• Title/Summary/Keyword: 환경정보시스템

Search Result 16,780, Processing Time 0.054 seconds

Integrated Approach for Watershed Management in an Urban Area (도시 유역 관리를 위한 통합적인 접근방법)

  • Lee, Kil-Seong;Chung, Eun-Sung;Kim, Young-Oh
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.2 s.163
    • /
    • pp.161-178
    • /
    • 2006
  • Heathcote (1998) identified a systematic, seven-step approach to general watershed planning and management. It consists of 1) understanding watershed components and processes, 2) identifying and ranking problems to be solved, 3) setting clear and specific goals, 4) developing a list of management options, 5) eliminating infeasible options 6) testing the effectiveness of remaining feasible options, and 7) developing the final options. In this study the first five steps of that process were applied to the Anyangcheon watershed in Korea, which experiences streamflow depletion, frequent flood damages, and poor water quality typical of highly urbanized watersheds. This study employed four indices: Potential Flood Damage(PFD), Potential Streamflow Depletion(PSD), Potential Water Quality Deterioration(PWQD) and Watershed Evaluation Index(WEI) to identify and quantify problems within the watershed. WEI is the integration index of the others. Composite programming which is a method of multi-criteria decision making is applied for the calculation of PSD, PWQD and WEI (Step 2). The primary goal of the study is to secure instreamflow in the Anyangcheon during dry seasons. The second management goals of flood damage mitigation and water quality enhancement are also set (Step 3). Management options include not only structural measures that can alter the existing conditions, but also nonstructural measures that rely on changes in human behavior or management practices (Step 4). Certain management options which are not technically, economically, and environmentally feasible, are eliminated (Step S). Therefore, this study addresses a Pre-feasibility study, which established a master plan using Steps 1 through 5.

A Multipath Delay Time Detection Method For $\frac{\pi}{4}$ Shift QPSK Modulation Under The Frequency Selective Fading Environment (주파수 선택성 페이딩 환경하에서 $\frac{\pi}{4}$ shift QPSK 변조방식에 대한 다중파의 시간지역 검출법 제안)

  • 조병진;김대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.10
    • /
    • pp.941-950
    • /
    • 1991
  • channel is severely degraded by multipath delay time spread. In this paper. We propose a simple multipath delay time detection method, which has a merit of in serviceable, yet simple H/W realizability for $\pi/4$ shift QPSK by detecting cross channel interference. A $\pi/4$ shift QPSK signal originally has quadrature channel(Q-ch) component. Thus in order to measure CCI between in-phase channel(I-ch) and quadrature channel(Q-ch), which closely related to multipath delay time, Frequency doubling scheme(frequency doubler) and differential detector is proposed, which makes $\pi/4$ shift QPSK signal look like BPSK and also makes it possible for CCI to be detected at I-ch detector output. To get an information from time varying I-ch output signal under the multipath lading environment, a method for obtaining the mean of the absolute value$(V_{MABS}(t))$ and another one for obtaining the root mean square value$(V_{RMS}(t))$ of CCI are proposed. Furthermore, a relationship between delay spread and CCI is also analyzed. In order to confirm theoretical results, computer simulation has been carried out under the quasi-static and Reyleigh distributed two ray multipath fading environments. A fairly good result was obtained. However it was also shown that this method is sensitive to bandwidth restriction to some extent. In addition, some idea for a simple hardware realization for the frequency doubler are given.

  • PDF

A Method for Detection of Private Key Compromise (서명용 개인키 노출 탐지 기법)

  • Park, Moon-Chan;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.781-793
    • /
    • 2014
  • A Public Key Infrastructure (PKI) is security standards to manage and use public key cryptosystem. A PKI is used to provide digital signature, authentication, public key encryption functionality on insecure channel, such as E-banking and E-commerce on Internet. A soft-token private key in PKI is leaked easily because it is stored in a file at standardized location. Also it is vulnerable to a brute-force password attack as is protected by password-based encryption. In this paper, we proposed a new method that detects private key compromise and is probabilistically secure against a brute-force password attack though soft-token private key is leaked. The main idea of the proposed method is to use a genuine signature key pair and (n-1) fake signature key pairs to make an attacker difficult to generate a valid signature with probability 1/n even if the attacker found the correct password. The proposed method provides detection and notification functionality when an attacker make an attempt at authentication, and enhances the security of soft-token private key without the additional cost of construction of infrastructure thereby extending the function of the existing PKI and SSL/TLS.

A Study on the Policy Proposal and Model B2B2C for Safe Open Banking (안전한 오픈뱅킹 구축을 위한 정책 및 B2B2C 모델에 관한 연구)

  • Choi, Dae-Hyun;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1271-1283
    • /
    • 2019
  • The fourth industrial revolution and digital transformation are also bringing major changes to the financial ecosystem in Korea. Already, global financial firms overseas are opening their financial markets and exploring new financial businesses by seeking ways to co-prosperity with fintech firms. However, it is also true that the domestic financial environment has failed to respond to the changes due to its monopolistic and closed structure. In response, the government began pushing for the introduction of open banking in December 2019 with the aim of fully opening the financial settlement system. However, unlike the existing simple financial transaction structure, open banking still has an unresolved part due to the unclear relationship of responsibilities between interested parties in the event of financial accidents due to the complex linkage structure of transactions such as financial firms, fintech firms and customers. This study analyzed the security threat of open banking in depth. By doing so, the government and financial firms want to present policy proposals that need to be improved to enhance the safety of open banking in korea and protect financial consumers, as well as new financial models that have improved the vulnerable parts of existing models.

Highly Reliable Fault Detection and Classification Algorithm for Induction Motors (유도전동기를 위한 고 신뢰성 고장 검출 및 분류 알고리즘 연구)

  • Hwang, Chul-Hee;Kang, Myeong-Su;Jung, Yong-Bum;Kim, Jong-Myon
    • The KIPS Transactions:PartB
    • /
    • v.18B no.3
    • /
    • pp.147-156
    • /
    • 2011
  • This paper proposes a 3-stage (preprocessing, feature extraction, and classification) fault detection and classification algorithm for induction motors. In the first stage, a low-pass filter is used to remove noise components in the fault signal. In the second stage, a discrete cosine transform (DCT) and a statistical method are used to extract features of the fault signal. Finally, a back propagation neural network (BPNN) method is applied to classify the fault signal. To evaluate the performance of the proposed algorithm, we used one second long normal/abnormal vibration signals of an induction motor sampled at 8kHz. Experimental results showed that the proposed algorithm achieves about 100% accuracy in fault classification, and it provides 50% improved accuracy when compared to the existing fault detection algorithm using a cross-covariance method. In a real-world data acquisition environment, unnecessary noise components are usually included to the real signal. Thus, we conducted an additional simulation to evaluate how well the proposed algorithm classifies the fault signals in a circumstance where a white Gaussian noise is inserted into the fault signals. The simulation results showed that the proposed algorithm achieves over 98% accuracy in fault classification. Moreover, we developed a testbed system including a TI's DSP (digital signal processor) to implement and verify the functionality of the proposed algorithm.

Formative Elements of the Directional Sign System for the Effective Information Transmission of the Shopping Mall Complex (효과적 정보전달을 위한 대형쇼핑몰 유도사인 시스템 조형요소에 관한 연구)

  • 이유경;백진경
    • Archives of design research
    • /
    • v.17 no.1
    • /
    • pp.373-382
    • /
    • 2004
  • Large sized buildings have proliferated in the modern world in order to solve problems caused by the growth of cities, and this trend has lead to diversity in style and utilization of interiors. In particular, wayfinding within the shopping mall for a customer is a common problem, so if customers do not have to face these navigational problems and could find the way more easily, then shopping mall or the store can expect much better profits. Therefore, directional sign system that can provide accurate and speedy information for customers with diversified ages, gender and knowledge is necessary. Firstly, the definition and element of all directional sign are analyzed through the existing literature survey. The elements are based on the practical elements and six categories such as type, pictogram, color, layout, form, and location were considered. Secondly, directional signs in large underground shopping mall was considered, and the speciality of the underground shopping mall was investigated, and finally top three underground shopping malls was analyzed. Thirdly, through the questionnaire, an objective appraisal of directional signs and problems was developed, and following possible improvement was suggested. This study has its own limitations since it is only applicable to the specific locations, however, directional designs will be useful in other types of buildings as well. Through the continuous studies of the users' psychology, these kinds of studies will be related to the environmental characteristics of various places.

  • PDF

Group-based Random Access Using Variable Preamble in NB-IoT System (NB-IoT 시스템에서 가변 프리앰블을 이용한 그룹 랜덤 액세스)

  • Kim, Nam-Sun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.370-376
    • /
    • 2020
  • In this study, we consider a group-based random access method for group connection and delivery by grouping devices when H2H devices and large-scale M2M devices coexist in a cell in NB-IoT environment. H2H devices perform individual random access, but M2M devices are grouped according to a NPRACH transmission period, and a leader of each group performs random access. The preamble is allocated using the variable preamble allocation algorithm of the Disjoint Allocation(DA) method. The proposed preamble allocation algorithm is an algorithm that preferentially allocates preambles that maximizes throughput of H2H to H2H devices and allocates the rest to M2M devices. The access distribution of H2H and M2M devices was set as Poisson distribution and Beta distribution, respectively, and throughput, collision probability and resource utilization were analyzed. As the random access transmission slot is repeated, the proposed preamble allocation algorithm decreases the collision probability from 0.93 to 0.83 and 0.79 when the number M2M device groups are 150. In addition, it was found that the amount of increase decreased to 33.7[%], 44.9[%], and 48.6[%] of resource used.

Does Online Social Network Contribute to WOM Effect on Product Sales? (온라인 소셜네트워크의 제품판매 관련 구전효과에 대한 기여도 분석)

  • Lee, Ju-Yoon;Son, In-Soo;Lee, Dong-Won
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.2
    • /
    • pp.85-105
    • /
    • 2012
  • In recent years, IT advancement has brought out the new Internet communication environment such as online social network services, where people are connected in global network without temporal and spatial limitation. The popular use of online social network helps people share their experience and preference for specific products and services, thus holding large potential to significantly affect firms' business performance through Word-of-Mouth (WOM). This study examines the role of online social network in raising WOM effect on the movie industry by comparing with the similar role of Internet portal, another major online communication channel. Analyzing 109 movies and data from both Twitter and Naver movie, we found that significant WOM effect exists simultaneously in both Twitter and Naver movie. However, we also found that different figures of online viral effects exist depending on the popularity of movies. In the hit movie group, before the movie release, the WOM effect occurs only in Twitter while the WOM effect arises in both Twitter and Naver movie at the same time after the movie release. In the less-popular (or niche) movie group, the WOM effect occurs in both Twitter and Naver movie only before the movie release. Our findings not only deepen theoretical insights into different roles of the two online communication channels in provoking the WOM effect on entertainment products but also provide practitioners with incentive to utilize SNS as strategic marketing platform to enhance their brand reputations.

The study of improving the performance of lower direction finding ability due to the interfered phase difference of circular array Antennas (원형배열안테나의 위상간섭에 의한 방향탐지 성능저하 개선연구)

  • Chung, Jae-Woo;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.535-539
    • /
    • 2010
  • This paper include to study DoA(Direction of Arrival) for radio collection and monitoring system. The direction finding calculated by applying the CVDF (Correlation Vector Direction Finding) algorithm for the five circular dipole antenna over V / UHF band. To improve the accuracy of direction finding by applying CVDF algorithm needs to obtain ideal phase difference each antennas. However, a circular array antenna phase difference pattern may be distorted on a specific frequency band or to particular direction. The effect of installing each array antennas circularly and the effect of the interference of center pole (located in the center of a circular array antenna mount) may make the distortion of phase pattern. If you use an active antenna instead of passive antenna to obtain good sensitivity, you would measure the more distortion. This paper propose how to change combination of antennas to measure the phase in real-time and how to use antenna beam patterns for minimizing the degradation phenomena at applying simple CVDF algorithm and increasing the direction finding capability.

  • PDF

Performance Evaluation of Hash Join Algorithm on Flash Memory SSDs (플래쉬 메모리 SSD 기반 해쉬 조인 알고리즘의 성능 평가)

  • Park, Jang-Woo;Park, Sang-Shin;Lee, Sang-Won;Park, Chan-Ik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.11
    • /
    • pp.1031-1040
    • /
    • 2010
  • Hash join is one of the core algorithms in databases management systems. If a hash join cannot complete in one-pass because the available memory is insufficient (i.e., hash table overflow), however, it may incur a few sequential writes and excessive random reads. With harddisk as the tempoary storage for hash joins, the I/O time would be dominated by slow random reads in its probing phase. Meanwhile, flash memory based SSDs (flash SSDs) are becoming popular, and we will witness in the foreseeable future that flash SSDs replace harddisks in enterprise databases. In contrast to harddisk, flash SSD without any mechanical component has fast latency in random reads, and thus it can boost hash join performance. In this paper, we investigate several important and practical issues when flash SSD is used as tempoary storage for hash join. First, we reveal the va patterns of hash join in detail and explain why flash SSD can outperform harddisk by more than an order of magnitude. Second, we present and analyze the impact of cluster size (i.e., va unit in hash join) on performance. Finally, we emperically demonstrate that, while a commerical query optimizer is error-prone in predicting the execution time with harddisk as temporary storage, it can precisely estimate the execution time with flash SSD. In summary, we show that, when used as temporary storage for hash join, flash SSD will provide more reliable cost estimation as well as fast performance.