• Title/Summary/Keyword: 적응형 관리

Search Result 235, Processing Time 0.021 seconds

Multi-Channel MAC Protocol Based on V2I/V2V Collaboration in VANET (VANET에서 V2I/V2V 협력 기반 멀티채널 MAC 프로토콜)

  • Heo, Sung-Man;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.96-107
    • /
    • 2015
  • VANET technologies provide real-time traffic information for mitigating traffic jam and preventing traffic accidents, as well as in-vehicle infotainment service through Telematics/Intelligent Transportation System (ITS). Due to the rapid increasement of various requirements, the vehicle communication with a limited resource and the fixed frame architecture of the conventional techniques is limited to provide an efficient communication service. Therefore, a new flexible operation depending on the surrounding situation information is required that needs an adaptive design of the network architecture and protocol for efficiently predicting, distributing and sharing the context-aware information. In this paper, Vehicle-to-Infrastructure (V2I) based on communication between vehicle and a Road Side Units (RSU) and Vehicle-to-Vehicle (V2V) based on communication between vehicles are effectively combined in a new MAC architecture and V2I and V2V vehicles collaborate in management. As a result, many vehicles and RSU can use more efficiently the resource and send data rapidly. The simulation results show that the proposed method can achieve high resource utilization in accordance. Also we can find out the optimal transmission relay time and 2nd relay vehicle selection probability value to spread out V2V/V2I collaborative schedule message rapidly.

Ecological Characteristics and Their Implications for the Conservation in the Taehwagang River Estuarine Wetland, Ulsan, South Korea (울산 태화강하구습지의 생태적 특성 및 보전을 위한 제안)

  • Pyoungbeom Kim;Yeonhui Jang;Yeounsu Chu
    • Ecology and Resilient Infrastructure
    • /
    • v.10 no.4
    • /
    • pp.171-183
    • /
    • 2023
  • Estuarine wetlands, which form a distinctive brackish water zone, serve as important habitats for organisms that have adapted to and thrive in this environment. Nonetheless, excessive development and utilization result in artificial disruptions that alter the distinctive functions and attributes of estuarine wetlands. To collect the basic data for the conservation of estuarine wetlands with excellent ecosystems, we investigated the vegetation distribution characteristics and biota status of the Taehwagang River Estuarine Wetland. Data from vegetation surveys have shown that 25 plant communities of six physiognomic vegetation types, including willow vegetation, lotic and lentic herbaceous vegetation, floating/submerged vegetation. In the upper reaches, where topographical diversity was high, various types of wetland vegetation were distributed. In terms of biodiversity, a total of 696 species, including 7 endangered wildlife species, were identified. Due to good ecological connectivity, tidal rivers are formed, brackish water species including various functional groups are distributed around this section. The inhabitation of various water birds, such as diving and dabbler ducks, were confirmed according to the aquatic environment of each river section. The collection of ecological information of the Taehwagang River Estuarine Wetland can be used as a framework for establishing the basis for conservation and management of the estuarine ecosystem and support policy establishment.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

The Study on the Distribution and Inhabiting Status of Nutria (Myocastor coypus) in Korea (뉴트리아 (Myocastor coypus)의 국내 분포 및 서식 현황에 관한 연구)

  • Lee, Do-Hun;Kil, Ji-Hyon;Kim, Dong-Eon
    • Korean Journal of Environment and Ecology
    • /
    • v.27 no.3
    • /
    • pp.316-326
    • /
    • 2013
  • This study has researched the national expansion, dispersion of nutria and investigated its inhabitation status for the past 3 years. The report has shown that the number of nutria habitat, reported to be distributed in 9 cities or districts in 2010, has been increased to 13 in 2012. In the research of 629 nutria habitats, 95.9% of habitat traces were found in Busan-Kyungnam area. From the research of relative density by location type for the 6 survey areas in these 5 areas above, it was shown 3.98(${\pm}2.56$)ind./100m in 2010, 2.90(${\pm}2.69$)ind./100m in 2011 and 1.39(${\pm}0.66$)ind./100m in 2012. From the research of relative density by habitat types, it was shown 3.48(${\pm}2.15$)ind./100m in palustrine wetland area, $1.01{\pm}(0.25)ind.$/100m in river area and $3.69{\pm}(2.83)ind.$/100m in riverine wetland area. It was shown that the annual average density in the areas has slightly been decreased for the past 3 years between 2010 and 2012. It also reported that the habitat density in the river area is a bit lower than that in the wetland area. Currently it can be determined that the nutria has fully adapted themselves to the various local environments of wetland, river, stream, and so on in Korea and the Relative density could be remarkably increased especially in the favorable condition like a wetland. As the ones living in the area with over-density could be spread out to other areas, the efficient management plan to control should be prepared considering ecological conditions.

Development of Evaluation Method for Jointed Concrete Pavement with FWD and Finite Element Analysis (FWD와 유한요소해석을 이용한 줄눈콘크리트포장 평가법 개발)

  • Yun, Kyong-Ku;Lee, Joo-Hyung;Choi, Seong-Yong
    • International Journal of Highway Engineering
    • /
    • v.1 no.1
    • /
    • pp.107-119
    • /
    • 1999
  • The joints in the jointed concrete pavement provide a control against transverse or longitudinal cracking at slab, which may be caused by temperature or moisture variation during or after hydration. Without control of cracking, random cracks cause more serious distresses and result in structural or functional failure of pavement system. However, joints nay cause distresses due to its inherent weakness in structural integrity. Thus, the evaluation at joint is very important. and the joint-related distresses should be evaluated reasonably for economic rehabilitation. The purpose of this paper was to develop an evaluation system at joints of jointed concrete pavement using finite element analysis program, ILLI-SLAB, and nondestructive testing device. FWD. To develop an evaluation system for JCP, a sensitivity analysis was performed using ILLI-SLAB program with a selected variables which might affect fairly to on the performance of transverse joints. The most significant variables were selected from precise analysis. An evaluation charts were made for jointed concrete pavement by adopting the field FWD data. It was concluded that the variables which most significantly affect to pavement deflections are the modulus of subgrade reaction(K) and the modulus of dowel/concrete interaction(G), and limiting criteria on the performance of joints at JCP are 300pci. 500,000 lb/in. respectively. Using these variables and FWD test, a charts of load transfer ratio versus surface deflection at joints were made in order to evaluate the performance of JCP. Practically, Chungbu highway was evaluated by these evaluation charts and FWD field data for jointed concrete pavement. For Chungbu highway, only one joint showed smaller value than limiting criterion of the modulus of dowel/concrete interaction(G). The rest joints showed larger values than limiting criteria of the modulus of subgrade reaction(K) and the modulus of dowel/concrete interaction(G).

  • PDF