• Title/Summary/Keyword: system deployment

Search Result 883, Processing Time 0.029 seconds

A Research on the Application of MIMO/Beamforming Technologies for WiBro Evolution (WiBro Evolution 을 위한 MIMO/Beamforming 기술 적용 방안 연구)

  • Chung, Jae-Ho;Tcha, Yong-Ju;Roh, Jae-Hoon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.46-49
    • /
    • 2007
  • Multiple Antenna Technologies such as Multiple-Input Multiple-Output (MIMO) and Beamforming provide the increase of channel capacity and the reliability of wireless link. To obtain these advantages, WiBro, Mobile WiMAX and $4^{th}$ Generation System are employing multiple antenna technologies. There exist, however, many technical issues in considering the application of the technologies or the providing of services using them. In this paper, various technical topics are discussed and simple solutions are proposed. Beamforming has several technical issues which include coverage imbalance, difficulties in providing Multicast-Broadcast Service (MBS). In Addition, network planning is a critical point from a cell extension and initial network entry point of view. In case of MIMO, network deployment is discussed in that cellular data network such as WiBro has many repeaters. MIMO mode selection for maximizing the cell capacity is also covered.

  • PDF

Security Design of Information Security for Wireless Local Area Network (무선 네트워크망의 정보보호를 위한 시스템 설계)

  • Kim, Jung-Tae;Jung, Sung-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.729-732
    • /
    • 2003
  • Security and privacy issues complicate wireless local area network deployment. for a wired network, certain levels of security are maintained since access to the physical medium is restricted to the devices physically connected to the network. Though wireless local area networks offer some built-in security features, security breaches are possible if appropriate precautions are not taken. This paper describes security issues related to wireless local area networks and presents a software approach for restricting and controlling wireless access. The system authenticates users on the basis of identity, privileges and access hardware by distributed software agents that implement security policy and restrict unauthorized access.

  • PDF

The Direction of EOD Robot(Manipulator) Developments in ROK (한국군 폭발물처리 로봇 개발 방향에 대한 고찰)

  • Lee, Seung-Ho;Koh, Doo-Yeol;Jung, Won-Suk;Kim, Kyoung-Soo;Kim, Soo-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.5
    • /
    • pp.753-759
    • /
    • 2011
  • In this paper, we propose the direction of development for EOD robot. We collected and analyzed the opinions of EOD teams. In order to verify the opinions, we conducted QFD(Quality Function Deployment) analysis. Based on the QFD analysis, we work out the priority of EOD robot development. And we establish the goal of development(target system) and suggest the development direction of EOD robot on each issue.

Technical Parameter Selection Method of the System Development - Focusing on the Military R&D Project - (시스템개발에서의 기술적성과측정 파라미터 선정 방법 - 국방 R&D 사업 중심으로 -)

  • You, Yi-Ju;Kim, Jin-Hoon;Park, Young-Won
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.5 no.1
    • /
    • pp.49-56
    • /
    • 2009
  • This research attempts to acquire technical performance measure information based on identifying the Critical To Quality(CTQ) parameters of user requirement by using Quality Function Deployment(QFD) methodology in the initial phase of a defense R&D project. This results will contribute to the integration of technical progress to the Work Breakdown Structure(WBS) based project performance tracking. It also improve the bridging of systems engineering activities to the project management and the project decision making process.

  • PDF

A Development on the software of Train Control and Monitoring System(TCMS) for Subway Train (전동차용 종합제어장치 소프트웨어 개발)

  • Choi, Byoung-Wook;Park, Jong-Hun
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.25 no.12
    • /
    • pp.94-100
    • /
    • 2011
  • TCMS is the most important controller in the subway train for reliable train control and service oriented flexibility. TCMS software charges communications and control of train and maintains control devices so we use QNX for real-time control. This paper introduces overall software development of TCMS using various diagrams. Software implementation details in TC and CC are explained using deployment diagram through train configuration. Driving control process among many processes is focused to present implement details which controls train by driver or automatic train operation and handles commands to control deriving devices in cars. Reliable operation of train and easy maintenance process is achieved through the same hardware in train control computer and car control computer.

Hegelian Learning Organization

  • Chae, Bong-sug
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.141-144
    • /
    • 1998
  • This paper complements the work of Courtney et al. in viewing learning organizations as inquiring systems. Hegelian inquiring systems are based on the dialectic. Dialectic can not exist without dialogue. The guarantor of this system is conflict. Hegelian inquiring systems would facilitate multiple and contradictory interpretations of reality. Hegelian synthesis of two opposing models-thesis and antithesis-is the epitome of open systems and double-loop learning. Knowledge gained from the Hegelian inquiring systems may result in an entirely new strategic direction to organizations. This paper reviews some guidelines and principles of Hegelian learning organizations and IT support of it. Also it proposes the immediate deployment of Hegelian learning organizations in the wicked business environments and finally suggests the development of new, flexible information technologies and systems for Hegelian organizations.

  • PDF

Statistical Approach for the Prediction of Improper Businessman in Defense Procurement

  • Han, Hongkyu;Choi, Seokcheol
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.7 no.2
    • /
    • pp.21-30
    • /
    • 2011
  • The contractor management for the effective defense project is essential factor in the modern defense acquisition project. The occurrence of Improper Businessman causes the reason in which defense acquisition project is unable to be reasonably fulfilled and setback to the deployment of defense weapon system. In this paper, we develop a prediction model for the effective defense project by using the Discriminant Analysis, the Logistic Regression & Artificial Neural Network and analyse the core variables that determine the Improper Businessman in many variables. It is expected that our model can be used to improve the project management capability of defense acquisition and contribute to the establishment of efficient procurement procedure through entry of the reliable domestic manufacturer.

A Study on the Form and the Deployment of the Go-sul-sik On-dol Houses (고설식(高設式) 온돌(溫突)집의 형성 및 전개에 관한 연구)

  • Ryou, Geunju
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.2 no.1
    • /
    • pp.33-46
    • /
    • 2000
  • Go-Sul-Sik(高設式) On-Dol(溫突) houses have a combination of high Ma-Ru and high On-Dol structure. This type of house had been developed in the process of combining Ma-Ru with On-Dol. Go-Sul-Sik On-Dol houses give a clue to unveil exchanging process of Korean On-Dol and Ma-Ru. Go-Sul-Sik On-Dol can be understood as an architectural type of introducing On-Dol into the upper classes' Ma-Ru afterwards. Apparently, Go-Sul-Sik On-Dol houses were not a two-story building. But they had a two-story structure because of On-Dol rooms, which implied a symbolic rank and On-Dol's practicality as well as its being high. Go-Sul-Sik On-Dol houses were peculiar architectural type which realized lives of the very individual authority and symbolic representation within the strict Confucian society. It seemed to be derived from an alternative of the upper classes' architectural culture integrating an ideal into reality.

  • PDF

A Simple Energy Harvesting Algorithm for Wireless Sensor Networks

  • Encarnacion, Nico N.;Yang, Hyunho
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.359-364
    • /
    • 2012
  • Harvesting energy from the environment is essential for many applications to slow down the deterioration of energy of the devices in sensor networks and in general, the network itself. Energy from the environment is an inexhaustible supply which, if properly managed and harvested from the sources, can allow the system to last for a longer period - more than the expected lifetime at the time of deployment, or even last indefinitely. The goal of this study is to develop a simple algorithm for ns-2 to simulate energy harvesting in wireless sensor network simulations. The algorithm is implemented in the energy module of the simulator. Energy harvesting algorithms have not yet been developed for ns-2. This study will greatly contribute to the existing knowledge of simulating wireless sensor networks with energy harvesting capabilities in ns-2. This paper will also serve as a basis for future research papers that make use of energy harvesting.

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • v.1 no.1
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF