• Title/Summary/Keyword: Service Requirement

Search Result 814, Processing Time 0.032 seconds

Position-Based Multicast Routing in Mobile Ad hoc Networks: An Analytical Study

  • Qabajeh, Mohammad M.;Adballa, Aisha H.;Khalifa, Othman O.;Qabajeh, Liana K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1586-1605
    • /
    • 2012
  • With the prevalence of multimedia applications and the potential commercial usage of Mobile Ad hoc Networks (MANETs) in group communications, Quality of Service (QoS) support became a key requirement. Recently, some researchers studied QoS multicast issues in MANETs. Most of the existing QoS multicast routing protocols are designed with flat topology and small networks in mind. In this paper, we investigate the scalability problem of these routing protocols. In particular, a Position-Based QoS Multicast Routing Protocol (PBQMRP) has been developed. PBQMRP builds a source multicast tree guided by the geographic information of the mobile nodes, which helps in achieving more efficient multicast delivery. This protocol depends on the location information of the multicast members which is obtained using a location service algorithm. A virtual backbone structure has been proposed to perform this location service with minimum overhead and this structure is utilized to provide efficient packet transmissions in a dynamic mobile Ad hoc network environment. The performance of PBQMRP is evaluated by performing both quantitative analysis and extensive simulations. The results show that the used virtual clustering is very useful in improving scalability and outperforms other clustering schemes. Compared to On-Demand Multicast Routing Protocol (ODMRP), PBQMRP achieves competing packet delivery ratio and significantly lower control overhead.

Experience for Development and Capacity Certification of Safety Relief Valves (안전방출밸브 개발과 용량인증 사례)

  • Kim, Chil-Sung;Roh, Hee-Seon;Kim, Kang-Tae;Kim, Ji-Heon;Kim, Jong-Su
    • The KSFM Journal of Fluid Machinery
    • /
    • v.8 no.3 s.30
    • /
    • pp.16-25
    • /
    • 2005
  • The purpose of this study is localization of safety relief valves for Nuclear Service. The safety relief valve is the important equipment used to protect the pressure vessel, the steam generator and the other pressure facility from overpressure by discharging the operating medium when the pressure of system is reaching the design pressure of the system. We developed design technology used FEM ' CFM about safety relief valve for Nuclear Service according to ASME (or KEPIC) Code and KHNP's Technical Specification. To prove validity of a design technology, actually, we manufactured and inspected and tested the sample products designed according to a developed technology. The capacity qualification test was achieved according to requirement of ASME(or KEPIC) Code by NBBI and the functional qualification test was achieved according to ASME QME-1 for operating condition in technical specification of KHNP by NLI. Therefore we have to achieve the development of safety relief valves for Nuclear Service with our own technologies.

Prioritizing Service Supply-Chain Performance Measures Using Multi-Criteria Decision-Making Methodologies

  • ABBAS, Haidar;ALAWI, Alamir Al;MAKTOUMI, Khadija Al
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.843-851
    • /
    • 2020
  • This study focuses on identifying and prioritizing the broader performance measures for the service supply chains by taking the case of Majan Electricity Company, Sohar, in the Sultanate of Oman. For an examination of the uniformity of ultimate objectives and the priorities therein, two strata of respondents with a total of fourteen respondents were approached for their valuable insights. Suitable structured instruments were personally administered to elicit the insightful and worthy responses. The two multi-criteria decision-making techniques, namely, the Fuzzy Analytical Hierarchy Process and the Best-Worst Method were used to reach a meaningful prioritization of the identified and refined broader performance measurement dimensions. The results show that there exists a minor gap between the two respondents' groups in terms of their prioritizations. The major finding points to the difference in terms of the topmost priorities as revealed by the two set of respondents. For one group of respondents, the customer satisfaction matters the most, whereas for the other group, it is the overall profitability that matters the most. This gap against the utopian state assists in concluding that there is a requirement to reorient the employees so as to have a shared and common understanding of the organizational priorities.

A Study about Improvement of Warehouse Management System using SOA (SOA를 적용한 창고관리시스템 개선에 대한 연구)

  • Lee, Seojeong;Rhyu, Keel-Soo;Kim, Hyo-Seung;Park, Dong-Uk
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.77-85
    • /
    • 2014
  • The Service Oriented Architecture has been adopted to be able to handle various types of user requirement flexibly. This concept supports to identify service units, organize that units and integrate them to make a software system. In this paper, we introduce SOA to improve legacy system for reducing duplicated functions and relax the difficulties of maintenance. We try to analyze function flow of warehouse management system and reorganize it to reduce duplicated implementation. Also the system architecture is tried to improve considering connection with other ERP systems.

The Design and Implementation of Messaging System(XML/EDl System) Based on Internet (인터넷을 기반으로 하는 메시징 시스템(XML/EDI System) 설계 및 구현)

  • 안경림;박상필;안정희
    • The Journal of Society for e-Business Studies
    • /
    • v.5 no.2
    • /
    • pp.101-112
    • /
    • 2000
  • Costs and times, resources was better decreased than former times because it had been introduced EDI(Electronic Data Interchange) system. Nevertheless, many problems has been raised as before, that is high costs and data re-using, the rapidly changing environment, etc. To solve these problems, it was attempted to introduce XML technology at traditional EDI System. From this point to view, 1 designed and implemented XML/EDI System based on Internet(Internet Messaging System) in this paper. And I selected some services as basic service among many services which is provided at XML/EDI System, that is message sending and message receiving, message retrieval. Other service of client system was composed of MapIn and MapOut module. MapIn Module is to parse the received XML Message and to store XML Data to RDB system. And MapOut module is to generate XML Message after extracting data from RDB system and to transfer XML Message to recipient. Hereby, XML/EDI System(XEDI System) provide document re-using, the various result(output) generation f3r various requirement and directly interface with DB. Therefore, This System(XEDI System) is more various and more flexible than the existing Messaging System that just provide transfer and retrieval service

  • PDF

Context-Aware Security System for the Smart Phone-based M2M Service Environment

  • Lee, Hyun-Dong;Chung, Mok-Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.64-83
    • /
    • 2012
  • The number of smart phone users is rapidly growing due to recent increase in wireless Internet usage, development of a wide variety of applications, and activation of M2M (Machine to machine) services. Although the smart phone offers benefits of mobility and convenience, it also has serious security problems. To utilize M2M services in the smart phone, a flexible integrated authentication and access control facility is an essential requirement. To solve these problems, we propose a context-aware single sign-on and access control system that uses context-awareness, integrated authentication, access control, and an OSGi service platform in the smart phone environment. In addition, we recommend Fuzzy Logic and MAUT (Multi-Attribute Utility Theory) in handling diverse contexts properly as well as in determining the appropriate security level. We also propose a security system whose properties are flexible and convenient through a typical scenario in the smart phone environment. The proposed context-aware security system can provide a flexible, secure and seamless security service by adopting diverse contexts in the smart phone environment.

A Study On User-centric Identity Information Management Model In Internet Environment (인터넷 환경에서의 사용자 중심 ID정보 관리 모델에 관한 연구)

  • Rhy, Hae-Gyu;Shin, Hyeon-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.37-50
    • /
    • 2009
  • With the increase of number of internet services due to development of internet, it becomes a critical issue to appropriately manage the personal information about user's identity, that is ID information that service providers collect in terms of user's convenience improvement and privacy protection. But the existing ID information management models are service provider-centric or they insufficiently provide ID information management functions, so that they have not been satisfying user's requirement. In this paper, by establishing user-centric concept in we information management, we propose the new user-centric ID information management model in which user can make use of the internet service more conveniently and eventually enhance user's privacy.

A Identity Escrow mechanism supporting key recovery (키 복구를 지원하는 향상된 신원위탁 메커니즘)

  • 이용호;이임영;김주한;문기영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.119-128
    • /
    • 2002
  • In case certification between user and service provider is achieved, problem that user's identity is revealed is occurring by social issue, so it was presented identity escrow scheme to solve these problem. In identity escrow scheme, the issuer who have correct user's identity transmits securely anonymity authentication information to user, and user achieves authentication phase with service provider keeping oneself anonymity using this. In this paper, we present requirement for security and trusty of identity escrow scheme and propose new mechanism that can security this. Also, propose method that service provider can deliver securely contents to user and propose mechanism that improve that support ky recovery at encryption communication that using secret key that it was generated by key agreement between users.

SWITCH: SDN-WLAN Integrated Handover Scheme for QoS-Guaranteed Mobile Service

  • Kim, Youngjun;Kyung, Yeunwoong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3680-3693
    • /
    • 2022
  • The handover procedure of IEEE 802.11 wireless local area networks (WLANs) introduces significant delay, which can degrade the quality of service (QoS) especially for delay-sensitive applications. Although studies have been conducted to support handover in SDN-based WLAN, there is no research to reduce the channel scanning procedure that takes up the most delay time in the handover process. The channel scanning procedure is essential to determine the appropriate access point (AP). To mitigate this problem, this paper proposes a SWITCH: SDN-WLAN integrated handover scheme for QoS-Guaranteed mobile service. In SWITCH, each AP periodically broadcasts beacon frames through different channels in a predetermined order that includes the operating channel information of the AP. This allows mobile stations (MSs) to receive the beacon frames of nearby APs, and therefore they can determine the appropriate APs for handover without the channel scanning procedure. By reporting the information of the newly moved AP to the SDN controller, a flow rule is installed in advance to provide fast handover, and packet loss is reduced by buffering data destined for MS. In addition, the proposed scheme can adaptively operate SWITCH to consider the user location and QoS requirement of flow to save radio resource overhead. Performance evaluation results demonstrate that SWITCH can reduce the handover delays, flow table utilization ratio and radio resource overhead while improving the network throughput.

A Study on Security Requirement against Denial of Service Attack in Sensor Network (센서 네트워크에서의 서비스 거부(Denial of Service) 공격에 대한 보안요구사항 연구)

  • Lim, Hui-Bin;Park, Sang-Jin;Kim, Mi-Joo;Shin, Yong-Tae;Choe, Jong-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.631-632
    • /
    • 2009
  • 센서 네트워크에 대한 보안은 일반 네트워크와 동일하게 보안성, 무결성, 가용성 등이 요구된다. 그러나 일반적으로 센서 네트워크는 무선 통신을 하는 네트워크이고, 고정된 인프라가 없으며, 네트워크 토폴로지가 자주 변하는 특징으로 인해 보안문제는 어려운 것으로 인식되고 있다. 특히, 센서 노드의 에너지와 같은 자원 고갈을 유발하여 정상적인 동작을 못하게 하는 서비스 거부(Denial of Service, DoS)와 같은 공격에 취약하다. 본 논문에서는 센서 네트워크의 일반적인 구성을 통해 발생할 수 있는 DoS 공격의 유형을 분석하고, 보안요구사항을 제시하였다. 제시한 보안요구사항은 DoS 공격 뿐 아니라 센서 네트워크에서 발생할 수 있는 다양한 공격 유형에 대한 보안요구사항을 마련하는 데에 기초가 될 것으로 기대한다.