• Title/Summary/Keyword: Next generation ITS

Search Result 864, Processing Time 0.032 seconds

Technical Advancements Needed for the Introduction of Distributed Water Infrastructure to Urban Wastewater Management Systems (분산형 물 인프라의 도시 하수관리 시스템 도입을 위한 기술적 발전방안)

  • Yongju Choi;Wooram Lee
    • Journal of Korean Society on Water Environment
    • /
    • v.39 no.1
    • /
    • pp.76-86
    • /
    • 2023
  • We are on the verge of paradigm shift for the design and operation of our urban water systems from treatment- and efficiency-based to recirculation- and sustainability-based. One of the most frequently suggested alternatives to embody this paradigm shift is to decentralize the currently highly centralized urban water infrastructure. However, claims for water infrastructure decentralization are often criticized due to poor economic feasibility, unstable performance, and unprofessional operation and maintenance. The current study critically reviews the literature to discuss the technical advancement needs to overcome such challenges. Firstly, decentralized water infrastructure was briefly defined and the rationale for the proposal of its introduction to the next-generation urban water systems was laid down. The main discussion focused on the following water technologies, which require special attention when working with decentralized water infrastructure: i) material collection, storage, and transport; ii) easily scalable water treatment; iii) sensor, information, and communications; and iv) system optimization. The principles, current development status, and challenges were discussed for each of the water technologies. The discussion on the water technologies has enabled the identification of future research needs for their application to the next-generation urban water systems which will be designed following decentralized water infrastructure. This paper will significantly improve the current understanding on water infrastructure decentralization and provides insight on future direction of water technology development.

Trip Generation Model Using Backpropagation Neural Networks in Comparison with linear/nonlinear Regression Analysis (신경망 이론을 이용한 통행발생 모형연구 (선형/비선형 회귀모형과의 비교))

  • 장수은;김대현;임강원
    • Journal of Korean Society of Transportation
    • /
    • v.18 no.4
    • /
    • pp.95-105
    • /
    • 2000
  • The Purpose of this study is to present a new Trip Generation Model using Backpropagation Neural Networks. For this purpose, it is compared the performance between existing linear/nonlinear Regression models and a new TriP Generation model using Neural Networks. The study was performed according to the below. First, it is analyzed the limits of conventional Regression models, next Proved the superiority of Neural Networks model in theoretical and empirical aspects, and lastly Presented a new approach of Trip Generation methodology. The results show that Backpropagation Neural Networks model is predominant in estimation and Prediction comparable to Regression analysis. Such results mean the possibility of Neural Networks\` application in Trip Generation modeling. Specially under the circumstances of the chancing transportation situations and unstable transportation on vironments, its application in transportation fields will be extended.

  • PDF

A Study on Advanced Frame of Core-Banking Model (코어뱅킹 모델의 발전모형 연구)

  • Weon, Dal-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.7
    • /
    • pp.3194-3200
    • /
    • 2012
  • The aim of the paper is systematically to organize the historical facts of financial IT development process through various tracking and proved knowledge, it is to propose the direction and the advanced frame of core-banking model in next generation for the year 2020s. To achieve it, this study variously analyzed the meaningful pattern of development process of financial IT by backtracking life-cycle of Core-Banking model and it presented new model of Core-Banking for the past 40 years. In research findings, the life cycle of financial IT system and core-banking model have been analyzed about 10 years and the longest model of life cycle is about 33 years. As a result, It proved to be desirable that the advanced frame of the Core-Banking model adds the functions of business hub and product life cycle management to basic frame of its existing model in the future. In addition, big bang development method of new next generation system must be sublated. Also, They need to be initiated more business-oriented than IT-oriented. Along with this, the financial IT should be developed into the convergence industry, and it needs to extend the systematization of Core-Banking model studies and more professionals. Finally, this study has arranged the financial IT development process in domestic and presents new frame through analyzing intensively the Core-Banking model for the first time Therefore, it can be contributed to serve the guideline regarding the direction in new next generation system.

Mutual Authentication Method between Wireless Mesh Enabled MSAPs in the Next-generation TICN (차세대 전술정보통신체계에서의 무선 메쉬 MSAP 노드 간 상호 인증 기법)

  • Son, Yu-Jin;Bae, Byoung-Gu;Shon, Tae-Shik;Ko, Young-Bae;Lim, Kwang-Jae;Yun, Mi-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.385-394
    • /
    • 2012
  • The tactical mobile communication network, which comprises a part of the next-generation Tactical Information and Communication Network (TICN), provides means of communication and control for Tactical Multi-Functional Terminals (TMFT) belonging to a Mobile Subscriber Access Point (MSAP). The next-generation of MSAP is capable of constructing a backbone network via LCTR and HCTR directional antennas. At the same time, WMN modules are used to create and manage a wireless mesh backbone. When directional antennas are used in mobile environments, seamless services cannot be efficiently supported as the movement of the node prevents the angle of the antenna to constantly match. Therefore, data communication through the wireless mesh networks is required to provide direct communication between mobile MSAPs. Accordingly, mutual authentication and data encryption mechanisms are required to provide reliable data transmission in this environment. To provide efficient mutual authentication between MSAP devices, the process of verifying a certificate of the other MSAP device through its own authentication server is required. This paper proposes mutual authentication mechanisms where the MSAP requiring authentication and the MSAP that permits it initiates low-cost and efficient authentication in a distributed way. More specifically, we propose a method of applying EAP-ELS (Extensible Authentication Protocol-Transport Layer Security) in the next-generation TICN.

Current Progress of Next Generation Battery of Toxicology-Cellular and Molecular Toxicology

  • Ryu, Jae-Chun;Kim, Youn-Jung
    • Molecular & Cellular Toxicology
    • /
    • v.1 no.1
    • /
    • pp.26-31
    • /
    • 2005
  • The detection and the regulation of man-made synthetic chemicals and the establishment of toxicity that may pose a genetic hazard in our environment are subjects of great concern because of its close correlation between environmental contamination and human health. Since the tens of thousands of man-made chemicals that have been introduced into the environment in the last few decades must also be tested for their damaging effect on DNA, the agents that cause this damage must be identified.

Analyses of Security Mechanism for Wireless Sensor Network (무선 센서 네트워망에서의 보안 메카니즘 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.744-747
    • /
    • 2008
  • Sensor networks will play an important role in the next generation pervasive computing. But its characteristic of wireless communication brings a peat challenge to the security measures used in the communication protocols. These measures are different from conventional security methods. In this paper, we proposed a security architecture for self-organizing mobile wireless sensor networks. It can prevent most of attacks based on intrusion detection.

  • PDF

Parallel Writing and Detection for Two Dimensional Magnetic Recording Channel

  • Zhang, Yong;Lee, Jaejin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.10
    • /
    • pp.821-826
    • /
    • 2012
  • Two-dimensional magnetic recording (TDMR) is treated as the next generation magnetic recording method, but because of its high channel bit error rate, it is difficult to use in practices. In this paper, we introduce a new writing method that can decrease the nonlinear media error effectively, and it can also achieve 10 Tb/$in^2$ of user bit density on a magnetic recording medium with 20 Teragrains/$in^2$.

Challenges for large area processing equipment for TFT-LCD manufacturing

  • Tanaka, Tak
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.85-86
    • /
    • 2007
  • As the manufacturing capacity needs for large size LCD TV shifts very fast into next generation, equipment manufactures face more challenges in development of the systems which can accommodate productivity, reliability and high process quality requirements from the panel makers. AKT committed to continue its contribution to the growth of the LCD market by providing excellent PECVD products. The cost containment and performance improvement are key challenges for large size processing equipment development and this presentation discusses various challenges and AKT's solutions in developing large size PECVD equipment beyond Gen. 8.

  • PDF

Design and Implementation of Web-based SNMP Fault Management System Using Double Message Broker (이중 메시지 브로커를 이용한 웹기반 SNMP 장애관리시스템 설계 및 구현)

  • 이위혁;백승진;송재원
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.89-92
    • /
    • 2002
  • It is important that fault management of devices which is composing network in the next-generation internet environment. It is best method of operating network safely and efficiently. In this paper, we have suggested double message broker architecture to transmit trap messages in web-based fault management system using Java technologies. The double message broker fault management system shows that manager can do its own job efficiently

  • PDF

Moult Patterns of Tail Feathers of Immature Steller's Sea Eagle(Haliaeetus pelagicus)raised in Captivity (사육상태에서 참수리(Haliaeetus pelagicus) 미성조 꼬리깃의 깃갈이 방식)

  • Kang, Seung-Gu;Lee, In-Sup
    • Korean Journal of Environment and Ecology
    • /
    • v.22 no.4
    • /
    • pp.435-441
    • /
    • 2008
  • This study conducted a survey on the moulting sequence subsequent to age of Haliaeetus pelagicus raised in captivity at the Ornithology Laboratory attached to Kyungsung University for about six years from November, 2000 until July, 2006. The survey indicated that the moult of rectrices usually began in July and continued until April of the next year and most of the rectrices were replaced by one-time moult. Usually, about two thirds of the tail feathers were replaced while the rest were replaced no later than April of the next year, and the moult also continued during the wintertime. The total number of rectrices was 14, and the moult progressed alternately on a systematic basis. The progress of the moult for female & male was made on four stages and three stages respectively and the characteristic shown on every stage of the moult was that the left & right tail feathers progressed symmetrically and not until one stage of progress almost completed did the next stage began. The color of the juvenile steller's sea-eagle was dotted with black spots on its original white color and there existed regular black belt on its feather's fringes; however, it was difficult to identify its age by tail feathers only because there was almost no difference in color between feathers ranging from the first to the third generation(1st-3rd summer feathers). In addition, this research took the different amounts of black-speckled pattern appearing by individual into consideration. There existed slight black speckles in white color feathers of the fourth generation(the 4th summer feathers) while showing a big difference compared to the 3rd generation feathers. The 5th generation feathers[the 5th summer feathers]were found to be equipped with perfect tail feathers having virgin white of a steller's sea-eagle after completing its 4th molt. When observing a steller's sea-eagle in the open air, it is necessary for an observer to have a deliberate examination in judging its age belonging to the 1st-3rd generation feathers, and it is considered that the changes of other parts of feathers should be also observed besides tail feathers.