• Title/Summary/Keyword: Network performance management

Search Result 2,142, Processing Time 0.026 seconds

A Review on Applicability of Sustainable City Index - Focusing on GCI, EPI and CBI - (지속가능한 도시평가지표의 적용 가능성 검토 - GCI, EPI, CBI를 중심으로 -)

  • Yun, Hyerngdu;Park, Jinyoung;Choi, Taebong;Choi, Intae;Noh, Taihwan;Han, Bongho;Kim, Myungjin
    • Journal of Environmental Impact Assessment
    • /
    • v.24 no.6
    • /
    • pp.593-606
    • /
    • 2015
  • This study was intended to develop Korean Environmental Sustainable City Index (ESCI) so that local governments can examine and identify urban environment issues and then come up with a policy to improve the environment and urban biodiversity for cities. Green City Index (GCI), Environmental Performance Index (EPI), and City Biodiversity Index (CBI) which have used worldwide were analyzed. Based on the result of analysis, evaluation indicators of ESCI were finally a total of 20 indicators under four categories, which are native biodiversity, living environment, ecosystem services, and governance and management. Then, five cities with biotope mapping and evaluation index were selected to apply ESCI for evaluation. In order to apply ESCI, local governments need to accumulate basic data. There should be a policy which requires local governments to build data for biotope mapping so that the rate of natural area, ecological network and permeable land surface can be evaluated. Indicators must be applied to be compliant with scale of the city and level of data building gradually.

Hierarchical Internet Application Traffic Classification using a Multi-class SVM (다중 클래스 SVM을 이용한 계층적 인터넷 애플리케이션 트래픽의 분류)

  • Yu, Jae-Hak;Lee, Han-Sung;Im, Young-Hee;Kim, Myung-Sup;Park, Dai-Hee
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.1
    • /
    • pp.7-14
    • /
    • 2010
  • In this paper, we introduce a hierarchical internet application traffic classification system based on SVM as an alternative overcoming the uppermost limit of the conventional methodology which is using the port number or payload information. After selecting an optimal attribute subset of the bidirectional traffic flow data collected from the campus, the proposed system classifies the internet application traffic hierarchically. The system is composed of three layers: the first layer quickly determines P2P traffic and non-P2P traffic using a SVM, the second layer classifies P2P traffics into file-sharing, messenger, and TV, based on three SVDDs. The third layer makes specific classification of the entire 16 application traffics. By classifying the internet application traffic finely or coarsely, the proposed system can guarantee an efficient system resource management, a stable network environment, a seamless bandwidth, and an appropriate QoS. Also, even a new application traffic is added, it is possible to have a system incremental updating and scalability by training only a new SVDD without retraining the whole system. We validate the performance of our approach with computer experiments.

An Implementation of IEEE 1516.1-2000 Standard with the Hybrid Data Communication Method (하이브리드 데이터 통신 방식을 적용한 IEEE 1516.1-2000 표준의 구현)

  • Shim, Jun-Yong;Wi, Soung-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1094-1103
    • /
    • 2012
  • Recently, software industry regarding national defense increases system development of distributed simulation system of M&S based to overcome limit of resource and expense. It is one of key technologies for offering of mutual validation among objects and reuse of objects which are discussed for developing these systems. RTI, implementation of HLA interface specification as software providing these technologies uses Federation Object Model for exchanging information with joined federates in the federation and each federate has a characteristic that is supposed to have identical FOM in the federation. This technology is a software which is to provide the core technology which was suggested by the United state's military M&S standard framework. Simulator, virtual simulation, and inter-connection between military weapons system S/W which executes on network which is M&S's core base technology, and it is a technology which also can be used for various inter-connection between S/W such as game and on-line phone. These days although RTI is used in military war game or tactical training unit field, there is none in Korea. Also, it is used in mobile-game, distribution game, net management, robot field, and other civilian field, but the number of examples are so small and informalized. Through this developing project, we developed the core technique and RTI software and provided performance of COTS level to improve communication algorithms.

A Study on the Development and Measurement of Logistics Partners Cooperation Index(LPCI): Focused on the Joint Logistics (물류협력지수의 개발 및 측정에 관한 연구: 공동물류사업을 중심으로)

  • Suh, Sang-Sok;Song, Gwang-Suk;Park, Jong-Woo
    • Journal of Distribution Science
    • /
    • v.14 no.6
    • /
    • pp.107-118
    • /
    • 2016
  • Purpose - Over 90% of Domestic logistics industry is small enterprise and they are experiencing growth stagnation due to price-based competition structure rather than constructing logistics service of high added value. In order to get over this situation and pursue the development of logistics industry, strengthening its competitiveness, through inter-enterprise cooperative network build-up, would be a key alternative. Therefore, in this study, an index for measuring inter-enterprise cooperation level of Joint logistics business will be developed as a typical collaborative business model in logistics industry. Moreover, a strengthening competitiveness method suggests a developmental step and a key management index to mature in logistics industry. Research Design, Data, Methodology - This study is an index development research for measuring inter-enterprise cooperation level of logistics industry. Such a level was measured by performing a survey by targeting enterprises that participated in Joint logistics business. The targeting enterprises are typical cooperative models in logistics industry. Measurement items were developed which were based on the presented items in existing research. Question items were composed of selection type questions as answering Yes/No. They measures implementation status of corporate activity and detailed activity items measuring qualitative level. Total samples were based on 116 enterprise samples including 90 logistics enterprises and 26 shippers. In addition, by evaluating the importance for Joint logistics business recognition with personnel working level, the weight of measuring variable was extracted. This study has built an assessment tools (LPCI) on Joint logistics business cooperation level in a situation where there are no previous studies on joint logistics business, this study is meaningful for other studies. Results - As a result of analyzing LPCI presented in this study, the score of logistics enterprise was represented as 59.9 points based on full score of 100 points and that of shippers as 47.2 points and cooperation level among enterprises participated in Joint logistics business was revealed to be very low. In particular, as a result of measuring the importance between logistics enterprise and shippers, the difference by each measurement standard was represented among those enterprises. This difference is considered to be a key factor that cooperative operational conformity between logistics enterprises and shippers is represented to be low. Conclusions - As most joint logistics business, being promoted at present, is sharing facility and information with joint logistics business, it is hard to find such a joint logistics business in reality based on cooperative business model in main cooperation agents. Therefore, competitiveness of logistics industry could be strengthened by promoting joint logistics business based on their mutual cooperation among enterprises. In other words, it is to secure sustainable competitiveness of joint logistics business together with creation of new market by inter-enterprise cooperation based on integration of basic logistics business.

Efficiently Development Plan from the User's Need Analysis of the Army Tactical C4I(ATCIS) System (지상전술 C4I(ATCIS)체계 운용자 요구분석을 통한 효율적 발전 방안)

  • Park, Chang-Woon;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.5
    • /
    • pp.246-259
    • /
    • 2008
  • This study was to minimize the trial and error in the primary step of the C4I system(ATCIS) of the each army corps on the front line, and test the economy and efficiency was tested by reviewing related papers and the system characteristics of other countries. The relationship was researched by analyzing the collected survey data and survey data related to the user's requirement level such as the army standards, that is, commonality, timeliness, simplification, automaticity, field availability and viability, multi-stage security and interoperability, unification. The result showed that the C4I system was efficiently operated through the system reliability for the specification of the system and operation manual, maneuverability and security, adaptability of the war field and system support and management, and good education and training about system operation, and less system maintenance and supplementary element. As a result, the development plan confirmed that the continuous operator education and the construction of the maintenance, and the upgrade digitalization(C4ISR+D) with the korean characteristics based on IT of network systems, and system development of the measurement model of the operator performance must be continuously supplemented in the near future.

Pre-Filtering based Post-Load Shedding Method for Improving Spatial Queries Accuracy in GeoSensor Environment (GeoSensor 환경에서 공간 질의 정확도 향상을 위한 선-필터링을 이용한 후-부하제한 기법)

  • Kim, Ho;Baek, Sung-Ha;Lee, Dong-Wook;Kim, Gyoung-Bae;Bae, Hae-Young
    • Journal of Korea Spatial Information System Society
    • /
    • v.12 no.1
    • /
    • pp.18-27
    • /
    • 2010
  • In u-GIS environment, GeoSensor environment requires that dynamic data captured from various sensors and static information in terms of features in 2D or 3D are fused together. GeoSensors, the core of this environment, are distributed over a wide area sporadically, and are collected in any size constantly. As a result, storage space could be exceeded because of restricted memory in DSMS. To solve this kind of problems, a lot of related studies are being researched actively. There are typically 3 different methods - Random Load Shedding, Semantic Load Shedding, and Sampling. Random Load Shedding chooses and deletes data in random. Semantic Load Shedding prioritizes data, then deletes it first which has lower priority. Sampling uses statistical operation, computes sampling rate, and sheds load. However, they are not high accuracy because traditional ones do not consider spatial characteristics. In this paper 'Pre-Filtering based Post Load Shedding' are suggested to improve the accuracy of spatial query and to restrict load shedding in DSMS. This method, at first, limits unnecessarily increased loads in stream queue with 'Pre-Filtering'. And then, it processes 'Post-Load Shedding', considering data and spatial status to guarantee the accuracy of result. The suggested method effectively reduces the number of the performance of load shedding, and improves the accuracy of spatial query.

A Study on the Relation between IRI and PrI (평탄성 지수 IRI와 PrI의 상관관계에 관한 연구)

  • Kim, Kook-Han;Lee, Byung-Duck;Choi, Go-Il;Yang, Sung-Cheol
    • International Journal of Highway Engineering
    • /
    • v.5 no.1 s.15
    • /
    • pp.11-18
    • /
    • 2003
  • Road roughness, as the key factor influencing not only drivers' ride quality and safety but also pavement deterioration, is one of the most important pavement performance indicator to be evaluated by users' subjective assessment. For this reason, a specific number of the pavement roughness has been adopted to monitor the condition of a road for pavement management systems and to evaluate the quality of newly constructed sections, however, none of the unified methodology was internationally accepted. In Korea highway network, road roughness has been used mainly to evaluate newly placed pavement by using 7.6m CP (California Profile meter) to calculate PrI (Profile Index). But this instrument is manually operated to measure road profiles by traffic closure and their interpretation depends on personal bias. Therefore, problems arisen from the manually operated instrument will be overcome by using the APL (Longitudinal Profile Analyzer) which can be operated in the speed of 80km per hour. A study was conducted to correlate the relation from both concrete and asphalt pavement between IRI (measured by APL) and PrI (measured by 7.6m CP). Test results showed that there was a good correlation between IRI and PrI.

  • PDF

Design and Evaluation of an Edge-Fog Cloud-based Hierarchical Data Delivery Scheme for IoT Applications (사물인터넷 응용을 위한 에지-포그 클라우드 기반 계층적 데이터 전달 방법의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.37-47
    • /
    • 2018
  • The number of capabilities of Internet of Things (IoT) devices will exponentially grow over the next years. These devices may generate a vast amount of time-constrained data. In the context of IoT, data management should act as a layer between the objects and devices generating the data and the applications accessing the data for analysis purposes and services. In addition, most of IoT services will be content-centric rather than host centric to increase the data availability and the efficiency of data delivery. IoT will enable all the communication devices to be interconnected and make the data generated by or associated with devices or objects globally accessible. Also, fog computing keeps data and computation close to end users at the edge of network, and thus provides a new breed of applications and services to end users with low latency, high bandwidth, and geographically distributed. In this paper, we propose Edge-Fog cloud-based Hierarchical Data Delivery ($EFcHD^2$) method that effectively and reliably delivers IoT data to associated with IoT applications with ensuring time sensitivity. The proposed $EFcHD^2$ method stands on basis of fully decentralized hybrid of Edge and Fog compute cloud model, Edge-Fog cloud, and uses information-centric networking and bloom filters. In addition, it stores the replica of IoT data or the pre-processed feature data by edge node in the appropriate locations of Edge-Fog cloud considering the characteristic of IoT data: locality, size, time sensitivity and popularity. Then, the performance of $EFcHD^2$ method is evaluated through an analytical model, and is compared to fog server-based and Content-Centric Networking (CCN)-based data delivery methods.

Domestic Research Trends of Social Learning in Higher Education (대학환경에서의 소셜러닝 국내 연구 동향 고찰)

  • Lee, Jeongmin;Park, Hyeon-Kyeong;Jung, Yeon-Ji
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.111-128
    • /
    • 2016
  • The purpose of this study was to analyze domestic research trends of social learning in higher education, and find out educational implications with regard to the effectiveness of social learning. The 63 articles on social learning were finally analyzed, which were published in KCI journals. The results are as follows: Firstly, in respect of research contents, the research area of utilization and the survey methods were most frequently used in those studies. Secondly, as to the use of SNS, the analyzed studies were centralized on Facebook and Formal Structured Learning. Thirdly, as for the effectiveness of SNS, the experimental studies showed that social learning has an effective impact on the learning outcomes, learning processes, and learners' characteristics. In addition, survey studies most frequently set the independent variables as learners' characteristics and the dependent variables as participation, satisfaction, and academic achievement. This research has a significance in terms of verifying the educational implications of social learning, and providing the preliminary data to facilitate the performance for the effective social learning.

A Tree-Based Routing Algorithm Considering An Optimization for Efficient Link-Cost Estimation in Military WSN Environments (무선 센서 네트워크에서 링크 비용 최적화를 고려한 감시·정찰 환경의 트리 기반 라우팅 알고리즘에 대한 연구)

  • Kong, Joon-Ik;Lee, Jae-Ho;Kang, Ji-Heon;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.637-646
    • /
    • 2012
  • Recently, Wireless Sensor Networks (WSNs) are used in many applications. When sensor nodes are deployed on special areas, where humans have any difficulties to get in, the nodes form network topology themselves. By using the sensor nodes, users are able to obtain environmental information. Due to the lack of the battery capability, sensor nodes should be efficiently managed with energy consumption in WSNs. In specific applications (e.g. in intrusion detections), intruders tend to occur unexpectedly. For the energy efficiency in the applications, an appropriate algorithm is strongly required. In this paper, we propose tree-based routing algorithm for the specific applications, which based on the intrusion detection. In addition, In order to decrease traffic density, the proposed algorithm provides enhanced method considering link cost and load balance, and it establishes efficient links amongst the sensor nodes. Simultaneously, by using the proposed scheme, parent and child nodes are (re-)defined. Furthermore, efficient routing table management facilitates to improve energy efficiency especially in the limited power source. In order to apply a realistic military environment, in this paper, we design three scenarios according to an intruder's moving direction; (1) the intruder is passing along a path where sensor nodes have been already deployed. (2) the intruders are crossing the path. (3) the intruders, who are moving as (1)'s scenario, are certainly deviating from the middle of the path. In conclusion, through the simulation results, we obtain the performance results in terms of latency and energy consumption, and analyze them. Finally, we validate our algorithm is highly able to adapt on such the application environments.