• Title/Summary/Keyword: Network Operation

Search Result 3,322, Processing Time 0.034 seconds

A study on the Enhancement of Transshipment Competitiveness of Busan Port by Analyzing Factors Affecting Transshipment Competitiveness

  • Park, Ho-Chul
    • Journal of Navigation and Port Research
    • /
    • v.45 no.5
    • /
    • pp.238-251
    • /
    • 2021
  • It is understood that carriers evaluate several features of ports when fixing the T/S port. Those features can be enumerated as Geographic condition of port, Service network with overseas ports, Level of port productivity, Port infrastructure, Port services level, Port Authority's Policy direction mand Cost competitiveness. The objectives of this study are to: 1) determine if those factors could affect the T/S competitiveness of the port; and 2) to evaluate how Busan port conforms to those determinants factors in such extent. According to results of the analysis after surveying National global carrier, Intra-Asia carriers, Global overseas carriers, Terminal operators, and Busan Port Authority known to be highly influential samples, all factors were proven to be factors affecting the T/S competitiveness of the port. Meanwhile, in the analysis through AHP (Analytic Hierarchy Process) methodology about the order of weight among those factors, Cost competitiveness was answered as the most important factor. On the other hand, in the analysis to find the situation if Busan port conforms to those factors, Busan port was proven to satisfy those conditions to a moderate extent. In the analysis about the order of strength among those factors, Busan port was answered to have the highest strength in the geographic condition. However, it showed the bottom level of strength in the Cost competitiveness which was answered as the most important factor among samples for determining the T/S competitiveness of the port. This indicates that Government and Port Authority of Busan have to concentrate policy capabilities on the improvement of cost competitiveness of Busan port to enhance the T/S competitiveness. In this paper, four policy recommendations are given : Integration of Busan port operation into New port, Combining multiple operators into one or a few, Attracting Global mega carriers as the New port terminal operators, and Continuous Infrastructure expansion.

A Study on the Public Relations of University Libraries using Instagram (인스타그램을 활용한 대학도서관 홍보에 관한 연구)

  • So, Haeun;Cha, Mikyeong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.67-91
    • /
    • 2021
  • The purposes of this study is to identify the perception of students' use of university libraries' public relations activities using Instagram and propose ways to improve the operation of university libraries' Instagram. To this end, the status of Instagram operations of domestic and foreign university libraries was investigated, and a survey was conducted on 292 students who used the library Instagram of their universities. Based on the research results, first, it is necessary to promote the use of libraries by using 'Library Events' information closely related to the use of Instagram by students, but planning ways to participate that can lead to practical use of libraries. Second, it is necessary to promote the role of librarians through Instagram and utilize daily communication information in order to positively affect library image recognition. Third, it is necessary to guide users on how to inquire on library Instagram and actively respond to communication with users through periodic post uploads and monitoring.

Design and Verification Standard for Safety and Cybersecurity of Autonomous Cars: ISO/TR 4804 (자율주행자동차의 안전 및 보안을 위한 설계 및 검증 표준: ISO/TR 4804)

  • Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.25 no.3
    • /
    • pp.571-577
    • /
    • 2021
  • This paper describes ISO/TR 4804, an international standard to describe how to design and verify autonomous cars to ensure safety and cybersecurity. Goals of ISO/TR 4804 are (1) positive risk balance and (2) avoidance of unreasonable risk. It also 12 principles of safety and cybersecurity to achieve these goals. In the design procedures, it describes (1) 13 capabilities to achieve these safety and cybersecurity principles, (2) hardware and software elements to achieve these capabilities, and (3) a generic logical architecture to combine these elements. In the verification procedures, it describes (1) 5 challenges to ensure safety and cybersecurity, (2) test goals, platforms, and solutions to achieve these challenges, (3) simulation and field operation methods, and (4) verification methods for hardware and software elements. Especially, it regards deep neural network as a software component and it describe design and verification methods of autonomous cars.

An Approach of Hiding Hangul Secret Message in Image using XNOR-XOR and Fibonacci Technique (XNOR-XOR과 피보나치 기법을 이용하여 이미지에서 한글 비밀 메시 지를 은닉하는 방법)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.109-114
    • /
    • 2021
  • As various users increase in a network environment, it is difficult to protect sensitive and confidential information transmitted and received from attackers. Concealing bitwise secret data in an image using the LSB technique can be very vulnerable to attack. To solve this problem, a hybrid method that combines encryption and information hiding is used. Therefore, an effective method for users to securely protect secret messages and implement secret communication is required. A new approach is needed to improve security and imperceptibility to ensure image quality. In this paper, I propose an LSB steganography technique that hides Hangul messages in a cover image based on MSB and LSB. At this time, after separating Hangul into chosung, jungsung and jongsung, the secret message is applied with Exclusive-OR or Exclusive-NOR operation depending on the selected MSB. In addition, the calculated secret data is hidden in the LSB n bits of the cover image converted by Fibonacci technique. PSNR was used to confirm the effectiveness of the applied results. It was confirmed 41.517(dB) which is suitable as an acceptable result.

An Empirical Study on the management Strategies of Korean Firms corresponding with the Political Environment in local Brazil : Focusing on the Analysis of Structural Equation Modeling (한국 기업의 브라질 현지 정치적 환경에 대응하는 경영전략에 관한 연구)

  • Kim, Chul
    • International Area Studies Review
    • /
    • v.14 no.3
    • /
    • pp.131-154
    • /
    • 2010
  • This study tries to analyze what the most significant factors are in Brazil, where the Korean investing firms have to overcome and adapt to various difficulties, especially in terms of political environment. This main purpose of this research is to test empirically some relations of between the managing strategy of Korean firms and the environment factors of politics in Brazil while this is conducted in two stages. First, the research model is designed by reviewing relevant theories, previous studies, and the current investment conditions in local Brazil. Second, the survey of Korean firms engaged in investment activities in there is done by collecting questionnaires from them. with this survey, the strategic method of multiple regression is used to testing some hypotheses. At the result of Analysis, It is proved there haven been negative affecting political factors of law/regulation system and administrative operation service, and Korean firms have implementing the responding management strategies with reasonable adaptation to risks and human network reinforcement.

Quantitative Analysis of Workload for Classifying the Operating Area of Distribution Control Center (배전관제센터의 운전영역 구분을 위한 정량적 업무량 분석)

  • Go, Seok-Il;Seo, Dong-Kwen;Choi, Joon-Ho;Ahn, Seon-Ju;Kim, Hyun-Woo;Yun, Sang-Yun
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.67 no.4
    • /
    • pp.200-207
    • /
    • 2018
  • In recent, KEPCO (Korea Electric Power Corporation) faced difficulties of the DCC (distribution control center) due to the increase of field equipment and operational cost, and aging of operating staffs. In response to these changes in the DCC, KEPCO is trying to change the organization and system of the DCC. In this paper, we present a new attempt to change organization and structure of distribution control center, which was implemented by KEPCO recently. This paper is divided into three major parts. First, to examine the adequacy of the divided basis of current DCCs based on the quantity of installed electrical equipment, we analyzed the correlation between the operational history of the DCCs and the number of equipment. Through the analysis, we confirmed that there is little relationship between the number of equipment and actual workload. Second, we conducted visits and questionnaire surveys of all the DCCs to identify factors affecting the actual workload of distribution operators and then summarized the results. Third, based on this survey, a general formula for analyzing the workload of a DCC was derived, and each DCC's average annual total workload, day/night workload, and required number of personnel were calculated. Through this study, we proposed a more realistic management method of DCCs that can overcome the division criteria based on equipment quantity.

An Analysis of the Social Image of Library: Focused on the Analysis of Newspaper Articles (도서관에 대한 사회적 이미지 분석 연구 - 신문기사분석을 중심으로 -)

  • Kim, Ji-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.49 no.4
    • /
    • pp.219-236
    • /
    • 2018
  • This study investigated the image of library in our society by analyzing newspaper articles related to libraries. A total of 3065 newspaper articles reported in Kyunghyang, Hankyoreh, Chosun, and Joongang from 2000 to 2017 were analyzed using time series analysis. The results of the time series analysis showed the number of newspaper articles related to library declined to a peak in 2009. Also, there were differences in the content of newspaper articles by year except for those content related to books. There were many articles about 'information' and 'use' in early 2000, about 'library operation and opening', 'culture' from 2006, and about 'residents of the area', 'culture' after 2012. These content of newspaper articles may reflects the image of library in our society. Finally, this study dis cussed practical ways of public library promotion.

Draft Design of AI Services through Concept Extension of Connected Data Architecture (Connected Data Architecture 개념의 확장을 통한 AI 서비스 초안 설계)

  • Cha, ByungRae;Park, Sun;Oh, Su-Yeol;Kim, JongWon
    • Smart Media Journal
    • /
    • v.7 no.4
    • /
    • pp.30-36
    • /
    • 2018
  • Single domain model like DataLake framework is in spotlight because it can improve data efficiency and process data smarter in big data environment, where large scaled business system generates huge amount of data. In particular, efficient operation of network, storage, and computing resources in logical single domain model is very important for physically partitioned multi-site data process. Based on the advantages of Data Lake framework, we define and extend the concept of Connected Data Architecture and functions of DataLake framework for integrating multiple sites in various domains and managing the lifecycle of data. Also, we propose the design of CDA-based AI service and utilization scenarios in various application domain.

Oversea IP Ranges Blocking for Security Enhancement of Critical Infrastructures with Cyber Threats Analysis in Electric Industry (전력분야 사이버 위협 분석 및 기반시설 보안 강화를 위한 해외 IP 대역 차단 방안 연구)

  • Han, Choong-Hee;Park, Soon-Tai;Lee, Sang-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.401-415
    • /
    • 2019
  • Recently, there has been a lot of studies and efforts to strengthen the stability of critical infrastructures against increasing cyber attacks to critical infrastructures. In this thesis, I defined what cyber threats are, after showing you various definitions about what cyber threats are and what the types are. After studying about significant cyber threats from China, I showed you the realities of cyber threats with the analysis about starting points, types of cyber threats, ratios of attacks and so on. At last, I defined guidelines about unnecessary oversea IP range blocking. Also, I proposed unnecessary oversea IP range blocking methodologies with per information system and per network system. Furthermore, I proposed blocking characteristics per security equipment and security operation improvement and blocking effects and service process to normal oversea users.

A Scheme of User Face Recognition using a Moire Phenomenon in IoT Environment (IoT환경에서 무아레 현상을 이용한 사용자 얼굴 인증 기법)

  • Cho, Ik-Hyun;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.171-176
    • /
    • 2019
  • In modern times, many IoT products are being used as all things and devices are connected to the Internet and IoT products become easily accessible through the network. For the convenience of users, IoT products can be remotely operated automatically without manual operation. Various research and development are underway to improve the convenience of users by using IoT products. However, since only the convenience of the users is pursued, in terms of security, there is a serious problem that exposes the user's personal information. This paper has proposed a method to apply $moir{\acute{e}}$ technology to IoT products in order to improve the performance of security, and a method to increase the safety of IoT products using user face authentication based on shadow $moir{\acute{e}}$ as a $moir{\acute{e}}$ phenomenon method, and the projection $moir{\acute{e}}$. When comparing the existing IoT products and IoT products applied with $moir{\acute{e}}$ technology, IoT products applied with $moir{\acute{e}}$ technology are safer in terms of security.