• Title/Summary/Keyword: Service scenarios

Search Result 525, Processing Time 0.028 seconds

Performance Analysis of Fast Handover Scheme Based on Secure Smart Mobility in PMIPv6 Networks (프록시 모바일 IPv6 네트워크에서 안전한 스마트 이동성에 기반한 빠른 핸드오버 기법의 성능분석)

  • Yoon, KyoungWon;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.121-133
    • /
    • 2013
  • Defect-free transfer service on the Next-generation wireless network extensive roaming mobile node (MN) to provide efficient mobility management has become very important. MIPv6(Mobility IPv6) is one of mobility management scheme proposed by IETF(Internet Engineering Task Force), and IPv6-based mobility management techniques have been developed in various forms. One of each management techniques, IPv6-based mobility management techniques for PMIPv6 (MIPv6) system to improve the performance of a variety of F-PMIPv6 (Fast Handover for Proxy MIPv6) is proposed. However, the F-PMIPv6 is cannot be excellent than PMIPv6 in all scenarios. Therefor, to select a proper mobility management scheme between PMIPv6 and F-PMIPv6 becomes an interesting issue, for its potenrials in enhancing the capacity and scalability of the system. In this paper, we develop an analytical model to analyze the applicability of PMIPv6 and F-PMIPv6. Based on this model, we design an Secure Smart Mobility Support(SSM) scheme that selects the better alternative between PMIPv6 and F-PMIPv6 for a user according to its changing mobility and service characteristics. When F-PMIPv6 is adopted, SSM chooses the best mobility anchor point and regional size to optimize the system performance. Numerical results illustrate the impact of some key parameters on the applicability of PMIPv6 and F-PMIPv6. Finally, SSM has proven even better result than PMIPv6 and F-PMIPv6.

Design of a Logistics Decision Support System for Transportation Mode Selection considering Carbon Emission Cost (탄소배출비용을 고려한 물류의 최적 운송수단 의사결정 시스템 설계)

  • Song, Byung-Jun;Koo, Je-Kwon;Song, Sang-Hwa;Lee, Jong-Yun
    • The KIPS Transactions:PartD
    • /
    • v.18D no.5
    • /
    • pp.371-384
    • /
    • 2011
  • This paper considers logistics decision support system which deals with transportation mode selection considering transportation and carbon emission cost. Transportation and carbon emission costs vary with the choice of transportation modes and to become competitive companies need to find proper transportation modes for their logistics services. However, due to the restricted capacity of transportation modes, it is difficult to balance transportation and carbon emission costs when designing logistics network including transportation mode choice for each service. Therefore this paper aims to analyze the trade-off relationship between transportation and carbon emission cost in mode selection of intermodal transportation and to provide optimal green logistics strategy. In this paper, the logistics decision support system is designed based on mixed integer programming model. To understand the trade-off relationship of transportation and carbon emission cost, the system is tested with various scenarios including transportation of containers between Seoul and Busan. The analysis results show that, even though sea transportation combined with trucking is competitive in carbon emission per unit distance travelled, the total cost of carbon emission and transportation for the sea transportation may not have competitive advantage over other transportation modes including rail and truck transportation modes. The sea-based intermodal logistics service may induce detours which have negative impacts on the overall carbon emission. The proposed logistics decision support system is expected to play key role in green logistics and supply chain management.

GIS-based Network Analysis for the Understanding of Aggregate Resources Supply-demand and Distribution in 2018 (GIS 네트워크 분석을 이용한 2018년 골재의 수요-공급과 유통 해석)

  • Lee, Jin-Young;Hong, Sei Sun
    • Economic and Environmental Geology
    • /
    • v.54 no.5
    • /
    • pp.515-533
    • /
    • 2021
  • Based on the supply location, demand location, and transportation network, aggregate supply-demand characteristics and aggregate distribution status were analyzed from the results of the closest distance, service areas, and location-allocation scenarios using GIS network analysis. As a result, it was found that the average transport distance of aggregates from the supplier was 6 km on average, the average range of 7 km for sand, and 10 km for gravel was found to reach the destination. In particular, the simulated service area covers about 92% in Seoul-Gyeonggi Province, 85% in Busan-Ulsan-Gyeongnam Province, and more than 90% in Daejeon-Sejong-Chungnam Province. These results have a significant implication in quantitatively interpreting primary data on aggregate supply-demand. Furthermore, these results suggest the possibility of a wide-area quantitative analysis of aggregate supply regions necessary for establishing a basic aggregate plan. The results also evaluated by the site-allocation scenario show that aggregate supply may be possible through companies less than 200 with large-amounts quarries, which is the 700 companies currently supplying small amounts of aggregates on the country. Therefore, in terms of distribution of aggregates, a policy approach is needed to form an appropriate market for regions with high and low density of aggregate supply services, and the necessity of regional distribution and re-evaluation is suggested through an aggregate supply analysis demand across the country. Furthermore, in analyzing the supply-demand network for the aggregate market, additional research is needed to establish long-term policies for the aggregate industry and related industries.

Water yield estimation of the Bagmati basin of Nepal using GIS based InVEST model (GIS기반 InVEST모형을 이용한 네팔 Bagmati유역의 물생산량 산정)

  • Bastola, Shiksha;Seong, Yeon Jeong;Lee, Sang Hyup;Jung, Younghun
    • Journal of Korea Water Resources Association
    • /
    • v.52 no.9
    • /
    • pp.637-645
    • /
    • 2019
  • Among various ecosystem services provided by the basin, this study deals with water yield (WY) estimation in the Bagmati basin of Nepal. Maps of where water used for different facilities like water supply, irrigation, hydropower etc. are generated helps planning and management of facilities. These maps also help to avoid unintended impacts on provision and production of services. Several studies have focused on the provision of ecosystem services (ES) on the basin. Most of the studies have are primarily focused on carbon storage and drinking water supply. Meanwhile, none of the studies has specifically highlighted water yield distribution on sub-basin scale and as per land use types in the Bagmati basin of Nepal. Thus, this study was originated with an aim to compute the total WY of the basin along with computation on a sub-basin scale and to study the WY capacity of different landuse types of the basin. For the study, InVEST water yield model, a popular model for ecosystem service assessment based on Budyko hydrological method is used along with ArcGIS. The result shows water yield per hectare is highest on sub-basin 5 ($15216.32m^3/ha$) and lowest on sub-basin 6 ($10847.15m^3/ha$). Likewise, built-up landuse has highest WY capacity followed by grassland and agricultural area. The sub-basin wise and LULC specific WY estimations are expected to provide scenarios for development of interrelated services on local scales. Also, these estimations are expected to promote sustainable land use policies and interrelated water management services.

Past, Present and Future of Geospatial Scheme based on Topo-Climatic Model and Digital Climate Map (소기후모형과 전자기후도를 기반으로 한 지리공간 도식의 과거, 현재 그리고 미래)

  • Kim, Dae-Jun
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.23 no.4
    • /
    • pp.268-279
    • /
    • 2021
  • The geospatial schemes based on topo-climatology have been developed to produce digital climate maps at a site-specific scale. Their development processes are reviewed here to derive the needs for new schemes in the future. Agricultural and forestry villages in Korea are characterized by complexity and diversity in topography, which results in considerably large spatial variations in weather and climate over a small area. Hence, the data collected at a mesoscale through the Automated Synoptic Observing System (ASOS) operated by the Korea Meteorological Administration (KMA) are of limited use. The geospatial schemes have been developed to estimate climate conditions at a local scale, e.g., 30 m, lowering the barriers to deal with the processes associated with production in agricultural and forestry industries. Rapid enhancement of computing technologies allows for near real-time production of climate information at a high-resolution even in small catchment areas and the application to future climate change scenarios. Recent establishment of the early warning service for agricultural weather disasters can provide growth progress and disaster forecasts for cultivated crops on a farm basis. The early warning system is being expanded worldwide, requiring further advancement in geospatial schemes and digital climate mapping.

Design and Implementation of Multi-HILS based Robot Testbed to Support Software Validation of Biomimetic Robots (생체모방로봇 소프트웨어 검증 지원 다중 HILS 기반 로봇 테스트베드 설계 및 구현)

  • Hanjin Kim;Kwanhyeok Kim;Beomsu Ha;Joo Young Kim;Sung Jun Shim;Jee Hoon Koo;Won-Tae Kim
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.6
    • /
    • pp.243-250
    • /
    • 2024
  • Biomimetic robots, which emulate characteristics of biological entities such as birds or insects, have the potential to offer a tactical advantage in surveillance and reconnaissance in future battlefields. To effectively utilize these robots, it is essential to develop technologies that emulate the wing flapping of birds or the movements of cockroaches. However, this effort is complicated by the challenges associated with securing the necessary hardware and the complexities involved in software development and validation processes. In this paper, we presents the design and implementation of a multi-HILS based biomimic robot software validation testbed using modeling and simulation (M&S). By employing this testbed, developers can overcome the absence of hardware, simulate future battlefield scenarios, and conduct software development and testing. However, the multi-HILS based testbed may experience inter-device communication delays as the number of test robots increases, significantly affecting the reliability of simulation results. To address this issue, we propose the data distribution service priority (DDSP), a priority-based middleware. DDSP demonstrates an average delay reduction of 1.95 ms compared to the existing DDS, ensuring the required data transmission quality for the testbed.

Urban Climate Impact Assessment Reflecting Urban Planning Scenarios - Connecting Green Network Across the North and South in Seoul - (서울 도시계획 정책을 적용한 기후영향평가 - 남북녹지축 조성사업을 대상으로 -)

  • Kwon, Hyuk-Gi;Yang, Ho-Jin;Yi, Chaeyeon;Kim, Yeon-Hee;Choi, Young-Jean
    • Journal of Environmental Impact Assessment
    • /
    • v.24 no.2
    • /
    • pp.134-153
    • /
    • 2015
  • When making urban planning, it is important to understand climate effect caused by urban structural changes. Seoul city applies UPIS(Urban Plan Information System) which provides information on urban planning scenario. Technology for analyzing climate effect resulted from urban planning needs to developed by linking urban planning scenario provided by UPIS and climate analysis model, CAS(Climate Analysis Seoul). CAS develops for analyzing urban climate conditions to provide realistic information considering local air temperature and wind flows. Quantitative analyses conducted by CAS for the production, transportation, and stagnation of cold air, wind flow and thermal conditions by incorporating GIS analysis on land cover and elevation and meteorological analysis from MetPhoMod(Meteorology and atmospheric Photochemistry Meso-scale model). In order to reflect land cover and elevation of the latest information, CAS used to highly accurate raster data (1m) sourced from LiDAR survey and KOMPSAT-2(KOrea Multi-Purpose SATellite) satellite image(4m). For more realistic representation of land surface characteristic, DSM(Digital Surface Model) and DTM(Digital Terrain Model) data used as an input data for CFD(Computational Fluid Dynamics) model. Eight inflow directions considered to investigate the change of flow pattern, wind speed according to reconstruction and change of thermal environment by connecting green area formation. Also, MetPhoMod in CAS data used to consider realistic weather condition. The result show that wind corridors change due to reconstruction. As a whole surface temperature around target area decreases due to connecting green area formation. CFD model coupled with CAS is possible to evaluate the wind corridor and heat environment before/after reconstruction and connecting green area formation. In This study, analysis of climate impact before and after created the green area, which is part of 'Connecting green network across the north and south in Seoul' plan, one of the '2020 Seoul master plan'.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

A study on Convergence Weapon Systems of Self propelled Mobile Mines and Supercavitating Rocket Torpedoes (자항 기뢰와 초공동 어뢰의 융복합 무기체계 연구)

  • Lee, Eunsu;Shin, Jin
    • Maritime Security
    • /
    • v.7 no.1
    • /
    • pp.31-60
    • /
    • 2023
  • This study proposes a new convergence weapon system that combines the covert placement and detection abilities of a self-propelled mobile mine with the rapid tracking and attack abilities of supercavitating rocket torpedoes. This innovative system has been designed to counter North Korea's new underwater weapon, 'Haeil'. The concept behind this convergence weapon system is to maximize the strengths and minimize the weaknesses of each weapon type. Self-propelled mobile mines, typically placed discreetly on the seabed or in the water, are designed to explode when a vessel or submarine passes near them. They are generally used to defend or control specific areas, like traditional sea mines, and can effectively limit enemy movement and guide them in a desired direction. The advantage that self-propelled mines have over traditional sea mines is their ability to move independently, ensuring the survivability of the platform responsible for placing the sea mines. This allows the mines to be discreetly placed even deeper into enemy lines, significantly reducing the time and cost of mine placement while ensuring the safety of the deployed platforms. However, to cause substantial damage to a target, the mine needs to detonate when the target is very close - typically within a few yards. This makes the timing of the explosion crucial. On the other hand, supercavitating rocket torpedoes are capable of traveling at groundbreaking speeds, many times faster than conventional torpedoes. This rapid movement leaves little room for the target to evade, a significant advantage. However, this comes with notable drawbacks - short range, high noise levels, and guidance issues. The high noise levels and short range is a serious disadvantage that can expose the platform that launched the torpedo. This research proposes the use of a convergence weapon system that leverages the strengths of both weapons while compensating for their weaknesses. This strategy can overcome the limitations of traditional underwater kill-chains, offering swift and precise responses. By adapting the weapon acquisition criteria from the Defense force development Service Order, the effectiveness of the proposed system was independently analyzed and proven in terms of underwater defense sustainability, survivability, and cost-efficiency. Furthermore, the utility of this system was demonstrated through simulated scenarios, revealing its potential to play a critical role in future underwater kill-chain scenarios. However, realizing this system presents significant technical challenges and requires further research.

  • PDF

A Study on the Effect of On-Dock System in Container Terminals - Focusing on GwangYang Port - (컨테이너터미널에서 On-Dock 시스템 효과분석에 관한 연구 - 광양항을 중심으로 -)

  • Cha, Sang-Hyun;Noh, Chang-Kyun
    • Journal of Navigation and Port Research
    • /
    • v.39 no.1
    • /
    • pp.45-53
    • /
    • 2015
  • These days Container Terminals are focusing on increasing the quantity of containers and shipping lines choose Terminals by referring to the key elements of a terminal to perform the overall operation the fastest such as the location of the terminal, discharging ability, keeping environment, and other elements related to shipping in general. Container terminal is able to offer On-Dock service has become an important factor for shipping lines to choose that terminal. In this paper, we propose an algorithm for On-Dock system work algorithm, the algorithm Empty container exports, Full Container algorithm and The aim of our study focus on both container's gate out time and search for the effective terminal operation which is using the general On-Dock system through several algorithm like container batch priority, gate in and out job priority and empty container yard equipment allocation rule based on the automatic allocation method and manual allocation scheme for container. Gathering these information, it gives the priority and yard location of gate-out containers to control. That is, by selecting an optimum algorithm container, container terminals Empty reduces the container taken out time, it is possible to minimize unnecessary re-handling of the yard container can be enhanced with respect to the efficiency of the equipment. Operations and operating results of the Non On-Dock and On-Dock system is operated by the out work operations (scenarios) forms that are operating in the real Gwangyang Container Terminal derived results. Gwangyang Container terminal and apply the On-Dock system, Non On-Dock can be taken out this time, about 5 minutes more quickly when applying the system. when managing export orders for berths where On-Dock service is needed, ball containers are allocated and for import cargoes, D/O is managed and after carryout, return management, container damage, cleaning, fixing and controlling services are supported hence the berth service can be strengthened and container terminal business can grow.