• Title/Summary/Keyword: 네트워크 위험도

Search Result 705, Processing Time 0.025 seconds

Risk Evaluation of Slope Using Principal Component Analysis (PCA) (주성분분석을 이용한 사면의 위험성 평가)

  • Jung, Soo-Jung;Kim, -Yong-Soo;Kim, Tae-Hyung
    • Journal of the Korean Geotechnical Society
    • /
    • v.26 no.10
    • /
    • pp.69-79
    • /
    • 2010
  • To detect abnormal events in slopes, Principal Component Analysis (PCA) is applied to the slope that was collapsed during monitoring. Principal component analysis is a kind of statical methods and is called non-parametric modeling. In this analysis, principal component score indicates an abnormal behavior of slope. In an abnormal event, principal component score is relatively higher or lower compared to a normal situation so that there is a big score change in the case of abnormal. The results confirm that the abnormal events and collapses of slope were detected by using principal component analysis. It could be possible to predict quantitatively the slope behavior and abnormal events using principal component analysis.

A Study on The Industrial Complex Disaster Surveillance and Monitoring System Using Drones (드론을 활용한 산업단지 재난감시 및 모니터링 시스템에 관한 연구)

  • Su-Ji Moon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.233-240
    • /
    • 2024
  • In this study, we introduce a system for real-time monitoring of field conditions within an industrial complex using a 5G network UAV (: Unmanned Aerial Vehicle). When a monitoring event occurs in a sensor mounted on a UAV (detection of fire, harmful gas, or industrial disaster type human accident), key information from the sensor is transmitted to the UAS (: Unmanned Aerial System) application server. As a result of this information transmission and processing, managers or operators of the Industrial Complex Corporation were able to secure legal basis data for fatal accidents, fires, and detection of harmful gases at sites within the Industrial Complex Corporation through trigger processing for each accident risk situation.

The Intergrated Information Systems for Frequently Flooded Area Using Internet GIS (Internet GIS를 이용한 상습침수지역 종합정보화 시스템)

  • Yeo, Woon-Ki;Jang, Kyung-Soo;Jun, Ji-Young;Jee, Hong-Kee;Lee, Soon-Tak
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.1116-1120
    • /
    • 2006
  • 하천주변 저지대에 주택이나 공장 등의 시설물 집중과 산지의 개발 및 인구 집중으로 인한 도시화 지역의 증가로 홍수 피해는 더욱 커지고 있다. 특히, 상습침수지구의 주민들은 항상 재해로부터 위험을 느끼고 있으므로 새로운 재해관리체계를 구축하여 이에 대한 확고한 대책이 필요하다. 최근 인터넷 사용의 증가로 많은 사용자들이 웹을 통해 다양한 데이터를 공유하고 있으며, 이러한 추세는 더욱 더 증가할 것이다. 인터넷은 다양한 정보를 네트워크를 통해 사용자에게 실시간으로 제공하고 있으며, 통신기술의 발전, 네트워크 통합화 속에서 그 내용과 방식이 더욱 다양해지고 있다. GIS분야에 있어서도 인터넷 네트워크를 이용하여 분산되어 있는 많은 조직이나 사용자들에게 그 기능과 서비스를 제공하는 추세로 바뀌고 있다. Internet GIS는 원격 지리정보 데이타에 대한 접근, 전송, 분석 및 GIS를 표현하는 수단으로 인터넷을 이용하는 특별한 GIS 도구이다. Internet GIS는 전통적인 GIS 소프트웨어가 가지고 있는 대부분의 기능은 물론 인터넷 및 그와 관련된 WWW 및 FTP 프로토콜의 장점을 가지는 부가적인 기능들을 포함할 수 있다. 이들 부가적인 기능은 원격 데이타 및 응용 프로그램의 교환, 지역 컴퓨터에 GIS 응용 프로그램 없이 GIS 분석 기능을 수행, 인터넷상에서 상호작용하는 지도 및 데이타를 표현하는 기능들을 포함한다. Internet GIS는 객체지향적이고 상호운영적이며, 분산적이라는 주요한 특징을 갖는다. 인터넷에서 각각의 GIS 데이타 및 기능성은 하나의 객체로서 서로 다른 서버에 위치하며 필요시 조합 또는 통합되어 운영된다. Internet GIS를 이용한 상습침수지구 지역정보 제공사이트를 구축하기 위해서는 인터넷으로 서비스 할 수 있는 인터넷용 상습침수지구 GIS기본도를 구축이 필요하다. 인터넷 서비스를 위한 상습침수지구 기본도는 또 다른 형태의 주제도라고 볼 수 있으며, 이를 구축하기 위해서는 자료변환 및 가공이 필요하다. 즉, 각 상습침수지구에 필요한 지형도는 국립지리원에서 제작된 1:5,000 수치지형도가 있으나 이는 자료가 방대하고 상습침수지구에 필요하지 않은 자료들을 많이 포함하고 있으므로 상습침수지구의 데이터를 인터넷을 통해 서비스하기 위해서는 많은 불필요한 레이어의 삭제, 서비스 속도를 고려한 데이터의 일반화작업, 지도의 축소.확대 등 자료제공 방식에 따른 작업 그리고 가시성을 고려한 심볼 및 색채 디자인 등의 작업이 수반되어야 하며, 이들을 고려한 인터넷용 GIS기본도를 신규 제작한다. 상습침수지구와 관련된 각종 GIS데이타와 각 기관이 보유하고 있는 공공정보 가운데 공간정보와 연계되어야 하는 자료를 인터넷 GIS를 이용하여 효율적으로 관리하기 위해서는 단계별 구축전략이 필요하다. 따라서 본 논문에서는 인터넷 GIS를 이용하여 상습침수구역관련 정보를 검색, 처리 및 분석할 수 있는 상습침수 구역 종합정보화 시스템을 구축토록 하였다.

  • PDF

Design and Performance Evaluation of the Secure Transmission Module for Three-dimensional Medical Image System based on Web PACS (3차원 의료영상시스템을 위한 웹 PACS 기반 보안전송모듈의 설계 및 성능평가)

  • Kim, Jungchae;Yoo, Sun Kook
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.3
    • /
    • pp.179-186
    • /
    • 2013
  • PACS is a medical system for digital medical images, and PACS expand to web-based service using public network, DICOM files should be protected from the man-in-the-middle attack because they have personal medical record. To solve the problem, we designed flexible secure transmission system using IPSec and adopted to a web-based three-dimensional medical image system. And next, we performed the performance evaluation changing integrity and encryption algorithm using DICOM volume dataset. At that time, combinations of the algorithm was 'DES-MD5', 'DES-SHA1', '3DES-MD5', and '3DES-SHA1, and the experiment was performed on our test-bed. In experimental result, the overall performance was affected by encryption algorithms than integrity algorithms, DES was approximately 50% of throughput degradation and 3DES was about to 65% of throughput degradation. Also when DICOM volume dataset was transmitted using secure transmission system, the network performance degradation had shown because of increased packet overhead. As a result, server and network performance degradation occurs for secure transmission system by ensuring the secure exchange of messages. Thus, if the secure transmission system adopted to the medical images that should be protected, it could solve server performance gradation and compose secure web PACS.

(A Study on the Control Mechanism for Network Survivability in OVPN over IP/GMPLS over DWDM) (DWDM기반의 OVPN에서 네트워크 생존성을 위한 제어 메커니즘 연구)

  • Cho Kwang-Hyun;Jeong Chang-Hyun;Hong Kyung-Dong;Kim Sung-Un
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.9 s.339
    • /
    • pp.85-96
    • /
    • 2005
  • A ' Virtual Private Network (YPN) over Internet' has the benefits of being cost-effective and flexible. However, given the increasing demands for high bandwidth Internet and for reliable services in a 'VPN over Intemet,' an IP/GMPLS over DWDM backbone network is regarded as a very favorable approach for the future 'Optical VPN (OVPN)' due to the benefits of transparency and high data rate. Nevertheless, OVPN still has survivability issues such that a temporary fault can lose a large amount of data in seconds, moreover unauthorized physical attack can also be made on purpose to eavesdrop the network through physical components. Also, logical attacks can manipulate or stop the operation of GMPLS control messages and menace the network survivability of OVPN. Thus, network survivability in OVPN (i.e. fault/attack tolerant recovery mechanism considering physical structure and optical components, and secured transmission of GMPLS control messages) is rising as a critical issue. In this Paper, we propose a new path establishment scheme under shared risk link group (SRLG) constraint for physical network survivability. And we also suggest a new logical survivability management mechanism by extending resource reservation protocol-traffic engineering extension (RSVP-TE+) and link management protocol (LMP). Finally, according to the results of our simulation, the proposed algorithms are revealed more effective in the view point of survivability.

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

A Case Study on the Community-based Elderly Care Services Provided by the Social Economy Network in Gwangjin-Gu, Seoul (사회적경제 조직의 지역사회 돌봄 네트워킹 가능성에 대한 비판적 고찰: 서울시 광진구 노인돌봄 클러스터 사례연구)

  • Kim, HyoungYong;Han, EunYoung
    • 한국노년학
    • /
    • v.38 no.4
    • /
    • pp.1057-1081
    • /
    • 2018
  • This study analyzed the case of elderly care cluster in Gwangjin-gu to explore the possibilities of social economy as a provider of community-based social services. Community-based means the approach by which community organizations build a voluntary and collaborative network to enhance collective problem-solving abilities. Therefore, it is very likely that the social economy that emphasizes people, labor, community, and democratic principles can contribute to community-based social services. This study analyzed social economic network by using four characteristics of social economy suggested by OECD community economy and employment program as an analysis framework. The results of this study are as follows: First, it is found that social economy would hardly supply community-based social services through network cooperation because of a large variation in community identity, investment to new product, and labor protection. Second, community users are not the consumers of the social economy and the products of the social economy stay in market products only for the organizations in social economy. In order to create good services that meet the needs of residents, community development approaches are required at the same time. The importance of community space where local residents and social economy meet is derived. Third, public support such as purchasing support has weakened the ecosystem of social economy by making the distinction between public economy and social economy more obscure. On the other hand, public investment in community infrastructure is an indirect aid to social economy to communicate with residents and to promote good supply and consumption. In the end, community-based social services need a platform where the social economy and the people meet. This type of public investment can create the ecosystem of the social economy.

A Study on Establishment of the Optimum Mountain Meteorological Observation Network System for Forest Fire Prevention (산불 방지를 위한 산악기상관측시스템 구축방안)

  • Lee, Si-Young;Chung, Il-Ung;Kim, Sang-Kook
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.8 no.1
    • /
    • pp.36-44
    • /
    • 2006
  • In this study, we constructed a forest fire danger map in the Yeongdong area of Gangwon-do and Northeastern area of Gyeongsangbuk-do using a forest fire rating model and geographical information system (GIS). We investigated the appropriate positions of the automatic weather station (AWS) and a comprehensive network solution (a system including measurement, communication and data processing) for the establishment of an optimum mountain meteorological observation network system (MMONS). Also, we suggested a possible plan for combining the MMONS with unmanned monitoring camera systems and wireless relay towers operated by local governments and the Korea Forest Service for prevention of forest fire.

Research on the influence of web celebrity live broadcast on consumer's purchase intention - Adjusting effect of web celebrity live broadcast contextualization

  • Zou, Ji-Kai;Guo, Han-Wen;Liu, Zi-Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.239-250
    • /
    • 2020
  • The purpose of this paper is to explore the influence of the "contextualization" effect of web celebrity live broadcast on the e-commerce platform on consumers' perception of product value, risk and purchase intention. Live in this paper, using Taobao shopping consumers as the research object, the survey method, questionnaire survey is adopted, the form through the questionnaire and distributed network, a live in order to further validation of web celebrity effect of contextualized actual influence on consumer purchase intention, questionnaire design the Likert scale, seven and recycling questionnaire analysis using the statistical software SPSS 23.0 and AMOS 22.0 after processing the data. After determining the reliability and validity of the questionnaire, the exploratory factor analysis was used to verify the hypothesis and calculate the actual adjustment degree of the "contextualization" effect of web celebrity live broadcasting on consumers' purchase intention. The research results of this paper are summarized as follows :(1) consumers' perceived value of products can significantly positively affect their purchase intention, while perceived risk has a significantly negative impact on their purchase intention; (2) consumers' trust and purchase intention to products are regulated by the "contextualization" of web celebrity live broadcast. Specifically, for web celebrity live broadcasting with good "contextualization" effect, the perceived value of consumer products has a positive impact on product trust, which is higher than that of web celebrity live broadcasting with poor "contextualization" effect. In terms of resolving consumers' perceived risks to products, web celebrity live broadcast with good "contextualization" effect is also significantly better than web celebrity live broadcast with poor "contextualization" effect. Based on empirical analysis, this paper concludes that web celebrity live broadcasting will become a new breakthrough for the sustainable growth of the e-commerce industry, and puts forward Suggestions on the e-commerce marketing mode and the transformation of web celebrity live broadcasting industry.

A Study on Application Design Scenarios for the Gas Safety Field Workers -focused on the pipe work- (가스 작업 안전 앱 시나리오 설계에 대한 연구 -배관 작업을 중심으로-)

  • Lee, Jooah;Kim, Mi-Hye;Kang, Bong Hee
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.273-281
    • /
    • 2016
  • The issue about the safety management of gas related work has been studied toward a direction to utilize IoT system recently. For this purpose, the matters of user's demand has been deduced through the literature survey, field survey, and professional consultation, by studying the characteristics of worker, work, and work site. In summary, these are the demands for mobile App, 1)a clear arrangement of contents, 2)a design with high readability, 3)a design with low death, 4) securing of user's accessibility, 5)an effective information transmission plan in the work section where it is impossible to operate the mobile device, 6)an activation of alarm function at the section of high working error, 7)a fast two-way transmission and receipt of safety inspection matter needed at work, 8)a selection of images and contents that can guide the situation to the worker in case of accident, 9)an alarm function for the degree of danger in an area of worker's location. Based on these, a basic design of safety application for gas related work has been proposed, that can secure the user accessibility.