首页 > 最新文献

2010 International Conference on Information and Communication Technology Convergence (ICTC)最新文献

英文 中文
Paprika greenhouse management system for ubiquitous agriculture 辣椒大棚管理系统用于无处不在的农业
Jeong-Hwan Hwang, H. Yoe
This paper proposes the ‘Paprika greenhouse management system’ based on wireless sensor network technology, which will establish the ubiquitous agricultural environment and improve the productivity of farmers. The proposed ‘Paprika greenhouse management system’ has WSN environmental sensors and CCTVs at inside/outside of paprika greenhouse. These devices collect the growth-environment related information of paprika. The system collects and monitors the environmental information and video information of paprika greenhouse. In addition to the remote-control and monitoring of the greenhouse facilities, this system realizes the most optimum paprika growth environment based on the growth environmental data accumulated for a long time.
本文提出了基于无线传感器网络技术的“辣椒大棚管理系统”,将建立泛在的农业环境,提高农民的生产力。提出的“辣椒大棚管理系统”在辣椒大棚内外设有WSN环境传感器和闭路电视。这些装置可以收集辣椒的生长环境相关信息。该系统对辣椒大棚的环境信息和视频信息进行采集和监控。该系统除了可以对温室设施进行远程控制和监控外,还可以根据长期积累的生长环境数据,实现最优的辣椒生长环境。
{"title":"Paprika greenhouse management system for ubiquitous agriculture","authors":"Jeong-Hwan Hwang, H. Yoe","doi":"10.1109/ICTC.2010.5674751","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674751","url":null,"abstract":"This paper proposes the ‘Paprika greenhouse management system’ based on wireless sensor network technology, which will establish the ubiquitous agricultural environment and improve the productivity of farmers. The proposed ‘Paprika greenhouse management system’ has WSN environmental sensors and CCTVs at inside/outside of paprika greenhouse. These devices collect the growth-environment related information of paprika. The system collects and monitors the environmental information and video information of paprika greenhouse. In addition to the remote-control and monitoring of the greenhouse facilities, this system realizes the most optimum paprika growth environment based on the growth environmental data accumulated for a long time.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117000936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modeling autonomous military robots using hybrid system framework 基于混合系统框架的自主军用机器人建模
Jungjae Lee, Reeseo Cha, Younghun Han, Wonhong Nam, Jin-Young Choi, Wontae Kim, Seungmin Park
The autonomous military robot system is a complex hybrid system which is difficult to represent by ordinary modeling frameworks due to its continuous behaviors. In this paper, we present a case study to formally model this system using CHARON that is a hierarchical modeling framework for hybrid systems. To precisely capture all the behaviors of the military robot system, we propose several extensions for the CHARON framework.
自主军事机器人系统是一个复杂的混合系统,由于其行为的连续性,很难用普通的建模框架来表示。在本文中,我们提出了一个案例研究,使用混合系统的分层建模框架CHARON对该系统进行正式建模。为了精确地捕捉军用机器人系统的所有行为,我们提出了CHARON框架的几个扩展。
{"title":"Modeling autonomous military robots using hybrid system framework","authors":"Jungjae Lee, Reeseo Cha, Younghun Han, Wonhong Nam, Jin-Young Choi, Wontae Kim, Seungmin Park","doi":"10.1109/ICTC.2010.5674805","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674805","url":null,"abstract":"The autonomous military robot system is a complex hybrid system which is difficult to represent by ordinary modeling frameworks due to its continuous behaviors. In this paper, we present a case study to formally model this system using CHARON that is a hierarchical modeling framework for hybrid systems. To precisely capture all the behaviors of the military robot system, we propose several extensions for the CHARON framework.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"4 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129577444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resource allocation and blocking analysis for mobile TV service over WiMAX network WiMAX网络上移动电视业务的资源分配与阻塞分析
Seung‐Eun Hong, W. Lee
Mobile WiMAX is emerging as one of the most promising systems for 4th generation mobile wireless networks where mobile TV services are foreseen to be proliferated. These applications are bandwidth hogs which cause a challenging capacity problem. To address this challenge, a novel mobile TV services over WiMAX network, called wireless switched digital video (WSDV), is proposed in this paper. Unlike with the conventional broadcast or unicast schemes, we use a hybrid approach that exploits adaptive modulation and coding (AMC) gain in unicast scheme and at the same time accommodates arbitrary many users watching the same channel like broadcast method, which enables to increase wireless capacity for mobile TV service. In addition, we present a WiMAX design tool, based on an analytical model, maximizing WiMAX capacity and study the influence of the most important traffic and system parameters. The analytical model can capture the details on WiMAX resource allocation and consider the popularity of the mobile TV contents from user, which provides an accurate estimate of the amount of bandwidth for WiMAX TV service and also enables a designer to optimally select the number of channels via WSDV schemes while meeting a desired level of blocking probability. Finally, we also demonstrate that the optimized scheme outperforms the conventional schemes in terms of blocking probability, and address the bandwidth sharing effect with other data services.
移动WiMAX正在成为第四代移动无线网络中最有前途的系统之一,预计移动电视服务将会激增。这些应用程序占用了大量带宽,从而导致了具有挑战性的容量问题。为了解决这一挑战,本文提出了一种基于WiMAX网络的新型移动电视服务,称为无线交换数字视频(WSDV)。与传统的广播或单播方案不同,我们采用一种混合方法,利用单播方案中的自适应调制和编码(AMC)增益,同时像广播方法一样容纳任意多用户观看同一频道,从而增加了移动电视服务的无线容量。此外,我们提出了一个基于解析模型的WiMAX设计工具,最大化WiMAX容量,并研究了最重要的业务和系统参数的影响。该分析模型能够捕捉到WiMAX资源分配的细节,并考虑到用户对移动电视内容的流行程度,为WiMAX电视服务提供了一个准确的带宽估计,也使设计者能够在满足期望的阻塞概率水平的情况下,通过WSDV方案优化选择信道数量。最后,我们还证明了优化方案在阻塞概率方面优于传统方案,并解决了与其他数据业务的带宽共享效应。
{"title":"Resource allocation and blocking analysis for mobile TV service over WiMAX network","authors":"Seung‐Eun Hong, W. Lee","doi":"10.1109/ICTC.2010.5674717","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674717","url":null,"abstract":"Mobile WiMAX is emerging as one of the most promising systems for 4th generation mobile wireless networks where mobile TV services are foreseen to be proliferated. These applications are bandwidth hogs which cause a challenging capacity problem. To address this challenge, a novel mobile TV services over WiMAX network, called wireless switched digital video (WSDV), is proposed in this paper. Unlike with the conventional broadcast or unicast schemes, we use a hybrid approach that exploits adaptive modulation and coding (AMC) gain in unicast scheme and at the same time accommodates arbitrary many users watching the same channel like broadcast method, which enables to increase wireless capacity for mobile TV service. In addition, we present a WiMAX design tool, based on an analytical model, maximizing WiMAX capacity and study the influence of the most important traffic and system parameters. The analytical model can capture the details on WiMAX resource allocation and consider the popularity of the mobile TV contents from user, which provides an accurate estimate of the amount of bandwidth for WiMAX TV service and also enables a designer to optimally select the number of channels via WSDV schemes while meeting a desired level of blocking probability. Finally, we also demonstrate that the optimized scheme outperforms the conventional schemes in terms of blocking probability, and address the bandwidth sharing effect with other data services.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129686540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks 基于无线局域网的自组织网络中移动机器之间的会话密钥交换和相互认证方案
Hyosun Roh, Souhwan Jung
This paper proposes a secure session key exchange and mutual authentication scheme between mobile machines in WLAN-based ad hoc networks. One of the main security challenges for secure machine to machine communication is to accomplish a simple and efficient session key exchange and mutual authentication. The main idea of this paper is that non-interactive session key exchange uses the mobile machine's ID and mutual authentication without communication with an authentication server whenever a data transmission occurs between the mobile machines. The proposed scheme is secure against man-in-the-middle attack, impersonation attack, and modification attack.
提出了一种基于无线局域网的自组织网络中移动设备间安全的会话密钥交换和相互认证方案。安全机器对机器通信的主要安全挑战之一是实现简单有效的会话密钥交换和相互认证。本文的主要思想是,当移动机器之间发生数据传输时,非交互式会话密钥交换使用移动机器的ID和相互身份验证,而无需与身份验证服务器通信。该方案具有抵御中间人攻击、冒充攻击和修改攻击的安全性。
{"title":"Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks","authors":"Hyosun Roh, Souhwan Jung","doi":"10.1109/ICTC.2010.5674797","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674797","url":null,"abstract":"This paper proposes a secure session key exchange and mutual authentication scheme between mobile machines in WLAN-based ad hoc networks. One of the main security challenges for secure machine to machine communication is to accomplish a simple and efficient session key exchange and mutual authentication. The main idea of this paper is that non-interactive session key exchange uses the mobile machine's ID and mutual authentication without communication with an authentication server whenever a data transmission occurs between the mobile machines. The proposed scheme is secure against man-in-the-middle attack, impersonation attack, and modification attack.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Data Transport Block structure design in CPS Middleware Subsystem CPS中间件子系统中的数据传输块结构设计
Jaehyuk Kim, Soo-Hyung Lee, Wontae Kim, Seungmin Park
The DMW(Data-Centric Middleware) in CPS to support for high reliable and Autonomous Controlling Software is the platform that distributes a Publish/Subscribe based real-time data and supply a different QoS(Quality of Service). This paper deals with the DTB(Data Transport Block) in DMW that is to supply high reliable and QoS.
CPS中的DMW(以数据为中心的中间件)支持高可靠性和自治控制软件,是分发基于发布/订阅的实时数据并提供不同的QoS(服务质量)的平台。本文讨论了DMW中的数据传输块(DTB),以提供高可靠性和高服务质量。
{"title":"Data Transport Block structure design in CPS Middleware Subsystem","authors":"Jaehyuk Kim, Soo-Hyung Lee, Wontae Kim, Seungmin Park","doi":"10.1109/ICTC.2010.5674808","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674808","url":null,"abstract":"The DMW(Data-Centric Middleware) in CPS to support for high reliable and Autonomous Controlling Software is the platform that distributes a Publish/Subscribe based real-time data and supply a different QoS(Quality of Service). This paper deals with the DTB(Data Transport Block) in DMW that is to supply high reliable and QoS.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114320592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Control method for the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks 无线传感器网络中检测选择性转发攻击的检查点节点数控制方法
Sang Jin Lee, Ingeol Chun, Wontae Kim, Seungmin Park
Sensor networks are vulnerable to types of Denial-of-Service attacks such as the selective forwarding attack in which an adversary injects the compromised nodes, attempting to either deny these nodes of critical information or to deceive the base station. This attack can suppress or modify critical information such as the movement of enemy forces. However, such type of attacks faces the risk that neighboring nodes will conclude that the compromised node has failed and they will decide to find another route. To detect a selective forwarding attack, Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme (CHEMAS). The check-point nodes are used to detect the area where the selective forwarding attack is generated. However, CHEMAS has the static probability of selecting check-point nodes; it cannot achieve the flexibility to coordinate between the detection capability and energy consumption. This paper proposes a method that determines the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks. In the proposed method, a fuzzy rule-based system is exploited for selecting the checkpoint nodes by considering factors like the remaining energy of each path, the number of suspect nodes and the estimated distance from the BS to each node.
传感器网络容易受到拒绝服务攻击类型的攻击,例如攻击者注入受损节点的选择性转发攻击,试图拒绝这些节点的关键信息或欺骗基站。这种攻击可以压制或修改关键信息,如敌军的移动。然而,这种类型的攻击面临着这样的风险,即相邻节点会得出妥协节点已经失败的结论,并决定寻找另一条路由。为了检测选择性转发攻击,Xiao、Yu和Gao提出了基于检查点的多跳确认方案(CHEMAS)。检查点节点用于检测选择性转发攻击产生的区域。然而,CHEMAS选择检查点节点的概率是静态的;它无法实现检测能力与能耗之间的灵活协调。提出了一种确定无线传感器网络中选择性转发攻击检测检查点节点数的方法。该方法利用基于模糊规则的系统,综合考虑每条路径的剩余能量、可疑节点的数量以及估计到每个节点的距离等因素来选择检查点节点。
{"title":"Control method for the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks","authors":"Sang Jin Lee, Ingeol Chun, Wontae Kim, Seungmin Park","doi":"10.1109/ICTC.2010.5674760","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674760","url":null,"abstract":"Sensor networks are vulnerable to types of Denial-of-Service attacks such as the selective forwarding attack in which an adversary injects the compromised nodes, attempting to either deny these nodes of critical information or to deceive the base station. This attack can suppress or modify critical information such as the movement of enemy forces. However, such type of attacks faces the risk that neighboring nodes will conclude that the compromised node has failed and they will decide to find another route. To detect a selective forwarding attack, Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme (CHEMAS). The check-point nodes are used to detect the area where the selective forwarding attack is generated. However, CHEMAS has the static probability of selecting check-point nodes; it cannot achieve the flexibility to coordinate between the detection capability and energy consumption. This paper proposes a method that determines the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks. In the proposed method, a fuzzy rule-based system is exploited for selecting the checkpoint nodes by considering factors like the remaining energy of each path, the number of suspect nodes and the estimated distance from the BS to each node.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114556717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multi-hop based collection utilizing ZigBee networks for a large-scale active RFID deployment 利用ZigBee网络进行大规模有源RFID部署的基于多跳的采集
Hyuntae Cho, Sanghyun Son, Yunju Baek
RFID (Radio Frequency Identification) is an automatic identification technology where information is carried by radio waves. The active type of RFID focuses on a long communication range while the passive type focuses on a low cost for a number of dense deployments. Nevertheless, the active type cannot be applied to a large-scale area due to its limited radio communication. This paper proposes a multi-hop based collection utilizing ZigBee networks for a large-scale active RFID deployment. The proposed method uses a collection agent on ZigBee networks to extend the coverage of the RFID reader and collect RFID tags outside its communication range. This paper also includes an experiment and a performance evaluation. To evaluate the performance of the proposed method, we implemented an RFID system, which complies with a standard of 433MHz active RFIDs based on ISO/IEC 18000-71.
RFID(无线射频识别)是一种通过无线电波传输信息的自动识别技术。有源类型的RFID侧重于较长的通信范围,而无源类型侧重于低成本的大量密集部署。然而,有源型由于其无线电通信有限,不能应用于大面积区域。本文提出了一种基于ZigBee网络的多跳采集方法,用于大规模有源RFID部署。该方法在ZigBee网络上使用收集代理来扩展RFID读写器的覆盖范围,并在其通信范围之外收集RFID标签。本文还包括实验和性能评估。为了评估该方法的性能,我们实现了一个RFID系统,该系统符合基于ISO/IEC 18000-71的433MHz有源RFID标准。
{"title":"Multi-hop based collection utilizing ZigBee networks for a large-scale active RFID deployment","authors":"Hyuntae Cho, Sanghyun Son, Yunju Baek","doi":"10.1109/ICTC.2010.5674693","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674693","url":null,"abstract":"RFID (Radio Frequency Identification) is an automatic identification technology where information is carried by radio waves. The active type of RFID focuses on a long communication range while the passive type focuses on a low cost for a number of dense deployments. Nevertheless, the active type cannot be applied to a large-scale area due to its limited radio communication. This paper proposes a multi-hop based collection utilizing ZigBee networks for a large-scale active RFID deployment. The proposed method uses a collection agent on ZigBee networks to extend the coverage of the RFID reader and collect RFID tags outside its communication range. This paper also includes an experiment and a performance evaluation. To evaluate the performance of the proposed method, we implemented an RFID system, which complies with a standard of 433MHz active RFIDs based on ISO/IEC 18000-71.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115770622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Diameter-based AAA architecture to support small AAA client 基于直径的AAA架构,支持小型AAA客户端
Man Yup Lee, Tai-Myung Chung
The rapid development of wireless and the advent of fixed mobile convergence have brought deployment of small wireless environment such as femtocell, which can connect Internet or network easily at home and office. Users must be authenticated from the Authentication, Authorization and Accounting (AAA) server to use the Internet or network at home and office. As diameter-based AAA uses TCP/SCTP at the transport, the diameter-based AAA server will have a limit on the number of clients if the interworking of small clients increases. Consequently, the performance will reach its peak and therefore the extension or enlargement of server will be required. This paper proposes an efficient interworking method between diameter-based clients, agent and server upon study of AAA mechanism.
无线技术的快速发展和固定移动融合的出现,带来了小型无线环境的部署,如femtocell,可以轻松地在家庭和办公室连接互联网或网络。用户必须通过AAA (Authentication, Authorization and Accounting)服务器的认证才能在家庭和办公室使用Internet或网络。由于基于直径的AAA在传输中使用TCP/SCTP,如果小客户端的互连增加,基于直径的AAA服务器将限制客户端的数量。因此,性能将达到峰值,因此需要扩展或扩大服务器。本文在研究AAA机制的基础上,提出了一种基于直径的客户端、代理和服务器之间的高效互连方法。
{"title":"Diameter-based AAA architecture to support small AAA client","authors":"Man Yup Lee, Tai-Myung Chung","doi":"10.1109/ICTC.2010.5674775","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674775","url":null,"abstract":"The rapid development of wireless and the advent of fixed mobile convergence have brought deployment of small wireless environment such as femtocell, which can connect Internet or network easily at home and office. Users must be authenticated from the Authentication, Authorization and Accounting (AAA) server to use the Internet or network at home and office. As diameter-based AAA uses TCP/SCTP at the transport, the diameter-based AAA server will have a limit on the number of clients if the interworking of small clients increases. Consequently, the performance will reach its peak and therefore the extension or enlargement of server will be required. This paper proposes an efficient interworking method between diameter-based clients, agent and server upon study of AAA mechanism.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132414403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Virtualized programmable platform: Accommodating multiple, heterogeneous architectures in a single infrastructure 虚拟化可编程平台:在单个基础设施中容纳多个异构体系结构
M. Shin, Hyoungjun Kim
Future Internet researches revolve around the notion “Architecture”. Architecture can be defined as the set of principles and basic mechanisms that guide network engineering. Historically, informal architectural ideas guided design of the Internet protocols, but the architecture was formalized later. The today's Internet architecture is under serious reconsideration and people started thinking about alternatives. It is necessary to support a variety of the new different architectures to accommodate the heterogeneity of Future Internet. In the paper, we discuss new challenges on virtualized programmable platform and discuss a new way forward for accommodating the multiple, heterogeneous architectures in a single infrastructure.
未来的互联网研究将围绕“架构”这一概念展开。体系结构可以定义为指导网络工程的一组原则和基本机制。从历史上看,非正式的体系结构思想指导了Internet协议的设计,但是体系结构后来才正式形成。今天的互联网架构正在受到认真的反思,人们开始考虑替代方案。有必要支持各种不同的新架构,以适应未来互联网的异构性。在本文中,我们讨论了虚拟化可编程平台的新挑战,并讨论了在单一基础设施中容纳多个异构体系结构的新方法。
{"title":"Virtualized programmable platform: Accommodating multiple, heterogeneous architectures in a single infrastructure","authors":"M. Shin, Hyoungjun Kim","doi":"10.1109/ICTC.2010.5674787","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674787","url":null,"abstract":"Future Internet researches revolve around the notion “Architecture”. Architecture can be defined as the set of principles and basic mechanisms that guide network engineering. Historically, informal architectural ideas guided design of the Internet protocols, but the architecture was formalized later. The today's Internet architecture is under serious reconsideration and people started thinking about alternatives. It is necessary to support a variety of the new different architectures to accommodate the heterogeneity of Future Internet. In the paper, we discuss new challenges on virtualized programmable platform and discuss a new way forward for accommodating the multiple, heterogeneous architectures in a single infrastructure.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131104797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The design of communication infrastructures for smart DAS and AMI 智能DAS和AMI通信基础设施设计
Nogil Myoung, Younghyun Kim, Sang-Yeom Lee
Information and communication technologies (ICT) play a pivotal role in SmartGrid. However, the current ICT infrastructures do not fully support real-time, secure and reliable communications and do not accommodate requirements of new SmartGrid services. According to that, power utilities do their best to construct upgraded communication networks for SmartGrid. The intent of this paper is to introduce KEPCO's field area network (FAN) architecture and research for smart distribution automation system (DAS) and advanced metering infrastructure (AMI).
信息和通信技术(ICT)在智能电网中发挥着关键作用。然而,目前的ICT基础设施不能完全支持实时、安全和可靠的通信,也不能适应新的智能电网服务的要求。据此,电力公司正在全力为智能电网建设升级的通信网络。本文介绍了韩国电力的场域网络(FAN)体系结构,并对智能配电自动化系统(DAS)和先进计量基础设施(AMI)进行了研究。
{"title":"The design of communication infrastructures for smart DAS and AMI","authors":"Nogil Myoung, Younghyun Kim, Sang-Yeom Lee","doi":"10.1109/ICTC.2010.5674796","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674796","url":null,"abstract":"Information and communication technologies (ICT) play a pivotal role in SmartGrid. However, the current ICT infrastructures do not fully support real-time, secure and reliable communications and do not accommodate requirements of new SmartGrid services. According to that, power utilities do their best to construct upgraded communication networks for SmartGrid. The intent of this paper is to introduce KEPCO's field area network (FAN) architecture and research for smart distribution automation system (DAS) and advanced metering infrastructure (AMI).","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133406131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2010 International Conference on Information and Communication Technology Convergence (ICTC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1