• 제목/요약/키워드: Infrastructure scenarios

검색결과 184건 처리시간 0.025초

BI-DIRECTIONAL TRANSPORT AND NETWORKED DISPLAY INTERFACE OF UNCOMPRESSED HD VIDEO

  • Park, Jong-Churl;Jo, Jin-Yong;Goo, Bon-Cheol;Kim, Jong-Won
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 2009년도 IWAIT
    • /
    • pp.184-188
    • /
    • 2009
  • To interactively share High Definition (HD)-quality visualization over emerging ultra-high-speed network infrastructure, several lossless and low-delay real-time media (i.e., uncompressed HD video and audio) transport systems are being designed and prototyped. However, most of them still rely on expensive hardware components. As an effort to reduce the building cost of system, in this paper, we propose the integration of both transmitter and receiver machines into a single bi-directional transport system. After detailed bottleneck analysis and subsequent refinements of embedded software components, the proposed integration can provide Real-time Transport Protocol (RTP)-based bi-directional transport of uncompressed HD video and audio from a single machine. We also explain how to interface the Gbps-bandwidth display output of uncompressed HD media system to the networked tiled display of 10240 $\times$ 3200 super-high-resolution. Finally, to verify the feasibility of proposed integration, several prototype systems are built and evaluated by operating them in several different experiment scenarios.

  • PDF

블루투스에서 위치 추적 공격을 방지하기 위한 익명 접속 프로토콜 (Anonymous Connection Protocol against Location Tracking Attacks in Bluetooth Environment)

  • 박희진;김유나;김종
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제14권3호
    • /
    • pp.266-270
    • /
    • 2008
  • 블루투스(Bluetooth)는 별도의 기반 인증 시설없이 각 디바이스간의 독립적인 인증과정을 통해 데이타를 서로 전송하는 기술을 사용하고 있다. 이러한 특징 때문에 이전에 기반 인중시설을 이용하는 네트워크에서는 발생하지 않았던 취약점들이 발생할 수 있으며, 가장 대표적인 문제가 위치 추적 공격이다. 따라서 본 논문에서는 디바이스 위치추적공격에 대해 살펴보고 그에 대한 해결책으로 익명모드를 제안한다. 제안된 방법은 발생 가능한 공격시나리오에 대해 분석하고 성능을 평가하였으며, 이를 통해, 기존 방법에 비해 수행 시간과 메모리 소비 측면에서 큰 차이를 보이지 않으면서도 위치 추적 공격에 대해 더 강인하게 동작함을 보였다.

전기자동차 보급을 위한 농촌지역의 주유소 기반 급속 충전인프라 구축 방안 분석 (Analysis of Construction Plans of Rapid Charging Infrastructures based on Gas Stations in Rural Areas to Propagate Electric Vehicles)

  • 김솔희;김태곤;서교
    • 농촌계획
    • /
    • 제21권1호
    • /
    • pp.19-28
    • /
    • 2015
  • As environmental concerns including climate change drive the strong regulations for car exhaust emissions, electric vehicles attract the public eye. The purpose of this study is to identify rural areas vulnerable for charging infrastructures based on the spatial distributions of the current gas stations and provide the target dissemination rates for promoting electric cars. In addition, we develop various scenarios for finding optimal way to expand the charging infrastructures through the administrative districts data including 11,677 gas stations, the number of whole national gas stations. Gas stations for charging infrastructures are randomly selected using the Monte Carlo Simulation (MCS) method. Evaluation criteria for vulnerability assessment include five considering the characteristic of rural areas. The optimal penetration rate is determined to 21% in rural areas considering dissemination efficiency. To reduce the vulnerability, the charging systems should be strategically installed in rural areas considering geographical characteristics and regional EV demands.

Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph

  • Dai, Fangfang;Zheng, Kangfeng;Wu, Bin;Luo, Shoushan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권5호
    • /
    • pp.1920-1937
    • /
    • 2015
  • Network environment has been under constant threat from both malicious attackers and inherent vulnerabilities of network infrastructure. Existence of such threats calls for exhaustive vulnerability analyzing to guarantee a secure system. However, due to the diversity of security hazards, analysts have to select from massive alternative hardening strategies, which is laborious and time-consuming. In this paper, we develop an approach to seek for possible hardening strategies and prioritize them to help security analysts to handle the optimal ones. In particular, we apply a Risk Flow Attack Graph (RFAG) to represent network situation and attack scenarios, and analyze them to measure network risk. We also employ a multi-objective genetic algorithm to infer the priority of hardening strategies automatically. Finally, we present some numerical results to show the performance of prioritizing strategies by network risk and hardening cost and illustrate the application of optimal hardening strategy set in typical cases. Our novel approach provides a promising new direction for network and vulnerability analysis to take proper precautions to reduce network risk.

A Civilian Reporting Service to Guide Converging Resources for Search and Rescue in Disaster Response

  • Chen, Albert Y.;Han, Sang-Uk;Lee, Sang-Hyun;Pena-Mora, Feniosky
    • Journal of Construction Engineering and Project Management
    • /
    • 제1권3호
    • /
    • pp.45-51
    • /
    • 2011
  • During disaster response, prioritization of limited resources is one of the most important but challenging tasks. At the same time, it is imperative to timely provide to the rescuers with the adequate heavy equipment to facilitate lifesaving operations. However, supply of high demand equipment is usually insufficient during the initial phase of disaster response, challenging lifesaving operations. At the same time, resources outside of the disaster affected zone converge into the area to assist the response efforts, which is the effect of convergence that often made resource coordination challenging in large scale disasters. Meanwhile, the initial condition of the disaster is usually best known by civilians already at the area before and during impact of the disaster. The knowledge of the civilians is not always received and considered by the responding organizations. With the help of these civilians, critical information such as victim location, infrastructure damage, and risk condition could be better know before any response actions are taken. To efficiently collect information and utilize the converging resources, this paper proposes a geospatial information repository for initial condition reporting and update to guide search and rescue operations and deployment of equipment with safety considerations for the rescuers in large scale disaster response scenarios.

게임시나리오 기획에 관한 연구 (A study on the planing of game scenario)

  • 이재홍
    • 한국게임학회 논문지
    • /
    • 제3권2호
    • /
    • pp.12-18
    • /
    • 2003
  • 좋은 게임은 독특하고 개성이 뚜렷한 콘텐츠에서 얻어진다. 게임의 콘텐츠는 게임시나리오로 표현되는 만큼, 게임개발은 시나리오창작 작업이 선행되어야 한다. 게임시나리오의 창작은 시나리오기획서로 결과가 나와야 한다. 기획서는 게임개발을 위한 설계도이기 때문이다. 그러나 게임을 제작하는 회사에서나 게임을 교육하고 있는 학계에서는 제대로 된 게임시나리오의 기획서를 쓰지 않고 있는 형편이다. 물론 게임기획서에 시나리오를 대충 삽입시켜버 리는 우리의 게임제작 습성도 한 몫을 하고 있지만, 가장 큰 문제점은 제대로 된 게임시나리오기획서의 서식이 없기 때문이기도 하다. 본고에서는 기획서의 서식에 들어갈 내용들을 간단하게나마 연구하여, 게임 기획서의 기본 서식의 틀을 제안해 보는 것이 목적이다.

  • PDF

Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City

  • Sharma, Pradip Kumar;Moon, Seo Yeon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • 제13권1호
    • /
    • pp.184-195
    • /
    • 2017
  • In recent decades, the ad hoc network for vehicles has been a core network technology to provide comfort and security to drivers in vehicle environments. However, emerging applications and services require major changes in underlying network models and computing that require new road network planning. Meanwhile, blockchain widely known as one of the disruptive technologies has emerged in recent years, is experiencing rapid development and has the potential to revolutionize intelligent transport systems. Blockchain can be used to build an intelligent, secure, distributed and autonomous transport system. It allows better utilization of the infrastructure and resources of intelligent transport systems, particularly effective for crowdsourcing technology. In this paper, we proposes a vehicle network architecture based on blockchain in the smart city (Block-VN). Block-VN is a reliable and secure architecture that operates in a distributed way to build the new distributed transport management system. We are considering a new network system of vehicles, Block-VN, above them. In addition, we examine how the network of vehicles evolves with paradigms focused on networking and vehicular information. Finally, we discuss service scenarios and design principles for Block-VN.

Low-grade waste heat recovery and repurposing to reduce the load on cooling towers

  • McLean, Shannon H.;Chenier, Jeff;Muinonen, Sari;Laamanen, Corey A.;Scott, John A.
    • Advances in Energy Research
    • /
    • 제7권2호
    • /
    • pp.147-166
    • /
    • 2020
  • Industrial cooling towers are often ageing infrastructure that is expensive to maintain and operate. A novel approach is introduced in which a heat pump circuit is incorporated to reduce the load upon the towers by extracting low-grade energy from the stream sent to the towers and repurposing in on-site processing operations. To demonstrate the concept, a model was constructed, which uses industrial data on cooling towers linked to a smelter's sulphuric acid plant, to allow direct economic and environmental impact comparison between different heat recovery and repurposing scenarios. The model's results showed that implementing a heat pump system would significantly decrease annual operating costs and achieve a payback period of 3 years. In addition, overall CO2 emissions could be reduced by 42% (430,000 kg/year) and a 5% heat load reduction on the cooling towers achieved. The concept is significant as the outcomes introduce a new way for energy intensive industrial sectors, such as mineral processing, to reduce energy consumption and improve long-term sustainable performance.

Water, Energy, and Food Nexus Simulation Considering Inter-Basin Trade

  • Wicaksono, Albert;Jeong, Gimoon;Kang, Doosun
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2016년도 학술발표회
    • /
    • pp.190-190
    • /
    • 2016
  • The Water, Energy, and Food (WEF) nexus is an emerging concept for sustainable resources planning and management. The three valuable resources are inevitably interconnected, that is, it takes water to produce energy; it takes energy to extract, treat, and distribute water; and both water and energy are required to produce food. Although it is challenging to fully understand the complicated interdependency, a few studies have been devoted to interpret the concept and develop the assessment tools. The tools were mainly developed for nation-wide simulations without considering inter-basin or inter-state resources trade. This study tries to present an idea to develop and implement the WEF nexus simulation model in regional scale by advancing the existing nation-wide model with additional capability to simulate the inter-basin trade. This simulation could help local planners and engineers to determine optimal policies and infrastructure solutions to reach and ensure local demand satisfaction. The simulation model is implemented in hypothetical areas with different conditions of WEF demands and supplies. Although the inter-basin trade scenarios are simulated manually, it shows that the inter-basin resources trade could enhance the resources security for a longer time period. In future, an optimization model might be developed to provide the automatic calculation to reach optimum amount of WEF for the trade, which can be a helpful tool in decision making process.

  • PDF

Cross-Talk: D2D Potentiality Based Resource Borrowing Schema for Ultra-Low Latency Transmission in Cellular Network

  • Sun, Guolin;Dingana, Timothy;Adolphe, Sebakara Samuel Rene;Boateng, Gordon Owusu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권5호
    • /
    • pp.2258-2276
    • /
    • 2019
  • Resource sharing is one of the main goals achieved by network virtualization technology to enhance network resource utilization and enable resource customization. Though resource sharing can improve network efficiency by accommodating various users in a network, limited infrastructure capacity is still a challenge to ultra-low latency service operators. In this paper, we propose an inter-slice resource borrowing schema based on the device-to-device (D2D) potentiality especially for ultra-low latency transmission in cellular networks. An extended and modified Kuhn-Munkres bipartite matching algorithm is developed to optimally achieve inter-slice resource borrowing. Simulation results show that, proper D2D user matching can be achieved, satisfying ultra-low latency (ULL) users' quality of service (QoS) requirements and resource utilization in various scenarios.