• Title/Summary/Keyword: Network Operation

Search Result 3,322, Processing Time 0.033 seconds

Understanding of OT-OCN(Operation Technology - Operation Contents Network) (OT-OCN 기술의 이해)

  • Park, Jae-Kyung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.303-304
    • /
    • 2016
  • 본 논문에서는 기존의 TCP/IP 체계에서 탈피하여 보안 및 성능을 개선하기 위한 방안으로 콘텐트를 기반으로 한 네트워크 체계에 대해서 소개한다. OT-OCN은 기존의 CCN(Contents Centric Network)을 기반으로 컨텐츠의 기능을 추가하여 이를 바탕으로 자율성을 부여한 새로운 개념의 패러다임이다. 이러한 OT-OCN의 개발사는 미국의 CAT, Inc.(Cyber Advanced Technology)라는 회사로 이 기술은 보안뿐만 아니라 CCN을 통한 통신의 효율성을 극대화하고 또한 사물인터넷(IoT) 등에 활용 가능한 최적의 메커니즘이다. 본 논문에서는 이 기술의 기본적인 매커니즘에 대한 간략한 소개를 통해 차세대보안의 개념을 설명하고자 한다.

  • PDF

An Analysis of Container Port Efficiency in ASEAN

  • Seo, Young-Joon;Ryoo, Dong-Keun;Aye, Myo-Nyein
    • Journal of Navigation and Port Research
    • /
    • v.36 no.7
    • /
    • pp.535-544
    • /
    • 2012
  • In order to improve the overall ASEAN maritime transport network, each port's efficiency is regarded as a crucial factor that should be calculated periodically. This study evaluated the relative efficiency of container port operations of 32 ports belonging to 9 ASEAN nations using Data Envelopment Analysis (DEA). It found that 2 out of 32 ports in 2010 were measured as efficient ports. This study yielded two major findings. Firstly, the ports assessed as inefficient need to benchmark similar ports in size and structure from the ports that are assessed as efficient to improve their efficiency. Secondly, these results could be used to determine potential candidates and country for an international port development co-operation programme with Korea to improve the performance of the entire ASEAN port network by developing the infrastructures of ill-equipped ports.

Design Strategy of Low-Power Node by Analyzing the Hardware Modules in Surveillance and Reconnaissance Sensor Networks (감시정찰 센서네트워크에서 하드웨어 모듈의 소모전력 분석을 통한 저전력 노드 설계 전략)

  • Kim, Yong-Hyun;Yeo, Myung-Ho;Chung, Kwangsue
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.6
    • /
    • pp.761-769
    • /
    • 2012
  • In this paper, we propose a low-power design strategy to minimize energy-consumption for surveillance and reconnaissance sensor networks. The sensor network consists of many different nodes with various operations such as target detection, packet relay, video monitoring, changing protocols, and etc. Each sensor node consists of sensing, computing, communication, and power components. These components are integrated on a single or multiple boards. Therefore, the power consumption of each component can be different on various operation types. First, we identified the list of components and measured power consumption for them from the first prototype nodes. Next, we focus on which components are the main sources of energy consumption. We propose many energy-efficient approaches to reduce energy consumption for each operation type.

An Islanding Detection Method for Distributed Generations Using the Voltage Unbalance (전압 불평형율을 이용한 분산전원의 고립운전 검출 기법)

  • Jang S. I.;Park J. K.;Kim K. H.
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.42-44
    • /
    • 2004
  • This paper introduced and proposed the voltage unbalance of DC terminal output as new monitoring parameter for power islanding detection. This paper also presented a simple and novel detection algorithm, which effectively combines the detection results of the conventional parameter, voltage magnitude, and a newly proposed parameter. We tested the proposed method using several distribution network conditions including not only islanding operation conditions, but also non-islanding conditions of normal network load variations. The test results showed that the proposed parameters and algorithm are capable of correctly detecting the islanding operation not affected by variation of DG loading and also have a good selectivity for islanding conditions and non-islanding conditions.

  • PDF

Peer Network Based Shopping Mall Supporting platform with Metaverse Technique

  • Kim, Sea Woo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.222-229
    • /
    • 2022
  • Through this technology development, companies that operate online shopping malls and prospective startups will support education, consulting and expert group matching so that they can solve various issues that may arise in the course of the entire business life cycle, from startups to closures. It is expected that differentiated consulting programs will be designed for companies that currently operate shopping malls and start ups, and customized consulting programs will be provided to improve the effectiveness of consulting while improving customer satisfaction. It is planning to develop a "successful start-up and operation helper" that helps successful start-ups. It is a system that primarily diagnoses problems of prospective entrepreneurs and operators through an automation system at the start-up and operation stage, and professional consultants participate to derive and solve problems, and takes care of all stages of shopping mall birth and growth. In this paper Metaverse based shopping mall Creation is also discussed. Through Big Data creation these accumulated data, we intend to help operators start and operate shopping malls through accurate information by managing all knowledge of shopping malls as a system in the long run.

A Study of the on-Line Surface Roughness Monitoring using the Cutting Force in Face Milling Operation (정면밀링작업에서 절삭력을 이용한 On-Line 표면조도 감시에 관한 연구)

  • Baek, Dae Kyun;Ko, Tae Jo;Kim, Hee Sool
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.14 no.1
    • /
    • pp.185-193
    • /
    • 1997
  • This paper presents the on-line monitoring of the surface roughness in a face milling operation. The cut- ting force was used to monitor the surface roughness, since the insert run-outs not only deteriorate surface roughness but also change cutting force. AR model and band energy method were taken to extract the fea- tures from the cutting force. The features extracted from AR modelling are more accurate about the moni- toring than those from band energy method, whereas, the computing speed of the former is slow. An artifi- cal neural network discriminated the level of the surface roughness by using the features extracted via signal processing.

  • PDF

The Study on Operation Control & Management System of Bimodal Tram (바이모달트램 통합운영관리시스템 구축에 관한 연구)

  • Yoon, Hee-Taek;Park, Young-Kon;Lee, Kang-Won;Hwang, Eui-Kyeong
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.181-187
    • /
    • 2011
  • Since 2003, state transportation study core technology development is being promoted as part of the bimodal trams operating in accordance with the development of refractive vehicle as research infrastructure for building high-tech road transport system has been the research and development. Bimodal trams of refraction as the vehicle for him to introduce domestic first ever operation management system also developed in Korea according to case-based technology system, but most of the country, and, in this study, mainly those based on technology integration building management system and the bimodal trams of refraction of a vehicle operated was to highlight the features and benefits. Bimodal tram station itself is the way the exclusive properties and to operate the route with large transport capacity has the characteristics of the railway, but the only routes such as railroad lines is not of closed roads under certain circumstances, the flexibility to use has to be integrated operations management system of bimodal trams characteristics of the railroads and public transportation by combining the characteristics of a flexible, convenient and secure services to users with the aim of providing research and will denote the system developed. In this study, bimodal integration system required for the operation of the tram station around the wired and wireless network management center, applying the organic integration into one system so that you have to be centrally managed. In addition, the existing traffic management system operates as a unidirectional rather than monitoring all system-wide management via the interactive network through real-time requests and responses were configured to allow management and control. These findings of the existing traffic operation management system that you can jump step can be based on future unmanned vehicles and related systems through control of the operation management system will be offered as a basis.

  • PDF

A Study on the Effective application scheme of Subway optical communication system (지하철 광통신 시스템의 효율적 운용방안에 대한 고찰)

  • Kwon, Gi-Jung;Lee, Gi-Seung;Ko, Young-Yun
    • Proceedings of the KSR Conference
    • /
    • 2007.11a
    • /
    • pp.1541-1550
    • /
    • 2007
  • A subway is one of many public transportation means that contributes toward our society including seoul and offering of its service and expression of various information are in need due to users high demand. And there are various class of users. For that reason an optical communication network in the general contorl center and station buildings was installed. Considering the importance of safe operation of subway, optical communication exists to enhance customer satisfaction. Safe operation is essential as its level of reliance accounts for about 95%. this paper will look for ways to promote mutual information interchange and operation know-how with systems of the same kind and sharing a capable of effective operation of systems in place. Optical communication network in the metropolis railroad accepts various kinds of control networks and data networks for train operation. As occasion demands, this paper presents effective application scheme and specialized organization about an optical communication operating system.

  • PDF

Distributed Bit Loading and Power Control Algorithm to Increase System Throughput of Ad-hoc Network (Ad-hoc 네트워크의 Throughput 향상을 위한 적응적 MCS 레벨 기반의 분산형 전력 제어 알고리즘)

  • Kim, Young-Bum;Wang, Yu-Peng;Chang, Kyung-Hi;Yun, Chang-Ho;Park, Jong-Won;Lim, Yong-Kon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4A
    • /
    • pp.315-321
    • /
    • 2010
  • In Ad-hoc networks, centralized power control is not suitable due to the absence of base stations, which perform the power control operation in the network to optimize the system performance. Therefore, each node should perform power control algorithm distributedly instead of the centralized one. The conventional distributed power control algorithm does not consider the adaptive bit loading operation to change the MCS (modulation and coding scheme) according to the received SINR (signal to interference and noise ratio), which limits the system throughput. In this paper, we propose a novel distributed bit loading and power control algorithm, which considers the adaptive bit loading operation to increase total system throughput and decrease outage probability. Simulation results show that the proposed algorithm performs much better than the conventional algorithm.

Hash-based Pattern Matching System for Detection Performance (침입탐지시스템 탐지성능 향상 위한 해시기반 패턴 매칭 시스템)

  • Kim, Byung-Hoon;Ha, Ok-Hyun;Shin, Jae-Chul
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.21-27
    • /
    • 2009
  • In the environment of development of network bandwidth and intrusion technology there is limit to the pattern analysis of all massed packets through the existing pattern matching method by the intrusion detection system. To detect the packets efficiently when they are received fragmented, it has been presented the matching method only the pattern of packets consisting with the operation system such as Esnort. Pattern matching performance is improved through the use of NMAP, the basic mechanism od Esnort, by scanning the operation system of the same network system and appling pattern match selectively scanned information and the same operation system as the received packets. However, it can be appeared the case of disregarding the receivied packets depending on the diversity of the kind of operation systems and recognition mistake of operation system of nmap. In this paper, we present and verify the improved intrusion detection system shortening the pattern matching time by the creation of hashy table through the pattern hash of intrusion detection system independently with the users system environment .in the state of flux.

  • PDF