• Title/Summary/Keyword: 통제 네트워크

Search Result 450, Processing Time 0.036 seconds

A Design of Embedded Integration Prototyping System for Practical Use of Smart-Phone (네트워크 기반의 예약시스템 및 이의 운용방법)

  • Kang, Sin-Kwan;Kim, Jung-Eun;Kang, Hee-Kuk;Lee, Hyun;Lee, Dong-Ha;Lee, Jeong-Bae
    • Annual Conference of KIPS
    • /
    • 2012.04a
    • /
    • pp.807-809
    • /
    • 2012
  • 최근 스마트폰 사용의 활성화로, 스마트폰 기반의 통신네트워크를 이용하는 IT 기술들과 타 산업과의 융합 산업의 범위가 확대되고 있다. 또한 스마트폰을 사용하는 사용자들에게 더 나은 삶의 질을 제공하기 위하여, 스마트폰-앱에 관련된 연구가 활발히 진행되고 있다. 따라서 본 논문은 대형 행사장과 같은 많은 인원이 모이는 곳에서 인원을 통제하거나 다양한 서비스를 제공하는데 어려움이 많이 발생하는데, 스마트폰 앱 설계 및 개발을 통하여 이러한 어려움을 해결하고자 한다. 특히, 증강현실 기술을 이용하여 네트워크 기반의 예약시스템 및 이의 운용방법에 대해서 기술하고, 실제 스마트폰 앱 개발에 앞서, 사전 프로토타이핑을 통해서 시스템을 설계하고 개발하는 방법을 제공하고자 한다.

e-Learning Classroom using Bi-directional Education Equipment (양방향 e-Learning 교육환경 구축)

  • Kim, Hyeog-Gu
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2007.04a
    • /
    • pp.271-271
    • /
    • 2007
  • 본 내용은 첨단 정보통신 기술을 이용하여 강의자 중심의 단방향 교육(Teaching) 환경을 학생 중심의 양방향 교육(Learning) 환경으로 개선하여 보다 창의적인 인재를 양성할 수 있는 교육환경 구축에 관한 내용이다. 우리나라를 포함한 OECD 국가들은 ICT활용 수업에 대한 필요성을 공감하고 교단 선진화를 위한 연구 및 지원을 다양하게 진행하고 있다. 학생들에게 지급하는 교과서를 인쇄매체 대신에 메모리 스틱, CD-ROM 및 인터넷을 통한 전자 매체로 대체하는 방안 등이 그 예이다. 따라서 학생들이 강의실에서 멀티미디어를 이용해 강의를 듣고, 과제를 풀며 정리된 내용을 발표하고 토론할 수 있는 양방향 수업환경이 요구된다. 그러나 컴퓨터를 활용한 수업을 진행할 때의 문제점이 강의내용을 학생들에게 효율적으로 전달하기가 어렵고, 학생들의 컴퓨터를 통제할 수 없기 때문에 수업을 이탈하는 경우가 발생되는 등 교육에 역효과가 초래된다. 본 내용에서 소개하는 양방향 수업진행 장비(드림랩)는 강의자가 학생들의 컴퓨터 모니터, 키보드 및 마우스를 자유로이 통제할 수 있어서 강의자의 화면과 음성을 실시간으로 선명하게 학생들에게 전달하고, 학생들의 내용을 모니터하고 제어할 수 있으며, 개인지도 및 수준별 그룹지도가 가능하다. 또한 강의자에게 개인적으로 질문을 할 수 있고, 학생들의 내용을 자신의 자리에서 전체 학생들에게 발표할 수도 있다. 드림랩은 순수 하드웨어로 구성되어 컴퓨터 기종이나 운영체제에 영향을 받지 않으며, 컴퓨터 자원과 네트워크 자원을 사용하지 않기 때문에 컴퓨터나 네트워크의 성능을 저하시키지 않는다. 또한 사용법이 간단하고 유지관리가 쉬운 장점 등이 있다. 따라서 컴퓨터를 활용한 수업진행이 원활하여 다양한 과목에 활용 가능하고, 학생들의 자발적인 수업 참여로 강의 중심 교육에서 자기 주도적 수업환경(T2L, Teaching to Learning)으로 자연스럽게 전환되어 교육의 질적 향상과 함께 창의적인 인재를 양성할 수 있을 것으로 기대된다.

  • PDF

An Analysis of Globalization Trends in the Korean Scientific Knowledge: Investigating the Factors of the Scientific Collaboration Structure in the Science Citation Indexed Journals published in Korea (한국 과학지식의 세계화 추이 분석: 한국 SCI 저널의 발전 양상과 분야별 차이)

  • Kim, Young Jin
    • Journal of Science and Technology Studies
    • /
    • v.12 no.2
    • /
    • pp.1-31
    • /
    • 2012
  • Rapid globalization process is applying to Science field in Korea. Until now, most researches and government's announcement used to examine the scientific level of Korea by using the number of publications in the SCI Journals. I investigate other aspects of the scientific globalization: a scientific collaboration trend, participations of foreign researchers, and the national level of collaboration networks. There are increasing patterns in collaboration and foreign researchers' participation, and the Impact Factors of the Journals were preceded by inflating trend in the participations of foreign researchers. Also, the breadth and the density are different from each science fields in the national level of collaboration networks. These findings are related to the process of globalization in the Korean science journals and the science fields.

  • PDF

Cross-layer Simulation and Analysis for Video Transmission Quality in MANET (MANET에서 비디오 전송 품질을 위한 Cross-layer 시뮬레이션과 분석)

  • Yoon, Hyoup-Sang
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.3
    • /
    • pp.61-68
    • /
    • 2015
  • Mobile ad hoc networks (MANETs) are self-organized dynamic networks populated by mobile nodes. This paper presents the improved cross-layer approach to complement the recent works for video transmission services on MANET. We use a statistical design of experiment and analysis in order to investigate interactions between major factors of each layer effectively with minimizing ns-3 simulation run time. The proposed cross-layer approach considers MANET protocol layers (i.e., physical, network and transmission layers) and an application layer (i.e., a video encoder) as factors simultaneously. In addition, the approach defines an objective video quality metric as a response variable. The result of this paper can be applicable as a preliminary research to design an optimized video transmission application which has ability to adjust controllable factors to dynamic uncontrollable factors.

A Study on DDS (Data Distribution Service) Application for Real-time Monitoring and Control in Operation Console of the Railway Safety Control Platform (철도 안전관제 통합콘솔에서의 실시간 감시 및 통제를 위한 DDS 적용방안 연구)

  • So, Jaegeol;Shin, Kwang-Ho;Ahn, Jin
    • Journal of The Korean Society For Urban Railway
    • /
    • v.6 no.4
    • /
    • pp.279-286
    • /
    • 2018
  • Recently, a safety control platform to monitor the safety of train operation in real time and prevent accidents and risks through control is under study. In the initial design, DDS communication method supporting distributed network is adopted for real-time processing of large amount of data according to the integration of existing distributed safety data. However, communication between server and console inside the safety control platform is applied to existing TCP socket communication. In the case of TCP socket communication, it is possible to process data for a small system of a safety control test bed by one-to-one communication. However, if the data is expanded all over the country in the future, it becomes difficult to cope with a case where communication traffic occurs due to vast amount of data. In this paper, we propose DDS communication method to support distributed network between server and console of security control platform, and demonstrate TCP socket and DDS method, and compare throughput and speed. As a result, we have found that the scalability and flexibility are improved in case of applying DDS communication to future systems.

The Effect of Small Business Owner's Individual Characteristics and Social Capital on Entrepreneurial Intention and Entrepreneurial Anxiety : Focusing on the Moderating Effect of Entrepreneurship Consulting (소상공인의 개인적 특성과 사회 자본이 창업의지와 창업불안에 미치는 영향 : 창업 컨설팅의 조절효과를 중심으로)

  • Bong, Gu-Won;Kim, Joong-Gyoo
    • Journal of Digital Convergence
    • /
    • v.17 no.3
    • /
    • pp.191-204
    • /
    • 2019
  • This study empirically confirmed whether individual characteristics and social capital have distinctive influence on entrepreneurship and entrepreneurship, and whether entrepreneurship consulting has a moderating effect in the context of high interest in entrepreneurship with 223 data. All of the personal characteristics, network, trust, and consulting experience had a significant influence on the entrepreneurial intention, while the external control and reciprocity norms had a significant influence on the entrepreneurial anxiety. The experience of consulting revealed that it has a moderating effect of weakening influence of risk-taking tendency and network on the entrepreneurial will and strengthening the influence of external control on the entrepreneurial anxiety. This research has significance in terms of distinguishing effects of entrepreneurial intention and anxiety and the moderating effect of consulting. In future research, it is expected that verification of entrepreneurial anxiety should be done.

Industry Secret Information Leakage Prevention : Focus on the Utilization of IoT (기업의 산업기밀정보 유출예방에 관한 연구: 사물인터넷 활용을 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.101-110
    • /
    • 2017
  • The purpose of this study is to examine possibilities of industry secret information leakage through IoT devices and to prevent information leakage from the perspective of administrative and technique security. From the administrative security perspective, first, it is important to face the possibility of industry information data leakage through anyone who can access companies and should establish guidelines to limit the use of IoT devices when entering companies. Second, security management guideline should be prepared by companies or upon user's request and use of any electronic devices sharing wireless internet connection should be eliminated or restricted. From technique security perspective, channels that sharing IoT devices in computers should be controlled since industry secret information are stored in computers and servers. Furthermore, IoT devices that accessing wireless internet network or devices that already registered should be regularly checked in order to minimize any information leakage. Lastly, data and information stored in computers and servers should be encrypted.

Design and Evaluation of a Weighted Intrusion Detection Method for VANETs (VANETs을 위한 가중치 기반 침입탐지 방법의 설계 및 평가)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.181-188
    • /
    • 2011
  • With the rapid proliferation of wireless networks and mobile computing applications, the landscape of the network security has greatly changed recently. Especially, Vehicular Ad Hoc Networks maintaining network topology with vehicle nodes of high mobility are self-organizing Peer-to-Peer networks that typically have short-lasting and unstable communication links. VANETs are formed with neither fixed infrastructure, centralized administration, nor dedicated routing equipment, and vehicle nodes are moving, joining and leaving the network with very high speed over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connection without centralized control. In this paper, we propose a weighted intrusion detection method using rough set that can identify malicious behavior of vehicle node's activity and detect intrusions efficiently in VANETs. The performance of the proposed scheme is evaluated by a simulation study in terms of intrusion detection rate and false alarm rate for the threshold of deviation number ${\epsilon}$.

A GOSST Heuristic Mechanism for the Design of a Physical Multiple Security Grade Network (물리적 다중 보안 등급 네트워크 설계를 위한 GOSST 휴리스틱 메커니즘)

  • Kim, In-Bum;Kim, Chae-Kak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12B
    • /
    • pp.728-734
    • /
    • 2007
  • In this paper, we propose a GOSST(Grade Of Services Steiner minimum Tree) heuristic mechanism for the design of a physical multiple security grade network with minimum construction cost. On the network, each node can communicate with other nodes by its desiring security grade. Added to the existing network security methods, the preventing method from illegal physical access is necessary for more safe communication. To construct such network with minimum cost, the GOSST problem is applied. As the GOSST problem is a NP-Hard problem, a heuristic with reasonable complexity is necessary for a practical solution. In this research, to design the physical multiple security grade network with the minimum construction cost, the reformed our previous Distance Direct GOSST heuristic mechanism is proposed. The mechanism brings average 29.5% reduction in network construction cost in comparison with the experimental control G-MST.

A Design of a Personnel Control System Using UHF-RFID in Shipping (UHF 대역 RFID를 이용한 선박내 인원관리 시스템 설계)

  • Cha, Jin-Man;Kim, Myeung-Hwan;Park, Yeoun-Sik;Seong, Gil-Yeong;Lee, Sang-Uk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.832-835
    • /
    • 2008
  • An information-oriented basis in today's society has been changing fast, and the desire for connectivity has caused an exponential growth in wireless communication and sensor network. Sensor networks using RFID, in particular, have led this trend due to the increasing exchange of data in Ubiquitous such as the home RF, access control system, U-Healthcare, and Logistics information Systems. Also, the RFID when it applies a technique, is able to raise the stability of shipping as controling the mobile course and an entrance and exit of the crews an well as previously preventing an accident from shipping. In this paper, we designed and implemented personnel control system using UHF-RFID in vessels which shows through host PC reading and writing tag.

  • PDF