• Title/Summary/Keyword: 융합우선순위

Search Result 192, Processing Time 0.033 seconds

A Study on Support of ICT Cluster in Yangjae-Umyeun Area (양재우면지역의 ICT 클러스터 지원방안에 관한 연구)

  • Gil, Jin Ho;Kim, Dongwook;Kim, Dae Ho
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.7
    • /
    • pp.237-243
    • /
    • 2017
  • Recently, the Korean government is planning to create ICT-centered clusters that will lead the fourth industrial revolution in the Yangjae-Umyeun area. In order for a cluster to be successful, innovation environments such as support systems and institutions should be appropriately prepared. In this study, we present a hierarchical model of ICT SME support measures after comprehending the support measures for existing SMEs and the factors needed for clustering, and then deriving the priorities of support measures. The questionnaire was distributed to 9 ICT SMEs and R&D experts. A total of 6 copies were collected. The priority of the support measures in this study is expected to be utilized for the successful development of R&CD cluster and the allocation of the support budget.

Forwarding Protocol Along with Angle Priority in Vehicular Networks (차량 통신망에서 Angle 우선순위를 가진 Forwarding 프로토콜)

  • Yu, Suk-Dea;Lee, Dong-Chun
    • Convergence Security Journal
    • /
    • v.10 no.1
    • /
    • pp.41-48
    • /
    • 2010
  • Greedy protocols show good performance in Vehicular Ad-hoc Networks (VANETs) environment in general. But they make longer routes causing by surroundings or turn out routing failures in some cases when there are many traffic signals which generate empty streets temporary, or there is no merge roads after a road divide into two roads. When a node selects the next node simply using the distance to the destination node, the longer route is made by traditional greedy protocols in some cases and sometimes the route ends up routing failure. Most of traditional greedy protocols just take into account the distance to the destination to select a next node. Each node needs to consider not only the distance to the destination node but also the direction to the destination while routing a packet because of geographical environment. The proposed routing scheme considers both of the distance and the direction for forwarding packets to make a stable route. And the protocol can configure as the surrounding environment. We evaluate the performance of the protocol using two mobility models and network simulations. Most of network performances are improved rather than in compared with traditional greedy protocols.

Analytic Hierarchy Process(AHP) to Improve the Current Counter-Terrorism System (현행 대(對)테러시스템의 개선을 위한 상대적 중요도 분석)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.123-128
    • /
    • 2019
  • In March 2016, the Korean National Assembly passed the Counterterrorism Act called as "Counterterrorism Law for the Protection of the People and Public Safety", and relevant functions and roles of the counterterrorism institution were granted based on the law. However, a number of problems have been raised in the course of the job performance of the counterterrorism related institution, and various improvements have been discussed. This study conducted 'Analytic Hierarchy Process(AHP)' on the experts to identify the issues related to the improvement possibilities of the counterterrorism system that had been discussed previously. The results of the analysis to improve the current counterterrorism system are as follows. First, the priorities of the top factors were identified as in the order of legal institutions, cooperation, and operational aspect. Next, the priorities of the individual sub-factors were identified as the reorganization of the counterterrorism task force, the organic cooperation of domestic counterterrorism institution, and the cultivation of specialized human resources for anti-terrorism work. It was found that we should discuss the reorganization of counterterrorism institution as a policy consideration to improve the counterterrorism system.

Analysis of relative importance and priority of decision-making factors in accelerator selection of startups using AHP technique (AHP 기법을 이용한 스타트업의 액셀러레이터 선택 의사결정요인의 상대적 중요도와 우선순위 분석)

  • Bae, Sang-Wan;Lee, Dong-Myung
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.127-140
    • /
    • 2022
  • Recently, accelerators are attracting attention as a new startup incubator. This study empirically analyzed the relative importance and priority of decision-making factors when a startup selects an accelerator using the AHP technique. As a result, startup founders recognized the importance of decision-making factors in the order of funding factors, program factors, and accelerator characteristic factors. there was a difference in the relative importance of detailed factors between startup founders and accelerator workers, depending on the location of the business site and the presence or absence of sales performance. This suggests that accelerators need to strengthen the financial support capabilities and improve customized services to meet the needs of startups. This study can be used as a decision-making criterion when a startup selects an accelerator, and can be used as basic data for additional research on the accelerator program.

VTS 운용 콘솔 상 해상교통위험도 도입 제안에 관한 연구

  • 김소라;박영수;김대원;김영신;박상원;박득진
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.11a
    • /
    • pp.53-53
    • /
    • 2023
  • 현대 사회에서 해상 운송은 전체 화물 운송의 약 80%를 차지하는 국제 무역 및 경제 활동의 핵심적인 요소이다. 이에 따라 선박 교통 관제는 해상 안전과 운송 효율성을 향상시키는 데 있어 아주 중요한 역할을 수행하고 있다. 보다 안전한 해상 운송을 지속하기 위해서는 효율적이고 스마트한 선박 교통 관제 시스템이 필수적이므로 본 연구에서는 선박 교통 관제 시스템인 VTS 운용 콘솔 상 해상교통위험도를 시각화하는 것을 제안한다. 우선, 현 관제사를 대상으로 시선 추적 실험을 실시함으로써 관제사의 시선 분포를 통해 주요 관찰 대상과 작업 우선순위 등을 살펴보았다. 이후 동일한 해역에 동일한 시간대의 교통 밀도와 해상 교통 위험도를 정량적으로 평가하고, 이를 관제사의 시선 추적 데이터와 비교 분석하였다. 분석 결과, 객관적인 데이터를 활용하여 관제사의 의사 결정과 수행 업무를 지원하는 것이 해상 교통 관리의 효율성과 안전성을 향상시킬 수 있음을 확인하였다. 이는 미래에 보다 안전하고 효율적인 해상 운송 시스템의 구현을 위한 실질적인 기여가 될 것으로 기대된다.

  • PDF

The Security Risk Analysis and Economical Estimation for Convergence of Broadcasting and Communication (방송통신융합시스템의 보안위험분석 및 경제성분석)

  • Kim, In-Jung;Ryou, Jeong-A
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.15-25
    • /
    • 2008
  • In today's broadcasting and communication systems, many applications are converged information in a complicated manner by interworking with various networks such as satellite networks. Specifically, as broadcasting and communication systems have become more advanced in terms of technology and capacity, the increase in information assets has created new types of threats and vulnerabilities that we're not previously apparent. This paper has proposed the following methodologies for analyzing the risks and estimating the economical that could arise in broadcasting and communication convergence systems. First, the assets are prioritized by grading them according to confidentiality(copyrights), integrity, and availability. Based on such an analysis, this paper presents a model that can be used for verifying the risk variables caused by changing threats and vulnerabilities. Second, this paper presents a method for quantitatively estimating the economical caused by countermeasure costs for each time period.

  • PDF

Telematics content processing system for the efficient transmission via DMB (DMB 방송망에 효율적 전송을 위한 텔레매틱스 컨텐츠 처리 시스템)

  • Lee, Moon-Soo;Kim, Min-Jung;Choi, Jong-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.11a
    • /
    • pp.661-664
    • /
    • 2006
  • 과거 텔레매틱스와 DMB 기술 융합 모델은 대표적인 통방 융합의 예견되어 왔으며, DMB는 교통정보, 지도, POI 등 대용량의 텔레매틱스 컨텐츠를 방송망을 통해 내려 보낼 것으로 예측되었다. 하지만 현재 DMB 방송에서 비디오/오디오 보다 데이터 수익성이 적어 많은 대역폭 할당에 할 수 없는 실정이다. 본 논문은 방송에 적합한 텔레매틱스 컨텐츠를 컨텐츠별로 우선순위를 정함으로써 제한된 대역폭에서도 전송 주기를 효과적으로 조절하여 차량의 고속 이동 중 음영지역을 고려하여 단방향 통신의 수신율을 향상시켜줄 수 있다.

  • PDF

An Adaptive Tree Map Scheme using Genetic Algorithm (유전 알고리즘을 이용한 적응적 트리맵 설계)

  • 홍종선;김대일;장혜경;김영호;강대성
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2003.06a
    • /
    • pp.98-101
    • /
    • 2003
  • 본 논문에서는, 패턴 인식시 데이타의 최적의 특성을 구성할 수 있는 새로운 신경망 구조인 적응적 트리맵을 제안한다. 유전 알고리즘을 사용한 적응적 트리맵(adaptive tree map ATM)은 데이터의 특징에 대한 중요도를 유전 알고리즘으로 구성하고, 특징의 우선 순위에 따라 트리구조를 도입하고 데이터의 유사성에 따라 신경망의 뉴런이 분리, 병합 될 수 있다. 패턴인식의 인식률에 영향을 미치는 인자 중에서 가장 중요한 특징은 연구자의 선택에 의하여 사용되거나 무시될 수 있으며, 반복적인 실험을 통하여 적절한 특징을 사용할 수 있으나 최적의 특징은 될 수 없다. 그러나 본 논문에서 제안한 ATM을 이용하면 블랙박스로 구성된 적응적인 시스템을 이용하여 원하는 출력을 얻을 수 있게 된다.

  • PDF

Investigating Key Security Factors in Smart Factory: Focusing on Priority Analysis Using AHP Method (스마트팩토리의 주요 보안요인 연구: AHP를 활용한 우선순위 분석을 중심으로)

  • Jin Hoh;Ae Ri Lee
    • Information Systems Review
    • /
    • v.22 no.4
    • /
    • pp.185-203
    • /
    • 2020
  • With the advent of 4th industrial revolution, the manufacturing industry is converging with ICT and changing into the era of smart manufacturing. In the smart factory, all machines and facilities are connected based on ICT, and thus security should be further strengthened as it is exposed to complex security threats that were not previously recognized. To reduce the risk of security incidents and successfully implement smart factories, it is necessary to identify key security factors to be applied, taking into account the characteristics of the industrial environment of smart factories utilizing ICT. In this study, we propose a 'hierarchical classification model of security factors in smart factory' that includes terminal, network, platform/service categories and analyze the importance of security factors to be applied when developing smart factories. We conducted an assessment of importance of security factors to the groups of smart factories and security experts. In this study, the relative importance of security factors of smart factory was derived by using AHP technique, and the priority among the security factors is presented. Based on the results of this research, it contributes to building the smart factory more securely and establishing information security required in the era of smart manufacturing.

Differential Bandwidth Allocation Method using Upstream Bandwidth Wavelength Division of EPON (상향트래픽 파장분할 EPON에서 우선순위 큐를 고려한 차등대역폭 할당방법)

  • Seo, Chang-Jin;Jang, Yong-Suk
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.265-270
    • /
    • 2012
  • The subscriber access network is cause of the bottleneck phenomenon because equipment and infrastructure were not originally designed for busty high-bandwidth traffic between MAN(Metro Area Network) and LAN(Local Area Network). Whether riding on shorter copper drops or optical fiber, Ethernet is emerging as the future broadband protocol of choice, offering plug and play simplicity, and low cost. EPON(Ethernet Passive Optical Network) combines point-to-multipoint optical infrastructure with low-cost high-bandwidth Ethernet. The future broadband access network will be a combination of point-to-point and point-to-multipoint Ethernet, optimized for transporting IP data, as well as time critical voice and video. EPON is being considered as a novel communications infrastructure for next-generation broadband access network for the convergence of low-cost Ethernet equipment and low-cost fiber infrastructure. But, EPON has a problem with duplex multimedia services. It is the insufficiency of bandwidth for upstream. Because all ONUs use a shared transmission media for upstream. In this paper, we addressed the problem of upstream bandwidth in EPONs. We presented a wavelength division EPON supporting QoS in the differentiated services framework.