• Title/Summary/Keyword: 워킹 현상

Search Result 22, Processing Time 0.025 seconds

Suggesting Research Methods to Explore the Nature of Earth Science: Applying the Phenomenological Approach and Family Resemblance Approach to NOS (지구과학의 본성에 대한 연구방법 제안 -현상학적 접근 및 과학의 본성(NOS)에 대한 가족유사성 접근의 활용-)

  • Park, Won-Mi
    • Journal of The Korean Association For Science Education
    • /
    • v.40 no.1
    • /
    • pp.51-60
    • /
    • 2020
  • In this study, we propose research methods to explore the nature of earth science by applying the phenomenological approach and NOS-family resemblance approach based on literature review. The phenomenological approach exploring the nature of earth science is a method of collecting, analyzing and synthesizing multifaceted features of earth science from intuitive sensory phenomena without prejudice. As a way of exploring the nature of earth science from a phenomenological point of view, we propose the NOS-family resemblance approach to the NOS. This approach provides a comprehensive explanation of NOS by combining the characteristics shared by different areas of science with distinct differences. Applying this method to exploring the nature of earth science, we can identify both domain-general and domain-specific characteristics that make sub-areas of earth science a 'family.' For example, through the networking of features shared by such sub-areas as geology, atmospheric science, oceanography, astronomy, earth system science, etc., we can extract the family-resemblance characteristics that make these sub-areas a family called earth science. Through these approaches to the nature of earth science, the richness, complexity, and dynamic nature of earth science can be revealed as a whole. In addition, we will be able to grasp the change in the sub-areas that constitute the earth science, which in turn changes the nature of earth science, and to contribute to establishing the status and development system of earth science as a school subject.

Efficient Contents Verification Scheme for Contents-Centric-Networking (콘텐츠 중심 네트워킹을 위한 콘텐츠 인증 기술)

  • Kim, DaeYoub;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.234-241
    • /
    • 2014
  • xTo improve network inefficiency caused by network congestion around a content-source, content-centric networking (CCN) allows network nodes transmitting contents to temporarily cache received contents and then send back the cached contents if the nodes receive relevant request messages without forwarding the request messages to content-sources. However, because nodes receiving requested contents through CCN cannot recognize real senders of the received contents, the receivers need to verify each received contents before using them. But such a verification procedure can cause long service/operation delay. Hence, in this paper, we review the problem of contents verification, propose an improved verification procedure and evaluate its performance.

Effective Real-Time Information Control Algorithm Using Ad Hoc Relaying System for Car Navigation Systems (차량 항법 시스템 환경에서 Ad Hoc Relaying System을 이용한 효과적인 실시간 정보 제어 기법)

  • 변계섭;임성화;김재훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.346-348
    • /
    • 2002
  • 차량 항법 시스템(Car Navigation System)은 요즘 많은 발전을 거듭하여 차량 이용시 사용자가 가고자하는 목적지까지의 길을 쉽게 안내하고 있다. 이런 기술의 발전은 단순한 정적인 길 안내(Static Route Guidance) 뿐만 아니라. 동적인 길 안내(Dynamic Route Guidance)를 함으로써 자동차 운전자가 쉽고 빠른 길을 안내 받을 수 있게 되었다. 그러나 이러한 교통정보는 매우 변화가 심하므로 최초로 경로를 전송 받은 후 그 경로상에 교통정보가 변화하였다면, 이미 전송 받은 경로는 실시간으로 적극적으로 대응할 수 없고 실제 막히는 길로 안내할 수 있다. 목적지까지의 거리가 먼 경우 이런 현상이 더욱 심하게 나타날 수 있다. 이런 경우 운전자는 실제로는 막히는 길로 안내 받을 수 밖에 없다. 이런 문제점을 해결하기 위해 교통정보를 수집하는 기존의 시스템에 Ad Hoc 네트워킹이 가능한 시스템을 탑재한 교통정보 수집 차량(Probe Car)을 이용한다. 정보 수집 차량이 극심한 정체를 발견하면 근처를 지나는 경로를 가진 차량에게 이를 전달하여 새로운 경로를 다운받을 수 있도록 한다. 이런 방법은 Ad Hoc Relaying System〔l〕을 이용하여 가능하며, 센터에 수집되고 가공되는 시간을 최대한 줄일 수 있으며, 센터의 통신 오버헤드를 최소화할 수 있다. 또한 기지국에 호가 집중되어 call blocking이 발생함 경우에 이를 해결할 수 있다.

  • PDF

Route Optimization Using a Limited Prefix Delegation Method in Multi-level Nested Mobile Network Environments (다단 중첩된 이동네트워크 환경에서 제한된 프리픽스 위임 방법을 이용한 경로최적화)

  • Song, Jung-Wook;Han, Sun-Young
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.309-321
    • /
    • 2009
  • Nowadays, requests of connecting to the Internet while moving are increasing more and more, and various technologies have been developed for satisfying those requests. The IETF nemo WG standardized "Network Mobility Basic Support Protocol" for supporting mobile network through extending existing MIPv6 protocol for supporting host mobility. But, mobile networks can be nested while they are changing their location. And if they are multi -level nested, that causes some problems because of protocol characteristic. In this paper, we try to solve the problem that is complicated routing path caused by multi-level nesting of mobile networks with our limited prefix delegation method. We give a little modification to the standard protocol and add some functions to mobile router. With results from analysis, we could say that our method has better performance than other proposed methods.

Exploratory Study on the Phenomena of Entrepreneurship Education in Food and Agriculture Sectors Based on the Grounded Theory Approach (근거이론접근법에 기반한 농식품분야 창업교육현상에 관한 탐색적 연구)

  • Seol, Byung Moon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.15 no.3
    • /
    • pp.33-46
    • /
    • 2020
  • This study analyzes the entrepreneurship education phenomena for agri-food entrepreneurs whose main business is the production of agricultural products and the sale of processed products, using the qualitative study Strauss & Corbin(1998)'s evidence theory approach. From the entrepreneur's point of view, I would like to summarize the phenomena that appear in education, and to prepare a theoretical basis for explaining the phenomena. The importance of entrepreneurship education is emphasized to cultivate the ability to develop and provide products tailored to customers. The necessity of education leads to an increase in demand according to the situational awareness of the founders, and the quantitative increase in entrepreneurship education in the agri-food sector is a clear trend. Inevitably, the need for various discussions on systematic and effective entrepreneurship education is raised. For the study, an interview was conducted with preliminary or entrepreneur who have experienced entrepreneurship education in the agri-food sector. As a research method, I use Strauss & Corbin(1998)'s approach and analyze qualitative data using QSR's NVIVO 12 program. Through this study, it was found that contextual and systematic entrepreneurship education in the agri-food sector has the effect of strengthening competitiveness and strengthening sales. There is a need for follow-up management of trainees. Strengthening the competitiveness of start-ups is based on training professional manpower through education and linking regions with cities. Strengthening sales is based on product planning and market development. This study explores entrepreneurship education in the agri-food sector, which has not been actively conducted in the past. Exploratory analysis on the experiences of the founders of agri-food sector as education demanders has an important meaning for understanding the phenomenon of start-up education.

A Study on Fake Data Filtering Method of CCN (콘텐츠 중심 네트워킹 환경에서의 Fake Data Filtering Method 연구)

  • Kim, DaeYoub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.155-163
    • /
    • 2014
  • To enhance network efficiency, content-centric networking (CCN) proposes that intermediated network nodes on a content-delivery path temporally cache transmitted contents. Then if an intermediated node receives a content request message (Interest) for previously cached content, the node directly transmits the cached content as a response message (Data) to requestors and finishes the transmission of the received Interest. Since Interest is performed by intermediated network nodes, it is possible to efficiently transmit contents and to effectively solve a network congestion problem caused around contents sources. For that, CCN utilizes both content store to temporarily cache content and pending Interest table (PIT) to record Interest incoming Face. However, it has mentioned the possibility of denial service attack using both the limitation of PIT resource and fake Interests. In this paper, we briefly describe the presented PIT flooding attack utilizing fake Interest. Then we introduce new attack possibility using fake Data and propose a countermeasure for the proposed attack. Also we evaluate the performance of our proposal.

Resource Share Mechanism for the Balanced Backcup Path Establishment in Optical Networks (광 통신망에서 보호 패스 설정을 위한 분산 자원 공유 메카니즘)

  • Park Hyeon;Lee Dong-Hun;Yae Byung-Ho;Kim Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12A
    • /
    • pp.1111-1119
    • /
    • 2005
  • A single fiber cut can potentially influence a total of 1.6 Tbps of traffic and is surprisingly frequent and results in significant loss of traffic. The survivability as we as the resource utilization of the connection in optical networks is important. Existing protection mechanisms to rapidly recover the failures allocate the backup path just SRLG-disjointed with working path. Those did not consider the unbalanced resource share of backup paths. The backup paths can be centralized on the specific link so that the idle resource is not used. As a result, as those do not efficiently use the resource the whole resource utilization is not so good. So we propose the mechanism to enhance the resources utilization as settling down the unbalanced resource share. Our purpose is to improve the link utilization as distributing the maximum link load.

Design of Mobile-based Security Agent for Contents Networking in Mixed Reality (융합현실에서 콘텐츠 네트워킹을 위한 모바일 기반 보안 중계 설계)

  • Kim, Donghyun;Lim, Jaehyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.22-29
    • /
    • 2019
  • Due to the development of ICT technology, convergence reality contents are utilized as technology for providing services in various industrial fields by visualizing various information such as sensor information and shared information in a service platform showing only simple three-dimensional contents. Research is underway to reduce the weight of applications by transmitting the resources of the object to be enhanced to the network as the information and the contents to be provided increase. In order to provide resources through the network, servers for processing various information such as pattern information, content information, and sensor information must be constructed in a cloud environment. However, in order to authenticate data transmitted and received in real-time in a cloud environment, there is a problem in that the processing is delayed and a delay phenomenon occurs in the rendering process and QoS is lowered. In this paper, we propose a system to distribute cloud server which provides augmented contents of convergent reality service that provides various contents such as sensor information and three - dimensional model, and shorten the processing time of reliable data through distributed relay between servers Respectively.

A Comparative Study of R&D Transfer by Multinational Corporations between Korea and China (다국적기업의 R&D 이전에 관한 한·중 비교연구)

  • Shin, Geon-cheol;Park, Young-hee;Lee, Heung-youn
    • International Area Studies Review
    • /
    • v.13 no.1
    • /
    • pp.309-340
    • /
    • 2009
  • Multinational Corporations (MNCs) are increasingly establishing globally-distributed R&D (Research and Development) centers in which sites around the world work collaboratively to develop new manufacturing and product technologies. Following new globalization strategies, these projects more often include sites in Emerging/Newly Industrializing Economies (E/NIEs). The success of these ventures promises to be increasingly important both for the bottom line of MNCs and for the development ambitions of E/NIEs. This study attempts to identify these trends and to compare R&D transfer between Korea and China. The study identifies specific factors on MNC's R&D transfer and compares those operating factors between the R&D centers in Korea and China, which attract many MNCs in the world. Among those eight dimensions relating to MNCs' operation, there are significant differences in site selection, market characteristics, government support, and R&D networking between Korea and China. The analysis show more positive factors on China than Korea regarding R&D operations. The result will be helpful for both MNC's managers and governments' decision makers with respect to R&D transfer.

Analysis of Network Security Policy Enforcement in Container Environments (컨테이너 환경에서의 네트워크 보안 정책 집행 분석)

  • Bom Kim;Seungsoo Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.961-973
    • /
    • 2023
  • With the changes in the modern computing landscape, securing containerized workloads and addressing the complexities of container networking have become critical issues. In particular, the complexity of network policy settings and the lack of cloud security architecture cause various security issues. This paper focuses on the importance of network security and efficiency in containerized environments, and analyzes the security features and performance of various container network interface plugins. In particular, the features and functions of Cilium, Calico, Weave Net, and Kube-router were compared and evaluated, and the Layer 3/4 and Layer 7 network policies and performance features provided by each plugin were analyzed. We found that Cilium and Calico provide a wide range of security features, including Layer 7 protocols, while Weave Net and Kube-router focus on Layer 3/4. We also found a decrease in throughput when applying Layer 3/4 policies and an increase in latency due to complex processing when applying Layer 7 policies. Through this analysis, we expect to improve our understanding of network policy and security configuration and contribute to building a safer and more efficient container networking environment in the future.