• Title/Summary/Keyword: 통제 네트워크

Search Result 450, Processing Time 0.023 seconds

A Link-Label Based Node-to-Link Optimal Path Algorithm Considering Non Additive Path Cost (비가산성 경로비용을 반영한 링크표지기반 Node-to-Link 최적경로탐색)

  • Lee, Mee Young;Nam, Doohee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.5
    • /
    • pp.91-99
    • /
    • 2019
  • Existing node-to-node based optimal path searching is built on the assumption that all destination nodes can be arrived at from an origin node. However, the recent appearance of the adaptive path search algorithm has meant that the optimal path solution cannot be derived in node-to-node path search. In order to reflect transportation data at the links in real-time, the necessity of the node-to-link (or link-to-node; NL) problem is being recognized. This research assumes existence of a network with link-label and non-additive path costs as a solution to the node-to-link optimal path problem. At the intersections in which the link-label has a turn penalty, the network retains its shape. Non-additive path cost requires that M-similar paths be enumerated so that the ideal path can be ascertained. In this, the research proposes direction deletion and turn restriction so that regulation of the loop in the link-label entry-link-based network transformation method will ensure that an optimal solution is derived up until the final link. Using this method on a case study shows that the proposed method derives the optimal solution through learning. The research concludes by bringing to light the necessity of verification in large-scale networks.

Effect of Attributes of Three Stakeholders on the Outcome of the Village-based Rural Tourism Project in Korea (농촌관광사업의 Stakeholders의 특성이 사업성과에 미치는 효과)

  • Cho, Gyoung-Rae;Park, Duk-Byeong;Jeong, Gu-Hyun
    • The Korean Journal of Community Living Science
    • /
    • v.19 no.2
    • /
    • pp.267-282
    • /
    • 2008
  • 본 연구는 농촌관광사업의 Stakeholders간의 관계 측면에서 참여주민의 특성이 개발기관과 주민조직의 특성과 어떤 관계가 있으며, 이 세 요소가 개발 성과에 어떤 인과관계가 있는지를 밝히는데 있다. 참여주민의 특성으로 사회와 참여주민에 대한 가치체계, 즉 사회자본의 요소들인 신뢰, 규범, 공동체의식 및 네트워크에의 참여를, 개발기관의 특성으로 지원내용과 지원만족도를, 그리고 주민주직의 특성으로 주민조직의 경영역량인 기획, 조직, 지도력, 통제를 측정항목으로 설정하였다. 구조화된 설문지를 이용하여 45개 마을에서 227명의 농촌관광 참여자들을 대상으로 상관분석과 경로 분석을 실시하였다. 경로분석 결과 사회자본이 사업성과에 미치는 직접적인 효과는 0.60으로 상당 부분의 영향을 미침을 설명하고 있었다. 반면 개발기관의 지원특성은 주민조직의 경영역량과 유의성 있는 상관이 있었으나 사업성과에 직접적인 효과는 없는 것으로 나타났다. 이는 개발사업의 효과가 외부지원에 의해서가 아니라 주민 자체의 역량에 의해서 결정됨을 설명한다. 농촌관광사업이 효과를 얻기 위해서는 공동체의식, 주민과 개발기관간의 상호 신뢰감 조성 등 주민의식의 고양이 필요하며, 특히 주민조직체의 경영역량 함량을 위해 제도적 지원이 강화되어야 할 것이다.

  • PDF

A Design of the Certification System in a Instantant Messenger Using PKI (PKI를 이용한 인스턴트 메신저에서의 인증 시스템 설계)

  • Park Su-Young;Choi Gwang-Mi;Jung Chai-Yeoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.142-147
    • /
    • 2006
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. In the past, e-mail has been the primary choice of exchanging information, but instant messengers are gaining popularity abroad and domestically because of their nature of getting immediate reponses. However a instant messenger services have the exposure of data on internet but clients use them without recognizing their exposure. It's like phone tapping. The coding technology using Public Key Cryptosystem has developed the public key infrastructure to be able to do the services of Access-control, Authentication, Confidentiality, Integrity. and Non-repudiation with internet. It is a thesis that suggests the certification protocol in a instant messenger using PKI(Public Key Infrastructure) for secure communication.

Evolution of Science and Technology Poles : The Case of Daedeok Science Town (과학기술거점의 진화: 대덕연구단지의 사례)

  • Song, Sung-Soo
    • Journal of Science and Technology Studies
    • /
    • v.9 no.1
    • /
    • pp.33-55
    • /
    • 2009
  • This article analyzes the evolutionary process of Daedeok Science Town from the standpoint of the life of science and technology poles. It deals the theoretical discussion on the science and technology poles, and investigates the history of Daedeok Science Town dividing into the period of conception, construction, and clustering. Daedeok Science Town has been developed from research and academic city through special research parks to innovative clusters, and nowadays emphasizes networking, interaction, and commercialization. This study shows the types of science and technology poles can be analyzed by historical consideration of specific Korean case.

  • PDF

Design and Implementation of Firewall Log Monitoring System Using XML (XML을 이용한 침입차단 로그 모니터링 시스템 설계 및 구현)

  • 김석훈;손우용;송정길
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.9-15
    • /
    • 2004
  • The Internet is aggregate of trustless networks essentially Because the Internet is very difficult to control flowing of information, taking advantage of enough sporadic resource, security problem that can protect internal important stock from the Internet is risen seriously. Recently, virus accident and generation rate about system intrusion that happen become much higher and various than past. On these time, is progressing researcher for invasion cutout to keep away illegal act vigorouslyand do continuous development. In this paper, reporting administrator log information about invader's illegal act depending on XML format form, and I wished to solve problem that happen in administration side developing invasion interception system that can control to remote.

  • PDF

Integrated Security Management System with Multi Agent (다중 에이전트를 이용한 통합 보안 관리시스템)

  • 이문구
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.8
    • /
    • pp.1015-1024
    • /
    • 2001
  • As the internet environment has been rapidly changed, the scale of internet network that needs to be managed has been magnified. In this way, the recognition for the importance of security became extensive, and numerous security systems for the protection of internal information were introduced. But decentralized security systems because of there use of different user interfaces undergo difficulties in effective security management as well as prompt coping when an obstacle happens causing a corpulence of in the security management part. In this paper, I propose an integrated security management system which can grasp the situation of each system and manage every system in the center so that we can consistently and integrally manage every system. Integrated security management system with multi agents has the advantages of prompt coping with obstacles, and the minimization of weaknesses that different security solutions have, and of consistent control and management for decentralized security systems.

  • PDF

Measuring Inter-industry Convergence using Structural Holes Theory: Focusing on ICT Industries (구조적 공백 이론을 이용한 산업간 융합 측정 연구: ICT 산업을 중심으로)

  • Lee, Dong Hyun;Lee, Sang-Gun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.3
    • /
    • pp.11-19
    • /
    • 2020
  • This study seeks to measure inter-industry convergence systematically and quantitatively using structural holes theory. ICT industries were classified into ICT manufacturing and ICT service then efficiency and constraints were calculated using input-output tables. The results of the study revealed both ICT industries have very high information and control benefits in the process of industrial convergence, proving to be key industries with competitive advantage. Further implications were presented based on comparative analysis between ICT manufacturing and service and trend analysis over the past 15 years.

An Efficient Role Based Access Control Technique by Structuring of Role Specification Certificate (역할 명세 인증서의 구조화에 의한 효율적 역할기반 접근제어 기법)

  • Yang, Soo-Mi
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.1-9
    • /
    • 2005
  • In a role based access control through attribute certificate, the use of role assignment certificates and role specification certificates can reduce management cost and the overhead incurred by changing roles, Highly distributed computing environments such as ubiquitous computing environments not having global or broad control. need another attribute certificate management technique, Actually just having role specification certificate separately reduce management cost, But for better performance we structure role specification, We group roles and make the role group relation tree, It results secure and efficient role renewing and distribution, For scalable role specification certificate distribution, the multicasting of packets is used, We take into account the packet lass and quantify performance enhancements of structuring role specification certificates.

  • PDF

An Analysis of Keywords related to Private Schools in Newspaper Editorials (신문 사설에 나타난 사립학교 관련 주요어 분석)

  • Park, Soo Jung
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.3
    • /
    • pp.499-507
    • /
    • 2015
  • This study aims to understand the phenomenon related to private schools and present the implication for policy about private school, network text analysis about newspaper editorials in conservative and progressive media was conducted. The main results are as follows. First, in newspaper editorials, there were many issues about private university and there was a distinction between private elementary secondary school and private university. Second, in newspaper editorials, 'encouraging perspective' such as financial assistance and new private school like self-governing private high school and 'controlling perspective' such as withdrawal of problem private schools were both appeared. As a result, this study presents that the perspective for private schools needs to be re-established by 'accountability' as the educational institution and 'school capacity building' away from the past frame.

The research regarding an information system risk management process modeling (정보시스템 위험관리 프로세스 모델링에 관한 연구)

  • Kim, Tai-Dal
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.157-164
    • /
    • 2006
  • From the hazard which it prepares in the hazards increase which it follows in information demand augmentation of information technical development and the consumer from inside systematizing integrity and solubility of information technological resources. inside against a confidentiality. The control against information and a system and a data outside is demanded. From the dissertation which it sees demand function and the structure which do information technical risk management system development it will be able to manage the danger which it infiltrates with the root which is various overview in hazard necessity it investigated the inside and outside of the country instance in the center and it analyzed. And it plans the dangerous civil official integrated process model ultimately as against a hazards it will be able to prepare in the dictionary in order, it put the place objective which it induces.

  • PDF