• Title/Summary/Keyword: Network Infrastructure

Search Result 1,778, Processing Time 0.03 seconds

Qualitative Research on the Rural Farmers' Exporting Experience in Stage of Conducting Export (농촌지역 수출 시행단계 농가의 수출 경험에 관한 질적 연구)

  • Yi, Hyangimi;Goh, Jongtae
    • Journal of Korean Society of Rural Planning
    • /
    • v.21 no.3
    • /
    • pp.155-169
    • /
    • 2015
  • As an essential means to the exploitation of new demands, the export of agri-food has the price-supporting effect on the domestic agri-food and its expansion can be a good way to increase farms' income. Of course, to enhance farms' income under the liberalization of the market, it is necessary to have countermeasures considering various factors. To this end, the study understood the experiences of farms doing exports and looked into ways to improve them by reviewing their motivations to export, difficulties, requirements, etc. In this context, the study conducted the purposive sampling among tomato export farmhouses in Jeongseon-gun in the export enforcement phase and executed the theme analysis. The research findings and suggestions are as follows. First, in order to enhance the level of commercialization of Jeongseon-gun tomatoes and reinforce the trade bargaining power, it is necessary to form the consensus on policy and make the scaling of the site based on the strong organization power. To this end, it requires the active role of agricultural cooperatives that take a big portion of distribution in the site and distribute its profits directly to farmhouses. Second, it is necessary to set clear target markets for Jeongseon-gun tomato export farms and set sales strategies for each target market. That is, in order to expand the export of Jeongseon-gun tomatoes, after clarifying local sales and export sales, export farmhouses should focus on quality management and secure the quantity for export. Third, to expand the export to Japan which already has the foundation for the export of Korean tomatoes, and to new export countries of China, Russia, etc., it is necessary to set the 'Two-Track Strategies for Export Market (particular item for focus and particular area for focus)' through the building of network of tomato export areas in Gangwon-do. In conclusion, to expand the export of Jeongseon-gun tomatoes, agricultural cooperatives and leaders together should build the strong organizational power with farmhouses and secure the quantities for export. And, according to the 'Two-Track Strategies for Export Market (particular item for focus and particular area for focus)', export infrastructure and export operational system should be built and to do so, the solidarity of tomato export farmhouses in Gangwon area should precede.

Optimized Route Optimization mode of MIPv6 between Domains Based on AAA (관리상의 도메인간 이동시 AAA 기반의 핸드오버 성능향상 방안)

  • Ryu, Seong-Geun;Mun, Young-Song
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.9
    • /
    • pp.39-45
    • /
    • 2009
  • When Mobile IPv6 is deployed in commercial network, a mobile node needs AAA services for an authentication, authorization and accounting. AAA and Mobile IPv6 are protocols which are operated independently. Then schemes which merge these protocols have been emerged. These schemes can enable a mobile node to establish a security association between the mobile node and a home agent and to perform a binding update for the home agent using AAA authentication request. But these schemes introduce many signal messages and long handover latency during the handover, since Route Optimization mode for Mobile Ipv6 is performed using Return Routability procedure. To solve this problem, we propose a scheme for Route Optimization mode that the home agent performs the binding update for a correspondent node via the AAA infrastructure between the home agent and the correspondent node instead of Return Routability procedure. For performance evaluation, we analyze signal message transmission costs and handover latencies during handover. We show performance improvement of the proposed scheme which reduces handover latency as 61% compared with the existing scheme.

A Determination Model of the Data Transmission-Interval for Collecting Vehicular Information at WAVE-technology driven Highway by Simulation Method (모의실험을 이용한 WAVE기반 고속도로 차량정보 전송간격 결정 모델 연구)

  • Jang, Jeong-Ah;Cho, Han-Byeog;Kim, Hyon-Suk
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.4
    • /
    • pp.1-12
    • /
    • 2010
  • This paper deals with the transmission interval of vehicle data in smart highway where WAVE (Wireless Access for Vehicular Environments) systems have been installed for advanced road infrastructure. The vehicle data could be collected at every second, which is containing location information of the vehicle as well the vehicle speed, RPM, fuel consuming and safety data. The safety data such as DTC code, can be collected through OBD-II. These vehicle data can be used for valuable contents for processing and providing traffic information. In this paper, we propose a model to decide the collection interval of vehicle information in real time environment. This model can change the transmission interval along with special and time-variant traffic condition based on the 32 scenarios using microscopic traffic simulator, VISSIM. We have reviewed the transmission interval, communication transmission quantity and communication interval, tried to confirm about communication possibility and BPS, etc for each scenario. As results, in 2-lane from 1km highway segment, most appropriate transmission interval is 2 times over spatial basic segment considering to communication specification. In the future, if a variety of wireless technologies on the road is introduced, this paper considering not only traffic condition but also wireless network specification will be utilized the high value.

Implementation Plan of MaaS according to Various Public Transport Links (MaaS의 다양한 공공교통수단 연계에 따른 구현 방안)

  • Seo, Ji-Yeong;Lee, Seon-Ha;Cheon, Choon-Keun;Lee, Eun-Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.2
    • /
    • pp.73-86
    • /
    • 2018
  • The increase in the number of private automobiles has incurred various traffic problems. Globally, studies on MaaS(Mobility as a Service) has already been initiated to mobilize the use of public transportation in reducing private passenger cars in roads. This study aims to analyze the passenger's optimal route considering the transfer between different transportation modes through simulation, and analyze the effect of available route through the connected transportation modes. Sejong Special Self-Governing City was chosen as the study area due to its extensive transportation network. As a result of the analysis, the predominant obtainable route is derived either from using public transportation (i.e. bus and subway) only or by bicycle. However, it is also possible to use the car sharing and public bicycle to reach their final destination efficiently when paths that can be traversed were more scrutinized. When various transportation information and location-based services are introduced in smart phone applications, they can provide very useful information to passengers, and also promote social problems such as traffic congestion and environmental issues in the future.

IoT Open-Source and AI based Automatic Door Lock Access Control Solution

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Mariappan, Vinayagam;Young, Ko Eun;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.8-14
    • /
    • 2020
  • Recently, there was an increasing demand for an integrated access control system which is capable of user recognition, door control, and facility operations control for smart buildings automation. The market available door lock access control solutions need to be improved from the current level security of door locks operations where security is compromised when a password or digital keys are exposed to the strangers. At present, the access control system solution providers focusing on developing an automatic access control system using (RF) based technologies like bluetooth, WiFi, etc. All the existing automatic door access control technologies required an additional hardware interface and always vulnerable security threads. This paper proposes the user identification and authentication solution for automatic door lock control operations using camera based visible light communication (VLC) technology. This proposed approach use the cameras installed in building facility, user smart devices and IoT open source controller based LED light sensors installed in buildings infrastructure. The building facility installed IoT LED light sensors transmit the authorized user and facility information color grid code and the smart device camera decode the user informations and verify with stored user information then indicate the authentication status to the user and send authentication acknowledgement to facility door lock integrated camera to control the door lock operations. The camera based VLC receiver uses the artificial intelligence (AI) methods to decode VLC data to improve the VLC performance. This paper implements the testbed model using IoT open-source based LED light sensor with CCTV camera and user smartphone devices. The experiment results are verified with custom made convolutional neural network (CNN) based AI techniques for VLC deciding method on smart devices and PC based CCTV monitoring solutions. The archived experiment results confirm that proposed door access control solution is effective and robust for automatic door access control.

Research on the Relative Importance and the Priority for the Functions of the U-City Service Aid Organization (U-City 서비스 지원기관 기능의 상대적 중요도와 우선순위 연구)

  • Yi, Mi Sook;Shin, Dong Bin;Lee, Jae Yong
    • Spatial Information Research
    • /
    • v.21 no.2
    • /
    • pp.35-43
    • /
    • 2013
  • The aim of this research is to analyze the priority to functions of the U-city Service Aid Organization(USAO), which is to support invigorating U-City industry. This research analyzes the relative importance and the priority about the functional area and components of UASO based on AHP. This research also performs a sensitivity analysis. The research result shows that relative importance of functional area is like following orders: 1) distribution of U-City service-related information, 2) quality certification of U-City-related products and services, 3) R&D of U-City technology, 4) standardization of U-City, 5) U-City human resource development. The relative importance order of functional components is 1) establishment of U-City information distribution organization, 2) construction and management of U-City information distribution network, 3) supporting U-City information distribution and price policy, 4) providing U-City information list for distribution, 5) preparation and application of quality certification standard of U-City products and services, 6) research on legal system of U-City items, targets, and procedures for quality certification, 7) research, analysis, and provision of U-City information distribution situation, 8) level examination of constructed infrastructures and services in U-City, 9) U-City core technology development and localization of technology, 10) standardization of collected U-City information, service classification, distribution system. This research result can be applied directly to design functions of USAO. The result also can be used for duty management, human resource planning, or resource allocation.

Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints (Endpoint에 적용 가능한 정적 feature 기반 고속의 사이버 침투공격 분석기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Su-jeong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.21-31
    • /
    • 2018
  • Cyber penetration attacks can not only damage cyber space but can attack entire infrastructure such as electricity, gas, water, and nuclear power, which can cause enormous damage to the lives of the people. Also, cyber space has already been defined as the fifth battlefield, and strategic responses are very important. Most of recent cyber attacks are caused by malicious code, and since the number is more than 1.6 million per day, automated analysis technology to cope with a large amount of malicious code is very important. However, it is difficult to deal with malicious code encryption, obfuscation and packing, and the dynamic analysis technique is not limited to the performance requirements of dynamic analysis but also to the virtual There is a limit in coping with environment avoiding technology. In this paper, we propose a machine learning based malicious code analysis technique which improve the weakness of the detection performance of existing analysis technology while maintaining the light and high-speed analysis performance applicable to commercial endpoints. The results of this study show that 99.13% accuracy, 99.26% precision and 99.09% recall analysis performance of 71,000 normal file and malicious code in commercial environment and analysis time in PC environment can be analyzed more than 5 per second, and it can be operated independently in the endpoint environment and it is considered that it works in complementary form in operation in conjunction with existing antivirus technology and static and dynamic analysis technology. It is also expected to be used as a core element of EDR technology and malware variant analysis.

A Point-based Resource Distribution Scheme and Its Characteristics for Mobile P2P Streaming Service (모바일 P2P 스트리밍 서비스를 위한 포인트 기반 자원 배분 기법과 그 특성)

  • Kim, Yangjung;Chong, Ilyoung;Han, Chimoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.33-42
    • /
    • 2013
  • In the early stage of P2P, the technology was limited to narrow usage of file sharing, but currently, P2P technology has become essential to maximize the efficiency between associated technologies without additional deployment of high costly infrastructure and also the burden of the server. Especially, P2P media streaming service is a highly attractive service to mobile users. which requires a higher quality in the mobile environment in accordance with the development of technology of wired network as well as better mobile terminals. However, P2P technology should consider the trade-off between 'peer selfishness' and QoE for providing fairness. The P2P system also try to maximize the resource utilization through an incentive mechanism for service differentiation and encourage peers to contribute continuously for improving the overall system performance. In this paper, we propose an point-based incentive mechanism based on peer's contribution level and energy availability for service differentiation. We also introduce that the proposed mechanism efficiently enhances the system performance as the peer with incentive using contribution and energy obtains more effective resource distribution.

Simple Mobility Management Protocol Based on P2P for Global IP Mobility Support (글로벌 IP 이동성 지원을 위한 P2P 기반 간단한 이동성 관리 프로토콜)

  • Chun, Seung-Man;Nah, Jae-Wook;Park, Jong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.12
    • /
    • pp.17-27
    • /
    • 2011
  • Most of the previous mobility management protocols such as IETF MIPv4/6 and its variants standardized by the IETF do not support global seamless handover because they require partially changes of the existing network infrastructure. In this article, we propose a simple mobility management protocol (SMMP) which can support global seamless handover between homogeneous or heterogeneous wireless networks. To do this, the SMMP employs separate location management function as DMMS to support global user and service mobility and the bidirectional tunnels are dynamically constructed to support seamless IP mobility by using the IEEE MIH extension server, which is extended the IEEE 802.21 MIH standards. The detailed architecture and functions of the SMMP have been designed. Finally, the mathematical analysis and the simulation have been done. The performance results show the proposed SMMP outperforms the existing MIPv6 and HMIPv6 in terms of handover latency, packet loss, pear signal noise ratio (PSNR).

A Design and Implementation of Bulk Data Transmission Tool based on UDT (UDT 기반의 대용량 데이터 전송도구 설계 및 구현)

  • Park, Jong-Seon;Kim, Seung-Hae;Hwang, Gun-Joon;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.2
    • /
    • pp.23-31
    • /
    • 2012
  • With advance of high bandwidth network infrastructure, the requirement is dramatically increasing to cooperate between the users who are far from each other and make use of bulk data. However, as the prominent data transmission protocol, it is well known that TCP suffers some degrees of inefficiency for bulk data transmission when RTT is relatively big. So, some works are on going to suggest a new transmission method to utilize the bandwidth in effective. UDT(UDP-based Data Transfer protocol) is one of these. It is a UDP based application level protocol which can guarantee reliability and stability. much like as TCP. In this paper, we present a design and implementation of UDT based bulk data transmission tool by applying parallel and compressive techniques. The implementation result is examined to measured its performance improvement on a real test-bed, and then compared with existing bulk data transmission tools. Experimental results show that proposed tool is more stable and shows greater performance than that of native UDT. Especially, the performances show 244% improvement in RTT 400ms without losses and 229% in RTT 250ms with 0.005% losses respectively.