure for a Large-Scale In-Home Display Deployment (대규모 In-Home Display 보급을 위한 에너지 효율적 RF 통신 프로토콜 체계)

  • Lee, Seung-Min;Son, Sung-Yong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.1
    • /
    • pp.53-60
    • /
    • 2011
  • In-Home Display (IHD) is one of the most popular ways to induce voluntary customer participation in energy savings. Various communication technologies are used for recent IHD implementations, but most IHD systems are designed for each house because of their limitations such as communication coverage area and operation complexity. In this study, 400MHz RF communication is used for economical large-scale deployment of IHDs especially for apartment complexes that represent typical residentioal environment in Korea. Since it is essential to use internal batteries to increase the usability of IHD, the frequent changes of them should be avoided. By dividing communication data into 3 types such as common data, long term data, and short term data depending on their update periods, energy efficient communication protocol is designed and proposed. In result, the quantity of data and the battery consumption of IHD are reduced to 23.4% and 31.5% each without harming service quality.

Analysis of Requirements Using Quality Function Deployment (QFD) in Virtual Reality(VR) (가상현실(VR)에서 품질기능전개(QFD)를 활용한 요구사항 분석)

  • Park, Jihye;Kim, Mincheol
    • Journal of Distribution Science
    • /
    • v.17 no.2
    • /
    • pp.101-107
    • /
    • 2019
  • Purpose - The purpose of this study is to analyze the user requirements and developer requirements in virtual reality(VR), and suggest ways to increase the satisfaction of users who experience virtual reality. Specifically, focused on experience store of VR as a distribution retailer, user requirements were analyzed according to the results of previous research that the characteristics of Affordance, Presence, and Head Mounted Display (HMD) affect user satisfaction. Research, design, data, and methodology - Based on previous studies, in this study, we analyzed the importance of immerse, interaction, perception, and presence for the satisfaction of the user through the questionnaire, and the user experiences virtual reality (VR) The importance of HMD, Presence, Affordance, and experience satisfaction were analyzed. Based on this, we analyzed the user requirements and the developer requirements based on the questionnaires and interviews of the experts, starting from the user's desire or preference using QFD technique. Results - As a result of the analysis, the development factors that occupied a big part in the virtual reality field appeared to be visual. In detail, this showed that there was a lack of sense of presence for users. This should be improved. This paper shows that the requirements for visual, auditory, and tactile development are necessary. For the satisfaction of the users of virtual reality (VR) users, it is necessary to develop them according to their priority in consideration of importance and difficulty in the future. Conclusions - In this study, it was suggested that development according to priority should be considered, considering the difficulty level. Based on the results of this study, the following suggestions are made. First, we tried to search the list of user requirements as much as possible, but it is likely to change due to the development of VR technology. Therefore, it is necessary for developers to continually supplement user requirements with recent research literature. Second, development priorities according to difficulty level should be considered. This aspect should be considered in the actual VR development process, so if the numerical value of the difficulty is calculated, it should be presented in the research.

The Analysis on Positioning Error of Recognition Schemes of Pilot Signal in Indoor TDoA Positioning System using Visible Light Communication (가시광 무선 통신을 이용한 TDoA 기반 실내 측위 시스템에서 파일럿 신호 인식 방식에 따른 측위 성능 분석)

  • Hwang, Junho;Yoo, Myungsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.9
    • /
    • pp.787-794
    • /
    • 2012
  • The visible light communication is considered as a next generation communication technology, when utilizes LED and PD for communication. Since it is easy to provide LOS communication environment along with cheap deployment cost, the positioning system based on VLC has been actively studied. However, the existing positioning system using VLC requires a complex computation and an additional deployment cost due to sensors for example. In this paper, we propose a new positioning system based on VLC which does not require additional complexity and the cost. In addition, the procedure for operating LED panels for positioning and the recognition schemes of pilot signal are proposed. The performance of recognition schemes of pilot signal is analyzed through the computer simulations.

Femtocell Searching Technique Using Synchronization Signals for Next-Generation Mobile Communication Systems (차세대 이동통신 시스템에서 동기신호를 이용한 펨토셀 탐색 기법)

  • Kim, Yeong Jun;Cho, Yong Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.1
    • /
    • pp.44-57
    • /
    • 2013
  • In this paper, we propose a femtocell searching technique which can prevent a macrocell UE(user equipment) from losing synchronism to its serving macrocell near closed access femtocells in co-channel deployment due to the leakage of femtocell signals by using a CS(Common Signal). The CS, commonly transmitted by femtocells in a macrocell at the same time, enables the macrocell UEs to be kept synchronized with their serving macrocells since the CINR(Carrier to Interference and Noise Ratio) of base stations in macrocell can be kept high even near closed access femtocells. Also, the CS is designed in such a way that a macrocell UE can recognize the existence of femtocell by using the metric CSCINR(Common Signal Carrier to Interference and Ratio) measured with CS. In addition, the proposed femtocell searching technique can reduce the frequency of femtocell searching trial by using the metric on mobility of a macrocell UE defined in this paper, and the reduction of the frequency of handover trial can be also expected as a byproduct.

Security Risks Evaluation based on IPv6 Firewall Rules (IPv6의 방화벽 규칙을 기반으로한 보안위험 평가)

  • Phang, Seong-Yee;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.261-264
    • /
    • 2008
  • IPv6 has been proposed and deployed to cater the shortage of IPv4 addresses. It is expected to foresee mobile phones, pocket PCs, home devices and any other kind of network capable devices to be connected to the Internet with the introduction and deployment of IPv6. This scenario will bring in more challenges to the existing network infrastructure especially in the network security area. Firewalls are the simplest and the most basic form of protection to ensure network security. Nowadays, firewalls' usage has been extended from not only to protect the whole network but also appear as software firewalls to protect each network devices. IPv6 and IPv4 are not interoperable as there are separate networking stacks for each protocol. Therefore, the existing states of the art in firewalling need to be reengineered. In our context here, we pay attention only to the IPv6 firewalls configuration anomalies without considering other factors. Pre-evaluation of security risk is important in any organization especially a large scale network deployment where an add on rules to the firewall may affect the up and running network. We proposed a new probabilistic based model to evaluate the security risks based on examining the existing firewall rules. Hence, the network administrators can pre-evaluate the possible risk incurred in their current network security implementation in the IPv6 network. The outcome from our proposed pre-evaluation model will be the possibilities in percentage that the IPv6 firewall is configured wrongly or insecurely where known attacks such as DoS attack, Probation attack, Renumbering attack and etc can be launched easily. Besides that, we suggest and recommend few important rules set that should be included in configuring IPv6 firewall rules.

  • PDF

Considerations of Automatic Passenger Counting System using Infrared Sensors at doorway in Overseas Railway Transit (적외선 센서를 이용한 자동 승객 계수 시스템에 대한 고찰)

  • Kim, Jin-Seok;Gwak, Ho-Seung
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.418-423
    • /
    • 2009
  • Unlike domestic railway transportation system in which majority of station are equipped with gate access controller and ticket office, it has been a very common practice in overseas railway transit or railway station that they use a pressure door mat, infrared-sensors or CCTV cameras so as to automatically determine the number of passenger onboard and alight and to reflect the information to their business (i.e., deployment of vehicles and human resources). The data collected by the automatic passenger counting (APC) system provides methods how to obtain the information about the number of passenger using the vehicles on the basis of date, time and stop(station) which enables large-scaled transit company to create profits through effective vehicle deployment and management of their employees. This paper addresses the basic features of the automatic passenger counting system using infrared sensor and describes those of the extended APC system in conjunction with wireless technologies such as GPS, WLAN or Cellular network.

  • PDF

A Multi-hop Relaying Transmission Scheme in Cognitive Radio System (Cognitive Radio 시스템 환경에서의 다중 홉 릴레이 전송 기법)

  • Lee, Dong-Kyu;Shin, Jung-Chae;Lim, Eun-Taek;Lee, Hyun-Woo;Cho, Ho-Shin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9A
    • /
    • pp.853-866
    • /
    • 2008
  • In this paper, a multi-hop relaying transmission scheme is analyzed regarding its feasibility and potentiality in the IEEE 802.22-based cognitive radio (CR) environment. Shortly, basic design issues are addressed such as relay station (RS) deployment and a frame structure of physical channel to escape inter-hop interference. This paper mainly develops a radio resource management scheme based on spectrum sensing results aggregated from CR secondary nodes and improves the opportunistic spectrum sharing efficiency. In particular, a decision rule about a channel availability is made using a distributed sensing method. Subsequently, spectrum allocation and routing path decision procedures are proposed to establish a link from source to destination with a hop-by-hop manner. Simulation results show that the proposed multi-hop relaying scheme is substantially profitable in CR environments if the number of hops and RS deployment are designed in such a way that the spectrum sharing gain is larger than spectrum division loss which is inherently induced in multi-hop relaying systems.

Application Scenarios of Nautical Ad-hoc Network in Wireless Mobile Communication under Maritime Environment (해상 환경에서의 무선 이동 통신을 위한 선박용 Ad-hoc 네트워크 운용 시나리오)

  • Kim, Young-Bum;Chang, Kyung-Hi;Yun, Chang-Ho;Park, Jong-Won;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2097-2104
    • /
    • 2009
  • In terrestrial communications, high data rate transmission can be achieved by splitting the coverage area into small cells through base stations and reusing the resource efficiently. However, the geographical features of maritime communications require the long transmission range, and it is not practical to install base station on the sea to set up the similar deployment as the terrestrial communications, so MF/HF band modem with low data rate are currently utilized for maritime communications. And the expensive satellite communication via Inmarsat is the conventional solution for the high data rate transmission on the sea. To reduce the cost, Ad-hoc network is proposed to apply on the sea, which requires no base station for the peer-to-peer communications. In this paper, we denominate this maritime environment specific Ad-hoc network as Nautical Ad-hoc Network (NANET). Furthermore, the deployment scenario for the NANET, and the analysis on multiple access and duplexing schemes for the NANET are discussed in this paper, which serves as the cornerstone for the further NANET research and development.

A Methodology for Task placement and Scheduling Based on Virtual Machines

  • Chen, Xiaojun;Zhang, Jing;Li, Junhuai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.9
    • /
    • pp.1544-1572
    • /
    • 2011
  • Task placement and scheduling are traditionally studied in following aspects: resource utilization, application throughput, application execution latency and starvation, and recently, the studies are more on application scalability and application performance. A methodology for task placement and scheduling centered on tasks based on virtual machines is studied in this paper to improve the performances of systems and dynamic adaptability in applications development and deployment oriented parallel computing. For parallel applications with no real-time constraints, we describe a thought of feature model and make a formal description for four layers of task placement and scheduling. To place the tasks to different layers of virtual computing systems, we take the performances of four layers as the goal function in the model of task placement and scheduling. Furthermore, we take the personal preference, the application scalability for a designer in his (her) development and deployment, as the constraint of this model. The workflow of task placement and scheduling based on virtual machines has been discussed. Then, an algorithm TPVM is designed to work out the optimal scheme of the model, and an algorithm TEVM completes the execution of tasks in four layers. The experiments have been performed to validate the effectiveness of time estimated method and the feasibility and rationality of algorithms. It is seen from the experiments that our algorithms are better than other four algorithms in performance. The results show that the methodology presented in this paper has guiding significance to improve the efficiency of virtual computing systems.

Membership Management based on a Hierarchical Ring for Large Grid Environments

  • Gu, Tae-Wan;Hong, Seong-Jun;Uhmn, Saang-Yong;Lee, Kwang-Mo
    • Journal of Information Processing Systems
    • /
    • v.3 no.1
    • /
    • pp.8-15
    • /
    • 2007
  • Grid environments provide the mechanism to share heterogeneous resources among nodes. Because of the similarity between grid environments and P2P networks, the structures of P2P networks can be adapted to enhance scalability and efficiency in deployment and to search for services. In this paper, we present a membership management based on a hierarchical ring which constructs P2P-like Grid environments. The proposed approach uses only a limited number of connections, reducing communication cost. Also, it only keeps local information for membership, which leads to a further reduction in management cost. This paper analyzes the performance of the approach by simulation and compares it with other approaches.