• Title/Summary/Keyword: 통신량

Search Result 4,555, Processing Time 0.029 seconds

Development of optimal cross-section design methods for bored utility tunnels: case study of overseas typical cross-sections and design criteria (터널식 공동구 최적단면 설계기술 개발: 해외 표준단면 사례 및 설계기준 분석)

  • Park, Kwang-Joon;Yun, Kyoung-Yeol
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.20 no.6
    • /
    • pp.1073-1090
    • /
    • 2018
  • Since the domestic utility tunnels were built mainly in the development project of the new city, they are all in the form of cut-and-cover box tunnel. But, in the case of overseas construction of utility tunnels for existing urban areas, the bored tunnel types are mainly adopted. It is reasonable to install bored tunnels in a downtown area because it is difficult to block the roads or install bypass roads due to heavy traffic and civil complaints. In order to activate the utility tunnels in bored type, it is necessary to secure optimized cross-sectional design technology considering the optimal supplying capacity and mutual influencing factors (Thermal Interference, electrolytic corrosion, efficiency of the maintenance, etc.) of utilities (power cables, telecommunication cables, water pipes, etc.). The optimal cross-section design method for bored utility tunnels is ultimately to derive the optimal arrangement technique for the utilities. In order to develop the design methods, firstly, the cases of tunnel cross-section (Shield TBM, Conventional Tunneling) in overseas shall be investigated to analyze the characteristics of the installation of utilities in the section and installation of auxiliary facilities, It is necessary to sort out and analyze the criteria related to the inner cross-section design (arrangement) presented in the standards and guidelines.

Detecting and Avoiding Dangerous Area for UAVs Using Public Big Data (공공 빅데이터를 이용한 UAV 위험구역검출 및 회피방법)

  • Park, Kyung Seok;Kim, Min Jun;Kim, Sung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.243-250
    • /
    • 2019
  • Because of a moving UAV has a lot of potential/kinetic energy, if the UAV falls to the ground, it may have a lot of impact. Because this can lead to human casualities, in this paper, the population density area on the UAV flight path is defined as a dangerous area. The conventional UAV path flight was a passive form in which a UAV moved in accordance with a path preset by a user before the flight. Some UAVs include safety features such as a obstacle avoidance system during flight. Still, it is difficult to respond to changes in the real-time flight environment. Using public Big Data for UAV path flight can improve response to real-time flight environment changes by enabling detection of dangerous areas and avoidance of the areas. Therefore, in this paper, we propose a method to detect and avoid dangerous areas for UAVs by utilizing the Big Data collected in real-time. If the routh is designated according to the destination by the proposed method, the dangerous area is determined in real-time and the flight is made to the optimal bypass path. In further research, we will study ways to increase the quality satisfaction of the images acquired by flying under the avoidance flight plan.

Analysis of Spatial Trip Regularity using Trajectory Data in Urban Areas (도시부 경로자료를 이용한 통행의 공간적 규칙성 분석)

  • Lee, Su jin;Jang, Ki tae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.6
    • /
    • pp.96-110
    • /
    • 2018
  • As the development of ICT has made it easier to collect various traffic information, research on creating new traffic attributes is drawing attention. Estimation and forecasts of demand and traffic volume are one of the main indicators that are essential to traffic operation, assuming that the traffic pattern at a particular node or link is repeated. Traditionally, a survey method was used to demonstrate this similarity on trip behavior. However, the method was limited to achieving high accuracy with high costs and responses that relied on the respondents' memory. Recently, as traffic data has become easier to gather through ETC system, smart card, studies are performed to identify the regularity of trip in various ways. In, this study, route-level trip data collected in Daegu metropolitan city were analyzed to confirm that individual traveler forms a spatially similar trip chain over several days. For this purpose, we newly define the concept of spatial trip regularity and assess the spatial difference between daily trip chains using the sequence alignment algorithm, Dynamic Time Warping. In addition, we will discuss the applications as the indicators of fixed traffic demand and transportation services.

The Data Transmission of Image Storage System of PACS (PACS내 영상저장 장치의 데이터 전송)

  • Cho, EuyHyun;Park, Jeongkyu
    • Journal of the Korean Society of Radiology
    • /
    • v.12 no.6
    • /
    • pp.785-791
    • /
    • 2018
  • Recently, Disk array is widely used as a long term storage device in PACS, but reliability is not enough in relation to annual failure rate of disk. Between October 2016 and February 2017, we scanned the serial port of the hard disk while reading or storing medical images on a PACS reader. The data rate was calculated from the data stored in HDD 99ea that were used in the PCAS image storage device and in HDD 101ea that were used in the Personal Computer. When a CT image was read from a PACS reader, Reading was 87.8% and Writing was 12.2% in units of several tens of megabytes or less. When the CT image was stored in the PACS reader, Reading was 11.4% and Writing was 88.6% in units of several tens of megabytes or less. While reading the excel file on the personal computer, Reading was 75% and Writing was 25% in less than 3 MB, and In the process of storing the excel file on the personal computer, Reading was carried out by 38% and Writing was carreid out 62% in the units of 3 MB or less. The transfer rate of the hard disk used in the PACS image storage device was 10 GB/h, and the transfer rate per hour of the hard disk of the personal computer was 5 GB / h. Annual failure rate of hard disk of image storage system is 0.97 ~ 1.13%, Annual failure rate of Hard Disk of personal computer is 0.97 ~ 1.13%. the higher transfer rate is, the higher annual failure rate is. These results will be used as a basis for predicting the life expectancy of the hard disk and the annual failure rate.

A Study on the Improvement of Satellite Image Information Service System (위성영상정보 서비스 시스템 개선방안 연구)

  • Cho, Bo-Hyun;Yang, Keum-Cheol;Kim, Song-Gang;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.41-47
    • /
    • 2017
  • The Marine Environment Observation Information System supplies oceanographic information elements such as water temperature, chlorophyll, float, etc. based on satellite images to consumers. The data produced by the Korean marine environmental observatories are located in the coastal areas of Korea. But if the range is too far from a particular area of interest, due to distance or spatial constraints, the accuracy and up-to-dateness of the data can not be relied upon. Therefore, it is necessary to perform fusion and complex operation to solve the difference between the field observation and the marine satellite image. In this study, we develop a system that can process marine environmental information in the user's area of interest in the form of layered character (numeric) information considering the readability and light weight rather than the satellite image. In order to intuitively understand satellite image information, we characterize (quantify) the marine environmental information of the area of interest and we process the satellite image band values into layered characters to minimize the absolute amount of transmitted / received data. Also we study modular location-based interest information service method to be able to flexibly extend and connect interested items that diversify various observation fields as well as application technology to serve this.

Implementation of RSA modular exponentiator using Division Chain (나눗셈 체인을 이용한 RSA 모듈로 멱승기의 구현)

  • 김성두;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.21-34
    • /
    • 2002
  • In this paper we propos a new hardware architecture of modular exponentiation using a division chain method which has been proposed in (2). Modular exponentiation using the division chain is performed by receding an exponent E as a mixed form of multiplication and addition with divisors d=2 or $d=2^I +1$ and respective remainders r. This calculates the modular exponentiation in about $1.4log_2$E multiplications on average which is much less iterations than $2log_2$E of conventional Binary Method. We designed a linear systolic array multiplier with pipelining and used a horizontal projection on its data dependence graph. So, for k-bit key, two k-bit data frames can be inputted simultaneously and two modular multipliers, each consisting of k/2+3 PE(Processing Element)s, can operate in parallel to accomplish 100% throughput. We propose a new encoding scheme to represent divisors and remainders of the division chain to keep regularity of the data path. When it is synthesized to ASIC using Samsung 0.5 um CMOS standard cell library, the critical path delay is 4.24ns, and resulting performance is estimated to be abort 140 Kbps for a 1024-bit data frame at 200Mhz clock In decryption process, the speed can be enhanced to 560kbps by using CRT(Chinese Remainder Theorem). Futhermore, to satisfy real time requirements we can choose small public exponent E, such as 3,17 or $2^{16} +1$, in encryption and verification process. in which case the performance can reach 7.3Mbps.

Efficiency in the Password-based Authenticated Key Exchange (패스워드 기반 인증 키 공유 프로토콜에서의 효율성)

  • 황정연;홍석희;박혜영;장상운;박영호;류희수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.113-124
    • /
    • 2002
  • Proposals for a password-based authenticated key exchange protocol that have been published so far almost concentrated on the provable security. But in a real environment such as mobile one, efficiency is a critical issue as security. In this paper we discuss the efficiency of PAK which is secure in the random oracle model [l]. Among 4 hash functions in PAK the instantiation for $H_1$, which outputs a verifier of the password, has most important effect on the computational efficiency. We analyze two different methods for $H_1$ suggested in [1] and we show that $H_{lq}$ has merits in transforming to EC or XTR variants as well as in the efficiency. As an efficient variant. we propose PAK2-EC and PAK2-XTR which do not require any additional step converting a hash output into a point of elliptic curve or XTR subgroup when compared to the previous work on the PAK[2]. Finally we compare PAK2 with the password-based authenticated key exchange protocols such as SPEKE, SRP, and AMP.

Home training trend analysis using newspaper big data and keyword analysis (신문 빅데이터와 키워드 분석을 이용한 홈트레이닝 트렌드 분석)

  • Chi, Dong-Cheol;Kim, Sang-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.6
    • /
    • pp.233-239
    • /
    • 2021
  • Recently, the COVID-19 virus has caused people to stay indoors longer without going out. As a result of this, people's activity decreased sharply, and their weight gained. So people became more interested in health. Home training can be an alternative method to solve this problem. Accordingly, To find out the trends of home training, we collected articles from December 1, 2019, to November 30, 2020, using the news provided by BIG KINDS, a news analysis system. We analyzed frequency analysis, relational analysis according to weighting, and related word analysis with the program using the algorithm developed by BIG KINDS. In conclusion, first, it was found that home training is led by technology and the emergence of artificial intelligence. Second, it can be assumed that people mainly do home training using content and video services related to mobile carriers. Third, people had a high preference for Pilates in the sports category. It can be seen that the number of patent applications increased as the demand for exercise products related to Pilates increased. In the next study, we expect that this study will be used as primary data for various big data studies by supplementing the research methodology and conducting various analyses.

Big Data based Epidemic Investigation Support System using Mobile Network Data (이동통신 데이터를 활용한 빅데이터 기반 역학조사지원 시스템)

  • Lee, Min-woo;Kim, Ye-ji;Yi, Jae-jin;Moon, Kyu-hwan;Hwang, SeonBae;Jun, Yong-joo;Hahm, Yu-Kun
    • The Journal of Bigdata
    • /
    • v.5 no.2
    • /
    • pp.187-199
    • /
    • 2020
  • The World Health Organization declared COVID-19 a pandemic on March 11. South Korea recorded 27,000 cases of the coronavirus illness, and more than 50 million coronavirus cases were confirmed all over the world. An epidemiological investigation becomes important once again due to the spread of COVID-19 infections. However, there were a number of confirmed coronavirus cases from Deagu and Gyeongbuk. Limitations of the epidemiological investigation methods were recognized. The Korea Disease Control and Prevention Agency developed the Epidemiological Investigation Support System(EISS) to utilize the smart city data hub technology and utilized the system in the epidemiological investigation. As a part of EISS, The proposed system is big-data bsed epidemiological investigation support system processing mobile network data. The established system is the epidemiological investigation support system based on big data to process mobile carriers' big data. Processing abnormal values of mobile carriers' data which was impossible with existing staff or creating hotspot regions where more than two people were in contact with an infected person were realized. As a result, our system processes outlier of mobile network data in 30 seconds, while processes hotspot around in 10 minutes. as a first time to adapt and support bigdata system into epidemiological investigation, our system proposes the practical utilizability of big-data system into epidemiological investigation.

VENTOS-Based Platoon Driving Simulations Considering Variability (가변성을 고려하는 VENTOS 기반 군집 자율주행 시뮬레이션)

  • Kim, Youngjae;Hong, Jang-Eui
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.2
    • /
    • pp.45-56
    • /
    • 2021
  • In platoon driving, several autonomous vehicles communicate to exchange information with each other and drive in a single cluster. The platooning technology has various advantages such as increasing road traffic, reducing energy consumption and pollutant emission by driving in short distance between vehicles. However, the short distance makes it more difficult to cope with an emergency accident, and accordingly, it is difficult to ensure the safety of platoon driving, which must be secured. In particular, the unexpected situation, i.e., variability that may appear during driving can adversely affect the safety of platoon driving. Because such variability is difficult to predict and reproduce, preparing safety guards to prevent risks arising from variability is a challenging work. In this paper, we studied a simulation method to avoid the risk due to the variability that may occur while platoon driving. In order to simulate safe platoon driving, we develop diverse scenarios considering the variability, design and apply safety guards to handle the variability, and extends the detail functions of VENTOS, an open source platooning simulator. Based on the simulation results, we have confirmed that the risks caused form the variability can be removed, and safe platoon driving is possible. We believe that our simulation approach will contribute to research and development to ensure safety in platoon driving.