• Title/Summary/Keyword: 그램 로드

Search Result 188, Processing Time 0.024 seconds

A Study on the Utilization of Flood Damage Map with Crowdsourcing Data (크라우드 소싱 데이터를 적용한 홍수 피해지도 활용방안 연구)

  • Lee, Jeongha;Hwang, SeokHwan
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.310-310
    • /
    • 2022
  • 최근 통신의 발달로 인하여 웹(Web)상에는 다양한 데이터들이 실시간으로 생산되고 있으며 해당 내용은 다양한 산업에서 활용되고 있다. 특히 최근에는 재난과 관련 상황에서도 소셜 네트워크 서비스(SNS) 데이터가 활용되기도 하며 기존의 수치 계측 데이터가 아닌 하나의 센서 역할을 하는 개인의 비정형데이터의 업로드가 다양한 재난 모니터링 부분에 활용되고 있는 실정이다. 특히 홍수 등의 자연재해 발생 시 개개인의 업로드 한 웹 데이터에는 시간에 따른 인구의 유동성이나 간단한 위치 정보 등을 포함하여 실제 피해의 정도를 보다 빠르고 다양한 정보로 모니터링이 가능하다. 홍수 발생 시 일반적으로 활용하는 수문 데이터는 피해의 규모가 크게 예측되는 대하천 위주로 관측이 이루어지며 관측지역과 데이터의 양이 한정되어있어 비정형데이터를 함께 활용한 연구가 필요하다. 따라서 본 연구에서는 웹에 있는 비정형 데이터들을 추출해내는 웹 크롤러를 구성하고 해당 프로그램을 활용하여 추출한 데이터들에 대해 강우 사상과 공간적 패턴을 비교 분석하여 크라우드 소싱 데이터를 적용한 홍수 피해지도의 활용방안을 제시하고자 한다.

  • PDF

Design of Security RoadMap for C4I System (C4I 시스템 보안 로드맵 설계)

  • Lee, Gang-Taek;Lee, Dong-Hwi;Yang, Jae-Su;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.113-120
    • /
    • 2006
  • C4I system is the centerpiece of the military force. The system is an information based system which facilitates information grid, collection of data and dissemination of the information. The C4I system seeks to assure information dominance by linking warfighting elements in the battlespace to information network which enables sharing of battlespace information and awareness; thereby shifting concept of warfare from platform-centric paradigm to Network Centric Warfare. Although, it is evident that C4I system is a constant target from the adversaries, the issues of vulnerability via cyberspace from attack still remains. Therefore, the protection of C4I system is critical. The roadmap I have constructed in this paper will guide through the direction to protect the system during peace and war time. Moreover, it will propose vision, objectives and necessary supporting framework to secure the system from the threat. In order to fulfill these tasks, enhanced investments and plans from the Joint chief of Staff and Defense of Acquisition and Program Administration (DAPA) is critical; thereby enabling the establishment of rapid and efficient security system.

  • PDF

An Empirical Analysis of Influencer's Posting Strategies in Social Media (소셜미디어에서의 인플루언서 포스팅 컨텐츠 전략)

  • Kim, Sulim;Lee, Heeseok;Yang, Heedong
    • Knowledge Management Research
    • /
    • v.21 no.4
    • /
    • pp.41-57
    • /
    • 2020
  • This study investigates the posting strategies of influencers for sales: what kind of contents should the influencers provide and how? Influencers used to have seven days of advertising period before the event date (sales begins) and provide both (or either) commercial and (or) non-commercial contents. Some influencers have large number of followers, while others have very small followers. We empirically investigated whether the sequence of posting the commercial and non-commercial contents influence sales, and whether such effects are susceptible to the size of followers. Through the analysis of 1,153 events of 298 influencers on Instagram, we found that commercial contents are more important than non-commercial contents for both small and large influencers. In more detail, the quantity of commercial contents is very important for the large influencers, while the quality of commercial contents is important for small influencers.

Measurement and Analysis of P2P Traffic in Campus Networks Under Firewall (방화벽이 존재하는 캠퍼스 망에서의 P2P 트래픽 측정 및 분석)

  • Lee, Young-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.750-757
    • /
    • 2005
  • This paper reports on the study of P2P traffic behaviors in a high-speed campus network under a simple firewall which drops packets with default port numbers for the well-blown P2P applications. Among several ways of detecting P2P traffic, the easiest method is to filter out packets with the default port number of each P2P application. After deploying the port-based firewall against P2P-traffic, it is expected that the amount of P2P traffic will be decreased. However, during the eight-month measurement period, three new commercial P2P applications have been identified and their traffic usages have reached up to $30/5.6\%$ of the total outbound/inbound traffic volumes at the end of the measurement period. In addition, the most famous P2P application, eDonkey, has adapted and has escaped detection through port hopping. The measurement result shows that the amount of eDonkey traffic is around $6.7/4.0\%$ of the total outbound/inbound traffic volume. From the measurement results, it is observed that the port-based firewall is not effective to limit the usage of P2P applications and that the P2P traffic is steadily growing due to not only the evolution of existing P2P applications such as port hopping but also appearances of new P2P applications.

Instagram Users Behavior Analysis in a Digital Forensic Perspective (디지털 포렌식 관점에서의 인스타그램 사용자 행위 분석)

  • Seo, Seunghee;Kim, Yeog;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.407-416
    • /
    • 2018
  • Instagram is a Social Network Service(SNS) that has recently become popular among people of all ages and it makes people to construct social relations and share hobbies, daily routines, and useful information. However, since the uploaded information can be accessed by arbitrary users and it is easily shared with others, frauds, stalking, misrepresentation, impersonation, an infringement of copyright and malware distribution are reported. For this reason, it is necessary to analyze Instagram from a view of digital forensics but the research involved is very insufficient. So in this paper, We performed reverse engineering and dynamic analysis of Instagram from a view of digital forensics in the Android environment. As a result, we checked three database files that contain user behavior analysis data such as chat content, chat targets, posted photos, and cookie information. And we found the path to save 4 files and the xml file to save various data. Also we propose ways to use the above results in digital forensics.

Design and Implementation of Network Fault-Tolerant Application Software Streaming (네트워크 고장감내 소프트웨어 스트리밍 기술의 설계 및 구현)

  • Shim, Jeong-Min;Kim, Won-Young;Choi, Wan
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.10
    • /
    • pp.126-133
    • /
    • 2006
  • Application software streaming is a virtualization technology that enables users to use applications without installation on her/his computer. With application streaming service, a client immediately starts and uses the application as if it were installed. The application can be executed while executable codes for the application may still be streamed. Since the software streaming is based on networks, its service is affected by network failures. Network failures may cause the streamed application to stop, and to make it worse, also the system may crash because executable codes for the application can't be streamed from the streaming server. Using the Pareto principle (80 vs. 20 rule), users can be served continuously with the minimum functions that are frequently used, pre-fetched and cached if we provide a more intelligent and fault-tolerant streaming technique. This paper proposes the concept and technique named Evergreen. Using the Evergreen technique, users can continue using the streamed application while a network failure occurs, although user can access only the streamed code. We also discuss the implementation of Evergreen technique in details.

  • PDF

On the Implementation of the Multiple Service for the Smart Card Application Programs (스마트카드 응용프로그램의 다중 서비스 기법 구현에 관한 제안)

  • 김시관;임은기
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.1
    • /
    • pp.69-76
    • /
    • 2004
  • Recently, smart cards with multi-applications loaded are becoming popular owing to many advantages. As many casual users would like to reduce the number of plastic cards, and card issuers want to upgrade the existing applications or add the new applications, and developers wish to reduce the development turn-around time, multi-applications smart cards are becoming important. In addition, many advantages exist between the business partners as smart card applications can share critical information. New operating systems such as JavaCard and MULTOS are suggested for the multi-applications smart card service recently. In this paper, after we review the principles of operations of smart card, we propose the various security mechanisms for the multi-application JavaCard service environment, which is becoming de facto standard in the industry.

  • PDF

A Combination Study on the Elevation Motion Friction Compensation Parameters in Gas Spring (1) (가스 스프링 Elevation 동작 마찰력 보상 변수 조합 연구 (1))

  • Lee, Jeong-Ick
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.657-666
    • /
    • 2017
  • In this study, factor analysis was performed to reduce the friction in the elevation motion of a stand for a 50-inchtelevision. Pipe type cross-section control was used for accurate positioning control of the piston rod. The pipe type was also compared with a labyrinth-type crosssection for the orifice. The frictional force was then reduced using gas seal lip technology. Specifications were chosen, and a volume compensation experiment was carried out using an apparatus for compensating the volume of the cylinder, which is compressed by the volume of the piston rod. Based on CAE and experimental considerations, the labyrinth-type orifice is preferred for reducing friction. For the gas seal lip technology, outer and inner diameters of ${\Phi}20$ and ${\Phi}8$ for the hollow rod were more appropriate when assuming the weight of a 50-inch television to be 30kgf. The third is that the result of total consideration in stability problem and performance of volume compensation for specification decision and volume compensation experiment is determined the final speculation of hollow rod ?8x?4 and riveting system. The last is that the labyrinth orifice is not founded that of the ${\O}0.4{\sim}0.6$ orifice both tests on 300 mm intervals.

Design and Implementation for DC Motor controller Using Embedded Target (Embedded Target을 이용한 DC Motor제어가 설계 및 구현)

  • Shin, Wee-Jae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.13 no.1
    • /
    • pp.56-62
    • /
    • 2012
  • This paper presents design and implementation of the speed controller for DC motor system using Embeded Target for TI C2000 DSP library in Matlab/Simulink is introduced. Speed controller are easily design and implemented by using the Matlab/Simulink program. Feedback of motor speed is processed through eZdsp F2812 AID converter using encoder and pulse meter as speed sensor. Real-time program of controller is drawn using Simulink and converted program code for speed control of P control, PID control and parameter estimation base adaptive control is downloaded into the TI eZdsp 2812 board. Experiments were carried out to examine validity of speed response for implemented controllers. And even if controlled plant becomes alteration studied controller design and implementation easily method.

Internet Mornitoring with Wind-Photovoltaic Power Hybrid System (풍력-태양광 복합발전 시스템의 인터넷 모니터링)

  • Yang, Si-Chang;Moon, Chae-Joo;Chang, Young-Hak;Lim, Jung-Min;Kim, Eui-Sun
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2005.11a
    • /
    • pp.305-308
    • /
    • 2005
  • 풍력 및 태양에너지는 기존의 화력, 수력, 원자력 발전 등을 대신할 친환경적이고 공해가 없으며 양적으로도 무한한 대체 에너지원이다. 계절적인 기상변화 특성을 이용하여 풍력 발전 시스템과 태양광발전 시스템을 상호 보완시킴으로써 안정적인 전력 공급과 에너지이용 효율의 향상을 꾀할 수 있는 풍력-태양광 복합발전 시스템에 대한 관심이 고조되고 있다. 본 연구에서는 이러한 복합 발전 시스템을 효율적이고 안정적으로 운용하기 위하여 시스템의 각종 데이터들을 수집, 분석하고 파일로 저장하며 이를 인터넷을 이용하여 원격에서도 모니터링 할 수 있는 시스템을 구축한다. 여러 가지 교류와 직류의 전압, 전류들을 비롯한 풍속, 조도, 온도 등의 물리량을 측정하기 위하여 여러 형태의 변환기를 사용하였고 신호 조절 회로를 구성하였다. 데이터 수집 보드(DAQ)를 이용하여 컴퓨터로 데이터들을 읽어 들였으며, 시스템 운용을 위한 서버 프로그램과 이를 원격지에서 실시간 모니터링 및 저장된 데이터들을 다운로드 할 수 있는 클라이언트 프로그램을 작성하였다. 측정된 데이터를 시간, 기상 등의 여러 조건과 연관하여 분석하였다.

  • PDF