• Title/Summary/Keyword: 임의 네트워크

Search Result 779, Processing Time 0.03 seconds

Embedded Multi-LED Display System based on Wireless Internet using Otsu Algorithm (오츠 알고리즘을 활용한 무선인터넷 기반 임베디드 다중 LED 전광판 시스템)

  • Jang, Ho-Min;Kim, Eui-Ryong;Oh, Se-Chun;Kim, Sin-Ryeong;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.329-336
    • /
    • 2016
  • In the outdoor advertising and industrial sites, are trying to implement the LED electric bulletin board system that is based on image processing in order to express a variety of intention in real time. Recently, in various field, rather than simple text representation, the importance of intuitive communication using images is increasing. Thus, instead of outputting the simple input information for communication, a system that can output a real-time information being sought. Therefore, the system is directed to overcoming by converting the problem of mapping an image on a variety of conventional LED display that can not be output images, the possible image output formats. Using an LED of low power, it has developed to output the efficient messages and images within a limited resources. This paper provides a system capable of managing the LED display on the wireless network. Atmega2560, Wi-Fi module, using the server and Android applications client, rather than printing a text only, it is a system to reduce the load generated image output character output in to the conversion process as can be managed by the server.

Log Management System of Web Server Based on Blockchain in Cloud Environment (클라우드 환경에서 블록체인 기반의 웹서버 로그 관리 시스템)

  • Son, Yong-Bum;Kim, Young-Hak
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.143-148
    • /
    • 2020
  • Recently, web services have been expanded to various areas with the evolution of cloud environment. Whenever a user accesses a web service, the user's log information is stored in the web server. This log information is used as data to analyze the user's web service tendencies and is also used as important data to track the user's system access when a security problem in the system occurs. Currently, most web servers manage user log information in a centralized manner. When user log information is managed in a centralized manner, it is simple in the side of operation, but has a disadvantage of being very vulnerable to external malicious attacks. In the case of centralized management, user log information stored in the web server can be arbitrarily manipulated by external attacks, and in severe cases, the manipulated information can be leaked. In this case, it not only decreases the trust of the web service, but also makes it difficult to trace the source and cause of the attack on the web server. In order to solve these problems, this paper proposes a new method of managing user log information in a cloud environment by applying blockchain technology as an alternative to the existing centralized log management method. The proposed method can manage log information safely from external attacks because user log information is distributed and stored in blockchain on a private network with cloud environment.

Implementation of Integrated Player System based on Free-Viewpoint Video Service according to User Selection (사용자 선택에 따른 자유 시점 비디오 서비스 기반의 통합 플레이어 시스템 구현)

  • Yang, Ji-hee;Song, Min-ki;Park, Gooman
    • Journal of Broadcast Engineering
    • /
    • v.25 no.2
    • /
    • pp.265-274
    • /
    • 2020
  • Free-viewpoint video service is a technology that allows users to watch at any angle, location and distance through interaction. In this paper, the free-viewpoint video services are defined in four viewing modes: Inward view, outward view, 3D object view and first person view. And we developed and implemented a new integrated program that plays all the suggested views. In the contents of girl band performances and basketball games, multi-view cameras suitable for each viewing mode are installed to acquire media, and data stored on the server is streamed over the network, making it available for viewing. Users can freely choose four viewing modes, space location, angle and so on, and the media data such as images and sounds are provided to them by rendering appropriately for the selected the viewpoint. Our system is expected to be a scalable free-viewpoint video service player as well as provide users with immersion and presence by combining various viewing modes.

A Routing Optimization for Hybrid Routing Protocol in Wireless Ad Hoc Networks (Ad Hoc망에서 하이브리드 라우팅 프로토콜을 위한 경로 설정 최적화)

  • 추성은;김재남;강대욱
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.274-276
    • /
    • 2002
  • Ad Hoc망은 전형적인 무선 네트워킹과는 다른 새로운 무선 네트워킹 파라다임으로써 기존 유선 망의 하부 구조에 의존하지 않고 이동 호스트들로만 구성된 네트워크이다. Ad Hoc망에서 통신을 하기 위해서는 출발지 노드에서 목적지 노드까지 데이터 전송을 위한 라우팅에 관한 문제이다. Ad Hoc망에서는 모든 단말기의 위치변화가 가능하기 때문에 경로설정에 어려움이 따른다. 노드간에 정보를 보내고자 할 때 노드가 인접한 상태가 아니면 정보를 직접 보낼 수 없고 여러 중간 노드들을 거쳐서 정보를 보내는 다중-홉 라우팅 방식을 사용해야 한다. 따라서 중간 노드들은 패킷 라우터의 역할을 해야하는데 무선 통신자체가 좁은 대역폭과 한정된 채널을 가지고 전송 범위가 제한되는 문제가 있다. 또한 노드자체의 이동성과 전력 소모 등으로 인한 이탈은 망 위상을 수시로 변화시키므로 노드간에 정보를 전송하는데 가장 좋은 경로는 수시로 변경될 수 있으므로 많은 어려움이 따르게 된다. 본 논문에서는 이러한 문제의 해결방안으로 경로유지 과정에서 Ad Hoc망 내의 노드들은 이동성의 특성으로 인해 현재 사용되는 경로 보다 더 짧고 효율적인 경로가 발생하고 중간 노드가 이동 될 때 새로운 경로로 갱신하여 솔기없는 최적의 경로를 유지할 수 있는 방법을 제안한다. 제안 방법은 ZRP의 IERP에서 감청모드를 통하여 사용중인 경로보다 최적의 경로를 감지하여 새로운 경로로 갱신하는 방법과 중간 노드가 이동하여 경로가 깨진 경우 부분적으로 경로를 복구하는 방법을 제시하여 항상 최적화된 경로를 유지함으로써 Ad Hoc망의 위상변화에 대한 적응성을 높일 수 있도록 한다.기반으로 하는 교육용 애플리케이션 개발의 용이성의 증대를 기대할 수 있으며, 모델의 재사용성을 보장할 수 있다. 제안한다.수행하였다. 분석에서는 제품의 효율성뿐만 아니라 보안성을 중요하게 생각하였으며, 앞으로 보안 관련 소프트웨어 개발에 사용될 수 있는 도구들이 가이드 라인에 대한 정보를 제공한다.용할 수 있는지 세부 설계를 제시한다.다.으로서 hemicellulose구조가 polyuronic acid의 형태인 것으로 사료된다. 추출획분의 구성단당은 여러 곡물연구의 보고와 유사하게 glucose, arabinose, xylose 함량이 대체로 높게 나타났다. 점미가 수가용성분에서 goucose대비 용출함량이 고르게 나타나는 경향을 보였고 흑미는 알칼리가용분에서 glucose가 상당량(0.68%) 포함되고 있음을 보여주었고 arabinose(0.68%), xylose(0.05%)도 다른 종류에 비해서 다량 함유한 것으로 나타났다. 흑미는 총식이섬유 함량이 높고 pectic substances, hemicellulose, uronic acid 함량이 높아서 콜레스테롤 저하 등의 효과가 기대되며 고섬유식품으로서 조리 특성 연구가 필요한 것으로 사료된다.리하였다. 얻어진 소견(所見)은 다음과 같았다. 1. 모년령(母年齡), 임신회수(姙娠回數), 임신기간(姙娠其間), 출산시체중등(出産時體重等)의 제요인(諸要因)은 주산기사망(周産基死亡)에 대(對)하여 통계적(統計的)으로 유의(有意)한 영향을 미치고 있어 $25{\sim}29$세(歲)의 연령군에서, 2번째 임신과 2번째의 출산에서 그리고 만삭의 임신 기간에, 출산시체중(出産時體重

  • PDF

An Efficient Multipath Routing with Dynamic Load Balancing (효율적인 동적 부하 균등 분산을 적용한 다중 경로 라우팅)

  • Jung, Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.406-416
    • /
    • 2001
  • Single path routing schemes using dynamic routing metric amy find out the dynamic network status and recompute paths to keep the traffic from the highly loaded regions of the network. This type of routing approach, however, may lead to a routing oscillation, and further, it cannot exploit multi-paths that may frequently exist in the real network. We propose a multipath routing scheme with dynamic load balancing, called MP-DLB, which is capable of reducing the overhead incurred by the multipath routing with dynamic load balancing approach while taking advantage of the high routing performance provided by the approach. According to the analysis of Internet packet traces which show that a high percentage of network traffic is destined for a small number of networks, MP-DLB applies the multipath routing with dynamic load balancing only to a limited subset of all the destinations in the network. For the rest of the destinations, it applies traditional single path routing scheme. This approach may reduce overall routing overheads by limiting the number of destinations to apply the more complicated routing scheme while it can keep the routing performance high by providing efficient routing for the most significant traffic in the routing performance. A series of simulations are done to analyze the performance of MP-DLB. The simulation results show that MP-DLB may effectively cope with the congestion and achieve high routing performance by distributing traffic streams that are generated from varying sources and heading toward a specific hot destination over multi-paths.

  • PDF

Social Welfare Education in the 4th Industrial Revolution (4차 산업혁명시대의 사회복지교육)

  • Nam, Hee-Eun;Baik, Jeong-Won;Im, Yu-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.46-53
    • /
    • 2020
  • The purpose of this study was to examine the direction of social welfare education in the 4th Industrial Revolution as well as discuss the overall direction of social welfare education such as competency and curriculum and the educational dimension of social welfare professionals. Using Text Network Analysis, 223 studies published from 2005 to 2019 in the Korean Journal of Social Welfare Education were examined in order to explore the direction of social welfare education in the 4th Industrial Revolution. Using Word cloud, overall frequency was analyzed. As a result of key words analysis, social welfare education (43), research method (28), and social welfare field practice (23) were analyzed as influential key words. The directions of social welfare education in the 4th Industrial Revolution era are as follows. First, competency, curriculum, and qualifications are necessary in general social welfare education. Second, education centering on social workers and social welfare students, who are social welfare professionals, is necessary. Third, the ethical sensitivity of future social welfare should be carefully established. Finally, the need for a shared welfare system must be further studied.

Cycle Extendability of Torus Sub-Graphs in the Enhanced Pyramid Network (개선된 피라미드 네트워크에서 토러스 부그래프의 사이클 확장성)

  • Chang, Jung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1183-1193
    • /
    • 2010
  • The pyramid graph is well known in parallel processing as a interconnection network topology based on regular square mesh and tree architectures. The enhanced pyramid graph is an alternative architecture by exchanging mesh into the corresponding torus on the base for upgrading performance than the pyramid. In this paper, we adopt a strategy of classification into two disjoint groups of edges in regular square torus as a basic sub-graph constituting of each layer in the enhanced pyramid graph. Edge set in the torus graph is considered as two disjoint sub-sets called NPC(represents candidate edge for neighbor-parent) and SPC(represents candidate edge for shared-parent) whether the parents vertices adjacent to two end vertices of the corresponding edge have a relation of neighbor or sharing in the upper layer of the enhanced pyramid graph. In addition, we also introduce a notion of shrink graph to focus only on the NPC-edges by hiding SPC-edges within the shrunk super-vertex on the resulting shrink graph. In this paper, we analyze that the lower and upper bounds on the number of NPC-edges in a Hamiltonian cycle constructed on $2^n{\times}2^n$ torus is $2^{2n-2}$ and $3{\cdot}2^{2n-2}$ respectively. By expanding this result into the enhanced pyramid graph, we also prove that the maximum number of NPC-edges containable in a Hamiltonian cycle is $4^{n-1}$-2n+1 in the n-dimensional enhanced pyramid.

A Study on ACFBD-MPC in 8kbps (8kbps에 있어서 ACFBD-MPC에 관한 연구)

  • Lee, See-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.49-53
    • /
    • 2016
  • Recently, the use of signal compression methods to improve the efficiency of wireless networks have increased. In particular, the MPC system was used in the pitch extraction method and the excitation source of voiced and unvoiced to reduce the bit rate. In general, the MPC system using an excitation source of voiced and unvoiced would result in a distortion of the synthesis speech waveform in the case of voiced and unvoiced consonants in a frame. This is caused by normalization of the synthesis speech waveform in the process of restoring the multi-pulses of the representation segment. This paper presents an ACFBD-MPC (Amplitude Compensation Frequency Band Division-Multi Pulse Coding) using amplitude compensation in a multi-pulses each pitch interval and specific frequency to reduce the distortion of the synthesis speech waveform. The experiments were performed with 16 sentences of male and female voices. The voice signal was A/D converted to 10kHz 12bit. In addition, the ACFBD-MPC system was realized and the SNR of the ACFBD-MPC estimated in the coding condition of 8kbps. As a result, the SNR of ACFBD-MPC was 13.6dB for the female voice and 14.2dB for the male voice. The ACFBD-MPC improved the male and female voice by 1 dB and 0.9 dB, respectively, compared to the traditional MPC. This method is expected to be used for cellular telephones and smartphones using the excitation source with a low bit rate.

A Study on the Preventive Measures of Criminal Behaviors and Criminal Damages of North Korean Defectors (북한이탈주민의 범죄행위 및 범죄피해에 대한 효과적인 예방대책)

  • Lim, Chang-Ho
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.217-246
    • /
    • 2016
  • Most of the North Korean defectors are the socially disadvantaged, and formed the lowest class in South Korean society. Their main objectives are to achieve economic wealth. In this process, North Korean defectors have often committed the crime or have been criminal victims. The purpose of this study was to propose the effective preventive measures after analyzing the actual situation of North Korean defectors in criminal behaviors and criminal damages. This research has studied of the literature on the criminal behavior and the criminal damage by North Korean defectors, utilized the relevant statistical data, cited the news for the relevant cases, and proposed the effective preventive measures of criminal behaviors and criminal damages of North Korean defectors by doing in-depth interviews with personal protection officer First, in order to prevent criminal activity by North Korean defectors, we should uplift the identity as the members of Korean society, systemize the initial adapt education, enlarge the employment protection and the resettlement helper system, manage North Korean defectors according to adaptive type, develop the network, establish the management department for the defectors, strengthen the training of prison inmates, and strengthen the management of unprotected people. Next, in order to prevent the criminal damages of North Korean refugees, we should manage vulnerable North Korean defectors effectively, maintain the liaison between the personal protection officer and North Korean defector, arrange the personal safety measures in advance when traveling abroad, enhance the legal education for usual living in Korean society, and perform the re-education for the female socialization.

  • PDF

An Exploratory Study on Fintech Regulations and Start-ups: Focusing on the US, China, and Korea Cases (핀테크 산업 규제와 스타트업 활성화 방안에 대한 탐색적 연구: 미국, 중국, 한국 사례를 중심으로)

  • Jeon, Seongmin;Pak, Do Hyun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.15 no.1
    • /
    • pp.45-57
    • /
    • 2020
  • Among the fintech businesses that are actively developing around the world, payment and settlement are the most prominent. Korea has a well-developed IT industry and a good existing card payment environment, however, its innovative movement is overwhelmingly slower than that of other countries in the fintech. In this study, we try to assess the regulations on fintech and their impacts on the startup ecosystem by comparing the cases of U.S., China, and Korea. We have found that both the United States and China have lowered barriers to entry for the newly launched fintech industry, allowing startups and IT companies to start fintech businesses at the existing financial sector. Particularly the implementation of predictable regulations in U.S., and the failure to apply the financial regulations in China, help start-up companies' growth in the fintech industry. This finding provides us with a lesson that current positive regulations in Korea should gradually change into negative regulations, and predictable regulations that strictly enforce post-management except major items rather than pre-approval. The policy implications are discussed with the perspective of start-ups in fintech industry.