• Title/Summary/Keyword: 사례 내 사례 간 분석

Search Result 354, Processing Time 0.022 seconds

Locates the Sunken Ship 'Dmitri Donskoi' using Marine Geophysical Survey Techniques in Deep Water (지구물리 탐사기법을 이용한 심해 Dmitri Donskoi호 확인)

  • Yoo, Hai-Soo;Kim, Su-Jeong;Park, Dong-Won
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.104-117
    • /
    • 2004
  • Dmitri Donskoi, which went down during the Russo-Japanese War occurred 100 years ago, was found by using geophysical exploration techniques at the 400 m water depth of submarine valley off Jeodong of Ulleung Island. In the submarine area with the rugged seabed topography and volcanic seamounts, in particular, the reliable seabed images were acquired by using the mid-to-shallow Multibeam exploration technique The strength of corrosion (causticity) of the sunken Donskoi, measured by the electrochemical method, decreased to 2/5 compared with the original strength.

  • PDF

View of Landform revealed in School Songs: Based on the Primary·Secondary School in Daegu Metropolitan City (교가(校歌)에 나타난 대구의 지형관 - 대구 초·중등학교를 사례로 -)

  • JEON, Young-Gweon
    • Journal of The Geomorphological Association of Korea
    • /
    • v.19 no.4
    • /
    • pp.83-96
    • /
    • 2012
  • This paper has obtained the following results by investigating the physical geographical names appeared on the school songs of the primary secondary school in Daegu metropolitan city. 1) The physical geographical names appeared many on the school songs in the old-established schools are the traditional physical geographical names such as The Mt. Palgong, The Geumho river, The Nakdong river, The Mt. Biseul and the physical geographical names related to the identity of Daegu such as Dalgubeol, The Mt. Taebaek, Seorabeol and so forth. 2) The physical geographical names appeared many on the school songs in the primary schools are The Mt. Palgong, The Geumho river, The Nakdong river, and The Mt. Biseul in order, while those appeared many on the school songs in the secondary schools are The Mt. Palgong, The Geumho river, The Nakdong river, and The Mt. Biseul in order. 3) Since The Mt. Taebaek and Seorabeol relatively often appear in the physical geographical names, we can find the relationship between Daegu and Silla Dynasty, and that between The Mt. Palgong and The Mt. Taebaek from the viewpoint of feng shui. 4) In case of the school songs in the schools distributed around the area of Suseong-Gu and DalSeo-Gu which are newly developed, the physical geographical names within the two areas in addition to the traditional physical geographical names(including the physical geographical names related to the identity of Daegu) appeared many on the school songs. 5) The Mt. Palgong, which is the representative physical geographical name of Daegu, almost did not appear on the school songs of the schools within the Dalseong-Gun. In other words, the residents in the Dalseong-Gun have recognized the mountain based on The Mt. Biseul rather than The Mt. Palgong. 6) It is special that The Sincheon amounting to the central stream in Daegu almost did not appear on the school songs. 7) It is concluded that the physical geographical names found in this paper can be not only set as main ecological space in Daegu area but also considered in top priority as ecological space in the various plans of development.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.

Edge to Edge Model and Delay Performance Evaluation for Autonomous Driving (자율 주행을 위한 Edge to Edge 모델 및 지연 성능 평가)

  • Cho, Moon Ki;Bae, Kyoung Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.191-207
    • /
    • 2021
  • Up to this day, mobile communications have evolved rapidly over the decades, mainly focusing on speed-up to meet the growing data demands of 2G to 5G. And with the start of the 5G era, efforts are being made to provide such various services to customers, as IoT, V2X, robots, artificial intelligence, augmented virtual reality, and smart cities, which are expected to change the environment of our lives and industries as a whole. In a bid to provide those services, on top of high speed data, reduced latency and reliability are critical for real-time services. Thus, 5G has paved the way for service delivery through maximum speed of 20Gbps, a delay of 1ms, and a connecting device of 106/㎢ In particular, in intelligent traffic control systems and services using various vehicle-based Vehicle to X (V2X), such as traffic control, in addition to high-speed data speed, reduction of delay and reliability for real-time services are very important. 5G communication uses high frequencies of 3.5Ghz and 28Ghz. These high-frequency waves can go with high-speed thanks to their straightness while their short wavelength and small diffraction angle limit their reach to distance and prevent them from penetrating walls, causing restrictions on their use indoors. Therefore, under existing networks it's difficult to overcome these constraints. The underlying centralized SDN also has a limited capability in offering delay-sensitive services because communication with many nodes creates overload in its processing. Basically, SDN, which means a structure that separates signals from the control plane from packets in the data plane, requires control of the delay-related tree structure available in the event of an emergency during autonomous driving. In these scenarios, the network architecture that handles in-vehicle information is a major variable of delay. Since SDNs in general centralized structures are difficult to meet the desired delay level, studies on the optimal size of SDNs for information processing should be conducted. Thus, SDNs need to be separated on a certain scale and construct a new type of network, which can efficiently respond to dynamically changing traffic and provide high-quality, flexible services. Moreover, the structure of these networks is closely related to ultra-low latency, high confidence, and hyper-connectivity and should be based on a new form of split SDN rather than an existing centralized SDN structure, even in the case of the worst condition. And in these SDN structural networks, where automobiles pass through small 5G cells very quickly, the information change cycle, round trip delay (RTD), and the data processing time of SDN are highly correlated with the delay. Of these, RDT is not a significant factor because it has sufficient speed and less than 1 ms of delay, but the information change cycle and data processing time of SDN are factors that greatly affect the delay. Especially, in an emergency of self-driving environment linked to an ITS(Intelligent Traffic System) that requires low latency and high reliability, information should be transmitted and processed very quickly. That is a case in point where delay plays a very sensitive role. In this paper, we study the SDN architecture in emergencies during autonomous driving and conduct analysis through simulation of the correlation with the cell layer in which the vehicle should request relevant information according to the information flow. For simulation: As the Data Rate of 5G is high enough, we can assume the information for neighbor vehicle support to the car without errors. Furthermore, we assumed 5G small cells within 50 ~ 250 m in cell radius, and the maximum speed of the vehicle was considered as a 30km ~ 200 km/hour in order to examine the network architecture to minimize the delay.