• Title/Summary/Keyword: Network Assets

Search Result 168, Processing Time 0.022 seconds

Assessment of London underground tube tunnels - investigation, monitoring and analysis

  • Wright, Peter
    • Smart Structures and Systems
    • /
    • v.6 no.3
    • /
    • pp.239-262
    • /
    • 2010
  • Tube Lines has carried out a "knowledge and investigation programme" on the deep tube tunnels comprising the Jubilee, Northern and Piccadilly lines, as required by the PPP contract with London Underground. Many of the tunnels have been in use for over 100 years, so this assessment was considered essential to the future safe functioning of the system. This programme has involved a number of generic investigations which guide the assessment methodology and the analysis of some 5,000 individual structures. A significant amount of investigation has been carried out, including ultrasonic thickness measurement, detection of brickwork laminations using radar, stress measurement using magnetic techniques, determination of soil parameters using CPT, pressuremeter and laboratory testing, installation of piezometers, material and tunnel segment testing, and trialling of remote photographic techniques for inspection of large tunnels and shafts. Vibrating wire, potentiometer, electro level, optical and fibre-optic monitoring has been used, and laser measurement and laser scanning has been employed to measure tunnel circularity. It is considered that there is scope for considerable improvements in non-destructive testing technology for structural assessment in particular, and some ideas are offered as a "wish-list". Assessment reports have now been produced for all assets forming Tube Lines' deep tube tunnel network. For assets which are non-compliant with London Underground standards, the risk to the operating railway has to be maintained as low as reasonably practicable (ALARP) using enhanced inspection and monitoring, or repair where required. Monitoring techniques have developed greatly during recent years and further advances will continue to support the economic whole life asset management of infrastructure networks.

Survey on the use of security metrics on attack graph

  • Lee, Gyung-Min;Kim, Huy-Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.95-105
    • /
    • 2018
  • As the IT industry developed, the information held by the company soon became a corporate asset. As this information has value as an asset, the number and scale of various cyber attacks which targeting enterprises and institutions is increasing day by day. Therefore, research are being carried out to protect the assets from cyber attacks by using the attack graph to identify the possibility and risk of various attacks in advance and prepare countermeasures against the attacks. In the attack graph, security metric is used as a measure for determining the importance of each asset or the risk of an attack. This is a key element of the attack graph used as a criterion for determining which assets should be protected first or which attack path should be removed first. In this survey, we research trends of various security metrics used in attack graphs and classify the research according to application viewpoints, use of CVSS(Common Vulnerability Scoring System), and detail metrics. Furthermore, we discussed how to graft the latest security technologies, such as MTD(Moving Target Defense) or SDN(Software Defined Network), onto the attack graphs.

On Suppressing the Occurrence of Redundant Sensing-Reporting Packets in Assets Monitoring Networks (관심 대상모니터링 네트워크에서의 중복된 감지-보고 패킷들의 발생 억제에 관한 연구)

  • Tscha, Yeong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1955-1963
    • /
    • 2009
  • In the application of wireless sensor networks to monitor valuable assets under concern, the appearance of a certain asset can be identified and reported simultaneously by several adjacent nodes, and this may dissipate the power of related nodes and network bandwidth as well. In the proposed method, a node that senses the appearance of some asset is allowed to send the sensing-reporting packet only after it has been being idle for a certain period without receiving any DRP(Don't Report Packet) from neighbors. It turns out that not only the cost of propagating DRPs but also that of reporting the events to the sink becomes minimal when depth of each DRP propagation is 2. In case of depth 1, at least, two routes are set up for the delivery of the sensing-reporting packet hence, reliable transfer to the sink is provided.

Classification Analysis for the Prediction of Underground Cultural Assets (매장문화재 예측을 위한 통계적 분류 분석)

  • Yu, Hye-Kyung;Lee, Jin-Young;Na, Jong-Hwa
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.3
    • /
    • pp.106-113
    • /
    • 2009
  • Various statistical classification methods have been used to establish prediction model of underground cultural assets in our country. Among them, linear discriminant analysis, logistic regression, decision tree, neural network, and support vector machines are used in this paper. We introduced the basic concepts of above-mentioned classification methods and applied these to the analyses of real data of I city. As a results, five different prediction models are suggested. And also model comparisons are executed by suggesting correct classification rates of the fitted models. To see the applicability of the suggested models for a new data set, simulations are carried out. R packages and programs are used in real data analyses and simulations. Especially, the detailed executing processes by R are provided for the other analyser of related area.

A Hybrid Approach Based on Multi-Criteria Satisfaction Analysis (MUSA) and a Network Data Envelopment Analysis (NDEA) to Evaluate Efficiency of Customer Services in Bank Branches

  • Khalili-Damghani, Kaveh;Taghavi-Fard, Mohammad;Karbaschi, Kiaras
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.4
    • /
    • pp.347-371
    • /
    • 2015
  • A hybrid procedure based on multi-Criteria Satisfaction Analysis (MUSA) and a Network Data Envelopment Analysis (NDEA) is proposed to evaluate the relative efficiency of customer services in bank branches. First, a three-stage process including sub-processes such as customer expectations, customer satisfaction, and customer loyalty, is defined to model the banking customer services. Then, fulfillment of customer expectations, customer loyalty level, and the customer satisfaction degree are measured and quantified through a multi-dimensional questionnaire based on customers' perceptions analysis and MUSA method, respectively. The customer services scores and the other criteria such as mean of employee evaluation score, operation costs, assets, deposits, loans, number of accounts are considered in network three-stage DEA model. The proposed NDEA model is formed based on multipliers perspective, output-oriented, and constant return to scale assumptions. The proposed NDEA model quantifies and assesses the total efficiency of main process and assigns the efficiency to customer expectations, customer satisfactions, and customer loyalties sub-processes in bank branches. The whole procedure is applied on 30 bank branches in IRAN. The proposed approach can be used in other organizations such as airports, airline agencies, urban transportation systems, railway organizations, chain stores, chain restaurants, public libraries, and entertainment centers.

Efficient Resource Slicing Scheme for Optimizing Federated Learning Communications in Software-Defined IoT Networks

  • Tam, Prohim;Math, Sa;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.22 no.5
    • /
    • pp.27-33
    • /
    • 2021
  • With the broad adoption of the Internet of Things (IoT) in a variety of scenarios and application services, management and orchestration entities require upgrading the traditional architecture and develop intelligent models with ultra-reliable methods. In a heterogeneous network environment, mission-critical IoT applications are significant to consider. With erroneous priorities and high failure rates, catastrophic losses in terms of human lives, great business assets, and privacy leakage will occur in emergent scenarios. In this paper, an efficient resource slicing scheme for optimizing federated learning in software-defined IoT (SDIoT) is proposed. The decentralized support vector regression (SVR) based controllers predict the IoT slices via packet inspection data during peak hour central congestion to achieve a time-sensitive condition. In off-peak hour intervals, a centralized deep neural networks (DNN) model is used within computation-intensive aspects on fine-grained slicing and remodified decentralized controller outputs. With known slice and prioritization, federated learning communications iteratively process through the adjusted resources by virtual network functions forwarding graph (VNFFG) descriptor set up in software-defined networking (SDN) and network functions virtualization (NFV) enabled architecture. To demonstrate the theoretical approach, Mininet emulator was conducted to evaluate between reference and proposed schemes by capturing the key Quality of Service (QoS) performance metrics.

WIRELESS SENSOR NETWORK BASED BRIDGE MANAGEMENT SYSTEM FOR INFRASTRUCTURE ASSET MANAGEMENT

  • Jung-Yeol Kim;Myung-Jin Chae;Giu Lee;Jae-Woo Park;Moon-Young Cho
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.1324-1327
    • /
    • 2009
  • Social infrastructure is the basis of public welfare and should be recognized and managed as important assets. Bridge is one of the most important infrastructures to be managed systematically because the impact of the failure is critical. It is essential to monitor the performance of bridges in order to manage them as an asset. But current analytical methods such as predictive modeling and structural analysis are very complicated and difficult to use in practice. To apply these methods, structural and material condition data collection should be performed in each element of bridge. But it is difficult to collect these detailed data in large numbers and various kinds of bridges. Therefore, it is necessary to collect data of major measurement items and predict the life of bridges roughly with advanced information technologies. When certain measurement items reach predefined limits in the monitoring bridges, precise performance measurement will be done by detailed site measurement. This paper describes the selection of major measurement items that can represent the tendency of bridge life and introduces automated bridge data collection test-bed using wireless sensor network technology. The following will be major parts of this paper: 1) Examining the features of conventional bridge management system and data collection method 2) Mileage concept as a bridge life indicator and measuring method of the indicator 3) Test-bed of automated and real-time based bridge life indicator monitoring system using wireless sensor network

  • PDF

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

The Actualizatoin of e-Community and Change Management in Higher Education (대학의 e-커뮤니티활성화와 변화관리)

  • Kim, Se-Ihn
    • The Journal of Information Technology
    • /
    • v.8 no.2
    • /
    • pp.1-16
    • /
    • 2005
  • In high education, knowledge is the very important resource and output. Knowledge management is the art of creating additional value from academic knowledge assets. The e-community is the network community, newly created by information communication technology, and the critical place that share and transfer people's the various knowledge and thinking and the effective space that can apply knowledge management. If we construct a convenient and useful e-community in our university, we will be able to increase the student's intellectual needs, and create new knowledge. Web-portal will promote the activity of e-community providing easy to access and personalized web circumstance. The emergence of Internet and Web access to all university services will force institutions to rethik everything. We should reconfigure our academic environment in order to adapt information technology and educational change, and must do change management based on their structure and culture.

  • PDF

A Study on the ITS integrated airport security system (ITS 통합 공항 보안시스템에 관한 고찰)

  • Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.2
    • /
    • pp.339-344
    • /
    • 2013
  • Airport security activities to ensure the airport's facilities and assets from crime, such as theft, to prevent. security systems that support these activities efficiently so you can be called. security center systems, CCTV systems, access control systems, intrusion detection systems, security communication systems, warning broadcasting system, network security systems, perimeter intrusion detection systems, search systems, and information security systems for the security system will be examined.