• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.025 seconds

Performance Analysis of IEEE 802.15.4 for D1 Small Distribution Substation (D1 소규모 배전 변전소를 위한 IEEE 802.15.4 성능 분석)

  • Hwang, Sung-Ho;Kang, Eun-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.115-121
    • /
    • 2017
  • Times New RomanThe utilization of Information and Communication Technologies (ICT) in the smart grid application can construct efficient and reliable electrical grid. IEC 61850 was adopted as the standard for smart grid exchanging the information required in an electric power utility. However, applying technologies like IEC 61850 using Ethernet to the automation of small distribution substation directly may cost more than the value of the small distribution substation itself. IEEE 802.15.4 technology attracts attention in the field of power utility automation because of low installation cost and ease of installation. Studies are conducted, which use IEEE 802.15.4 in less strict D1 small distribution substation. This study applied IEEE 802.15.4 to the small distribution substation and conducted performance evaluation using the actual equipment. This study determined the scope of application of IEEE 802.15.4 by conducting a comparative analysis of the message type in IEC 61850.

Design of MCC Security System in Physical Layer (물리 계층 보안시스템 MCC부호기 설계)

  • Kim, Gun-Seok;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.181-186
    • /
    • 2008
  • Wireless data transmission is vulnerable to attackers and hackers. Recently, the fast development of wireless communication systems seamlessly increase the demand for security in this area. Moreover, error correction is especially important because various kinds of interferences among wireless devices. In order to solve two above problems, we propose to apply MCC (M-sequence Convolutional Code) in the system which is able to protect information and correct errors. The proposed system can obtain higher secure property by randomly changing the output connections by the proposed M-sequence. Performance of the system is analyzed according to BER (Bit Error Rate) and secure levels. The simulation results revealed that we can get the coding gain of 0.1 dB over conventional convolution coding technique. The proposed algorithm is installed in physical layer and easily implemented. Another advantage of our proposed (M-sequence and convolutional code) is that it can be applied to CDMA (Code Division Multiple Access) communication system.

  • PDF

Channel Sounding-based Channel Capacity Measurement of MIMO-OFDM (채널 사운딩 기반의 MIMO-OFDM 채널용량 측정)

  • Park, Bang-Hun;Cho, Ju-Phil;Kim, Seong Kwon;Cha, Jae Sang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.29-34
    • /
    • 2008
  • In this paper, we propose the channel sounding scheme which improves the reliability and performance of communication link and mitigate the fading effect of channel in MTMO-OFDM system having correlation between Tx and Rx antennas. And we estimate the channel propagation characteristics of channels between the transmitter and receiver with CS scheme by measuring the channel propagation characteristics using sounding signal. Multi agent system models can be used to analyze the path of the system within any time frame. Further, using this proposed method, we can increase the channel capacity by simple calculation in receiver and transmitter and allocate the optimal power by channel information in transmitter. Also, the increment of channel capacity using the prorposed method is induced as the number of antenna is increased. So, we can anticipate the performance improvement with the presented scheme in more complicated Tx and Rx antenna system.

  • PDF

Implementation of Remote Control System using TeleRemote System (TeleRemote를 이용한 원격 제어 시스템 구현)

  • 김상복;한성호;진현준;박노경
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12B
    • /
    • pp.1115-1123
    • /
    • 2003
  • In this paper, a remote control system called TeleRemote system which can be applied to existing wireless mobile networks or public telephone networks for remote control is designed and implemented. The proposed design employs program technology based on the theory of signal detect control and enables the EPG(Electronic Program Guide) functions such as recording reservation of bidirectional video signals with TV reception card on PC. It can also control recording reservation using remote control program through telecommunication network The PC-EPG system is implemented in Web programs with Server/Clinet architecture and the server system that provides EPG functionalities is in charge of recording reservations and data communications by means of the scheduler program. Data storing to client PCs is performed through TCP/IP and finished by client programs implemented using Visual C++/MFC programs. As remote control system, the developed system can be used for unmanned security system using the Web camera. Building intranet and making connection to internet, the TeleRemote system is believed to create potential for commercial communication system.

A Study on the Reliability Verification of Real-time Railway Safety Integrated Monitoring and Control System (실시간 철도안전 통합 감시제어시스템 신뢰성 검증에 관한 연구)

  • Son, Sang-Hyun;Kim, Sang-Ahm;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.83-89
    • /
    • 2021
  • With the recent development of information and communication technology, there have been many attempts to apply various IT technologies in the railway field. Until now, the safety control system has been installed at the site and operated using actual data, but there is a problem that it is difficult to verify the function of the railway safety control system in that no accidents occur in real situations. In this study, accident data is generated randomly to verify that the safety control system is functioning properly, and to this end, simulation data is prepared according to the simulator, accident scenario and scenario. Real-time railway safety monitoring system collects and transmits data from interface devices to common protocol called DDS.

Mobile-based Big Data Processing and Monitoring Technology in IoT Environment (IoT 환경에서 모바일 기반 빅데이터 처리 및 모니터링 기술)

  • Lee, Seung-Hae;Kim, Ju-Ho;Shin, Dong-Youn;Shin, Dong-Jin;Park, Jeong-Min;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.1-9
    • /
    • 2018
  • In the fourth industrial revolution, which has become an issue now, we have been able to receive instant analysis results faster than the existing slow speed through various Big Data technologies, and to conduct real-time monitoring on mobile and web. First, various irregular sensor Data is generated using IoT device, Raspberry Pi. Sensor Data is collected in real time, and the collected data is distributed and stored using several nodes. Then, the stored Sensor Data is processed and refined. Visualize and output the analysis result after analysis. By using these methods, we can train the human resources required for Big Data and mobile related fields using IoT, and process data efficiently and quickly. We also provide information that can confirm the reliability of research results through real time monitoring.

A Study on the Integrated Business Function Design Standardization of the Meat Processed Food Industry ERP System (육가공식품산업 ERP시스템의 통합적인 업무 기능 설계 표준화 연구)

  • Yoon, Kyung-Bea;Kim, Young-Joon;Lee, Jae-Suk;Kim, Dong-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.205-210
    • /
    • 2019
  • In this study, in order to promote informatization of Meat Processed Food Industry, we standardize three processes of sales management, purchaser logistics and production management, develop standard modules, and develop integrated business functional design in ERP system development. This study reduces the cost of introducing the production equipment information standardization module in the food industry and the specialized IT companies that are slow in informatization, and maximizes the effectiveness and provides reliability by being a database where research standardization can be compared and analyzed. By applying the results of this study, it is possible to establish efficient processes of sales, buyer logistics, production, improvement of quality, and reduction of production cost from the receipt of food raw materials / subsidiary materials to finished products.

A Dynamic Correction Technique of Time-Series Data using Anomaly Detection Model based on LSTM-GAN (LSTM-GAN 기반 이상탐지 모델을 활용한 시계열 데이터의 동적 보정기법)

  • Hanseok Jeong;Han-Joon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.103-111
    • /
    • 2023
  • This paper proposes a new data correction technique that transforms anomalies in time series data into normal values. With the recent development of IT technology, a vast amount of time-series data is being collected through sensors. However, due to sensor failures and abnormal environments, most of time-series data contain a lot of anomalies. If we build a predictive model using original data containing anomalies as it is, we cannot expect highly reliable predictive performance. Therefore, we utilizes the LSTM-GAN model to detect anomalies in the original time series data, and combines DTW (Dynamic Time Warping) and GAN techniques to replace the anomaly data with normal data in partitioned window units. The basic idea is to construct a GAN model serially by applying the statistical information of the window with normal distribution data adjacent to the window containing the detected anomalies to the DTW so as to generate normal time-series data. Through experiments using open NAB data, we empirically prove that our proposed method outperforms the conventional two correction methods.

A Case Analysis on the Effects of Cloud Adoption on Service Continuity - Focusing on Failures (클라우드 도입이 서비스 연속성에 미치는 영향에 관한 사례 분석 - 장애 중심으로)

  • Ji-Yong Huh;Joon-Hee Yoon;Eun-Kyong Han
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.121-126
    • /
    • 2023
  • As service utilization for IT technologies such as artificial intelligence, big data, and IOT has recently increased, cloud computing has been introduced to efficiently manage vast amounts of data and IT infrastructure resources that process them to provide stable and reliable information services while streamlining infrastructure costs. Efforts for this are ongoing. This thesis compares and analyzes the operation results before and after cloud adoption in terms of system failures for 426 systems at 360 branches nationwide in cloud systems of companies operating a total of 1,750 cloud systems. As a result of the analysis, the number of failures and failure types , service downtime, etc., the introduction of the cloud yielded significant results in securing service continuity. Through this result, it is expected to provide meaningful implications to companies expecting to secure service continuity by adopting the cloud.

A Design of SSD Dedicated RAID System for Efficient Resource Management (효율적인 자원관리를 위한 SSD 전용 RAID 시스템 설계)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.109-114
    • /
    • 2024
  • Enterprise storage systems that require high data reliability are applying RAID (Redundant Array of Independent Disks) systems to recover from data loss and failure. In particular, RAID 5 ensures space efficiency and reliability by distributing parity across multiple storage devices. However, when storage devices have different capacities, RAID is built based on the smallest capacity storage device, resulting in wasted storage space. Therefore, research is needed to solve this resource management problem. In this paper, we propose a method for RAID grouping of each independent NAND flash memory block in a RAID consisting of SSD (Solid State Disk) with external SSDs as well as internal SSDs. This method is divided into a policy for delivering block information inside SSDs to the RAID system and a policy for RAID grouping of physical addresses delivered from the RAID system. This method allows us to maintain a RAID that does not waste resources when SSDs of different capacities are grouped into RAID5. Finally, we demonstrate the effectiveness of the proposed method through experiments.