• Title/Summary/Keyword: Inbound Network

Search Result 34, Processing Time 0.021 seconds

Study of the Enhancement Performance and Security of Inbound Network (인바운드 네트워크의 성능 및 보안성 향상에 관한 연구)

  • Jeon, Jeong-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.727-734
    • /
    • 2008
  • Recently, Network technology evolve out of expansion a scale of Network and development various Service. also Hacking skill. We have applied to various Security Systems to make a counterattack on this hacking skill. and A Firewall among these security systems is very effective a defense against in the Outbound Network attack. so we need certainly a Firewall to protect a network. But this Conventional Firewall has an directly effect on reduction to the Performance and Security of Inbound Network. and have no effect on a Inner Network Attacking. In this paper, I propose to a "Functional Firewall" as a Secure Objects for the enhancement Performance and Security of Inbound Network.

A Secure Clustering Methodology and an Arrangement of Functional Firewall for the Enhancement of Performance in the Inbound Network (인바운드 네트워크의 성능향상을 위한 보안 클러스터링 기법과 기능성방화벽의 배치)

  • Jeon, Sang-Hoon;Jeon, Jeong-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7B
    • /
    • pp.1050-1057
    • /
    • 2010
  • Nowadays, the network attack occurs frequently. At the same time, the inbound network is also attacked. Even though the security system has been continuously developed in order to prevent from attacks, the network performance is sacrificed for the network security. Therefore, a security system which obtains performance and security together is urgently needed. In this paper, an arrangement of functional firewall and a secure clustering methodology, obtained from distributing functions of a conventional firewall, are proposed based on the idea that performance and security should be obtained together.

Review of Medical Services for Inbound Muslim Patients Associated with Global Healthcare Industry Activation - Focus on Nutrition Service - (글로벌헬스케어산업 활성화에 따른 방한 무슬림환자의 의료서비스에 관한 개관 -영양서비스를 중심으로-)

  • Bai, Young-Hee
    • Journal of the Korean Dietetic Association
    • /
    • v.21 no.4
    • /
    • pp.333-341
    • /
    • 2015
  • This article aimed to investigate problems relating to medical tourism based on a review of medical tourism reports and statistics in the global healthcare industry. To be a leading nation in the global healthcare industry, the needs and culture of many peoples, including Muslims, should be considered. Qualified medical services by JCI certification, including nutrition services, will provide opportunities to participate in the international and Asia medical tourism markets. In this article, the definitions of medical tourism, medical service, Halal and Haram, nutrition service for inbound Muslim patients, and Halal food supply in Korea were examined for medical service improvement. Mutual assistance between the government and private enterprise, sharing of medical service information, and construction of a cooperative network system are needed and should be supported by the government.

A Multi-Objective Differential Evolution for Just-In-Time Door Assignment and Truck Scheduling in Multi-door Cross Docking Problems

  • Wisittipanich, Warisa;Hengmeechai, Piya
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.3
    • /
    • pp.299-311
    • /
    • 2015
  • Nowadays, the distribution centres aim to reduce costs by reducing inventory and timely shipment. Cross docking is a logistics strategy in which products delivered to a distribution centre by inbound trucks are directly unloaded and transferred to outbound trucks with minimum warehouse storage. Moreover, on-time delivery in a distribution network becomes very crucial especially when several distribution centres and customers are involved. Therefore, an efficient truck scheduling is needed to synchronize the delivery throughout the network in order to satisfy all stake-holders. This paper presents a mathematical model of a mixed integer programming for door assignment and truck scheduling in a multiple inbound and outbound doors cross docking problem according to Just-In-Time concept. The objective is to find the schedule of transhipment operations to simultaneously minimize the total earliness and total tardiness of trucks. Then, a multi-objective differential evolution (MODE) is proposed with an encoding scheme and four decoding strategies, called ITSH, ITDD, OTSH and OTDD, to find a Pareto frontier for the multi-door cross docking problems. The performances of MODE are evaluated using 15 generated instances. The numerical experiments demonstrate that the proposed algorithm is capable of finding a set of diverse and high quality non-dominated solutions.

A Study on Artificial Intelligence Model for Forecasting Daily Demand of Tourists Using Domestic Foreign Visitors Immigration Data (국내 외래객 출입국 데이터를 활용한 관광객 일별 수요 예측 인공지능 모델 연구)

  • Kim, Dong-Keon;Kim, Donghee;Jang, Seungwoo;Shyn, Sung Kuk;Kim, Kwangsu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.35-37
    • /
    • 2021
  • Analyzing and predicting foreign tourists' demand is a crucial research topic in the tourism industry because it profoundly influences establishing and planning tourism policies. Since foreign tourist data is influenced by various external factors, it has a characteristic that there are many subtle changes over time. Therefore, in recent years, research is being conducted to design a prediction model by reflecting various external factors such as economic variables to predict the demand for tourists inbound. However, the regression analysis model and the recurrent neural network model, mainly used for time series prediction, did not show good performance in time series prediction reflecting various variables. Therefore, we design a foreign tourist demand prediction model that complements these limitations using a convolutional neural network. In this paper, we propose a model that predicts foreign tourists' demand by designing a one-dimensional convolutional neural network that reflects foreign tourist data for the past ten years provided by the Korea Tourism Organization and additionally collected external factors as input variables.

  • PDF

A Study on the IPv6 Multihoming Mechanism using Loadsharing Broker.

  • Kim, Dong-Kyun;Park, Hak-Soo;Kim, Seong-Hae;Whang, Il-Sun
    • Journal of Scientific & Technological Knowledge Infrastructure
    • /
    • s.7
    • /
    • pp.141-148
    • /
    • 2001
  • This paper describes a mechanisms for IPv6 multihomming with loadsharing broker, focusing on the interdomain scalability and load sharing with redundancy on IPv6 networks. Unlike currently-practiced IPv4 multihoming, this model does not impact the worldwide routing table size, also it provides inbound load sharing at site level based on router renumbering, and multiple-prefix assigning techniques of IPv6. The proposed model has four modules such as building interfaces MIB module, priority list maintaining module, load detection module, and RRP configuration module.

  • PDF

Analysis on Types of Golf Tourism After COVID-19 by using Big Data

  • Hyun Seok Kim;Munyeong Yun;Gi-Hwan Ryu
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.1
    • /
    • pp.270-275
    • /
    • 2024
  • Introduction. In this study, purpose is to analize the types of golf tourism, inbound or outbound, by using big data and see how movement of industry is being changed and what changes have been made during and after Covid-19 in golf industry. Method Using Textom, a big data analysis tool, "golf tourism" and "Covid-19" were selected as keywords, and search frequency information of Naver and Daum was collected for a year from 1 st January, 2023 to 31st December, 2023, and data preprocessing was conducted based on this. For the suitability of the study and more accurate data, data not related to "golf tourism" was removed through the refining process, and similar keywords were grouped into the same keyword to perform analysis. As a result of the word refining process, top 36 keywords with the highest relevance and search frequency were selected and applied to this study. The top 36 keywords derived through word purification were subjected to TF-IDF analysis, visualization analysis using Ucinet6 and NetDraw programs, network analysis between keywords, and cluster analysis between each keyword through Concor analysis. Results By using big data analysis, it was found out option of oversea golf tourism is affecting on inbound golf travel. "Golf", "Tourism", "Vietnam", "Thailand" showed high frequencies, which proves that oversea golf tour is now the re-coming trends.

A Study on the Outbound Logistics Network Rationalization of Domestic Automobile Industry (국내 완성차 물류 네트워크 합리화 방안 연구)

  • 김대기;조한홍
    • Journal of Distribution Research
    • /
    • v.7 no.1
    • /
    • pp.1-20
    • /
    • 2002
  • Many of logistics-related research in automobile industry has focused on inbound logistics and procurement. Research into outbound logistics is relatively few. As a starting research into outbound logistics in automobile industry, this paper examined its logistics network problems with three aspects - location strategy, inventory strategy and transportation strategy. We proposed alternatives of logistics network design resolution, and presented three practical scenarios based on those alternatives. Based on interview, on-site visit and internal data collection processes, we identified major domestic outbound logistics problems such as redundant logistics bases, inefficient delivery policy, insufficient inventory capacity, inventory stock quality deterioration, inefficient transportation system, and etc. In order to cope with those problems, we proposed such strategic alternatives as introduction of hub-and-spoke system, integration of logistics bases, introduction of (automatic) parking building, diversification of transportation mode, and etc. At the same time, we constructed three practically executable scenarios based on those ideas. The first is "Center Hub" scenario, the second is "Metropolitan Hub" scenario. The third and last scenario is "Regional Consolidation of Warehouses (distribution centers)".

  • PDF

Link Design of VSAT Communication System for Low Speed Data Transmission (저속데이타 전송용 VSAT 통신시스템의 링크설계)

  • 장대익;최재익;김덕년
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.7
    • /
    • pp.1213-1223
    • /
    • 1994
  • VSATs(Very Small Aperture Terminals) have introduced new concepts in satellite business communications and are typically used in a star network configuration to provide information directly to the user`s premise. The characteristics of this system are low earth station costs, easy in stallation, compact, and very high flexibility for a varierty of applications (Credit Checks, Electronic Mail, Video Conferencing, Reservation System, Database Inquires, Order Entry, etc.). So, the requests of VSAT service have considerably enlarged. The link design of a VSAT network using Korea Sat. is discussed in this paper. This paper is intended to collect in a convient way the principle formula and reference data necessary to make overall performance calcurations and to calcurate antenna size. HPA power size and link margin of earth stations for satellite communications systems. Generally, because the antenna size of the Hub station in the VSAT system is bigger than the Remote station, the method of power allocations of inbound and outbound carriers is utilized in this paper. The size of Hub station and Remote station are assumed to be 3.7m and 1.2m. respectively.

  • PDF

Anomaly Detection Method Using Entropy of Network Traffic Distributions (네트워크 트래픽 분포 엔트로피를 이용한 비정상행위 탐지 방법)

  • Kang Koo-Hong;Oh Jin-Tae;Jang Jong-Soo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.283-294
    • /
    • 2006
  • Hostile network traffic is often different from normal traffic in ways that can be distinguished without knowing the exact nature of the attack. In this paper, we propose a new anomaly detection method using inbound network traffic distributions. For this purpose, we first characterize the traffic of a real campus network by the distributions of IP protocols, packet length, destination IP/port addresses, TTL value, TCP SYN packet, and fragment packet. And then we introduce the concept of entropy to transform the obtained baseline traffic distributions into manageable values. Finally, we can detect the anomalies by the difference of entropies between the current and baseline distributions. In particular, we apply the well-known denial-of-service attacks to a real campus network and show the experimental results.