• Title/Summary/Keyword: 물리적 망분리

Search Result 45, Processing Time 0.029 seconds

A Study on the Telemetry System for the Inhabitant Environment and Distribution of Fish-II -Current Direction, Velocity, Sea Ambient Noise and Distribution of Fishes- (어류의 서식환경과 분포생태의 원격계측에 관한 연구 - II -유향, 유속 및 환경소음과 어류의 분포생태-)

  • 신형일;안영화;신현옥
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.35 no.2
    • /
    • pp.129-135
    • /
    • 1999
  • The telemetry system for the current speed and direction, the underwater ambient noise and the distribution ecology of fishes was constructed by the author and his collaborator in order to product and manage effectively in shallow sea culture and setnets fisheries, and then the experiments for the telemetry system carried out at set net fishing ground located Nungpobay in Kojedo from October 1996 to June 1997. As this results, the techniques suggested in the telemetry system gave full display its function even though far away 1.5 km from transmitting part, but with the suggested telemetry system could not be ascertained relationship between physical environment and distribution ecology of fishes.

  • PDF

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

The Reality of Community through Social Network Analysis: the Case of 7 Sansa, Buddhist Mountain Monasteries in Korea (사회연결망 분석을 통해 본 지역공동체의 실제: 7개 산사, 한국의 산지승원을 중심으로)

  • Kim, Sook-Jin
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.20 no.1
    • /
    • pp.49-69
    • /
    • 2017
  • The crisis of western welfare states and the spread of neoliberalism opened up the debate on community question and paid attention to community to cope with diverse social crises. There has been increasing recognition for the need to see World Heritage in terms of place and local community which had formed it rather than an object for conservation separated from the place where it is located. In addition, the conservation and use of cultural heritage can lead to the region's sustainable development and in turn is possible with the region's overall development. However, the Operational Guidelines for the Implementation of the World Heritage Convention does not specify the definition and geographic extent of community. This paper considers place-based communities, Sahachons and religious communities, Sindohoes of seven Buddhist monasteries in preparation for inscription on the UNESCO World Heritage List, and analyzes social networks of these two types of communities to see their consistency with their general characteristics. Social networks analyses indicates that some monasteries show significant differences between Sahachons and Sindohoes, but others do not. This result implies that communities should be seen as processes of constantly reconstituting their features and boundaries under their specific surroundings which are also in constant changes, thus requiring empirical studies.

Development of Data Analysis and Interpretation Methods for a Hybrid-type Unmanned Aircraft Electromagnetic System (하이브리드형 무인 항공 전자탐사시스템 자료의 분석 및 해석기술 개발)

  • Kim, Young Su;Kang, Hyeonwoo;Bang, Minkyu;Seol, Soon Jee;Kim, Bona
    • Geophysics and Geophysical Exploration
    • /
    • v.25 no.1
    • /
    • pp.26-37
    • /
    • 2022
  • Recently, multiple methods using small aircraft for geophysical exploration have been suggested as a result of the development of information and communication technology. In this study, we introduce the hybrid unmanned aircraft electromagnetic system of the Korea Institute of Geosciences and Mineral resources, which is under development. Additionally, data processing and interpretation methods are suggested via the analysis of datasets obtained using the system under development to verify the system. Because the system uses a three-component receiver hanging from a drone, the effects of rotation on the obtained data are significant and were therefore corrected using a rotation matrix. During the survey, the heights of the source and the receiver and their offsets vary in real time and the measured data are contaminated with noise. The noise makes it difficult to interpret the data using the conventional method. Therefore, we developed a recurrent neural network (RNN) model to enable rapid predictions of the apparent resistivity using magnetic field data. Field data noise is included in the training datasets of the RNN model to improve its performance on noise-contaminated field data. Compared with the results of the electrical resistivity survey, the trained RNN model predicted similar apparent resistivities for the test field dataset.

Multicast Service Architecture Applicable to Various Transport Networks (다양한 트랜스포트 네트위크에 적용 가능한 멀티캐스트 서비스 구조)

  • Kim, Sang-Gyeong;An, Sun-Sin
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.1
    • /
    • pp.93-101
    • /
    • 2001
  • 멀티캐스트 응용을 다루는 기존의 많은 네트워킹 솔루션들은 특정한 트랜스포트 기술에 기반을 두고 있기 때문에 인터넷, ATM과 같은 하부 트랜스포트 네트워크에 따라 서로 다른 접근 방법을 필요로 한다. 본 논문에서는 여러트랜스포트 네트워크에 적용 가능한 새로운 멀티캐스트 서비스 구조(MSA: Multicast Service Architecture)를 제안한다. MSA는 기존의 트랜스포트 네트워크 프로토콜들이 연결제어를 위하여 그대로 사용될수 있도록 설계되어 최소한의 변경으로 기존 트랜스포트 네트워크 상에서 운용될 수 있다. MSA는 트랜스포트 네트워크에 독립적으로 다양한 멀티미디어 멀티캐스트 응용들을 수용할 수 있으며 망 중심의 통신관리체계를 규정한다. MSA는 여러 가지 개념들을 도입하여 유연하고 확장성 있는 통신관리를 지원하는데 특히 호/연결제어 기능을 단말로부터 분리하여 정의함으로써 원격제어와 제어의 이동성을 지원할 수 있다. 따라서 사용자는 보다 다양한 방법으로 멀티미디어 멀티캐스트 서비스를 이용할 수있게된다. 또한 단말관리자와 가상 디바이스 개념을 도입하여 응용 개발자가 트랜스포트 네트워크나 물리적 디바이스의 상세한 특성을 모르더라도 응용을 설계할 수 있도록하였다. MSA를 구성하는 여러개의 서비스 컴포넌트들은 미들웨어 상에서 동작한다. 우리는 시뮬레이션을 통하여 MSA를 분석하였다.

  • PDF

Two-Stage Evolutionary Algorithm for Path-Controllable Virtual Creatures (경로 제어가 가능한 가상생명체를 위한 2단계 진화 알고리즘)

  • Shim Yoon-Sik;Kim Chang-Hun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.11_12
    • /
    • pp.682-691
    • /
    • 2005
  • We present a two-step evolution system that produces controllable virtual creatures in physically simulated 3D environment. Previous evolutionary methods for virtual creatures did not allow any user intervention during evolution process, because they generated a creature's shape, locomotion, and high-level behaviors such as target-following and obstacle avoidance simultaneously by one-time evolution process. In this work, we divide a single system into manageable two sub-systems, and this more likely allowsuser interaction. In the first stage, a body structure and low-level motor controllers of a creature for straight movement are generated by an evolutionary algorithm. Next, a high-level control to follow a given path is achieved by a neural network. The connection weights of the neural network are optimized by a genetic algorithm. The evolved controller could follow any given path fairly well. Moreover, users can choose or abort creatures according to their taste before the entire evolution process is finished. This paper also presents a new sinusoidal controller and a simplified hydrodynamics model for a capped-cylinder, which is the basic body primitive of a creature.

A Study on the Safety Improvement of PSA System for Hydrogen Separation and Purification (수소분리 및 정제를 위한 PSA(Pressure Swing Adsorption)시스템 안전성향상에 관한 연구)

  • Oh, Sang-Gyu;Lee, Seul-Gi;Lee, Jun-Seo;Ma, Byung-Chol
    • Journal of the Korean Institute of Gas
    • /
    • v.26 no.1
    • /
    • pp.7-19
    • /
    • 2022
  • Hydrogen purification is generally performed through chemical and physical methods. Among various types of purification method PSA(Pressure Swing Adsorption) is widely used with its purification capacity and economic efficiency. In Korea, most of the hydrogen used in automobiles and power generation fuel cells is purified using PSA. Hydrogen produced in petrochemical complexes has difficulties in transportation. The government is planning to install hydrogen extractors that produce hydrogen directly from consumers in connection with the city gas supply chain, and companies are also installing related research and demonstration facilities one after another. Europe and others have recently established safety standards related to PSA and are making efforts for systematic safety management at the construction and operation stage, but domestic safety standards related to PSA are still insufficient. This study aims to identify problems of existing facilities through surveys and risk assessment by companies operating existing PSA, and to prepare domestic technical standards including them in overseas technical standards to promote the safety of new and existing PSA systems.

The Effects of Physical States of Phospholipids on $Ca^{2+}$-ATPase Activity of Biological Membranes (지질의 물리학적 성상이 $Ca^{2+}$-ATPase 활성도에 미치는 영향)

  • Hah, Jong-Sik
    • The Korean Journal of Physiology
    • /
    • v.22 no.2
    • /
    • pp.163-177
    • /
    • 1988
  • The $Ca^{2+}-ATPase$ of sarcoplasmic reticulum (SR) was solubilized and reconstituted into a mixture of phosphatidylcholine (PC) and phosphatidylethanolamine (PE) of varying ratios in order to assess the effect of physical states of phospholipids on the incorporation and functions $Ca^{2+}-ATPase$. On the basis of the spectral data of Ca-arsenazo III, the $Ca^{2+}$ uptake of SR was increased linearly as the PC content increased in the reconstituted vesicles. The ATP hydrolysis activity also increased as PC content increased up to 25% and then decreased slightly as the PC content further increased. On the other hand the incorporation of $Ca^{2+}-ATPase$ into the reconstituted vesicls occured maximally at 25% PC and 75% PE mixture which is known to have a non-bilayer structure in reconstitution system. From the above results it is clear that preexisting defects in the lipid bilayer promote protein incorporation into the bilayer during reconstitution and lamellar structure of the bilayer facilitates the $Ca^{2+}-ATPase$ function.

  • PDF

Measures to Prevent the Leakage of Military Internal Information through the Analysis of Military Secret Leakage Cases: Focusing on Insider Behaviors (군사기밀 유출 사례 분석을 통한 군 내부정보 유출 방지 방안 : 내부자 행위 중심으로)

  • Eom, Jung-Ho;Kim, Nam-Uk
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.85-92
    • /
    • 2020
  • None of the recent cases of military secret leakages have leaked internal information using networks. This is because the Internet and the Intranet are physically separated, and has a difficult process when transmitting and receiving data through the Internet. Therefore, most of the leaked paths are to copy and hand over secrets, shoot and send them with a smartphone, or disclose after remembering them. So, the technology of blocking and detecting military secret leakages through the network is not effective. The purpose of this research is to propose a method to prevent information leakage by focusing on the insider behaviors, the subject of leakage, rather than the military secret. The first is a preventive measure to prevent the leakage behavior of military secrets, the second is to block suspicious access to the military secret data, and the last is to detect the leakage behavior by insiders.

Cyber-Threat Detection of ICS Using Sysmon and ELK (Sysmon과 ELK를 이용한 산업제어시스템 사이버 위협 탐지)

  • Kim, Yongjun;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.331-346
    • /
    • 2019
  • Global cyber threats to industrial control systems are increasing. As a result, related research and cooperation are actively underway. However, we are focusing on strengthening security for physical network separation and perimeter. Internal threats are still vulnerable. This is because the easiest and strongest countermeasure is to enhance border security, and solutions for enhancing internal security are not easy to apply due to system availability problems. In particular, there are many vulnerabilities due to the large number of legacy systems remaining throughout industrial control systems. Unless these vulnerable systems are newly built according to the security framework, it is necessary to respond to these vulnerable systems, and therefore, a security solution considering availability has been verified and suggested. Using Sysmon and ELK, security solutions can detect Cyber-threat that are difficult to detect in unstructured ICS.