• Title/Summary/Keyword: 분산 연결

Search Result 952, Processing Time 0.028 seconds

A Study on Crash Causations for Railroad-Highway Crossings (철도건널목 사고요인 분석에 관한 연구)

  • O, Ju-Taek;Sin, Seong-Hun;Seong, Nak-Mun;Park, Dong-Ju;Choe, Eun-Su
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.1
    • /
    • pp.33-44
    • /
    • 2005
  • Railroad crossing crashes are fewer than road crashes, but with regard to crash severity, they can be serious injury crashes. There should be, therefore, enormous efforts to increase the safety of railroad crossings. The objective of this paper is to identify and understand factors associated with railroad crossing crashes. Statistical models are used to examine the relationships between crossing accidents and geometric elements of crossings. The results show the Poisson model is the most appropriate method for the crossing accidents, because overdispersion was not observed. This study identifies seven significant factors associated with railroad crossing crashes through the main and variant models. With regard to explanatory factors on crossing safety, the total traffic volume, daily train volume, presence of commercial area around crossings, distance of train detector from crossings, time duration between the activation of warning signals and gates, crossing types, and speed hump were found to affect the safety of railroad crossings.

HWbF(Hit and WLC based Firewall) Design using HIT technique for the parallel-processing and WLC(Weight Least Connection) technique for load balancing (병렬처리 HIT 기법과 로드밸런싱 WLC기법이 적용된 HWbF(Hit and WLC based Firewall) 설계)

  • Lee, Byung-Kwan;Kwon, Dong-Hyeok;Jeong, Eun-Hee
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.15-28
    • /
    • 2009
  • This paper proposes HWbF(Hit and WLC based Firewall) design which consists of an PFS(Packet Filter Station) and APS(Application Proxy Station). PFS is designed to reduce bottleneck and to prevent the transmission delay of them by distributing packets with PLB(Packet Load Balancing) module, and APS is designed to manage a proxy cash server by using PCSLB(Proxy Cash Server Load Balancing) module and to detect a DoS attack with packet traffic quantity. Therefore, the proposed HWbF in this paper prevents packet transmission delay that was a drawback in an existing Firewall, diminishes bottleneck, and then increases the processing speed of the packet. Also, as HWbF reduce the 50% and 25% of the respective DoS attack error detection rate(TCP) about average value and the fixed critical value to 38% and 17%. with the proposed expression by manipulating the critical value according to the packet traffic quantity, it not only improve the detection of DoS attack traffic but also diminishes the overload of a proxy cash server.

  • PDF

Asynchronous Sensing Data Aggregation and Processing Mechanism for Internet of Things Environment (사물 인터넷 환경에서 비동기 센싱 데이터 수집 및 처리 메커니즘)

  • Kang, Yunhee;Ko, Wan-Ki
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.403-408
    • /
    • 2014
  • In the Internet of Things(IoT) era, many of the things or objects that enclose our environments are able to associate with those things on the Internet. To construct IoT systems, it needs to consider a component for acquiring and aggregating of sensory data via things with sensors and instruments, which is connected by diverse networks, in IoT environment. An IoT system is intrinsically distributed in a variety of ways. In addition, to manage an IoT system efficiently, interoperability is needed to meet requirements while the IoT system is designed to deliver data among its applications. In this paper, a reference architecture based on asynchronous messaging is defined and used for designing an IoT system. To apply the architecture, we discuss how to manage data streams with real-time characteristics and make a prototype based on pipe-and-filter to produce and consume them by a pub/sub messaging system NaradaBrokering.

Energy Theft Detection Based on Feature Selection Methods and SVM (특징 선택과 서포트 벡터 머신을 활용한 에너지 절도 검출)

  • Lee, Jiyoung;Sun, Young-Ghyu;Lee, Seongwoo;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.119-125
    • /
    • 2021
  • As the electricity grid systems has been intelligent with the development of ICT technology, power consumption information of users connected to the grid is available to acquired and analyzed for the power utilities. In this paper, the energy theft problem is solved by feature selection methods, which is emerging as the main cause of economic loss in smart grid. The data preprocessing steps of the proposed system consists of five steps. In the feature selection step, features are selected using analysis of variance and mutual information (MI) based method, which are filtering-based feature selection methods. According to the simulation results, the performance of support vector machine classifier is higher than the case of using all the input features of the input data for the case of the MI based feature selection method.

Status and Service Plan of Marine Science and Technology Research DB (해양수산 과학기술 연구 DB 구축 현황 및 서비스 계획)

  • Choi, Jung Min
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 2017.08a
    • /
    • pp.99-99
    • /
    • 2017
  • 최근 4차 산업혁명 시대 도래에 따른 빅데이터가 이슈화 되고 정부의 공공 데이터 개방? 공유 정책 등으로 정부의 R&D 정보화 서비스도 다양화되고 있다. 특히 해양수산 R&D사업은 해양이라는 공간적 제약으로 선박 및 특수 장비 등을 사용함에 따라 연구비 단가가 상대적으로 높은 실정임에도 해양수산 연구 자료 및 관측자료가 통합적으로 관리되지 않고, 사업별 기관별로 산발적으로 관리되고 있어, 이에 따라 연구 DB 통합관리의 수요가 제기 되고 있다. 이에 해양수산 R&D사업에서는 사업별 통합 DB 구축사업이 진행되고 있고, '관할해역해양정보 공동활용시스템(JOISS)'이 대표적이라 할 수 있다. JOISS는 2012년부터 시작된 '관할해역 해양정보 공동활용체계 구축'과제를 통해 자료 표준화 연구와 함께 해양과학조사 분야의 R&D과제들과 실시간 해양관측망으로부터 산출되는 데이터를 수집하고, 정보서비스를 구현한 시스템이다. 2016년 1차 시스템 구축을 완료하여 현재 서비스를 진행하고 있다. 한편, 해양관측 데이터 수집 공유 서비스 외 해양수산 R&D사업과 연계된 다양한 정보들을 나누고 소통하는 온라인 장을 구현하기 위해 '해양수산 R&D 지식정보 시스템(OFRIS)' 개발사업이 별도로 진행되고 있다. OFRIS는 해양수산 R&D사업을 통한 데이터의 원할한 수집 및 품질관리 등의 문제를 보완하고, 그 외에도 사업별로 분산 관리되고 있는 R&D 관련 정보를 연계하고, 기술공급자와 수요자를 직접 연결해 주는 '개방형 기술 정보 중개 시스템'으로의 역할, 국내외 해양수산 R&D관련 정책 연구 산업 동향을 엄선하여 제공하는 등 해양수산 R&D 종합 포털로서 기능구현을 목표하고 있다. 2017년 말 1단계 개발 완료를 앞두고 있으며, 1단계에서는 시급성 높고, 수요가 많은 (1) R&D동향, (2) 과제이력, (3) 연구성과, (4) 기술거래, (5) DB공유 등 5대 기능을 우선 구현하고, 2단계에서는 통계자료 생산 및 분석 기능 강화, 3단계에서는 해양수산 산업통계, 인력, 교육 등의 정보를 서비스하는 포털로 확장할 계획이다. JOISS, OFRIS를 개발하는 과정에서는 해양수산 R&D의 정보를 수집 관리 하는데 있어 다양한 현안 문제 등이 도출되었으며, 그 중에서도 연구자들의 자발적 데이터 제공 협조, 데이터의 표준화 및 품질검증, 구축된 데이터의 활용 및 피드백 등에 대해 구체적이고 현실적인 대응 방안이 요구된다.

  • PDF

Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer (Hyperledger Composer 기반 컨소시움 블록체인을 이용한 위조 모바일 APK 검출 DApp)

  • Lee, Hyung-Woo;Lee, Hanseong
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.9-18
    • /
    • 2019
  • Android Application Package (APK) is vulnerable to repackaging attacks. Therefore, obfuscation technology was applied inside the Android APK file to cope with repackaging attack. However, as more advanced reverse engineering techniques continue to be developed, fake Android APK files to be released. A new approach is needed to solve this problem. A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a cryptographic hash of theprevious block, a timestamp and transaction data. Once recorded, the data inany given block cannot be altered retroactively without the alteration of all subsequent blocks. Therefore, it is possible to check whether or not theAndroid Mobile APK is forged by applying the blockchain technology. In this paper, we construct a discrimination DApp (Decentralized Application) against forgery Android Mobile APK by recording and maintaining the legitimate APK in the consortium blockchain framework like Hyperledger Fabric by Composer. With proposed DApp, we can prevent the forgery and modification of the appfrom being installed on the user's Smartphone, and normal and legitimate apps will be widely used.

Asymmetric data storage management scheme to ensure the safety of big data in multi-cloud environments based on deep learning (딥러닝 기반의 다중 클라우드 환경에서 빅 데이터의 안전성을 보장하기 위한 비대칭 데이터 저장 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.19 no.3
    • /
    • pp.211-216
    • /
    • 2021
  • Information from various heterogeneous devices is steadily increasing in distributed cloud environments. This is because high-speed network speeds and high-capacity multimedia data are being used. However, research is still underway on how to minimize information errors in big data sent and received by heterogeneous devices. In this paper, we propose a deep learning-based asymmetric storage management technique for minimizing bandwidth and data errors in networks generated by information sent and received in cloud environments. The proposed technique applies deep learning techniques to optimize the load balance after asymmetric hash of the big data information generated by each device. The proposed technique is characterized by allowing errors in big data collected from each device, while also ensuring the connectivity of big data by grouping big data into groups of clusters of dogs. In particular, the proposed technique minimizes information errors when storing and managing big data asymmetrically because it used a loss function that extracted similar values between big data as seeds.

Transaction Model Suggestion by using Two Enforcements with a Blockchain based on a Service Platform (서비스 플랫폼 기반 이중강화적용 블록체인 응용 거래모델 제안)

  • Lee, Kwan Mok;Kim, Yong Hwan;Bae, Ki Tae
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.91-96
    • /
    • 2020
  • A blockchain is a technology in which all nodes participating in a distributed network manage each transaction's contents without a central server managing the transaction, which is a record of the transaction. The block containing the transaction record of a specific period is connected to the blockchain by referring to the hash value for the previous block, and the chain with the new block added is shared with all nodes again. Transactions using existing certificates will pass through FinTech, and in the near future, applications using blockchains are expected to emerge. In this study, we analyze the problems of the existing model, and propose a transaction model that applies the blockchain to come. Among various applications, this study develops a trading model targeting the energy sales market among the topics that will lead the fourth industrial revolution. As a result of analyzing the proposed model, it was possible to be sure of the possibility of a safer energy sales transaction than the existing method.

Threshold based User-centric Clustering for Cell-free MIMO Network (셀프리 다중안테나 네트워크를 위한 임계값 기반 사용자 중심 클러스터링)

  • Ryu, Jong Yeol;Lee, Woongsup;Ban, Tae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.114-121
    • /
    • 2022
  • In this paper, we consider a user centric clustering in order to guarantee the performance of the users in cell free multiple-input multiple-output (MIMO) network. In the user centric clustering scheme, by using large scale fading coefficients of the connected access points (APs), each user decides own cluster with the APs having the higher the large scale fading coefficients than threshold value compared to the highest large scale fading coefficient. In the determined user centric clusters, the APs design the beamformers and power allocations in the distributed manner and the APs cooperatively transmit data to users by using beamformers and power allocations. In the simulation results, we verify the performance of user centric clustering in terms of the spectral efficiency and we also find the optimal threshold value in the given configuration.

Estimation of design flood derived by regional frequency analysis (지역빈도분석에 의한 금강유역의 설계홍수량 산정)

  • Da Ye Kim;Seung Jin Maeng
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.104-104
    • /
    • 2023
  • 최근 2017년 청주, 천안의 홍수, 2020년 용담댐 상류와 대청댐 상류의 홍수, 2022년 청주의 도시침수를 비롯한 서울 도심의 침수피해와 같은 홍수 발생은 지역의 국민들에게 막대한 재산상의 피해를 입히고 있다. 국가적 차원에서 치수의 목적을 달성하고 경제적으로 적절한 규모의 수리구조물을 설계하기 위해 하천의 주요지점에 대한 신뢰성 있는 설계홍수량의 제시는 반드시 필요한 현실에 직면해 있다. 특히 해당 지점의 수리시설물은 점빈도분석에 의한 설계홍수량을 적용하나, 관측자료가 없는 미계측 지점에 위치한 수리시설물은 지역빈도분석에 의한 설계홍수량을 산정하여 적용해야 한다. 이에 본 연구에서는 금강 유역을 대상으로 점빈도분석과 지역빈도분석에 의한 설계홍수량 결과를 비교·분석하고자 한다. 지역빈도분석을 위한 수위관측소의 선정은 금강유역 80개 수위관측소 중 장기간 연최대홍수량 자료가 있고 유량자료의 연결성 및 신뢰성이 확보된 46개수위관측소를 대상으로 하였다. 46개 수위관측소의 연최대홍수량 계열을 대상으로 동질성, 독립성 및 이상치 검정을 수행하였으며, 세 가지 검정 모두 적절한 수위 관측소 지점은 36개 지점으로 분석되었다. 36개 수위관측소의 기본통계치(평균, 표준편차, 분산, 왜곡도 및 첨예도)를 산정한 후 3변수 Gamma 분포 계열인 GEV, GLO, GPA의 확률 분포를 적용하였다. 확률 분포별 매개변수는 전산화를 통해 L-모멘트의 차수를 0~4까지 변화시켜 LH-모멘트법에 적용하였다. LH-모멘트법에 의해 산정된 확률 분포들의 매개변수를 적용하여 적합도 검정을 수행하였다. 지역빈도분석을 위해 36개 수위관측소를 K-Means clustering 방법을 통해 4개 지역으로 구분하였다. 이를 통해LH-모멘트의 적정차수와 확률 분포에 따른 점빈도분석(지점 대상)과 지역빈도분석(지역 대상) 결과인 설계홍수량을 산정하였으며, 점빈도분석과 지역빈도분석에 의해 산정된 설계홍수량간의 분석결과를 제시하였다. 본 연구를 통해 수리구조물 설계 시 안정적인 조건 제시 및 관리체계 구축에 기여하고 방재대책 수립 시 경제·사회적 요소를 반영한 합리적 방안을 제시하고자 한다.

  • PDF