• 제목/요약/키워드: Network Technique

검색결과 4,378건 처리시간 0.039초

네트웍 기법에 의한 패션쇼 프로젝트의 관리 모형에 관한 연구 (A Study on Fashion Show Project Management with the Aud of the Network Technique)

  • 양리나
    • 복식문화연구
    • /
    • 제6권3호
    • /
    • pp.21-33
    • /
    • 1998
  • A project manager is required to have systematic knowledge in the project management in fashion and apparel industry. The Network Technique is a modern project management technique and applies to almost all industry sectors, including fashion and apparel industry. Through the Network Technique, we can save project time and cost. The purpose of present study are - to introduce the Network Technique into fashion and apparel industry management area, and - to make an practical application of he Network Technique to fashion and apparel industry. For these purpose, fist we define the Network Technique, and then we apply it to fashion show as an example. Only time component is considered in this study. Cost component can be dealt with later on in the project planning area.

  • PDF

MANET에서의 의심노드 탐지 정확도 향상을 위한 기법 연구 (A Study for Detection Accuracy Improvement of Malicious Nodes on MANET)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제9권4호
    • /
    • pp.95-101
    • /
    • 2013
  • MANET has an advantage that can build a network quickly and easily in difficult environment to build network. In particular, routing protocol that uses in existing mobile environment cannot be applied literally because it consists of only mobile node. Thus, routing protocol considering this characteristic is necessary. Malicious nodes do extensive damage to the whole network because each mobile node has to act as a router. In this paper, we propose technique that can detect accurately the suspected node which causes severely damage to the performance of the network. The proposed technique divides the whole network to zone of constant size and is performed simultaneously detection technique based zone and detection technique by collaboration between nodes. Detection based zone translates the information when member node finishes packet reception or transmission to master node managing zone and detects using this. The collaborative detection technique uses the information of zone table managing in master node which manages each zone. The proposed technique can reduce errors by performing detection which is a reflection of whole traffic of network.

일반망과 보안망을 연계한 네트워크 보안체계 설계 (A Design for Network Security System via Non-security Common Network)

  • 조창봉;이상국;도경철
    • 한국군사과학기술학회지
    • /
    • 제12권5호
    • /
    • pp.609-614
    • /
    • 2009
  • In this paper, we have proposed a design for security network system passing through the non-security network which is commonly used for various networking services. Based on the security requirements which are assumed that the large classified data are bi-transmitted between a server and several terminals remotely located, some application methods of security techniques are suggested such as the network separation technique, the scale-down application technique of certification management system based on the PKI(Public Key Infrastructure), the double encryption application using the crypto-equipment and the asymmetric keys encryption algorithm, unrecoverable data deleting technique and system access control using USB device. It is expected that the application of this design technique for the security network causes to increase the efficiency of the existing network facilities and reduce the cost for developing and maintaining of new and traditional network security systems.

비선형 함수군 특성의 3단자소자를 포함하는 회로망의 전산해석기법 (Computer Analysis Technique of the Network having 3-terminal Elements Characterized by Nonlinear Function Group)

  • 고명삼;이석한
    • 전기의세계
    • /
    • 제26권1호
    • /
    • pp.63-70
    • /
    • 1977
  • This paper deals with computer analysis technique of the network having 3-terminal elements whose input and output characteristics are defined by nonuniform spacing function group on the volt-ampere space. Developing the algorithms to obtain the solutions of the network mentioned above by computer, we propose optimization technique, which can solve the normal form equations of the network defined in this paper and which involves mode analysis technique to be able to analyze the case that the function group has negative resistance characteristics.

  • PDF

통신 실패에 강인한 분산 뉴럴 네트워크 분할 및 추론 정확도 개선 기법 (Communication Failure Resilient Improvement of Distributed Neural Network Partitioning and Inference Accuracy)

  • 정종훈;양회석
    • 대한임베디드공학회논문지
    • /
    • 제16권1호
    • /
    • pp.9-15
    • /
    • 2021
  • Recently, it is increasingly necessary to run high-end neural network applications with huge computation overhead on top of resource-constrained embedded systems, such as wearable devices. While the huge computational overhead can be alleviated by distributed neural networks running on multiple separate devices, existing distributed neural network techniques suffer from a large traffic between the devices; thus are very vulnerable to communication failures. These drawbacks make the distributed neural network techniques inapplicable to wearable devices, which are connected with each other through unstable and low data rate communication medium like human body communication. Therefore, in this paper, we propose a distributed neural network partitioning technique that is resilient to communication failures. Furthermore, we show that the proposed technique also improves the inference accuracy even in case of no communication failure, thanks to the improved network partitioning. We verify through comparative experiments with a real-life neural network application that the proposed technique outperforms the existing state-of-the-art distributed neural network technique in terms of accuracy and resiliency to communication failures.

Analyses of requirements for Network Security Technology

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • 제5권1호
    • /
    • pp.64-67
    • /
    • 2007
  • IT industry strategy trend and home network security technology is presented. First, we consider the development strategy to improve next generation IT industry. Second, we have analyzed the technique for implementing home network. Last, we have analyzed the technique to security home network field.

Differences in Network-Based Kernel Density Estimation According to Pedestrian Network and Road Centerline Network

  • Lee, Byoungkil
    • 한국측량학회지
    • /
    • 제36권5호
    • /
    • pp.335-341
    • /
    • 2018
  • The KDE (Kernel Density Estimation) technique in GIS (Geographic Information System) has been widely used as a method for determining whether a phenomenon occurring in space forms clusters. Most human-generated events such as traffic accidents and retail stores are distributed according to a road network. Even if events on forward and rear roads have short Euclidean distances, network distances may increase and the correlation between them may be low. Therefore, the NKDE (Network-based KDE) technique has been proposed and applied to the urban space where a road network has been developed. KDE is being studied in the field of business GIS, but there is a limit to the microscopic analysis of economic activity along a road. In this study, the NKDE technique is applied to the analysis of urban phenomena such as the density of shops rather than traffic accidents that occur on roads. The results of the NKDE technique are also compared to pedestrian networks and road centerline networks. The results show that applying NKDE to microscopic trade area analysis can yield relatively accurate results. In addition, it was found that pedestrian network data that can consider the movement of actual pedestrians are necessary for accurate trade area analysis using NKDE.

방향성 안테나를 이용한 에너지 효율적인 센서 네트워크의 제안 (The proposal of the energy efficiency sensor network using directional antennas)

  • 김경근;정원수;오영환
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2007년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.351-352
    • /
    • 2007
  • The sensor networking technique as the radio network which does not have the base infrastructure network. The sensor nodes oneself automatic compose the network and simultaneously accomplish two roles of the router and data source. The sensor network is kind of Ad-hoc network is a possibility of seeing from point. sensor networking technique is restricted that limit of the memory and the battery back with the resources of the node. The sensor nodes overcomes the restriction of the resources it is in the process of researching the multi-hop routing technique which the sensor network divided cluster routing techniques which are researched. this paper proposed using beamforming antenna which has the directivity of the electric wave. the beamforming antenna from the Ad-hoc network using technique. the proposal is that raises the efficient of data trans mission from the sensor network and extends the lift time of the sensor network.

  • PDF

Time-Cost Trade-Off by Lead-Time Adjustment in the PDM Network

  • Kim, Seon-Gyoo
    • Architectural research
    • /
    • 제11권2호
    • /
    • pp.43-49
    • /
    • 2009
  • Since the late 1980s, the schedule technique applied to the construction industry around the world has rapidly changed from the traditional ADM (Arrow Diagramming Method) to the PDM (Precedence Diagramming Method) technique. The main reason for this change is to overcome the limits and inconveniences of the traditional ADM technique. The time-cost trade-off is one of the core scheduling techniques to establish the best optimized combination plan in terms of a relationship between the cost and schedule. However, most of the schedule-related textbooks and research papers have discussed and proposed applications of a time-cost trade-off technique based only on the Finish to Start relationship. Therefore, there are almost no consideration and discussion of problems or restrictions that emerge when the time-cost trade-off technique is applied to the PDM network that has overlapping relationships. This paper proposes the lead-time adjustment method as a methodology for overcoming some restrictions that are encountered when the time-cost trade-off technique is applied to the overlapping relationships of the PDM network.

협업 기법을 이용한 침입탐지 탐지 방법에 관한 연구 (A Study on Intrusion Detection Method using Collaborative Technique)

  • 양환석
    • 융합보안논문지
    • /
    • 제21권1호
    • /
    • pp.121-127
    • /
    • 2021
  • 무선 노드 외에 어떠한 인프라도 존재하지 않는 MANET은 빠른 네트워크 구성할 수 있는 장점을 가지고 있다. 하지만 노드들의 이동, 무선 매체 등은 MANET이 가지고 있는 보안 취약점의 원인이기도 하다. 특히 네트워크상에 존재하는 공격 노드들에 의한 그 피해는 다른 네트워크에 비해 상당히 크다. 따라서 공격노드들에 대한 탐지 기법과 공격으로 인한 피해를 줄이는 기법도 반드시 필요하다. 본 논문에서는 침입탐지의 효율성을 높이기 위한 계층구조 기법과 공격으로 인한 피해를 줄이기 위해 P2P 메시 네트워크 구성 기법을 적용한 협업 기반 침입탐지 기법을 제안하였다. 제안한 기법에서는 클러스터내 노드들에 대한 신뢰도 평가를 통해 사전에 공격 노드에 대한 네트워크 참여를 배제하였다. 그리고 공격 노드에 의한 공격이 탐지되면 클러스터 헤드간의 P2P 메시 네트워크를 통해 네트워크 전역에 공격 노드 정보를 빠르게 전달함으로써 공격 노드의 피해를 최소화하는 방법을 적용하였다. 제안한 기법의 성능 평가를 위해 ns-2 시뮬레이터를 이용하였으며, 비교 실험을 통해 제안한 기법의 우수한 성능을 확인할 수 있었다.