• Title/Summary/Keyword: IT Infrastructure Level

Search Result 747, Processing Time 0.029 seconds

Application Study and Pulp Separation Method by see weeds (해조류 Pulp 분리방법 및 응용연구)

  • Ryu, Soung-Ryual
    • Journal of the Korean Applied Science and Technology
    • /
    • v.32 no.4
    • /
    • pp.685-693
    • /
    • 2015
  • In this study, we found that it is necessary to use the relatively new resource from seaweed extracts to extract and process pulp and create a local brand that can contribute to the local fishermen, development of new bio material, establishment of natural infrastructure, and acquisition of foreign investment. This study's seaweed pulp separation process is very overwhelming as seaweed is a compound of glycoside and polysaccharide. Nevertheless, we intend to develop a purification process and introduce applied technology to explore a new applied technology of pulp process. Once this technology is fully developed and mass produced, it would contribute to greater exports and increasing income level for the local fishermen. The ultimate goal of this study is to gather technical data from the first and second years of application, apply seaweed pulp to increase bio effect, and develop new functional bio-plastic packaging material, raw material, and samples with special characteristics of high molecules.

Statistical investigation on size distribution of suspended cohesive sediment (점착성 부유사의 입도분포형 검증)

  • Park, Byeoungeun;Byun, Jisun;Son, Minwoo
    • Journal of Korea Water Resources Association
    • /
    • v.53 no.10
    • /
    • pp.917-928
    • /
    • 2020
  • The purpose of this study is to find the appropriate probability distribution representing the size distribution of suspended cohesive sediment. Based on goodness-of-fit test for a significance level of 5% using the Kolmogorov-Smirnov test, it is found that the floc size distributions measured in laboratory experiment and field study show different results. In the case of sample data collected from field experiments, the Gamma distribution is the best fitting form. In the case of laboratory experiment results, the sample data shows the positively-skewed distribution and the GEV distribution is the best fitted. The lognormal distribution, which is generally assumed to be a floc size distribution, is not suitable for both field and laboratory results. By using 3-parameter lognormal distribution, it is shown that similar size distribution with floc size distribution can be simulated.

An Analysis on affecting factors about lowly using 3D CAD by using the AHP (계층분석법을 이용한 3D CAD 활용 저조에 대한 영향 요인 분석 연구)

  • Lee, Sang-Hyo;Kim, Ju-Hyung;Kim, Kyung-Hwan;Lee, Yoon-Sun;Kim, Jae-Jun;Ahn, Byung-Ju
    • Korean Journal of Construction Engineering and Management
    • /
    • v.8 no.6
    • /
    • pp.188-196
    • /
    • 2007
  • Because the construction is becoming bigger and the construction environment is rapidly changing, IT/IS(Information Technology and Information System) of the construction is recently suggested with the alternative proposal. So not only is a study progressed in the area of the BIM(Buidilng Information Modeling), VC(Virtual Construction) and CIC (Computer-Integrated Construction) but also of the information database of the construction for building the information infrastructure of the construction in the domestic construction. Because object-oriented 3D CAD improves the efficiency of a design work and includes the object information which can use with the base of the information database of the construction, it has the high value not only in the design level but also in the construction life cycle. But compared with the effect, the use of 3D CAD is sluggish in the construction. In this study, after surveying about lowly using 3D CAD on the point of AEC (Architect-Engineer-Contract), the result is analyzed with AHP(Analytic Hierarchy Process). So the aim of this study is to offer the base to find the solution of the Affecting factors about lowly using 3D CAD.

Design of QoS-based Routing Algorithm for Internet Services on Large Scale ATM Networks (광역 ATM 망 적용을 위한 QoS 보장형 라우팅 알고리즘 설계)

  • 손승원;장종수;정연서;오창석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1517-1531
    • /
    • 1999
  • The Internet is recently evolving into the directions which is capable of incorporating stream-type services such as voice and video services. However, the existing Internet can only support a best-effort delivery model and thus it is difficult to satisfy these requirements as well as to provide the QoS beyond a certain degree. Accordingly, it is imperative to develop QoS based routing algorithm in order to allow the routing by the user's QoS demand and to be applied into wide area networks. In this thesis, we presented new routing algorithms and made performance evaluations. The proposed algorithms allow the routing by the user’s QoS demand level in order to provide the diverse Internet application services based on ATM network environment that is expected to play a role as an infrastructure of high-speed communication network. They also have a feature of shortening the waiting time for address analysis and have a quality-proven characteristics with enhanced network scalability.

  • PDF

Estimation of background minimum night flows by metering water use in water distribution areas (야간사용량 측정을 통한 배급수구역 배경야간최소유량 산정)

  • Lee, Doo-Jin;Kim, Do-Hwan;Kim, Ju-Hwan;Kim, Kyoung-Pil
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.24 no.5
    • /
    • pp.495-508
    • /
    • 2010
  • The aim of this study is to develop a quantified water loss Index to evaluate and manage leakage scientifically for the reduction of non-revenue water in water distribution systems. For the purpose, unavoidable background leakage suggested from UK water industry and IWA, and allowable water leakage in accord with the concept of allowable water loss are proposed by analyzing the inflow into two study water districts and the short-term water use of each customer in the districts. The study distribution areas are selected among the metered districts with good maintenance of leakage after improvement activities in Nonsan, medium sized city in Korea. Estimation models of allowable leakage are developed by metering and analyzing the minimum night flow at residential and commercial areas in the city. In the results of the investigation, it is estimated that background night flow in residential area was larger than that of commercial area where the types of business shows small water use characteristics. Meanwhile, night flow and background water loss on internal plumbing systems show great differences for each district which is influenced much by the water use characteristics and facilities scale. Based on metering water use data in various districts, leakage management criteria can be established under the consideration of domestic conditions in Korea by analyzing separated real water use and background leakage and it is possible to apply into presentation of optimal leakage level and reasonable time for working activities for leakage reduction.

A Study on Cybersecurity Policy in the Context of International Security (국제협력을 통한 사이버안보 강화방안 연구)

  • Kim, So Jeong;Park, Sangdon
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.51-59
    • /
    • 2013
  • Cyberspace, based on the dramatic development of information and communications technology, has brought enormous benefits to mankind. However, concerns over cyber terrorism and cyber attack are becoming serious. It is time to expand the global dialogue on international security issues in cyberspace. It is imperative to have a common understanding that cyberspace, the infrastructure for prosperity, should not be utilized as a space to create conflicts among states, and that all states agree to build confidence and peace in cyberspace. For this purpose, there are 3 tracks of international cooperations: 1)international cooperation such as UN and Conference on Cyberspace, 2)regional cooperations such as ARF and OSCE. 3)bilateral cooperations such US-Russia Cybersecurity Agreement, US-China presidential level dialogue. This paper will analyze the 1st track of international cooperations of UN and Conference on Cyberspace. With this, Korean government can prepare the forthcoming GGE activities and make our own strategy to deal with the global norms of good behaviour in cyberspace.

A Study on the Countermeasure of Cyber Attacks Using Anonymous Network (익명네트워크를 이용한 사이버공격에 대한 대응방안 연구)

  • Lee, Jung-Hyun;Ahn, Kwan-Joon;Park, Won-Hyung;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.31-37
    • /
    • 2011
  • Recently on tile network to ensure the anonymity of Mixed networking has been actively researched. It uses encrypted communications between Nodes and communications path is changed often to the attacker traceback and response, including the difficult thing is the reality. National institutions and infrastructure in these circumstances, the attack on the national level, if done on a large scale can be disastrous in. However, an anonymous network technology to cover up their own internet communication, it malicious form of Internet use by people who enjoy being continually updated and new forms of technology being developed is a situation continuously. In addition, attacks in the future application of these technologies is expected to continue to emerge. However, this reality does not deserve this thesis is prepared. In this paper, anonymously using a network to respond effectively to a cyber attack on the early detection research is to proceed.

Design and Implementation of Workflow-based User Environment on Computational Grid (계산 그리드에서 워크플로우 기반의 사용자 환경 설계 및 구현)

  • Hwang, Sun-Tae;Sim, Gyu-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.165-171
    • /
    • 2005
  • High speed computer, large scale storage device and high speed computer network are computing infrastructure which we can easily access to in these days. However, many computer simulations in natural or applied science such as molecular simulation require more computing power as well as larger scale of storage. Grid computing which is a next generation of distributed computing environment, is one of solution for the new requirements. Even though many researches have been going on Grid computing, those are oriented to communication interface and protocols, and middleware like globus tool kits[2, 3]. Therefore research on application level platform or application itself is yet premature and it makes real users be difficult to utilize Grid system for their research. In this paper, we suggest a new user environment and an abstract job model for simulation experiments on MGrid(Molecular Simulation Grid). It will make users be able to utilize Grid resources efficiently and reliably.

  • PDF

The Validity Analysis of SDN/NFV Military application (SDN/NFV의 군 적용 타당성 분석)

  • Jang, Ji-Hee;Kwon, Tae-Uk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.687-694
    • /
    • 2020
  • SDN and NFV are next-generation network technologies, and cloud, such as data centers, campuses, and large companies, has been established, or is actively applied by service-oriented communication companies. In particular, the Defense Integrated Data Center will be a prime example for military applications. In order for the Defense Integrated Data Center (DIDC) to become an intelligent center, it is accelerating the promotion of the "Smart Defense Integrated Data Center", which applied the latest information and communication technology (ICT). At the time of the establishment of DIDC, it plans to start building infrastructure such as cloud services at around 30% level, and expand D-Cloud to 75% through 'Cloud First'. In addition, the introduction of SDN/NFV will reduce the operation cost and manpower of DIDC, strengthen the ability to efficiently use information resources and cyber information protection systems, and increase flexibility and agility in using each system to improve efficiency in defense management in the future. Therefore, we will discuss the justification and expected effects of SDN/NFV introduction, focusing on DIDC.

A Study of node Authentication in Ad-hoc Network using Java Card (자바 카드를 이용한 Ad-hoc망의 노드 인증에 관한 연구)

  • Lee, Cheol-Seung;Shin, Myeong-Sook;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.902-905
    • /
    • 2005
  • In this paper we challenge the mobile node Authentication using Java Card authentication protocol in Ad-hoc network environment. Ad-hoc network is a collection of wireless mobile nodes without the support of a stationary infrastructure. and DSR routing protocol, which is one of famous mobile ad-hoc rooting protocols, has the following network path problem. this paper is the security structure that defined in a mobile network and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses Ad-hoc based structure and transmission hierarchical security back of a mobile network, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Java Card Authentication of mobile node can possibly be applied to the area of M-Commerce, Wireless Security, and Ubiquitous Computing and so on.

  • PDF