• Title/Summary/Keyword: 계층적 기능구조

Search Result 380, Processing Time 0.028 seconds

멀티모드용 SDR 기반 디지털 IF 기술

  • 이원철
    • Information and Communications Magazine
    • /
    • v.19 no.11
    • /
    • pp.85-108
    • /
    • 2002
  • 향후 다양한 무선 통신 규격들의 통합 수용을 위한 SDR (Software Defined Radio) 기술이IMT-2000 이후의 4세대 이동 통신 시스템을 위한 핵심 기술로써 심각하게 고려되고 있다. 이에 부응하여 SDR기반의 멀티모드용 통신 시스템을 구성하기 위한 주요 기술로서 디지털 IF 기술에 대한 필요성이 급속도로 고조되고 있는 상황이다. 최근 ABC/DAC 및 범용 디지털 신호처리 소자들의 고속화 및 고성능화로 인해 If (Intermediate Frequency) 대역과 기저대역 신호들 간의 직접 디지털 변환의 구현이 현실화되고 있다. 사용자의 관점에서 국지적으로 상용화되고 있거나 장래에 출현할 다양한 이동 통신 시스템 규격들 및 이에 대해 사업자들에게 할당되는 주파수 대역들이 서로 다른 점을 고려할 때, 이종 시스템 혹은 사업자들에게 할당된 주파수 대역에 구애받지 않고 언제 어디서나 자유롭게 무선 채널을 엑세스하고 또한 특정 채널을 임의로 선택하기 위한 디지털 If기술의 실현이 필수적이다 이러한 SDR기반 디지털 If 기술은 소프트웨어적으로 재구성 가능한 하드웨어 구조를 요구하며, 특정 이동 통신 규격의 물리 계층만을 지원하는 무선 인터페이스가 아닌 다중이동 통신 모드를 지원할 수 있는 유연성이 가미된 채널화 알고리즘이 필요하게 된다. 따라서 디지털 If기술은 무선 인터페이스 처리 부분, 즉 주파수 상 하향 변환 및 채별 선택 조합을 용도에 맞게 단일의 하드웨어 플렛폼 상에서 고속 디지털 신호처리 알고리즘을 기반으로 동작하기 위한 기능을 필연적으로 요구한다. 본 논문에서는 향후 SDR 기반의 기지국 및 단말기 운영 및 구생 모델을 제시하며, 디지털 If에 대한 필요성 및 동작 원리, 그리고 요소 기능들에 대한 구체적인 동작 원리 및 디지털 If와 더불어 활용 가능한 기술에 대하여 논의한다.

A Big Data Based Random Motif Frequency Method for Analyzing Human Proteins (인간 단백질 분석을 위한 빅 데이타 기반 RMF 방법)

  • Kim, Eun-Mi;Jeong, Jong-Cheol;Lee, Bae-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1397-1404
    • /
    • 2018
  • Due to the technical difficulties and high cost for obtaining 3-dimensional structure data, sequence-based approaches in proteins have not been widely acknowledged. A motif can be defined as any segments in protein or gene sequences. With this simplicity, motifs have been actively and widely used in various areas. However, the motif itself has not been studied comprehensively. The value of this study can be categorized in three fields in order to analyze the human proteins using artificial intelligence method: (1) Based on our best knowledge, this research is the first comprehensive motif analysis by analyzing motifs with all human proteins in Protein Data Bank (PDB) associated with the database of Enzyme Commission (EC) number and Structural Classification of Proteins (SCOP). (2) We deeply analyze the motif in three different categories: pattern, statistical, and functional analysis of clusters. (3) At the last and most importantly, we proposed random motif frequency(RMF) matric that can efficiently distinct the characteristics of proteins by identifying interface residues from non-interface residues and clustering protein functions based on big data while varying the size of random motif.

Safety Management Framework for Information Handover Effectiveness in the Construction Industry (건설 안전관리 개념적 틀 및 정보이양 효율성 분석)

  • JIN, Zhenhui;JUNG, Youngsoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.21 no.4
    • /
    • pp.50-61
    • /
    • 2020
  • Safety management has been one of the most critical issues in the construction industry for a long time. Despite continuous efforts, it still shows a higher accident rate than other sectors. To reduce the accident rate, a lot of studies have been performed, mostly focused on contractors or construction phase. Although the initial stage of the construction project has the most significant impact on construction safety and decision-makers at the initial stage play an important role, the safety management system throughout the project entire life-cycle is still insufficient. In addition, although a great deal of information is generated in the construction project and the value is increasing, while it shows an inefficient aspect. This is believed to be due to insufficient information exchange and a lack of standards. In this context, this study aims to analyze the efficiency of information handover in construction safety. For this purpose, a safety management framework for systematically and efficiently managing and utilizing for construction safety information is referred to as 'safety business functions', 'project life-cycle', and 'industrial hierarchy'. The 'safety business functions' are classified into three levels. And then, in order to analyze the efficiency of safety information handover, 'importance of safety business function' and 'efficiency of safety information handover' were evaluated by interviewing with experts. This study can be used as reference data for implementing systematical and efficient safety management, and can also increase construction safety competency.

Spatio-Temporal Characteristics and Hinterland of Air Freight Transportation at Sachon Airport, Korea (사천공항 항공 화물수송의 시.공간적 특성과 배후지)

  • Jang, Jae Gu;Han, Ju Seong
    • Journal of the Korean Geographical Society
    • /
    • v.35 no.1
    • /
    • pp.63-63
    • /
    • 2000
  • 본 연구는 사천공항에 있어서 항공 화물수송의 시·공간적 특성과 공항의 배후지를 파악하는 것을 목적으로 한다. 국내선 화물수송량에 의해 제4계층에 속하는 사천공항의 탑재 화물수송은 그 배후지가 남서부 경남지역으로 핵심 배후지와 주변 배후지로 구성되는 공간구조를 나타내며, 주로 어묵과 화훼를 탑재하고 감규을 간재하는 기능을 가지고, 탑재화물 중심의 편하현상을 나타내고 있다. 그리고 계절별(6·12월)·요인별·편별 항공 화물수송량의 시간적 차이가 존재한다는 것을 알 수 있다.

The World-Wide Messaging System for supporting Wireless Internet Messaging (무선 인터넷 메일 지원을 위한 광역 전자 메일 시스템)

  • Yun, E-Joong;Park, Kyoung-Chul;Seo, Chang-Ho;Ryu, Jae-Cheol
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.715-723
    • /
    • 2001
  • This paper is a proposal of the world-wide messaging system for supporting wireless internet messaging against the existing system which has many limits on functionality and structure. To this work, this paper proposes the hierarchical structure to ensure an extensibility of an existing messaging system, and show the possibility via implementing and operating together wireless units.

  • PDF

Implementation of Secure Role Based Access Control System on the WWW (WWW에서 안전한 역할 기반 접근 제어 시스템 구현)

  • 이희규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.1
    • /
    • pp.65-75
    • /
    • 2000
  • 역할 기반 접근 제어(RBAC: Role Based Access Control)는 각 시스템 자원의 안전성을 보장하기 위한 접근 제어 기술이다. 거대한 네트워크에서 보안 관리의 복잡성과 비용을 줄여주는 기능 때문에, 특히 상업적인 분야에서 더욱 큰 관심을 끌고 있다. 본 논문에서는 RBAC 역할 계층 구조 개념만을 사용할 경우의 취약점을 해결하기 위해 두 가지 연산을 제시하였다. 그리고 이를 통하여 사용자와 권한(pemission)을 간접적으로 연관시킴으로써, RBAC 관리자가 사용자마다 연산을 추가하거나 삭제할 수 있도록 하였고 직관적인 관리자 인터페이스를 제공하여 관리자가 쉽게 사용자 역할, 그리고 연산 사이의 관계를 파악할 수 있도록 하였다. 그리고 이를 기반으로 RBAC 시스템을 설계하고 대학의 종합정보 시스템을 모델로 구현하였다.

Distributed Authentication Model using Multi-Level Cluster for Wireless Sensor Networks (무선센서네트워크를 위한 다중계층 클러스터 기반의 분산형 인증모델)

  • Shin, Jong-Whoi;Yoo, Dong-Young;Kim, Seog-Gyu
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.95-105
    • /
    • 2008
  • In this paper, we propose the DAMMC(Distributed Authentication Model using Multi-level Cluster) for wireless sensor networks. The proposed model is that one cluster header in m-layer has a role of CA(Certificate Authority) but it just authenticates sensor nodes in lower layer for providing an efficient authentication without authenticating overhead among clusters. In here, the m-layer for authentication can be properly predefined by user in consideration of various network environments. And also, the DAMMC uses certificates based on the threshold cryptography scheme for more reliable configuration of WSN. Experimental results show that the cost of generation and reconfiguration certification are decreased but the security performance are increased compared to the existing method.

  • PDF

A Judgment System for Intelligent Movement Using Soft Computing (소프트 컴퓨팅에 의한 지능형 주행 판단 시스템)

  • Choi, Woo-Kyung;Seo, Jae-Yong;Kim, Seong-Hyun;Yu, Sung-Wook;Jeon, Hong-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.5
    • /
    • pp.544-549
    • /
    • 2006
  • This research is to introduce about Judgment System for Intelligent Movement(JSIM) that can perform assistance work of human brain. JSIM can order autonomous command and also it can be directly controlled by user. This research assumes that control object is limited to Mobile Robot(MR) Mobile robot offers image and ultrasonic sensor information to user carrying JSIM and it performs guide to user. JSIM having PDA and Sensor-box controls velocity and direction of the mobile robot by soft-computing method that inputs user's command and information that is obtained to mobile robot. Also it controls mobile robot to achieve various movement. This paper introduces wearable JSIM that communicates with around devices and that can do intelligent judgment. To verify the possibility of the proposed system, in real environment, the simulation of control and application problem lot mobile robot will be introduced. Intelligent algorithm in the proposed system is generated by mixed hierarchical fuzzy and neural network.

Service Identification of Configuration and Data Management System for Weapon System R&D Processes Based on Service Oriented Architecture (서비스 지향 아키텍처에 기반한 무기체계 연구개발 형상/정보관리시스템의 서비스 식별)

  • Kim, Hyung-Jun;Lee, Bu-Kweon;Seo, Yeong-Geon
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.147-157
    • /
    • 2009
  • Configuration and data management system to support processes for the weapon system should support the concurrent engineering and collaborative activities for various documents, drawings, part informations and structural informations, etc. which are produced through R&D processes for a long time. This thesis attempts to identify major functions in the configuration and data management system to support processes for the weapon system R&D into services based on a service oriented architecture. In order to identify major services in the configuration and data management system to support processes for the weapon system R&D, a configuration and data management system to support processes for the weapon system R&D was proposed with a service oriented architecture with four layers including a service consumer layer, a business service layer, an application service layer and a application layer, and major services were identified for each layer. In order to identify major services in four layers, this thesis adopted a bottom-up approach to identify the necessary business services from a well-defined domain implementation system rather than a top-down identification method in general. This thesis tried to identify the essential services in implementing the configuration and data management system to support processes for the weapon system R&D as a system based on the service oriented architecture using such a bottom-up service identification method while limiting those services to the general PDM system aspects and the business areas of the configuration and data management system to support processes for the weapon system R&D.

  • PDF

An Approach for Improving Mobile WiMAX Security - ROSMEX Architecture (안전한 모바일 와이맥스 네트워크를 위한 보안 구조 연구)

  • Shon, Tae-Shik;Koo, Bon-Hyun;Choi, Hyo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.25-34
    • /
    • 2010
  • The IEEE 802.16-2004 standard has a security sub-layer in the MAC layer called, Privacy Key Management (PKM). However, several researches have been published to address the security vulnerabilities of IEEE 802.16-2004. After the IEEE 802.16-2004 standard, a new advanced and revised standard was released as the IEEE 802.16e-2005 amendment which is foundation of Mobile WiMAX network supporting handoffs and roaming capabilities. PKMv2 in Mobile WiMAX includes EAP authentication, AES-based authenticated encryption, and CMAC or HMAC message protection. However, Mobile WiMAX still has a problem of security architecture such as a disclosure of security context in network entry, a lack of secure communication in network domain, and a necessity of efficient handover supporting mutual authentication because Mobile WiMAX security has mainly concentrated on between SS and BS communication. Based on the investigation results, we propose a novel mobile WiMAX security architecture, called RObust and Secure MobilE WiMAX (ROSMEX), to prevent the new security vulnerabilities.