• Title/Summary/Keyword: Network Operation

Search Result 3,322, Processing Time 0.03 seconds

A Study on Developing Guidelines for Specialized Public Library (특화도서관 운영 가이드라인 개발에 관한 연구)

  • Noh, Younghee;Jeong, Dae-Keun;Kim, Mi-Yeon;Lee, Yong-Mi
    • Journal of Korean Library and Information Science Society
    • /
    • v.49 no.4
    • /
    • pp.119-145
    • /
    • 2018
  • The purpose of this study is to select a specialized topic that meets the needs of the local contents and the local people, based on this, the study develops practical guidelines for operating specialized libraries. For this purpose, forty-three libraries in domestic and foreign were selected to derive their implications by surveying the specialized libraries building process, regional characteristics, specialized books, budget, personnel, network, facilities, environment, programs, and publicity. Based on the suggestions reached, we proposed four stages of operation guidelines: the preparation stage for establishing a system to support specialized services and selecting regional specific topics, the stage for the establishment of the library environment in order to serve the selected specialized subjects, the operational stage of planning and providing information complex cultural services related to specialized subjects, and the diffusion stage that communicates with external institutions of the library for upgrading and expanding services.

Identification of Strategic Fields for Developing Smart City in Busan Using Text Mining (텍스트 마이닝을 이용한 스마트 도시계획 수립을 위한 전략분야 도출연구: 부산 사례를 바탕으로)

  • Chae, Yoonsik;Lee, Sanghoon
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.1-15
    • /
    • 2018
  • The purpose of this study is to analyze bibliographic information of Busan and other cities' reports for urban development initiative and identify the strategic fields for future smart city plan. Text mining method is used in this study to extract keywords and identify the characteristics and patterns of information in urban development reports. As a result, in earlier stage, Busan city focused on service creation for industrial development but there are lack of discussions on the linkage of information systems with ICT technology. However, recent urban planning in Busan contained various contents related to integrated connections of infrastructure, ICT system, and operation management of city in the specific fields of traffic, tourism, welfare, port/logistics, culture/MICE. This results of study is expected to provide policy implications for planning the future urban initiatives of smart city development.

AMI System Using Smart Electricity Meter Embedded with Home Concentrate Unit (세대집중화장치를 포함하는 스마트 전력량계를 이용한 AMI 시스템)

  • Park, Jae-Sam
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.3
    • /
    • pp.537-546
    • /
    • 2019
  • In this paper, a system that integrates a home concentrate unit(HCU) in a smart electricity meter to collects water, gas, hot water, and heating usage required for AMI has been proposed. The collected data could be transmitted to the in house display(IHD) and server to provide a more economical AMI system. The developed system is less expensive in the network configuration than the existing system, which could reduce the operating cost, and be easy to install. By applying the developed system, the usage of electricity, water, gas, hot water and heating could be measured and these make it easier to apply AMI system. The main contents of the development are the smart electricity meter and embedding of HCU into the smart electricity meter, and transferring these data to IHD and server to structure the AMI system. The each developed unit has been networked to structure the AMI system to perform the actual meter reading operation and show the result.

A Tabu Search Algorithm for Node Reprogramming in Wireless Sensor Networks (무선 센서 네트워크에서 노드 재프로그래밍을 위한 타부 서치 알고리즘)

  • Jang, Kil-woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.596-603
    • /
    • 2019
  • A reprogramming operation is necessary to update the software code of the node to change or update the functionality of the deployed node in wireless sensor networks. This paper proposes an optimization algorithm that minimizes the transmission energy of a node for the purpose of reprogramming a node in wireless sensor networks. We also design an algorithm that keeps energy consumption of all nodes balanced in order to maintain the lifetime of the network. In this paper, we propose a Tabu search algorithm with a new neighborhood generation method for minimizing transmission energy and energy consumption in wireless sensor networks with many nodes. The proposed algorithm is designed to obtain optimal results within a reasonable execution time. The performance of the proposed Tabu search algorithm was evaluated in terms of the node's transmission energy, remaining energy, and algorithm execution time. The performance evaluation results showed better performance than the previous methods.

PCB Pattern Antenna of 920 MHz Band for Marine IoT Services (해양 IoT 서비스를 위한 920 MHz 대역의 PCB 패턴 안테나)

  • Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.5
    • /
    • pp.430-436
    • /
    • 2019
  • It is needed to develop an antenna with features of subminiature, light weight and multi-band operation for the variaty services in maritime and industrial fields. The PCB pattern antenna is one of the appropreiate antennas solving these requirements. In this research, the design and fabrication of the PCB pattern antenna operating on the single band of 920 MHz are investigated. The final goal is that the development of the dual band PCB pattern antenna operating on 260 MHz and 920 MHz, which is based on the proposed antenna. It is evident that the performance in the frequencies of 902 MHz, 915 MHz and 928 MHz among of 920 MHz ISM band is better than that in other frequencies. It is also confirmed that the differences of the voltage standing wave ratio, return loss, gain and efficiency between three frequencies are less than 5%. It is expected that the development of communication link of 5-10 km is possible when the induced results are applied into the low power wide area (LPWA) network desinged by the rule of -30 dB sensitivity.

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks

  • Phuc, Tran Song Dat;Shin, Yong-Hyeon;Lee, Changhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2148-2167
    • /
    • 2021
  • The proliferation of the Internet of Things (IoT) technologies and applications, especially the rapid rise in the use of mobile devices, from individuals to organizations, has led to the fundamental role of secure wireless networks in all aspects of services that presented with many opportunities and challenges. To ensure the CIA (confidentiality, integrity and accessibility) security model of the networks security and high efficiency of performance results in various resource-constrained applications and environments of the IoT platform, DDO-(data-driven operation) based constructions have been introduced as a primitive design that meet the demand of high speed encryption systems. Among of them, the TMN-family ciphers which were proposed by Tuan P.M., Do Thi B., etc., in 2016, are entirely suitable approaches for various communication applications of wireless mobile networks (WMNs) and advanced wireless sensor networks (WSNs) with high flexibility, applicability and mobility shown in two different algorithm selections, TMN64 and TMN128. The two ciphers provide strong security against known cryptanalysis, such as linear attacks and differential attacks. In this study, we demonstrate new probability results on the security of the two TMN construction versions - TMN64 and TMN128, by proposing efficient related-key recovery attacks. The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12-rounds, respectively. Hence, the amplified boomerang attacks can be applied to break these two ciphers with appropriate complexity of data and time consumptions. The work is expected to be extended and improved with the latest BCT technique for better cryptanalytic results in further research.

Exploring the Direction of School Library Assessment (학교도서관 평가의 방향성 탐구)

  • Lee, Jee Yeon;Lee, Yeon Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.2
    • /
    • pp.227-261
    • /
    • 2021
  • This study aims to analyze the current status of school library assessment and generate discussion points for the development directions of the assessment. Surveys, consulting, and evaluations related to school libraries conducted by the Office of Education, the Ministry of Education, the Ministry of Culture, Sports and Tourism were analyzed using meta-evaluations and in-depth interviews with the school librarians. The analysis revealed problems such as duplication of evaluation by various institutions, no reflection of the national school library development plan, low participation rate due to voluntary nature of the assessment, and lack of the educational evaluation index. The solution to the problem was a school libraries' operation evaluation improvement plan. The plan included the legal evaluation agent specification, the national school library development plan incorporation, inter-agency evaluation network & the case sharing system establishment, and the Office of Education's investigation and consulting cooperation.

Efficient and Secure User Authentication and Key Agreement In SIP Networks (효율적이고 안전한 SIP 사용자 인증 및 키 교환)

  • Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.73-82
    • /
    • 2009
  • This paper proposes an efficient and secure user authentication and key agreement scheme instead of the HTTP digest and TLS between the SIP UA and server. Although a number of security schemes for authentication and key exchange in SIP network are proposed, they still suffer from heavy computation overhead on the UA's side. The proposed scheme uses the HTIP Digest authentication and employs the Diffie-Hellman algorithm to protect user password against dictionary attacks. For a resource-constrained SIP UA, the proposed scheme delegates cryptographically computational operations like an exponentiation operation to the SIP server so that it is more efficient than the existing schemes in terms of energy consumption on the UA. Furthermore, it allows the proposed scheme to be easily applied to the deployed SIP networks since it does not require major modification to the signaling path associated with current SIP standard.

Single Sing-On System enabling Mutual Authentication in Multi Domain Environments (다중 도메인 환경에서 상호 인증이 가능한 단일 인증 시스템)

  • 손태식;서정택;윤혁중;이철원;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.3-16
    • /
    • 2001
  • With the development of Internet, it is widely spreaded to a Intranet based on Internet technology. Intranet is a private, unique network to share the information of organization such as incorporate, research institute and university. With the increase of Intranet using, Intranet environment is developing into Extranet environment which is connected many Intranet. Currently such Intranet and Extranet environments, above all, it is important to solve security problems which can appear through use of information between domains. Thus, in this paper, we propose SSO(Single Sign-on System) model with authorization management and single sign-on operation, and we extend it to enable mutual authentication through inter-working based on PKI(Public Key Infrastructure) in Extranet environments.

A Study on the Security analysis and Applications of Standard Key agreement protocols based on Elliptic curve cryptosystem (타원 곡선에 기반한 표준 키 분배 프로토콜의 안전성 분석 및 응용 분야에 관한 연구)

  • 오수현;이승우;심경아;양형규;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.103-118
    • /
    • 2002
  • To provide the privacy of transmitted message over network the use of cryptographic system is increasing gradually. Because the security and reliability of the cryptographic system is totally rely on the key, the key management is the most important part of the cryptographic system. Although there are a lot of security products providing encryption, the security of the key exchange protocols used in the product are not mostly proved yet. Therefore, we have to study properties and operation of key agreement protocols based on elliptic curve in ANSI X9.63. furthermore, we analyze the security of their protocols under passive and active attacker models and propose the most suitable application field taking the feature of the protocols into account.