• Title/Summary/Keyword: next generation information system

Search Result 900, Processing Time 0.034 seconds

Resource Management for Maximizing Simultaneous Transfer of Information and Power (정보와 전력의 동시 전송을 최대화하기 위한 자원 관리 기법)

  • Lee, Kisong;Kim, Minhoe;Cho, Dong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1560-1566
    • /
    • 2015
  • To enable the efficient use of energy, the environment where unscheduled receivers can harvest energy from the transmitted signal is considered in next-generation wireless communication systems. In this paper, we propose a scheme for allocating subchannel and power to maximize the system throughput and harvested energy simultaneously using optimization techniques. Through simulations, we verify that the proposed scheme can increase the system throughput and harvested energy harmoniously. In particular, the proposed scheme improves the harvested energy remarkably with a negligible degradation of system throughput, compared with conventional scheme, as a result, energy can be used efficiently in the system.

Design and Implementation of Dynamic Recommendation Service in Big Data Environment

  • Kim, Ryong;Park, Kyung-Hye
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.5
    • /
    • pp.57-65
    • /
    • 2019
  • Recommendation Systems are information technologies that E-commerce merchants have adopted so that online shoppers can receive suggestions on items that might be interesting or complementing to their purchased items. These systems stipulate valuable assistance to the user's purchasing decisions, and provide quality of push service. Traditionally, Recommendation Systems have been designed using a centralized system, but information service is growing vast with a rapid and strong scalability. The next generation of information technology such as Cloud Computing and Big Data Environment has handled massive data and is able to support enormous processing power. Nevertheless, analytic technologies are lacking the different capabilities when processing big data. Accordingly, we are trying to design a conceptual service model with a proposed new algorithm and user adaptation on dynamic recommendation service for big data environment.

Development of harmful ingredient detection service system using the next-generation automatic recognition technology (차세대 자동인식 기술을 활용한 유해성분 탐지 서비스 시스템 개발)

  • Ko, Eun-Hye;Park, Su-Jin;Park, In-Young;Lee, Jae-Yi;Park, Kyeongmo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.1072-1075
    • /
    • 2017
  • 최근 국내 제품 성분의 안전과 관련된 사건들이 발생하여 국민들 사이에 많은 불안감을 불러일으켰다. 안전 정보의 분산과 용어의 어려움으로 쉽게 유해성을 확인하기 힘든 실정이다. 본 논문에서는 실시간 데이터베이스와 데이터 바인딩 기술을 이용한 유해성분 탐지 서비스 시스템의 연구 개발을 보고한다. 개발 시스템은 이미지 및 바코드를 통해 정보 검색하기 쉽고 빠르게 유해성분을 탐지하여 빠른 속도로 출력할 수 있다.

Effective handoff schemes with dynamic channel allocation

  • Lee Seung-Hyuk;Cho Tae-Kyung;Park Byoung-Soo;Kim Tae-Woo
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.185-188
    • /
    • 2004
  • Sufficient bandwidth that can support multimedia service has to be provided in the next generation wireless communication system. In this paper, the effective handoff scheme considering the position of mobile terminal is proposed. In addition, the dynamic channel allocation scheme is proposed. The shared channel in this algorithm can reduce more the blocking probability and the dropping probability. The proposed algorithms are simulated by SMPL library in C language. The simulation results show that the blocking probability and the dropping probability of the call can be reduced up to $60\%\;and\;10\%$ using the proposed algorithms, respectively.

  • PDF

Design and implementation of SCADA system to support scalability and openness (확장성과 개방성을 지원하는 SCADA 시스템 설계 및 구현)

  • Kim, Hyung-Ill;Lee, Sung-Young;Jeon, Tae-Woong;Park, Young-Tack
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.5 no.6
    • /
    • pp.753-763
    • /
    • 1999
  • The existing SCADA(Supervisory Control and Data Acquisition) system software is usually developed to suitable for the specific hardware platforms. However, as per rapid improvement of computer performance and development of network technology, it is required to support scalability and inter-operability in existing different SCADA systems. In order to meet such requirements, in this paper, we propose a new type of SCADA testbed using Java for electric distribution applications. The system consists of three modules; development support tools, client and server modules. The basic architecture of the proposed SCADA system is similar to existing one, however, we improve the function of MTU and MMI interface to facilitate LAN and WAN environment. Also, the proposed system can deals with alarm and history data by using heterogeneous DBMS. Since the system is built in Java environment, the development cost is cheap and it can support sacalability and portability. Our experience can be utilized to develop next generation of small and medium size of SCADA system.

  • PDF

Design of Multi-band Network Selection System for Maritime Networks (해상멀티대역 네트워크 선택기 시스템 설계)

  • Cho, A-ra
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.87-89
    • /
    • 2017
  • In this paper, we propose a multi-band network selection (MNS) system, which determines and seamlessly connects to the desired available communication band based on user preferences and network environments. The MNS system employs MNS server in the middleware layer which communicates with clients in order to combine and manage heterogeneous networks efficiently. In addition, we define a system architecture and function modules of the MNS system. The MNS system monitors availability in each communication band and updates the network status information table which is applied to determining the best available network. It is expected that the MNS system can be applied to the next generation maritime networks and communication infrastructure of e-navigation.

  • PDF

The Validity Analysis of SDN/NFV Military application (SDN/NFV의 군 적용 타당성 분석)

  • Jang, Ji-Hee;Kwon, Tae-Uk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.687-694
    • /
    • 2020
  • SDN and NFV are next-generation network technologies, and cloud, such as data centers, campuses, and large companies, has been established, or is actively applied by service-oriented communication companies. In particular, the Defense Integrated Data Center will be a prime example for military applications. In order for the Defense Integrated Data Center (DIDC) to become an intelligent center, it is accelerating the promotion of the "Smart Defense Integrated Data Center", which applied the latest information and communication technology (ICT). At the time of the establishment of DIDC, it plans to start building infrastructure such as cloud services at around 30% level, and expand D-Cloud to 75% through 'Cloud First'. In addition, the introduction of SDN/NFV will reduce the operation cost and manpower of DIDC, strengthen the ability to efficiently use information resources and cyber information protection systems, and increase flexibility and agility in using each system to improve efficiency in defense management in the future. Therefore, we will discuss the justification and expected effects of SDN/NFV introduction, focusing on DIDC.

Study of Modulation Effect in Integrated Interface Under Controlling Switching Light-Emitting Diode Lighting Module

  • Hong, Geun-Bin;Jang, Tae-Su;Kim, Yong-Kab
    • Transactions on Electrical and Electronic Materials
    • /
    • v.12 no.6
    • /
    • pp.253-257
    • /
    • 2011
  • This study was carried out to solve problems such as radio frequency band depletion, confusion risk, and security loss in existing visible wireless communication systems, and to determine the applicability of next-generation networks. A light-emitting diode (LED) light communication system was implemented with a controlling switching light module using the ATmega16 micro-controller. To solve the existing modulation effect and disturbance in visible light communication, an integrated interface was evaluated with a driving light module and analyzes its reception property. A transmitter/receiver using the ATmel's micro-controller, high-intensity white LED-6 modules, and infrared sensor KSM60WLM and visible sensor TSL250RD were designed. An experiment from the initial value of distance to 2.5 m showed 0.46 V of the voltage loss, and if in long distance, external light interference occurred and light intensity was lost by external impact and thus data had to be modified or reset repeatedly. Additionally, when we used 6 modules through the remote controller's lighting dimming, data could be transmitted up to 1.76 m without any errors during the day and up to 2.29 m at night with around 2~3% communication error. If a special optical filter can reduce as much external light as possible in the integrated interface, the LED for lighting communication systems may be applied in next generation networks.

Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.113-120
    • /
    • 2022
  • In this paper, we analyze the feasibility of the IP spoofing attack exploiting null security algorithms in 5G networks based on 3GPP standard specifications. According to 3GPP standard specifications, the initial Registration Request message is not protected by encryption and integrity. The IP spoofing attack exploits the vulnerability that allows a malicious gNB (next generation Node B) to modify the contents of the initial Registration Request message of a victim UE (User Equipment) before forwarding it to AMF (Access and Mobility Management Function). If the attack succeeds, the victim UE is disconnected from the 5G network and a malicious UE gets Internet services, while the 5G operator will charge the victim UE. In this paper, we analyze the feasibility of the IP spoofing attack by analyzing whether each signaling message composing the attack conforms to the 3GPP Rel-17 standard specifications. As a result of the analysis, it is determined that the IP spoofing attack is not feasible in the 5G system implemented according to the 3GPP Rel-17 standard specifications.

Transmission Modeling and Verification for the Inverse Estimation of Electronic Warfare Threats (전자전 위협체 역추적을 위한 송수신 모델링 및 검증)

  • Park, So Ryoung;Jeong, Hoe Chang;Kwon, Jae Wan;Noh, Sanguk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.4
    • /
    • pp.112-123
    • /
    • 2017
  • Research for the inverse estimation of RF threats and the efficient electronic attack based on the parameters of the electronic information has been active in the electronic warfare (EW) situations. In this paper, an EW transmission simulator is constructed from the modeling of radar threats, EW receivers, and propagation environments with the collected electronic information in order to verify the performance of the inverse estimation algorithm in various and practical EW situations. In simulation results, we show that the range tracking error and angle tracking error are produced within ten meters and one degree, respectively. And also, we show that the changing relations between the angle tracking error and the parameters of the monopulse angle tracking radar such as the beamwidth and squint angle in simulation results correspond with those in the theoretical modeling. Accordingly, the constructed EW simulator can be used to observe the modifying characteristics of the electronic information in transmission environments, and then, to evaluate the performance of the inverse estimation system in various EW situations.