The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] management system(29hit)

21-29hit(29hit)

  • Distributed Optical Fiber Strain Sensor for Detecting River Embankment Collapse

    Mitsuru KIHARA  Katsumi HIRAMATSU  Masaki SHIMA  Shigeru IKEDA  

     
    PAPER

      Vol:
    E85-C No:4
      Page(s):
    952-960

    We have developed a distributed optical fiber strain sensor for detecting the collapse of river embankments. The sensor uses a Brillouin optical time domain reflectometer (BOTDR) and consists of an optical fiber cable and pieces of nonwoven cloth. Pieces of cloth are fixed to the cable at 1.5-meter intervals and it is then embedded in a U-shaped configuration in a river embankment. The pieces of cloth are displaced when there is movement of the soil in which they are embedded. If one of two adjacent pieces of cloth remains stationary while the other moves, the optical fiber between the two pieces is stretched. The collapse of an embankment can be detected by using a BOTDR to monitor any such stretching in the 1.5-m lengths of fiber. The developed sensor operates at a sensitivity of 0.025%/kgf, which is equivalent to 0.067%/mm, and is thus capable of detecting soil movements of a few mm in river embankments. The sensor is also able to provide effective advance warning of the collapse of a river embankment resulting from water penetration. We subjected the sensor system to field tests that demonstrated the effectiveness of its construction and its long-term stability. The developed sensor system is an effective tool for use in river management systems of the very near future.

  • Assurance Technology for Growing System and Its Application to Tokyo Metropolitan Railway Network

    Kazuo KERA  Keisuke BEKKI  Kazunori FUJIWARA  Keiji KAMIJYO  Fumio KITAHARA  

     
    PAPER-Railway System

      Vol:
    E84-D No:10
      Page(s):
    1341-1349

    System needs of growing systems including heterogeneous functions and operations are increased. High assurance system that achieves high reliability and high availability is very important for such systems. In order to realize high assurance system, we developed the assurance technology based on ADS (Autonomous Decentralized System). When a growing system changes or grows, its reliability may be lowered. In this paper, we clarify the risk factors which lower the reliability and quality of a growing system when the system is modified. We will then examine the technology to eliminate or mitigate those risk factors, and propose adaptive assurance technology that can minimize the risk. We also applied this technology to ATOS for Tokyo Metropolitan Railway Network as an example of really changing and growing system and mention its effectiveness. ATOS; Autonomous Decentralized Transport Operation Control System.

  • Partial Extension Package for the Flexible Customization of a Network Management Information Model

    Tetsuo OTANI  Yoshikazu YAMAMOTO  

     
    PAPER-Network Management/Operation

      Vol:
    E84-B No:7
      Page(s):
    1897-1906

    A knowledge gap between network operators and system developers in Network Management System (NMS) construction has widened. This has been caused by an expansion of supported business processes and increasingly sophisticated network management functions. This gap makes system development costly and time consuming. Function development, led by operators, is a promising solution to the problems caused by the gap. This type of development should not require an operator to know how to develop NMS. Standard objects may be used to meet this requirement and save time and the cost of NMS construction. However, they are not sufficient to design functions supporting some tasks that are for providing custom services. In this paper, we propose a partial extension package, composed of several object classes. This package is attached to the standard objects to design a custom function. Information processing in a new function can be added, and easily modified, using this package. This package specifies states that invoke the information processing. It also includes objects that add new data without changing standard objects. It makes use of several design patterns in order to weaken coupling to the standard objects. We have applied this package to two programs. One plans maintenance tasks schedules, the other sets threshold values for quality of service. We made use of software metrics to measure their performance in terms of flexibility. The results show that the proposed package continues to make it possible to reuse the standard objects, and makes it easy to modify the behavior of a new function.

  • Assurance System Technologies Based on Autonomous Decentralized System for Large Scale Transport Operation Control System

    Kazuo KERA  Keisuke BEKKI  Kazunori FUJIWARA  Fumio KITAHARA  Keiji KAMIJO  

     
    PAPER-Novel Applications

      Vol:
    E83-B No:5
      Page(s):
    1085-1093

    A large-scale primarily public system requires in addition to high reliability, a broad range of applications from control to information services. As construction is phased-in this system must be flexible, changeable and able to grows as the needs arise. However, a changing a system may lead to loss of reliability. A system that is able to change and grow in a reliable and stable manner is called an assurance system and the technology it uses is called assurance technology. This paper describes the basic technology, phased-in system construction and so on of assurance technology based on an autonomous decentralized system. It further discusses application of assurance technology to ATOS as an example of a large-scale transport operation control system. Note: ATOS; Autonomous Decentralized Transport Operation Control System

  • Projecting Risks in a Software Project through Kepner-Tregoe Program and Schedule Re-Planning for Avoiding the Risks

    Seiichi KOMIYA  Atsuo HAZEYAMA  

     
    PAPER-Theory and Methodology

      Vol:
    E83-D No:4
      Page(s):
    627-639

    There are the following three targets to be achieved in a software project from the three viewpoints of process management (or progress management), cost management, and quality management for software project to be successful: (a) drafting a software development plan based on accurate estimation, (b) early detection of risks that the project includes based on correct situation appraisal, (c) early avoidance of risks that the project includes. In this paper, the authors propose a method and facilities to project risks in a software project through Kepner-Tregoe program, and propose schedule re-planning by using genetic algorithm for avoiding the projected risks. Furthermore the authors show, from the results of execution of the system, that the system is effective in early avoidance of risks that the software project includes.

  • An Authorization Model for Object-Oriented Databases and Its Efficient Access Control

    Toshiyuki MORITA  Yasunori ISHIHARA  Hiroyuki SEKI  Minoru ITO  

     
    PAPER-Databases

      Vol:
    E81-D No:6
      Page(s):
    521-531

    Access control is a key technology for providing data security in database management systems (DBMSs). Recently, various authorization models for object-oriented databases (OODBs) have been proposed since authorization models for relational databases are insufficient for OODBs because of the characteristics of OODBs, such as class hierarchies, inheritance, and encapsulation. Generally, an authorization is modeled as a set of rights, where a right consists of at least three components s, o, t and means that subject s is authorized to perform operation t on object o. In specifying authorizations implicitly, inference rules are useful for deriving rights along the class hierarchies on subjects, objects, and operations. An access request req=(s,o,t) is permitted if a right corresponding to req is given explicitly or implicitly. In this paper, we define an authorization model independent of any specific database schemas and authorization policies, and also define an authorization specification language which is powerful enough to specify authorization policies proposed in the literature. Furthermore, we propose an efficient access control method for an authorization specified by the proposed language, and evaluate the proposed method by simulation.

  • Competitive Telecommunications Management and System Development

    Masayoshi EJIRI  

     
    INVITED PAPER

      Vol:
    E80-B No:6
      Page(s):
    805-810

    Rapid advancing technology and customer demand for sophisticated services are driving the global telecommunications environment into fully competitive and multi service providers environment. To cope with this new environment successfully, open network and open telecommunication management are essential. Telecommunication management is becoming more and more important to realize flexible and dynamic telecommunication services. This paper first gives a view of the new environment in the telecommunication industry and discusses the direction to be taken by service providers. Then, a concept of multi-domain management is proposed to meet a dynamically changing environment. Finally, the paper describes the subjects for the development of telecommunication management system and suggests that a competition based on harmony between the users, service providers and vendors is needed to make customers satisfied with telecommunication services.

  • Algebraic Approaches for Nets Using Formulas to Describe Practical Software Systems

    kazuhito OHMAKI  Yutaka SATO  Ichiro OGATA  Kokichi FUTATSUGI  

     
    PAPER

      Vol:
    E76-A No:10
      Page(s):
    1580-1590

    We often use data flow diagrams or state transition diagrams to design software systems with concurrency. We call those diagrams as nets in this paper. Semantics of any methods to describe such software systems should be defined in some formal ways. There would be no doubts that any nets should be supported by appropriate theoretical frameworks. In this paper, we use CCS as a typical algebraic approach of using formulas to express concurrent behaviors and point out the different features of CCS from Petri nets. Any approaches should be not only theoretically beautiful but also practically useful. We use a specification language LOTOS as such example which has two features, CCS and ADT, and is designed to specify practical communication protocols. Algebraic approaches of using formulas, like LOTOS, can be considered as a compact way to express concurrent behaviors. We explore our discussions of net-oriented approaches into UIMS research fields. After mentioning state transition models of UIMS, we exemplify a practically used example, VIA-UIMS, which has been developed by one of authors. VIA-UIMS employs a net-oriented architecture. It has been designed to reconstuct tools which have already been widely used in many sites.

  • Distributed Systems Management for OSI Environment: System Configuration, Communication Methods and Their Behavior

    Seung-Seob PARK  Norio SHIRATORI  Shoichi NOGUCHI  

     
    PAPER

      Vol:
    E75-B No:8
      Page(s):
    691-700

    As the size and complexity of network increases, the distributed systems management (DSM) will be vital in order to improve the availability of network management, to reduce the complexity of network operations, and to provide the high reliability. In this paper, we (1) describe general requirements required for systems management in distributed environment, (2) introduce the basic structure of distributed network management system (DNMS) for efficient network management, and also especially illustrate the concrete design of system management application process which is an important element among them, (3) propose the connectionless CMIP to accomplish for effectively managing the distributed management system, and indicate its efficiency; this protocol is available to manage dynamically changing DSM environment, to negotiate among the managing systems, to handle the dynamic informations etc. Finally, (4) the behavior and software structure of a suggested management system during negotiation to execute the received request for implementation are presented.

21-29hit(29hit)