• Title/Summary/Keyword: 신뢰 전이

Search Result 1,406, Processing Time 0.028 seconds

Energy saving control system of wireless base station utilizing natural air-conditioning (자연공조를 활용한 무선기지국 Energy절감 제어시스템)

  • Ryu, Gu-Hwan;Kwon, Chang-Hee
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.223-232
    • /
    • 2019
  • With the development of the information communication industry, the size of the communication device has been reduced to a system that generates a large amount of heat. Therefore, since the amount of heat generated by the wireless equipment is large in the wireless base station, the energy consumption is continuously consumed and the failure of the wireless base station may occur. Therefore, in this study, The study was analyzed. As a research method, we performed base station with a lot of calorific value and electric charge. We selected 25 base stations and obtained data for two weeks. To ensure reliability, the room temperature was kept constant at $27^{\circ}C$, and the control system was installed and equiped for two weeks to obtain the date analysis. In order to calculate the test results in the study method, the instrument was used with a computer, a digital thermometer, and dust measurement. For the date analysis, we conducted a research study on 25 wireless basestations before and after the installation of Control Sysetm.

Analysis of vortex generation tendency around the pump suction using three dimentional numerical model (3차원 수치모형을 이용한 펌프 흡입부 주변의 와류 발생 경향 분석)

  • Byun, Hyun Hyuk;Yang, Jae Hoon;Yoon, Byung Man
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.103-103
    • /
    • 2016
  • 최근 기후변화에 따른 집중호우로 도시홍수의 피해가 급격히 증가하고 있다. 특히 인구가 밀집하고 교통량이 많은 대도시의 경우 동일한 호우에 대하여 녹지나 농경지 등에 비해 그 피해가 더 심각하다. 일반적으로 홍수 피해의 직접원인은 외수로 인한 피해와 내수로 인한 피해로 크게 구분할 수 있다. 외수피해는 주로 소하천 및 지천의 범람, 제방의 붕괴 등으로 발생한 것이며 내수피해는 배수로, 하수도 및 펌프장의 내수배제능력 부족이 주된 원인이다. 따라서 도시홍수를 효과적으로 방어하기 위해서는 우선적으로 내배수시설의 성능개선이 선행되어야 할 필요가 있다. 이러한 내배수 시설의 성능 개선을 위해서는 현재 기 설치되어 있는 빗물펌프장의 설계 및 내배수 효율에 대한 성능평가가 필요하다. 하지만 현재 국내 펌프설계기준에는 빗물펌프장의 설계 및 운영에 대한 구체적인 성능 평가 방법이 제시되어 있지 않은 실정이다. 만약, 펌프 흡입수조 및 흡입파이프의 형상이 적절하게 설계되지 못한다면 물이 파이프 입구로 부드럽게 흡입되지 못하고 볼텍스 및 스월이 발생하게 된다. 이러한 볼텍스 및 스월은 펌프 입구 쪽으로 물 뿐 아니라 공기를 함께 흡입시킴으로써 펌프의 효율저하, 소음, 진동을 발생시키며 펌프 파손의 원인이 될 수 있다. 따라서 펌프를 설치하기 전 펌프 설치 후에 발생되는 펌프 흡입부 주변의 흐름특성 변화 및 흐름특성이 구조물에 미치는 영향 등을 고려하기 위하여 수리모형실험이 필요한데, 수리모형실험은 많은 시간과 비용이 들어가기 때문에 이를 대체할 수 있는 방안이 요구된다. 그런 이유로 최근에는 수리모형실험 대신 수치모의를 이용하는 경우가 많다. 수치모의의 결과는 수리실험의 결과와 비교, 검증을 거쳐 신뢰성을 얻는다. 본 연구에서는, 3차원 수치모형의 다양한 난류모델을 이용하여 흡입파이프로 물이 유입될 때 흡입부 내, 외의 수심 별 유속 변화를 분석하고, 그 결과를 이용하여 FLOW 3D 모형의 검증을 수행하였다.

  • PDF

Prediction of damages induced by Snow using Multiple-linear regression and Artificial Neural Network model (다중선형회귀 및 인공신경망 모형을 이용한 대설피해에 따른 피해액 예측에 관한 연구)

  • Kwon, Soon Ho;Lee, Eui Hoon;Chung, Gunhui;Kim, Joong Hoon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.20-20
    • /
    • 2017
  • 최근 기후변화 영향에 따라 전 세계적으로 인명피해 및 재산피해를 유발하는 자연재난이 지속적으로 증가하고 있으며, 그로 인한 자연재해의 규모가 점점 더 커지고 있다. 실제로 우리나라에서도 지난 1994 년에서 2013 년까지 지난 20 년간 자연재해에 의한 피해액은 12조 3천억 원으로 집계되었으며, 이 중 강우와 태풍에 의한 피해가 85 % 이고, 대설에 의한 피해는 약 13 % 로 자연재해 중 대부분의 피해는 강우 및 태풍에서 발생하지만, 폭설에 의한 피해도 적지 않은 것으로 나타났다. 이에 따라, 정확한 예측을 위해 신뢰도 높은 자료 구축을 통한 대설피해 예측에 관한 연구가 필요한 시점이다. 본 연구에서는 대설피해액 예측을 위해 우리나라의 63개 기상 관측소에서 관측한 적설심 자료 및 기상관측 자료와 사회 경제 자료 총 11개를 대설피해 예측을 위한 입력변수로 선정하고, 이를 기상관측소가 속한 도시의 면적에 따라 3개의 지역으로 구분하였다. 주성분분석을 활용하여 선정된 입력변수들을 4개의 주성분으로 구분하고, 인공신경망 및 다중선형 회귀 모형을 구성하여 각 지역별 대설피해 예측의 오차를 분석하였다. 적용결과, 인공신경망 모형을 이용한 대설피해 예측의 수정결정계수는 22.8 %~48.2 %를 나타냈고, 다중선형회귀 모형의 수정결정 계수는 9.2 %~39.7% 로 나타났다. 그러므로 인공신경망 모형이 다중회귀 모형보다 선택된 입력자료를 활용하여 대설피해를 예측하는 목적으로 조금 더 우수한 결과를 나타내었다. 향후 자료를 보완 및 모형의 고도화를 통해 보다 정확한 대설피해 예측 함수 개발이 가능할 것으로 기대된다.

  • PDF

Weng fang-gang(翁方綱)'s Studies on the Book of Odes - Focused on Adoption of research methods of hanxue(漢學) and songxue(宋學) (옹방강(翁方綱)의 시경학(詩經學) - '한송겸채(漢宋兼采)'의 경향을 중심으로 -)

  • Yang, won-seok
    • (The)Study of the Eastern Classic
    • /
    • no.70
    • /
    • pp.385-405
    • /
    • 2018
  • This paper aimed at examining studies on the Book of Odes of Weng fang-gang(翁方綱), a scholar who lived during Qianjia(乾嘉) period in the Qing(淸) Dynasty. In study on the Book of Odes, he had confidence in interpretation of Shixu(詩 序) and Maozhuan(毛傳), laid emphasis on long interpretation and opposed a tendency to be dubious of Confucian classics, showing a tendency of hanxue(漢 學), and he also showed a tendency of songxue(宋學) by criticizing a problem of Zheng xuan(鄭玄) & Kong ying-da(孔穎達) and taking a positive position toward Shijizhuan(詩集傳) of Zhu xi(朱熹). So to speak, Weng fang-gang can be considered to be a scholar who appropriately adopted and used the study method of hanxue(漢學) and songxue(宋學) in studying the Book of Odes.

Configuration Method of AWS Security Architecture for Cloud Service (클라우드 서비스 보안을 위한 AWS 보안 아키텍처 구성방안)

  • Park, Se-Joon;Lee, Yong-Joon;Park, Yeon-Chool
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.7-13
    • /
    • 2021
  • Recently, due to the many features and advantages of cloud computing, cloud service is being introduced to countless industries around the world at an unbelievably rapid pace. With the rapid increase in the introduction of multi-cloud based services, security vulnerabilities are increasing, and the risk of data leakage from cloud computing services are also expected to increase. Therefore, this study will propose an AWS Well-Architected based security architecture configuration method such as AWS standard security architecture, AWS shared security architecture model that can be applied for personal information security including cost effective of cloud services for better security in AWS cloud service. The AWS security architecture proposed in this study are expected to help many businesses and institutions that are hoping to establish a safe and reliable AWS cloud system.

A Empirical Study on the Patch Impact Assessment Method for Industrial Control Network Security Compliance (산업제어망 보안 컴플라이언스를 위한 패치 영향성 평가 방안에 관한 실증 연구)

  • Choi, Inji
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1141-1149
    • /
    • 2020
  • Most of the industrial control network is an independent closed network, which is operated for a long time after installation, and thus the OS is not updated, so security threats increase and security vulnerabilities exist. The zero-day attack defense must be applied with the latest patch, but in a large-scale industrial network, it requires a higher level of real-time and non-disruptive operation due to the direct handling of physical devices, so a step-by-step approach is required to apply it to a live system. In order to solve this problem, utility-specific patch impact assessment is required for reliable patch application. In this paper, we propose a method to test and safely install the patch using the regression analysis technique and show the proven results. As a patch impact evaluation methodology, the maximum allowance for determining the safety of a patch was derived by classifying test types based on system-specific functions, performance, and behavior before and after applying the patch. Finally, we report the results of case studies applied directly to industrial control networks, the OS patch has been updated while ensuring 99.99% availability.

A Study on the Path Loss of Underwater Acoustic Channel Based on At-sea Experiment at the South Sea of Korea (남해 실해역 시험 기반 수중음향채널 경로손실에 관한 연구)

  • Kim, Min-Sang;Lee, Tae-Seok;Cho, Yong-Ho;Im, Tae-Ho;Ko, Hak-Lim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.405-411
    • /
    • 2020
  • Recently, studies on underwater communication, related to the development of underwater resources, disaster monitoring and defense, have been actively carried out. In the design of wireless communication systems, path loss is the most important information to derive a link budget that is required to guarantee communication reliability by calculating received power level for the given communication link. The underwater acoustic channel have different characteristics according to geographical location and relevant environmental factors such as water temperature, depth, wave height, algae, and turbidity. Subsequently, many research institutes aiming to develop underwater acoustic communication systems are researching actively on the underwater acoustic channels in various sea areas. In Korea, however, studies on the path loss of the acoustic channel are still insufficient. Therefore, in this study, the path loss of the acoustic channel are studied based on measurement data of the at-sea experiment conducted at Geohae-do, southern sea of Korea.

An Optimal Container Deployment Policy in Fog Computing Environments (Fog Computing 환경에서의 최적화된 컨테이너 배포 정책)

  • Jin, Sunggeun;Chun, In-Geol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.3
    • /
    • pp.1-7
    • /
    • 2021
  • Appropriate containers are deployed to cope with new request arrivals at Fog Computing (FC) hosts. In the case, we can consider two scenarios: (1) the requests may be queued until sufficient resources are prepared for the container deployments; (2) FC hosts may transfer arrived service requests to nearby FC hosts when they cannot accommodate new container deployments due to their limited or insufficient resources. Herein, for more employed neighboring FC hosts, arrived service requests may experience shorter waiting time in container deployment queue of each FC host. In contrast, they may take longer transfer time to pass through increased number of FC hosts. For this reason, there exists a trade-off relationship in the container deployment time depending on the number of employed FC hosts accommodating service request arrivals. Consequently, we numerically analyze the trade-off relationship to employ optimal number of neighboring FC hosts.

A Study on the Field Management System for Traffic Safety Facilities in IoT Infrastructure (IoT 기반 교통안전시설 현장관리 체계 연구)

  • WON, Sang-Yeon;LEE, Jun-Hyuk;JEON, Young-Jae;KIM, Jin-Tae
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.25 no.1
    • /
    • pp.1-15
    • /
    • 2022
  • In order to trust and use autonomous vehicles, safe driving on the road must be guaranteed. For this, the first infrastructure to be equipped with autonomous driving is traffic safety facility. On the other hand, autonomous vehicles(Level 3) and general vehicles are driving on the road, it is necessary to additionally manage existing general traffic safety facilities. In this study, a field management system for traffic safety facilities based on autonomous driving infrastructure was studied, and a pilot field management system was implemented in the demonstration area(Pangyo). The pilot system consists of a GNSS(Global Navigation Satellite System) receiver, a field management equipment, and a field management app. As a result of field demonstration,, it was confirmed that traffic safety facility information was easily transmitted and received even in downtown areas and that could be efficiently operated and managed. It is expected that the results of this study will be used as reference materials for the spread of autonomous driving infrastructure to local governments and infrastructure construction in the future.

Software Defined Perimeter(SDP) Authentication Mechanism for Zero Trust and Implementation of ECC Cryptoraphy (제로 트러스트를 위한 소프트웨어 정의 경계(SDP) 인증 메커니즘 제안 및 ECC 암호 구현)

  • Lee, Yun-kyung;Kim, Jeong-nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1069-1080
    • /
    • 2022
  • Zero trust, which means never trust anything before verifying it, is emerging as a hot issue in security field. After authenticating users, zero trust establishes network boundaries so that only networks in the trusted range can be accessed. This concept is also consistent with the concept of SDP, which performs pre-verification and creates a network boundary with a dynamic firewall so that clients can access only as many as they have permission to connect. Therefore, we recommend the SDP model as an example of how zero trust can be achieved in a zero trust architecture. In this paper, we point out the areas where SDP needs to be modified for zero trust and suggest ways to overcome them. In addition, we propose an onboarding method, which is one of the processes for becoming an SDP entity, and present performance measurement results.