• Title/Summary/Keyword: 네트워크 점유율

Search Result 71, Processing Time 0.027 seconds

An Analysis of Transshipment Competitiveness of Container Cargoes in Incheon New Port (인천신항의 환적경쟁력 분석에 대한 연구)

  • Ahn, Woo-Chul;Yeo, Gi-Tae;Yang, Chang-Ho
    • Journal of Korea Port Economic Association
    • /
    • v.26 no.1
    • /
    • pp.20-42
    • /
    • 2010
  • This study is aimed at evaluating transshipment competitiveness of Incheon New Port which will open in 2013. For this reason, we used Conjoint Analysis(CA) for a methodology of this research as CA had been frequently adopted for empirical analysis of new container terminal in previous studies. We have provided the questionnaires to the stake holders of the port such as experts in Port Authority(PA), logistics companies, and terminal operators. The result showed that transshipment competitiveness of Incheon New Port was subordinate to transshipment costs and port costs of Busan and Shanghai. Overall, we hope this study could help draw up the policies on a New Port that will attract transshipment cargoes and set up marketing plan for an early settlement.

Performance Evaluation of WUSB over WBAN Communication Structure for Wireless Wearable Computers (무선 웨어러블 컴퓨터를 위한 WUSB over WBAN 통신 구조의 성능 분석)

  • Hur, Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.839-847
    • /
    • 2014
  • A recent major development in computer technology is the advent of the wearable computer system that is based on human-centric interface technology trends and ubiquitous computing environments. Wearable computer systems can use the wireless universal serial bus (WUSB) that refers to USB technology that is merged with WiMedia PHY/MAC technical specifications. In this paper, we focus on an integrated system of the wireless USB over the wireless body area networks (WBAN) for wireless wearable computer systems supporting U-health services. To construct the WUSB over WBAN communication systems, we propose a WBAN beaconing structure to assign WUSB communication periods. In the proposed structure, WUSB uses private periods of WBAN. In our performance evaluations, we compare theoretical results and simulation results about throughputs of WUSB under various WBAN channel occupations to evaluate the effectiveness of proposed structure in WUSB over WBAN communications.

An Empirical Study on Competitiveness of Busan Port on Attracting Transshipment Cargo (부산항 환적화물 분석에 유치를 위한 항만경쟁력 관한 실증연구)

  • Lee, Ki-Woong;Lee, Moon-Kyo;Bang, Hyo-Sik
    • International Commerce and Information Review
    • /
    • v.13 no.1
    • /
    • pp.97-120
    • /
    • 2011
  • Purpose of this study is to define competitiveness and attribution factors of Busan port on attracting high value added business such as transshipment cargo. Research finds condition to become optimal transshipment port comprises both internal and external circumstances. As for the internal circumstance, scale and location of the distripark as well as port facilities and the rates, for the external circumstance, international network and information technology on logistics managements are providing positive effects. Optimal plans to attract transshipment cargo should include, first, development of total logistics management system from port entry to unloading, transportation, processing, loading to departure. Second, assign port as free trade zone under customs law to attract foreign investment and goods traffic through tax exemption. Third, unless it is illegal, government needs to grant substantial freedom to shift capital for the foreign investors which will lead increase in cargo traffic and foreign investment.

  • PDF

IT 산업정책 성과와 2008년 추진방향

  • Seoul, Jeong-Sun
    • Information and Communications Magazine
    • /
    • v.25 no.1
    • /
    • pp.5-11
    • /
    • 2008
  • 우리 경제의 성장잠재력 저하에 대한 우려가 심화되는 상황에서 국민소득 2만불 시대 견인을 위해 2004년 수립한 IT 산업 발전전략이 IT839이다. 신성장동력 핵심기술 개발 등 IT839전략에 힘입어 세계 최초로 WiBro, DMB 기술개발과 국제표준화에 성공하는 등 IT분야 기술개발을 주도하여, 선진국과의 기술격차가 1년 이상 단축되었으며, 특히, 이동통신 DIV 분야는 미국, 일본 등 선진국 수준으로 경쟁력이 향상되는 성과를 보았다. 한편, 최근 IT를 둘러싸고 있는 환경은 IT를 기반으로한 융복합화 진전, 글로벌화 심화, 인터넷 확산과 웹의 진전이다. 2008년에는 이런 환경변화 속에서 IT산업의 지속적인 성장을 위한 전략을 수립.추진할 계획이다. 무선 융합환경에서 신시장 창출 및 선점, 고부가가치 IT산업의 집중 육성, IT중소기업, 핵심인력 양성 등 경쟁력 향상을 위한 기반 구축도 강화한다. IT R&D 정책은 기초 원천기술분야 R&D 투자비중을 확대하고, IT와 비IT융합 등 융합분야 기술개발 투자도 확대할 것이다. 혁신형 IT 중소기업 육성을 위해 민간 정책협력 네트워크인 IT전문협의회 운영을 개선하고, 중소기업의 원가절감을 위한 공통서비스 확대, 대 중소 기업의 상생협력을 제도화는 등 IT정책 인프라도 고도화한다. 또한, 반도체, 디스플레이 이후의 글로벌 주력품목군으로 IT SoC, u-센서, IT-BT-NT 융합분야 등 3대 핵심분야를 선정하여 집중 육성하고, 부품기업간 협업 활성화를 적극 유도할 것이다. 시장이 원하는 글로벌 수준의 인재양성을 목표로 공학교육인증 확산, IT 융합분야를 중심으로 대학의 R&D 지원도 강화하며, 전공역략을 갖춘 IT 전문인력, 석박사급 핵심 연구개발 인력, IT재직자 교육 등 시장이 원하는 맞춤형 인력양성도 병행 추진한다. 마지막으로 SW산업의 글로벌 경쟁력을 제고하고 신시장 창출을 위해 노력도 강화한다. 조선, 자동차 등 비 IT분야의 SW활용을 확산하기 위한 선도프로젝트를 추진하고, 틈새분야 중 세계적 시장점유율을 갖춘 중소기업 제품에 임베디드SW를 탑재하여 첨단기능을 구현하는 시범사업도 적극 추진할 계획이다.

(Effective Intrusion Detection Integrating Multiple Measure Models) (다중척도 모델의 결합을 이용한 효과적 인 침입탐지)

  • 한상준;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.397-406
    • /
    • 2003
  • As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of important data, has been raised. In the field of anomaly-based IDS several artificial intelligence techniques such as hidden Markov model (HMM), artificial neural network, statistical techniques and expert systems are used to model network rackets, system call audit data, etc. However, there are undetectable intrusion types for each measure and modeling method because each intrusion type makes anomalies at individual measure. To overcome this drawback of single-measure anomaly detector, this paper proposes a multiple-measure intrusion detection method. We measure normal behavior by systems calls, resource usage and file access events and build up profiles for normal behavior with hidden Markov model, statistical method and rule-base method, which are integrated with a rule-based approach. Experimental results with real data clearly demonstrate the effectiveness of the proposed method that has significantly low false-positive error rate against various types of intrusion.

Integrated Superstructure Design of Elastic Components to Improve the Track Performance (궤도의 성능향상을 위한 탄성구성요소로 통합된 상부구조 설계)

  • Kang, Bo Soon
    • Journal of the Korean Society for Railway
    • /
    • v.18 no.6
    • /
    • pp.578-585
    • /
    • 2015
  • Track elastic components can be technically and economically efficient when integrated well into track superstructure of a railway network. In such cases, the elastic rail pad is larger than a 800m radius curve provides smooth rail branching and allows for high-speed operation ($V{\geq}160km/h$). High track resistance causes the tamping intervals to stand out because the constantly increasing share of the sleeper pad further extends the increase of the tamping interval and the long grinding period; the engineering and construction of the small curve radius track provides some measures for reducing the solid sounds. Installation of elastic mats under the ballast can have a good effect, particularly in the context of protection against dust during construction or extensive renovation measures when laying new lines. However, such a process requires special attention and proper installation.

Implementing a Fuzzing Agent to Dectect Buffer Overflow Vulnerability (버퍼 오버플로우 취약점 탐지를 위한 퍼징 에이전트 구현)

  • Kim, Bong-Han
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.1
    • /
    • pp.11-17
    • /
    • 2021
  • If a vulnerability in the software connected to the network to obtain the user's privilege, a remote attacker could gain the privilege to use the computer. In addition, in a user environment in which an operating system for a specific series is used a lot, if a problem occurs in the operating system, considerable damage can occur. In particular, If an error is a security vulnerability, it can be a very big problem. Various studies have been conducted to find and respond to vulnerabilities in such a situation. Among various security technologies, the fuzzing technology is one of the most effective technologies to find errors in software. In this paper, I designed and implemented a fuzzing agent that can detect buffer overflow vulnerabilities that can occur in various applications. Through this fuzzing agent, application developers will be able to realize a more secure computing environment in which they can discover and fix vulnerabilities in their own applications.

Design and Implementation of a Hardware-based Transmission/Reception Accelerator for a Hybrid TCP/IP Offload Engine (하이브리드 TCP/IP Offload Engine을 위한 하드웨어 기반 송수신 가속기의 설계 및 구현)

  • Jang, Han-Kook;Chung, Sang-Hwa;Yoo, Dae-Hyun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.9
    • /
    • pp.459-466
    • /
    • 2007
  • TCP/IP processing imposes a heavy load on the host CPU when it is processed by the host CPU on a very high-speed network. Recently the TCP/IP Offload Engine (TOE), which processes TCP/IP on a network adapter instead of the host CPU, has become an attractive solution to reduce the load in the host CPU. There have been two approaches to implement TOE. One is the software TOE in which TCP/IP is processed by an embedded processor and the other is the hardware TOE in which TCP/IP is processed by a dedicated ASIC. The software TOE has poor performance and the hardware TOE is neither flexible nor expandable enough to add new features. In this paper we designed and implemented a hybrid TOE architecture, in which TCP/IP is processed by cooperation of hardware and software, based on an FPGA that has two embedded processor cores. The hybrid TOE can have high performance by processing time-critical operations such as making and processing data packets in hardware. The software based on the embedded Linux performs operations that are not time-critical such as connection establishment, flow control and congestions, thus the hybrid TOE can have enough flexibility and expandability. To improve the performance of the hybrid TOE, we developed a hardware-based transmission/reception accelerator that processes important operations such as creating data packets. In the experiments the hybrid TOE shows the minimum latency of about $19{\mu}s$. The CPU utilization of the hybrid TOE is below 6 % and the maximum bandwidth of the hybrid TOE is about 675 Mbps.

Analysis of Threats and Countermeasures on Mobile Smartphone (스마트폰 보안위협과 대응기술 분석)

  • Jeon, Woong-Ryul;Kim, Jee-Yeon;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.153-163
    • /
    • 2011
  • Smartphone is a mobile device which can perform better than feature phone. Recently, growth in demand for advanced mobile devices boasting powerful performance, market share of smartphone is increasing rapidly in mobile device market, for example, iphone and android phone. Smartphone can provide many functionalities, e-mail, scheduler, word-processing, 3D-game, and etc, based on its powerful performance. Thus, various secret information is integrated in smartphone. To provide service, sometimes, smartphone transmits informations to outside via wireless network. Because smartphone is a mobile device, user can lose his/her smartphone, easily, and losing smartphone can cause serious security threats, because of integrated information in smartphone. Also data which is transmitted in wireless network can be protected for privacy. Thus, in present, it is very important to keep secure smartphone. In this paper, we analyze threats and vulnerabilities of smartphone based on its environments and describe countermeasures against threats and vulnerabilities.

Design and Implementation of a Real-time Bio-signal Obtaining, Transmitting, Compressing and Storing System for Telemedicine (원격 진료를 위한 실시간 생체 신호 취득, 전송 및 압축, 저장 시스템의 설계 및 구현)

  • Jung, In-Kyo;Kim, Young-Joon;Park, In-Su;Lee, In-Sung
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.45 no.4
    • /
    • pp.42-50
    • /
    • 2008
  • The real-time bio-signal monitoring system based on the ZigBee and SIP/RTP has proposed and implemented for telemedicine but that has some problems at the stabilities to transmit bio-signal from the sensors to the other sides. In this paper, we designed and implemented a real-time bio-signal monitoring system that is focused on the reliability and efficiency for transmitting bio-signal at real-time. We designed the system to have enhanced architecture and performance in the ubiquitous sensor network, SIP/RTP real-time transmission and management of the database. The Bluetooth network is combined with ZigBee network to distribute traffic of the ECG and the other bio-signal. The modified and multiplied RTP session is used to ensure real-time transmission of ECG, other bio-signals and speech information on the internet. The modified ECG compression method based on DWLT and MSVQ is used to reduce data rate for storing ECG to the database. Finally we implemented a system that has improved performance for transmitting bio-signal from the sensors to the monitoring console and database. This implemented system makes possible to make various applications to serve U-health care services.