• Title/Summary/Keyword: Electronic Resource

Search Result 619, Processing Time 0.026 seconds

A Study on Optimization Problem based on RFID Reader-to-reader Interference Model and Genetic-resource Allocation Technique (RFID 리더간 간섭 모델에 기반 한 최적화 문제와 유전적 자원할당 기법에 관한 연구)

  • Seo, Hyun-Sik;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.51-60
    • /
    • 2009
  • In radio frequency identification(RFID) systems, when an RFID reader uses the same or adjacent frequency with neighbor readers, the interference between the readers may occur, which causes the reader collision and errors in tag recognition. In the previous study on RFID reader anti-collision, the techniques based on Frequency Division Mutiplex(FDM) or Time Division Multiplex(TDM) are proposed. However in these paper, the problem on the condition of RFID reader-to-reader interference considering the distance between interfering readers, frequency and operating time is not define exactly. In this paper, the interference effect is analyzed through RFID reader interference model considering the TDM and FDM, and the optimization problem is defined. To solve this, genetic-resource allocation technique is proposed. Therefore the optimal resource allocation applied RFID environment faithfully is accomplished.

Cost Estimation Model for Introduction to Virtual Power Plants in Korea (국내 가상발전소 도입을 위한 비용 추정 모델)

  • Park, Hye-Yeon;Park, Sang-Yoon;Son, Sung-Yong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.2
    • /
    • pp.178-188
    • /
    • 2022
  • The introduction of virtual power plants is actively being discussed to solve the problem of grid acceptability caused by the spread of distributed renewable energy, which is the key to achieving carbon neutrality. However, a new business such as virtual power plants is difficult to secure economic feasibility at the initial stage of introduction because it is common that there is no compensation mechanism. Therefore, appropriate support including subsidy is required at the early stage. But, it is generally difficult to obtain the cost model to determine the subsidy level because of the lack of enough data for the new business model. In this study, a survey of domestic experts on the requirements, appropriate scale, and cost required for the introduction of virtual power plants is conducted. First, resource composition scenarios are designed from the survey results to consider the impact of the resource composition on the cost. Then, the cost estimation model is obtained using the individual cost estimation data for their resource compositions using logistic regression analysis. In the case study, appropriate initial subsidy levels are analyzed and compared for the virtual power plants on the scale of 20-500MW. The results show that mid-to-large resource composition cases show 29-51% lower cost than small-to-large resource composition cases.

Design and Evaluation of a User Tag-based Retrieval Model for Electronic Journals within Electronic Resource Management Systems (전자자원관리시스템의 이용자 태그 기반의 전자저널 검색 모형 설계 및 평가에 관한 연구)

  • Kang, Jeong-Won;Kim, Hyun-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.43 no.4
    • /
    • pp.241-264
    • /
    • 2009
  • The study proposed an electronic journal retrieval model to be used to improve the retrieval efficiency of e-journals. To do this, firstly, we reviewed the literature on users' information behavior and on ERM (Electronic Resource Management) systems. Secondly, we conducted an e-mail survey of 96 participants (professors and graduate students) to find out about their information behavior on how to access, use and evaluate electronic resources as well as scientific information. Thirdly, we administered case studies on two ERMSs, Ex Libris' Verde and Innovative's Millennium. The proposed model will be operated within ERM systems and it enables to the supply of both system- and user-based services by combining taxonomy-based ERM systems with tag folksonomy. The model is unique in that it includes not only the automatic tagging functions that can be performed using log files but also the tag management functions including grouping similar or related tags.

Performance Analysis of Co- and Cross-tier Device-to-Device Communication Underlaying Macro-small Cell Wireless Networks

  • Li, Tong;Xiao, Zhu;Georges, Hassana Maigary;Luo, Zhinian;Wang, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1481-1500
    • /
    • 2016
  • Device-to-Device (D2D) communication underlaying macro-small cell networks, as one of the promising technologies in the era of 5G, is able to improve spectral efficiency and increase system capacity. In this paper, we model the cross- and co-tier D2D communications in two-tier macro-small cell networks. To avoid the complicated interference for cross-tier D2D, we propose a mode selection scheme with a dedicated resource sharing strategy. For co-tier D2D, we formulate a joint optimization problem of power control and resource reuse with the aim of maximizing the overall outage capacity. To solve this non-convex optimization problem, we devise a heuristic algorithm to obtain a suboptimal solution and reduce the computational complexity. System-level simulations demonstrate the effectiveness of the proposed method, which can provide enhanced system performance and guarantee the quality-of-service (QoS) of all devices in two-tier macro-small cell networks. In addition, our study reveals the high potential of introducing cross- and co-tier D2D in small cell networks: i) cross-tier D2D obtains better performance at low and medium small cell densities than co-tier D2D, and ii) co-tier D2D achieves a steady performance improvement with the increase of small cell density.

Kalman Filtering-based Traffic Prediction for Software Defined Intra-data Center Networks

  • Mbous, Jacques;Jiang, Tao;Tang, Ming;Fu, Songnian;Liu, Deming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.2964-2985
    • /
    • 2019
  • Global data center IP traffic is expected to reach 20.6 zettabytes (ZB) by the end of 2021. Intra-data center networks (Intra-DCN) will account for 71.5% of the data center traffic flow and will be the largest portion of the traffic. The understanding of traffic distribution in IntraDCN is still sketchy. It causes significant amount of bandwidth to go unutilized, and creates avoidable choke points. Conventional transport protocols such as Optical Packet Switching (OPS) and Optical Burst Switching (OBS) allow a one-sided view of the traffic flow in the network. This therefore causes disjointed and uncoordinated decision-making at each node. For effective resource planning, there is the need to consider joining the distributed with centralized management which anticipates the system's needs and regulates the entire network. Methods derived from Kalman filters have proved effective in planning road networks. Considering the network available bandwidth as data transport highways, we propose an intelligent enhanced SDN concept applied to OBS architecture. A management plane (MP) is added to conventional control (CP) and data planes (DP). The MP assembles the traffic spatio-temporal parameters from ingress nodes, uses Kalman filtering prediction-based algorithm to estimate traffic demand. Prior to packets arrival at edges nodes, it regularly forwards updates of resources allocation to CPs. Simulations were done on a hybrid scheme (1+1) and on the centralized OBS. The results demonstrated that the proposition decreases the packet loss ratio. It also improves network latency and throughput-up to 84 and 51%, respectively, versus the traditional scheme.

To study the preservation technology and a secret-sign technology (전자상거래를 위한 보안기술 및 암호기술에 대한 연구)

  • 김영호;조정길
    • Proceedings of the KAIS Fall Conference
    • /
    • 2001.11a
    • /
    • pp.220-223
    • /
    • 2001
  • 본 논문은 인터넷과 통신매체의 확산과 더불어 최근에는 기업간, 기업과 정부간에 주로 정형적인 문서교환에 활용되던 초기의 EDI(Electronic Data Interchange)가 멀티미디어 정보교환이 가능한 인터넷의 보급, 확산과 함께 소비자를 대상으로 하는 전자상거래(EC : Electronic Commerce)로 급속히 확산되고 있으며, 이를 지원하기 위해 기업의 정보화 기반을 구현하는 ERP(Enterprise Resource Planning)도 요구되고 있다. 그러나, 전자상거래는 네트워크를 통하여 형성되므로 사용자들은 서로 만나지 않고 거래하게 된다. 이는 전자상거래의 장점이기도 하지만, 반대로 상호간의 신분에 대한 인증이 쉽지 않다는 단점이 된다. 본 논문에서는 이러한 위험을 방지하기 위한 보안기술 및 암호기술에 대해 연구하고자 한다.

The Study of FUSE Installing of PT in the trend of Digitalization and Convergence of Power Machinery. (디지탈화 및 복합화된 전력기기 변성기용 퓨즈 설치의 문제점)

  • Ok Yeon Ho;Lee Hyoung Mook;Hong Yeong Jae;Lee Eun Woong
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.357-359
    • /
    • 2004
  • Fuse is the initial equipment of Protective Relay The installation standard of Fuse has been used for long time in Power Facilities. However according to the innovative development of Electric & Electronic element(=semiconductor) Technology, Protective Relay and other Power Equipments are being changed into Digitalization and Multi-Functional Convergence. In contrast with it, the installation standard of Fuse is just the same. There is a need to give careful consideration to it. This study will bear a Part of producing a safe and efficient Power by examining the current installation of primal 8f secondary 1'use in multi-functional PT of Power plant, giving a problem careful consideration and suggesting suitable countermeasures.

  • PDF

Dynamic Load Balancing Scheme Based on Resource Reservation for Migration of Agents in Pure P2P Network Environments (순수 P2P 네트워크 환경에서 에이전트 이주를 위한 자원 예약 기반 동적 부하 균형 기법)

  • Kim, Kyung-In;Kim, Young-jin;Eom, Young-Ik
    • The KIPS Transactions:PartA
    • /
    • v.11A no.4
    • /
    • pp.257-266
    • /
    • 2004
  • Mobile agents are defined as processes which can be autonomously delegated or transferred among the hosts in a network in order to perform some computations on behalf of the user and co-operate with other agents. Currently, mobile agents are used in various fields, such as electronic commerce, mobile communication, parallel processing, search of information, recovery, and so on. In pure P2P network environment, if mobile agents that require computing resources rashly migrate to another peers without consideration on the peer's capacity of resources, the peer may have a problem that the performance of the peer is degraded due to lack of resources. To solve this problem, we propose resource reservation based load balancing scheme of using RMA(Resource Management Agent) that monitors workload information of the peers and that decides migrating agents and destination peers. In mobile agent migrating procedure, if the resource of specific peer is already reserved, our resource reservation scheme prevents other mobile agents from allocating the resource.

A analysis on the operation characteristics of the wind power generation system for the geographical features (소형 풍력발전시스템이 보상 운전에 대한 연구)

  • Kang Byung-Bok;Lim Jung-Yeol;Yoon Jung-Pil;Cha In-Su
    • Proceedings of the KIPE Conference
    • /
    • 2001.12a
    • /
    • pp.71-75
    • /
    • 2001
  • Currently there are very limited amounts of resources and serious amounts pollution. Wind power generation system have an advantage of unlimited and unpolluted amount of energy resource. In this paper, for the application of these characteristic and for the generation to be achieved regard of districts and geographical features the energy continuously. The operation characteristics of system were analyzed through experiments for a trial product.

  • PDF

Hash Function Processor Using Resource Sharing for IPSec Chip

  • Kang, Young-Kyu;Kim, Dae-Won;Kwon, Taek-Won;Park, Jun-Rim
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.951-954
    • /
    • 2002
  • This paper presents the implementation of hash functions for IPSEC chip. There is an increasing interest in high-speed cryptographic accelerators for IPSec applications such as VPNs (virtual private networks). Because diverse algorithms are used in Internet, various hash algorithms are required for IPSec chip. Therefore, we implemented SHA-1, HAS-160 and MD5 in one chip. These hash algorithms are designed to reduce the number of gates. SHA-1 module is combined with HAS-160 module. As the result, the required logic elements are reduced by 27%. These hash algorithms have been implemented using Altera's EP20K1000EBC652-3 with PCI bus interface.

  • PDF