• Title/Summary/Keyword: 분석네트워크 프로세스

Search Result 249, Processing Time 0.032 seconds

A Study on Designing Method of VoIP QoS Management Framework Model under NGN Infrastructure Environment (NGN 기반환경 에서의 VoIP QoS 관리체계 모델 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.85-94
    • /
    • 2011
  • QoS(Quality of Service) is defined as "The collective effect of service performance which determines the degree of satisfaction of a user of the service" by ITU-T Rec. E.800. While the use of VoIP(Voice Over Internet Protocol) has been widely implemented, persistent problems with QoS are a very important sue which needs to be solved. This research is finding the assignment of VoIP QoS to deduct how to manage the control system and presenting the QoS control process and framework under NGN(Next Generation Network) environment. The trial framework is the modeling of the QoS measurement metrics, instrument, equipment, method of measurement, the series of cycle & the methodology about analysis of the result of measurement. This research underlines that the vulnerability of the VoIP protocol in relation to its QoS can be guaranteed when the product quality and management are controlled and measured systematically. Especially it's very important time to maintain the research about VoIP QoS measurement and control because the big conversion of new network technology paradigm is now spreading. In addition, when the proposed method is applied, it can reduce an overall delay and can contribute to improved service quality, in relation to signal, voice processing, filtering more effectively.

Mass Spectrometry-based Comparative Analysis of Membrane Protein: High-speed Centrifuge Method Versus Reagent-based Method (질량분석기를 활용한 막 단백질 비교분석: High-speed Centrifuge법과 Reagent-based법)

  • Lee, Jiyeong;Seok, Ae Eun;Park, Arum;Mun, Sora;Kang, Hee-Gyoo
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.51 no.1
    • /
    • pp.78-85
    • /
    • 2019
  • Membrane proteins are involved in many common diseases, including heart disease and cancer. In various disease states, such as cancer, abnormal signaling pathways that are related to the membrane proteins cause the cells to divide out of control and the expression of membrane proteins can be altered. Membrane proteins have the hydrophobic environment of a lipid bilayer, which makes an analysis of the membrane proteins notoriously difficult. Therefore, this study evaluated the efficacy of two different methods for optimal membrane protein extraction. High-speed centrifuge and reagent-based method with a -/+ filter aided sample preparation (FASP) were compared. As a result, the high-speed centrifuge method is quite effective in analyzing the mitochondrial inner membranes, while the reagent-based method is useful for endoplasmic reticulum membrane analysis. In addition, the function of the membrane proteins extracted from the two methods were analyzed using GeneGo software. GO processes showed that the endoplasmic reticulum-related responses had higher significance in the reagent-based method. An analysis of the process networks showed that one cluster in the high-speed centrifuge method and four clusters in the reagent-based method were visualized. In conclusion, the two methods are useful for the analysis of different subcellular membrane proteins, and are expected to assist in selecting the membrane protein extraction method by considering the target subcellular membrane proteins for study.

A Study on Systematic Firmware Security Analysis Method for IoT Devices (체계적인 IoT 기기의 펌웨어 보안 분석 방법에 관한 연구)

  • Kim, Yejun;Gim, Jeonghyeon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.31-49
    • /
    • 2021
  • IoT devices refer to embedded devices that can communicate with networks. Since there are various types of IoT devices and they are widely used around us, in the event of an attack, damages such as personal information leakage can occur depending on the type of device. While the security team analyzes IoT devices, they should target firmware as well as software interfaces since IoT devices are operated by both of them. However, the problem is that it is not easy to extract and analyze firmware and that it is not easy to manage product quality at a certain level even if the same target is analyzed according to the analyst's expertise within the security team. Therefore, in this paper, we intend to establish a vulnerability analysis process for the firmware of IoT devices and present available tools for each step. Besides, we organized the process from firmware acquisition to analysis of IoT devices produced by various commercial manufacturers, and we wanted to prove their validity by applying it directly to drone analysis by various manufacturers.

A Case of Developing Performance Evaluation Model for Korean Defense Informatization (국방정보화 수준평가 모델 개발 사례)

  • Gyoo Gun Lim;Dae Chul Lee;Hyuk Jin Kwon;Sung Rim Cho
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.23-45
    • /
    • 2017
  • The ROK military is making a great effort and investment in establishing network-centric warfare, a future battlefield concept, as a major step in the establishment of a basic plan for military innovation. In the military organization level, an advanced process is introduced to shorten the command control time of the military and the business process is improved to shorten the decision time. In the information system dimension, an efficient resource management is achieved by establishing an automated command control system and a resource management information system by using the battle management information system. However, despite these efforts, we must evaluate the present level of informatization in an objective manner and assess the current progress toward the future goal of the military by using objective indicators. In promoting informatization, we must systematically identify the correct areas of improvement and identify policy directions to supplement in the future. Therefore, by analyzing preliminary research, workshops, and expert discussions on the major informatization level evaluation models at home and abroad, this study develops an evaluation model and several indicators that systematically reflect the characteristics of military organizations. The developed informatization level evaluation model is verified by conducting a feasibility test for the troops of the operation class or higher. We expect that this model will be able to objectively diagnose the level of informatization of the ROK military by putting budget and resources into the right place at the right time and to rapidly improve the vulnerability of the information sector.

On Flexibility Analysis of Real-Time Control System Using Processor Utilization Function (프로세서 활용도 함수를 이용한 실시간 제어시스템 유연성 분석)

  • Chae Jung-Wha;Yoo Cheol-Jung
    • The KIPS Transactions:PartA
    • /
    • v.12A no.1 s.91
    • /
    • pp.53-58
    • /
    • 2005
  • The use of computers for control and monitoring of industrial process has expanded greatly in recent years. The computer used in such applications is shared between a certain number of time-critical control and monitor function and non time-critical batch processing job stream. Embedded systems encompass a variety of hardware and software components which perform specific function in host computer. Many embedded system must respond to external events under certain timing constraints. Failure to respond to certain events on time may either seriously degrade system performance or even result in a catastrophe. In the design of real-time embedded system, decisions made at the architectural design phase greatly affect the final implementation and performance of the system. Flexibility indicates how well a particular system architecture can tolerate with respect to satisfying real-time requirements. The degree of flexibility of real-time system architecture indicates the capability of the system to tolerate perturbations in timing related specifications. Given degree of flexibility, one may compare and rank different implementations. A system with a higher degree of flexibility is more desirable. Flexibility is also an important factor in the trade-off studies between cost and performance. In this paper, it is identified the need for flexibility function and shows that the existing real-time analysis result can be effective. This paper motivated the need for a flexibility for the efficient analysis of potential design candidates in the architectural design exploration or real time embedded system.

The Impact of Changes in Social Information Processing Mechanism on Social Consensus Making in the Information Society (정보화사회에 있어서 사회적 정보처리 메커니즘의 변화가 사회적 컨센서스 형성에 미치는 영향에 대한 연구)

  • Jin, Seung-Hye;Kim, Yong-Jin
    • Information Systems Review
    • /
    • v.13 no.3
    • /
    • pp.141-163
    • /
    • 2011
  • The advancement of information technologies including the Internet has affected the way of social information processing as well as brought about the paradigm shift to the information society. Accordingly, it is very important to study the process of social information processing over the digital media through which social information is generated, distributed, and led to social consensus. In this study, we analyze the mechanism of social information processing, identify a process model of social consensus and institutionalization of the results, and finally propose a set of information processing characteristics on the internet media. We deploy the ethnographic approach to analyze the meaning of group behavior in the context of society to analyze two major events which happened in Korean society. The formation process of social consensus is found to consist of 5 steps: suggestion of social issues, selective reflection on public opinion, acceptance of the issues and diffusion, social consensus, and institutionalization and feedback. The key characteristics of information processing in the Internet is grouped into proactive response to an event, the changes in the role of opinion leader, the flexibility of proposal and analysis, greater scalability, relevance to consensus making, institutionalization and interaction. This study contributes to the literature by proposing a process model of social information processing which can be used as the basis for analyzing the social consensus making process from the social network perspective. In addition, this study suggests a new perspective where the utility of the Internet media can be understood from the social information processing so that other disciplines including politics, communications, and management can improve the decision making performance in utilizing the Internet media.

Analyzing the Design Competition Entries for the Hoehyeon Section of Namsan from a Perspective of the Historic Urban Landscape (남산 회현자락 설계 공모 출품작에 대한 역사도시경관적 분석)

  • Seo, Young-Ai
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.43 no.4
    • /
    • pp.27-36
    • /
    • 2015
  • This study analyzed the characteristics of the entries at the design competition for the Hoehyeon section of Namsan from a perspective of the Historic Urban Landscape and made suggestions from them. Hoehyeon, located at the foot of Namsan, is the most changing site in the park and Seoul City Wall. Recent excavation of the old city walls of the Joseon Era has uncovered evidence of the Japanese occupation period, making it a site where park facilities in modern and contemporary history coexist. The frame analysis has been made by the concept of the Historic Urban Landscape, the methods of approach, specialists' discussion and the guidelines of the competition. The entries were analyzed by classification of the understanding of the spatiality and cultural diversity, the recognition of the periodic layers of time, and the design implementation, the preservation, the park plan, and the future management plan. From a perspective of an Historic Urban Landscape, this study has found that each entry placed priority on the objects for preservation and suggested creative involvement and comprehensive designs for the preservation and the park plan through the understanding of the spatiality and cultural diversity and the reflection of the periodic layers of time in the designs. This study provided two implications. Firstly, there was a possibility for new recognition and the methods of approach for preservation and development. Secondly, the basic plan for the Historic Landscape should be established through research and mapping for the preservation and management of objects in Seoul having valuable historic variability. Further study for resident participation and the process by network from public to private should be taken. This study looks forward to the consideration of the direction for the design plans of places with historic and cultural value.

Classification and Analysis of Data Mining Algorithms (데이터마이닝 알고리즘의 분류 및 분석)

  • Lee, Jung-Won;Kim, Ho-Sook;Choi, Ji-Young;Kim, Hyon-Hee;Yong, Hwan-Seung;Lee, Sang-Ho;Park, Seung-Soo
    • Journal of KIISE:Databases
    • /
    • v.28 no.3
    • /
    • pp.279-300
    • /
    • 2001
  • Data mining plays an important role in knowledge discovery process and usually various existing algorithms are selected for the specific purpose of the mining. Currently, data mining techniques are actively to the statistics, business, electronic commerce, biology, and medical area and currently numerous algorithms are being researched and developed for these applications. However, in a long run, only a few algorithms, which are well-suited to specific applications with excellent performance in large database, will survive. So it is reasonable to focus our effort on those selected algorithms in the future. This paper classifies about 30 existing algorithms into 7 categories - association rule, clustering, neural network, decision tree, genetic algorithm, memory-based reasoning, and bayesian network. First of all, this work analyzes systematic hierarchy and characteristics of algorithms and we present 14 criteria for classifying the algorithms and the results based on this criteria. Finally, we propose the best algorithms among some comparable algorithms with different features and performances. The result of this paper can be used as a guideline for data mining researches as well as field applications of data mining.

  • PDF

A Study on Designing Method of Framework for NGN QoS Management (NGN 운용과정의 QoS 관리를 위한 프레임워크 설계방법)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.101-107
    • /
    • 2008
  • The level of transference of NGN is beginning as the operation of Access Gateway in korea at present, but NGN will keep developing continuously to the NGN integrated network until 2010. This research is finding the meaning and assignment of NGN QoS to deduct how to manage the control system and presenting the QoS control process and trial framework. The trial framework is the modeling of the QoS measurement metrics, the measurement time schedule, the section, hierarchy, instrument, equipment and method of measurement and the series of cycle & the methodology about analysis of the result of measurement. The objective standard of quality in communication service is guaranteed not by itself but by controlling and measuring continuously. Especially it's very important time to maintain the research about NGN QoS measurement and control because the big conversion of new network technology paradigm is now spreading.

  • PDF

Research for Construction Cybersecurity Test and Evaluation of Weapon System (무기체계의 사이버보안 시험평가체계 구축방안 연구)

  • Lee, Ji-seop;Cha, Sung-yong;Baek, Seung-soo;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.765-774
    • /
    • 2018
  • As the IT technology develops, the military information system develops to the current IT environment for efficient operation and rapid communication, and the threat of cyber attack against the advanced weapon system using network technology is increasing simultaneously. In order to prevent and mitigate these problems, the United States has applied the cybersecurity test evaluation system from the beginning to the beginning of weapon system development. However, in Korea, the evaluation process of cyber security test is weak, and there is concern about the damage due to cyber attack. In this paper, we analyze cybersecurity test evaluation status of U.S. and domestic weapon systems and propose a solution to the problem of cybersecurity test evaluation system.