• Title/Summary/Keyword: digital environments

Search Result 1,169, Processing Time 0.027 seconds

Implementation of Next Generation DSL Networks (차세대 DSL망의 구현 방안)

  • Park Seung-Chul
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.2
    • /
    • pp.236-243
    • /
    • 2005
  • Most of the existing legacy DSL networks, about 80 million lines world-widely, adopted ‘ATM(Asynchronous Transfer Mode) over DSL’protocol architecture for the effective interworking with the ATM-based regional backbone networks and for the effective support of native ATM-based multimedia application services. Recently, however, the regional backbone networks are moving towards Metro Ethernet networks, instead of the ATM networks, and most of the current multimedia applications are If-based, not native ATM-based. These environmental changes push the architecture of DSL networks to be accordingly changed, and the‘Ethernet over DSL’protocol architecture, instead of existing‘ATM over DSL’, is tried to be applied to the implementation of next generation DSL networks such as VDSL(Very high-rate DSL) . In this paper, we propose two different implementation models for next generation DSL networks in Metro Ethernet backbone environments, respectively EA(Ethernet-to-ATM) implementation model and RE(Ethernet-to-Ethernet) implementation model. And, a comparative analysis focused on the performance and the backward compatability with the legacy DSL networks will be presented.

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

A performance analysis of terrain-aided navigation(TAN) algorithms using interferometric radar altimeter (간섭계 레이더 고도계를 활용한 지형참조항법의 성능 분석)

  • Jeong, Seung-Hwan;Yoon, Ju-Hong;Park, Min-Gyu;Kim, Dae-Young;Sung, Chang-Ki;Kim, Hyun-Suk;Kim, Yoon-Hyung;Kwak, Hee-Jun;Sun, Woong;Yoon, Kuk-Jin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.40 no.4
    • /
    • pp.285-291
    • /
    • 2012
  • The paper experimentally verifies the performance of Terrain-Aided Navigation (TAN) using an interferometric radio altimeter, which is recently used due to its accuracy. First, we propose a TAN system that utilizes an interferometric radio altimeter as a measurement system. Second, we implement extended Kalman filter, unscented Kalman filter, and particle filter to evaluate the performance of TAN according to the selection of filters and the difference of environments.

Development of Evaluation Indicators for Research Libraries (전문도서관 운영평가를 위한 평가지표 개발)

  • Kim, Sang-Jun;Hwang, Jae-Young;Park, Kay-Sook;Choi, Ho-Nam
    • Journal of Information Management
    • /
    • v.39 no.4
    • /
    • pp.97-120
    • /
    • 2008
  • Evaluation indicators reflecting recent digital environments are needed as a tool to increase research library's competitiveness and productivity. Especially, research libraries have different subject backgrounds and there are many one-person libraries. In this study, we developed new evaluation indicators based on the draft indicators made in 2007 considering these environmental elements so that it may be used easily and applicable to various research libraries. In developing the new indicators, we reviewed other library type's indicators and listened carefully to the comments from expert librarians in the research libraries through several meetings. After developing the indicators, we made a survey in order to verify its validity as well as its effectiveness and also made a test evaluation for research libraries. The proposed indicators will contribute in evaluating the current level of Korean research libraries and promoting them to the future-oriented libraries.

A Study on a Quality Management System onto which Informationized Management is Grafted: - With Centering on the Direction for Development of a Standard Model of the Informationized Management System - (정보화경영을 접목한 품질관리방안 연구 - 정보화경영체제 표준모델 발전방향 중심으로 -)

  • Park, Seon-Guk
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.127-143
    • /
    • 2007
  • As the informationized society develops, for companies to be industrially competitive in global competition, innovation of business administration through informationization is a nation-wide task that must be driven. Small-to-mid size companies also tend to recognize the need for informationization and build the information systems, improving their informationization levels. To reduce errors in bringing in and running the information systems and increase efficiency In using them, the need for the standard and guide for informationization in small-to-mid size companies has increased. Accordingly, the national office of small and medium business administration has developed the informationized management system (IMS) certification standard in order to provide a national motive to secure the means for management innovation of small-to-mid size companies and have them recognize informationization as a business strategy. Now, there arises the need for the IMS certification standard, which was developed in early 2000, due to changes in environments of small-and-medium businesses and problems that have been revealed in field applications. In this research, we have examined the current situations of informationization in small-and-medium businesses that were revealed by the 2005 survey on the levels of informationization in small and medium business, have drawn the problems that have occurred in the process of applying the IMS in many small-to-mid size companies, have devised the measures against those problems, and have proposed a new IMS certification standard that reflects those measures. This research has proposed only the direction for development of the IMS certification standard. Future researches should deal with detailed items and criteria for evaluation and continuous improvement of them.

  • PDF

Measurements and Statistical Modeling of Ignition Noise from Vehicle (자동차 점화계통에서 발생된 전자파 잡음의 측정 및 통계적 모형)

  • 김종호;윤현보;백락준;우종우
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.8 no.4
    • /
    • pp.390-402
    • /
    • 1997
  • The ignition noises from the vehicle are measured and the measurement data are statistically treated for modeling. The low-noise amplifier and band-pass filter are added between the receiver and the three axes antenna for low noise level measurement and the APD and PSD are measured in 800 MHz frequency range. The measured APD curves can be expressed in terms of sensitivity study of each model through 3(class A) or 6(Class B) parameters variation, and these optimal parameter can easily be calculated by using the Composite Approximation Algorithm. The selected APD parameter can be used for making the Data Base EM-environments and also applied to determine the output and sensitivity margin for the transmitter and receiver. 'Digital microwave transmission systems are equipped with equalizer against fading during multipath fading. In this paper, we proposed variable reference tap position equalizer that varies the reference tap according to fading type to archive better performance. We got the perf?mance improvement about 4~5 dB in MP condition and 2~3 dB in NMP condition from simulation results.

  • PDF

SEED and Stream cipher algorithm comparison and analysis on the communication (통신에서의 SEED와 스트림 암호 알고리즘의 비교 분석)

  • Ahn, In-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.199-206
    • /
    • 2010
  • Society of digital information becomes gradually advancement, and it is a situation offered various service, but it is exposed to a serious security threat by a fast development of communication such as the internet and a network. There is required a research of technical encryption to protect more safely important information. And we require research for application of security technology in environment or a field to be based on a characteristics of market of an information security. The symmetric key cipher algorithm has same encryption key and decryption key. It is categorized to Block and Stream cipher algorithm according to conversion ways. This study inspects safety and reliability of proposed SEED, Stream cipher algorithm. And it confirms possibility of application on the communication environments. This can contribute to transact information safely by application of suitable cipher algorithm along various communication environmental conditions.

An Adaptive Block Matching Algorithm Based on Temporal Correlations (시간적 상관성을 이용한 적응적 블록 정합 알고리즘)

  • Yoon, Hyo-Sun;Lee, Guee-Sang
    • The KIPS Transactions:PartB
    • /
    • v.9B no.2
    • /
    • pp.199-204
    • /
    • 2002
  • Since motion estimation and motion compensation methods remove the redundant data to employ the temporal redundancy in images, it plays an important role in digital video compression. Because of its high computational complexity, however, it is difficult to apply to high-resolution applications in real time environments. If we have information about the motion of an image block before the motion estimation, the location of a better starting point for the search of an exact motion vector can be determined to expedite the searching process. In this paper, we present an adaptive motion estimation approach bated on temporal correlations of consecutive image frames that defines the search pattern and determines the location of the initial search point adaptively. Through experiments, compared with DS(Diamond Search) algorithm, the proposed algorithm is about 0.1∼0.5(dB) better than DS in terms of PSNR(Peak Signal to Noise Ratio) and improves as high as 50% compared with DS in terms of average number of search point per motion vector estimation.

The Strategies of Logistics Management for SMEs through CALS/EC under the Circumstance supervised by IMF (IMF 환경하에서 CALS/EC를 통한 중소기업 물류경영 전략)

  • Ku, Keun-Wan;Kim, Chang-Gyun
    • Journal of Distribution Science
    • /
    • v.1 no.1
    • /
    • pp.1-24
    • /
    • 1999
  • CALS/EC is about doing business electronically. It is based on the electronic processing and transmission of data, including text, sound and video. It encompasses many diverse activities including electronic trading of goods and services, online delivery of digital content, electronic fund transfers, electronic share trading, electronic bills of lading, commercial auctions, collaborative design and engineering, online sourcing, public procuremet, direct consumer marketing, and after-sales service. It involves both products(e.g. consumer goods, specialised medical equipment) and services(e.g. information services, financial and legal services); traditional activities(e.g. healthcare, education) and new activities (e.g. virtual malls). CALS/EC will be emerging to replace and substitute the role of the conventional market. By changing and eliminating some processes of the transactions, the electronic market and the electronic commerce will redistribute the power and hence the benefits of the market activities. Traditional way of doing business may enter into the new electronic market because the role and function of trust and established reputation will be reinforced in the electronic market. The CALS/EC through the Internet has been in the spotlight in the shopping behavior of the consumers. Accordingly Corporates are trying to adapt themselves to those rapidly changing environments being affected by the Internet. Among others, particularly to be noted is the CALS/EC between corporations and consumers whose potential growth can be considered very substantial. This report, focusing on the introduction of CALS/EC for the logistics of SMEs, will allow us to prepare more efficiently for the coming 21st Century. It is obvious that CALS/EC is fast becoming the useful way of exchanging not only information but products in business between firm-to-firm and firm-to-customer.

  • PDF

The Strategies of Logistics Management for SMEs through CALS/EC (중소기업 물류경영 정보화를 위한 CALS/EC 전략)

  • Kim, Chang-Gyun
    • International Commerce and Information Review
    • /
    • v.1 no.1
    • /
    • pp.179-201
    • /
    • 1999
  • CALS/EC is about doing business electronically. It is based on the electronic processing and transmission of data, including text, sound and video. It encompasses many diverse activities including electronic trading of goods and services, online delivery of digital content, electronic fund transfers, electronic share trading, electronic bills of lading, commercial auctions, collaborative design and engineering, online sourcing, public procuremet, direct consumer marketing, and after-sales service. It involves both products(e.g. consumer goods, specialised medical equipment) and services(e.g. information services, financial and legal services); traditional activities(e.g. healthcare, education) and new activities (e.g. virtual malls). CALS/EC will be emerging to replace and substitute the role of the conventional market. By changing and eliminating some processes of the transactions, the electronic market and the electronic commerce will redistribute the power and hence the benefits of the market activities. Traditional way of doing business may enter into the new electronic market because the role and function of trust and established reputation will be reinforced in the electronic market. The CALS/EC through the Internet has been in the spotlight in the shopping behavior of the consumers. Accordingly Corporates are trying to adapt themselves to those rapidly changing environments being affected by the Internet. Among others, particularly to be noted is the CALS/EC between corporations and consumers whose potential growth can be considered very substantial. This report, focusing on the introduction of CALS/EC for the logistics of SMEs, will allow us to prepare more efficiently for the coming 21st Century. It is obvious that CALS/EC is fast becoming the useful way of exchanging not only information but products in business between firm-to-firm and firm-to-customer.

  • PDF