• Title/Summary/Keyword: 캠퍼스 네트워크

Search Result 79, Processing Time 0.024 seconds

The Study on Design and Implementation of Cloud-based Education System: Introducing Hang-Out Education System (클라우드 기반 학습 시스템의 설계 및 구현에 관한 연구: 행아웃 학습시스템 도입사례를 중심으로)

  • Lee, Seong-Chul;Park, Joo-Yeon
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.31-36
    • /
    • 2015
  • The Many universities and educational institutions have focused on shifting education paradigm into smart learning using high-tech devices and internet as the level of technology has growing rapidly in every society. Especially, cyber universities and open universities in Korea are trying to develop educational network system and infrastructure corresponding to new convergence technology environment. Therefore, the purpose of this study is to introduce clouded based education system in order to suggest an effective way of using new educational learning system. This study shows the case of Hangout learning system used in K University in Korea to suggest a new educational learning model for real-time lecture and cloud based service platform for improving educational learning environment.

A Personalized Model and its Implementation of Real-Life Space for Providing Efficient Ambient Service (효율적인 엠비언트 서비스 제공을 위한 실생활 공간의 개인화 모델 및 구현)

  • Lim, Sora;Kwon, Yong-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.118-130
    • /
    • 2013
  • With the advent of a new services environment based on high-speed mobile networks and high-performance mobile devices, users in real life require content-centric services that provide personalized information conveniently and efficiently. These services are defined as ambient services. To implement and support sustainable ambient services, there is a critical need to conduct research regarding practicable models and methodologies. This paper proposes an effective model for ambient services based on the personalization of real-life space. The model consists of Public Info-space, Universal Info-space and Private Info-space. We also show a methodology for implementing the model with currently available techniques in order to prove that the model and methodology constitute an applicable solution to developing true ambient services. Finally, a kind of role-playing game which is built on a real university campus is presented to show the model to be available, where the test bed infrastructure consists of wireless mesh networks and real-time location systems (RTLSes).

The Validity Analysis of SDN/NFV Military application (SDN/NFV의 군 적용 타당성 분석)

  • Jang, Ji-Hee;Kwon, Tae-Uk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.687-694
    • /
    • 2020
  • SDN and NFV are next-generation network technologies, and cloud, such as data centers, campuses, and large companies, has been established, or is actively applied by service-oriented communication companies. In particular, the Defense Integrated Data Center will be a prime example for military applications. In order for the Defense Integrated Data Center (DIDC) to become an intelligent center, it is accelerating the promotion of the "Smart Defense Integrated Data Center", which applied the latest information and communication technology (ICT). At the time of the establishment of DIDC, it plans to start building infrastructure such as cloud services at around 30% level, and expand D-Cloud to 75% through 'Cloud First'. In addition, the introduction of SDN/NFV will reduce the operation cost and manpower of DIDC, strengthen the ability to efficiently use information resources and cyber information protection systems, and increase flexibility and agility in using each system to improve efficiency in defense management in the future. Therefore, we will discuss the justification and expected effects of SDN/NFV introduction, focusing on DIDC.

Evolutionary Approaches to Low Fertility in Modern Societies (현대 사회의 저출산에 대한 진화적 분석)

  • Joonghwan Jeon
    • Korean Journal of Culture and Social Issue
    • /
    • v.18 no.1
    • /
    • pp.97-110
    • /
    • 2012
  • The sharp decline of fertility in industrialized countries since the 19th century constitutes a major problem for evolutionary approaches to human behavior. Why would people voluntarily reduce their total number of offspring, despite the fact that resources are so abundant in modern times? Here I review three evolutionary hypotheses for low fertility in modern societies, and discuss how the evolutionary perspective could shed new light on solving the problem of low fertility in Korea. Low fertility may be 1) a maladaptive outcome from the mismatch between our ancestral environments and evolutionarily novel environments, 2) a consequence of gene-culture coevolution where traits that reduce genetic fitness can still spread through a population as a result of imitation, especially if the traits are expressed by high-status people, or 3) an adaptation that maximize parents' long-term genetic fitness in knowledge-based industrialized societies where high parental investment is required for rearing competitive offspring. Based on these considerations, I suggest how the evolutionary explanations of low fertility can be applied to increasing the birth rate in Korea.

  • PDF

DDoS Attack Analysis Using the Improved ATMSim (개선된 ATMSim을 이용한 DDoS 공격 분석)

  • Jeong, Hae-Duck J.;Ryu, Myeong-Un;Ji, Min-Jun;Cho, You-Been;Ye, Sang-Kug;Lee, Jong-Suk R.
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.19-28
    • /
    • 2016
  • Internet traffic has been significantly increasing due to the development of information and communication networks and the growing numbers of cell phone users that access networks. This paper connects to this issue by presenting a way to detect and analyze a typical DDoS attack that results in Internet breaches and network attacks, which are on the increase. To achieve this goal, we improve features and GUI of the existing ATMSim analysis package and use it. This package operates on a network flow-based analysis method, which means that normal traffic collected through an internal LAN at the Korean Bible University campus as well as anomaly traffic with DDoS attacks are generated. Self-similarity processes are used to analyze normal and anomaly traffic that are collected and generated from the improved ATMSim. Our numerical results obtained from three Hurst parameter estimate techniques show that there is quantitatively a significant difference between normal traffic and anomaly traffic from a self-similarity perspective.

The Key Success Factors of University Entrepreneurship Education: Implication from USA University Cases (대학 창업교육 핵심 성공요인: 미국 대학 사례의 시사점)

  • Choi, Jong-In;Park, Chygwan
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.3
    • /
    • pp.85-96
    • /
    • 2013
  • Entrepreneurship courses and programs in Korean universities tend to increase steadily but seem to have some limitations. They are usually recognized as another domain of Business Administration. Entrepreneurship program is practical like Business Administration but should be much more interdisciplinary than that. Because Korean Entrepreneurship programs are in the early stage, they must be reinforced with factors such as education culture, faculties, curriculum and relationships with communities. This study aims to get some implications from Entrepreneurship programs have been run by universities in America in order to facilitate Entrepreneurship program in Korean universities. Based on 11 success factors found by our case universities' Entrepreneurship programs and Kauffman Campus, this study has drawn implications of critical success factors of Entrepreneurship programs as follow. First of all, because Entrepreneurship programs should focus on Entrepreneurship mind sets such as innovative idea generation and courage to overcome risk, it is more desirable that Entrepreneurship programs are introduced in all departments of universities such as Arts, Science and Engineering. These programs also need to take interdisciplinary approach and required to be opened from liberal arts course. In order to be sustained during all their academic careers, vision, mission and strategy for Entrepreneurship programs should be based on strong leadership and support of top leaders. Entrepreneurship culture of each university is also one of the most important success factors. Entrepreneurship programs not only as major programs but also as specific Entrepreneurship minors designed for departments such as Arts, Science and Engineering could be considered according to each university's situation. This study also suggest to make a motivation system for Entrepreneurship faculties, Ph d. programs for Entrepreneurship, communication network for Entrepreneurship programs and mentor system in community. To begin Entrepreneurship programs, it also needs to develop good education contents as many as possible. When it concerned with teaching method, project based 4 year program can be suggested to be effective and efficient. To introduce project based program that should be consistent till participants' graduation, university must prepare regulations to support team teaching, mentor and interdisciplinary cooperation. To dissipate the concept that Entrepreneurship is another version of management, this study support the idea that Entrepreneurship programs should be designed and run by independent and central-focused governance system, Entrepreneurship education center.

  • PDF

A Prototype for Real-time Indoor Evacuation Simulation System using Indoor IR Sensor Information (적외선 센서정보기반 실시간 실내 대피시뮬레이션 시스템 프로토타입)

  • Nam, Hyun-Woo;Kwak, Su-Yeong;Jun, Chul-Min
    • Spatial Information Research
    • /
    • v.20 no.2
    • /
    • pp.155-164
    • /
    • 2012
  • Indoor fire simulators have been used to analyse building safety in the events of emergency evacuation. These applications are primarily focused on simulating evacuation behaviors for the purpose of checking building structural problems in normal time rather than in real time situations. Therefore, they have limitations in handling real-time evacuation events with the following reasons. First, the existing models mostly experiment the artificial situations using randomly generated evacuees while real world requires actual data. Second, they take too long time in operation to generate real time data. Third, they do not produce optimal results to be used in rescueing or evacuation guidance. In order to solve these limitations, we suggest a method to build an evacuation simulation system that can be used in real-world emergency situations. The system performs numerous simulations in advance according to varying distributions of occupants. Then the resulting data are stored in DBMS. The actual person data captured in infrared sensor network are compared with the simulation data in DBMS and the querried data most closely is provided to the user. The developed system is tested using a campus building and the suggested processes are illustrated.

Modeling and Analysis of Wireless Lan Traffic (무선 랜 트래픽의 분석과 모델링)

  • Yamkhin, Dashdorj;Lee, Seong-Jin;Won, You-Jip
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.667-680
    • /
    • 2008
  • In this work, we present the results of our empirical study on 802.11 wireless LAN network traffic. We collect the packet trace from existing campus wireless LAN infra-structure. We analyzed four different data sets: aggregate traffic, upstream traffic, downstream traffic, tcp only packet trace from aggregate traffic. We analyze the time series aspect of underlying traffic (byte count process and packet count process), marginal distribution of time series, and packet size distribution. We found that in all four data sets there exist long-range dependent property in byte count and packet count process. Inter-arrival distribution is well fitted with Pareto distribution. Upstream traffic, i.e. from the user to Internet, exhibits significant difference in its packet size distribution from the rests. Average packet size of upstream traffic is 151.7 byte while average packet size of the rest of the data sets are all greater than 260 bytes. Packets with full data payloads constitutes 3% and 10% in upstream traffic and the downstream traffic, respectively. Despite the significant difference in packet size distribution, all four data sets have similar Hurst values. The Hurst alone does not properly explain the stochastic characteristics of the underlying traffic. We model the underlying traffic using fractional-ARIMA (FARIMA) and fractional Gaussian Noise (FGN). While the fractional Gaussian Noise based method is computationally more efficient, FARIMA exhibits superior performance in accurately modeling the underlying traffic.

Threat Situation Determination System Through AWS-Based Behavior and Object Recognition (AWS 기반 행위와 객체 인식을 통한 위협 상황 판단 시스템)

  • Ye-Young Kim;Su-Hyun Jeong;So-Hyun Park;Young-Ho Park
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.4
    • /
    • pp.189-198
    • /
    • 2023
  • As crimes frequently occur on the street, the spread of CCTV is increasing. However, due to the shortcomings of passively operated CCTV, the need for intelligent CCTV is attracting attention. Due to the heavy system of such intelligent CCTV, high-performance devices are required, which has a problem in that it is expensive to replace the general CCTV. To solve this problem, an intelligent CCTV system that recognizes low-quality images and operates even on devices with low performance is required. Therefore, this paper proposes a Saying CCTV system that can detect threats in real time by using the AWS cloud platform to lighten the system and convert images into text. Based on the data extracted using YOLO v4 and OpenPose, it is implemented to determine the risk object, threat behavior, and threat situation, and calculate the risk using machine learning. Through this, the system can be operated anytime and anywhere as long as the network is connected, and the system can be used even with devices with minimal performance for video shooting and image upload. Furthermore, it is possible to quickly prevent crime by automating meaningful statistics on crime by analyzing the video and using the data stored as text.