• Title/Summary/Keyword: 통신시설

Search Result 1,144, Processing Time 0.025 seconds

Design of sewage facility monitoring system using IoT technology in mobile device environment (모바일 디바이스 환경에서 IoT 기술을 활용한 하수시설 모니터링 시스템 설계)

  • Kwon, Young-Woo;Jeon, Young-joon;Jang, Si-Woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.86-88
    • /
    • 2018
  • 스마트시티 개념의 등장과 함께 국민의 삶의 질에 대한 정부의 관심이 증가하고 있다. 국민의 삶의 질을 향상시키는 것은 하수도와 같은 도시기반시설이며, 정부에서는 이를 지속적으로 유지관리 하여 주거환경 개선, 공중위생관리, 침수방지 등을 위해 노력하고 있다. 최근에는 하수시설의 노후화 와 서비스 범위의 변화에 따른 하수 서비스 품질에 대해 국민적 관심이 증가하고 있다. 또한 급격한 기후변화에 따른 도시 침수와 같은 재해가 빈번하게 발생함에 따라 재난 관리 측면에서도 하수도는 매우 중요한 비중을 차지하고 있다. 본 논문에서는 모바일 디바이스와 IoT 기술을 활용하여 하수시설 모니터링 시스템을 설계하였다. 제시하고 있는 시스템은 하수시설의 데이터를 수집하고 모바일 어플리케이션을 통해 사용자에게 알려준다.

  • PDF

The Study on the Security Requirement at Aeronautical Telecommunication Network (항공통신망에서의 보안 요구사항에 관한 연구)

  • Kim, Do-Woo;Lee, Seoung-Hyeon;Lee, Deok-Gyu;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.628-631
    • /
    • 2008
  • The information transfer between the ground facilities and the ground facilities and exchange are necessary for an aircraft and ground facilities so that it is safe, it is economic, an aircraft tan operate an aircraft to the high efficiency until it arrives at the destination location from the stand-by for the fly. Presently, by using the AFTN which is closed network, a communication is made. However, by applying the leading edge communication technology, the aeronautical telecommunication network of the next generation is constructed and it is planning to be managed. Due to this, the ground facilities connected to the foreign network has the security vulnerability by an attack. Therefore, the vulnerability analysis for the safe operational environment build-up at the aeronautical telecommunication network and sorority requirement research are needed.

  • PDF

A study on the application of improved IoT- based smoke control system to lodging facilities fires (개선된 IoT기반 제연시스템의 숙박시설 적용에 관한 연구)

  • Kim, Suyong;Lee, Sangsoo;Lee, Sung-Hwa;Kim, Jin-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.113-118
    • /
    • 2021
  • The study is to provide safety to the occupants from smoke generated by fire occurring at midnight, and to provide a method for providing evacuation safety for a certain period of time even if the occupants are not aware of the fire. The goal of this study is to occur in small accommodation (floor area less than 1,000m2)It is to design a system that can provide ASET for more than 1 hour even if the occupant does not recognize the fire in late-night fire. The basic structure of the smoke-control system applicable to accommodation facilities was designed, and the expected effect was suggested when applied to small-scale domestic accommodation facilities through evacuation scenarios in accommodation facilities to which the system was applied.

Analysis of Efficiency of Major Information and Communication Infrastructure Analysis and Evaluation Methods Using DEA Model (DEA 모형을 이용한 주요정보통신기반시설 취약점 분석·평가의 효율성 분석)

  • Sun, Jong-wook;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.853-862
    • /
    • 2021
  • Today, disturbance and paralysis of information and communication infrastructure by electronic infringement of national infrastructure is emerging as a threat. Accordingly, the government regularly implements the vulnerability analysis and evaluation system of major information and communication infrastructure to protect the information system and control system of major infrastructure, and invests increased human and material resources every year to efficiently operate it. However, despite the government's efforts, as infringement accidents and attempts targeting national infrastructure continue to occur, the government's resource input to prepare the information protection foundation has little effect on the information protection activity result calculation, making the evaluation system not efficient. The question arises that it is not. Therefore, in this study, we use the DEA model to review the efficient operation of the vulnerability analysis and evaluation system for major information and communications infrastructure, and suggest improvement measures to enhance the level of information protection based on the analyzed results.