• Title/Summary/Keyword: 정보 가상화

Search Result 1,407, Processing Time 0.027 seconds

A Study on the Interoperability of ROK Air Force Virtual and Constructive Simulation (공군 전투기 시뮬레이터와 워게임 모델의 V-C 연동에 대한 연구)

  • Kim, Yong Hwan;Song, Yong Seung;Kim, Chang Ouk
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.169-177
    • /
    • 2019
  • LVC(Live-Virtual-Constructive) training system is drawing attention due to changes in battlefield situation and the development of advanced information and communication technologies. The ROKAF(Republic of Korea Air Force) plans to construct LVC training system capable of scientific training. This paper analyzes the results of V-C interoperability test with three fighter simulators as virtual systems and a theater-level wargame model as a constructive system. The F-15K, KF-16, and FA-50 fighter simulators, which have different interoperable methods, were converted into a standard for simulation interoperability. Using the integrated field environment simulator, the fighter simulators established a mutually interoperable environment. In addition, the Changgong model, which is the representative training model of the Air Force, was converted to the standard for simulation interoperability, and the integrated model was implemented with optimized interoperability performance. Throughput experiments, It was confirmed that the fighter simulators and the war game model of the ROKAF could be interoperable with each other. The results of this study are expected to be a good reference for the future study of the ROKAF LVC training system.

Network Slice Selection Function on M-CORD (M-CORD 기반의 네트워크 슬라이스 선택 기능)

  • Rivera, Javier Diaz;Khan, Talha Ahmed;Asif, Mehmood;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.21 no.2
    • /
    • pp.35-45
    • /
    • 2018
  • As Network Slicing functionality gets applied to mobile networking, a mechanism that enables the selection of network slices becomes indispensable. Following the 3GPP Technical Specification for the 5G Architecture, the inclusion of the Network Slice Selection Function (NSSF) in order to leverage the process of slice selection is apparent. However, actual implementation of this network function needs to deal with the dynamic changes of network instances, due to this, a platform that supports the orchestration of Virtual Network Functions (VNF) is required. Our proposed solution include the use of the Central Office Rearchitected as a Data Center (CORD) platform, with the specified profile for mobile networks (M-CORD) that integrates a service orchestrator (XOS) alongside solutions oriented to Software Defined Networking (SDN), Network Function Virtualization (VNF) and virtual machine management through OpenStack, in order to provide the right ecosystem where our implementation of NSSF can obtain slice information dynamically by relying on synchronization between back-end services and network function instances.

A Study on the Early Computer Utilization in Korean Broadcasting: Focusing on the History of Election Broadcasting(1985-1992) (한국 방송에서 초기 컴퓨터 활용에 관한 연구: 선거 개표방송 변천사를 중심으로(1985년-1992년))

  • Nah, So-Mi
    • Journal of Digital Convergence
    • /
    • v.20 no.1
    • /
    • pp.301-307
    • /
    • 2022
  • Today, each broadcasting station makes the best use of CG (computer Graphics), which is the latest technology in election broadcasting, and competes to attract the eyes of viewers. This paper investigated the history of CG technology and design transitions in election ballot counting broadcasts from the perspective of CG designers. From the 1980s, when computer-based election ballot counting began, to the full-scale use of virtual studios, the image and technology produced by CG while watching the ballot-counting broadcast video of general elections, presidential elections, and local elections. We analyzed the utilization from various angles. In Korea, we started with the EDDS (Election Data Display System) developed in-house, created a database using a computer, and introduced manual animation CG every day from that time. After that, broadcasting stations focused on diverse and gorgeous CG image competition, and CG images were expanded from 2D to 3D while technology and design developed together. From 1985 to 1992, Korean broadcasting can be seen as a transitional period in which the image changes due to the emphasis on information power while utilizing digital technology.

MPEG Surround for Multi-Channel Audio Coding-Part 1: Basic Structure (다채널 오디오 코딩을 위한 MPEG Surround-1부: 기본 구조)

  • Pang, Hee-Suk
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.7
    • /
    • pp.599-609
    • /
    • 2009
  • An overview of the recently finalized multi-channel audio coding standard MPEG Surround is provided. This audio coding standard downmixes multi-channel signals to mono or stereo signals and, simultaneously, extracts spatial parameters for its encoding process. In its decoding process, it reconstructs multi-channel signals based on the downmix signals and spatial parameters. Since the downmix signals are coded in conventional audio coding format such as AAC and MP3 and the spatial parameters require a small amount of information MPEG Surround guarantees high sound quality multi-channel audio at low bit rates. Besides, it is backward-compatible to conventional audio coding techniques because the downmix signals can be played on portable audio devices ignoring the spatial parameter information. In this paper, Part 1 presents an overview of the basic structure of MPEG Surround and Part 2 describes various modes and tools including the binaural mode which supports the virtual 5.1-channel playback via headphones or earphones. The listening test results by various companies and organizations are also presented.

MPEG Surround for Multi-Channel Audio Coding-Part 2: Various Modes and Tools (다채널 오디오 코딩을 위한 MPEG Surround-2부: 다양한 모드 및 툴들)

  • Pang, Hee-Suk
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.7
    • /
    • pp.610-617
    • /
    • 2009
  • An overview of various modes and tools of MPEG Surround is provided Because the binaural mode of MPEG Surround supports the virtual 5.1-channel playback based on HRTFs, it can be played via headphones and earphones for portable audio devices. MPEG Surround also supports the enhanced matrix mode which converts stereo signals to 5.1-channel signals without side information, the 3D stereo mode which deals with 3D-coded signals, the low power version which greatly reduces the computational load in the decoding process. Besides, MPEG Surround provides the arbitrary downmix gains (ADGs) tool which is applied to artistic downmix signals, the matrix compatibility tool which is applied to downmix signals by conventional matrix-based methods, the residual coding tool -which can be used at high bit rates, and the GES tool which is applied to specific sound such as applause. The listening test results by various companies and organizations are also presented for important modes and tools.

동서간 중소기업 협력체제 구축 방안

  • Han, Jang-Hui
    • Journal of Global Scholars of Marketing Science
    • /
    • v.2
    • /
    • pp.17-37
    • /
    • 1998
  • 중소기업간 협력 활동은 사업의 전체 혹은 일정 부분에 대하여 분업이나 협업의 관계를 맺는 공동사업의 형태로 나타난다. 기업간 연결의 강도에 따라 기업들간에 형성되는 분업과 협업의 관계를 시장형, 중간조직형, 위계조직형으로 구분할 때, 중소기업간 공동사업은 중간조직형에 속하는 일종의 기업간 네트워크라고 볼 수 있다. 물론 네트워크형의 협력관계를 추진하는 방식도 업무제휴, 지분제휴, 합작투자, 컨소시엄 등으로 다양하다. 그러나 완전한 자본적 통합에 따른 위계적 조직과는 달리 참여기업들이 독립성을 유지하면서, 네트워크 밖의 기업에 대해 경쟁우위를 확보하기 위해 형성한다는 공통점을 가지고 있다. 기업간 협력관계를 통해 참여 기업들이 얻을 수 있는 혜택에 관한 기존연구들은 크게 두 가지로 나누어 볼 수 있다. 하나는 기업의 생산함수를 중심으로 그 이점을 파악하는 것이고 다른 하나는 관계의 종류에 따라 기업간 거래관계를 관리하는 소위 거래비용의 효율성을 중심으로 혜택을 파악하는 접근방법이다. 전자의 접근방법을 따를 때, 기업간 협력의 근본 유인은 규모의 경제(혹은 비경제), 범위의 경제, 집적의 경제, 구도의 경제 등이 협력관계에서 발생하는 혜택의 근본 원천이다. 기술과 제도의 발전, 시장과 경쟁환경의 변화에 따른 기업간 협력의 필요성은 갈수록 증대되고 있다. 소비자들의 요구는 매우 개성화 다양화되고 종합화되는 추세이다. 더불어 기술개발의 비용이 큰 폭으로 증가하고 있으며, 경쟁의 격화로 기술 및 제품의 진부화도 급속도로 이루어지고 있다. 세계화 상품고도화 서비스산업화 정보화 등으로 특징지워지는 새로운 경쟁환경 아래에서 장기적으로 기업의 경쟁력을 향상시키기 위해서는 시장중심적인 관점에서 형성된 기업간 전략적 연계를 바탕으로, 정보의 집적을 통해 다양한 생산성 향상 혹은 관계효율성 향상의 경제를 추구하는 것이 필연적 전제 조건이 되었다. 기업간 경쟁보다는 최종제품의 생산과 판매를 위해 형성된 기업네트워크간의 경쟁이 중시되는 시대인 것이다. 동서간(東西間) 중소기업(中小企業)의 협력(協力)을 새삼스럽게 논의하는 것은 다분히 정치적이라는 느낌을 준다. 경제적인 관점에서 실익이 있음에도 불구하고 동서간 중소기업의 협력이 이루어지지 못하고 있다면, 그 이유는 기업정보의 수집과 유통상의 문제이거나 문화나 기업관행에 대한 잘못된 선입관에서 비롯된 관계 관리비용 계산상의 문제일 것이다. 현실적으로 이 가능성은 매우 낮다. 산업의 발전 정도나 연관성에 있어서 동서축보다는 남북축을 따라 기업간 협력이 이루어질 수 밖에 없는 우리나라의 현재 상황이 동서간보다는 남북간 경제교류를 유도하고 있는 것이다. 동서간 중서기업 협력체제의 구축에 대한 논의가 본질적으로 정치적 관심에서 비롯되었다는 전제 하에, 구축의 방안을 논의하고자 한다. 경제적으로도 타당하면서 정치적으로 관심을 유발할 수 있는 협력체제 구축방안으로, 기업간 네트워크의 조직 주체로서 최근에 논의되고 있는 새로운 형태의 마케팅회사를 동서간에 공동으로 설립할 것을 제안한다. 영구 지속적 공동사업관계보다는 프로젝트별 공동사업을 전제로 기업들 사이의 효과적인 네트워크를 형성함으로써 일종의 가상적 기업을 결성할 필요가 있다. 이러한 기업간 네트워크 형성의 실행주체가 될 수 있는 새로운 마케팅 전문기업의 형태로는 공동회사(空洞會社)(hollow company), 종합상사(綜合商社)(General Trading Company), 거래형 마케팅회사(Marketing Exchange Company), 변환형 마케팅회사(Marketing Coalition Company) 등을 들 수 있다. 양 지역에서는 소비자환경과 기술환경의 특성 및 양 지역의 경제에 대한 파급효과를 고려하여 가장 적합한 마케팅회사의 유형은 선택하여 육성하고, 이를 중심으로 강력한 양 지역 및 다른 지역에 입지한 기업간의 네트워크를 구축하여야 한다. 마케팅회사를 설립하고 완전한 마케팅 서비스를 제공할 수 있도록 육성하기 위해서는 많은 투자가 필요하다. 마케팅회사의 핵심기능 분야인 금융부문, 정보부문, 영업조직 등은 모두 막대한 투자를 필요로하는 기능영역이다. 정보부문은 기술의 발전과 범세계적인 정보관련기관과의 제휴를 통해 독자적인 구축이 어느 정도 가능하나, 영업조직의 구축을 위해서는 기존업체와의 연대가 필수적인 것으로 판단된다. 지속적으로 효과적인 기업간 네트워크를 형성하고 유지하기 위해서는 또한 기업간 관계를 관리하는 방식과 제도 및 수단에 대한 연구가 필요하다. 양 지역 산 학 관의 공동노력을 통해서 새로운 경제 환경에 가장 적합한 기업 형태로 제시된 바 있는 마케팅 전문회사 중심의 기업간 네트워크를 성공적으로 구축한다면, 양 지역 및 국가 경제의 지속적인 동력원이 될 수 있을 것이다

  • PDF

Social Tagging-based Recommendation Platform for Patented Technology Transfer (특허의 기술이전 활성화를 위한 소셜 태깅기반 지적재산권 추천플랫폼)

  • Park, Yoon-Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.53-77
    • /
    • 2015
  • Korea has witnessed an increasing number of domestic patent applications, but a majority of them are not utilized to their maximum potential but end up becoming obsolete. According to the 2012 National Congress' Inspection of Administration, about 73% of patents possessed by universities and public-funded research institutions failed to lead to creating social values, but remain latent. One of the main problem of this issue is that patent creators such as individual researcher, university, or research institution lack abilities to commercialize their patents into viable businesses with those enterprises that are in need of them. Also, for enterprises side, it is hard to find the appropriate patents by searching keywords on all such occasions. This system proposes a patent recommendation system that can identify and recommend intellectual rights appropriate to users' interested fields among a rapidly accumulating number of patent assets in a more easy and efficient manner. The proposed system extracts core contents and technology sectors from the existing pool of patents, and combines it with secondary social knowledge, which derives from tags information created by users, in order to find the best patents recommended for users. That is to say, in an early stage where there is no accumulated tag information, the recommendation is done by utilizing content characteristics, which are identified through an analysis of key words contained in such parameters as 'Title of Invention' and 'Claim' among the various patent attributes. In order to do this, the suggested system extracts only nouns from patents and assigns a weight to each noun according to the importance of it in all patents by performing TF-IDF analysis. After that, it finds patents which have similar weights with preferred patents by a user. In this paper, this similarity is called a "Domain Similarity". Next, the suggested system extract technology sector's characteristics from patent document by analyzing the international technology classification code (International Patent Classification, IPC). Every patents have more than one IPC, and each user can attach more than one tag to the patents they like. Thus, each user has a set of IPC codes included in tagged patents. The suggested system manages this IPC set to analyze technology preference of each user and find the well-fitted patents for them. In order to do this, the suggeted system calcuates a 'Technology_Similarity' between a set of IPC codes and IPC codes contained in all other patents. After that, when the tag information of multiple users are accumulated, the system expands the recommendations in consideration of other users' social tag information relating to the patent that is tagged by a concerned user. The similarity between tag information of perferred 'patents by user and other patents are called a 'Social Simialrity' in this paper. Lastly, a 'Total Similarity' are calculated by adding these three differenent similarites and patents having the highest 'Total Similarity' are recommended to each user. The suggested system are applied to a total of 1,638 korean patents obtained from the Korea Industrial Property Rights Information Service (KIPRIS) run by the Korea Intellectual Property Office. However, since this original dataset does not include tag information, we create virtual tag information and utilized this to construct the semi-virtual dataset. The proposed recommendation algorithm was implemented with JAVA, a computer programming language, and a prototype graphic user interface was also designed for this study. As the proposed system did not have dependent variables and uses virtual data, it is impossible to verify the recommendation system with a statistical method. Therefore, the study uses a scenario test method to verify the operational feasibility and recommendation effectiveness of the system. The results of this study are expected to improve the possibility of matching promising patents with the best suitable businesses. It is assumed that users' experiential knowledge can be accumulated, managed, and utilized in the As-Is patent system, which currently only manages standardized patent information.

Provider Provisioned based Mobile VPN using Dynamic VPN Site Configuration (동적 VPN 사이트 구성을 이용한 Provider Provisioned 기반 모바일 VPN)

  • Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.1-15
    • /
    • 2007
  • Increase in the wireless mobile network users brings the issue of mobility management into the Virtual Private Network (VPN) services. We propose a provider edge (PE)-based provider provisioned mobile VPN mechanism, which enables efficient communication between a mobile VPN user and one or more correspondents located in different VPN sites. The proposed mechanism not only reduces the IPSec tunnel overhead at the mobile user node to the minimum, but also enables the traffic to be delivered through optimized paths among the (mobile) VPN users without incurring significant extra IPSec tunnel overhead regardless of the user's locations. The proposed architecture and protocols are based on the BGP/MPLS VPN technology that is defined in RFC24547. A service provider platform entity named PPVPN Network Server (PNS) is defined in order to extend the BGP/MPLS VPN service to the mobile users. Compared to the user- and CE-based mobile VPN mechanisms, the proposed mechanism requires less overhead with respect to the IPSec tunnel management. The simulation results also show that it outperforms the existing mobile VPN mechanisms with respect to the handoff latency and/or the end-to-end packet delay.

Privacy Protection for 5G Mobile-based IoT Users (5G 이동 통신 기반의 IoT 사용자를 위한 프라이버시 보호 기법)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.1
    • /
    • pp.1-7
    • /
    • 2020
  • Recently 5G technology is one of the technologies that has been receiving much positive responses from users as it is integrated with virtual technology. However, 5G's security issues have not been fully resolved and more security is soon required. In this paper, an approach technique is proposed as a probability-based hierarchy to provide personal privacy for 5G-based IoT users more safely. The proposed technique is aimed at not exposing the privacy of IoT users to third parties by using two random keys created personally by IoT users. In order to satisfy both safety and efficiency, the proposed technology divides the privacy of IoT users into two layers. In the first stage, IoT users will control access to intermediate media using anonymous keys generated by IoT users, and in the second stage, information of IoT users registered with servers will be darkened and replicated. The proposed technique has improved the accuracy of the privacy protection of IoT users as they assign weights to layered information after layering users' privacy information on a probabilistic basis.

Building an SNS Crawling System Using Python (Python을 이용한 SNS 크롤링 시스템 구축)

  • Lee, Jong-Hwa
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.5
    • /
    • pp.61-76
    • /
    • 2018
  • Everything is coming into the world of network where modern people are living. The Internet of Things that attach sensors to objects allows real-time data transfer to and from the network. Mobile devices, essential for modern humans, play an important role in keeping all traces of everyday life in real time. Through the social network services, information acquisition activities and communication activities are left in a huge network in real time. From the business point of view, customer needs analysis begins with SNS data. In this research, we want to build an automatic collection system of SNS contents of web environment in real time using Python. We want to help customers' needs analysis through the typical data collection system of Instagram, Twitter, and YouTube, which has a large number of users worldwide. It is stored in database through the exploitation process and NLP process by using the virtual web browser in the Python web server environment. According to the results of this study, we want to conduct service through the site, the desired data is automatically collected by the search function and the netizen's response can be confirmed in real time. Through time series data analysis. Also, since the search was performed within 5 seconds of the execution result, the advantage of the proposed algorithm is confirmed.