• Title/Summary/Keyword: Connectivity efficiency

Search Result 175, Processing Time 0.026 seconds

Assessment of Transfer Center by Facility Design Analysis (설계분석 프로그램을 이용한 환승센터 내부 및 외부 시설물 평가)

  • Lee, Jeong-Yeop;Han, Dong-Hui;Lee, Ju-Yeong;Lee, Yeong-In
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.5
    • /
    • pp.169-177
    • /
    • 2009
  • Establishing a public transportation transfer system that can reduce personal automobile use in the CBD and absorb the demand, thereby reducing congestion, is a necessity. However, the current transfer system and facilities are lacking in intermodal connectivity, require long transfer times, have complex flow patterns, and are lacking in information systems and convenience. The design analysis program of this study is to develop a program that executes computations of design analysis of transfer facilities by utilizing the existing design standards for facilities such as facilities for boarding and alighting, elements for convenience, and pedestrian facilities. Developing an analytical tool through which individual or integrated design analysis can be conducted on the design standards of various facilities is an important study for improving the work accuracy and efficiency of designing an actual transfer center.

A Development of the Integrated Total Asset Management System (통합 유가증권시스템의 개발)

  • Hwang Hyun-Cheol;Song Ha-Yoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.5
    • /
    • pp.458-463
    • /
    • 2005
  • The total asset management system is used for banks or financial institutions for the management of trusteed assets or own assets and it is divided into three systems: the front-office system, the middle-office system and the back-office system by its business areas and functionalities. This kind of asset management system is a huge and complex system handling large data and various financial products, and requires professional knowledges like accounting, financial product specific knowledge, compliance and regulations, etc. It also performs high level computation for NAV calculation and risk measurement on every day Therefore, it needs absolute stability, extendability and efficiency and should handle the frequent change of regulation and products and connectivity with outdoor institutions. In this paper, we report our successful development of such a system and discuss issues regarding its efficient system design and system construction.

Comparison of Home Automation System Using IPV-4 and IPV-6 Based On Mitigate Reconnaissance Attacks

  • Ali, Muhammad Shujat;Siddiq, Imran;Faisal, Abdullah;Awan, Muhammad Zubair
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.341-347
    • /
    • 2022
  • This research is designed to help and offer hold up to complete the requirements of aged and disable in a home. The control approach and the tone approach are used to manage the house appliances. The major organize system implementation in technology of wireless to offer distant contact from a phone Internet Protocol connectivity for access and calculating strategy and appliance remotely. The planned system no need a committed server PC with value of parallel systems and offers a new communication-protocol to observe and control a house environment with more than just the switch functionality. To express the possibility and efficiency of this system, devices like as lights switches, power plugs, and motion-sensors have been included with the planned home control system and supply more security manage on the control with low electrical energy activate method. The rank of switches is corresponding in all this control system whereby all user interfaces indicate the real time existing status. This system planned to manage electrical-appliances and devices in house with reasonably low cost of design, user friendly interface, easily install and provide high security. Research community generally specified that the network "Reconnaissance Attacks" in IPv6 are usually impossible due to they will take huge challenge to carry out address scanning of 264 hosts in an IPv6 subnet."It being deployed of IPv6 shows that it definitely enhances security and undermines the probability". This research of the IPv6 addressing-strategies at present utilizes and planned a new strategy and move toward to "mitigate reconnaissance attacks".

A Study on How to Build a Zero Trust Security Model (제로 트러스트 보안모델 구축 방안에 대한 연구)

  • Jin Yong Lee;Byoung Hoon Choi;Namhyun Koh;Samhyun Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.189-196
    • /
    • 2023
  • Today, in the era of the 4th industrial revolution based on the paradigm of hyper-connectivity, super-intelligence, and superconvergence, the remote work environment is becoming central based on technologies such as mobile, cloud, and big data. This remote work environment has been accelerated by the demand for non-face-to-face due to COVID-19. Since the remote work environment can perform various tasks by accessing services and resources anytime and anywhere, it has increased work efficiency, but has caused a problem of incapacitating the traditional boundary-based network security model by making the internal and external boundaries ambiguous. In this paper, we propse a method to improve the limitations of the traditional boundary-oriented security strategy by building a security model centered on core components and their relationships based on the zero trust idea that all actions that occur in the network beyond the concept of the boundary are not trusted.

Trend Analysis of Intelligent Cyber Attacks on Power Systems (전력시스템 대상 지능형 사이버공격 동향 분석)

  • Soon-Min Hong;Jung-ho Eom;Jae-Kyung Lee
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.21-28
    • /
    • 2023
  • The development of information and communication technology in the 21st century has increased operational efficiency by providing hyper-connectivity and hyper-intelligence in the control systems of major infrastructure, but is also increasing security vulnerabilities, exposing it to hacking threats. Among them, the electric power system that supplies electric power essential for daily life has become a major target of cyber-attacks as a national critical infrastructure system. Recently, in order to protect these power systems, various security systems have been developed and the stability of the power systems has been maintained through practical cyber battle training. However, as cyber-attacks are combined with advanced ICT technologies such as artificial intelligence and big data, it is not easy to defend cyber-attacks that are becoming more intelligent with existing security systems. In order to defend against such intelligent cyber-attacks, it is necessary to know the types and aspects of intelligent cyber-attacks in advance. In this study, we analyzed the evolution of cyber attacks combined with advanced ICT technology.

Numerical simulations of turbulent flow on the pool and weir type fishway and analysis of ascending possibility of fishes (계단식 어도의 난류흐름 수치해석 및 어류 소상 가능성 분석)

  • Kwon, Yong-Joon;Ryu, Yonguk;Kim, Hyung Suk
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.spc1
    • /
    • pp.1037-1048
    • /
    • 2023
  • Fishways are constructed to ensure the fish migration because river-crossing structures such as dams and weirs cut off the stream longitudinal connectivity and influence on aquatic ecosystems. However, the passage efficiency of fishes varies depending on flow characteristics in the fishway and fish species. In this study, three-dimensional numerical simulations are carried out using a RANS model and the volume of fluid method for resolving free surface fluctuations to calculate the turbulent flow in the pool and weir type fishway. The Flow velocity and turbulent kinetic energy in the pool of fishway are analyzed according to variation of the upstream water level and the length of pool. The present numerical simulations reasonably well reproduce the stream flow and plunging flow characteristics in the pool. The simulation results show that the stream flow changes to the plunging flow as the length of the pool increases. When the upstream level increases, the stream flow becomes more evident. Key parameters related to the fish migration within the fishway such as the flow velocity and the turbulent kinetic energy are examined to assess the ascending possibility of fishes.

Mobile Ultra-Broadband, Super Internet-of-Things and Artificial Intelligence for 6G Visions

  • Hamza Ali Alshawabkeh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.235-245
    • /
    • 2023
  • Smart applications based on the Network of Everything also known as Internet of Everything (IoE) are increasing popularity as network connectivity requires rise further. As a result, there will be a greater need for developing 6G technologies for wireless communications in order to overcome the primary limitations of visible 5G networks. Furthermore, implementing neural networks into 6G will bring remedies for the most complex optimizing networks challenges. Future 6G mobile phone networks must handle huge applications that require data and an increasing amount of users. With a ten-year time skyline from thought to the real world, it is presently time for pondering what 6th era (6G) remote correspondence will be just before 5G application. In this article, we talk about 6G dreams to clear the street for the headway of 6G and then some. We start with the conversation of imaginative 5G organizations and afterward underline the need of exploring 6G. Treating proceeding and impending remote organization improvement in a serious way, we expect 6G to contain three critical components: cell phones super broadband, very The Web of Things (or IoT and falsely clever (artificial intelligence). The 6G project is currently in its early phases, and people everywhere must envision and come up with its conceptualization, realization, implementation, and use cases. To that aim, this article presents an environment for Presented Distributed Artificial Intelligence as-a-Services (DAIaaS) supplying in IoE and 6G applications. The case histories and the DAIaaS architecture have been evaluated in terms of from end to end latency and bandwidth consumption, use of energy, and cost savings, with suggestion to improve efficiency.

Evaluation Factors for Exterior Space Planning from the Perspective of Each Major (전공별 관점에서 본 외부공간계획의 평가요소)

  • Lee, Lim-Jung
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.26 no.3
    • /
    • pp.11-18
    • /
    • 2024
  • As the complexity and diversity of modern urban development increases, the importance of external space planning in urban development projects is growing. This study analyzes the importance and characteristics of each major to enhance the utility value of external space, which aims to improve the efficiency of external space planning and ultimately improve the quality of life of residents. To this end, we reviewed relevant literature, legal guidelines, checklists, and guidelines, and derived 17 external space indicators through expert surveys and FGIs, and organized them into five major categories: accessibility, connectivity, suitability, stability and locality, and landscape planning through FGIs with experts in architecture, urbanism, and landscape architecture. As a result of the analysis, urban planning and design majors prioritized planning that considers the hierarchy and characteristics of the landscape structure, securing public space through the connection of open spaces and pedestrian paths, and connecting organic and three-dimensional buildings, streets, and parks; architectural planning and design majors prioritized harmony with the surrounding environment, securing public space through the connection of open spaces and pedestrian paths, and connecting organic and three-dimensional buildings, streets, and parks; and landscape (environmental) and landscape majors prioritized harmony with the surrounding environment, connecting with adjacent buildings, streets, parks, and green spaces, and planning with integrated landholdings. This emphasizes that urban development projects should secure publicness and integration through harmonious connections with adjacent buildings, streets, parks, and green spaces. This study developed evaluation indicators for evaluating the external space planning of urban development projects and quantified them through the hierarchical analysis method (AHP), which will be useful for future policy formulation and practical application in the fields of urban planning and design, architectural planning and design, landscape (environment), and landscape architecture.

An Edge Enabled Region-oriented DAG-based Distributed Ledger System for Secure V2X Communication

  • S. Thangam;S. Sibi Chakkaravarthy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2253-2280
    • /
    • 2024
  • In the upcoming era of transportation, a groundbreaking technology, known as vehicle-to-everything (V2X) communication, is poised to redefine our driving experience and revolutionize traffic management. Real-time and secure communication plays a pivotal role in V2X networks, with the decision-making process being a key factor in establishing communication and determining malicious nodes. The proposed framework utilizes a directed acyclic graph (DAG) to facilitate real-time processing and expedite decision-making. This innovative approach ensures seamless connectivity among vehicles, the surrounding infrastructure, and various entities. To enhance communication efficiency, the entire roadside unit (RSU) region can be subdivided into various sub-regions, allowing RSUs to monitor and govern each sub-region. This strategic approach significantly reduces transaction approval time, thereby improving real-time communication. The framework incorporates a consensus mechanism to ensure robust security, even in the presence of malicious nodes. Recognizing the dynamic nature of V2X networks, the addition and removal of nodes are aligned. Communication latency is minimized through the deployment of computational resources near the data source and leveraging edge computing. This feature provides invaluable recommendations during critical situations that demand swift decision-making. The proposed architecture is further validated using the "veins" simulation tool. Simulation results demonstrate a remarkable success rate exceeding 95%, coupled with a significantly reduced consensus time compared to prevailing methodologies. This comprehensive approach not only addresses the evolving requirements of secure V2X communication but also substantiates practical success through simulation, laying the foundation for a transformative era in transportation.

Analysis on Efficiency of Hierarchical Structure for a Grid Transit Network (격자형 대중교통 노선망의 위계구조 효율성 분석)

  • Park, Jun-Sik;Go, Seung-Yeong;Jeon, Gyeong-Su
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.4
    • /
    • pp.123-133
    • /
    • 2007
  • This study analyzed whether a transit network with hierarchy is efficient or not, and if transit network hierarchy has cost efficiency, then which condition guarantees the efficiency of the transit network hierarchy. The authors modeled the total cost of the transit network and suggested the conditions in which the transit network hierarchy has cost efficiency through comparing the cost of the transit network with and without hierarchy. The efficiency of transit network hierarchy is guaranteed when the travel cost savings induced by using a higher hierarchy transit network is larger than the increasing non-travel cost, which is the sum of access cost, waiting cost, and operating cost, induced by the introduction of a higher hierarchy transit network. This result is consistent with common sense and with the concept of cost and benefit analysis. If a passenger traveling within the area divided by a higher hierarchy transit network uses only a lower hierarchy transit network and the passenger traveling out of the area divided by the higher hierarchy transit network uses both lower and higher hierarchy transit networks, the travel demand using the higher hierarchy transit network is inversely proportional to the square of the line spacing. This means that the transit network becomes more efficient and small increases of travel demand guarantee the efficiency of the transit network hierarchy as the connectivity of the network becomes higher. This result shows that transit networks have economies of aggregation. This study is the first analytical research on transit network hierarchy and is expected to be a basis for numerical research. However, numerical research should complement this study, since analytical research has some limitations for considering a real network.