• Title/Summary/Keyword: Infrastructure scenarios

Search Result 184, Processing Time 0.029 seconds

BI-DIRECTIONAL TRANSPORT AND NETWORKED DISPLAY INTERFACE OF UNCOMPRESSED HD VIDEO

  • Park, Jong-Churl;Jo, Jin-Yong;Goo, Bon-Cheol;Kim, Jong-Won
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.184-188
    • /
    • 2009
  • To interactively share High Definition (HD)-quality visualization over emerging ultra-high-speed network infrastructure, several lossless and low-delay real-time media (i.e., uncompressed HD video and audio) transport systems are being designed and prototyped. However, most of them still rely on expensive hardware components. As an effort to reduce the building cost of system, in this paper, we propose the integration of both transmitter and receiver machines into a single bi-directional transport system. After detailed bottleneck analysis and subsequent refinements of embedded software components, the proposed integration can provide Real-time Transport Protocol (RTP)-based bi-directional transport of uncompressed HD video and audio from a single machine. We also explain how to interface the Gbps-bandwidth display output of uncompressed HD media system to the networked tiled display of 10240 $\times$ 3200 super-high-resolution. Finally, to verify the feasibility of proposed integration, several prototype systems are built and evaluated by operating them in several different experiment scenarios.

  • PDF

Anonymous Connection Protocol against Location Tracking Attacks in Bluetooth Environment (블루투스에서 위치 추적 공격을 방지하기 위한 익명 접속 프로토콜)

  • Park, Hee-Jin;Kim, Yu-Na;Kim, Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.266-270
    • /
    • 2008
  • Bluetooth technology provides a way to connect and exchange information between personal devices over a secure and short-range radio frequency without any authentication infrastructures. For this infrastructure-less feature, Bluetooth has several problems which could not occur in other network, and among them location tracking attacks is essential problem which should be solved. In this paper, we introduce the location tracking attack and propose an anonymous connection protocol against it. We also perform security analysis based on possible scenarios of this attack, and estimate both execution time and memory spaces of our scheme and existing methods.

Analysis of Construction Plans of Rapid Charging Infrastructures based on Gas Stations in Rural Areas to Propagate Electric Vehicles (전기자동차 보급을 위한 농촌지역의 주유소 기반 급속 충전인프라 구축 방안 분석)

  • Kim, Solhee;Kim, Taegon;Suh, Kyo
    • Journal of Korean Society of Rural Planning
    • /
    • v.21 no.1
    • /
    • pp.19-28
    • /
    • 2015
  • As environmental concerns including climate change drive the strong regulations for car exhaust emissions, electric vehicles attract the public eye. The purpose of this study is to identify rural areas vulnerable for charging infrastructures based on the spatial distributions of the current gas stations and provide the target dissemination rates for promoting electric cars. In addition, we develop various scenarios for finding optimal way to expand the charging infrastructures through the administrative districts data including 11,677 gas stations, the number of whole national gas stations. Gas stations for charging infrastructures are randomly selected using the Monte Carlo Simulation (MCS) method. Evaluation criteria for vulnerability assessment include five considering the characteristic of rural areas. The optimal penetration rate is determined to 21% in rural areas considering dissemination efficiency. To reduce the vulnerability, the charging systems should be strategically installed in rural areas considering geographical characteristics and regional EV demands.

Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph

  • Dai, Fangfang;Zheng, Kangfeng;Wu, Bin;Luo, Shoushan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1920-1937
    • /
    • 2015
  • Network environment has been under constant threat from both malicious attackers and inherent vulnerabilities of network infrastructure. Existence of such threats calls for exhaustive vulnerability analyzing to guarantee a secure system. However, due to the diversity of security hazards, analysts have to select from massive alternative hardening strategies, which is laborious and time-consuming. In this paper, we develop an approach to seek for possible hardening strategies and prioritize them to help security analysts to handle the optimal ones. In particular, we apply a Risk Flow Attack Graph (RFAG) to represent network situation and attack scenarios, and analyze them to measure network risk. We also employ a multi-objective genetic algorithm to infer the priority of hardening strategies automatically. Finally, we present some numerical results to show the performance of prioritizing strategies by network risk and hardening cost and illustrate the application of optimal hardening strategy set in typical cases. Our novel approach provides a promising new direction for network and vulnerability analysis to take proper precautions to reduce network risk.

A Civilian Reporting Service to Guide Converging Resources for Search and Rescue in Disaster Response

  • Chen, Albert Y.;Han, Sang-Uk;Lee, Sang-Hyun;Pena-Mora, Feniosky
    • Journal of Construction Engineering and Project Management
    • /
    • v.1 no.3
    • /
    • pp.45-51
    • /
    • 2011
  • During disaster response, prioritization of limited resources is one of the most important but challenging tasks. At the same time, it is imperative to timely provide to the rescuers with the adequate heavy equipment to facilitate lifesaving operations. However, supply of high demand equipment is usually insufficient during the initial phase of disaster response, challenging lifesaving operations. At the same time, resources outside of the disaster affected zone converge into the area to assist the response efforts, which is the effect of convergence that often made resource coordination challenging in large scale disasters. Meanwhile, the initial condition of the disaster is usually best known by civilians already at the area before and during impact of the disaster. The knowledge of the civilians is not always received and considered by the responding organizations. With the help of these civilians, critical information such as victim location, infrastructure damage, and risk condition could be better know before any response actions are taken. To efficiently collect information and utilize the converging resources, this paper proposes a geospatial information repository for initial condition reporting and update to guide search and rescue operations and deployment of equipment with safety considerations for the rescuers in large scale disaster response scenarios.

A study on the planing of game scenario (게임시나리오 기획에 관한 연구)

  • Lee, Jae-Hong
    • Journal of Korea Game Society
    • /
    • v.3 no.2
    • /
    • pp.12-18
    • /
    • 2003
  • A good game comes from an original and unique scenario. Game development must precede with the game's scenario because this is where the contents of the game are expressed. Scenario planing brings the result of the game scenario. scenario planning is the draft for game development. The circumstances of gaming today, from the company which produce games to the academic world which educate game development, do not have planning for their game scenarios. A habit that many Korean game developers have is to just insert a rough scenario into a game or even worse no proper form for one at all. The Purpose of this book is to simply search for a scenario planning method and suggest the contents for game planning. paper, we researched technical considerations in initial game software planning, focusing on platform, game engine, game service, network infrastructure.

  • PDF

Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City

  • Sharma, Pradip Kumar;Moon, Seo Yeon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.184-195
    • /
    • 2017
  • In recent decades, the ad hoc network for vehicles has been a core network technology to provide comfort and security to drivers in vehicle environments. However, emerging applications and services require major changes in underlying network models and computing that require new road network planning. Meanwhile, blockchain widely known as one of the disruptive technologies has emerged in recent years, is experiencing rapid development and has the potential to revolutionize intelligent transport systems. Blockchain can be used to build an intelligent, secure, distributed and autonomous transport system. It allows better utilization of the infrastructure and resources of intelligent transport systems, particularly effective for crowdsourcing technology. In this paper, we proposes a vehicle network architecture based on blockchain in the smart city (Block-VN). Block-VN is a reliable and secure architecture that operates in a distributed way to build the new distributed transport management system. We are considering a new network system of vehicles, Block-VN, above them. In addition, we examine how the network of vehicles evolves with paradigms focused on networking and vehicular information. Finally, we discuss service scenarios and design principles for Block-VN.

Low-grade waste heat recovery and repurposing to reduce the load on cooling towers

  • McLean, Shannon H.;Chenier, Jeff;Muinonen, Sari;Laamanen, Corey A.;Scott, John A.
    • Advances in Energy Research
    • /
    • v.7 no.2
    • /
    • pp.147-166
    • /
    • 2020
  • Industrial cooling towers are often ageing infrastructure that is expensive to maintain and operate. A novel approach is introduced in which a heat pump circuit is incorporated to reduce the load upon the towers by extracting low-grade energy from the stream sent to the towers and repurposing in on-site processing operations. To demonstrate the concept, a model was constructed, which uses industrial data on cooling towers linked to a smelter's sulphuric acid plant, to allow direct economic and environmental impact comparison between different heat recovery and repurposing scenarios. The model's results showed that implementing a heat pump system would significantly decrease annual operating costs and achieve a payback period of 3 years. In addition, overall CO2 emissions could be reduced by 42% (430,000 kg/year) and a 5% heat load reduction on the cooling towers achieved. The concept is significant as the outcomes introduce a new way for energy intensive industrial sectors, such as mineral processing, to reduce energy consumption and improve long-term sustainable performance.

Water, Energy, and Food Nexus Simulation Considering Inter-Basin Trade

  • Wicaksono, Albert;Jeong, Gimoon;Kang, Doosun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.190-190
    • /
    • 2016
  • The Water, Energy, and Food (WEF) nexus is an emerging concept for sustainable resources planning and management. The three valuable resources are inevitably interconnected, that is, it takes water to produce energy; it takes energy to extract, treat, and distribute water; and both water and energy are required to produce food. Although it is challenging to fully understand the complicated interdependency, a few studies have been devoted to interpret the concept and develop the assessment tools. The tools were mainly developed for nation-wide simulations without considering inter-basin or inter-state resources trade. This study tries to present an idea to develop and implement the WEF nexus simulation model in regional scale by advancing the existing nation-wide model with additional capability to simulate the inter-basin trade. This simulation could help local planners and engineers to determine optimal policies and infrastructure solutions to reach and ensure local demand satisfaction. The simulation model is implemented in hypothetical areas with different conditions of WEF demands and supplies. Although the inter-basin trade scenarios are simulated manually, it shows that the inter-basin resources trade could enhance the resources security for a longer time period. In future, an optimization model might be developed to provide the automatic calculation to reach optimum amount of WEF for the trade, which can be a helpful tool in decision making process.

  • PDF

Cross-Talk: D2D Potentiality Based Resource Borrowing Schema for Ultra-Low Latency Transmission in Cellular Network

  • Sun, Guolin;Dingana, Timothy;Adolphe, Sebakara Samuel Rene;Boateng, Gordon Owusu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2258-2276
    • /
    • 2019
  • Resource sharing is one of the main goals achieved by network virtualization technology to enhance network resource utilization and enable resource customization. Though resource sharing can improve network efficiency by accommodating various users in a network, limited infrastructure capacity is still a challenge to ultra-low latency service operators. In this paper, we propose an inter-slice resource borrowing schema based on the device-to-device (D2D) potentiality especially for ultra-low latency transmission in cellular networks. An extended and modified Kuhn-Munkres bipartite matching algorithm is developed to optimally achieve inter-slice resource borrowing. Simulation results show that, proper D2D user matching can be achieved, satisfying ultra-low latency (ULL) users' quality of service (QoS) requirements and resource utilization in various scenarios.