• Title/Summary/Keyword: Internal Network Information

Search Result 506, Processing Time 0.027 seconds

Characteristics of the Social Innovation Cluster Formation in Seongdong-gu and Eunpyeong-gu, Seoul, Korea (서울 성동구와 은평구의 사회혁신클러스터 형성 특성)

  • Roh, Kyeongran;Choo, Sungjae
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.22 no.2
    • /
    • pp.214-235
    • /
    • 2019
  • This study adopts the concept of social innovation cluster in which social economy organizations as one of the emerging axes of economic systems operate in collaboration with government agencies, investment institutions, intermediate supporting organizations and non-profit organizations, and investigates how the clusters of this kind grow in the context of the Korean socio-economic situation for the cases of Seongdong-gu and Eunpyeong-gu in Seoul, Korea. For this purpose, it has identified the actors of the clusters and their internal relations, and analyzed the process of cluster formation. A social network analysis of the partnerships between the actors has shown that Seongdong-gu has more diversified types of the network participation of universities, global networks and investment institutions than Eunpyeong-gu. It is interpreted that this pattern has resulted from the domination of private organizations in the former area, which is also confirmed by in-depth interviews with persons involved in the clusters. Although the facets of social innovation clusters are manifested in both areas, even in their initial stage, such factors as linkages between industrial actors and convergence with other clusters, which appear in the maturing stage of cluster formation, has yet to be found. It is suggested that the sustainable growth of social innovation clusters should be accompanied by information sharing and cooperation between the two areas on the future orientation of development.

Social Network Analysis of Long-term Standby Demand for Special Transportation (특별교통수단 장기대기수요에 대한 사회 연결망 분석)

  • Park, So-Yeon;Jin, Min-Ha;Kang, Won-Sik;Park, Dae-Yeong;Kim, Keun-Wook
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.93-103
    • /
    • 2021
  • The special means of transportation introduced to improve the mobility of the transportation vulnerable met the number of legal standards in 2016, but lack of development in terms of quality, such as the existence of long waiting times. In order to streamline the operation of special means of transportation, long-term standby traffic, which is the top 25% of the wait time, was extracted from the Daegu Metropolitan Government's special transportation history data, and spatial autocorrelation analysis and social network analysis were conducted. As a result of the analysis, the correlation between the average waiting time of special transportation users and the space was high. As a result of the analysis of internal degree centrality, the peak time zone is mainly visited by general hospitals, while the off-peak time zone shows high long-term waiting demand for visits by lawmakers. The analysis of external degree centrality showed that residential-based traffic demand was high in both peak and off-peak hours. The results of this study are considered to contribute to the improvement of the quality of the operation of special transportation means, and the academic implications and limitations of the study are also presented.

The Role of Innovative Activities in Training Students Using Computer Technologies

  • Minenok, Antonina;Donets, Ihor;Telychko, Tetiana;Hud, Hanna;Smoliak, Pavlo;Kurchatova, Angelika;Kuchai, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.105-112
    • /
    • 2022
  • Innovation is considered as an implemented innovation in education - in the content, methods, techniques and forms of educational activity and personality education (methods, technologies), in the content and forms of organizing the management of the educational system, as well as in the organizational structure of educational institutions, in the means of training and education and in approaches to social services in education, distance and multimedia learning, which significantly increases the quality, efficiency and effectiveness of the educational process. The classification of currently known pedagogical technologies that are most often used in practice is shown. The basis of the innovative activity of a modern teacher is the formation of an innovative program-methodical complex in the discipline. Along with programmatic and content provision of disciplines, the use of informational tools and their didactic properties comes first. It combines technical capabilities - computer and video technology with live communication between the lecturer and the audience. In pedagogical innovation, the principles reflecting specific laws and regularities of the implementation of innovative processes are singled out. All principles are elements of a complex system of organization and management of innovative activities in the field of education and training. They closely interact with each other, which enhances the effect of each of them due to the synergistic effect. To improve innovative activities in the training of students, today computer technologies are widely used in pedagogy as a science, as well as directly in the practice of the pedagogical process. They have gained the most popularity in such activities as distance learning, online learning, assistance in the education management system, development of programs and virtual textbooks in various subjects, searching for information on the network for the educational process, computer testing of students' knowledge, creation of electronic libraries, formation of a unified scientific electronic environment, publication of virtual magazines and newspapers on pedagogical topics, teleconferences, expansion of international cooperation in the field of Internet education. The article considers computer technologies as the main building material for the entire society. In the modern world, there is a need to prepare a person for life in a multimedia environment. This process should be started as early as possible, because the child's contact with the media is present almost from the moment of his birth.

LNG Gas Demand Forecasting in Incheon Port based on Data: Comparing Time Series Analysis and Artificial Neural Network (데이터 기반 인천항 LNG 수요예측 모형 개발: 시계열분석 및 인공신경망 모형 비교연구)

  • Beom-Soo Kim;Kwang-Sup Shin
    • The Journal of Bigdata
    • /
    • v.8 no.2
    • /
    • pp.165-175
    • /
    • 2023
  • LNG is a representative imported cargo at Incheon Port and has a relatively high contribution to the increase/decrease in overall cargo volume at Incheon Port. In addition, in the view point of nationwide, LNG is the one of the most important key resource to supply the gas and generate electricity. Thus, it is very essential to identify the factors that have impact on the demand fluctuation and build the appropriate forecasting model, which present the basic information to make balance between supply and demand of LNG and establish the plan for power generation. In this study, different to previous research based on macroscopic annual data, the weekly demand of LNG is converted from the cargo volume unloaded by LNG carriers. We have identified the periodicity and correlations among internal and external factors of demand variability. We have identified the input factors for predicting the LNG demand such as seasonality of weekly cargo volume, the peak power demand, and the reserved capacity of power supply. In addition, in order to predict LNG demand, considering the characteristics of the data, time series prediction with weekly LNG cargo volume as a dependent variable and prediction through an artificial neural network model were made, the suitability of the predictions was verified, and the optimal model was established through error comparison between performance and estimates.

Research of generate a test case to verify the possibility of external threat of the automotive ECU (차량 ECU의 외부 위협성 가능성을 검증하기 위한 테스트 케이스 생성 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.21-31
    • /
    • 2013
  • ECU(Electric Control Unit) on the important features of the vehicle is equipped, ECU between sending and receiving messages is connected to one of the internal network(CAN BUS), but this network easily accessible from the outside and not intended to be able to receive attacks from an attacker, In this regard, the development of tools that can be used in order to verify the possibility of attacks on attacks from outside, However, the time costs incurred for developing tools and time to analyze from actual car for CAN messages to be used in the attack to find. In this paper, we want to solve it, propose a method to generate test cases required for the attack is publicly available tool called Sulley and it explains how to find the CAN messages to be used in the attack. Sulley add the CAN messages data generated library files in provided library file and than Sulley execute that make define and execute file conform to the CAN communication preferences and create message rules. Experiments performed by the proposed methodology is applied to the actual car and result, test cases generated by the CAN messages fuzzing through Sulley send in the car and as a result without a separate tool developed was operating the car.

The Status of e-Business in Korea Forest Product Industries (한국목재산업에 있어 e-Business의 활용)

  • Kim, Se-Bin;Kwak, Kyung-Ho
    • Korean Journal of Agricultural Science
    • /
    • v.30 no.1
    • /
    • pp.20-30
    • /
    • 2003
  • This study was carried out to examine the e-Business status of Korea Forest Product Industries and to propose the development. The use level of e-Business in korea forest product industries have stayed in internal company information network integration stages. But lots of companies located in the insufficient of e-Business models, the lack of qualified staffs, and the shortage of e-Business operating technology and implementation. As the result of this study, the followings must be considered; 1. For the promotion of e-Business use, it is needed to maintain price competitiveness, quality competitiveness, and market correspondence capacity. 2. For the settlement of e-Business models, it is important to connect information network among cooperation companies as like forest products standardize, common database, and standard electronic catalogue. Also, it needed developing program to strengthen the competitiveness of forest product industries, expanding to outsourcing and affiliated companies.

  • PDF

Implementation of Secure System for Blockchain-based Smart Meter Aggregation (블록체인 기반 스마트 미터 집계 보안 시스템 구축)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.1-11
    • /
    • 2020
  • As an important basic building block of the smart grid environment, smart meter provides real-time electricity consumption information to the utility. However, ensuring information security and privacy in the smart meter data aggregation process is a non-trivial task. Even though the secure data aggregation for the smart meter has been a lot of attention from both academic and industry researchers in recent years, most of these studies are not secure against internal attackers or cannot provide data integrity. Besides, their computation costs are not satisfactory because the bilinear pairing operation or the hash-to-point operation is performed at the smart meter system. Recently, blockchains or distributed ledgers are an emerging technology that has drawn considerable interest from energy supply firms, startups, technology developers, financial institutions, national governments and the academic community. In particular, blockchains are identified as having the potential to bring significant benefits and innovation for the electricity consumption network. This study suggests a distributed, privacy-preserving, and simple secure smart meter data aggregation system, backed up by Blockchain technology. Smart meter data are aggregated and verified by a hierarchical Merkle tree, in which the consensus protocol is supported by the practical Byzantine fault tolerance algorithm.

DDoS Attack Analysis Using the Improved ATMSim (개선된 ATMSim을 이용한 DDoS 공격 분석)

  • Jeong, Hae-Duck J.;Ryu, Myeong-Un;Ji, Min-Jun;Cho, You-Been;Ye, Sang-Kug;Lee, Jong-Suk R.
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.19-28
    • /
    • 2016
  • Internet traffic has been significantly increasing due to the development of information and communication networks and the growing numbers of cell phone users that access networks. This paper connects to this issue by presenting a way to detect and analyze a typical DDoS attack that results in Internet breaches and network attacks, which are on the increase. To achieve this goal, we improve features and GUI of the existing ATMSim analysis package and use it. This package operates on a network flow-based analysis method, which means that normal traffic collected through an internal LAN at the Korean Bible University campus as well as anomaly traffic with DDoS attacks are generated. Self-similarity processes are used to analyze normal and anomaly traffic that are collected and generated from the improved ATMSim. Our numerical results obtained from three Hurst parameter estimate techniques show that there is quantitatively a significant difference between normal traffic and anomaly traffic from a self-similarity perspective.

An Analysis on the Impact of Information Technology Usage on the Social Capital and Innovation Performance in an Industrial Cluster: Based on the PanGyo Technovalley (정보기술 활용이 사회적 자본과 산업 클러스터 혁신성과에 미치는 영향 분석: 판교 테크노벨리를 중심으로)

  • Yeonsoon Kim;Seonyoung Shim
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.43-62
    • /
    • 2017
  • This study investigates the effect of bonding and bridging social capital on the technological innovation performance in the Pangyo Techno Valley. In particular, we consider the information technology (IT) usage in industrial cluster as an antecedent of social capital. IT instigates the intra and extra communication and information sharing between employees, thereby promoting the formation of a network of various members. Results show that the IT usage factor positively affects both bridging and bonding social capital, but an evident difference exists among the effects of social capital on the technological innovation performance. In case of Pangyo industrial cluster, bridging social capital exerts significant effect on the technological innovation performance, whereas bonding social capital shows insignificance. Bridging social capital is composed of the interactions of various networks. Bonding social capital is based on the strong tie from trust and internal cooperation. Results are related with the characteristics of Pangyo Techno Valley, where various IT ventures need active communication and information sharing with other organizations for technological innovation performance.

An Implementation Method of HB-Family Light-weight Authentication for Device Authentication between ECU (ECU간 기기인증을 위한 HB-Family 경량인증기법의 적용 방법)

  • Kim, Tae Su;Kim, Hyoseung;Woo, Samuel;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.593-607
    • /
    • 2013
  • The In-Vehicle-Networking(IVN) of modern cars is constituted by an small electronic control device called ECU. In the past, there was no way to be able to access the IVN of a driving car. so IVN has been recognized as a closed environment so there is no need to exist authentication protocol between devices which are to configure the internal network and to communicate with other devices. However, constant improvements made it possible to access the IVN in many different ways as the communication technology evolves. This possibility created a need for device authentication in IVN. HB-Family are representative authentication schemes in RFID environment which has similar restrictions to IVN. In this paper, we propose an implementation method of HB-Family for device authentication between ECU considering ECU has low computing power and the message field of CAN protocol has restricted size of 8 bytes. In order to evaluate the efficiency and availability of the authentication schemes adopted our method, we have evaluated the performance based on DSP-28335 device. Further, it was possible to improve the efficiency rate of at lest 10%, up to 36%, and we then analyze this result in various aspects of the IVN.