• Title/Summary/Keyword: Multi-Process Service

Search Result 311, Processing Time 0.023 seconds

Stacked LTCC Band-Pass Filter for IEEE 802.11a (IEEE 802.11a용 적층형 LTCC 대역통과 여파기)

  • Lee Yun-Bok;Kim Ho-Yong;Lee Hong-Min
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.2 s.93
    • /
    • pp.154-160
    • /
    • 2005
  • Microwave Otters are essential device in modem wireless systems. A compact dimension BPF(Band-pass Filter) for IEEE 802.11a WLAN service is realized using LTCC multi-layer process. To extrude 2-stage band-pass equivalent circuit, band-pass and J-inverter transform applied to Chebyshev low-pass prototype filter. Because parallel L-C resonator is complicate and hard to control the inductor characteristics in high frequency, the shorted $\lambda/4$ stripline is selected for the resonator structure. The passive element is located in the different layers connected by conventional via structure and isolated by inner GND. The dimension of fabricated stacked band-pass filter which is composed of six layers, is $2.51\times2.27\times1.02\;mm^3$. The measured filter characteristics show the insertion loss of -2.25 dB, half-power bandwidth of 220 MHz, attenuation at 5.7 GHz of -32.25 dB and group delay of 0.9 ns at 5.25 GHz.

The Study on the Design and Optimization of Storage for the Recording of High Speed Astronomical Data (초고속 관측 데이터 수신 및 저장을 위한 기록 시스템 설계 및 성능 최적화 연구)

  • Song, Min-Gyu;Kang, Yong-Woo;Kim, Hyo-Ryoung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.75-84
    • /
    • 2017
  • It becomes more and more more important for the storage that supports high speed recording and stable access from network environment. As one field of basic science which produces massive astronomical data, VLBI(: Very Long Baseline Interferometer) is now demanding more data writing performance and which is directly related to astronomical observation with high resolution and sensitivity. But most of existing storage are cloud model based for the high throughput of general IT, finance, and administrative service, and therefore it not the best choice for recording of big stream data. Therefore, in this study, we design storage system optimized for high performance of I/O and concurrency. To solve this problem, we implement packet read and writing module through the use of libpcap and pf_ring API on the multi core CPU environment, and build a scalable storage based on software RAID(: Redundant Array of Inexpensive Disks) for the efficient process of incoming data from external network.

Design of Multi-Attribute Agent-Mediated Electronic Commerce Negotiation Model and its Framework (다중변소 기반 에이전트 중재 전자상거래 협상 모델 및 프레임워크 설계)

  • Chung, Mokdong
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.11
    • /
    • pp.842-854
    • /
    • 2001
  • Today\`s first generation shopping agent is limited to comparing merchant offerings usually on price instead of their full range of attributes. Even in the full range comparison, there is not a good model which considers the overall features in the negotiation process. Therefore, the negotiation model needs to be extended to include negotiations over the more attributes. In this paper, we propose a negotiation model in the agent-mediated electronic commerce to negotiate over prices, product features, warranties and service policies based on utility theory and simple heuristics. We will describe a prototype agent-mediated electronic commerce framework called Pmart. This framework provides the software reuse and the extensibility based on the object-oriented technology. It is implemented on Windows-based platforms using Java and CORBA for the network transparency and platform independence.

  • PDF

Product-Sharing and Outcome Generation: New Contributions of Libraries to Research, Learning and Professional Development in Japanese Context

  • Oda, Mitsuhiro
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.2
    • /
    • pp.61-74
    • /
    • 2011
  • The author analyses the challenging activities of Japanese libraries in this decade by launching two keywords; "product-sharing" and "outcome generation." "Product-sharing" means that libraries share knowledge, skills, and records which are produced as the result of the services or in the process of activities. And "outcome generation" means that libraries generate any efficiency or effectiveness through their services to users. Using these concepts, reported are the current situation and aspects of Japanese libraries which try to make various contributions to the society; research and learning of the people, and education and training for professional librarians, and so on. In the analysis, the author shows some examples of "product-sharing" at first, including the records of reference transaction and the multi-functioned online public access catalogue. Especially, focused is on the various possibility and adoptability of the Collaborative Reference Database System of the National Diet Library of Japan. This system is one of digital reference service in Japan, and the database of reference transaction records is expected to be useful for research and academic studyies as knowledge-base of professional librarians. And the system is also expected to be a platform for LIS education and professional development in the e-learning environment. Secondly, as the examples of "outcome generation", explained are the problem-solving-type activities, and provision of the collection about books on struggling against disease and illness. A few examples of outcome in the problem-solving-type activities are these; increase of sales in the services for shop managers, business persons, and entrepreneurs, contribution to affluent daily life by providing the local information services to residents and neighbourhoods, and etc. And for both the patients with serious cases and their family or those who nurse them, books about other persons' notes or memorandum are the greatest support, and sometime healing. The author discuss the 'raison d'etre' of these activities focusing on public libraries in Japan.

A Development of the Risk Factor Dictionary for the Private Finance Construction Project (민간투자 건설사업 위험요인사전 개발)

  • Kim, Seon-Gyoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.8 no.5
    • /
    • pp.152-160
    • /
    • 2007
  • Recently, the government is very active to secure the financial resources by inducement of the private investment in fulfilling an extension of the SOC facilities. One of the reasons that the private investors hesitate to put money into the private finance projects, however, is the lack of knowledges about various risks to be possibly incurred during the project execution. This research was performed as one of the preparation works in order for a A engineering company to act as a prime contractor of the project management service in the private finance project, and finally developed the risk factor dictionary as a new concept to satisfy the requirement of a A company and overcome a limit of the existing risk checklists. Although the risk factor dictionary looks like the only simplified table to be the risk factors identified in three dimensions, the impacts and response strategies expressed in narrative and multi-items, and the responsible parties indicated, it has great meanings to get a lot of direct and indirect accomplishments over the simplified table during the development process.

An Efficient MAC Protocol for Supporting Multimedia Services in APON (APON에서 멀티미디어 전송을 위한 효율적인 MAC 프로토콜)

  • 은지숙;이호숙;윤현정;소원호;김영천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1A
    • /
    • pp.132-141
    • /
    • 2000
  • In this paper, we proposed the MAC protocol of APON supporting multi-class traffic such as CBBUVBR, ABR, UBR, to guarantee the required QoS of each service. For this, we analyze the performance of variousrequest mechanisms and employee the different request mechanism for each traffic classes. Upstream anddownstream frame structures to minimize transmission overhead are proposed based on our request mechanism.The proposed MAC protocol applies the different priority to permit distribution process. CBBWBR traffic, withthe stringent requirements on CDV or delay, is allocated prior to any other class. ABR traffic, which hasnon-strict CDV or delay criteria, uses flexibly the available bandwidth but ensures a minimum cell rate (MCR).UBR traffic is allocated with lowest priority for the remaining capacity. The performance of proposed protocol isevaluated in terms of transfer delay and 1-point CDV with various offered load. The result of simulation showsthat the proposed protocol guarantees the required QoS of the corresponding category, while making use of theavailable resources in both an efficient and dynamical way.

  • PDF

Distributed Intrusion Detection System for Safe E-Business Model (안전한 E-Business 모델을 위한 분산 침입 탐지 시스템)

  • 이기준;정채영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.41-53
    • /
    • 2001
  • Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.

  • PDF

Position Improvement of a Mobile Robot by Real Time Tracking of Multiple Moving Objects (실시간 다중이동물체 추적에 의한 이동로봇의 위치개선)

  • Jin, Tae-Seok;Lee, Min-Jung;Tack, Han-Ho;Lee, In-Yong;Lee, Joon-Tark
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.2
    • /
    • pp.187-192
    • /
    • 2008
  • The Intelligent Space(ISpace) provides challenging research fields for surveillance, human-computer interfacing, networked camera conferencing, industrial monitoring or service and training applications. ISpace is the space where many intelligent devices, such as computers and sensors, are distributed. According to the cooperation of many intelligent devices, the environment, it is very important that the system knows the location information to offer the useful services. In order to achieve these goals, we present a method for representing, tracking and human Jollowing by fusing distributed multiple vision systems in ISpace, with application to pedestrian tracking in a crowd. This paper describes appearance based unknown object tracking with the distributed vision system in intelligent space. First, we discuss how object color information is obtained and how the color appearance based model is constructed from this data. Then, we discuss the global color model based on the local color information. The process of learning within global model and the experimental results are also presented.

A study on the Design of Recipe Sharing Service for Single-Person Households (1인 가구를 위한 레시피 공유 서비스 디자인 연구 -백주부 요리 레시피를 중심으로-)

  • Kim, Han-Jun;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.419-425
    • /
    • 2020
  • This study proposes functional services within the cooking recipe sharing application. Many single-person households often eat alone, and eating out. their usual eating habits are not considered well. when living alone, the risk of exposure to mental illnesses increases compared than multi-person households, and if nutrition has unbalanced, it can be easily exposed to diseases. in this study, define these problems and emphasize the importance of maintaining physical and mental health of one-person households, and explored user experience and expectations through cano models, focusing on the Baekjubu fooe recipe is often used by 20-30s. and users can feel the cooking process is not a hassle. and they will have a cooking themselves and even manage their mental health through communication with neighbors.

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.