• Title/Summary/Keyword: 가네트

Search Result 759, Processing Time 0.028 seconds

Leakage Monitoring Model by Demand Pattern Analysis in Water Distribution Systems (상수도 수요량 패턴분석을 통한 누수감지 모형)

  • Kim, Ju-Hwan;Lee, Doo-Jin;Choi, Doo-Youg;Bae, Cheol-Ho;Park, Su-Wan
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.479-483
    • /
    • 2012
  • 최근 국내외에서 기상이변에 따른 물 부족에 대응하고 먹는 물의 생산과 공급 효율성 향상을 위하여 스마트워터그리드에 대한 연구가 활발히 진행되고 있는 경향으로 이는 상수도 인프라시설의 운영오류, 자연재해, 사이버를 통한 의도적 공격 등에 대해 안전하고 신뢰성이 높은 시스템을 구축하기 위한 것이다. 또한 상수도 분야에서는 스마트 미터링 개념을 도입하여 상수관망에서 발생되는 각종 사고나 물 손실을 저감하기 위한 노력이 시도되고 있는 실정이다. 일반적으로 누수량이 많을 경우에는 누수의 징후가 지표면에서 확인이 가능하나 미세한 경우 탐사장비의 운영이나 인력의 투입을 통해 가능하다. 물 공급계통인 상수관망에서 물 손실을 저감시키기 위한 방법중 하나로서 수도미터로부터 기록되는 물 사용량 데이터를 이용하여 누수패턴을 추출함으로써 누수감시가 가능하도록 하는 모형을 개발하고자 하였다. 이는 탐사장비에 의한 누수감지와 상호 보완적을 활용할 수 있는 것으로서 사용량 자료를 분석하여 사전에 처리된 자료의 노이즈와 결함 있는 계측값을 필터링시키는 기법이 도입된 것이며 신속한 감지를 통해 누수 지속시간을 감소시킴으로서 누수량의 저감을 목표로 한다. 물 공급 네트워크를 보다 더 효율적 만들 수 있는 누수 감시모형은 상수관망의 운영에 필요한 정보를 도출하기 위하여 보다 정확하고 다양한 수학적 및 통계적 분석을 기반으로 구성되어 누수 외에도 각종 결함을 찾아내는 역할을 수행할 수 있다. 향후 다양한 지역을 이러한 수용가의 물 사용량 미터링 결과를 토대로 실제 사용량과 누수량을 분리하여 분석함으로써 국내 실정에 적합한 누수감시 기술배발 토대를 마련할 수 있을 것으로 판단되며, 누수저감을 위한 실질적인 상수관망의 운영관리 효율향상의 정보로서 활용이 가능할 것으로 판단된다.

  • PDF

A Video Quality Control Scheme Based on Content Characteristics for Improving QoE in DASH Environments (DASH 환경에서 QoE 향상을 위한 콘텐츠 특성 기반의 비디오 품질 조절 기법)

  • Youn, Kimyung;Chung, Kwangsue
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1039-1048
    • /
    • 2015
  • Recently, the web-based adaptive streaming service, DASH (Dynamic Adaptive Streaming over HTTP), is receiving more attention. However, existing network-based and buffer-based video quality control schemes in DASH environments make oscillation of segment throughput, causing degradation of the quality of experience (QoE) with frequent quality changes and playback interruptions because these schemes do not consider the content characteristics. In this paper, we propose a C-DASH (Content Characteristics based Dynamic Adaptive Streaming over HTTP) scheme in order to improve the QoE in DASH environments. The C-DASH scheme performs seamless and smooth quality control based on the segment throughput, buffer status, and segment size of the content. Based on simulation results, it is confirmed that the C-DASH scheme can improve the QoE, when compared with the existing quality control schemes.

Cooperative Communications Based on Virtual MIMO Transmission for Vehicles (네트워크 코딩을 활용한 가상 다중 안테나 시스템 기반 차량용 협력 통신 기술)

  • Kim, Ilhwan;Kim, Junghyun;Ji, Soonbae;You, Cheolwoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.17-22
    • /
    • 2015
  • In this paper, we propose a cooperative vehicle communication scheme for high transmission efficiency and coverage extension under multipath fading environment of moving vehicle networks. The proposed scheme uses a Network coding scheme for improvement of receiving performance by using virtual Multiple-Input Multiple-Output(MIMO) transmit diversity. Simulation results have shown that the proposed scheme also provides alleviated Inter Symbol Interference(ISI) and Inter Channel Interference(ICI) as well as Signal-to-Noise Ratio(SNR) improvement and improve 3dB compared to the conventional scheme, since it can utilize the good properties of spatial diversity and coding gain by using virtual MIMO configuration. In this paper, we propose simulations of Ultra-Wideband(UWB) communication system to show validity by using the MATLAB.

A Study on the Web Application for Sailing Ship Location Information interface based by RIA (RIA기반의 선박항해정보를 위한 웹 애플리케이션 구축 "평택항 원양어선 항해정보현황 사례를 중심으로")

  • Jung, Hoe-Jun;Park, Dea-Woo;Han, Kyung-Don
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.613-616
    • /
    • 2009
  • Information present condition is using situation board by manual processing that is consisted of ship arrangement plan and letterpress and magnet etc. in Pyeongtaekhang's deep-sea fishing vessel company. Study that mark open sea far from land ship information of underway 37 ships that is accepted in every time in internet web application environment that is based on Ubiquitous Network in PC that is linked to internet. 3 through practical use of RIA of Flash technology base compose Digital Dash-Board in width grid structure only and do ship sailing addition that is operating in 6 oceans and latitude, hardness indication as well as various informations to do visual display do. Emphasized in dynamic Web Application construction because can heighten the convenience to operator and user, and take advantage of real time data.

  • PDF

Privacy-Preserving Aggregation of IoT Data with Distributed Differential Privacy

  • Lim, Jong-Hyun;Kim, Jong-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.65-72
    • /
    • 2020
  • Today, the Internet of Things is used in many places, including homes, industrial sites, and hospitals, to give us convenience. Many services generate new value through real-time data collection, storage and analysis as devices are connected to the network. Many of these fields are creating services and applications that utilize sensors and communication functions within IoT devices. However, since everything can be hacked, it causes a huge privacy threat to users who provide data. For example, a variety of sensitive information, such as personal information, lifestyle patters and the existence of diseases, will be leaked if data generated by smarwatches are abused. Development of IoT must be accompanied by the development of security. Recently, Differential Privacy(DP) was adopted to privacy-preserving data processing. So we propose the method that can aggregate health data safely on smartwatch platform, based on DP.

The prevent method of data loss due to differences in bit rate between heterogeneous IoT devices (이기종 IoT 장치간의 데이터 전송 속도 차이로 인한 데이터 손실 방지 기법)

  • Seo, Hyungyoon;Park, Jung Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.7
    • /
    • pp.829-836
    • /
    • 2019
  • IoT devices are widely used in network construction and are increasing. If necessary, heterogeneous IoT devices are used for data transmission. This paper proposes to prevent the method of data loss due to differences in throughput when the local network is constructed by Bluetooth 5 and long range network does by LoRa(Long Range). Data loss occur when the data transmits through LoRa, due to the throughputs of Bluetooth 5 faster than that of LoRa. The prevent method proposed by this paper can apply not only Bluetooth 5 and LoRa but heterogeneous IoT devices and expect to prevent data loss due to differences in throughput between heterogeneous IoT devices. Also, this paper shows the simulation result by applying the proposed avoid method. In this paper, two way to the preventive method shows the data transmission ratio and amount of memory that of necessity.

Paradigm Shift and Response Strategies for Spatial Information in a Hyper-connected Society (초연결 시대 공간정보 패러다임 변화와 대응전략)

  • SAKONG, Ho-Sang
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.4
    • /
    • pp.81-90
    • /
    • 2018
  • The 'Hyper-connected society' in which all objects such as people, device, place are connected via networks and share information being realized. As the information and communication environment changes, spatial information also faces a significant challenge. Korean government is striving to meet the social demand for spatial information that will bring 'Hyper-connectivity' such as autonomous vehicles, drones. Until now, however, it has only partially responded to urgent demand and has not prepared a fundamental countermeasure. In order to effectively and actively respond to the demand for spatial information that is needed in the Hyper-connected society, a strategy that can lead to mid- to long-term fundamental changes is needed. The purpose of this study is to analyze the future demand and application characteristics of spatial information confronted with a big paradigm shift called 'Hyper-connected society', and to search spatial information strategy that can cope with the demand of spatial information in future society.

Network Slice Selection Function on M-CORD (M-CORD 기반의 네트워크 슬라이스 선택 기능)

  • Rivera, Javier Diaz;Khan, Talha Ahmed;Asif, Mehmood;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.21 no.2
    • /
    • pp.35-45
    • /
    • 2018
  • As Network Slicing functionality gets applied to mobile networking, a mechanism that enables the selection of network slices becomes indispensable. Following the 3GPP Technical Specification for the 5G Architecture, the inclusion of the Network Slice Selection Function (NSSF) in order to leverage the process of slice selection is apparent. However, actual implementation of this network function needs to deal with the dynamic changes of network instances, due to this, a platform that supports the orchestration of Virtual Network Functions (VNF) is required. Our proposed solution include the use of the Central Office Rearchitected as a Data Center (CORD) platform, with the specified profile for mobile networks (M-CORD) that integrates a service orchestrator (XOS) alongside solutions oriented to Software Defined Networking (SDN), Network Function Virtualization (VNF) and virtual machine management through OpenStack, in order to provide the right ecosystem where our implementation of NSSF can obtain slice information dynamically by relying on synchronization between back-end services and network function instances.

Comparison of online video(OTT) content production technology based on artificial intelligence customized recommendation service (인공지능 맞춤 추천서비스 기반 온라인 동영상(OTT) 콘텐츠 제작 기술 비교)

  • CHUN, Sanghun;SHIN, Seoung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.99-105
    • /
    • 2021
  • In addition to the OTT video production service represented by Nexflix and YouTube, a personalized recommendation system for content with artificial intelligence has become common. YouTube's personalized recommendation service system consists of two neural networks, one neural network consisting of a recommendation candidate generation model and the other consisting of a ranking network. Netflix's video recommendation system consists of two data classification systems, divided into content-based filtering and collaborative filtering. As the online platform-led content production is activated by the Corona Pandemic, the field of virtual influencers using artificial intelligence is emerging. Virtual influencers are produced with GAN (Generative Adversarial Networks) artificial intelligence, and are unsupervised learning algorithms in which two opposing systems compete with each other. This study also researched the possibility of developing AI platform based on individual recommendation and virtual influencer (metabus) as a core content of OTT in the future.

Network Attack Detection based on Multiple Entropies (다중 엔트로피를 이용한 네트워크 공격 탐지)

  • Kim Min-Taek;Kwon Ki Hoon;Kim Sehun;Choi Young-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.71-77
    • /
    • 2006
  • Several network attacks, such as distributed denial of service (DDoS) attack, present a very serious threat to the stability of the internet. The threat posed by network attacks on large networks, such as the internet, demands effective detection method. Therefore, a simple intrusion detection system on large-scale backbone network is needed for the sake of real-time detection, preemption and detection efficiency. In this paper, in order to discriminate attack traffic from legitimate traffic on backbone links, we suggest a relatively simple statistical measure, entropy, which can track value frequency. Den is conspicuous distinction of entropy values between attack traffic and legitimate traffic. Therefore, we can identify what kind of attack it is as well as detecting the attack traffic using entropy value.