• Title/Summary/Keyword: system deployment

Search Result 878, Processing Time 0.036 seconds

Development of a Nutrient Budget Model for Livestock Excreta Survey (가축분뇨실태조사를 위한 양분수지 산정 모델 개발)

  • Kim, Deok-Woo;Ryu, Hong-Duck;Lim, Do Young;Chung, Eu Gene;Kim, Yongseok
    • Journal of Korean Society on Water Environment
    • /
    • v.33 no.6
    • /
    • pp.769-779
    • /
    • 2017
  • Nutrient (i.e., nitrogen and phosphorus) budgets are required under a 'Livestock Excreta Survey'. A nutrient budget is one of the agri-environmental indicators that calculates the difference between the inputs and outputs of the amount of nutrients within a certain boundary and for a certain time period (e.g., 1 year). In this study, a nutrients budget model was developed to effectively determine the surplus of nutrients within a region in Korea. The C# program language was used in order to facilitate the deployment of a graphical user interface (GUI) and to enhance compatibility. Also, the model was developed on Windows OS, which is the commonly used operating system in Korea. The model was based on the OECD/Eurostat nutrient budget method, and it was modified to consider manure composting procedures as well. There are key features of the nutrient budget model, including directly use of the original data sets from various input and output sources, and a collectively exchange of the address in different formats. The model can quickly show the results of various spatial and temporal resolutions with the same data, as well as perform a sensitivity analysis with coefficients and easily compareresults using tables and graphs. Further, it would be necessary to study the extension of the scope of utilization, such as the application of various nutrient budget methods. It would also be helpful to investigate both pre and postprocessing information such as linking input data through online systems.

A Study on the Process of Constructing a Long-Term Railway Network Plan (장기철도망 구축계획의 구축과정에 관한 연구)

  • Seo, Kwang Seok
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.3
    • /
    • pp.267-275
    • /
    • 2012
  • Long-term national railway building comprehensive review of the proposal had 100 in railway history, railway rail network plan. Planning routes for establishing a plan, but, considering the rail network, the plan was that could with the very important meaning in the What more economical route considering the costs and benefits of building a rail network under budget constraints, went through the process of background lines of business unit interval expenses to adopt a business unit interval. Especially in building the railway network, as well as the road plan was to reflect in order to build for the future railway facilities was secured examine the possibility of possible budget commitment. Budget of securing the transportation tax, gasoline tax, and other transportation facilities in order to secure and commit the current funding approach and Review Bodu possible budget scenarios based on it written. Was also enforce rail system built in reviewing the demand more than anything that can take advantage of the railway distance by railway and the merits of the competition means to compete in the form of the assumed situation. The rail network deployment plan, considering this was discussed, based on the results of the plan to establish the first annual or period of the plan change was based on the budget that was unknown.

A Rogue AP Detection Method Based on DHCP Snooping (DHCP 스누핑 기반의 비인가 AP 탐지 기법)

  • Park, Seungchul
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.11-18
    • /
    • 2016
  • Accessing unauthorized rogue APs in WiFi environments is a very dangerous behavior which may lead WiFi users to be exposed to the various cyber attacks such as sniffing, phishing, and pharming attacks. Therefore, prompt and precise detection of rogue APs and properly alarming to the corresponding users has become one of most essential requirements for the WiFi security. This paper proposes a new rogue AP detection method which is mainly using the installation information of authorized APs and the DHCP snooping information of the corresponding switches. The proposed method detects rogue APs promptly and precisely, and notify in realtime to the corresponding users. Since the proposed method is simple and does not require any special devices, it is very cost-effective comparing to the wireless intrusion prevention systems which are normally based on a number of detection sensors and servers. And it is highly precise and prompt in rogue AP detection and flexible in deployment comparing to the existing rogue AP detection methods based on the timing information, location information, and white list information.

Deployment of Network Resources for Enhancement of Disaster Response Capabilities with Deep Learning and Augmented Reality (딥러닝 및 증강현실을 이용한 재난대응 역량 강화를 위한 네트워크 자원 확보 방안)

  • Shin, Younghwan;Yun, Jusik;Seo, Sunho;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.69-77
    • /
    • 2017
  • In this paper, a disaster response scheme based on deep learning and augmented reality technology is proposed and a network resource reservation scheme is presented accordingly. The features of deep learning, augmented reality technology and its relevance to the disaster areas are explained. Deep learning technology can be used to accurately recognize disaster situations and to implement related disaster information as augmented reality, and to enhance disaster response capabilities by providing disaster response On-site disaster response agent, ICS (Incident Command System) and MCS (Multi-agency Coordination Systems). In the case of various disasters, the fire situation is focused on and it is proposed that a plan to strengthen disaster response capability effectively by providing fire situation recognition based on deep learning and augmented reality information. Finally, a scheme to secure network resources to utilize the disaster response method of this paper is proposed.

Proxy Server Providing Multi-level Privileges for Network Cameras on the Video Surveillance System (CCTV 대체용 네트워크 카메라의 보안 강화를 위한 다중 접근권한 프락시 서버 구현)

  • Bae, Kwang-Jin;Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.123-133
    • /
    • 2011
  • This paper introduces security problems on the video surveillance systems where the network cameras are equipped at remote places and isolated from the updated and secure environment and proposes a framework for a proxy server that is delegated to connect to network cameras by providing a secure connections from the clients. The server in the framework is deployed within a secure network, secretes the information for connection to cameras and authenticates the clients. Additionally, it provides a secure video service incorporating multi-level privileges for both images and clients through a encryption key distribution and management facility. Through an implementation of the server and a its deployment, it was proved that In this server implement to multi network camera and we confirm compare direct access to network camera equal video quality of service and it can be protection network camera. We expect that can be secure and integral management about traditional network camera through experimental result.

Relay Position in Decode-and-Forward Relay Systems to Achieve Full Diversity Gain (최대 다이버시티 이득을 얻기 위한 복호 후 전달 (Decode-and-Forward) 릴레이 시스템의 위치에 관한 연구)

  • Kwak, Kyung-Chul;Seo, Woo-Hyun;Hong, Dae-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1260-1266
    • /
    • 2007
  • Error propagation of source-relay (S-R) link limits the performance of decode-and-forward (DF) relay and prohibits DF relay from achieving full diversity gain. In order to solve this problem, the proposed deployment strategy focuses on two objectives. One is to achieve full diversity gain, and the other is to minimize the used power of the DF relay system. In order to achieve full diversity, the error probability of S-R link should be lower than that of maximal ratio combining (MRC) at destination without error propagation since the error probability of the weaker link dominates the total error probability. The proposed strategy of relay positioning points out the range of the relay position for achieving full diversity, and the used power of the relay is minimized by this range. Analysis of error probability and simulation results prove that the two objectives are achieved by the proposed strategy of the relay position.

Quality Strategy for Building a Smart Factory in the Fourth Industrial Revolution (4차 산업혁명시대의 스마트 팩토리 구축을 위한 품질전략)

  • Chong, Hye Ran;Bae, Kyoung Han;Lee, Min Koo;Kwon, Hyuck Moo;Hong, Sung Hoon
    • Journal of Korean Society for Quality Management
    • /
    • v.48 no.1
    • /
    • pp.87-105
    • /
    • 2020
  • Purpose: This paper aims to propose a practical strategy for smart factories and a step-by-step quality strategy according to the maturity of smart factory construction. Methods: The characteristics, compositional requirements, and diagnosis system are examined for smart factories through theoretical considerations. Several cases of implementing smart factory are studied considering the company maturity level from the aspect of the smartness concept. And specific quality techniques and innovation activities are carefully reviewed. Results: The maturity level of smart factory was classified into five phases: 1) ICT non-application, 2) basic, 3) intermediate 1, 4) intermediate 2, 5) advanced level. A five-step quality strategy was established on the basis of case studies; identify, measure, analyze, optimize, and customize. Some quality techniques are introduced for step-by-step implementation of quality strategies. Conclusion: To build a successful smart factory, it is necessary to establish a quality strategy that suits the culture and size of the company. The quality management strategy proposed in this paper is expected to contribute to the establishment of appropriate strategies for the size and purpose of the company.

Simulator for Performance Analysis of Wireless Network based on Microsoft Windows Operating Systems (MS 윈도우즈 운영체제 기반의 무선 네트워크 성능 분석 시뮬레이터의 설계 및 구현)

  • Choi, Kwan-Deok;Jang, Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.155-162
    • /
    • 2010
  • To ensure accurate measurements of wireless network performance, it should be collected real-time data which are transmitted between a large number of nodes in the actual network environment. Therefore, it is necessary to develop simulation tool for finding optimal network system design method such as media access control, routing technique, ad-hoc algorithm of node deployment while overcoming spatial and temporal constraints. Our research attempts to provide an improved architecture and design method of simulation tool for wireless network is an application of multi-threading technique in these issues. We finally show that usability of the proposed simulator by comparing results derived from same test environment in the wireless LAN model of our simulator and widely used network simulation package, NS-2.

ROLE OF PASSIVE SAFETY FEATURES IN PREVENTION AND MITIGATION OF SEVERE PLANT CONDITIONS IN INDIAN ADVANCED HEAVY WATER REACTOR

  • Jain, Vikas;Nayak, A.K.;Dhiman, M.;Kulkarni, P.P.;Vijayan, P.K.;Vaze, K.K.
    • Nuclear Engineering and Technology
    • /
    • v.45 no.5
    • /
    • pp.625-636
    • /
    • 2013
  • Pressing demands of economic competitiveness, the need for large-scale deployment, minimizing the need of human intervention, and experience from the past events and incidents at operating reactors have guided the evolution and innovations in reactor technologies. Indian innovative reactor 'AHWR' is a pressure-tube type natural circulation based boiling water reactor that is designed to meet such requirements, which essentially reflect the needs of next generation reactors. The reactor employs various passive features to prevent and mitigate accidental conditions, like a slightly negative void reactivity coefficient, passive poison injection to scram the reactor in event of failure of the wired shutdown systems, a large elevated pool of water as a heat sink inside the containment, passive decay heat removal based on natural circulation and passive valves, passive ECC injection, etc. It is designed to meet the fundamental safety requirements of safe shutdown, safe decay heat removal and confinement of activity with no impact in public domain, and hence, no need for emergency planning under all conceivable scenarios. This paper examines the role of the various passive safety systems in prevention and mitigation of severe plant conditions that may arise in event of multiple failures. For the purpose of demonstration of the effectiveness of its passive features, postulated scenarios on the lines of three major severe accidents in the history of nuclear power reactors are considered, namely; the Three Mile Island (TMI), Chernobyl and Fukushima accidents. Severe plant conditions along the lines of these scenarios are postulated to the extent conceivable in the reactor under consideration and analyzed using best estimate system thermal-hydraulics code RELAP5/Mod3.2. It is found that the various passive systems incorporated enable the reactor to tolerate the postulated accident conditions without causing severe plant conditions and core degradation.

The Characteristics to Establish Guidelines in History Textbooks (한국사 서술 방향의 '표준화' 시도와 그 문제점)

  • Choi, ByungTaek
    • Korean Educational Research Journal
    • /
    • v.38 no.1
    • /
    • pp.1-16
    • /
    • 2017
  • The third national curriculum had the characteristics to establish guidelines in history textbooks with the basic direction to implement the charter of national Education. At that time, the object of the history education was 'the harmony with the development of the individuals and national development' which was the same that the authorized government aimed at. But the characters and the purpose were repeated without any criticism. Since the third national curriculum was presented in Korean education, the aims of education proposed the 'Korean style democracy'. Essential aims of education are more important than any political issues because academic research is not reflected on nationalism. This trend which is flowing in the education of Korea was strengthened through the education authorities in the statements of 'Deployment of the Governing' or 'guidelines': Especially, the idea and the history education. Despite the curriculum has been amended several times, these problems are not to be gotten rid of. The recently revised curriculum guidelines for history textbook description should improve and find the way to develope the history thinking of students.

  • PDF