• Title/Summary/Keyword: 망 분리

Search Result 525, Processing Time 0.034 seconds

Design and implementation of a Korean Spatial data Distribution Infrastructure for the interoperability of heterogeneous distributed spatial databases (이기종 분산 공간데이타베이스 상호운용을 위한 국가공간정보유통체계의 설계 및 구현)

  • 이득우;권준희;김윤경
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.103-105
    • /
    • 2001
  • 국토정보화의 기반준비 단계인 ‘1차 국가 GIS 사업’기간 동안, 상당량의 수치화된 공간 정보가 축적되었고 이들을 관리하기 위한 다양한 종류의 지리정보시스템이 국가기관에서 사용되었다. 그러나, 사용중인 지리정보시스템은 조직적 지리적으로 분산되어 있으며, 공간데이타베이스의 이질성 및 폐쇄성으로 인해, 공간정보의 상호운용 측면에서 한계성을 드러내고 있다. 본 연구에서는 이러만 한계점을 극복하고자 분산 이기종 공간데이타베이스에 저장된 공간정보를 표준화된 방법으로 통합검색하며, 상호운용 가능토록 하는 국가공간정보유통체계를 설계 및 구현한다. 본 시스템을 구성하고 있는 단일 유통게이트웨이, 복수개의 유통노드, 지리정보공급기관을 국가통신망을 통하여 상호 연결하고, 컴퓨팅 부하를 분산시키기 위한 방안으로 공간정보유통망을 검색망 및 전송망으로 분리 설계한다. 검색망에서는 메타데이타의 검색 및 전송을 위한 표준화된 방법으로서 OpenGIS OLE DB Provider 기반 데이터제공자 컴포넌트를 구현한다. 또한 데이터제공자 컴포넌트를 통해 전송된 이기종 공간데이타베이스로부터의 WKB 형태의 공간정보를 상호운용할 목적으로, 공간데이타 구조와 처리에 대한 인터페이스 표준화를 실시한 MapBase 컴포넌트를 활용하여 공간정보에 대한 통합검색, 분석 및 상호운용을 구현한다.

  • PDF

A Direction of Convergence and Security of Smart Grid and Information Communication Network (스마트그리드(Smart Grid) 전력망과 정보통신망 융합 보안 방향)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.477-486
    • /
    • 2010
  • This Study suggests security directions to reconstruct separate network of Smart Grid and information communication network as one communications system and implement Smart Grid integrated information communication network. In addition, it suggests prevention directions to prevent future cyber attacks by reorganizing network as the key three-stage network and separating TCP/IP four layers that consist of existing information communication network from Smart Grid. Moreover, it suggests the foundation for the study and the test by providing current problems of Smart Grid, weak points, and three security models. This study is meaningful to suggest development directions and situations as a technology of future-oriented electric industries, integrate attacks and preventions of TCP/IP Layers with Smart Grid, and seek for a new technology of Smart Grid and future tasks for Smart Grid information security.

Fault-Management Scheme for Recovery Time and Resource Efficiency in OBS Networks (OBS 망에서 복구 시간과 자원의 효율성을 고려한 장애 복구 기법)

  • 이해정;정태근;소원호;김영천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9B
    • /
    • pp.793-805
    • /
    • 2003
  • In OBS (Optical Burst Switching) networks which decouple the burst from its header, the fault of a fiber link can lead to the failure of all the light-path that traverses the fiber. Because each light-path is expected to operate at a rate of a few Gbps by using WDM (Wavelength Division Multiplexing) technology, any failure may lead to large data loss. Therefore, an efficient recovery scheme must be provided. In this paper, we analyze network utilization and BCP (Burst Control Packet) loss rate according to each link failure by applying the conventional restoration schemes in OBS networks. And through these simulation results, an ASPR scheme is proposed improve the fault management scheme in terms of recovery time and throughput. Finally, We compare the performance of our proposed scheme with that of the conventional one with respect to burst loss rate, resource utilization and throughput by OPNET simulations.

Simulation-Based Damage Estimation of Helideck Using Artificial Neural Network (인공 신경망을 사용한 시뮬레이션 기반 헬리데크 손상 추정)

  • Kim, Chanyeong;Ha, Seung-Hyun
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.33 no.6
    • /
    • pp.359-366
    • /
    • 2020
  • In this study, a simulation-based damage estimation method for helidecks is proposed using an artificial neural network. The structural members that share a connecting node in the helideck are regarded as a damage group, and a total of 37,400 damage scenarios are numerically generated by applying randomly assigned damage to up to three damage groups. Modal analysis is then performed for all the damage scenarios, which are selectively used as either training or validation or verification sets based on the purpose of use. An artificial neural network with three hidden layers is constructed using a PyTorch program to recognize the patterns of the modal responses of the helideck model under both damaged and undamaged states, and the network is successively trained to minimize the loss function. Finally, the estimated damage rate from the proposed artificial neural network is compared to the actual assigned damage rate using 400 verification scenarios to show that the neural network is able to estimate the location and amount of structural damage precisely.

A Study on Face Recognition using Neural Networks and Characteristics Extraction based on Differential Image and DCT (차영상과 DCT 기반 특징 추출과 신경망을 이용한 얼굴 인식에 관한 연구)

  • 임춘환;고낙용;박종안
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.8B
    • /
    • pp.1549-1557
    • /
    • 1999
  • In this paper, we propose a face recognition algorithm based on the differential image method-DCT This algorithm uses neural networks which is flexible for noise. Using the same condition (same luminous intensity and same distance from the fixed CCD camera to human face), we have captured two images. One doesn't contain human face. The other contains human face. Differential image method is used to separate the second image into face region and background region. After that, we have extracted square area from the face region, which is based on the edge distribution. This square region is used as the characteristics region of human face. It contains the eye bows, the eyes, the nose, and the mouth. After executing DCT for this square region, we have extracted the feature vectors. The feature vectors were normalized and used as the input vectors of the neural network. Simulation results show 100% recognition rate when face images were learned and 92.25% recognition rate when face images weren't learned for 30 persons.

  • PDF

Home monitoring system based on sound event detection for the hard-of-hearing (청각장애인을 위한 사운드 이벤트 검출 기반 홈 모니터링 시스템)

  • Kim, Gee Yeun;Shin, Seung-Su;Kim, Hyoung-Gook
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.4
    • /
    • pp.427-432
    • /
    • 2019
  • In this paper, we propose a home monitoring system using sound event detection based on a bidirectional gated recurrent neural network for the hard-of-hearing. First, in the proposed system, packet loss concealment is used to recover a lost signal captured through wireless sensor networks, and reliable channels are selected using multi-channel cross correlation coefficient for effective sound event detection. The detected sound event is converted into the text and haptic signal through a harmonic/percussive sound source separation method to be provided to hearing impaired people. Experimental results show that the performance of the proposed sound event detection method is superior to the conventional methods and the sound can be expressed into detailed haptic signal using the source separation.

Enhancement of a Secure Remote Working Environment using CloudHSM and edge-DRM Proxy (Cloud HSM와 edge-DRM Proxy를 활용한 안전한 원격근무 환경 강화 연구)

  • Kim, Hyunwoo;Lee, Junhyeok;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.25-30
    • /
    • 2021
  • Due to the current COVID-19 pandemic, companies and institutions are introducing virtual desktop technology, one of the logical network separation technologies, to establish a safe working environment in a situation where remote work is provided. With the introduction of virtual desktop technology, companies and institutions can operate the network separation environment more safely and effectively, and can access the business network quickly and safely to increase work efficiency and productivity. However, when introducing virtual desktop technology, there is a cost problem of high-spec server, storage, and license, and it is necessary to supplement in terms of operation and management. As a countermeasure to this, companies and institutions are shifting to cloud computing-based technology, virtual desktop service (DaaS, Desktop as a Service). However, in the virtual desktop service, which is a cloud computing-based technology, the shared responsibility model is responsible for user access control and data security. In this paper, based on the shared responsibility model in the virtual desktop service environment, we propose a cloud-based hardware security module (Cloud HSM) and edge-DRM proxy as an improvement method for user access control and data security.

Revolutionizing rainfall estimation through convolutional neural networks leveraging CCTV imagery (CCTV 영상을 활용한 합성곱 신경망 기반 강우강도 산정)

  • Jongyun Byun;Hyeon-Joon Kim;Jinwook Lee;Changhyun Jun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.120-120
    • /
    • 2023
  • 본 연구에서는 CCTV 영상 내 빗줄기의 특성을 바탕으로 강우강도를 산정하기 위한 합성곱 신경망(CNNs, Convolutional Neural Networks) 기반 강우강도 산정 모형을 제안하였다. 중앙대학교 및 한국건설생활환경시험연구원 내 대형기후환경시험실에서 얻은 CCTV 영상들을 대상으로 연구를 수행하고, 우적계 등과 같은 지상 관측자료와 강우강도 산정 결과를 비교·검증하였다. 먼저, CCTV 영상 내 빗줄기의 미세한 변동 특성을 반영하기 위해 데이터 전처리 작업을 진행하였다. 이는 원본 영상으로부터 빗줄기 층을 분리해내는 과정, 빗줄기 층에서 빗물 입자를 분리해내는 과정, 그리고 빗물 입자를 인식하는 과정 등 총 세 단계로 구분된다. 합성곱 신경망 기반 강우강도 산정 모형 구축을 위해 영상 전처리가 완료된 데이터들을 입력값으로 설정하고, 촬영 시점에 대응되는 지상관측 자료를 출력값으로 고려하여 강우강도 산정모형을 훈련시켰다. CCTV 원자료 내 특정 영역에 편향되어 강우강도를 산정하는 과적합 현상의 발생을 방지하기 위해 원자료 내 5개의 관심 영역(ROI, Region of Interest)을 설정하였다. 추가로, CCTV의 해상도를 총 4개(2560×1440, 1920×1080, 1280×720, 720×480)로 구분함으로써 해상도 변화에 따른 학습 결과의 차이를 분석·평가하였다. 이는 기존 사례들과 비교했을 때, CCTV 영상을 기반으로 빗줄기의 거동 특성과 같은 물리적인 현상을 직간접적으로 고려하여 강우강도를 산정했다는 점과 더불어 머신러닝을 적용하여 강우 이미지가 갖는 본질적인 특징들을 파악했다는 측면에서, 추후 본 연구에서 제안한 모형의 활용 가치가 극대화될 수 있을 것으로 판단된다.

  • PDF

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.

Effects of Operating Variables on Solid Separation Rate in Two-interconnected Fluidized Beds System for Selective Solid Circulation (선택적 고체순환을 위한 2탑 유동층 시스템에서 고체분리속도에 미치는 조업변수들의 영향)

  • Ryu, Ho-Jung;Jin, Gyoung-Tae;Bae, Dal-Hee;Kim, Hong-Ki
    • Korean Chemical Engineering Research
    • /
    • v.47 no.3
    • /
    • pp.355-361
    • /
    • 2009
  • Effects of operating variables on solid separation rate in two-interconnected fluidized beds system for selective solid circulation have been investigated. Coarse(212~300 or $425{\sim}600{\mu}m$) and fine($63{\sim}106{\mu}m$) particles were separated using the solid separator and the solid separation rate was ranged from 66 to 987 g/min. The solid separation rate increased as the gas velocity through the solid injection nozzle, solid height, diameter of solid injection nozzle, particle size of coarse particles, aperture of the solid separator, and weight fraction of fines in the solid mixture increased. However, the effect of the fluidization velocity was negligible.