• Title/Summary/Keyword: Internet resources

Search Result 1,493, Processing Time 0.038 seconds

Introduction to the Technology of Digital Groundwater (Digital Groundwater의 기술 소개)

  • Hyeon-Sik Kim
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.10-10
    • /
    • 2023
  • 본질적으로 복잡하고 다양한 특성을 가지는 우리나라(도시, 농어촌, 도서산간, 섬 등)의 물 공급 시스템은 생활수준의 향상, 기후변화 및 가뭄위기, 소비환경 중심의 요구와 한정된 수자원을 잘 활용하기 위한 운영 및 관리가 매우 복잡하다. 이로 인한 수자원 고갈과 가뭄위기 등에 관련한 대책 및 방안으로 대체수자원인 지하수 활용방안들이 제시되고 있다. 따라서, 물 관리 시스템과 관련한 디지털 기술은 오늘날 플랫폼과 디지털 트윈의 도입을 통해 네트워크와 가상현실 세계의 연결이 통합되어진 4차 산업혁명 사업이 현실화되고 있다. 물 관리 시스템에 사용된 새로운 디지털 기술 "BDA(Big Data Analytics), CPS(Cyber Physical System), IoT(Internet of Things), CC(Cloud Computing), AI(Artificial Intelligence)" 등의 성장이 증가함에 따라 가뭄대응 위기와 도시 지하수 물 순환 시스템 운영이 증가하는 소비자 중심의 수요를 충족시키기 위해서는 지속가능한 지하수 공급을 효과적으로 관리되어야 한다. 4차 산업혁명과 관련한 기술성장이 증가함으로 인한 물 부문은 시스템의 지속가능성을 향상시키기 위해 전체 디지털화 단계로 이동하고 있다. 이러한 디지털 전환의 핵심은 데이터에 관한 것이며, 이를 활용하여 가치 창출을 위해서 "Digital Groundwater Technology/Twin(DGT)"를 극대화하는 방식으로 제고해야 한다. 현재 당면하고 있는 기후위기에 따른 가뭄, 홍수, 녹조, 탁수, 대체수자원 등의 수자원 재해에 대한 다양한 대응 방안과 수자원 확보 기술이 논의되고 있다. 이에 따른 "물 순환 시스템"의 이해와 함께 문제해결 방안도출을 위하여 이번 "기획 세션"에서는 지하수 수량 및 수질, 정수, 모니터링, 모델링, 운영/관리 등의 수자원 데이터의 플랫폼 동시성 구축으로부터 역동적인 "DGT"을 통한 디지털 트윈화하여, 지표수-토양-지하수 분야의 특화된 연직 프로파일링 관측기술을 다각도로 모색하고자 한다. "Digital Groundwater(DG)"는 지하수의 물 순환, 수량 및 수질 관리, 지표수-지하수 순환 및 모니터링, 지하수 예측 모델링 통합연계를 위해 지하수 플랫폼 동시성, ChatGPT, CPS 및 DT 등의 복합 디지털화 단계로 나가고 있다. 복잡한 지하환경의 이해와 관리 및 보존을 위한 지하수 네트워크에서 수량과 수질 데이터를 수집하기 위한 스마트 지하수 관측기술 개발은 큰 도전이다. 스마트 지하수 관측기술은 BD분석, AI 및 클라우드 컴퓨팅 등의 디지털 기술에 필요한 획득된 데이터 분석에 사용되는 알고리즘의 복잡성과 데이터 품질에 따라 영향을 미칠 수 있기 때문이다. "DG"는 지하수의 정보화 및 네트워크 운영관리 자동화, 지능화 등을 위한 디지털 도구를 활용함으로써 지표수-토양층-지하수 네트워크 통합관리에 대한 비전을 만들 수 있다. 또한, DGT는 지하수 관측센서의 1차원 데이터 융합을 이용한 지하수 플랫폼 동시성과 디지털 트윈을 연계할 수 있다.

  • PDF

Correlation analysis of pollutants using IoT technology in LID facilities (LID 시설 내 IoT 기술을 활용한 오염물질 상관성 분석)

  • Jeon, Minsu;Choi, Hyeseon;kevin, Geronimo Franz;Reyes, N.J.DG.;Kim, Leehyung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.453-453
    • /
    • 2021
  • 도시지역 비점오염원관리, 물순환 회복, 침투 및 증발산량 증가, 열섬현상 저감을 위한 주요한 방안으로 저영향개발(low impact development, LID)과 그린인프라 기법의 적용되고 있다. LID 시설은 소규모 분산형 시설로써 넓은 지역에 많고 다양한 시설들이 적용되어 시설의 개수가 많으며, 수질 및 토양 내 기성제품에 대한 센서들의 가격은 고가로 형성되어 있어 기기의 경제성 및 유지관리 등 적용하는데 제한적이다. 따라서 과거 모니터링 자료를 기반으로 오염물질들과의 상관성 분석을 통하여 계측이 어려운 항목들을 계측가능한 항목들로부터 예측 가능하며, 선정된 항목들에 대한 비용효율적인 센서를 개발하여 실시간 LID 모니터링이 가능한 비용효율적 모니터링을 개발하였다. 공주대학교 천안캠퍼스의 LID 시설들은 2013년에 조성되어 현재까지 시설이 운영되고 있으며, 5년이상의 과거 강우시 모니터링 자료들을 이용하여 오염물질 상관성 분석을 수행가능 하기에 대상지로 선정하였다. 오염물질 상관성 분석은 2013년부터 2017년도에 침투도랑에서 수행된 강우시 모니터링 자료를 활용하여 각 오염물질들의 상관성을 분석을 수행하였다. 침투도랑 내 유입되는 평균 유입수는 TSS 286.1±318.3 mg/L, BOD 22.6±39.5 mg/L, TN 8.96±5.85 mg/L, TP 1.01±1.11 mg/L로 나타났다. 겨울철에 비해 여름철에서의 오염물질의 유입농도가 높은 것으로 분석되었다. 이는 여름철 고온건조로 인한 노면 내 차량의 주행으로 인한 중금속, 폐타이어 등과 장마철 강우 시 유출된 토사로 인하여 유입수의 농도가 높은 것으로 분석되었다. 오염물질 부하량은 TSS와 COD 0.66으로 유의성이 높은 것으로 나왔으며, COD와 TSS, TP, TN 등 유의성이 높은 것으로 분석되었다. Arduino와 Raspberry PI를 활용하여 저비용 센서와 LTE 모뎀통신과 데이터 베이스 연결하여 개발된 프로그램을 통해서 무선으로 LID 시설에 대한 모니터링을 침투화분2와 식생체류지에 조성하였다. 전력공급이 어려운 식생체류지의 경우 태양열(Solar system) 시스템과 보조 전력 배터리를 조성하여 장마철이나 장기적인 악천후로 인한 전력을 생산하지 못할 경우 보조전력배터리에서 전력을 제공하여 지속적인 모니터링이 이루어지도록 설계하였다. 토양함수량, 토양온도와 Conductivity 등 3종류의 센서를 적용하였으며, 프로그램은 현재 2단계를 통한 2차수정을 통하여 프로그램을 구축하였다. 오차, 오작동, 계측값에 대한 검·보정 작업이 필요하다. 또한 대기자료의 구축을 통해 보다 토양과 LID 시설에 대한 영향분석이 필요한 것으로 사료된다.

  • PDF

Preceding Error Recovery Algorithm for Multimedia Stream in the Tree-based Multicast Environments (트리기반 멀티캐스트 환경에서 멀티미디어 스트림을 위한 선행에러복구 방안)

  • Kim, Ki-Young;Yoon, Mi-Youn;Shin, Young-Tae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.345-354
    • /
    • 2003
  • IP Multicast is required of more little network resources than one in unicast. Furthermore, reliable multicast has been researched for supporting reliability at IP Multicast mechanism. Although these studies are carried out, they only have focused on general data. In other words, in case that realtime packet, they can not support reliability since they do not consider realtime properties such as dependency of interframe and playback in time. Besides, we also request to support scalability because we are based on Mobile IP network together with internet. Thus, we need a mechanism to guarantee reliability and scalability of realtime stream data. In this paper, we propose PER (Preceding Error Recovery) that reflect characteristics of the realtime data, especially for H.323. PER provides scalable reliability because it is based on tree-based multicast basically and helps to support scalable relibility as reducing control packet and recovers stream buffer space from underflow status as soon as possible. PER shows much better scalable and reliable than existing works.

A study on the research scheme and the education of e-trade marketing in Korea (전자무역 해외마케팅 교육과 연구체계 수립에 관한 연구)

  • Kang, Hyo-Won
    • International Commerce and Information Review
    • /
    • v.15 no.3
    • /
    • pp.411-430
    • /
    • 2013
  • Overseas marketing before the conclusion of a contract is a huge obstacle to enter the global market because it has needed the company's maximum capacities which are some cost, time and human resources. Thus it required a reestablishment about the education fields and research schemes. Due to the advancements in ICT and internet, a subject of e-trade is becoming a critical issue with a subject of a practice of international trade. However, since the mid-2000s, e-trade research articles and educational materials such as textbooks, research papers are being gradually reduced. Therefore the purpose of this study, from an oversea marketing point of view among the various e-trade fields, is to measure an education performance and an academic research scheme. And this study will suggest direction of improvement about research scheme and educational performance in the overseas marketing. According to the result, to establish the education and research scheme about SEM(Search Engine Marketing), SEO(Search Engine Optimization) and SNA(Social Network Analysis) which are introduced in the industry among the education and research field related the e-trade is urgent. And some subjects need a capstone-design reconcile theory and practice.

  • PDF

Design of a Conceptual Geosemantic Web Service Framework supporting Textual Geospatial Information (비구조적 공간정보를 지원하는 개념적 지오시맨틱 웹 서비스 프레임워크의 설계)

  • Ha, Su-Wook;Nam, Kwang-Woo
    • Spatial Information Research
    • /
    • v.19 no.4
    • /
    • pp.91-97
    • /
    • 2011
  • In this paper, we propose an architecture for geosemantic services. With the rapid progress of web services, wireless internet technologies and popularization of smart phone in recent years, a lot of applications based on geographic information are being developed. Moreover the search portals empowered by semantic web technologies are enabling general users to access on-line resources more easily. However, several studies in GIS domain have pointed out the practical limitation of existing service patterns, which are limited only to linking heterogenous spatial databases, insufficient for several important use cases. Hence we draw functional elements of geosemantic services from GIS and semantic web standards, and present the use cases and a new architecture for geosemantic services. This approach could set a foundation to implement geoemantic services.

A Password-Based Searchable Encryption using Smart Cards (스마트 카드를 이용한 패스워드 기반의 검색 가능한 암호화 기술)

  • Lee, Dong-Kun;Rhee, Hyun-Sook;Lim, Jong-In
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.56-61
    • /
    • 2012
  • User authentication is a necessity to set up secure system which only an authorized user can use various resource on the Internet. Encryption is to provide data privacy. Also, searchable encryption is to provide both data privacy and efficient management of data by searching with a keyword. The public key based searchable encryption requires in advance the authentication of user's public key as well as the secure management of a publlic/private key of a user, respectively. In cloud, it is purpose to use cloud various resources by using various devices, meanwhile, it is not sufficient resource that some devices manage public/private keys and certificates and it is not easy to implement these clients. To solve this problem, we propose a password-based saerchable encryption using smart cards which are temper-resistant devices.

QoS-, Energy- and Cost-efficient Resource Allocation for Cloud-based Interactive TV Applications

  • Kulupana, Gosala;Talagala, Dumidu S.;Arachchi, Hemantha Kodikara;Fernando, Anil
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.3
    • /
    • pp.158-167
    • /
    • 2017
  • Internet-based social and interactive video applications have become major constituents of the envisaged applications for next-generation multimedia networks. However, inherently dynamic network conditions, together with varying user expectations, pose many challenges for resource allocation mechanisms for such applications. Yet, in addition to addressing these challenges, service providers must also consider how to mitigate their operational costs (e.g., energy costs, equipment costs) while satisfying the end-user quality of service (QoS) expectations. This paper proposes a heuristic solution to the problem, where the energy incurred by the applications, and the monetary costs associated with the service infrastructure, are minimized while simultaneously maximizing the average end-user QoS. We evaluate the performance of the proposed solution in terms of serving probability, i.e., the likelihood of being able to allocate resources to groups of users, the computation time of the resource allocation process, and the adaptability and sensitivity to dynamic network conditions. The proposed method demonstrates improvements in serving probability of up to 27%, in comparison with greedy resource allocation schemes, and a several-orders-of-magnitude reduction in computation time, compared to the linear programming approach, which significantly reduces the service-interrupted user percentage when operating under variable network conditions.

Policy Based DDoS Attack Mitigation Methodology (정책기반의 분산서비스거부공격 대응방안 연구)

  • Kim, Hyuk Joon;Lee, Dong Hwan;Kim, Dong Hwa;Ahn, Myung Kil;Kim, Yong Hyun
    • Journal of KIISE
    • /
    • v.43 no.5
    • /
    • pp.596-605
    • /
    • 2016
  • Since the Denial of Service Attack against multiple targets in the Korean network in private and public sectors in 2009, Korea has spent a great amount of its budget to build strong Internet infrastructure against DDoS attacks. As a result of the investments, many major governments and corporations installed dedicated DDoS defense systems. However, even organizations equipped with the product based defense system often showed incompetency in dealing with DDoS attacks with little variations from known attack types. In contrast, by following a capacity centric DDoS detection method, defense personnel can identify various types of DDoS attacks and abnormality of the system through checking availability of service resources, regardless of the types of specific attack techniques. Thus, the defense personnel can easily derive proper response methods according to the attacks. Deviating from the existing DDoS defense framework, this research study introduces a capacity centric DDoS detection methodology and provides methods to mitigate DDoS attacks by applying the methodology.

Assessment of Accessibility to Medical Facilities in Rural Areas using Real Road Distance focusing on Pyeongchang-gun (실제 도로거리를 이용한 농촌지역 생활권의 의료시설 접근성 평가 -평창군을 중심으로-)

  • Kim, Solhee;Kim, Taegon;Suh, Kyo
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.57 no.4
    • /
    • pp.39-49
    • /
    • 2015
  • Since most medical facilities and medical personnel are concentrated in urban areas in South Korea, an imbalance of access to medical facilities causes a gap in medical resource availability between urban and rural areas. Accessibility to medical facilities is a means of assessment that evaluates a measure of inequality in utilization of medical resources. The evaluation of accessibility uses Euclidean distance, in general; however, this method has its limits in that Euclidean distance cannot reflect actual distance. This study aims to estimate real road distance from village halls to medical facilities in rural areas using Open Application Programming Interface (Open API) of an internet portal site. Using real road distance, we evaluated medical accessibility and compared it with Euclidean distance. The accessibility to primary medical institutions was valued relatively well, but secondary and tertiary medical institutions were vulnerable in Pyeonchang-gun. Comparing Euclidean distance with real road distance from village halls to medical facilities, real road distance appeared to be approximately 1.4 times that of Euclidean distance. This calculation is similar to the circuity factor of Gangwon-do in Korea that estimated to fix the limits of Euclidean distance and assumed real road distance.

A Review on the Transition and Application of Modern Fashion of Chinese Mao Suit (중국 중산복의 변천 및 현대패션에의 적용사례 고찰)

  • Gi, Chao;Baek, Jeong Hyun;Bae, Soo Jeong
    • Journal of the Korean Society of Costume
    • /
    • v.67 no.3
    • /
    • pp.31-46
    • /
    • 2017
  • The purpose of this study is to analyse the occurrence and evolution of Mao suit which is important position in the modern costume history of China and to provide a source of design inspiration to contemporary fashion designers. In the research method, literature review and case studies was conducted in parallel. For the literature review, changes of Mao suit in each age were reviewed with reference to the related documents, Chinese costume and cultural history, prior research papers and internet resources. The case analysis was qualitatively done focusing on the silhouette, color and detail of clothes in fashion collections. The scope of the study was from 1912 to 2000. The case analysis of the Mao suit applied to the contemporary fashion was made on the applications centered around 'London Collection', 'New York Collection', 'Paris Collection', 'Milan Collection' and 'Chinese Fashion Week' from 2008 to 2015. The results found that Mao suit changed into many different forms after Sun Wen designed it for the first time in 1912. This study classified it into Phase 1(1912~1927), Phase 2(1928~1965), Phase 3(1966~1977), and Phase 4(1978~2000) with historical and political issues and conformational changes in Mao suit. The frequency analysis of the cases of the fashion collections using Mao suit from 2008 to 2015 showed an increased application of Mao suit to the western collection in New York, Paris and London in 2008 due to the impact of Beijing Olympics. However, from 2009 onwards, the frequency of the utilization of Mao suit was higher in the Chinese Fashion Week and the New York Collection. This cause is explained by the fact that the designers who inspired from Mao suit in the New York Collection are American Chinese.