• Title/Summary/Keyword: Network Ready

Search Result 86, Processing Time 0.028 seconds

Real-time Identification of the Draft System Using Neural Network

  • Chun Soon-Yong;Bae Han-Jo;Kim Seon-Mi;Suh Moon-W.;Grady P.;Lyoo Won-Seok;Yoon Won-Sik;Han Sung-Soo
    • Fibers and Polymers
    • /
    • v.7 no.1
    • /
    • pp.62-65
    • /
    • 2006
  • Making a good model is one of the most important aspects in the field of a control system. If one makes a good model, one is now ready to make a good controller for the system. The focus of this thesis lies on system modeling, the draft system in specific. In modeling for a draft system, one of the most common methods is the 'least-square method'; however, this method can only be applied to linear systems. For this reason, the draft system, which is non-linear and a time-varying system, needs a new method. This thesis proposes a new method (the MLS method) and demonstrates a possible way of modeling even though a system has input noise and system noise. This thesis proved the adaptability and convergence of the MLS method.

A Study on the Communication Infrastructure of North and South Korea Using KU & KA Band in Satellites (위성의 Ku 및 ka밴드을 이용한 남북한 통신인프라 구축)

  • 서석철;이재완;황민호;고남영
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.605-609
    • /
    • 2001
  • While South Korea's wire and witless communications attain a world-wide level in the latest information-oriented society, North Korea's communications infra get fared with underdeveloped situation even not to meet a basic telephone demand as the 70's in South korea. The exchange and cooperation between the Sout h and North' korea's in the formation & telecommunication field implies the important point that makes ready for the reunification of North and South as the core of the exchange and cooperation in an economic and society, other field. Therefore a communications satellite as the infrastructure for the network construction preparing the reunification can be the most suitable plan for the communication infrastructure in korea's area be cause it is easy to build a network and gets an advantage to service all area of south anti north korea at a n/time.

  • PDF

Analysis of Tendencies on WLAN Security Technology (무선랜 보안 기술 및 운영 현황 분석)

  • Kim, Su-Jin;Seo, Jong-Kyun;Han, Ki-Cheon;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.685-687
    • /
    • 2013
  • Today, as wireless communications devices such as laptops, smart phones are generalized, wireless LAN has been widely installed in the corporate office conference rooms, industrial warehouses, Internet-ready classrooms, and even in a coffee shop. Though a wired network can be accessed and attacked only by the physical penetration, the wireless network which can be accessed anywhere within the reach of anyone has relative vulnerability by unauthorized users' attack. To defend these vulnerabilities, the introduction of WIDS / WIPS is required. In this paper, we recognize the limitations of WLAN security technology, review the current technology trends and propose the solutions in the future security problems.

  • PDF

Virtual Standards Development Environments for Concurrent Standardization Process

  • Kim, Hyoung-Jun;Park, Ki-Shik;Chin, Byoung-Moon;Park, Chee-Hang
    • ETRI Journal
    • /
    • v.21 no.1
    • /
    • pp.55-71
    • /
    • 1999
  • Recently, the increased handling of on-line standards information has emerged as an important feature of information and communications technology (ICT) standardization. In order to meet market needs for on-time standards deployment, most standards organizations are actively seeking more efficient ways of standardization using electronic means in order to accelerate the standards making process. This paper suggests a virtual standard development environment designed for standards developers to carry out their standards-related activities on-line. In this paper, we outline a conceptual model of a concurrent standardization process and describe the design and implementation of an Extranet-based network system called standards information cooperative network (SICN). The system was created with a view to fostering faster standards development with functionalities such as a virtual management of networked standards developers, collaboration support tools, a workflow-based electronic signature system, and dynamic links for ready retrieval of standards information stored in a database. We conclude this paper with an introduction to the concept of a virtual standards development organization (VSDO) that supports all the features needed by the relevant standards making bodies to carry out their activities in a dynamic on-line environment.

  • PDF

Implementation of Real-Time Communication in CAN for a Humanoid Robot (CAN 기반 휴머노이드 로봇의 실시간 데이터 통신 구현)

  • Kwon Sun-Ku;Kim Byung-Yoon;Kim Jin-Hwan;Huh Uk-Youl
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.1
    • /
    • pp.24-30
    • /
    • 2006
  • The Controller Area Network (CAN) is being widely used for real-time control application and small-scale distributed computer controller systems. When the stuff bits are generated by bit-stuffing mechanism in the CAN network, it causes jitter including variations in response time and delay In order to eliminate this jitter, stuff bits must be controlled to minimize the response time and to reduce the variation of data transmission time. This paper proposes the method to reduce the stuff bits by restriction of available identifier and bit mask using exclusive OR operation. This da manipulation method are pretty useful to the real-time control strategy with respect to performance. However, the CAN may exhibit unfair behavior under heavy traffic conditions. When there are both high and low priority messages ready for transmission, the proposed precedence priority filtering method allows one low priority message to be exchanged between any two adjacent higher priority messages. In this way, the length of each transmission delays is upper bounded. These procedures are implemented as local controllers for the ISHURO(Inha Semvung Humanoid Robot).

Wake-up Algorithm of Wireless Sensor Node Using Geometric Probability (기하학적 확률을 이용한 무선 센서 노드의 웨이크 업 알고리즘 기법)

  • Choi, Sung-Yeol;Kim, Sang-Choon;Kim, Seong Kun;Lee, Je-Hoon
    • Journal of Sensor Science and Technology
    • /
    • v.22 no.4
    • /
    • pp.268-275
    • /
    • 2013
  • Efficient energy management becomes a critical design issue for complex WSN (Wireless Sensor Network). Most of complex WSN employ the sleep mode to reduce the energy dissipation. However, it should cause the reduction of sensing coverage. This paper presents new wake-up algorithm for reducing energy consumption in complex WSN. The proposed wake-up algorithm is devised using geometric probability. It determined which node will be waked-up among the nodes having overlapped sensing coverage. The only one sensor node will be waked-up and it is ready to sense the event occurred uniformly. The simulation results show that the lifetime is increased by 15% and the sensing coverage is increased by 20% compared to the other scheduling methods. Consequently, the proposed wake-up algorithm can eliminate the power dissipation in the overlapped sensing coverage. Thus, it can be applicable for the various WSN suffering from the limited power supply.

Factors for Better Adoption of Information Security on Custom-Made Software at SMEs: A Systematic Review and Framework

  • Fatimah Alghamdi;Moutasm Tamimi;Nermin Hamza
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.65-78
    • /
    • 2023
  • Investigations on information security factors re- main elusive at small and medium enterprises (SMEs), es- specially for custom-made software solutions. This article aims to investigate, classify, adopt factors from recent literature addressing information security resources. SMEs al- ready have information security in place, but they are not easy to adopt through the negotiation processes between the in-house software development companies and custom-made software clients at SMEs. This article proposes a strategic framework for implementing the process of adoption of the information security factors at SMEs after conducting a systematic snapshot approach for investigating and classifying the resources. The systematic snapshot was conducted using a search strategy with inclusion and exclusion criteria to retain 128 final reviewed papers from a large number of papers within the period of 2001-2022. These papers were analyzed based on a classification schema including management, organizational, development, and environmental categories in software development lifecycle (SDLC) phases in order to define new security factors. The reviewed articles addressed research gaps, trends, and common covered evidence-based decisions based on the findings of the systematic mapping. Hence, this paper boosts the broader cooperation between in-house software development companies and their clients to elicit, customize, and adopt the factors based on clients' demands.

Applicability and Adaptability of Gait-based Biometric Security System in GCC

  • S. M. Emdad Hossain
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.202-206
    • /
    • 2024
  • Robust system may not guaranty its applicability and adaptability. That is why research and development go together in the modern research concept. In this paper we are going to examine the applicability and adaptability of gait-based biometric identity verification system especially in the GCC (Gulf Cooperation Council). The system itself closely involved with human interaction where privacy and personality are in concern. As of 1st phase of our research we will establish gait-based identity verification system and then we will explain them in and out of human interaction with the system. With involved interaction we will conduct an extensive survey to find out both applicability and adoptability of the system. To conduct our experiment, we will use UCMG databased [1] which is readily available for the research community with more than three thousand video sequences in different viewpoint collected in various walking pattern and clothing. For the survey we will prepare questioners which will cover approach of data collection, potential traits to collect and possible consequences. For analyzing gait biometric trait, we will apply multivariate statistical classifier through well-known machine learning algorithms in a ready platform. Similarly, for the survey data analysis we will use similar approach to co-relate the user view point for such system. It will also help us to find the perception of the user for the system.

An Implementation of Global Scheduler for Efficient Distributed Resource Management (효율적 분산자원 관리를 위한 글로벌 스케쥴러 구현)

  • Yong Wan Koo
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.3
    • /
    • pp.1-13
    • /
    • 1994
  • In this study under the distributed system for efficient distribution resource completely symmetic global scheduler was designed and implemented to obtain the general global scheduler, that is load balancing as sharing objectives. To balance the system's load efficiently each node must be designed to get right decision-making. Thus we considered computing time to estimate fault such as delay on communication network, communication period and other decision-making. Load balancing mechanism which suggested in this study was implemented in the distributed system which IBM PC/AT linked to and composed with Ethernet. The target operating system was composed of IBM PC/AT as a basic construction in which proper type of UNIX operating system were ported and communication layer chose communication type implemented from Amoeba. The method of IPC employing layered multilevel access method to avoid inefficient protocol using direct communication mode guarantees rapid response due to short ready time for IPC.

  • PDF

Public Procurement for Innovation in Vietnam: Rationales and Perspectives

  • Cao, Thi Thu Anh;Dang, Thu Giang
    • STI Policy Review
    • /
    • v.7 no.1
    • /
    • pp.87-109
    • /
    • 2016
  • Public procurement for innovation (PPI) is a new approach in stimulating innovation, and currently attracts considerable attention from policymakers and academics. This paper discusses the rationales and perspectives of PPI in Vietnam. The rationales for public procurement for innovation policy in Vietnam compared to theoretical and international practice are discussed. From such a comparison, the paper concludes that R&D results-procurement policy in Vietnam shall be understood and implemented as regular PPI both theoretically and practically. However while designing the policy, policymakers must consider the characteristics of the STI system of the country in order to make the policy adaptable to context. The paper identifies that PPI in Vietnam can be implemented with a ready legal framework (intellectual property rights, R&D contracts, standardization, etc.), the prepared capabilities of R&D institutions, businesses, and public agencies in innovation processes, and the provision of a demand-supply network and other procurement incentives.