• Title/Summary/Keyword: 네트워크 구간

Search Result 505, Processing Time 0.034 seconds

Exploring the Academic Identity of Dance Pedagogy : Using Keyword Network Analysis and Time Series Analysis (무용교육학(Dance Pedagogy)의 학문적 정체성 탐색 : 시계열 관점의 키워드 네트워크 분석을 중심으로)

  • Kim, Ji-Young;Hong, Ae-Ryung
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.439-450
    • /
    • 2019
  • The purpose of the study was to critically explore the academic identity of dance education as a paradigm of practice-based education. Dance education is recognized as a school dance since the first curriculum was designed, which was announced by the Ministry of Education in 1955. Although Korea's dance education has 65 years of history, its academic identity as a dance education is not very strong. Traditional dance education was teacher-centered, skills-oriented, and exercise-oriented by following the practice-based paradigm. Recently, an initiative was taken to establish a new paradigm for dance education in schools, communities, and professional fields. This study followed the keyword network analysis and reviewed the main contents of each section of dance education research from a time-series perspective. The first section (1968-1979) is a practice of dance education based on physical education; the second section (1980-1989) is a creative-based movement education for primary education; the third section (1990-1999) is a systematization of dance education courses by class; the fourth section (2000-2009) is a paradigm for cultural and artistic education; the fifth section (2010-2019) consisted of various educational practices and institutions. Based on the research results, efforts are requested to establish an academic identity that can support dance education, interdisciplinary practice, and research.

A Study on Stabilizing a Network Security Zone Based on the Application of Logical Area to Communication Bandwidth (통신 대역폭 논리영역 적용 기반의 네트워크 보안구간 안정화 연구)

  • Seo, Woo-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3462-3468
    • /
    • 2015
  • Regarding countless network disorders or invasions happening nowadays from 2014 until 2015, illegal access intended to attack through the communication line provided by ISP (Internet Service Provider) appears to be the source of the problem. As a defensive way to prevent such network-based attacks, not only stabilization structures for network communication but various policies as well as physical security devices and solutions corresponding to those have been realized and established. Therefore, now is the time to gain foundational research data to secure network security sections by producing logical area on communication bandwidth or such, suggest tasks to expand the communication line which is another research topic in the network security market, and recognize the fact that the active communication bandwidth linkage paradigm using network communication bandwidth is needed as one of the areas that can realize physical security. Additionally, it is necessary to limit the data in the forms of organizing visible security structures into a certain range of physical information by re-dividing communication capacity being currently provided by telecommunicators into subdivided organizational areas and applying the logical virtualization of communication capacity in each of the areas divided. By proposing a network security section based on a logical field application in place of the existing physical structure, basic data that designs a stable physical network communication structure will be provided.

Multimedia Contents Streaming Service using the Section Information Retrieval on P2P Network (구간정보를 이용한 P2P 상에서 멀티미디어 스트리밍)

  • Lee, Ji-Hyun;Han, Kwang-Rok
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.10
    • /
    • pp.1328-1337
    • /
    • 2007
  • We describe a method for streaming specific section using the section information among peers on P2P network. As peers tend to extract only the part of contents in which they are interested, an indexed file is created based on the section information of multimedia contents and registered in the search server. If a peer requests the streaming of specific parts of the contents to other corresponding peer using the section information that the server returns, the peer streams only separated section of the multimedia contents according to the information. For this process, we implement a function that a peer's PC can play a role as a server, and the peer streams the separated content based on the section information that the server supplies.

  • PDF

UDT Parallel Transfer Technologies Adaptive to Network Status In High Speed Network (고속네트워크에서 네트워크 혼잡상태에 적응적인 UDT 병렬전송 기법)

  • Park, Jong Seon;Cho, Gi Hwan
    • Smart Media Journal
    • /
    • v.2 no.4
    • /
    • pp.51-59
    • /
    • 2013
  • With increasing transmission speed of backbone networks, it is getting to provide enough available bandwidth. However, the bandwidth is not effectively utilized in volumetric data transfer. This mainly comes from the transmission protocol, TCP, which is used for most applications. TCP is inherently difficult to adapt the available bandwidth because of it's own characteristic of transfer mechanism. UDT is a prominent application level data transfer protocol which is targeting high speed network. In this paper, we propose UDT parallel transfer technologies which is adaptive to network status and then evaluate their performance in two points of view. Firstly, we measure data transfer rate of UDT with rate congestion control methods, and compare them with basic UDT. Secondly, we apply parallel transfer technologies adapted to network status, and measure their performance. Experimental results showed that UDT rate congestion control method outperforms UDT with 106% improvement in RTT 100ms section set with jitter 30ms. In addition, performance of parallel transfer with rate congestion control method showed 107% improvement than that of parallel transfer in RTT 400ms section set with jitter 20ms.

  • PDF

On-Line Travel Time Estimation Methods using Hybrid Neuro Fuzzy System for Arterial Road (검지자료합성을 통한 도시간선도로 실시간 통행시간 추정모형)

  • 김영찬;김태용
    • Journal of Korean Society of Transportation
    • /
    • v.19 no.6
    • /
    • pp.171-182
    • /
    • 2001
  • Travel Time is an important characteristic of traffic conditions in a road network. Currently, there are so many road users to get a unsatisfactory traffic information that is provided by existing collection systems such as, Detector, Probe car, CCTV and Anecdotal Report. This paper presents the results achieved with Data Fusion Model, Hybrid Neuro Fuzzy System for on - line estimation of travel times using RTMS(Remote Traffic Microwave Sensor) and Probe Data in the signalized arterial road. Data Fusion is the most important process to compose the various of data which can present real value for traffic situation and is also the one of the major process part in the TIC(Traffic Information Center) for analyzing and processing data. On-line travel time estimation methods(FALEM) on the basis of detector data has been evaluated by real value under KangNam Test Area.

  • PDF

A Study on Performance Improvement of Hybrid TDMA/CSMA MAC Using the Limitive CSMA (제한적 CSMA를 이용한 Hybrid TDMA/CSMA MAC의 성능 향상)

  • Lee, Wang-Jong;Rhee, Seung-Hyong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.1
    • /
    • pp.102-109
    • /
    • 2009
  • This paper proposes the efficient method of CSMA during an idle duration in the time slot. The hybrid TDMA/CSMA protocol is the method that shares the medium efficiently. This improves the channel efficiency and throughput by using CSMA method during the idle TDMA time slot. In CSMA duration, many devices start to compete with each other. This causes a low throughput because of a long delay and a frequent collision. In order to improve this problem, the proposed method reduces the number of devices that compete in the CSMA duration. Because the number of competed device is reduced, this proposed algorithm reduces the delay and collision probability. This decrements of delay and collision probability improve the networks. The simulation results show that the proposed limitive CSMA methods outperform any methods of hybrid TDMA/CSMA protocol.

  • PDF

A Building Method of Security Vulnerability Measurement Framework under u-Healthcare System Traffic Domain Environment Based on USN (USN기반 u-Healthcare 시스템 트래픽도메인 환경에서의 보안위험도 평가체계 설계방안)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2011
  • Smart environment of health information technology, u-Healthcare architecture, ad-hoc networking and wireless communications environment are major factors that increase vulnerability of u-healthcare information systems. Traffic domain is the concept of network route that identifies the u-Healthcare information systems area as the traffic passing and security technologies application. The criterion of division is an area requiring the application of security technology. u-Healthcare information system domains are derived from the intranet section. the public switched network infrastructure, and networking sectors. Domains of health information systems are separated by domain vulnerability reason. In this study, domain-specific security vulnerability assessment system based on the USN in u-Healthcare system is derived. The model used in this study suggests how to establish more effective measurement USN-based health information network security vulnerability which has been vague until now.

Network Traffic Performance Analysis using Framework-based Integrated Management System (프레임워크 기반 통합관리시스템을 이용한 네트워크 트래픽 성능분석)

  • 최성만;변완섭;유철중;김용성;장옥배;태규열
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04c
    • /
    • pp.145-147
    • /
    • 2003
  • 본 논문에서 이용한 프레임워크 기반 통합관리시스템은 네트워크 관리와 분석을 위하여 관리기능, 분석 기능, 관리 및 분석 대상과 관련된 모든 항목을 측정하고 분석하여 예측할 수 있는 기능을 포함하는 시스템이다. 주요 연구방법으로는 세부 항목별로 현황 데이터를 수집, 가공, 분석하였으며, 각 항목간의 연관관계 및 대상별 연관관계를 상세하게 분석하고자 인프레인저(infRanger$^{TM}$)를 이용하였다. 프레임워크 기반통합관리시스템을 이용한 네트워크 트래픽 성능분석은 네트워크 운영에 있어서 성능 저하에 영향을 미치기 쉬운 장비나 구간, 그리고 현재의 문제 가능성이 예상되는 네트워크 자원을 선정하여 상세 분석을 실시하고 문제점을 도출할 수 있도록 하였다. 이렇게 해본 결과 사전에 네트워크에 대한 과잉투자를 예방하고 최적화된 네트워크 환경을 조성하여 관리의 효율성 및 보다 나은 서비스를 제공한다.

  • PDF

Adaptive Absolute Delay Differentiation in Next-Generation Networks (차세대 네트워크에서의 적응형 절대적 지연 차별화 방식)

  • Paik, Jung-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.55-63
    • /
    • 2006
  • In this paper, an algorithm that provisions absolute differentiation of packet delays is proposed with an objective for enhancing quality of service (QoS) in future packet networks. It features an adaptive scheme that compensates the deviation for prediction on the traffic to be arrived continuously. It predicts the traffic to be arrived at the beginning of a time slot and measures the actual arrived traffic at the end of the time slot, and derives the deviation between the two quantity. The deviation is utilized to the delay control operation for the next time slot to offset it. As it compensates the prediction error continuously, it shows superior adaptability to the bursty traffic as well as the constant rate traffic. It is demonstrated through simulation that the algorithm meets the quantitative delay bounds and shows superiority to the traffic fluctuation in comparison with the conventional mechanism.

  • PDF