• Title/Summary/Keyword: 통제 네트워크

Search Result 450, Processing Time 0.026 seconds

Design and Implementation of Dynamic Binding System among the Devices Located in Inside and Outside of Home Networks (홈 네트워크에서의 댁내외 기기들의 동적 바인딩 시스템 설계 및 구현)

  • Lee, Jae-Hyun;Kwon, Kyung-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.169-176
    • /
    • 2006
  • Since home network system is usually set up based on the built-in system inside home at the time of construction, it has a difficulty in being compatible with new devices after construction. In this paper, we propose DBS(Dynamic Binding System) that can make links effectively among the devices located in inside and outside of home networks. Implementation of the DBS is based on the ZigBee's binding in WPAN(Wireless Personal Area Network). For this research, we constructed the system consisting of home server that contains proxy server and location server, devices inside home in which tinyOS is embedded, and mobile device that is an emulator. The communication inside home is done by IEEE 802.15.4 protocol and the communication between servers and mobile devices outside home is done by TCP/IP protocol. Regardless of device's address format, the DBS facilitates a link among the devices located inside and outside of home networks. And, introducing a new device into home network can be recognized easily by exchanging messages between devices.

  • PDF

The Value chain and the Networks of Apparel Industry in Guro-Gasan, Seoul (서울 구로.가산동 의류패션산업의 가치사슬과 네트워크)

  • Lee, Sang Wook;Kim, Kyung-Min
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.17 no.3
    • /
    • pp.465-481
    • /
    • 2014
  • This study is about an apparel industry in Guro-Gasan where is growing up to the one of the apparel industry cluster beyond an agglomeration in Seoul. The purpose of this study is twofold: (1) to define industrial functions and roles of Guro-Gasan in a value chain of the apparel industry; and (2) to understand whether an industrial cluster is built on the local networks. This study reviewed formation and transitions of its local industries and industrial size, characteristics, spatial distribution and spatial properties using GIS analysis and field surveys. Through in-depth interviews, it analyzed the production system and spatial dispersion of the value chain to understand its functions and roles.

  • PDF

Network Management Script Construction in Delegation Model (위임 모델에서의 네트워크 관리 스크립트 작성에 관한 연구)

  • 한순희;이기현;조국현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.11
    • /
    • pp.1228-1237
    • /
    • 1992
  • Network management represents those activities which control and moitor the use of resources. Remote delegation model supports flexible and effective distribution of management functions among managers and agents, and it may cause an reliable network management in a relatively complex and high-speed networks. in this model, managers delegate to agents execution of management programs as prescribed in a management scripting language. In addition, primitives included in the management programs enable agents to monitor and control localmanaged objects effectively. We suggest management algorithms in which management scripts are delegated from managers to agents and partiality implement OSI fault management. This mans gement algorithm can effectively support delegation and control concurrent accesses to management information. Moreover, it can be easily translated into object-based concurrent programming language: ABCL. In this paper, we will scrutinize some essential aspects of this management.

  • PDF

A Design of a Personnel Control System Using UHF-RFID in Shipping (UHF 대역 RFID를 이용한 선박내 인원관리 시스템 설계)

  • Cha, Jin-Man;Kim, Myeung-Hwan;Sung, Kil-Young;Lee, Sang-Wook;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2119-2124
    • /
    • 2008
  • An information-oriented basis in today's society has been changing fast, and the desire for connectivity has caused an exponential growth in wireless communication and sensor network. Sensor networks using RFID, in particular, have led this trend due to the increasing exchange of data in Ubiquitous such as the home RF, access control system, U-Healthcare, and Logistics information Systems. Also, the RFID when it applies a technique, is able to raise the stability of shipping as controling the mobile course and an entrance and exit of the crews an well as previously preventing an accident from shipping. In this paper, we designed and implemented personnel control system using UHF-RFID in vessels which shows through host PC reading and writing tag.

Device Discovery in P2P Environment using Feed Forward Neural Network (FFNN을 사용한 P2P 디바이스 디스커버리)

  • Balayar Chakra B.;Kwon Ki-Hyeon;Kim Sang-Choon;Byun Hyung-Gi;Kim Nam-Yong
    • Annual Conference of KIPS
    • /
    • 2006.05a
    • /
    • pp.1223-1226
    • /
    • 2006
  • P2P(Peer to Peer) 기술은 1990년대 후반기부터 산업계 및 학계에 주목을 받고 있는 기술 분야중의 하나로 이 기술의 장점은 인터넷 환경에 산재하여 있는 컴퓨팅 파워, 공간, 네트워크 대역을 인터넷 기반으로 효과적으로 활용하여 협력작업을 가능하게 한다는데 있다. 최근에는 모바일 환경 응용을 위한 P2P 디바이스 탐색 분야에 관심사가 증대되고 있으며, P2P 시스템은 중앙통제 장치가 결여 되어 있기 때문에 중앙통제 장치 개입을 최소로 하면서 P2P를 운영하기 위한 효율적인 기법 및 체계가 요구되고 있다. 본 논문에서는 기존의 접근방법을 검토하여 FFNN(feed forward neural network)을 이용한 디바이스 탐색 기법을 제시한다. 제시한 FFNN은 BP(back propagation) 알고리즘을 통해 훈련하고 디바이스를 탐색한다. 제시한 시스템의 성능을 보이기 위해 일정한 계산량을 가지는 작업을 에이전트를 활용, 탐색된 디바이스간에 분배하여 처리한다. 본 논문에서는 제한된 자원을 가지는 디바이스 간에 P2P를 사용하는 기법에 대해 제시하였다.

  • PDF

A Network QoS Model for Joint Integrated C4I Structure (합동지휘통제 통합망 구조 QoS 모델(안))

  • Park, Dongsuk;Oh, Donghan;Choi, Eunho;Lim, Jaesung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.106-114
    • /
    • 2020
  • NCW which is shaping favorable conditions with obtaining initiative through superiority in C2 and information sharing is critical to the result of the war in a modern warfare. An important requirement to attain superiority through an effective networking in a war-environment is to apply QoS to ensure priority in supporting critical mission and services. In order to obtain an effective NCOE through JCS-led QoS support, standard doucments have been reviewed and analyzed to understand the current level of technology and development. In addition, QoS-related policy documents which is currently being applied by the ROK armed forces have been analyzed to substantiated the JCS-led QoS model and propose the directions of development and enhancement required in the realm of technology, policy and system.

ICAN, I3A Design Criteria for Military Defense Command & Control Facilities (국방 지휘·통제 시설을 위한 ICAN, I3A 설계기준)

  • Jo, Yun-Jeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.806-815
    • /
    • 2017
  • Korean Ministry of National Defense has criteria for military facilities but most were made with the focus on design criteria of facilities and especially in the case of information and communication, only overall criteria with the level of conceptual design are suggested without details. By comparing the design standards of ICAN and I3A that are applied in US Department of Defense, this study will suggest the desirable design standard of Korean military on command/control facilities and general/administrative facilities.

Corporate Financial Fraud and Countermeasures in the Internet Era (인터넷 시대 기업의 재무부정과 대책)

  • Huang, Weidong;Jin, Shanyue
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.35-40
    • /
    • 2022
  • With the advent of the internet age and the outbreak of COVID-19, many companies have embraced online trade. However, due to the way the cyber economy works, the number of companies engaged in financial fraud by falsifying their transaction amounts and customer numbers has been gradually increasing. The purpose of this study is to analyze financial fraud of companies in the Internet era and to present solutions. Therefore, this study analyzed the financial fraud behavior of Luckin Coffee in China as an example and studied the causes and countermeasures of financial fraud. As a result, it was found that the cause of financial fraud lies in the opacity of cash flows from online transactions. The recommendations proposed by this study is to improve internal control systems in companies, develop risk management system, and establish comprehensive external supervision system

Investigation of Minimum Number of Drop Levels and Test Points for FWD Network-Level Testing Protocol in Iowa Department of Transportation (아이오와 주 교통국의 FWD 네트워크 레벨 조사 프로토콜을 위한 최소 하중 재하 수와 조사지점 수의 결정)

  • Kim, Yong-Joo;Lee, Ho-Sin(David);Omundson, Jason S.
    • International Journal of Highway Engineering
    • /
    • v.12 no.4
    • /
    • pp.39-46
    • /
    • 2010
  • In 2007, Iowa department of transportation (DOT) initiated to run the falling weight deflectometer (FWD) network-level testing along Iowa highway and road systems and to build a comprehensive database of deflection data and subsequent structural analysis, which are used for detecting pavement structure failure, estimating expected life, and calculating overlay requirements over a desired design life. Iowa's current FWD networklevel testing protocol requires that pavements are tested at three-drop level with 8-deflection basin collected at each drop level. The test point is determined by the length of the tested pavement section. However, the current FWD network-level program could cover about 20% of Iowa's highway and road systems annually. Therefore, the current FWD network-level test protocol should be simplified to test more than 20% of Iowa's highway and road systems for the network-level test annually. The main objective of this research is to investigate if the minimum number of drop levels and test points could be reduced to increase the testing production rate and reduce the cost of testing and traffic control without sacrificing the quality of the FWD data. Based upon the limited FWD network-level test data of eighty-three composite pavement sections, there was no significant difference between the mean values of three different response parameters when the number of drop levels and test points were reduced from the current FWD network-level testing protocol. As a result, the production rate of FWD tests would increase and the cost of testing and traffic control would be decreased without sacrificing the quality of the FWD data.

An Empirical Test of Social Learning Theory and Complementary Approach in Explanation of University Students' Crimes in Social Network Services (SNS상의 범죄행위 설명에 있어 사회학습이론과 보완적 논의의 검증)

  • Lee, Seong-Sik
    • Informatization Policy
    • /
    • v.22 no.4
    • /
    • pp.91-104
    • /
    • 2015
  • This study tests the effects of differential association, definitions, differential reinforcement and imitation from social learning theory in the explanation of university students' crimes in social network services. In addition, this study tests the interaction effects between social learning factors and other factors such as low self-control, subcultural environment, and crime opportunity for the integrated approach. Using data from 486 university students in Seoul, results show that both definition and imitation have significant influences on crimes, even though differential association and differential reinforcement factors have no significant influences on crimes in social network services. Results also reveal that there are significant interaction effects between definition and subcultural environment, which meana that definition has a strong effect on crimes in high subcultural environment. In addition, it is found that reinforcement has also a strong effect on crimes in high crime opportunity and that interaction effect between imitation and low self-control is significant, which means that imitation has a strong effect on crimes in low self-control students.