• Title/Summary/Keyword: 통제 네트워크

Search Result 450, Processing Time 0.027 seconds

Interactivity within large-scale brain network recruited for retrieval of temporally organized events (시간적 일화기억인출에 관여하는 뇌기능연결성 연구)

  • Nah, Yoonjin;Lee, Jonghyun;Han, Sanghoon
    • Korean Journal of Cognitive Science
    • /
    • v.29 no.3
    • /
    • pp.161-192
    • /
    • 2018
  • Retrieving temporal information of encoded events is one of the core control processes in episodic memory. Despite much prior neuroimaging research on episodic retrieval, little is known about how large-scale connectivity patterns are involved in the retrieval of sequentially organized episodes. Task-related functional connectivity multivariate pattern analysis was used to distinguish the different sequential retrieval. In this study, participants performed temporal episodic memory tasks in which they were required to retrieve the encoded items in either the forward or backward direction. While separately parsed local networks did not yield substantial efficiency in classification performance, the large-scale patterns of interactivity across the cortical and sub-cortical brain regions implicated in both the cognitive control of memory and goal-directed cognitive processes encompassing lateral and medial prefrontal regions, inferior parietal lobules, middle temporal gyrus, and caudate yielded high discriminative power in classification of temporal retrieval processes. These findings demonstrate that mnemonic control processes across cortical and subcortical regions are recruited to re-experience temporally-linked series of memoranda in episodic memory and are mirrored in the qualitatively distinct global network patterns of functional connectivity.

RRA : Ripple Routing Algorithm Considering the RF-Coverage of the node in WSN (RRA : 무선센서 네트워크에서 노드의 통신영역을 고려한 랜덤 배치 고정형 라우팅 알고리즘)

  • Lee, Doo-Wan;Kim, Min-Je;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.820-823
    • /
    • 2011
  • WSN is composed of a lot of small sensors with the limited hardware resources. In WSN, at the initial stage, sensor nodes are randomly deployed over the region of interest, and self-configure the clustered networks by grouping a bunch of sensor nodes and selecting a cluster header among them. In this paper, we propose a self-configuration routing protocol for WSN, which consists of step-wise ripple routing algorithm for initial deployment, effective joining of sensor nodes. RRA is search node in RF-coverage of each node, which result in fast network connection, reducing overall power consumption, and extending the lifetime of network.

  • PDF

Research on functional area-specific technologies application of future C4I system for efficient battlefield visualization (미래 지휘통제체계의 효율적 전장 가시화를 위한 기능 영역별 첨단기술 적용방안)

  • Sangjun Park;Jungho Kang;Yongjoon Lee;Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.109-119
    • /
    • 2023
  • C4I system is an integrated battlefield information system that automates the five elements of command, control, communications, computers, and information to efficiently manage the battlefield. C4I systems play an important role in collecting and analyzing enemy positions, situations, and operational results to ensure that all services have the same picture in real time and optimize command decisions and mission orders. However, the current C4I has limitations whenever a new weapon system is introduced, as it only provides battlefield visualization in a single area focusing on the battlefield situation for each military service. In a future battlefield that expands not only to land, sea, and air domains but also to cyber and space domains, improved command and control decisions will be possible if organic data from various weapon systems is gathered to quickly visualize the battlefield situation desired by the user. In this study, the visualization technology applicable to the future C4I system is divided into map area, situation map area, and display area. The technological implementation of this future C4I system is based on various data and communication means such as 5G networks, and is expected to enable hyper-connected battlefield visualization that utilizes a variety of high-quality information to enable realistic and efficient battlefield situation awareness.

The Effect of Problem Solving with Task-based Activities On Understanding of Major concepts and Learning attitude in 'Applications of Information and Communication Technology' Subject in Technology.Home Economics (기술.가정과 '정보통신기술의 활용' 단원에서 문제 해결 과제 중심 수업이 개념 이해와 학습 태도에 미치는 효과)

  • Jung, A-Long;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.36 no.1
    • /
    • pp.167-190
    • /
    • 2011
  • The purpose of this study is to identify the effect of problem solving with task-based activities on understanding of major concepts and learning attitude in 'Applications of ICT' subject. In teaching the 4th class of 'Applications of ICT' subject, problem solving with reasoning task-based activities are used for the experimental groups and instructor-oriented teaching for the comparative groups. The results are as follows: First, no meaningful difference was found in the pretest result of concepts of ICT, while posttest found that the students with problem solving with reasoning task-based activities in experimental group marked average 5.87 point higher than the control group and showed meaningful difference at significance level p<.05. Dividing concepts about Information Communication Technology into four domains, there were no meaningful difference between two groups in the concept test about communication principles and methods and network, while the test results about the other two concepts, that is, expressions and patterns of information and compositions and types of communication network, showed the meaningful difference at significance level p<.05. Second, the research proved that the experimental group with problem solving with reasoning task-based activity teaching, compared to the control group with lecture, showed desirable change in learning attitude. From the results, the solving with reasoning task-based activity model is better teaching-learning method compared to lecture, revealing positive change in understanding major concepts of information and communication technology and learning attitude.

A Conceptual Study of the underdevelopment of the British Multinational Corporations, 1870-1914: from the perspective of the network theory (1870-1914년 영국의 초국적 기업 발전을 저해한 요인 분석: 연결망(네트워크) 이론의 개념적 적용)

  • Yang, Oh Suk;Kang, Won Taek
    • Journal of International Area Studies (JIAS)
    • /
    • v.14 no.1
    • /
    • pp.129-153
    • /
    • 2010
  • The guiding research question of this paper is to discover 'why the UK could not develop a general structure in which transnational corporations were born during the end of the 19th ~ beginning of the 20th century like other countries'. In response to this question, although acknowledging its imperfections, the author would like to explore the causality in the context of 'Social Construction' which is reflected in the attributes of British society. As such, researchers are strongly recommended to take into account the actors' interests and the increased value effect of events which is driven by control power. This paper concludes that: firstly, not only was contempt for industrial capitalism prevalent in British society, the British government was unable to recognize the necessity of promoting policies for the development of transnational corporation. In addition, the increase in the clout of commercial-financial capitalists in the city of London along with the expansion of gentlemanly elites interfered with the transnationality of British companies. Secondly, the foundation of the political and economic structures in the UK experienced continuity and challenge simultaneously. Since the 1850's, the British social structure has been progressively characterized by the strengthening power of the commercial-financial elites in London, which resulted not in the transnationality of manufacturing but that of financial services. Finally, the configuration of the social network driven by the British elites consists of the actors' interests and control power in association with severance and connection. Unlike the complementarity of interests, in the initial stage, intended connection based on voluntary motivation between gentries and commercial-financial elites occurred in terms of control power. However, ultimately, the holding of power was transferred to the commercial-financial elites excluding the industrial capitalists and resulted in the reconfiguration of the social network.

A Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation (기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구)

  • Lee, Chul-Won;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.183-194
    • /
    • 2010
  • A company's private network protected by a firewall and NAT(Network Address Translation) is not accessible directly through an external internet. However, as Reverse Connection technology used by NetCat extends to the technologies such as SSH Tunnel or HTTP Tunnel, now anyone can easily access a private network of corporation protected by a firewall and NAT. Furthermore, while these kinds of technologies are commercially stretching out to various services such as a remote control and HTTP Tunnel, security managers in a company or general users are confused under the circumstances of inner or outer regulation which is not allowed to access to an internal system with a remote control. What is more serious is to make a covert channel invading a company's private network through a malicious code and all that technologies. By the way, what matters is that a given security system such as a firewall cannot shield from these perceived dangers. So, we analyze the indirect access of technological methods and the status quo about a company's internal network and find a solution to get rid of the related dangers.

NCW 체계하의 전투능력 평가 방안 연구

  • Jeong, Jong-Mun;Go, Dong-Cheol
    • Information and Communications Magazine
    • /
    • v.26 no.3
    • /
    • pp.3-8
    • /
    • 2009
  • 본 연구는 네트워크 중심전(NCW)에서 전투력에 영향을 미치는 요소들과 전투능력 평가방법에 관한 것이다. 전투능력에 영향을 미치는 기초변수로 상황인식, 환경적응, 물자보급, 정보유통 및 지휘통제를 설정하고 이러한 기초변수가 전투능력에 미치게 될 영향을 추론하였다. 설정된 기초변수를 전제하여 대응소요 시간을 기반으로 전투능력을 평가하는 방안을 제시하였다. 대응 신뢰성 및 대응 효율을 평가함으로써 전투능력을 정량화하는 것이 가능하며 정량화된 자료를 축적함으로써 통계적으로 전투능력과 기초변수와의 상관관계를 파악할 수 있으며 이러한 관계를 이해하는 것은 NCW 체계구축에 중요한 요소가 될 것이다.

정보보호 및 개인정보보호 국제표준화 동향

  • Park, Dae-Ha
    • Review of KIISC
    • /
    • v.23 no.4
    • /
    • pp.47-52
    • /
    • 2013
  • 본 논문에서는 국제 표준화 기관인 ISO/IEC JTC 1에서 정보보호 분야의 표준화를 담당하고 있는 SC 27이 최근 작업 중인 정보보호 표준화 문건에 대한 상태와 공표 예정시기 등의 활동 정보를 작업그룹별(WG)로 정리하여 최신 정보보호 분야의 표준화 동향을 제시하고자 한다. 신규 표준으로 개발 중인 클라우드 컴퓨팅 서비스의 보안 통제, 경량 암호화 메커니즘, 보안시스템 설계 원칙 및 기법, 무선 네트워크 접근 보안, 개인정보 영향평가 등은 전세계적인 정보보호 및 개인정보보호의 최신 이슈를 반영하고 있어 국내 정보보호 표준의 개발과 정보보호 산업의 활성화 방향을 모색하는데 중요한 역할을 한다.

클라우드 환경에서의 사이버물리시스템 관점에서 본 헬스 케어 보안 관련 이슈들

  • Lee, Hye Lim;Cho, Jaeyeon;Yoon, Ji Won
    • Review of KIISC
    • /
    • v.24 no.6
    • /
    • pp.7-13
    • /
    • 2014
  • 사이버 물리 시스템(Cyber physical system, CPS)은 사물인터넷(IoT)과 달리 네트워크로 이루어진 물리적 장치들 간의 제어 및 통제를 포함하는 관리 시스템이다. 사이버물리시스템의 대표적인 사례인 헬스 케어 시스템은 시스템 내에서 다뤄지는 의료정보라는 데이터의 특별한 성격으로 인하여 데이터의 저장에서 관리까지 여러 가지 보안 위협들이 존재한다. 본 논문에서는 사이버 물리 시스템으로서의 헬스 케어 시스템이 클라우드 환경으로 이루어졌을 때 어떤 위협들이 존재하며 이러한 위협들이 어떻게 분류될 수 있는지, 또한 위협을 방지하기 위해 국내외 어떤 기술 및 표준화 노력들이 있었는지 알아보고자 한다.

클라우드 컴퓨팅 보안 국제표준화 동향

  • Mun, Jong-Ho;Kim, Ji-Ye;Won, Dong-Ho
    • Information and Communications Magazine
    • /
    • v.32 no.10
    • /
    • pp.65-70
    • /
    • 2015
  • 클라우드 컴퓨팅은 IT 자원(스토리지, 서버, 소프트웨어, 네트워크 등)을 인터넷 기술을 이용하여 서비스 형태로 제공하는 기술이다. 최근 클라우드 컴퓨팅 서비스의 영역이 지속적으로 확대되고 있으며 특히 사물인터넷 (Internet of Things) 등의 IT 기술 발전에 따라 가정, 의료 등에 클라우드 컴퓨팅을 접목하여 활용할 수 있는 방법이 활발히 연구되고 있다. 그러나 클라우드 컴퓨팅 서비스의 확산과 더불어 알려지지 않은 새로운 보안 위협, 클라우드 서비스 고객의 자기정보 통제권 상실, 개인정보 유출로 인해 발생하는 프라이버시 침해 또한 이슈가 되고 있다. 본 논문에서는 클라우드 보안을 위한 국제 표준화 기구와 해당 기구에서 추진 중인 국제 표준화 현황에 대해 살펴본다.