• Title/Summary/Keyword: Physical Network

Search Result 1,876, Processing Time 0.034 seconds

EDISON Platform to Supporting Education and Integration Research in Computational Science (계산과학 분야의 교육 및 융합연구 지원을 위한 EDISON 플랫폼)

  • Jin, Du-Seok;Jung, Young-Jin;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.176-182
    • /
    • 2012
  • Recently, a new theoretical and methodological approach for computational science is becoming more and more popular for analyzing and solving scientific problems in various scientific disciplines and applied research. Computational science is a field of study concerned with constructing mathematical models and quantitative analysis techniques and using large computing resources to solve the problems which are difficult to approach in a physical experimentally. In this paper, we present R&D of EDISON open integration platform that allows anyone like professors, researchers, industrial workers, students etc to upload their advanced research result such as simulation SW to use and share based on the cyber infrastructure of supercomputer and network. EDISON platform, which consists of 3 tiers (EDISON application framework, EDISON middleware, and EDISON infra resources) provides Web portal for education and research in 5 areas (CFD, Chemistry, Physics, Structural Dynamics, Computational Design) and user service.

A Study of Holism based Service Experience Analysis System

  • Kim, Sung-Su;Lee, Eun-Jong
    • Journal of the Ergonomics Society of Korea
    • /
    • v.31 no.1
    • /
    • pp.49-61
    • /
    • 2012
  • Objective: The aim of this study is to offer a holism based Service Experience Analysis System(HSEAS) for service design. Background: Customer experience has been focused in a lot of service area. But it is difficult to understand the customer's needs and their experiences because it's so complex and uncertain. Thus it needs holistic approach that means it's difficult to explain general character merely through the understanding of small parts that composes an object and it must be analyzed within the overall context. Method: Accordingly, the thesis paper proposes the Service Experience Analysis System that satisfies the four following needs. (1) Need of solid Experience Framework in which the special quality of the service experience is considered, (2) need of support for the semantic cohesion between different kinds of data, (3) need of support for the management and search of vast data, and (4) need of building the knowledge base system for collaborative research. Results: HSEAS combines the short information in the customers' words and behaviors or situations and circumstances and provides a place of analysis where the context of the general experience can be read and allows concrete understanding of the actual state and factor of the problem as a Combined Data Analysis Tool. Conclusion: HSEAS becomes the center of information management, analysis and connection and it provides a free collaboration place where physical condition has no relations to as a knowledge base system based on network. Application: It is expected that length and width will be added to the analysis and assistance for effectively accumulating information will be provided in the area of diverse service.

The Reality and Alternative of Gender Inequality to Female Golf Leader (여성골프지도자의 젠더 불평등 현실과 대안)

  • Woo, Ju-Youn
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.9
    • /
    • pp.237-243
    • /
    • 2020
  • This study examines the inequality of female golf leaders in recruitment and promotion and investigates alternatives to overcome them. It consisted of in-depth interviews and observations of the participants of this researcher by 9 female golf instructors who were employed in the driving range and had more than 10 years of teaching experience. Area analysis and classification analysis were used, and expert consultation, triangulation verification, and reconfirmation with participants were performed. The results first, Female golf leaders were unable to compete equally in the network of male golf leaders who advanced first. Second, female golf leaders were faithful to the role theory of women who have been educated in Confucian culture in Korean society. Third, to overcome the gender inequality reality, education was selected and self-esteem was raised through education. Fourth, fair opportunities should be given through job postings and job standardization. Lastly, it was confirmed that the proportion of athletes soon leads to the proportion of leaders, and that the number of leaders becomes a condition for equality.

A Study on Security Management Methods for Information System of Educational Institutions (교육기관의 정보시스템 보안관리 방안 연구)

  • Choi, JinMyung;Kim, DooYeon
    • The Journal of Korean Association of Computer Education
    • /
    • v.20 no.6
    • /
    • pp.95-104
    • /
    • 2017
  • The damage caused by information spill, forgery, falsification, and deletion by cyber infringement in educational institutions and universities is very large. In this study, we analyzed the types, causes, and problems of cyber infringement in educational administrative institutions and universities. As a result, administrative, physical and technical information protection activities were weak. In this paper, we propose a security enhancement method for each domain by dividing them into Internet zone, network-neutral zone (DMZ: Demilitarized Zone), general server zone, internal server zone (Server Farm), and user zone so that these vulnerabilities can be easily identified, supplemented or security enhanced. In addition, we have proposed a method to apply security information system architecture and information protection technology correctly for educational administration institutions and universities. This study is meaningful not to provide conceptual guidance but to suggest specific action and procedure oriented security management plan.

An Unequal Protection FEC Scheme for Video over Optical Access Networks

  • Cao, Yingying;Chen, Xue;Wang, Liqian;Li, Xicong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.6
    • /
    • pp.1463-1479
    • /
    • 2013
  • In this paper, we propose an unequal protection physical coding sub-layer (PCS) forward error correction (FEC) scheme for efficient and high-quality transmission of video data over optical access networks. Through identifying and resolving the unequal importance of different video frames and passing this importance information from MAC-layer to PCS, FEC scheme of PCS can be adaptive to application-layer data. Meanwhile, we jointly consider the different channel situations of optical network unit (ONU) and improve the efficiency of FEC redundancy by channel adaptation. We develop a theoretical algorithm and a hardware method to achieve efficient FEC assignment for the proposed unequal protection scheme. The theoretical FEC assignment algorithm is to obtain the optimal FEC redundancy allocation vector that results in the optimum performance index, namely frame error rate, based on the identified differential importance and channel situations. The hardware method aims at providing a realistic technical path with negligible hardware cost increment compared with the traditional FEC scheme. From the simulation results, the proposed Channel and Application-layer data Adaptation Unequal Protection (CAAUP) FEC scheme along with the FEC ratio assignment algorithm and the hardware method illustrates the ability of efficient and high-quality transmission of video data against the random errors in the channel of optical access networks.

A Study on Whangchangkumpyo(黃腸禁標) (황장금표(黃腸禁標)에 관한 고찰(考察))

  • Park, Bong-Woo
    • Journal of Korean Society of Forest Science
    • /
    • v.85 no.3
    • /
    • pp.426-438
    • /
    • 1996
  • Whangchangkumpyo(黃腸禁標 : forbidden mark of whangchangmok pine tree cutting) is not only a historical forestry material but also a valuable physical proof supporting historical facts recorded in written documents. This study, using 6 whangchangkumpyo's which have been discovered so far, has investigated a comprehensive value of kumpyo(禁標). For this investigation, the location, sine, inscription, discovery of them and how they were reported have been compared with what is recorded in written documents. A comparative analysis of whangchangkumpyo and its investigation have enabled the author to identify the distribution of high quality pine trees, the political and economic significance of kumsan(禁山) and bongsan(封山) at the time, changes in geographical names over time, bits of tracks from old road network. Finally, it is suggested in this study that the recognition of the value of whangchangkumpyo should be more encouraged and the protection of it should be necessary.

  • PDF

Mutual Verification of an Analytic Model of a Complex System and Space Syntax Using Network Analyses (네트워크 분석방식 선택에 따른 복잡계 모형과 공간구문론의 상호검증)

  • Kim, Suk-Tae;Yoon, So-hee
    • Korean Institute of Interior Design Journal
    • /
    • v.26 no.3
    • /
    • pp.45-54
    • /
    • 2017
  • A social phenomenon that occurs in a physical space is said to be a complex system. However, space syntax, which is commonly employed by researchers to identify such social phenomena, has various limitations in interpreting their complexity. On the other hand, agent-based modeling considers a variety of factors including the personality of the agent, objective-oriented work flows, estimation according to time flows and better prediction of space use through diverse parameters depending the situation, as well as the characteristics of the space. The agent-based method thus has the potentials to be developed as an alternative to space syntax techniques. In particular, discrete event driven simulation(DEVS), which is part of the agent-based modeling method, embraces the concept of networks just like space syntax, which allows a possible theoretical linkage in the future. This study suggests a procedural model of agent-based DEVS reflecting two different connection methods, i.e. connections between adjacent areas and those of the entire space, and attempts to identify the relationship between the local and regional indices of space syntax. A number of spaces were selected as examples-one for a preliminary experiment and eight modified for the main experiment-and space syntax and DEVS were applied to each of them. The comparative analysis of the results led to the conclusions as follows: 1) Adjacent connections were closely related to local indices, while the whole-space approach to regional indices. Local integration shows both characteristics. 2) Observation of the time flow model indicated a faster convergence with the range of 1 to 3-fold of the total time of one lap, with the error of less than 10%. 3) The heat map analysis showed more obvious characteristics of using the space for the entire space rather than adjacent connections. 4) Space syntax shows higher eligibility than ABM.

MMT-based Broadcasting Services Combined with MPEG-DASH (MPEG-DASH 융합형 MMT 기반 방송 서비스)

  • Park, MinKyu;Kim, Yong Han
    • Journal of Broadcast Engineering
    • /
    • v.20 no.2
    • /
    • pp.283-299
    • /
    • 2015
  • In this paper, we propose new broadcasting services that combine MMT (MPEG Media Transport) standard with MPEG-DASH (Dynamic Adaptive Streaming over HTTP) standard. MMT is a next-generation multimedia transport standard that is IP-friendly and provides functionalities appropriate for hybrid broadcasting that uses broadcast physical channels and the Internet simultaneously. MPEG-DASH enables media streaming services that can be dynamically adaptive both to the network traffic conditions of wired and/or wireless Internet and the receiving entity environment. We explain the scenarios of the proposed broadcasting services and demonstrate that various hybrid broadcasting services can be easily realized through the combined usage of MMT and MPEG-DASH. By making the test bitstreams containing contents for the new services and developing the receiver back-end software that performs the function of the receiving entity for the new services on personal computers, we verified that the proposed scenarios can be realized.

Diffraction Analysis of Multi-layered Grating Structures using Rigorous Equivalent Transmission-Line Theory (정확한 등가 전송선로 이론을 사용한 다층 격자 구조의 회절특성 분석)

  • Ho, Kwang-Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.261-267
    • /
    • 2015
  • The eigenvalue problems involving the diffraction of waves by multi-layered grating configurations can be explained by rigorous modal expansion terms. Such a modal solution can be represented by equivalent transmission-line networks, which are generalized forms of simple conventional circuits. This approach brings considerable physical insight into the grating diffraction process of the fields everywhere. In particular, the transmission-line representation can serve as a template for computational algorithms that systematically evaluate dispersion properties, radiation effects and other optical characteristics that are not readily obtained by other methods. To illustrate the validity of the present rigorous approach, the previous research works are numerically confirmed and the results agree well each other.

Enhanced Wireless Network Security in Military Environments (군사 환경에서의 향상된 무선 네트워크 보안)

  • Kim, Jin Woo;Shin, Soo Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1341-1348
    • /
    • 2016
  • In this paper, we propose method to enhance security performance using HT-STBC with artificial noise under Wier-Tap channel model that exist with legitimate receiver and illegal eavesdropper. Conventional STBC with artificial noise scheme has a weakness that a limited increase in the BER of the difference between the receiver and an eavesdropper, when used over QPSK modulation. To solve this problem, we suggest HT-STBC combining hadamard transform and STBC with artificial noise for reduce BER of receiver than the conventional scheme and demonstrated through simulation that also increased BER difference between the receiver and an eavesdropper. By the simulation results, when used proposed scheme, showed approximately 3dB improvement in performance compared to the conventional scheme.