• Title/Summary/Keyword: Mode 3 services

Search Result 114, Processing Time 0.03 seconds

Certification as a Mode of Governance ISO and CMM in Offshore st. Petersburg

  • Feakins, Melanie
    • Proceedings of the KGS Conference
    • /
    • 2003.11a
    • /
    • pp.106-114
    • /
    • 2003
  • The globalisation of software production processes is a maze of connected phenomena with dramatically increasing importance as the development of W related industries and services escalates on a global scale. While commercial and industrial software production and related services are historically associated with advanced industrial economies of the North & West, contemporary changes of the past decade suggest that the industry is developing rapidly on a global scale incorporating countries that have historically been classified as '2nd and 3rd world' or periphery and semi-periphery by different theoretical approaches. (omitted)

  • PDF

The Development of Dual Mode Convergence Home Gateway System based upon Broadcast & Telecommunication Convergence Networks (방송통신융합망 기반의 Dual Mode 융.복합 홈 게이트웨이 시스템 개발)

  • Park, No-Jin
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.1
    • /
    • pp.29-34
    • /
    • 2010
  • In this study, we realized the broadband home gateway system of dual mode based upon EDR 2~3Mbps transmission speed and 300Mbps of 802.11n, In broadcasting and telecommunication convergence networks to deliver multimedia services, high-quality home. The bluetooth module is designed to use general low rate data speed service and the 802.11n module also is designed to use high rate speed service at various home network situation. The dual mode home gateway system, bluetooth and 802.l1n module, is well realized for many specification such as emission power, spurious power, impedance matching, frequency channel test.

  • PDF

A Study on Storing Node Addition and Instance Leveling Using DIS Message in RPL (RPL에서 DIS 메시지를 이용한 Storing 노드 추가 및 Instance 평준화 기법 연구)

  • Bae, Sung-Hyun;Yun, Jeong-Oh
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.590-598
    • /
    • 2018
  • Recently, interest in IoT(Internet of Things) technology, which provides Internet services to objects, is increasing. IoT offers a variety of services in home networks, healthcare, and disaster alerts. IoT with LLN(Low Power & Lossy Networks) feature frequently loses sensor node. RPL, the standard routing protocol of IoT, performs global repair when data loss occurs in a sensor node. However, frequent loss of sensor nodes due to lower sensor nodes causes network performance degradation due to frequent full path reset. In this paper, we propose an additional selection method of the storage mode sensor node to solve the network degradation problem due to the frequent path resetting problem even after selecting the storage mode sensor node, and propose a method of equalizing the total path resetting number of each instance.

A Proposal of the Security System for the next Generation Mobile Telecommunication System

  • Park, Young-Ho;Lee, Hoon-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.4
    • /
    • pp.149-153
    • /
    • 1999
  • This paper proposes a new security system for the next generation mobile telecommunication system The system is based on the network domain security of the 3GPP. The system provides confidentiality and integrity services in the RLC layer, the second layer of 3GPP. Our system has merits in that it can provide security services without any modification to the 3GPP protocol and has low transmission voerhead. Security algorithm and mode are controlled by the RRC layer, the third layer of 3GPP.

  • PDF

A Study on the Implementation of WiBro/HSDPA Dual mode Access Point System (WiBro/HSDPA Dual mode AP 시스템 구현에 관한 연구)

  • Ha, Kwang-Jun;Kim, Sung-Ill;Oh, Young-Chul;Lee, Sang-Hong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.64-68
    • /
    • 2007
  • Commercial WiBro and 3G HSDPA services are launched last year in order to provide high speed wireless Internet access and multimedia service. Currently mobile communication service providers concentrate on the deployment of indoor mobile network since indoor traffic is remarkably increased. For fine indoor wireless communication, an installation of access point system via Public IP network which is called Femtocell is required. The development of indoor Femtocell system must be considered in the viewpoint of low hardware complexity, cost reduction, interlocking with WiBro/HSDPA network without change of network component and easy element management. In this paper, we review the implementation issue and technology of dual mode AP which provides WiBro and HSDPA signal to the user simultaneously. Especially, we describe on the HSDPA Femtocell standardization status and possible 3 types of HSDPA communication module development design. Furthermore we analyze the merits and demerits of each HSDPA Femtocell design type and propose a system which enables handover between indoor HSDPA Femtocell and outdoor commercial HSDPA mobile network.

  • PDF

A Reliable 2-mode Authentication Framework for Wireless Sensor Network (무선 센서네트워크를 위한 신뢰성 있는 2-모드 인증 프레임워크)

  • Huyen, Nguyen Thi Thanh;Huh, Eui-Nam
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.51-60
    • /
    • 2009
  • This paper proposes a reliable 2-mode authentication framework for probabilistic key pre-distribution in Wireless Sensor Network (WSN) that guarantees the safe defense against different kinds of attacks: Hello flood attacks, Wormhole attacks, Sinkhole attack, location deployment attacks, and Man in the middle attack. The mechanism storing the trust neighbor IDs reduces the dependence on the cluster head and as the result; it saves the power energy for the authentication process as well as provides peer-to-peer communication.

  • PDF

Development of Half-Mirror Interface System and Its Application for Ubiquitous Environment (유비쿼터스 환경을 위한 하프미러형 인터페이스 시스템 개발과 응용)

  • Kwon Young-Joon;Kim Dae-Jin;Lee Sang-Wan;Bien Zeungnam
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.12
    • /
    • pp.1020-1026
    • /
    • 2005
  • In the era of ubiquitous computing, human-friendly man-machine interface is getting more attention due to its possibility to offer convenient services. For this, in this paper, we introduce a 'Half-Mirror Interface System (HMIS)' as a novel type of human-friendly man-machine interfaces. Basically, HMIS consists of half-mirror, USB-Webcam, microphone, 2ch-speaker, and high-speed processing unit. In our HMIS, two principal operation modes are selected by the existence of the user in front of it. The first one, 'mirror-mode', is activated when the user's face is detected via USB-Webcam. In this mode, HMIS provides three basic functions such as 1) make-up assistance by magnifying an interested facial component and TTS (Text-To-Speech) guide for appropriate make-up, 2) Daily weather information provider via WWW service, 3) Health monitoring/diagnosis service using Chinese medicine knowledge. The second one, 'display-mode' is designed to show decorative pictures, family photos, art paintings and so on. This mode is activated when the user's face is not detected for a time being. In display-mode, we also added a 'healing-window' function and 'healing-music player' function for user's psychological comfort and/or relaxation. All these functions are accessible by commercially available voice synthesis/recognition package.

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

A Comparison of Heating Control Characteristics by Temperature Sensing Methods for Thermostatic Valves with the Proportional Control Mode (비례제어식 자동온도조절기의 온도감지방식별 난방제어 특성 비교)

  • Kim, Yong-Ki;Lee, Tae-Won;Kang, Sung-Ju
    • Proceedings of the SAREK Conference
    • /
    • 2007.11a
    • /
    • pp.161-166
    • /
    • 2007
  • Various thermostatic valves have been used widely in Korea for conservation of heating energy and enhancement of thermal comfort in residential buildings. But heating control performances of thermostatic valves extensively vary with the design and operational conditions of the heating system, climate condition and others. An experimental method was carried out in this study to analyze heating control characteristics by temperature sensing methods of thermostatic valves for various parameters, such as supply temperatures and flow rate of hot water, the position of room thermostats and outdoor air temperatures. As a result, the heat flow rate per day of S-Valve($34^{\circ}C$-Type) of water temperature sensing method was liked that of C-Valve of indoor air temperature sensing method with stage 3.3 of room thermostat in case supply temperature of hot water was $45^{\circ}C$, flow rate was 1.3 L/min and outdoor air temperature was $7.8^{\circ}C$.

  • PDF

Coupler Implementation and Antenna Tracking Accuracy Analysis for Ku-band Multi-mode Monopulse Satellite Tracking System (Ku 대역 다중모드 모노펄스 위성추적시스템을 위한 커플러 구현 및 안테나 추적정확도 분석)

  • Lee, Jaemoon;Lim, Jaesung;Park, Dohyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.3
    • /
    • pp.363-370
    • /
    • 2016
  • This paper proposes a Ku-band multi-mode coupler and its monopulse tracking system, which can be applied to a unmaned aircraft vehicle(UAV) platform. In general, the carrier-to-noise(C/N) level of the beacon signal from a Ku-band commercial satellite is relatively weak compared to that of a military satellite because the Ku-band satellite has been designed for commercial services. Therefore, this paper proposes a coupler and its multi-mode monopulse tracking system satisfying the tracking accuracy under a low C/N environment and analyzes the tracking accuracy. After that, we perform a real satellite tracking test and compare the accuracy of the test with the analysis result before validating the performance of the architecture of the proposed satellite tracking system.