• Title/Summary/Keyword: Service chain

Search Result 914, Processing Time 0.028 seconds

A CAC Scheme for Voice/Data DS-CDMA Systems with Prioritized Services

  • Insoo Koo;Kim, Eunchan;Kim, Kiseon
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.92-96
    • /
    • 2000
  • In this paper, we propose a call admission control(CAC) scheme fer the mixed voice/data DS-CDMA systems and analyze the Er-lang capacity under the proposed CAC scheme. Voice and data traffics require different system resources based oil their Quality of Service(QoS) requirements. In the proposed CAC scheme, some system resources are reserved exclusively for handoff calls to have high priority Over new calls. Additionally the queueing of both new and handoff data traffics that are not sensitive to delay is allowed. Ar a performance measure for the suggested CAC scheme. Erlang capacity is utilized. For the performance analysis, a four-dimensional Markov chain model is developed. Erlang capacity of a practical IS-95B type system depicts, and optimum values of system parameters such as the number of reservation channels and queue lengths are found with respect to Erlang capacity. Finally, it is observed that Erlang capacity is improved more than two times by properly selecting the system parameters with the proposed CAC scheme.

  • PDF

Study on the Transport Reliability Concerning Risks Scenarios (위험사건(Risk)발생 시나리오를 고려한 운송 신뢰성 연구)

  • Kim, Eun-Ji;Ganbat, Enkhtsetseg;Kim, Hwan-seong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.10a
    • /
    • pp.256-257
    • /
    • 2015
  • The trend of globalization and the development of the communication-Information technology not only complexified the supply chain, but also, led to the needs of the high quality of logistics service for customers. I t defines risks that can occur in truck transport under unexpected situation with Fault Tree Analysis(FTA) and calculates failure rate concerning relationship between each risks. Based on the 4 kinds of middle failure events that defined in FTA, Reliability function which is regarded about risks sequentiality and time flow is resulted in. I t is meaningful that it calculates reliability of logistics and transportation system with engineering methodology.

  • PDF

Sensor Fault Detection, Localization, and System Reconfiguration with a Sliding Mode Observer and Adaptive Threshold of PMSM

  • Abderrezak, Aibeche;Madjid, Kidouche
    • Journal of Power Electronics
    • /
    • v.16 no.3
    • /
    • pp.1012-1024
    • /
    • 2016
  • This study deals with an on-line software fault detection, localization, and system reconfiguration method for electrical system drives composed of three-phase AC/DC/AC converters and three-phase permanent magnet synchronous machine (PMSM) drives. Current sensor failure (outage), speed/position sensor loss (disconnection), and damaged DC-link voltage sensor are considered faults. The occurrence of these faults in PMSM drive systems degrades system performance and affects the safety, maintenance, and service continuity of the electrical system drives. The proposed method is based on the monitoring signals of "abc" currents, DC-link voltage, and rotor speed/position using a measurement chain. The listed signals are analyzed and evaluated with the generated residuals and threshold values obtained from a Sliding Mode Current-Speed-DC-link Voltage Observer (SMCSVO) to acquire an on-line fault decision. The novelty of the method is the faults diagnosis algorithm that combines the use of SMCSVO and adaptive thresholds; thus, the number of false alarms is reduced, and the reliability and robustness of the fault detection system are guaranteed. Furthermore, the proposed algorithm's performance is experimentally analyzed and tested in real time using a dSPACE DS 1104 digital signal processor board.

RFID Tag's Security Level Based RFID Authentication Protocol (전자 태그의 보안 레벨을 기반으로 하는 RFID 인증 프로토콜)

  • Oh Soo-hyun;kwak Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.593-600
    • /
    • 2005
  • Recently, RFID system is a main technology to realize ubiquitous computing environments. Because RFID system that is an automatic identification technology using radio frequency is a system to read and write the data of the entity. Therefore, many companies are interested in RFID system to reduce supply chain management and inventory control cost. However, for providing secure service, RFID authentication technology secure against tracking by an adversary is researched first. In this paper, we proposed security level based RFID authentication protocol providing reduce computational and communicational workload in the back-end database. The proposed protocol is secure against reply attack, spoofing attack, traffic analysis, and location privacy, since the proposed protocol based on the security of the hash function.

A Case Study on Application of Blockchain Technology in Shipping Industry (해운산업에서의 블록체인 기술 적용사례에 관한 연구)

  • Ryu, Yeong-Soo;Chang, Myung-Hee
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2018.05a
    • /
    • pp.129-130
    • /
    • 2018
  • In shipping logistics, despite the fact that it has promoted the information processing process, the use of the document exchange mechanism has caused a problem of increasing the cost and lead time. In recent years, various types of projects are in progress in preparation for full-scale introduction of a blockchain technology capable of solving the document exchange mechanism in the shipping industry, In near future, by expanding the practical application scope, it is aiming to increase competitiveness through transparency, reliability, stability, and efficiency, which are the effects of application of the block chain technology.

  • PDF

Performance Analysis of Soft Handoff Region Ratio in CDMA System Considering System Capacity and Traffic Load (CDMA망에서 시스템 용량과 트래픽 부하의 변화를 반영한 핸드오프 영역 비율에 대한 성능분석)

  • Jung, Sung-Hwan;Hong, Jung-Wan;Lee, Sang-Cheon;Lie, Chang-Hoon
    • IE interfaces
    • /
    • v.20 no.2
    • /
    • pp.216-226
    • /
    • 2007
  • In code-division multiple-access (CDMA) systems with soft handoff, mobile station (MS) within soft handoff region can use multiple radio channels and receive their signals from multiple base stations (BSs) simultaneously. In this paper, the effects of soft handoff region ratio (SHRR) on reverse link of a CDMA cellular system are analytically investigated. In order to analyze the network performance and quality of service (QoS) perceived by users more realistically, both the soft capacity increasing factor and the traffic load variation affected by SHRR are jointly considered and a two-dimensional continuous time Markov chain (CTMC) model is built. In the numerical example, it is observed that the optimal guard channel exists according the variations of the traffic load and propagation conditions when the proper value of SHRR is determined.

Multi-Phase Logistics Network Design of Industrail Estate Area (산업단지내 효율적 운송을 위한 다단계 물류네트워크 설계)

  • Kim, Woong-Sub;Shin, Jae Young
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2012.10a
    • /
    • pp.84-85
    • /
    • 2012
  • Continuous oil price rising and the regulation of carbon emmission makes companies to have higher competitiveness. because of this trend, companies are trying to establish and manage efficient logistics system to improve customer service and reduce cost, so more competitive logistics complex is needed. To construct this kind of logistics complex, proper policy and logistics system for transportation is necessary. Especially, efficient operation through establishing system of logistics at the complex is very important for low cost and environmental friendly point of view. So this paper presents logistics network operation model for efficient transportation, especially approaches the problem with Multi-Phase.

  • PDF

A Case Study on Implementing SCM to Textile Fashion Industry as Small Business (섬유패션 중소기업의 SCM 사례 연구 - 커튼업체를 중심으로 -)

  • Shin, Sang-Moo;Choe, Jin-Hyeok
    • Journal of Fashion Business
    • /
    • v.12 no.5
    • /
    • pp.155-167
    • /
    • 2008
  • With globalization and competitive market environment, companies realize how marketing channels are important in order to survive and succeed the business. The importance of information management among channels is getting increased, and is needed for SCM. Nevertheless having hard situation to implement SCM, SCM for textile fashion industry engaged in small business mostly is the way to break through the difficulty on so many channels to go through from fiber to retail. Therefore, the purpose of this case study to L firm by using questionnaire based interviewing method was to investigate how textile fashion small business can implement the SCM with their own differentiated strategy differed from a large corporation. L firm conducted SCM-ISN (Information Service Network) under the restructuring project. So they could use electronic bidding system via internet and have information sharing with their partners such as retailers. Therefore, they could expand market share to Seoul and reduce inventory and manage their customer more effectively than before.

Criteria for Supplier Selection in Textile and Apparel Industry : A Case Study in Vietnam

  • NONG, Nhu-Mai Thi;HO, Phong Thanh
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.2
    • /
    • pp.213-221
    • /
    • 2019
  • The study aims to investigate some criteria of supplier selection in the textile and apparel (T&A) sector in Vietnam. Most research on supplier selection criteria for T&A sector was mainly conducted based on the review of literature. Therefore, the purpose of this study is to explore these criteria based on a framework in which an integrated approach of qualitative and quantitative was employed. First, an in-depth interview was used to explore what supplier selection criteria T&A companies were utilized after the literature on supplier selection criteria had been reviewed. Next, a prequestionnaire was built and sent to some practitioners and experts for their revision. Then, a pilot survey of 31 T&A companies with numerous statistical tests was conducted to validate the questionnaire. Finally, an official study of 282 respondents was conducted to determine supplier selection criteria which are best suited for T&A companies through exploratory factor analysis. The findings of the study suggest that there are eight supplier selection criteria including Quality, Cost, Delivery, Service, Capability, Company's image, Relationship, and Sourcing country. Each criterion comprises certain sub-criteria to make the supplier selection criteria set more comprehensive. The findings will be a contribution to the selection process of T&A companies as they can utilize these criteria to select capable suppliers.

Digital Content Certification and Management Technology Based on Blockchain Technology

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.121-128
    • /
    • 2021
  • After entering the 4th Industrial Revolution, the digital content market, which was only dependent on existing contents supply enterprises, is providing various digital content through the participation of users like YouTube. Accordingly, it activated the digital content market, but it causes a negative influence on the digital content market due to the copyright of the creator and the indiscriminate illegal use and usage of the content. This study researched digital content management technology based on blockchain technology to protect digital content and the copyright of the creator. The suggested technology protects the digital content and the copyright holder and discerns the users and prevents the indiscriminate approach and illegal use of digital content. For the safe management of digital content, hash function applied as the certification technology of blockchain is used to certify the users and manage the digital content and provide integrity and authentication service.