• 제목/요약/키워드: 수준망

검색결과 912건 처리시간 0.034초

Spatial Strategies and Locational Behaviour of Korean Auto Parts Firms in China: Focused on Parts Suppliers of Donfeng-Yueda-Kia Car Assembler (대중국 한국 자동차 부품기업의 공간 전략과 입지 특성: 동풍열달기아 완성차 기업의 부품 협력기업을 중심으로)

  • Choe, Ja-Yeong;Lee, Sung-Cheol
    • Journal of the Korean Geographical Society
    • /
    • 제51권2호
    • /
    • pp.235-253
    • /
    • 2016
  • China has been developing a new auto industry growth plan since 2004. In line with this initiative, China actively adopted its policy favoring foreign companies' investment which had a competitive edge over their technologies and manufacturing methodologies. To meet this demand in policy and market change, many foreign auto companies and their parts' manufacturers including Korean auto companies joined this stream. Policy change favoring higher technologies applicable in China requested auto companies' swift adaptation to meet the policy requirements by higher technologies with innovation and introduction of those foreign technologies to China. The spatial (excellence) strategy was followed by the increase in its efficiency and competiveness of each region, which were materialized by or in the form of; Firstly, strategic partnership with China auto companies and encouragement of Korea auto parts manufacturing companies to set up its own factories in China. Secondly, modularization and platform sharing strategy by applying enhanced technologies. Thirdly, strategic utilization of China local government's incentive policies. As production management methodology, JIS was adopted all across the board to meet the on-demand market requirements in the manufacturing processes. Auto part manufacturers had been integrated regionally based on forward linkages and modules. As a result, regional-specific auto industry complexes have been made in the places such as Beijing-Hyundai in the north, Dongfeng-Yueda-Kia in the south, common auto parts at central area like Qingdao, and other parts and raw materials in the vicinity of Shanghai.

  • PDF

Real-Time Construction Resource Monitoring using RFID/USN Inter-working System (RFID/USN 연동 시스템을 활용한 건설자원 실시간 모니터링 시스템)

  • Ryu, Jeoung-Pil;Kim, Hyoung-Kwan;Kim, Chang-Yoon;Kim, Chang-Wan;Han, Seung-Heon;Kim, Moon-Kyum
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 한국건설관리학회 2007년도 정기학술발표대회 논문집
    • /
    • pp.90-94
    • /
    • 2007
  • Location tracking automation of resources in construction industry is one of the most important procedures to improve construction project performance and reduce the period of construction. Recently, location tracking technologies have proven to be effective in tracking construction materials and equipment in real time through the instrumentality of RFID (Radio Frequency Identification). By using wireless communication and inter-working system between RFID and USN, it is possible that construction engineers receive the location information of construction resources without additional efforts that move the RFID reader to read tags periodically. In the inter-working system, RFID reader delivers the acquired materials information to sensor node which is connected by serial interface. Then sensor node transmits the received data to the data aggregation terminal that is a sink node. The data aggregation terminal can transmit collected data to construction manager who is out of construction site using infrastructure such as CDMA(Code Division Multiple Access) network. The combination model of the two system and field test scenarios are presented in this paper.

  • PDF

Analysis of VoLTE Charge Reduction under VoLTE Growth (VoLTE 활성화에 따른 요금 인하 여력 분석)

  • Lee, Sang-Woo;Jeong, Seon-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제41권1호
    • /
    • pp.92-100
    • /
    • 2016
  • It is informed that the Voice over LTE(VoLTE) which serves voice and message on IP networks is better in terms of economies of scale than the legacy voice service on 2G/3G circuit-switched networks because of its technological and cost efficiency. In addition, services of voice and data are running on a single LTE network and as a result VoLTE has the more economies of scope. But, there is no study about how much technology-efficiency VoLTE has compared to circuit-based voice service and how much voice charge can be reduced as VoLTE grows up. This paper analyzes empirically cost-efficiency of VoLTE against circuit-based voice service and quantifies the reduction of voice charge as 2G/3G voice traffic shifts to VoLTE. The results describe the first is that the average cost of the total voice traffic rises shortly just after the investment of LTE network for providing VoLTE but it will soon have a capacity available to reduce the charge due to VoLTE's outstanding cost efficiency on the assumption that voice traffic is fixed, and the second is that the charge can be cut to 60% of the current rate in case of all the voice traffic moves to VoLTE. The latter proves partially the validation of data-focusing pricing plan. Our results are expected to become basic data for network operators' establishing pricing strategies and for policy makers' inducing price cutting.

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제24권2호
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.

Applicability Analysis of Flood Forecasting in Nakdong River Basin using Neuro-Fuzzy Model (Neuro-Fuzzy 모형에 의한 낙동강유역의 홍수예측 적용성 분석)

  • Rho, Hong-Sik;Kim, Tae-Hyung;Kim, Pan-Gu;Han, Kun-Yeun;Choi, Seung-Yong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 한국수자원학회 2012년도 학술발표회
    • /
    • pp.642-642
    • /
    • 2012
  • 최근에 들어 지구온난화에 따른 기후변화의 영향으로 국지성 집중호우와 돌발성 호우가 한반도 뿐 아니라 전 세계적으로도 많이 나타나고 있고, 그로 인한 이상홍수의 발생이 우리나라의 인명 및 재산피해를 날로 증가시키고 있는 추세이다. 그러나 현재 국내의 홍수방어시스템은 정확도 및 선행시간 확보 등의 측면에서 국민들의 요구수준까지는 그 역할을 수행하지 못하고 있는 실정이다. 또한 최근 4대강 살리기 사업을 통해 수행된 보 설치 및 하도 준설로 인해 하천환경의 변화가 크게 발생하여, 보다 정확하고 신속한 홍수위 예측기법이 요구되고 있는 실정이다. 이에 따라 현재 4대강 홍수통제소에서는 정확한 홍수위예측을 위해 4대강 본류 및 주요 지류에 대해 수리모형을 구축하고 있고, 기존의 저류함수모형에 의한 강우-유출 해석기법을 적용하여 주요 지류에 대한 유입량을 산정하기 위한 모형을 구축중에 있다. 국내 홍수방어 시스템에 현재까지 사용되어 오고 있는 저류함수모형 및 수위-유량 관계식을 이용한 방법은 물리적 기반의 홍수예측모형으로 유역의 지형학적 인자와 그에 따른 여러 변수를 포함하기 때문에 하천환경의 변화로 인해 각각의 추적과정에서 오차들이 발생하여 해석결과에 영향을 미치는 단점이 있다. 이에 반해 데이터 기반 모형은 강우-유출 모형에서 사용되는 많은 수문학적 자료 및 매개변수들의 사용 없이 오직 수위 및 강우측정 자료만을 이용하여 홍수를 예측하는 모형이다. 본 연구에서는 낙동강 유역에 대해 보다 정확한 홍수위 예측을 위해 현재 낙동강홍수통제소에서 구축중인 낙동강 본류의 수리모형의 주요 지류의 유입량 산정을 위해 기존의 물리적 기반 모형이 아닌 뉴로-퍼지(Neuro-Fuzzy) 모형을 이용한 data 기반 모형을 적용해 기존 물리적 기반 모형과 비교 분석 하고자 하였다. 낙동강의 주요지류인 감천, 금호강, 남강, 내성천, 밀양강, 반변천, 위천, 황강을 적용유역으로 선정하여 유역별로 티센망을 구축하였고, 각 지류별로 수위관측소를 선정하여 최근 10년동안 낙동강유역의 홍수예 경보가 발령되었거나 많은 비가 온 사상을 선정해 모형을 검증하였다. 모형은 실시간 수위측정 자료와 강우자료 및 해당유역 댐의 방류량 자료를 이용해 유역별 최적 입력자료 조합을 선정하여 간단하게 구축할 수 있었다. 또한 10분 단위 및 30분 단위의 입출력 자료로 모형을 구축하여 비교하였다. 이번 연구에서 수행한 낙동강유역에서의 뉴로-퍼지(Neuro-Fuzzy) 모형을 이용한 홍수예측기법을 통해 몇가지 data만으로 유역의 주요지점에 대한 홍수위와 홍수량을 예측할 수 있음을 확인할 수 있었다. 모의 결과는 실측치와 비교해 정확도 면에서 우수함을 보여 주었으나 예측시간이 길어질수록 실측치의 경향을 벗어나는 결과를 보였다. 그러나 실시간 홍수예 경보에 있어서는 만족할만한 선행시간을 확보할 수 있었다. 구축된 Data 기반 모형이 물리적 기반 모형과 더불어 낙동강 홍수예 경보를 위한 모형으로 사용될 수 있다면 보다 효율적인 예 경보 체계 구축에 도움을 줄 수 있을 것으로 판단된다.

  • PDF

Runoff Simulation of An Urban Drainage System Using Radar Rainfall Data (레이더 강우 자료를 이용한 도시유역의 유출 모의)

  • Kang, Na Rae;Noh, Hui Seung;Lee, Jong So;Lim, Sang Hun;Kim, Hung Soo
    • Journal of Wetlands Research
    • /
    • 제15권3호
    • /
    • pp.413-422
    • /
    • 2013
  • In recent, the rainfall is showing different properties in space and time but the ground rain gauge only can observe rainfall at a point. This means the ground rain gauge has the limitations in spatial and temporal resolutions to measure rainfall and so there is a need to utilize radar rainfall which can consider spatial distribution of rainfall This study tried to apply radar rainfall for runoff simulation on an urban drainage system. The study area is Guro-gu, Seoul and we divided study area into subbasins based on rain gauge network of AWS(Automatic Weather station). Then the radar rainfalls were adjusted using rainfall data of rain gauge stations the areal rainfalls were obtained. The runoffs were simulated by using XP-SWMM model in subbasins of an urban drainage system. As the results, the adjusted radar rainfalls were underestimated in the range of 60 to 95% of rain gauge rainfalls and so the simulated runoffs from the adjusted radar and gauge rainfalls also showed the differences. The runoff peak time from radar rainfall was occurred more fast than that from gauge rainfall.

Effect of Shading Level of Nursing Bed on the Shoot Growth of Rooted Cuttings in Native Hydrangea serrata for. acuminata (육묘상의 차광정도가 자생 산수국 삽목묘의 신초생장에 미치는 영향)

  • Lee, Seung Youn;Lee, Sung Chun;Park, Sung Tae;Rhee, Jung Chul;Lee, Taek Joo;Kim, Kwang Jin;Lee, Jeong Sik
    • FLOWER RESEARCH JOURNAL
    • /
    • 제16권3호
    • /
    • pp.153-160
    • /
    • 2008
  • This experiment was conducted to find out an adequate shading level (0, 55, 74, and 95%) on the shoot growth of rooted cuttings of native Hydrangea serrata for. acuminata. New shoot height (NSH), length and width of leaf, and stem diameter under 55% shading were the greatest. Net photosynthetic rate under 55% shading was the greatest, while intercellular $CO_2$ concentration was the least in this treatment. The greatest content of photosynthetic pigments (total chlorophyll, carotenoid) was observed in leaves grown under a 74%, followed by a 55% shading level. Leaf stomata were observed on the abaxial surface, but those on adaxial surface in all shading treatments were not observed. In 95% shading, decreased stomatal density and development were observed. Higher stomatal density and development, however, were observed in 55% shading. Therefore, it is concluded that a 55% shading level was the optimum for growth of new shoots of rooted cuttings of native H. serrata for. acuminata.

Evaluation of the Effect of Agricultural Activity on Stream Water Quality by Watershed Modeling (유역모형을 이용한 농업활동이 수질에 미치는 영향평가)

  • Jung, KwangWook;Jung, Inkyun;Kang, SooMan;Kwon, Jinwook
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 한국수자원학회 2016년도 학술발표회
    • /
    • pp.510-510
    • /
    • 2016
  • 농업 비점오염원의 영향을 분석하고 여러 가지 대안(관리정책)이 수계의 수질에 미치는 영향을 평가하기 위해서 유역모형의 적용이 필요하다. 이러한 유역모형에는 모형의 복합성, 계산시간 등에 따라 simple method, mid-range model, detail model로 나눌 수 있다. Simple methods는 요구되는 자료가 작으나 그 결과의 정확성은 떨어진다. 반면에 detail model는 정확한 결과를 획득할 수 있으나 그만큼 방대한 자료와 모니터링을 요구하며, 보정 및 검증에 많은 시간과 노력을 필요로 한다. 특히, 복잡한 유역특성 및 축산오염원을 포함한 복잡한 특성들을 고려해서 모델링하기 위해서는 detail model이 필요하며 본 연구에서는 HSPF모델을 이용해서 그 영향을 분석하고자 하였다. 따라서 본 연구에서는 농업에 미치는 영향을 평가하기 위해서 청미천 유역 및 덕천천 유역을 대상유역으로 선정하여 그 영향을 분석하였다. 농업에 미치는 영향을 평가하기 위해서 유역내 투입된 비료사용량을 통계청 자료를 활용하여 산정후 적용하였으며, 축산 부산물중 자원화되는 축산 액비 및 퇴비량을 산정하여 그 영향에 대해 분석하였다. 또한 기존에 광범위하게 활용되고 있는 수질오염총량관리제도에서 산정되는 배출부하량에 유달율을 고려하여 점오염으로 입력하였으며, 직접방류되는 하수처리장도 함게 고려하여 구축하였다. 청미천 유역의 청미천1 지점의 BOD, T-N, T-P에 대한 보정기간의 평균 관측값은 4.205mg/L, 3.844mg/L, 0.137mg/L이며 검정기간의 관측값은 2.741mg/L, 4.638mg/L, 0.144mg/L로 나타났다. BOD, T-N, T-P에 대한 보정기간의 NSE는 -0.58, -0.20, -0.33이며, 검정기간의 NSE는 -0.26, -1.35, -3.54로 분석되었다. BOD, T-N, T-P에 대한 보정기간의 RMSE는 2.65, 1.63, 0.12이며, 검정기간의 RMSE는 1.36, 1.64, 0.07로 나타났다. 덕천천 유역의 경우 국가관측망이 없어 동진강의 제일 말단 지점인 동진강3 지점의 BOD, T-N, T-P에 대한 보정기간 평균관측값은 2.891mg/L, 3.455mg/L, 0.096mg/L이며, 검정기간의 관측값은 2.293mg/L, 3.223mg/L, 0.104mg/L로 나타났다. BOD, T-N, T-P에 대한 보정기간의 NSE는 -0.20, -0.56, -0.49이며, 검정기간의 NSE는 0.24, -0.06, -0.19으로 분석되었다. BOD, T-N, T-P에 대한 보정기간의 RMSE는 1.53, 2.12, 0.05이며, 검정기간의 RMSE는 1.05, 0.98, 0.06으로 나타났다. 본 연구의 분석결과는 점오염원, 축산계비점오염, 토지계비점오염, 시비량, 배경부하로 구분하여 분석을 실시하였으며 분석결과 청미천 유역의 비점오염 기여율이 약 65%를 차지하고 있는 것으로 평가되었으며, 덕천천 말단에서는 약 37.7%의 비점오염물질이 하천수질에 영향을 미치는 것으로 나타났다. 또한, 기존 수질오염 총량관리제도에서 점오염의 감소에 의한 비점오염비중이 커지는 것으로 평가되었으며, 그 중 축산이 차지하는 비중이 상대적으로 높은 것으로 평가되고 있지만, 본 연구의 결과에서는 그보다 적은 수준이 수계에 영향을 미치는 것으로 분석되었다.

  • PDF

The research of the Sensor network service platform technology based on OGC (OGC 기반의 센서 네트워크 서비스 플랫폼 기술 연구)

  • Yeom, Sung-Kun;Yoo, Sang-Keun;Kim, Yong-Woon;Kim, Hyoung Jun;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2009년도 추계학술대회
    • /
    • pp.1022-1025
    • /
    • 2009
  • USN(Ubiquitous Sensor Network) is a core infrastructure that makes come true the u-life in the ubiquitous society through various services of area such as u-city and u-Health. Therefore, we need to reseach about the domestic standards to establish the core technique of USN. Currently, the status of USN standards is most of technical standard and reseach that are technology for sensor node implementation and a protocol for energy-efficient communication and interlock with existing network. But, Standard and reseach for sensor network, integration management of heterogeneous sensor networks for USN application, sensing data management and USN database structure definition such as application and middleware are weak level. In this paper, we researched for standard development of the domestic sensor network service and relevant standard analysis to configure SWE(Sensor Web Enablement) of OGC(Open Geospatial Consortium) for standarded plattform technoloy in part of the middleware. Also we researched that it's a connection between domestic TTA (Telecommunications Technology Association) standards and SWE Standard. Finally, we researched for standard service plattform architecture on sensor network through analysis on the possibility of applying OGC-based services platform.

  • PDF

Lightweight Validation Mechanism for IoT Sensing Data Based on Obfuscation and Variance Analysis (난독화와 변화량 분석을 통한 IoT 센싱 데이터의 경량 유효성 검증 기법)

  • Yun, Junhyeok;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • 제8권9호
    • /
    • pp.217-224
    • /
    • 2019
  • Recently, sensor networks are built and used on many kinds of fields such as home, traffic, medical treatment and power grid. Sensing data manipulation on these fields could be a serious threat on property and safety. Thus, a proper way to block sensing data manipulation is necessary. In this paper, we propose IoT(Internet of Things) sensing data validation mechanism based on data obfuscation and variance analysis to remove manipulated sensing data effectively. IoT sensor device modulates sensing data with obfuscation function and sends it to a user. The user demodulates received data to use it. Fake data which are not modulated with proper obfuscation function show different variance aspect with valid data. Our proposed mechanism thus can detect fake data by analyzing data variance. Finally, we measured data validation time for performance analysis. As a result, block rate for false data was improved by up to 1.45 times compared with the existing technique and false alarm rate was 0.1~2.0%. In addition, the validation time on the low-power, low-performance IoT sensor device was measured. Compared to the RSA encryption method, which increased to 2.5969 seconds according to the increase of the data amount, the proposed method showed high validation efficiency as 0.0003 seconds.