• Title/Summary/Keyword: system deployment

Search Result 878, Processing Time 0.026 seconds

Demonstration of Time- and Wavelength-Division Multiplexed Passive Optical Network Based on VCSEL Array

  • Mun, Sil-Gu;Lee, Eun-Gu;Lee, Jie Hyun;Park, Heuk;Kang, Sae-Kyoung;Lee, Han Hyub;Kim, Kwangok;Doo, Kyeong-Hwan;Lee, Hyunjae;Chung, Hwan Seok;Lee, Jong Hyun;Lee, Sangsoo;Lee, Jyung Chan
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.9-17
    • /
    • 2016
  • We demonstrate a time- and wavelength-division multiplexed passive optical network system employing a vertical-cavity surface-emitting laser array-based optical line terminal transceiver and a tunable bidirectional optical subassembly-based optical network terminal transceiver. A packet error-free operation is achieved after a 40 km single-mode fiber bidirectional transmission. We also discuss an arrayed waveguide grating, a photo detector array based on complementary metal-oxide-semiconductor photonics technologies, and low-cost key devices for deployment in access networks.

DEVELOPMENT OF PYROPROCESSING AND ITS FUTURE DIRECTION

  • Inoue, Tadashi;Koch, Lothar
    • Nuclear Engineering and Technology
    • /
    • v.40 no.3
    • /
    • pp.183-190
    • /
    • 2008
  • Pyroprocessing is the optimal means of treating spent metal fuels from metal fast fuel reactors and is proposed as a potential option for GNEP in order to meet the requirements of the next generation fuel cycle. Currently, efforts for research and development are being made not only in the U.S., but also in Asian countries. Electrorefining, cathode processing by distillation, injection casting for fuel fabrication, and waste treatment must be verified by the use of genuine materials, and the engineering scale model of each device must be developed for commercial deployment. Pyroprocessing can be effectively extended to treat oxide fuels by applying an electrochemical reduction, for which various kinds of oxides are examined. A typical morphology change was observed following the electrochemical reduction, while the product composition was estimated through the process flow diagram. The products include much stronger radiation emitter than pure typical LWR Pu or weapon-grade Pu. Nevertheless, institutional measures are unavoidable to ensure proliferation-proof plant operations. The safeguard concept of a pyroprocessing plant was compared with that of a PUREX plant. The pyroprocessing is better adapted for a collocation system positioned with some reactors and a single processing facility rather than for a centralized reprocessing unit with a large scale throughput.

Adaptive Convergence Security Policy and Management Technology of Home Network (홈 네트워크에서의 적응적 통합 보안 정책 및 관리 기술)

  • Lee, Sang-Joon;Kim, Yi-Kang;Ryu, Seung-Wan;Park, You-Jin;Cho, Choong-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.72-81
    • /
    • 2011
  • In this paper, we propose adaptive convergence security policies and management technologies to improve security assurance in the home networking environment. Many security issues may arise in the home networking environment. Examples of such security issues include the user privacy, the service security, the integrated networking security, the middleware security and the device failure. All these security issues, however, should be fulfilled in phase due to many difficulties including deployment cost and technical complexity. For instance, fundamental security requirements such as authentication, access control and prevention of crime and disaster should be addressed first. Then, supplementary security policies and diverse security management technologies should be fulfilled. In this paper, we classify these requirements into three categories, a service authentication, a user authentication and a device authentication, and propose security policies and management technologies for each requirement. Since the home gateway is responsible for interconnection of many home devices and external network access, a variety of context information could be collected from such devices.

Derivation of Weights for Customer Requirements Attribute in Kano-QFD Integration Model (Kano-QFD 통합모형에서의 고객 요구속성 중요도 산정)

  • Moon, Kyung-Won;Kim, Nak-Hoon;Jeong, Byung-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.37 no.1
    • /
    • pp.68-78
    • /
    • 2014
  • Recently, companies are trying to gain a competitive advantage in the market to meet the voice of customer. For this purpose, QFD has been used as product development technology in many areas to include the customer' requirements. Also, Kano model has been used to understand the customer' requirements for an effective way. Therefore integration of Kano model and QFD can more efficiently reflect the customer' requirements when designing a new service. This paper proposes PI index by taking into account the current satisfaction position of our company and competitors while IR (Improvement Ratio) value was set uniformity. This study suggests a more accurate index to predict potential improvements and calculates the final importance or priority. Through case studies targeted at elevator maintenance companies, we can have a general idea how much to improve in the near future and estimate the final importance of customer requirements.

Developing APC for Weighting Quality Attributes (품질 속성의 가중치 선정을 위한 APC에 관한 연구)

  • Song, Hae Geun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.36 no.3
    • /
    • pp.8-16
    • /
    • 2013
  • Determining relative importance among many quality attributes under financial constraints is an important task. The weighted value of an attribute particularly in QFD, will influence on engineering characteristics and this will eventually influence the whole manufacturing process such as parts deployment, process planning, and production planning. Several scholars have suggested weighting formulas using CSC (Customer Satisfaction Coefficient) in the Kano model. However, previous research shows that the validity of the CSC approaches has not been proved systematically. The aim of the present study is to address drawbacks of CSC and to develop APC (Average Potential Coefficient), a new approach for weighting of quality attributes. For this, the current study investigated 33 quality attributes of e-learning and conducted a survey of 375 university students for the results of APC, the Kano model, and the direct importance of the quality attributes. The results show that the proposed APC is better than other approaches based on the correlation analysis with the results of direct importance. An analysis of e-leaning's quality perceptions using the Kano model and suggestions for improving e-learning's service quality are also included in this study.

A Study on the Condominium Management Policy of the Local Government in Japan

  • Kim, Jung-In;Kajiura Tsuneo
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2002.11a
    • /
    • pp.279-285
    • /
    • 2002
  • Condominium management ask for planning ability and special knowledge in order to solve the troubles of a condominium. But not all HOA have that ability or knowledge, so administration support to condominium management came to be given to HOA. In this study, we divided the administration policies on condominium management as follows;$\circled1$instruction about an advertisement and a contract$\circled2$instruction about management$\circled3$instruction about maintenance $\circled4$ instruction by the local government $\circled5$ legislation about condominium management. The condominium management policy has been almost programmed by the state, such as legal amendments to laws and advises by administrative inspection. But these condominium management policies by the state have limitations to support HOA appropriately, so correspondence of the local government is called for, On the other hand, in the local governments, grasp basic contents for execution to the condominium management policy, an information of offering and consultation has been started. And system that suits the situation and the characteristic of each district was provided. However it could not say that we grasp the tendency of the condominium management policies wholly of the local governments, so it remains as a subject because it is not long since condominium management policies of the local government started, and we picked up only metropolis in this study. In the future, it is necessary to search on the consciousness of a resident and the HOA about the condominium management policy, and make out the data which can be reflected in policy deployment in the local governments from now on. * HOA ‥‥ Home Owners Association

  • PDF

A Study on Energy Efficient Self-Organized Clustering for Wireless Sensor Networks (무선 센서 네트워크의 자기 조직화된 클러스터의 에너지 최적화 구성에 관한 연구)

  • Lee, Kyu-Hong;Lee, Hee-Sang
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.37 no.3
    • /
    • pp.180-190
    • /
    • 2011
  • Efficient energy consumption is a critical factor for deployment and operation of wireless sensor networks (WSNs). To achieve energy efficiency there have been several hierarchical routing protocols that organize sensors into clusters where one sensor is a cluster-head to forward messages received from its cluster-member sensors to the base station of the WSN. In this paper, we propose a self-organized clustering method for cluster-head selection and cluster based routing for a WSN. To select cluster-heads and organize clustermembers for each cluster, every sensor uses only local information and simple decision mechanisms which are aimed at configuring a self-organized system. By these self-organized interactions among sensors and selforganized selection of cluster-heads, the suggested method can form clusters for a WSN and decide routing paths energy efficiently. We compare our clustering method with a clustering method that is a well known routing protocol for the WSNs. In our computational experiments, we show that the energy consumptions and the lifetimes of our method are better than those of the compared method. The experiments also shows that the suggested method demonstrate properly some self-organized properties such as robustness and adaptability against uncertainty for WSN's.

A Hierarchical Hybrid Meta-Heuristic Approach to Coping with Large Practical Multi-Depot VRP

  • Shimizu, Yoshiaki;Sakaguchi, Tatsuhiko
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.2
    • /
    • pp.163-171
    • /
    • 2014
  • Under amazing increase in markets and certain demand on qualified service in the delivery system, global logistic optimization is becoming a keen interest to provide an essential infrastructure coping with modern competitive prospects. As a key technology for such deployment, we have been engaged in the practical studies on vehicle routing problem (VRP) in terms of Weber model, and developed a hybrid approach of meta-heuristic methods and the graph algorithm of minimum cost flow problem. This paper extends such idea to multi-depot VRP so that we can give a more general framework available for various real world applications including those in green or low carbon logistics. We show the developed procedure can handle various types of problem, i.e., delivery, direct pickup, and drop by pickup problems in a common framework. Numerical experiments have been carried out to validate the effectiveness of the proposed method. Moreover, to enhance usability of the method, Google Maps API is applied to retrieve real distance data and visualize the numerical result on the map.

Development of an electronic protection simulator using decoy antenna (디코이 안테나를 이용한 전파회피 모사기 개발)

  • Lim, Joong-Soo;Chae, Gyoo-Soo;Kim, Min-Nyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.7
    • /
    • pp.2528-2533
    • /
    • 2010
  • This paper describes on a software simulator that can be used for an anti-ARM system. The proposed simulator is a valuable tool for investigating the optimum deployment of decoy antennas which are widely using for anti-ARM and calculating the electromagnetic field at the ARM receiver. To verify the effect of decoy antennas, we analyze the field intensity and phase at the receiver. We conduct an analysis of ARM attack in case of using multiple decoy antennas and the proposed simulator can be used to decide the optimum positions of the decoys.

A Secure Identity Management System for Secure Mobile Cloud Computing (안전한 모바일 클라우드 컴퓨팅을 위한 ID 관리 시스템)

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.516-519
    • /
    • 2014
  • Cloud computing is an up-and-coming paradigm shift transforming computing models from a technology to a utility. However, security concerns related to privacy, confidentiality and trust are among the issues that threaten the wide deployment of cloud computing. With the advancement of ubiquitous mobile-based clients, the ubiquity of the model suggests a higher integration in our day to day life and this leads to a rise in security issues. To strengthen the access control of cloud resources, most organizations are acquiring Identity Management Systems (IDM). This paper presents one of the most popular IDM systems, specifically OAuth, working in the scope of Mobile Cloud Computing which has many weaknesses in its protocol flow. OAuth is a Delegated Authorization protocol, and not an Authentication protocol and this is where the problem lies. This could lead to very poor security decisions around authentication when the basic OAuth flow is adhered to. OAuth provides an access token to a client, so that it can access a protected resource, based on the permission of the resource owner. Many researchers have opted to implement OpenlD alongside OAuth so as to solve this problem. But OpenlD similarly has several security flows. This paper presents scenarios of how insecure implementations of OAuth can be abused maliciously. We incorporate an authentication protocol to verify the identities before authorization is carried out.