• Title/Summary/Keyword: 연결망 감시

Search Result 38, Processing Time 0.026 seconds

Definition of New SIBs for Service Description and Implementation of SCE in Intelligent Network (지능망에서 서비스 기술을 위한 새로운 SIB들의 정의와 SCE의 구현)

  • 김연중;이지영;마영식;안순신
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.2
    • /
    • pp.209-220
    • /
    • 2004
  • The Goals of Intelligent Network(IN) provide the methods that create, test and apply the various hinds of services to satisfy the user's need. In this environments, we can create new IN service by description of GSL(Global Service Logic) using that SCE(Service Creation Environment). In the ITU-T CS-2, the various SIBs(Service Independent Building-blocks) are defined to develop the services. There are limitations to develop the various services using the SIBs defined in recommendation. So, in this paper, we define the new SIBs and implement the SCE. The new SIBs are defined in this paper are Connect SIB and BCSM Event SIB. The Connect Call SIB provides the connectivity between SLPI(Service Logic processing Program Instance) and call after connecting the calling party to called party. The BCSMEvent SIB provides the functions that request SSF to report the call processing event and receive it. In this paper, we design and implement the SCE that supports the SIBs defined by recommendation and this paper, provides GUI environment to specify GSI, and generates the code used by SCP.

Analysis Results in Technological Trends of Military Small Giant Venture Tech-Fi Net via Social Network Analysis (사회연결망 분석을 이용한 국방 강소벤처 Tech-Fi Net 기술동향 분석)

  • Park, Jae Woo;Lee, Il Ro;Kwon, Jae Wook;Byun, Kisik;Cho, Sung-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.444-455
    • /
    • 2019
  • The purpose of this research was to analyze technological trends of 「Military Small Giant Venture Tech-Fi Net」 from Defense Technology Information Service via social network analysis. 「Military Small Giant Venture Tech-Fi Net」, which was constituted for their fine technology for application to the military field, registered 847 technologies of 388 companies. In this research, we analyzed 847 technologies for the relations between "Military System" and "Military Technology Category" via centrality measurement, one of the social network analysis methods. The results indicate that the major technologies of domestic military small giant venture companies were "Sensor" and "ICT" for "C4I System" and "Surveillance and Reconnaissance System" and "Platform/Structure" for "Land System", "Aeronautical System" and "Naval Sea System". In contrast, we recognized inadequate technologies, such as "Propellant" and "Material" for "Missile and Ammunition system" and "Sensor" and "ICT" for "Defense System", We hope that our results and method will be conducive to the technological development of Small Giant Venture companies.

A Priority Based Multipath Routing Mechanism in the Tactical Backbone Network (전술 백본망에서 우선순위를 고려한 다중 경로 라우팅 방안)

  • Kim, Yongsin;Shin, Sang-heon;Kim, Younghan
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1057-1064
    • /
    • 2015
  • The tactical network is system based on wireless networking technologies that ties together surveillance reconnaissance systems, precision strike systems and command and control systems. Several alternative paths exist in the network because it is connected as a grid to improve its survivability. In addition, the network topology changes frequently as forces and combatants change their network access points while conducting operations. However, most Internet routing standards have been designed for use in stable backbone networks. Therefore, tactical networks may exhibit a deterioration in performance when these standards are implemented. In this paper, we propose Priority based Multi-Path routing with Local Optimization(PMPLO) for a tactical backbone network. The PMPLO separately manages the global and local metrics. The global metric propagates to other routers through the use of a routing protocol, and it is used for a multi-path configuration that is guaranteed to be loop free. The local metric reflects the link utilization that is used to find an alternate path when congestion occurs, and it is managed internally only within each router. It also produces traffic that has a high priority privilege when choosing the optimal path. Finally, we conducted a simulation to verify that the PMPLO can effectively distribute the user traffic among available routers.

Development of Intelligent Outlets for Real-Time Small Power Monitoring and Remote Control (실시간 소전력 감시 및 원격제어용 지능형 콘센트 개발)

  • Kyung-Jin Hong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.169-174
    • /
    • 2023
  • Currently, overall power usage is also increasing as power demand such as homes, offices, and factories increases. The increase in power use also raised interest in standby power as a change in awareness of energy saving appeared. Home and office devices are consuming power even in standby conditions. Accordingly, there is a growing need to reduce standby power, and it aims to have standby power of 1W or less. An intelligent outlet uses a near-field wireless network to connect to a home network and cut or reduce standby power of a lamp or appliance connected to an outlet. This research aims to develop a monitoring system and an intelligent outlet that can remotely monitor the amount of electricity used in a lighting lamp or a home appliance connected to an outlet using a short-range wireless network (Zigbee). Also, The intelligent outlet and monitoring system developed makes it possible for a user to easily cut off standby power by using a portable device. Intelligent outlets will not only reduce standby power but also be applicable to fire prevention systems. Devices that cut off standby power include intelligent outlets and standby power cutoff switches, so they will prevent short circuits and fires.

Distributing Board Monitoring System based on Internet of Things (사물인터넷 기반 수배전반 상태 모니터링 시스템)

  • Lee, Young-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.200-206
    • /
    • 2016
  • It is necessary to develop a real-time monitoring system for electric facilities, operating and managing system for the accident prevention of electrical demand facilities anytime, anywhere. In this paper, we propose the implementation of distributing board monitoring system based on Internet of Things(IoT). The proposed system is installed in existing distributing board that it can transmit status information of distributing board and control information through the cloud server and the wireless local area network. The distributing board monitoring system can monitor and control the condition of distributing board by system administrator. The results show that the margin of error was ${\pm}5%$ in performance evaluation.

A Research for the Realness of Game Risks based on ANT (ANT를 통한 게임 위험의 실재성에 대한 연구)

  • Lee, Jangwon;Yoon, Joonsung
    • Journal of Korea Game Society
    • /
    • v.16 no.5
    • /
    • pp.7-22
    • /
    • 2016
  • The risk is subjectively perceived by the subject to judge. In the case of the game, game organizations and watchdog groups also recognized differently occurrence probability and intensity of risk to form a physical relationships of the game with each. Thus, we look only at the risk of their own subjective opinion, the fundamental solution is not possible. In this paper, we conducted a study on the form, occurrence point, and generating processes of risk by analyzing the physical components that make up the network of the game based on ATN in order to confirm definitely the substance and the presence of the game risk. In view of ANT, the game and humans constitute a network through their ability to act as each actor. If the gamer does not clearly recognize the nature of the ability to act of the game, the reverse control and the excess flow occur through remediation properties of the game. Therefore, it requires a more in-depth study in the future with respect to complex structure and relationships of the game-gamer network.

A study on training DenseNet-Recurrent Neural Network for sound event detection (음향 이벤트 검출을 위한 DenseNet-Recurrent Neural Network 학습 방법에 관한 연구)

  • Hyeonjin Cha;Sangwook Park
    • The Journal of the Acoustical Society of Korea
    • /
    • v.42 no.5
    • /
    • pp.395-401
    • /
    • 2023
  • Sound Event Detection (SED) aims to identify not only sound category but also time interval for target sounds in an audio waveform. It is a critical technique in field of acoustic surveillance system and monitoring system. Recently, various models have introduced through Detection and Classification of Acoustic Scenes and Events (DCASE) Task 4. This paper explored how to design optimal parameters of DenseNet based model, which has led to outstanding performance in other recognition system. In experiment, DenseRNN as an SED model consists of DensNet-BC and bi-directional Gated Recurrent Units (GRU). This model is trained with Mean teacher model. With an event-based f-score, evaluation is performed depending on parameters, related to model architecture as well as model training, under the assessment protocol of DCASE task4. Experimental result shows that the performance goes up and has been saturated to near the best. Also, DenseRNN would be trained more effectively without dropout technique.

Highway Drone Patrol Network Topology and Performance Analysis for Traffic Violation Enforcement (교통위반 단속을 위한 고속도로 드론 패트롤 네트워크의 토폴로지 및 성능분석)

  • Jo, Jun-Mo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.6
    • /
    • pp.1043-1048
    • /
    • 2017
  • Since year 2016, in Korea, the police department started to use drones to patrol violated vehicles on the highway area. They monitor vehicle drivers who use side ways on the highway during traffic congested hours of the season, drunken drivers, or violent drivers. They use the 'Spot Mobility' method which floats the drones for 30 minute period. However, this method is inefficient since it requires manually charging batteries, gathering data, and operate drones with many numbers of policeman. Therefore, in this paper, for the efficient patrol in this purpose, I have suggested an effectively manageable network system consists of many drones as the wireless network nodes and with small numbers of policeman in a wide highway area. To accomplish this, the two topologies of effective drone patrol network systems are designed and simulated in OPNET simulator for performance evaluation.

Intrusion Detection Methodology for SCADA system environment based on traffic self-similarity property (트래픽 자기 유사성(Self-similarity)에 기반한 SCADA 시스템 환경에서의 침입탐지방법론)

  • Koh, Pauline;Choi, Hwa-Jae;Kim, Se-Ryoung;Kwon, Hyuk-Min;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.267-281
    • /
    • 2012
  • SCADA system is a computer system that monitors and controls the national infrastructure or industrial process including transportation facilities, water treatment and distribution, electrical power transmission and distribution, and gas pipelines. The SCADA system has been operated in a closed network, but it changes to open network as information and communication technology is developed rapidly. As the way of connecting with outside user extends, the possibility of exploitation of vulnerability of SCADA system gets high. The methodology to protect the possible huge damage caused by malicious user should be developed. In this paper, we proposed anomaly detection based intrusion detection methodology by estimating self-similarity of SCADA system.

Core network maintenance by NO.7 protocol analyzing (Core Network 유지 보수를 위한 NO.7 Protocol 감시 방안)

  • Yoo Jun-Mo;Kim Yun-Sung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.1
    • /
    • pp.49-60
    • /
    • 2005
  • The Back Bone of gearing portion between Core Network System which is used in wire and wireless system is No.7 Protocol. ISUP( ISDN User Part), INAP handling in Intelligent Network and MAP gearing method for linking each Network Element System in mobile network have use of No.7 signaling. Therefore, it is require for system to detect the problem - operating problem occurs in Core Network which use No.7 signaling or the existing problem that is not recognized - in shortest time. This paper study out analyzing and measuring system for No.7 protocol and analyzing out system whether out of order or not. It can abstract No.7 Signaling Message and analyze system performance and report it. This system is connected in system No.7 HW Module which is in charge of No.7 Signaling. It is not offer Emulator function and Simulation function for any scenario but offer monitoring No.7 signaling. This system perform the function about No.7 MTP, ISUP, INAP and MAP and is offered several wire and wireless network Operator. It can detect and correct SW system, HW system and operating system problem. From now on, this system may offer the function about A-interface which is gearing between BSC and MSC, so it will perform to analyze generally and prompt effective operating for Core Network system.