• Title/Summary/Keyword: Open network

Search Result 1,739, Processing Time 0.03 seconds

An Analysis on Scholarly Communication Characteristics of Domestic Researchers in High Energy Physics Focused on SCOAP3 Open Access Journals (고에너지 물리학 분야 국내 연구자들의 학술 커뮤니케이션 특성 분석: SCOAP3 오픈 액세스 학술지를 중심으로)

  • Lee, Seonhee;Kim, Ji-Young
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.2
    • /
    • pp.285-310
    • /
    • 2020
  • This paper analyzed SCOAP3 journals, which have been evaluated as successful open access models, to understand the characteristics of scholarly communication among domestic researchers in the field of high energy physics (HEP). As research methods, a quantitative analysis using statistics and a network analysis of authors' affiliated institutions and academic journals were conducted to understand collaboration and research activities of domestic researchers in the HEP field. The results of the study revealed that, among the 10 SCOAP3 journals in which Korean researchers participated, the proportion of articles in which Korean authors participated was 8.0% of the total. The proportion of papers with more than 1,000 co-authors per paper was 28.7% of the total. The results of this analysis proved that Korean researchers were actively collaborating in the HEP global network. From the results of the network analysis to understand the cooperative relationship centered on the affiliated organization, the cooperative network could be divided into three clusters: a cluster centered on S universities, a cluster centered on K research institutes that provided researchers a cooperative infrastructure with CERN, and a cluster centered on I research institute. Through the network analysis for research institutes and journals, it was found that JHEP, PRD, and PLB among academic journals were highly participating journals, and universities and researchers were also participating in the writing of open access papers. The results of this study can be used as a basic resource for understanding researchers and building a research information environment in libraries.

A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System (개방형 자동 수요 반응 시스템 보안 취약성 분석에 관한 연구)

  • Chae, Hyeon-Ho;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.333-339
    • /
    • 2016
  • Technology to optimize and utilize the use and supply of the electric power between consumer and supplier has been on the rise among the smart grid power market network in electric power demand management based on the Internet. Open Automated Demand Response system protocol, which can deliver Demand Response needed in electric power demand management to electricity supplier, system supplier and even the user is openADR 2.0b. This paper used the most credible, cosmopolitanly proliferated EPRI open source and analysed the variety of security vulnerability that developed VEN and VTN system may have. Using the simulator for attacking openADR protocol, the VEN/VTN system that has been implemented as EPRI open source was conducted to attack in a variety of ways. As a result of the analysis, we were able to get the results that the VEN/VTN system has security vulnerabilities to the parameter tampering attacks and service flow falsification attack. In conclusion, if you want to implement the openADR2.0b protocol system in the open or two-way communication environment smart grid network, considering a variety of security vulnerability should be sure to seek security technology and services.

A Development of The Open USN Platform for Underground Information Collection (지중 정보 수집을 위한 개방형 USN 플랫폼 연구)

  • Shin, Jun-Ho;Song, Byung-Hun
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.141-142
    • /
    • 2009
  • Due to recent extreme weather, the information of the reliability for the nation's major social overhead capital (SOC) is emerging as a major issue. So the real-time monitoring of the underground state has become a very important. This paper is about a open USN platform for the underground information collection. Various sensors to collect information for the underground is used. The interface and the power of each sensor may vary. In order to solve the interface and power problem, this paper refer to the open interface, the network required for an open platform and the energy problem.

  • PDF

Dynamic and Open Decision Support System based on Web Services (웹서비스 방식을 기반으로 한 동적 개방형 의사결정지원시스템)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.13 no.2
    • /
    • pp.145-170
    • /
    • 2003
  • Open Decision Support System(DSS) is an automated and transparent system that is built to be shared both within and across organizations. The open DSS has been thought to be a set of decision components that are communicating through Web protocols. These characteristics intuitively invite the Web services concepts, which are currently one of the new trends in network-based business services. However, web services still are not active enough to be autonomous, and to provide for composing functionalities. These lead to the motivation on building a sophisticated web service to contain these features and to utilize web services on behalf of the user. This paper aims to propose a new concept of Meta Web Service, a web service-based open DSS. Decision modules in a dynamic and open DSS can be viewed as a web service. The Meta Web Service understands the users problem statement with ontology, performs web service discovery, web service composition, and automatically generates codes for composite web service execution. A prototype of example web service has been developed to show the feasibility of the proposed idea.

A Study on the GIC Circuit and Its Application (GIC 회로 및 그 응용에 관한 연구)

  • 이영근
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.9 no.3
    • /
    • pp.9-16
    • /
    • 1972
  • In this article it is shown that a GIC circuit with conversion "s" can be realized and a inductor is realized as a RC active two terminal network by using it instead of a gyrator. It is also shown that arbitary stable transfer functions can be realized as the open-circuit voltage ratio of 2 port networks which include GIC;s. In relizing the GIC circuit using transistors, it is made clear that the nullatornorator model of atransistor can be successfully applied at least in the frequency range below 10kHz. The synthesis method using GIC's is characterized with the followings; First, arbitrary stable transfer functions are realized systematically by repeating very simple network structure. Second, in the overall network all circuit elements except GICs are only resistors. Third, the number of condensers in the overall network necessary for realizing the transfer function of n-th order are n, which is believed to be the least number expected. expected.

  • PDF

A Study of 4G Network for Security System

  • Kim, Suk-jin;Lee, Hyangran;Lee, Malrey
    • International Journal of Advanced Culture Technology
    • /
    • v.3 no.2
    • /
    • pp.77-86
    • /
    • 2015
  • In this paper there is an overview of some standards and security models which are implemented in such an IP-based and heterogeneous networks and we also present some security models in an open environment and finally we obtain that as a result of the nature of 4G networks there are still more security holes and open issues for expert to notice. Our survey shows that a number of new security threats to cause unexpected service interruption and disclosure of information will be possible in 4G due mainly to the fact that 4G is an IP-based, heterogeneous network. Other than that, it tells about the security issues and vulnerabilities present in the above 4G standards are discussed. Finally, we point to potential areas for future vulnerabilities and evaluate areas in 4G security which warrant attention and future work by the research and advanced technology industry.

A Study of Security Issues of Cognitive Radio Network (인지 무선통신 네트워크의 보안 문제 연구)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.662-665
    • /
    • 2011
  • The cognitive radio (CR) network has been studied in the form of open source by vast number of communities, and the potential expectation is very high since the CR is based on reprogrammable platform. However, this characteristics of open-source software take high risk as well. As the peer-to-peer software has been abused, so high is the chance that the CR network can be abused public wide. Consequently, the benefit from the study of next-generation wireless network can be at risk because of the negative impact of violation of communication law or abusing the CR. In this contribution, we analyze the issues and the problems of the CR and discuss an efficient measure against security attacks.

  • PDF

An efficient ID-based authentication scheme based on the rth -residuosity problem in wireless environment (무선통신 환경에서 사용 가능한 고차잉여류 문제에 기반을 둔 자체 인증방식)

  • 이보영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.73-82
    • /
    • 1999
  • In an open network computing environment a host cannot to identity its users correctly to network services. In order to prevent this thing we present the design of a authentication scheme 솟 using the notion of rth -residuosity problem and discrete logarithm problem which is proposed by S. J. Park et al. The proposed scheme described here is efficient method for mutual authentication without leakage of users identity in mobile communication system that ensure user anonymity and untraceability.

Model Transformation and Inference of Machine Learning using Open Neural Network Format (오픈신경망 포맷을 이용한 기계학습 모델 변환 및 추론)

  • Kim, Seon-Min;Han, Byunghyun;Heo, Junyeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.107-114
    • /
    • 2021
  • Recently artificial intelligence technology has been introduced in various fields and various machine learning models have been operated in various frameworks as academic interest has increased. However, these frameworks have different data formats, which lack interoperability, and to overcome this, the open neural network exchange format, ONNX, has been proposed. In this paper we describe how to transform multiple machine learning models to ONNX, and propose algorithms and inference systems that can determine machine learning techniques in an integrated ONNX format. Furthermore we compare the inference results of the models before and after the ONNX transformation, showing that there is no loss or performance degradation of the learning results between the ONNX transformation.

Constructing a Large Interlinked Ontology Network for the Web of Data (데이터의 웹을 위한 상호연결된 대규모 온톨로지 네트워크 구축)

  • Kang, Sin-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.1
    • /
    • pp.15-23
    • /
    • 2010
  • This paper presents a method of constructing a large interlinked ontology network for the Web of Data through the mapping among typical ontologies. When an ontology is open to the public, and more easily shared and used by people, its value is increased more and more. By linking CoreOnto, an IT core ontology constructed in Korea, to the worldwide ontology network, CoreOnto can be open to abroad and enhanced its usability. YAGO is an ontology constructed by combining category information of Wikipedia and taxonomy of WordNet, and used as the backbone of DBpedia, an ontology constructed by analyzing Wikipedia structure. So a mapping method is suggested by linking CoreOnto to YAGO and DBpedia through the synset of WordNet.