• 제목/요약/키워드: Information Infrastructures

검색결과 431건 처리시간 0.025초

Sensors Network and Security and Multimedia Enhancement

  • Woo, Seon-mi;Lee, Malrey
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권1호
    • /
    • pp.64-68
    • /
    • 2016
  • These fields are integrated to visualize and finalize the proposed development, in simulation environment. SCADA (supervisory control and data acquisition) systems and distributed control systems (DCSs) are widely deployed in all over the world, which are designed to control the industrial infrastructures, in real ways. To supervise and control the various parts of designed systems; trends to require a deep knowledge to understand the overall functional needs of industries, which could be a big challenge. Industrial field devices (or network sensors) are usually distributed in many locations and are controlled from centralized site (or main control center); the communication provides various signs of security issues. To handle these issues, the research contribution will twofold: a method using cryptography is deployed in critical systems for security purposes and overall transmission is controlled from main controller site. At controller site, multimedia components are employed to control the overall transmission graphically, such as system communication, bytes flows, security embedded parameters and others, by the means of multimedia technology.

네트워크 보안성능 및 보안성 평가에 관한 연구 (A Study on Evaluation for Network Security Performance and Property)

  • 황선명;정연서;서동일
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2003년도 추계종합학술대회
    • /
    • pp.712-715
    • /
    • 2003
  • 컴퓨터 네트워크 기술의 발달은 기업 또는 단체들의 사업 환경을 변화시키고 그 범위를 점점 넓혀나가고 있다. 인터넷을 이용한 업무 시스템의 응용은 보다 편리한 환경을 제공하지만 이에 앞서 데이터들이나 장비들의 안전성을 고려하지 않는다면 컴퓨터 네트워크의 수많은 보안 위험 요소에 직접적으로 노출되어진다. 본 논문에서는 이러한 데이터들이나 장비들의 안전성을 위해 네트워크의 보안성과 보안성능을 측정할 수 있는 방법들을 제시하고자 한다.

  • PDF

유비쿼터스 환경기반의 상황인식 시나리오 연구 - 상수도 사례를 중심으로 - (Context-Awareness Scenario for Ubiquitous Environment : Case of Water Supply)

  • 정진석;이용주;변인선;김태훈;송용학
    • 대한공간정보학회지
    • /
    • 제17권2호
    • /
    • pp.47-53
    • /
    • 2009
  • 상황인식기술은 유비쿼터스 환경에서의 필수적인 요소기술로 자리매김하고 있다. 특히 유비쿼터스도시를 구성하는 3대 요소인 유비쿼터스도시기반시설에 있어서도 상황인식기술은 매우 중요한 위치를 차지한다. 본 연구에서는 지능형 시설물 상황인식 모듈개발을 위해 상수도관의 파열에 따른 누수사고를 다양한 상황으로 가정하고 이에 대한 시나리오 및 처리과정을 제시하였다. 시설물에 대한 상황별 시나리오는 향후 상황인식 모듈개발 또는 모델링의 토대가 될 것이다.

  • PDF

A Heuristic Time Sharing Policy for Backup Resources in Cloud System

  • Li, Xinyi;Qi, Yong;Chen, Pengfei;Zhang, Xiaohui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권7호
    • /
    • pp.3026-3049
    • /
    • 2016
  • Cloud computing promises high performance and cost-efficiency. However, most cloud infrastructures operate at a low utilization, which greatly adheres cost effectiveness. Previous works focus on seeking efficient virtual machine (VM) consolidation strategies to increase the utilization of virtual resources in production environment, but overlook the under-utilization of backup virtual resources. We propose a heuristic time sharing policy of backup VMs derived from the restless multi-armed bandit problem. The proposed policy achieves increasing backup virtual resources utilization and providing high availability. Both the results in simulation and prototype system experiments show that the traditional 1:1 backup provision can be extended to 1:M (M≫1) between the backup VMs and the service VMs, and the utilization of backup VMs can be enhanced significantly.

Cost-Aware Dynamic Resource Allocation in Distributed Computing Infrastructures

  • Ricciardi, Gianni M.;Hwang, Soon-Wook
    • International Journal of Contents
    • /
    • 제7권2호
    • /
    • pp.1-5
    • /
    • 2011
  • Allocation of computing resources is a crucial issue when dealing with a huge number of tasks to be completed according to a given deadline and cost constraints. The task scheduling to several resources (e.g. grid, cloud or a supercomputer) with different characteristics is not trivial, especially if a trade-off in terms of time and cost is considered. We propose an allocation approach able to fulfill the given requirements about time and cost through the use of optimizing techniques and an adaptive behavior. Simulated productions of tasks have been run in order to evaluate the characteristics of the proposed approach.

Artificial Intelligence for the Fourth Industrial Revolution

  • Jeong, Young-Sik;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • 제14권6호
    • /
    • pp.1301-1306
    • /
    • 2018
  • Artificial intelligence is one of the key technologies of the Fourth Industrial Revolution. This paper introduces the diverse kinds of approaches to subjects that tackle diverse kinds of research fields such as model-based MS approach, deep neural network model, image edge detection approach, cross-layer optimization model, LSSVM approach, screen design approach, CPU-GPU hybrid approach and so on. The research on Superintelligence and superconnection for IoT and big data is also described such as 'superintelligence-based systems and infrastructures', 'superconnection-based IoT and big data systems', 'analysis of IoT-based data and big data', 'infrastructure design for IoT and big data', 'artificial intelligence applications', and 'superconnection-based IoT devices'.

교량의 장기성능 예측을 위한 디지털 트윈모델 정의 (Definition of Digital Twin Models for Prediction of Future Performance of Bridges)

  • 심창수;전치호;강휘랑;당고손;소칸야
    • 한국BIM학회 논문집
    • /
    • 제8권4호
    • /
    • pp.13-22
    • /
    • 2018
  • Future performance prediction of bridges is challenging task for structural engineers. Well-organized information from design, construction and operation stages is essential for the assessment of structures. Digital twin model is a new concept to realize more reliable data platform for management of infrastructures. Damage history including degradation of material, cracking, corrosion, etc. needs to be accumulated in the digital model. The digital model is linked to the analysis model for the assessment of structural performance considering changed mechanical properties of structural components. In this paper, initial definition digital twin model of a PSC-I girder bridge is proposed.

원격 감시 제어시스템에서 키 관리 방안 연구 (Research on key management for supervisory control and data acquisition system)

  • 이건직
    • 디지털산업정보학회논문지
    • /
    • 제16권4호
    • /
    • pp.29-42
    • /
    • 2020
  • SCADA (Supervisory Control and Data Acquisition) systems for remote monitoring, data acquisition and control are applied to major industrial infrastructures including power, water and railroad. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. These systems are located at far distances and are connected to the main control center through various types of communication methods. Due to the nature of these systems, they are becoming the significant targets of cyber attack. We propose an efficient key management scheme which is established on ID-based cryptosystem without an expensive computation on MTU (Master Terminal Unit), Sub-MTU, and RTU (Remote Terminal Unit). The proposed method is secure and effective in key management among multiple legitimate devices.

mVDI : A New Paradigm Shift for Mobile Cloud

  • 뉴엔 티엔 융;후인 콩 틴;허의남
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2013년도 춘계학술발표대회
    • /
    • pp.175-178
    • /
    • 2013
  • Mobile Virtual Desktop Infrastructures (mVDI) are gaining popularity in cloud computing by allowing mobile devices to execute their mobile applications in a cloud server instead of relying on physical mobile devices. Consolidating many users into mVDI environment can significantly lower IT management expenses and enables new features such as "available-anywhere" desktops. However, there are many barriers to broad adoption including the slow performance of virtualized I/O, CPU scheduling interference problems. In this paper, we will discuss about mVDI with the current issues, the corresponding solutions and challenges.

이동 멀티캐스트에서 기밀성을 제공하기 위한 키관리 방법 (Key Management Scheme for Providing the Confidentiality in Mobile Multicast)

  • 노종혁;진승헌;이균하
    • 정보보호학회논문지
    • /
    • 제16권1호
    • /
    • pp.97-104
    • /
    • 2006
  • 이동 멀티캐스트 환경에서 다수의 이동 호스트가 안전하고 효율적인 멀티캐스트를 실현하기 위해서는 호스트의 이동성 및 무선 영역의 특성을 반영하는 키관리 방법이 요구된다. 본 논문에서는 이동 네트워크 구조를 반영한 KTMM 과 WSMM을 제안한다. 호스트의 이동에 따른 핸드오프와 그룹 멤버쉽 변화로 인한 키갱신을 처리하는 키 관리 구조 및 프로토콜을 설명하고, 실험을 통하여 데이터 전송, 멤버의 가입, 멤버의 탈퇴, 핸드오프 등으로 인해 발생하는 지연 시간을 서로 비교하여 각 방법의 장단점을 분석한다.