• Title/Summary/Keyword: network separation

Search Result 311, Processing Time 0.025 seconds

A Study on Setting the Grade of Vertical Evacuation Rank to Introduce an USN-based Evacuation System into Super High-rise Apartment Housing's (초고층 공동주택의 USN기반 피난시스템 도입을 위한 수직적 피난위계 설정에 관한 연구)

  • Hong, Won-Hwa;Jeon, Gyu-Yeob;Choi, Jun-Ho
    • Journal of the Korean housing association
    • /
    • v.18 no.5
    • /
    • pp.133-141
    • /
    • 2007
  • The purpose of this study is to secure an evacuation time and to ensure safety by using an Ubiquitous Sensor Network computing when a fire breaks out at a super high-rise apartment housing. A super high-rise apartment housing that is a type of building to solve the problem of separation of the urban function and the phenomenon of hollowing out downtown has been on the increase, high-rise apartment housings occupying 52.7% of whole housings in 2005. However, if a fire breaks out, there would be serious damage since it accommodates many people and facilities as existence of vertical gigantism in the city. The architectural law in force has no clause on it which is universally applicable to general building, it is difficult to be applicable to a densely super high-rise apartment housing and there would be in danger of a resident's evacuation in the fire. Therefore, as a previous study to introduce an USN-based fire-warning facility and evacuation equipment, this study shows the improvement way after analyzing factors that are barriers to evacuaee's behavior of a super high-rise apartment housing and also shows establishment of the grade of vertical evacuation rank by SimuleX, one of the best computer simulation program.

A Study on Assessing the Interference between GSO Satellite Network and Terrestrial Network in Ka Band (Ka 대역을 공유하는 정지궤도 위성망과 지상망간 주파수 간섭 평가 연구)

  • Oh, Dae-Sub;Kim, Soo-Young;Ahn, Do-Seob
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3A
    • /
    • pp.296-303
    • /
    • 2008
  • Co-existence of various wireless systems may cause frequency interference problem. For this reason, frequency sharing studies play a very important role in order to use limited spectrum resources efficiently. Especially, because a satellite system covers a global area in nature, the frequency sharing between the satellite system and terrestrial systems is essential. For satellite systems using Ka bands, we can increase spectrum efficiency by considering off-axis angles of earth station antenna. In this paper, we demonstrate the analysis result of separation distance between the satellite earth station and a terrestrial repeater, and the presented results can be used to design and implement Ka band wireless systems.

Delimitation of Jurisdiction of Commercial, Civil and Administrative Courts: IT Challenges

  • Baranenko, Dmytro;Stepanova, Tetiana;Pillai, Aneesh V.;Kostruba, Anatolii;Akimenko, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.85-90
    • /
    • 2022
  • In modern conditions of the development of public relations, there is a continuous development of technologies. This not only reflects the convenience of service users, and new technology but also contributes to the emergence of new disputes to protect the rights of stakeholders. Therefore, it is urgent to study the distinctions between the jurisdiction of commercial, civil and administrative courts in resolving IT disputes. The work aims to study the peculiarities of delimitation of the jurisdiction of commercial, civil, and administrative courts through the prism of IT measurement. The research methodology consists of such methods as a historical, comparative-legal, formal-logical, empirical, method of analogy, method of synthesis, method of analysis, and systematic method. Examining the specifics of delimiting the jurisdiction of commercial, civil, and administrative courts through the IT dimension, it was concluded that there is a problem in determining the jurisdiction of the court. In addition, the judicial practice on this issue is quite variable, which negatively affects the predictability of technology in resolving potential disputes. In this regard, the criterion models for distinguishing between commercial, administrative, and civil proceedings according to the legal classification of the parties, as well as the nature of the claim are identified. This separation will contribute to a more accurate application of legal norms and methods of application of administrative norms and reduce the number of cases of improper proceedings.

Human Rights and Civil Freedoms: Anthropological Approach in the Theory of Law in the Age of Information Technology

  • Gavrilova, Yulia;Dzhafarov, Navai;Kondratuk, Diana;Korchagina, Tamara;Ponomarev, Mikhail;Rozanova, Elizabeth
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.199-203
    • /
    • 2022
  • The article aims at studying the institution of human rights and civil freedoms with due regard to the anthropological approach in the theory of law. To the greatest extent, the provisions of non-classical legal science are confirmed in the Anglo-Saxon legal family, which endows the judge with law-making functions. In this regard, the role of a person in the legal sphere is increasing. The main research method was deduction used to study the anthropological approach to the institution of human rights and freedoms. The article also utilizes the inductive method, the method of systematic scientific analysis, comparative legal and historical methods. To solve the task set, the authors considered the legal foundations and features of human rights and freedoms in the modern world. The article proves that the classical legal discourse, represented by various types of interpretation, reduces the rule of law to the analysis of its logical structure and does not answer the questions posed. It is concluded that the prerequisite for the anthropological approach in the theory of law is the use of human-like concepts in modern legislation (guilt, justice, peculiar ferocity, child abuse, willful evasion, conscientiousness).

Facial Manipulation Detection with Transformer-based Discriminative Features Learning Vision (트랜스포머 기반 판별 특징 학습 비전을 통한 얼굴 조작 감지)

  • Van-Nhan Tran;Minsu Kim;Philjoo Choi;Suk-Hwan Lee;Hoanh-Su Le;Ki-Ryong Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.540-542
    • /
    • 2023
  • Due to the serious issues posed by facial manipulation technologies, many researchers are becoming increasingly interested in the identification of face forgeries. The majority of existing face forgery detection methods leverage powerful data adaptation ability of neural network to derive distinguishing traits. These deep learning-based detection methods frequently treat the detection of fake faces as a binary classification problem and employ softmax loss to track CNN network training. However, acquired traits observed by softmax loss are insufficient for discriminating. To get over these limitations, in this study, we introduce a novel discriminative feature learning based on Vision Transformer architecture. Additionally, a separation-center loss is created to simply compress intra-class variation of original faces while enhancing inter-class differences in the embedding space.

A Study on Applying Zero Trust Architecture: Focusing on Implementing Remote Work System (제로 트러스트 아키텍처 적용 방안에 대한 연구: 재택근무 시스템 구성을 중심으로)

  • Jaewoo Do;Keumseok Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1001-1020
    • /
    • 2023
  • As massive increase in remote work since COVID-19, the boundaries between the inside and outside of corporate networks have become blurred. As a result, traditional perimeter security has stagnated business productivity and made it difficult to manage risks such as information leakage. The zero trust architecture model has emerged, but it is difficult to apply to IT environments composed of various companies. Therefore, using the remote work system configuration as an example, we presented a configuration and methodology that can apply zero trust models even in various network environments such as on-premise, cloud, and network separation. Through this, we aim to contribute to the creation of a safe and convenient cyber environment by providing guidance to companies that want to apply zero trust architecture, an intelligent system that actively responds to cyber threats.

Active control of flow around a 2D square cylinder using plasma actuators (2차원 사각주 주위 유동의 플라즈마 능동제어에 대한 연구)

  • Paraskovia Kolesova;Mustafa G. Yousif;Hee-Chang Lim
    • Journal of the Korean Society of Visualization
    • /
    • v.22 no.2
    • /
    • pp.44-54
    • /
    • 2024
  • This study investigates the effectiveness of using a plasma actuator for active control of turbulent flow around a finite square cylinder. The primary objective is to analyze the impact of plasma actuators on flow separation and wake region characteristics, which are critical for reducing drag and suppressing vortex-induced vibrations. Direct Numerical Simulation (DNS) was employed to explore the flow dynamics at various operational parameters, including different actuation frequencies and voltages. The proposed methodology employs a neural network trained using the Proximal Policy Optimization (PPO) algorithm to determine optimal control policies for plasma actuators. This network is integrated with a computational fluid dynamics (CFD) solver for real-time control. Results indicate that this deep reinforcement learning (DRL)-based strategy outperforms existing methods in controlling flow, demonstrating robustness and adaptability across various flow conditions, which highlights its potential for practical applications.

Digital Sequence CPLD Technology Mapping Algorithm

  • Youn, Choong-Mo
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.131-135
    • /
    • 2007
  • In this paper, The proposed algorithm consists of three steps. In the first step, TD(Transition Density) calculation has to be performed. a CLB-based CPLD low-power technology mapping algorithm considered a Trade-off is proposed. To perform low-power technology mapping for CPLDs, a given Boolean network has to be represented in a DAG. Total power consumption is obtained by calculating the switching activity of each node in a DAG. In the second step, the feasible clusters are generated by considering the following conditions: the number of inputs and outputs, the number of OR terms for CLB within a CPLD. The common node cluster merging method, the node separation method, and the node duplication method are used to produce the feasible clusters. In the final step, low-power technology mapping based on the CLBs packs the feasible clusters. The proposed algorithm is examined using SIS benchmarks. When the number of OR terms is five, the experiment results show that power consumption is reduced by 30.73% compared with TEMPLA, and by 17.11 % compared with PLA mapping.

Input Time-Delay Compensation for a Nonlinear Control System

  • Choi, Yong-Ho;Chong, Kil-To
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.395-400
    • /
    • 2004
  • In most physical processes, the transfer function includes time-delay, and in the general distributed control system using computer network, there exists inherent time-delay caused by the spatial separation between controllers and actuators. This work deals with the synthesis of a discrete-time controller for a nonlinear system and proposes a new effective method to compensate the influence of input time-delay. The controller is synthesized by using input/output linearization. Under the circumstance that input time-delay exists, the system response has more overshoot and tends to diverge. For these reasons, the controller has to produce future input value that will be needed for the system. In order to calculate the future input value, some predictors are adopted. Using the discretization via Euler's method, numerical simulations about the Van der Pol system are performed to evaluate the performance of the proposed method.

  • PDF

Discussion On the Strategy for the Rail Transportation Recently Developed in Shanghai

  • Tan, Fuxing;Zhang, Quanfu;Weng, Meng-Xing
    • Proceedings of the KOR-KST Conference
    • /
    • 1996.06a
    • /
    • pp.131-137
    • /
    • 1996
  • This paper discusses the necessity, strategy and objectives of the rail transportation recently developed in Shanghai. The objective should not be regarded just as a term project, but should be taken as an urgent mission with the 21st century, Shanghai should possess a network of about 100km of rail transport lines. To this end, the following measures are suggested : grade separation of all lines on elevated structures ; developing the rail car industries ; full utilization of all available transportation facilities ; optimizing the use of the space resources of highways ; bringing into play the initiatives of all parties concerned. Recently, it has become a popular consensus that the development of high-speed, safe, punctual, comfortable, non-pollution rail transport with large capacity is the best and only solution to Shanghai urban transportation. In this respect, this dissertation deals with the development strategy for current Shanghai rail construction, together with the infractructure in Shanghai, positioning the developing target; meanwhile, some proposals and solutions to hit this target will be put forward for the reference of leaders and experts.

  • PDF