• Title/Summary/Keyword: 네트워크 위험도

Search Result 705, Processing Time 0.025 seconds

Tracing the Evolution of the Global Production Network Discourse: An Alternative to the Firm- and Industry-Centered Governance Analysis (글로벌 생산네트워크 담론의 진화: 기업 및 산업 중심 거버넌스 분석을 넘어서)

  • Lee, Jae-Youl
    • Journal of the Korean Geographical Society
    • /
    • v.51 no.5
    • /
    • pp.667-690
    • /
    • 2016
  • This paper reviews the evolution process of global production network(GPN) discourse, from its origin to the recent theorization, namely GPN 2.0. In so doing, the discursive formation of global production networks is introduced in comparison with a competing discourse global commodity/value chains, with particular attention to conceptual and analytical lacunae in the latter. This article also outlines how the global production network perspective has become a useful discursive and practical tool that allows the examination of the nexus of global economy, transnational corporations, and regional development. Subsequently, a theoretical dearth in the approach is discussed in reference to key critiques, and in this context Yeung and Coe's recent theorization GPN 2.0, which is centered on casual mechanisms and network configurations is reviewed. This paper suggests that the theory adequately addresses the problem of casuality lacking in its precedented conceptual framework, and that it helps exploring the formation and evolution processes of varied production networks(including intrafirm coordination, interfirm control, strategic partnership, and extrafirm bargaining) in connection with competitive dynamics and risky environments. As a result of the theorization, the difference between GPN and the chain approaches has become more apparent, and the idea of extrafirm bargaining is particularly important in the differentiation. Extrafirm bargaining is seen to be a comprehensive networking form inclusive of such GPN 1.0 analytical concepts as value, embeddeness, and power, and research attentive to, and engaging with, the extrafirm networks is expected to help transcending the chain governance approaches' analytical excess of interfirm linkages and industry-centeredness.

  • PDF

Artificial Intelligence Estimation of Network Flows for Seismic Risk Analysis (지진 위험도 분석에서 인공지능모형을 이용한 네트워크 교통량의 예측)

  • Kim, Geun-Young
    • Journal of Korean Society of Transportation
    • /
    • v.17 no.3
    • /
    • pp.117-130
    • /
    • 1999
  • Earthquakes damage roadway bridges and structures, resulting in significant impacts on transportation system Performance and regional economy. Seismic risk analysis (SRA) procedures establish retrofit priorities for vulnerable highway bridges. SRA procedures use average daily traffic volumes to determine the relative importance of a bridge. This research develops a cost-effective transportation network analysis (TAN) procedure for evaluating numerous traffic flow analyses in terms of the additional system cost due to failure. An important feature of the TNA Procedure is the use of an associative memory (AM) approach in the artificial intelligence held. A simple seven-zone network is developed and used to evaluate the TNA procedure. A subset of link failure system states is randomly selected to simulate synthetic post-earthquake network flows. The performance of different AM model is evaluated. Results from numerous link-failure scenarios demonstrate the applicability of the AM models to traffic flow estimation.

  • PDF

Unknown Threats Detection by Using Incremental Knowledge Acquisition (상황 지식 축적에 의한 알려지지 않은 위협의 검출)

  • Park, Gil-Cheol;Cooke, Hamid B. M.;Kim, Yang-Sok;Kang, Byeong-Ho;Youk, Sang-Jo;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.19-27
    • /
    • 2007
  • Detecting unknown threats is a paradox ; how do you detect a threat if it is not known to exist? The answer is that unknown threat detection is the process of making a previously unknown threat identifiable in the shortest possible time frame. This paper examines the possibility of creating an unknown threat detection mechanism that security experts can use for developing a flexible protection system for networks. A system that allows the detection of unknown threats through monitoring system and the incorporation of dynamic and flexible logics with situational knowledge is described as well as the mechanisms used to develop such a system is illustrated. The system not only allows the detection of new threats but does so in a fast and efficient manner to increase the available time for responding to these threats.

  • PDF

Suitability Assessment for Flood Disaster Shelters of Jinju City (진주시 홍수재해용 대피소 적합성 평가)

  • Yoo, Hwan Hee;Son, Se Ryeon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.20 no.3
    • /
    • pp.91-99
    • /
    • 2012
  • Jinju city is operating by selecting 8 places as the flood inundation risk area and by designating shelters on this area targeting districts damaged by typhoon and heavy rain, in the past. This study selected the research area as Nabul district and Sangpyeong district where are located in the town and that has high population density out of districts with inundation risk. The network analysis of GIS was applied to the suitability assessment on location of shelter by calculating the moving speed and the arriving time after dividing it into children, general adults, and aged people in consideration of the evacuation condition in inundation disaster. As a result, it was indicated that optimal evacuation plan time for children and aged people exceeded in getting to the shelter because of evacuation time excess and that even general adults outrun the prescribed evacuation time in some districts. Accordingly, a problem for evacuation time was improved by additionally designating 1-2 shelters to existing shelters in Nabul and Sangpyeong districts. A countermeasure is needed to reduce life and property damage in disaster occurrence by implementing the evacuation warning and the age-based evacuation plan more specifically in the future.

A Design of Risk-Based Security Threat Assessment Process for Fighter-Aircraft Airworthiness Security Certification (전투기 감항 보안 인증을 위한 위험기반 보안위협 평가 프로세스 설계)

  • Kim, Hyunju;Kang, Dongsu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.223-234
    • /
    • 2019
  • Cyber attacks are an important factor that determines the victory and defeat of Network-centric wars in which advanced weapon systems are highly interlinked. In addition the increasing dependability on software as its develop as the latest fighter is demanding enhanced security measures for fighter software to Cyber attacks. In this paper, we apply the DO-326A, which is an airworthiness security certification standard, to design a risk-based security threat assessment process by reflecting characteristics and operational environment of fighter aircraft. To do this, we add the following steps in security threat assessment stage of DO-326A's airworthiness security certification process. First, we derive security threats of fighter. And then, we scored the security threat in terms of possibility and impact on the fighter. Finally, we determine the security risk severity.

Generating GAN-based Virtual data to Prevent the Spread of Highly Pathogenic Avian Influenza(HPAI) (고위험성 조류인플루엔자(HPAI) 확산 방지를 위한 GAN 기반 가상 데이터 생성)

  • Choi, Dae-Woo;Han, Ye-Ji;Song, Yu-Han;Kang, Tae-Hun;Lee, Won-Been
    • The Journal of Bigdata
    • /
    • v.5 no.2
    • /
    • pp.69-76
    • /
    • 2020
  • This study was conducted with the support of the Information and Communication Technology Promotion Center, funded by the government (Ministry of Science and ICT) in 2019. Highly pathogenic avian influenza (HPAI) is an acute infectious disease of birds caused by highly pathogenic avian influenza virus infection, causing serious damage to poultry such as chickens and ducks. High pathogenic avian influenza (HPAI) is caused by focusing on winter rather than year-round, and sometimes does not occur at all during a certain period of time. Due to these characteristics of HPAI, there is a problem that does not accumulate enough actual data. In this paper study, GAN network was utilized to generate actual similar data containing missing values and the process is introduced. The results of this study can be used to measure risk by generating realistic simulation data for certain times when HPAI did not occur.

Real-time Reservoir Dam Status Evaluation System Using Wireless Sensor Network System (무선 센서 네트워크 시스템을 이용한 실시간 저수지 댐의 상태평가 시스템)

  • Yoo, Chanho;Kim, Seungwook;Hwang, Jungsoon;Na, Gihyuk;You, Kwangho
    • Journal of the Korean GEO-environmental Society
    • /
    • v.19 no.12
    • /
    • pp.41-46
    • /
    • 2018
  • The wireless sensor network system has the advantage of confirming the behavior of the entire facility by improving the disadvantages of conventional monitoring system. As a result, it is widely proposed as safety diagnosis and measurement of structures, water management systems, and management systems for dam structures. However, there is a lack of research that can evaluate the condition of facilities such as safety at the same time as monitoring. In this study, it is proposed a wireless sensor network system which can evaluate the behavior characteristics of facilities and evaluate the safety status for improving the technical disadvantages on conventional monitoring system. The geotechnical risk factors for the reservoir dam facility were evaluated and the limit values for the risk factors causing the failure of the facility were set. In other words, the system was set up so that the risk factors can be measured and the limit status can be evaluated immediately for each factor. In this study, numerical analysis is carried out for seepage and slope stability analysis using the typical cross section for reservoir dams. The stress-porewater coupling finite difference numerical analysis is performed for establishing the limit displacement for reservoir dam structures. It is developed a system that can estimate the time to reach the critical value by regression analysis using the measured datas.

Improved Trilateration Method on USN for reducing the Error of a Moving Node Position Measurement (무선센서네트워크에서 삼변측량법 기반 이동노드 위치 오차를 줄이는 탐색기법)

  • Mun, Hyung-Jin;Jeong, Hee-Young;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.301-307
    • /
    • 2016
  • The location measurement technique of moving worker in dangerous areas, is necessary for safety in the mines, basements, warehouses, etc. There are various measurement techniques about moving node of position in a restricted environment. Trigonometric Method, one of measurement techniques, is commonly used because of its easiness. However, errors occur frequently when measuring distance and position due to radio interference and physical disability with measuring instruments. This paper proposed a method which is more accurate and shows reduced margin of error than existing trigonometric method by recalculating distance between Anchor and moving node with various measuring instruments. By adding Anchor when calculating distance and position of moving node's estimated point, suggested technique obtains at least 41% efficiency compared to existing method.

Development of WSN(Wireless Sensor Network)-based Fire Monitoring Application System using Fire Detection Algorithm for Early Warning (조기 경보를 위한 화재 판단 알고리즘을 이용한 무선 센서네트워크 기반 화재 감시 응용 시스템 설계 및 구현)

  • Kim, Ah-Reum;Jo, Kyoung-Jin;Chang, Jae-Woo;Sim, Chun-Bo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.504-514
    • /
    • 2009
  • Recently, fire monitoring application systems have been an active research area due to the safety of industries, historical monuments and so on. The fire monitoring application systems can reduce the damage of properties by providing earlier warning for possible fire situation. However, the existing systems have a drawback that they detect fire with delay due to their uniform epoch in fire detection algorithm. Moreover, they do not provide user-friendly graphical user interfaces in their fire monitoring systems. To resolve the problems, First, we propose a new fire detection algorithm (Early Fire Detection Fire Algorithm) which uses the distribution of sensing data for early fire detection. Our fire detection algorithm is better in terms of fire detection time than the existing work because it can set a start time of fire detection epoch dynamically based on data distribution. Second, we develop a fire monitoring application system which provides users with both a user-friendly graphical user interface and a fire alarm message when fire occurs. Finally, we show from our experiment that our developed system is effectively used for early fire warning in a variety of fire situations.

Diffusion of Innovations for Bio-technology Ventures (생명공학 혁신의 시장확산 -Venture 기업을 중심으로-)

  • Lee, Kyu-Hyun
    • Journal of Global Scholars of Marketing Science
    • /
    • v.8
    • /
    • pp.515-535
    • /
    • 2001
  • This paper begins with investigation of the race to unlock human DNA, and investigates the emergent areas of bio-technological innovations. This paper draws upon basic ideas from the research traditions of the diffusion of innovations in the competitive situations. To achieve the succesful diffusion of bio-technological innovations, following issues are suggested; clusters, alliances competence, core competence, consumer resistance, chasm phenomena, qualitative research, social network, and cross-culture. The better understanding of the diffusion of bio-tech innovations with empirical studies can complement research on the diffusion of bio-technological innovations and help in the development of a universal model for diffusion of high technological innovations.

  • PDF