• Title/Summary/Keyword: 대응 지능화

Search Result 161, Processing Time 0.027 seconds

Characteristics of Wireless Distributed Communication System under the Overlay Convergent Networks (중첩 융합 네트워크에서 분산 무선 통신 시스템의 특성)

  • Cheon, EunJi;Kim, Jeong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.11
    • /
    • pp.986-992
    • /
    • 2012
  • In order to support quickly increasing mobile traffic and deal with various types of users of wireless mobile systems under overlay convergent cognitive networking environments, it is highly required to improve the performance and the capability of the wireless access networks. With distributed antennas and distributed processors, it is possible for mobile terminals (MTs) to monitor interference and control system effectively to minimize mutual interference among users and cells. Virtual cell changes as the MT moves or the environment changes, so no handoff is needed in connections with base station hotelling. In this paper, the characteristics of wireless distributed systems under the overlay convergent networks will be investigated.

A Study on the Necessity of the Introduction of Professional Certification System for Financial Security (금융보안 전문 자격제도 도입 필요성에 관한 연구)

  • Jung, Hee-Hyoung;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.209-218
    • /
    • 2017
  • In order to efficiently and preemptively respond to financial security threats that are becoming more sophisticated and intelligent, and to enable financial users to receive financial services safely, financial information security professionals are needed. However, as of 2015, the number of financial IT security personnel was 4.9%, which is slightly lower than the previous year, but still low. In this study, it is expected that the number of experts in financial security will increase gradually. In order to verify the minimum performance of financial security professionals and enhance the security consciousness, the subjects of the existing security qualification system, Curriculum and inspection techniques to analyze the necessity of introducing information security specialization specialized in financial sector.

Performance Modeling of STTC-based Dual Virtual Cell System under the Overlay Convergent Networks of Cognitive Networking (중첩 융합 네트워크 환경을 고려한 STTC기반 이중 셀 시스템 분석 모델)

  • Choi, YuMi;Kim, Jeong-Ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.20-26
    • /
    • 2012
  • The newly introduced model of a STTC-based Distributed Wireless Communication System (DWCS) can provide the capability of joint control of the signals at multiple cells. This paper has considered the virtual cell systems: the Dual Virtual Cell (DVC), and also proposes DVC employment strategy based on DWCS network. The considered system constructs DVC by using antenna selection method. Also, for multi-user high-rate data transmission, the proposed system introduces multiple antenna technology to get a spatial and temporal diversity gain and exploits space-time trellis codes known as STTC to increase a spectral efficiency.

A Study on Selecting and Operating Educational Department in Cyber Security Major by Analyzing Workforce Framework (직무별 특성을 고려한 대학 정보보호 학과의 교육분야 선정 및 운영에 관한 연구)

  • Lim, Won Gyu;Shin, Hyuk;Ahn, Seong Jin
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.99-105
    • /
    • 2015
  • Because intelligent and organized cyber attack, It is difficult to respond to cyber threats with only a small number of information security experts. Accordingly, information security department compared to 2013 it increased by 17%. But there was a problem that cannot train appropriate students for companies. This research examined the Workforce Framework and Knowledge Units for improving this situation. Based on this, educational department in cyber security major was selected to be learning at the university. And it proposed a plan for a managing course to operate. And the result will be utilized as fundamental research of human resources medium- and long-term demand and supply planning in cyber security department.

Performance Analysis of STTC-based Dual Virtual Cell System under The Overlay Convergent Networks of Cognitive Networking (중첩 융합 네트워크 환경에서 STTC기반 이중 셀 시스템의 성능분석)

  • Kwon, Eun-Mi;Kim, Jeong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.7A
    • /
    • pp.528-534
    • /
    • 2012
  • In order to achieve high capacity and reliable link quality of the overlay convergent networks with the cognitive networking based on the advanced capability of the mobile terminal, a Distributed Wireless Communication System (DWCS) can provide the capability of enhancing the link quality. This paper has considered virtual cell: the Dual Virtual Cell (DVC), and also proposes DVC employment strategy based on radio resource monitering. The considered system constructs DVC for multi-user high-rate data transmission, and the DWCS system exploits space-time trellis codes i.e., STTC to improve a spectral efficiency. The effects of imperfect CSI(channel state information) on the system performance has also been investigated.

Development of U-Building Fire Safety Management System (U-건물 화재안전관리 시스템 개발)

  • Kim, Jong-Hoon
    • Fire Science and Engineering
    • /
    • v.30 no.1
    • /
    • pp.74-80
    • /
    • 2016
  • Ubiquitous computer technology (U technology) is continually, and the trend is moving towards the miniaturization of devices, cost reduction, performance enhancement, and intelligence. It is important to improve fire safety system by the application of advanced IT technologies. In this study, a vulnerable point in fire safety was selected for improvement by U technology. The structure of the whole system and a unit system was were designed. This system is divided into 5 parts: the U-fire protection facility management system, the U-fire safety information system, the U-fire safety education system, the U-fire response system, and the U-wide area fire safety management system. The prototype system was constructed in a real building to confirm the applicability of the system.

A Study on Design of Ontologies-Driven Design of Context-based Historical-Cultural of U-Service in U-City (U-City에 있어서 U-Service의 콘텍스트 기반 역사문화 온톨로지 설계 관한 연구)

  • Kwon, Chang-Hee
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.379-387
    • /
    • 2011
  • Historical-cultural contents are digitized documents of records or evidences about changes of human society. The changes or evolvements are results of the interaction between society and environment. So the different feafures are appears by spatio-temporal observing locations Historical-cultural contents need to be designed so that the preservation and exchange of information, adaptation to changes of the future are easy. So historical-cultural contents have structured to support the intelligent services based on context. This study propose context-based ontology-design method based on events, and we implemented web services of Bible contents by proposed method.

Improved Security Monitoring and Control Using Analysis of Cyber Attack in Small Businesses (중소기업 유해트래픽 분석을 통한 보안관제 개선 방안)

  • Hong, Jun Suk;Lim, Young Hwan;Park, Won Hyung;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.4
    • /
    • pp.195-204
    • /
    • 2014
  • Recent, Secure the small and medium-sized enterprises from advanced and intelligence cyber threat, 24 hours of prevention, detection and analysis is essential. Small and Medium Business monitoring center is operated by government financial support to protect and prevent these threats. Currently it provides security to about 900 small and medium-sized enterprises. This paper studies abnormal and attack packets from small and medium-sized businesses[enterprises] which is monitored by Small and Medium Business monitoring center and provides improvement of security control for small and medium-sized enterprises.

Development of Agricultural Water Management Information System for Smarter Water Management (스마트 물관리를 위한 농업용수관리 정보체계 구축)

  • Nam, Won-Ho;Kim, Tae-Gon;Choi, Jin-Yong;Kim, Jin-Taek
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.445-445
    • /
    • 2012
  • 농업 수자원 시스템은 유역의 유출량으로부터 용수를 생산하고 농작물 재배를 위하여 용수를 공급하는 일련의 체계로서, 여름철 집중되는 강우를 저류하여 가용 용수를 확보하고 적절한 시기에 필요한 용수량의 공급을 목적으로 한다. 농업용 저수지, 용 배수로 및 평야부 수리시설물과 같은 구성 요소들은 오랜 기간에 걸쳐서 축조되어 지속 가능하고 안정적인 농업용수 공급을 수행하고 있다. 농업 수자원 시스템을 운영하는 과정에서 물 수요량에 대한 실시간 관리가 불가능하여, 수요와 공급의 불균형으로 인한 용수 공급 효율 저하 및 수리시설물의 노후화 및 누수 등으로 인한 관리 손실량 발생과 같은 문제점이 제기되었다. 스마트 물관리는 농업 수자원 환경의 급격한 변화에 대응하기 위하여 첨단 정보통신 기술을 도입하는 차세대 물관리 시스템으로 실시간 모니터링, 수자원의 분석/모의/운영 및 정보 관리 등 전 분야에서 정보화와 지능화를 구현하기 위한 기술 총화로 정의된다. 본 연구에서는 스마트 물관리를 구현하기 위한 구체적 방안으로써, 통합적인 농업용수의 실시간 운영 및 정보 관리를 위하여 첨단 정보통신기술을 이용한 모니터링 기술, 수집된 정보 분석 및 제공을 위한 웹 기반의 정보관리 기술, 정보교환을 위한 네트워크 기술 등을 통합 운영할 수 있는 체계를 구성하였다.

  • PDF

CLIAM: Cloud Infrastructure Abnormal Monitoring using Machine Learning

  • Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.105-112
    • /
    • 2020
  • In the fourth industrial revolution represented by hyper-connected and intelligence, cloud computing is drawing attention as a technology to realize big data and artificial intelligence technologies. The proliferation of cloud computing has also increased the number of threats. In this paper, we propose one way to effectively monitor to the resources assigned to clients by the IaaS service provider. The method we propose in this paper is to model the use of resources allocated to cloud systems using ARIMA algorithm, and it identifies abnormal situations through the use and trend analysis. Through experiments, we have verified that the client service provider can effectively monitor using the proposed method within the minimum amount of access to the client systems.