• Title/Summary/Keyword: 통제 네트워크

Search Result 447, Processing Time 0.026 seconds

Corridor and Network Analyses of Forest Bird Habitats in a Metropolitan Area of South Korea (수도권 지역 산림성 조류 서식지의 통로와 연결망 분석)

  • Kang, Wanmo;Park, Chan-Ryul
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.17 no.3
    • /
    • pp.191-201
    • /
    • 2015
  • Measuring and mapping connectivity among habitats is a key component of sustainable urban planning and design process. In this study, we examined how functional corridors connect forest bird habitats in a metropolitan area of Korea using graph theory-based techniques. High-quality forest habitat was defined as a function of forest cover, presence of residential areas, and road networks. We then constructed a network of high-quality forest habitats using the FunConn (functional connectivity) tools, and computed metrics ($T_i$) of patch importance based on the minimum ($Q_1$) and the 25th percentile ($Q_{25}$) rank least-cost distance values. We investigated the relative influence of two values of patch importance on forest bird species richness. As a result, the patch importance index based on the $Q_{25}$ effective distance threshold was most positively correlated with species richness (P < 0.001) after controlling for the area effect. Thus, using the $Q_{25}$ effective distance threshold, we mapped not only the locations of important habitat patches and functional corridors, but also the network backbone of forest bird habitats. The network developed in this study can help guide urban planning for biodiversity conservation.

A Tactical Internet Geocasting Protocol for Efficient Message Delivery (효율적인 메시지 전달을 위한 전술인터넷 지오캐스팅 프로토콜)

  • Yoon, Sun-Joong;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10B
    • /
    • pp.1050-1061
    • /
    • 2009
  • The Tactical Internet(TI) managed by Infantry Brigades is used for the purpose of sharing information of Command Control and Situation Awareness. When there are more than two destinations to transmit data in the TI system, a multicasting is utilized based on pre-defined multicast groups. However even in the case when a source node needs to send some messages like weathercast and attack alarm etc to only a part of Battalion or Brigades in a specific geographical region (destination region), the current TI multicasting protocol is designed to transmit the messages to the pre-defined group or all of the Battalion/Brigade nodes, resulting in inefficiency in terms of end-to-end delay and overhead. In this paper, we propose more efficient protocol for such cases, named as "Tactical Internet Geocasting (TIG)". The proposed scheme firstly checks whether the destination region belongs to one Battalion region or more than two Battalion regions using location information, and then performs a greedy forwarding from the source node to the destination region, followed by a local flooding inside of the destination region. With performance analysis and simulations using NS-2, TIG is compared to the current TI multicasting protocol (i.e., Simplified MDP) and the LBM (Location-based Multicast). The simulation results show that the proposed TIG is more efficient than both in terms of delay and network overhead.

Analysis on Importance of Information Security Factors for Smart Work using AHP -Based on the Mobile Office for Small Businesses- (AHP를 활용한 스마트워크 정보보호 요소의 중요도 분석 -중소기업의 모바일 오피스를 중심으로-)

  • Kang, Kyung-Hoon;Lim, Chae-Hong;Lim, Jong-In;Park, Tae-Hyoung
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.415-426
    • /
    • 2013
  • Smart work has recently introduced as a way to solve problems such as greenhouse gas emissions, low birth rate and aging as well as to improve productivity. Because of development of ICT infrastructure and the proliferation of smart devices, the mobile office has the most commonly used within types of smart work in Korea. But the adoption of the mobile office in small businesses is only half of that of large corporations. The security issue appears to be one of the biggest obstacles to the introduction of smart work in small businesses. Therefore, the purpose of this study is to analyze the information security factors that should be considered when the mobile office is introduced to small businesses. By analyzing the previous studies, the information security factors of the mobile office are classified 5 groups composed of 24 factors. 5 groups are terminals, applications and platforms, networks, servers and users. According to the survey result using AHP, 'User' was drawn to the most important group, and 'Data Encryption', 'Wireless LAN Control' and 'Terminal Recovery When Leaving' were drawn to the important information security factors of the mobile office among 24 factors.

The Effects of R&D Capability and Market Orientation on Product Innovation Performance : The Moderating Role of Technological Innovation Orientation (반도체 기업의 R&D역량과 시장지향성이 제품혁신성과에 미치는 영향: 기술혁신지향성의 조절효과를 중심으로)

  • Kim, Dae-Hui;Kim, Jong-Keun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.79-95
    • /
    • 2017
  • This Study Investigates Whether R&D Capabilities and Market Orientation have Significant Effects on Product Innovation Performance in Order to Enhance Customer Value and Technology Innovation Competitiveness Considering the Characteristics of Rapidly Changing Semiconductor Industry. In other Words, as in the Research Model, the Purpose of this Study is to Investigate the Causal Relationship between the Independent Variable, R&D Capability and Market Orientation, on Product Innovation Performance, which is a Dependent Variable, through the Moderating Variable of Technological Innovation Orientation. For this Study, we Conducted a Questionnaire Survey on the Employees of Development Companies in the Semiconductor Industry and Finally Collected 118 Valid Questionnaires. The Collected Data was Analyzed by Multiple Regression Analysis with Demographic Characteristics as Control Variable and Hierarchical Regression Analysis was Conducted with the Moderating Effects of Technological Innovation Orientation. The Results Showed that the Higher the R&D Intensity and the External Network Capacity, the Higher the Product Innovation Performance. Also, the Product Innovation Performance was Higher than the Customer Orientation and Competitor Orientation Among the Market Orientation. In Addition, only R&D Capability Confirms that Technology Innovation Orientation is Moderated. The Result of this Study is to Improve Understanding of R&D Capability and Market Orientation in Creating of Product Innovation Performance of Semiconductor Companies and to offer Valuable Research Data in Empirically Supporting that Technological Innovation Orientation is an Important Moderating Factor in Creating Firm's Product Innovation Performance and Sustainable Competitive Advantage.

e-Business Security Framework and applied to Architecture (e-Business Security 프레임웍과 적용 방안)

  • 홍승필;김명철;김재현;김민형
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.87-97
    • /
    • 2002
  • Many firms are utilizing the Internet and various information technologies to effectively manage their business operations with a goal of gaining a competitive advantage in the rapidly changing business environments. Today, the business is characterized as digital economy where information freely flows and business processes are improved with the use of information technologies. Internet technology is playing a key role in transforming the organization and creating new business models. It has become the infrastructure of choice for electronic commerce because it provides process efficiency, cost reduction, and open standards that can easily be adopted by different organizations. Here, the vast amount of data and information slow among the related parties and security issues are very critical matter of research interests by academicians and practitioners. In this research, we address the importance of security framework in managing the data shared among the related parties in the e-business and suggest the security architecture for effectively supporting the needs of e-business in an organization. This research provides valuable contributions both in academics and industry in terms of how security framework and architecture should be set in order to provide the necessary e-business.

  • PDF

A Priority Based Multipath Routing Mechanism in the Tactical Backbone Network (전술 백본망에서 우선순위를 고려한 다중 경로 라우팅 방안)

  • Kim, Yongsin;Shin, Sang-heon;Kim, Younghan
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1057-1064
    • /
    • 2015
  • The tactical network is system based on wireless networking technologies that ties together surveillance reconnaissance systems, precision strike systems and command and control systems. Several alternative paths exist in the network because it is connected as a grid to improve its survivability. In addition, the network topology changes frequently as forces and combatants change their network access points while conducting operations. However, most Internet routing standards have been designed for use in stable backbone networks. Therefore, tactical networks may exhibit a deterioration in performance when these standards are implemented. In this paper, we propose Priority based Multi-Path routing with Local Optimization(PMPLO) for a tactical backbone network. The PMPLO separately manages the global and local metrics. The global metric propagates to other routers through the use of a routing protocol, and it is used for a multi-path configuration that is guaranteed to be loop free. The local metric reflects the link utilization that is used to find an alternate path when congestion occurs, and it is managed internally only within each router. It also produces traffic that has a high priority privilege when choosing the optimal path. Finally, we conducted a simulation to verify that the PMPLO can effectively distribute the user traffic among available routers.

A Study on the Relation between Degree and Physical & Mental Health of Old People in Interpersonal Relationship Network (대인관계 네트워크에서 연결정도와 노인의 신체적 건강 및 정신적 건강과의 관련성 연구)

  • Chae, In-Hwa;Choi, Sung-Won
    • 한국노년학
    • /
    • v.37 no.2
    • /
    • pp.329-347
    • /
    • 2017
  • The purpose of this study is to see if we can predict the health of seniors of community by analyzing the connection between social network degree and mental and physical health of old people who live in the areas of Gangwha Island. The subjects of the study were men and women aged 65 or over, a total of 643 that resided in Ganghwa A-county. The survey was conducted on Korean Social Life, Health and Aging Project from the year 2011 to 2012. Regression analysis was carried out using the data. The analysis results were as follows. First, it showed the relationships between income, gender, age out of demographic variables used as control variable and old persons'physical health. The research results showed that physical health was better in case of the higher incomes, men, and lower age. Second, out of demographic variables, educational background, income, age was shown to correlate with mental health. The research results showed that mental health was better in case of the higher incomes, higher educational background, and lower age. Third, in social network including direction, both out-degree and in-degree were shown to predict old people's physical and mental health. The results of this study suggest that not only out-degree but also in-degree should be considered in predicting the health of elderly persons by a person's human relationship. Also, two indicators of degree are meaningful in the dimension of health promotion and welfare of the old in that they can be used for finding isolated individuals that can be physically and mentally vulnerable.

Mass Spectrometry-based Comparative Analysis of Membrane Protein: High-speed Centrifuge Method Versus Reagent-based Method (질량분석기를 활용한 막 단백질 비교분석: High-speed Centrifuge법과 Reagent-based법)

  • Lee, Jiyeong;Seok, Ae Eun;Park, Arum;Mun, Sora;Kang, Hee-Gyoo
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.51 no.1
    • /
    • pp.78-85
    • /
    • 2019
  • Membrane proteins are involved in many common diseases, including heart disease and cancer. In various disease states, such as cancer, abnormal signaling pathways that are related to the membrane proteins cause the cells to divide out of control and the expression of membrane proteins can be altered. Membrane proteins have the hydrophobic environment of a lipid bilayer, which makes an analysis of the membrane proteins notoriously difficult. Therefore, this study evaluated the efficacy of two different methods for optimal membrane protein extraction. High-speed centrifuge and reagent-based method with a -/+ filter aided sample preparation (FASP) were compared. As a result, the high-speed centrifuge method is quite effective in analyzing the mitochondrial inner membranes, while the reagent-based method is useful for endoplasmic reticulum membrane analysis. In addition, the function of the membrane proteins extracted from the two methods were analyzed using GeneGo software. GO processes showed that the endoplasmic reticulum-related responses had higher significance in the reagent-based method. An analysis of the process networks showed that one cluster in the high-speed centrifuge method and four clusters in the reagent-based method were visualized. In conclusion, the two methods are useful for the analysis of different subcellular membrane proteins, and are expected to assist in selecting the membrane protein extraction method by considering the target subcellular membrane proteins for study.

Maintaining Professional Dignity in the Age of Social Media (소셜미디어 시대에서 의료전문직으로서의 품위 유지)

  • KIM, Claire Junga;BHAN, Yoo Wha
    • Korean Journal of Medical Ethics
    • /
    • v.21 no.4
    • /
    • pp.316-329
    • /
    • 2018
  • Although the use of social media by doctors raises important issues concerning medical professionalism, the relevant professional bodies in South Korea have failed to issue clear guidelines on social media usage. The Korean Medical Association's newly revised ethics guidelines do require members to maintain dignity while using social media, but the idea of "maintaining dignity" is far from clear, and its premodern connotation prevents it from being reliably used in professional codes of conduct. The authors of this article examine the concept of maintaining dignity and conclude that once it is clarified and redefined it can and should be used as a viable ethical standard in a variety of contexts, including the use of social media. Social media's unpredictability and uncontrollability, and the blurred distinction between professional/public and personal/private can be a threat to medical professionalism. In order to deal with this threat, the concept of dignity is important. We present three examples in which the dignity of medical professionals is undermined and explain why these jeopardize public trust. We conclude that in order to maintain public trust the Korean Medical Association should provide more detailed guidelines on the use of social media by its members.

Construction of an Audio Steganography Botnet Based on Telegram Messenger (텔레그램 메신저 기반의 오디오 스테가노그래피 봇넷 구축)

  • Jeon, Jin;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.127-134
    • /
    • 2022
  • Steganography is a hidden technique in which secret messages are hidden in various multimedia files, and it is widely exploited for cyber crime and attacks because it is very difficult for third parties other than senders and receivers to identify the presence of hidden information in communication messages. Botnet typically consists of botmasters, bots, and C&C (Command & Control) servers, and is a botmasters-controlled network with various structures such as centralized, distributed (P2P), and hybrid. Recently, in order to enhance the concealment of botnets, research on Stego Botnet, which uses SNS platforms instead of C&C servers and performs C&C communication by applying steganography techniques, has been actively conducted, but image or video media-oriented stego botnet techniques have been studied. On the other hand, audio files such as various sound sources and recording files are also actively shared on SNS, so research on stego botnet based on audio steganography is needed. Therefore, in this study, we present the results of comparative analysis on hidden capacity by file type and tool through experiments, using a stego botnet that performs C&C hidden communication using audio files as a cover medium in Telegram Messenger.