• Title/Summary/Keyword: 경로 재설정

Search Result 247, Processing Time 0.035 seconds

Analysis of Determinants on Residential Resettlement in Accordance with Urban Regeneration (도시재생에 따른 주거재정착 결정요인 분석)

  • Choi, Yeol;Yim, Ha Kyoung;Jang, Won Ho
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.3D
    • /
    • pp.409-418
    • /
    • 2009
  • The aim of this study is to analyze the evaluations and determinants on residential resettlements in accordance with urban regeneration by 7,396 samples from 19 housing redevelopment districts in Busan. The major finding on determinants on residential resettlements in accordance with urban regeneration are as follows; A binary logit model for determinants on residential resettlements in accordance with urban regeneration are composed of owner's characteristics, land and building characteristics, housing complex characteristics, and location characteristics. The significant variables in relation to owner's characteristics are owner's age, owner's place of residence, the possession period against property and investment intention. As a result of logit model for residential resettlements, it shows that the variables in relation to land and building characteristics are the land classification, the use of building, the size of land or building, the permission of building and the appraisal price on land and building. This result means that actual customer's investment connects to resettlement after redevelopment project. The other side, the housing complex variables consist of the brand of construction company, the ratio of large size housing and floor are ratio shows that improvable conditions for housing value are important factor to induce residence's resettlement. The location variables show that Dongbusan has higher probability, the reverse Jungbusan has lower probability in residential resettlement likewise residential preference.

A Test Scenario Generation Technique based on Task Information for Interaction Testing among Android Components (안드로이드 컴포넌트 상호작용 테스팅을 위한 태스크 정보기반 테스트 시나리오 생성 기법)

  • Baek, Tae-San;Lee, Woo Jin
    • Journal of KIISE
    • /
    • v.44 no.6
    • /
    • pp.595-600
    • /
    • 2017
  • Android applications are composed of one or more components. The components within an application or several applications may interact with each other primarily through intents. Such interactions may cause security and reliability issues such as broadcast theft, activity hijacking, and intent spoofing. These problems need to be resolved through testing techniques using various interaction test scenarios before an application gets launched. However, with the existing test scenario generation approach, some infeasible test scenarios may be generated since they do not consider the re-execution order based on activity setting when pressing the back button. This paper proposes a test case generation technique which removes infeasible interaction paths by utilizing the activity stack information.

A Study on the Analysis and Evaluation for the Life-cycle Model of Digital Content (디지털 콘텐츠 수명주기 모델 분석 및 평가에 관한 연구)

  • Kwak, Seung-Jin;Sung, Won-Kyung;Bae, Kyung-Jae
    • Journal of Information Management
    • /
    • v.42 no.1
    • /
    • pp.25-46
    • /
    • 2011
  • This study aims to identify the core life-cycle elements for archiving digital content through analyzing the existing digital content life-cycle models and suggest the remedies for management the digital content of KISTI after a comparative study. As a result, the 10 core life-cycle categories consisted of 31 small elements were defined. Furthermore, the recommendations that digital content archiving should be set as a critical mission and archiving policy should be prepared in KISTI were proved.

The Location Estimation Method through Snooping Node for Indoor Environment (실내에서 보정노드를 통한 위치추정 기법)

  • Park, Hyun-Moon;Shin, Soo-Young;NamGung, Jung-Il;Park, Soo-Huyn
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.2
    • /
    • pp.182-196
    • /
    • 2008
  • The location estimation using sensor network has been considerably researched. The methods taking the differences of the forms of location estimation between indoors and outdoors into consideration have been studied. While it is possible for outdoor location to be estimated because outdoor location estimation has a consistent distribution during unit period through the value of RSSI(Received Signal Strength Indication) on outdoor location estimation, Indoor location estimation is difficult since multi-path and interference indoors are higher than those outdoors and indoor location estimation can be affected by other factors. In this paper, we revise the information of RSSI changed by multi-path and interference through the Moving Average method and K-means algorithm and propose the method of estimation for the value of RSSI with reliability in the group of signals received during unit period. We also suggest the way to put some weights on fixed nodes in network using a snooping node on location estimation and then evaluate the efficiency of location awareness as compared with the existing method by implementing proposed method on system through the reconfiguration of network.

  • PDF

Application for en-Route mission to Decentralized Task Allocation (경로가 주어진 임무 상황에서 분산 임무할당 알고리즘의 적용 방안 연구)

  • Kim, Sung-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.156-161
    • /
    • 2020
  • In an environment that operates multiple UAVs, the use of a decentralized task allocation algorithm has more robustness from a single failure of UAV on the mission because there is no central command center. In addition, UAVs have situational awareness and redistribute tasks among themselves, which can expand the mission range. The use of multiple UAVs in a mission has increased as the agent hardware has decreased in size and cost. The decentralized mission-planning algorithm has the advantages of a larger mission range and robustness to a single failure during the mission. This paper extended the type of mission the uses CBBA, which is the most well-known decentralized task allocation algorithm, to the point mission and en-route mission. This will describe the real mission situation that has the purpose of surveillance. A Monte-Carlo simulation was conducted in the case of multiple agents in the task-rich environment, and the global rewards of each case were compared.

Service Function Chaining Architecture for Distributed 5G Mobile Core Networks (분산 모바일 코어기반 5G 네트워크에서의 Service Function Chaining 적용구조)

  • Sun, Kyoungjae;Kim, Younghan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1914-1924
    • /
    • 2016
  • In this paper, considering virtualized Evolved Packet Core(vEPC) network for 5G mobile network, we propose architecture for supporting Service Function Chaining(SFC) in 5G mobile network. Using SFC in 5G network, dynamic path configuration and providing network services based on subscriber and traffic information. SFC technology provides logical ordered set of network functions and delivers packet through providing logical path over the physical network. Based on the perspective of 5G core network in distributed manner, we design hierarchical SFC architecture to manage SFC for global path including vEPC and SGi-LAN network, and internal path between virtualized network functions in each cloud. In this paper, we define architecture and call flow for establishing data path using SFC. Finally, we design testbed architecture for real implementation based on open source software.

A Study on Security Container to Prevent Data Leaks (정보 유출 방지를 위한 보안 컨테이너의 효과성 연구)

  • Lee, Jong-Shik;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1225-1241
    • /
    • 2014
  • Recently, Financial companies implement DLP(Data Leaks Prevention) security products and enforce internal controls to prevent customer information leaks. Accidental data leaks in financial business increase more and more because internal controls are insufficient. Security officials and IT operation staffs struggle to plan countermeasures to respond to all kinds of accidental data leaks. It is difficult to prevent data leaks and to control information flow in business without research applications that handle business and privacy information. Therefore this paper describes business and privacy information flow on applications and how to plan and deploy security container based OS-level and Hypervisor virtualization technology to enforce internal controls for applications. After building security container, it was verified to implement internal controls and to prevent customer information leaks. With security policies additional security functions was implemented in security container and With recycling security container costs and time of response to security vulnerabilities was reduced.

Channel Aware Reliable Routing Protocol in Wireless Multimedia Sensor Networks (무선 멀티미디어 센서네트워크에서 신뢰성향상을 위한 채널상태기반 경로설정 프로토콜)

  • Cho, Byeong Seok;Lee, Juhyeon;Park, Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.2
    • /
    • pp.459-465
    • /
    • 2014
  • Recently, multimedia data transmission becomes important issues in the wireless sensor network. For the multimedia data transmission in wireless sensor network, QoS (Quality of service) is an important factor to determine the system performance. AODV algorithm is one of the widely used algorithm for wireless ad-hoc environment. In AODV, the destination node selects the route with the smallest hop count. Since AODV only considers the hop count, the selected route could have low channel condition, and degrade QoS. In this paper, we propose a modified AODV algorithm that considers the successful transmission rate of each link. The proposed algorithm regards the number of retransmission which can be obtained from the successful transmission rate as the hop count, and applies the modified hop count to AODV. The advantage of the proposed algorithm is that the modified AODV can support QoS without significant change of the conventional algorithm.

Power and Location Information based Routing Protocol Design in Wireless Sensor Networks (무선 센서 네트워크에서 전력과 위치정보 기반 라우팅 프로토콜 디자인)

  • Son Byung-Rak;Kim Jung-Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.2
    • /
    • pp.48-62
    • /
    • 2006
  • In recent years, wireless sensor networks(WSNs) have emerged as a new fast-growing application domain for wireless distributed computing and embedded systems. Recent Progress in computer and communication technology has made it possible to organize wireless sensor networks composed tiny sensor nodes. Furthermore, ad-hoc network protocols do not consider the characteristics of wireless sensor nodes, making existing ad-hoc network protocols unsuitable for the wireless sensor networks. First, we propose power-aware routing protocols based on energy-centered routing metrics. Second, we describe power management techniques for wireless sensor nodes using the spatial locality of sensed data. Many nodes can go into a power-down mode without sacrificing the accuracy of sensed data. Finally, combining the proposed techniques, we describe an overall energy-efficient protocol for data collection. Experimental results show that the proposed routing protocol can extend the routing path lifetime more than twice. The average energy consumption per sensing period is reduced by up to 30%.

  • PDF

Relationship Between Tool Rotating Speed and Properties of Friction Stir Welded Al 6005-T6 (알루미늄 합금 (Al6005-T6)의 마찰교반접합 시 공구의 회전속도와 접합 특성의 상관관계 연구)

  • Choi, Dooho
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.94-99
    • /
    • 2019
  • Friction stir welding was first reported by TWI(The Welding Institute) in 1991, and this welding method has been rapidly used in various industrial areas such railway, automobile, aerospace and shipbuilding industry. Here, we study core characteristics of friction stir welding (FSW) applied to Al 6005-T6 extruded sheets, which is the typical alloy used for railway car bodies. With the fixed welding speed of 500 mm/min, the rotating tool speed was varied from 600 to 1800 RPM. The results of hardness measurement revealed that the hardness of nugget area is ~70% with respect to the parent material, and for the selected range of rotation speed, no clear dependence was observed and the hardness values close to the parent materials were achieved for the area located 5 mm away from the welding interface. The tension test shows that yield strength and tensile strength were slightly decreased with increasing RPM, with no observed difference for the elongation.