• Title/Summary/Keyword: Next generation Information Technology(IT)

Search Result 447, Processing Time 0.031 seconds

Agile Networking in Smart Grids

  • Qin, Zhenquan;Zhang, Jianing;Shi, Liang;Wang, Lei;Shu, Lei;Guo, Yuquan
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.1
    • /
    • pp.34-49
    • /
    • 2012
  • Recently, the smart grid (SG) has been introduced to solve the serious network issues caused by the increasing electrical demand and the complex nonlinear nature of the electric power distribution network. The SG, regarded as the next generation power grid, can transmit power in more efficient ways by building an automatic and distributed energy delivery network. In this paper, we first assess how various existing networking technologies, such as IEEE 802.11 (WiFi) and IEEE 802.15.4 (ZigBee), meet the requirements of the SG communication protocols. Specifically, we classify the existing network protocols into three categories: WSN-based networking, WiFi-based networking, and wireline-based networking. We then survey the security issues regarding the SG. Finally, we propose an agile SG networking architecture and show the effectiveness of different adopted networking technologies and, as a result, present a candidate solution to implement agile networking in SGs.

  • PDF

Optimization of Honeycomb Spoke in Non-pneumatic Tire (비공기압 타이어에 사용되는 Honeycomb Spoke의 최적화)

  • Lee, Jinwook;Jang, Inhwan;Han, Gyumo
    • Proceeding of EDISON Challenge
    • /
    • 2017.03a
    • /
    • pp.204-215
    • /
    • 2017
  • Unlike existing pneumatic tire, NPT(Non-Pneumatic Tire) is a tire replacing air pressure with spokes. NPT has no problem of punk which pneumatic tire has and doesn't need to maintain air pressure. Also it can be used in space where temperature change sharply. In this regard, NPT are attracting attention as next-generation wheels. For optimizing Honeycomb structure, we applied the load to various Honeycomb structure which forms NPT, performed FEM(finite element analysis) using Edison and compared each results.

  • PDF

Study on Effect of Exercise Performance using Non-face-to-face Fitness MR Platform Development (비대면 휘트니스 MR 플랫폼 개발을 활용한 운동 수행 효과에 관한 연구)

  • Kim, Jun-woo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.571-576
    • /
    • 2021
  • This study was carried out to overcome the problems of the existing fitness business and to build a fitness system that can meet the increased demand in the Corona situation. As a platform technology for non-face-to-face fitness edutainment service, it is a next-generation fitness exercise device that can use various body parts and synchronize network-type information. By synchronizing the exercise information of the fitness equipment, it was composed of learning contents through MR-based avatars. A quantified result was derived from examining the applicability of the customized evaluation system through momentum analysis with A.I analysis applying the LSTM-based algorithm according to the cumulative exercise effect of the user. It is a motion capture and 3D visualization fitness program for the application of systematic exercise techniques through academic experts, and it is judged that it will contribute to the improvement of the user's fitness knowledge and exercise ability.

Biometric Information and OTP based on Authentication Mechanism using Blockchain (블록체인을 이용한 생체정보와 OTP 기반의 안전한 인증 기법)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.85-90
    • /
    • 2018
  • Blockchain technology provides distributed trust structure; with this, we can implement a system that cannot be forged and make Smart Contract possible. With blockchain technology emerging as next generation security technology, there have been studies on authentication and security services that ensure integrity. Although Internet-based services have been going with user authentication with password, the information can be stolen through a client and a network and the server is exposed to hacking. For the reason, we suggest blockchain technology and OTP based authentication mechanism to ensure integrity. In particular, the Two-Factor Authentication is able to ensure secure authentication by combining OTP authentication and biometric authentication without using password. As the suggested authentication applies multiple hash functions and generates transactions to be placed in blocks in order for biometric information not to be identified, it is protected from server attacks by being separate from the server.

The Study of Security Life Cycler Energy Service Platform or Universal Middleware (유니버설미들웨어상의 생명주기기반 보안에너지 서비스플랫폼 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.291-293
    • /
    • 2017
  • Security services that support electric energy service gateway require relatively high reliability. In particular, the application services that accompany communications and data are run organically. Each of the security services should support a secure service platform that supports a secure, scalable life cycle for existing services which should be extends security layer of Universal Middleware such as OSGi platform. In this convergence platform, it is the study of security transfer modular services that allow independent life cycle management of systems through Universal middleware. First, It is modular in terms of energy consumption service and data, enabling real-time operation, communications, remote management and applications. Second, the life cycle of the secure module to support the life cycle of secure, delete, start and updating of the security module by applying the security policy module layer concept. It is modular in terms of power generation and accountability, enabling us to distinguish between reliability and accountability in a large volume of data models in the smart grid, the service was intended to be standardized and applied to the security service platform.

  • PDF

A VoIP System for Secure Support in Next Generation Networks based on SIP (차세대 네트워크환경에서의 보안성 지원을 위한 SIP 기반 VoIP 시스템)

  • Sung, Kyung;Kim, Seok-Hun;Park, Gil-Ha
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2321-2328
    • /
    • 2006
  • Today, SIP standard (The signalling protocol for the Internet phone service) raises to be the standard technique because the expandability is high and complexity is low. It is widely investigated and actively advocated to use Si81a1 ring protocol for SIP in VoIP service. SIP service can be applied even outside the Internet phone service; instance messaging and various multimedia technology are just an example. This paper proposed an embodiment proxy server for rambling support to use JAIN SIP API. It provides standard interface for testing the Proxy server for SIP and embodiment of user agent that transfer instant massaging and voice communication.

Design and Implementation of a Server System for Integrating Wired and Wireless Web Services (유무선 통합 웹 서비스를 위한 서버 시스템의 설계 및 구현)

  • 배성환;이종언;차시호;김규호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.115-123
    • /
    • 2004
  • Since internet and XML has come out, Web Services are regarded as a new paradigm of next generation's IT are becoming a leading technology to integrate the distributed applications on internet using XML based Platforms and distributed computing based on component technologies independent on implementing languages. Nowadays internet is generally used and the use of wireless internet is rapidly rising. The quantities of contents on the web-sites to manage and maintain are getting larger according to these trends and the update cycles are getting shorter It is necessary to solve these Problems that developing the systems which can effectively generate, maintain and manage the contents on the web-sites. In the paper, a system which can integrates wired and wireless services is designed and implemented using the technologies like XML based components, JWSDP, Wireless Server Side Script, WML editor and etc.,

  • PDF

Design and Implementation of Optimal LED Emotional-Lighting Control System (최적의 LED 감성조명 제어 시스템 설계 및 구현)

  • Yun, Su-Jeong;Lin, Chi-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1637-1642
    • /
    • 2015
  • Next-generation applications using technology IT fused to biological signals from the emotional state to extract a lot of research has been, and the sensitivity of the human sensory functions influences the physiological condition known to be the fact that. In this paper, Propose an Emotional-lighting control algorithm using bio-signals. LED lighting for Emotion light is environmentally friendly and has a high efficiency and long life. In particular, LED lights are different colors represent the possible single light sphere advantages. And, Human sensitivity for determining a more accurate biological signals using EEG was collected using EEG equipment sensitivity was determined to analyze the EEG.

Cascading Citation Expansion

  • Chen, Chaomei
    • Journal of Information Science Theory and Practice
    • /
    • v.6 no.2
    • /
    • pp.6-23
    • /
    • 2018
  • Digital Science's Dimensions is envisaged as a next-generation research and discovery platform for more efficient access to cross-referenced scholarly publications, grants, patents, and clinical trials. As a new addition to the growing open citation resources, it offers opportunities that may benefit a wide variety of stakeholders of scientific publications, from researchers and policy makers to the general public. In this article, we explore and demonstrate some of the practical potentials in terms of cascading citation expansions. Given a set of publications, the cascading citation expansion process can be iteratively applied to a set of articles so as to extend the coverage to more and more relevant articles through citation links. Although the conceptual origin can be traced back to Garfield's citation indexing, it has been largely limited, until recently, to the few who have unrestricted access to a citation database that is large enough to sustain such iterative expansions. Building on the open application program interface of Dimensions, we integrate cascading citation expansion functions in CiteSpace and demonstrate how one may benefit from these new capabilities. In conclusion, cascading citation expansion has the potential to improve our understanding of the structure and dynamics of scientific knowledge.

Transmit Power and Subcarrier Allocation Schemes for Downlink OFDM Systems with Multiple Relays (하향링크 다중 중계기 직교 주파수 분할 다중 시스템을 위한 송신 전력 및 부반송파 할당 기법)

  • Je, Hui-Won;Kim, Ik-Hyun;Lee, Kwang-Bok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3A
    • /
    • pp.281-289
    • /
    • 2009
  • Wireless relay attracts great attention as a core technology of next generation wireless communication systems since it enables reliable communications and extends cell coverage by supporting shadowed users. In this paper, we Propose transmit power and subcarrier allocation scheme for downlink OFDM systems with multiple decode and forward (DF) relays to increase data rate with fixed bit error rate (BER) and sum power constraint. In simulation results, average data rate based on the proposed schemes are evaluated and compared to that of the other schemes. It is also shown that the performance loss of the proposed scheme is negligible compared to the optimal scheme, while its computational complexity is reduced considerably.