• Title/Summary/Keyword: SystemC infrastructure

Search Result 201, Processing Time 0.026 seconds

Exploratory Study on Global Marketing Strategy for the Dongdaemun Fashion District (동대문 패션시장의 생산시스템을 활용한 글로벌 마케팅 전략에 관한 탐색적 연구)

  • Kim, Munyoung
    • Journal of the Korean Society of Costume
    • /
    • v.64 no.3
    • /
    • pp.47-61
    • /
    • 2014
  • Dongdaemun Fashion District has been successfully positioned as the main hub for fashion product distribution in Korea since 1960 thanks to its unique and successful fashion merchandising system. This system enables the distributors to respond quickly to consumer need and inexpensive price. However, at the present time, Dongdaemun Fashion District has been facing serious challenges from new types of retail stores such as fast fashion brands like ZARA and online shopping malls. To achieve this result, statistical analysis was performed using data from 68 employees of wholesalers in the Dongdaemun Fashion District. They were required to answer questions regarding the marketing system supporting program, amenities like restrooms, and traffic congestion. For the case study, C.I.S, a successful global wholesale system in Italy, was selected. C.I.S has 130 offices offering professional services in the field of trade, legal and tax issues, and insurance. This study suggests cooperation among related wholesalers in order to make an area management plan in the Dongdaemun Fashion District. Also, for the wholesalers to build up product information system and infrastructure for the Global marketing strategy.

A Quantitative Assessment Modeling Technique for Survivality Improvement of Ubiquitous Computing System (유비쿼터스 컴퓨팅 시스템의 생존성 개선을 위한 정량적 분석 모델링 기법)

  • Choi, Chang-Yeol;Kim, Sung-Soo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.633-642
    • /
    • 2005
  • Ubiquitous computing system is about networked processors, which is constructed with one or more computers interconnected by the networks. However, traditional security solution lacks a Proactive maintenance technique because of its focusing on developing the qualitative detection and countermeasure after attack. Thus, in this paper, we propose a quantitative assessment modeling technique, by which the general infrastructure can be improved and the attacks on a specific infrastructure be detected and protected. First of all, we develop the definition of survivality and modeling technique for quantitative assessment modeling with the static information on the system random information, and attack-type modeling. in addition, the survivality analysis on TCP-SYN attack and code-Red worm attack is performed for validating the proposed technique.

A Digital Right Management System based on Shared Key fool for Video Data Protection (동영상 데이터 보호를 위한 공유 키 풀 기반의 DRM 시스템)

  • Kim Jung-Jae;Park Jae-Pyo;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.183-190
    • /
    • 2005
  • In this thesis, first, we propose I-frame encryption techniques of video data for video data itself encryption and propose license agent that processing user's certification and decryption in client system automatically when user execute encrypted video data in system server. License agent runs user's certification, encryption and decryption of video data based on PID(Public Key Infrastructure) using shared key-pool when execute of video data. Also, compose duplex buffer control and propose real time decryption method using efficient buffer scheduling to reduce much playing delay times that happen processing decryption when execute of videoa data of high-capacity.

A Study on the Current Status and Future Prospection of the Electronic Payment Infrastructure -Focusing on the e-L/C and SWIFT TSU- (전자결제 인프라 현황과 향후 전망 -전자신용장과 SWIFT TSU를 중심으로-)

  • Kim, Tae-Hwan
    • International Commerce and Information Review
    • /
    • v.14 no.3
    • /
    • pp.585-610
    • /
    • 2012
  • There have been various attempt to offer commercial service of electronic payment. Actually, however, there has been few electronic payment model that are being used commercial service. Among them, it is estimated that only TSU(Trade Service Utility) of SWIFT will be succeed in providing commercial service possibility. In Korea e-L/C Distribution & Management System was constructed and become the first e-L/C service on a global basis via e-Trade Facilitation 3 Years Project and then started offering the world first e-L/C service. Some scholars have insisted the opinion that SWIFT L/C means e-L/C, but such opinion may be wrong because SWIFT L/C means the L/C advised by SWIFT(Society for Worldwid Interbank Financial Telecommunication) under the condition that a series of procedure from the issuance of L/C to the advice is done by SWIFT system. Because perfect e-L/C should be organically connected by SWIFT network and also, the e-L/C business between overseas banks and their customers should be organically linked with each other. The purpose of this paper is contribute to the commercialization of e-L/C distribution system by studying the current status of infrastructure concerned with domestic and overseas electronic payment and future e-payment infrastructure, seeking to be introduced internationally by doing things.

  • PDF

Development of real-time car tracking system with RGPS and its error analysis (RGPS를 이용한 실시간 차량관제시스템 구현과 오차분석)

  • Go, Sun-Jun;Lee, Ja-Sung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.1
    • /
    • pp.15-24
    • /
    • 2000
  • Stand-alone global position system receiver based on C/A code tracking generates position error of 100m mainly due to the selective availability and ionospheric and tropospheric delay errors. The differential GPS is the most commonly used method for removing those bias range error components. The relative GPS, although somewhat restrictive in its use, is ideally suited to the car monitoring system for improved Automatic Vehicle location, especially where the DGPS infrastructure is not available. The RGPS does not require any additional hardware, facility or external infrastructure and can be operated within the system with existing host computer and communication link. This paper presents detailed description of the RGPS concept and its implementation for real-time data processing. Performance of RGPS is evaluated with real data and is compared with DGPS.

  • PDF

A Feasibility Study to Adopt BIM-based Infrastructure Management System (BIM기반 사회기반 시설물 유지관리 도입을 위한 경제적 타당성 분석)

  • Kim, Jeonghwan;Ji, Seung-Gu;Jeong, Taehyung;Seo, Jongwon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.34 no.1
    • /
    • pp.285-292
    • /
    • 2014
  • BIM (Building Information Modeling) is a new paradigm that includes construction life-cycle, and BIM has become mandatory regulation according to the Public Procurement Service since 2016, which accelerates its application. BIM is now expand from architectural field to infrastructure industry. Through pilot projects, BIM has been challenged with verification process. This trend has affected to maintenance and operation (M&O) phase of construction life-cycle. Advanced country has already published their research and result with feasibility study and guidelines. In this paper, we conduct the feasibility study to adopt BIM-based infrastructure management system. Bridges and tunnels were selected as application target, and benefit/cost ratio were used. The result shows that BIM-based infrastructure management system is feasible when the level of detail is more than "Medium" in bridge, and "High" in tunnel.

C4ISR Systems IDS Performance Enhancing Method (C4ISR 체계 IDS의 성능 향상 방안)

  • Choi, Junesung;Kook, Kwangho
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.57-69
    • /
    • 2012
  • C4ISR system is an important tool for military operational command and control. Therefore, it is frequently exposed to the cyber-terror attempt to paralyze the military command and control system. Generally, the information system uses IDS and firewall as major security computing tools. C4ISR system also uses them as major measures for the information protection. But the usefulness of IDS is reduced due to the frequent false-positives and false-negatives if the behavioral patterns are modified or new behavioral patterns appear. This paper presents new IDS structure which can create modified attack patterns and unexpected attack patterns automatically during IDS probing process. The proposed IDS structure is expected to enhance the information protection capability of the C4ISR system by reducing false-positives and false-negatives through the creation and verification of new attack patterns.

The Study for Position and Signal Power of Antenna on Construction of Korean P.N.T Service System (한국에 적합한 P.N.T 서비스 시스템 구축을 위한 안테나 위치 및 송신출력에 관한 연구)

  • Kim, Jeong-Rok;Gug, Seoung-Gi
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2012.06a
    • /
    • pp.80-81
    • /
    • 2012
  • Our society consist of many country's critical infrastructure such as production and distribution of electric power systems, communications technology, tele-communications, financial system, transportation systems when those systems are operated efficiently and normally. Country's critical infrastructure and its application fields of this magnitude rely on more and more P.N.T (Positioning, Navigation. Timing) systems, in which the tele-communications(Timing), financial market(Timing), logistics (Positioning, Navigation, Timing), transportation(Positioning, Navigation. Timing) is shoring. Reliability concerned about the exact position and timing of these critical national infrastructure rely on ability to provide a stable from GPS.

  • PDF

Evaluation of existing bridges using neural networks

  • Molina, Augusto V.;Chou, Karen C.
    • Structural Engineering and Mechanics
    • /
    • v.13 no.2
    • /
    • pp.187-209
    • /
    • 2002
  • The infrastructure system in the United States has been aging faster than the resource available to restore them. Therefore decision for allocating the resources is based in part on the condition of the structural system. This paper proposes to use neural network to predict the overall rating of the structural system because of the successful applications of neural network to other fields which require a "symptom-diagnostic" type relationship. The goal of this paper is to illustrate the potential of using neural network in civil engineering applications and, particularly, in bridge evaluations. Data collected by the Tennessee Department of Transportation were used as "test bed" for the study. Multi-layer feed forward networks were developed using the Levenberg-Marquardt training algorithm. All the neural networks consisted of at least one hidden layer of neurons. Hyperbolic tangent transfer functions were used in the first hidden layer and log-sigmoid transfer functions were used in the subsequent hidden and output layers. The best performing neural network consisted of three hidden layers. This network contained three neurons in the first hidden layer, two neurons in the second hidden layer and one neuron in the third hidden layer. The neural network performed well based on a target error of 10%. The results of this study indicate that the potential for using neural networks for the evaluation of infrastructure systems is very good.

A Study on Improvement Methods for Encrytion and Authentication in Batt le Field Management System(C4I) (전장관리체계(C4I)에서의 암호 및 인증방법 개선 방안에 관한연구)

  • Lee, Won Man;Koo, Woo Kwon;Park, Tae Hyeong;Lee, Dong Hoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.39-50
    • /
    • 2012
  • Battlefield management systems are operated by the Public Key Infrastructure (PKI) and cryptographic equipment is distributed through the personal delivery to the enemy has deodorizing prone to structure. In addition, Per person each battlefield management system (C4I) encryption key operate and authentication module to manage multiple encryption so, encryption key operating is restrictions. Analysis of the problems of this public key infrastructure(PKI), Identity-Based Cryptosystem(IBC) and Attribute-Based Cryptosystem(ABC) to compare construct the future of encrypt ion and authentication system were studied. Authentication method for the connection between the system that supports data encryption and secure data communication, storage, and communication scheme is proposed.