• 제목/요약/키워드: Traffic Identification

검색결과 298건 처리시간 0.027초

국내 종합병원의 리모델링에 나타난 공간구성방안에 관한 연구 - 부문별 재배치 및 동선연결방안을 중심으로 - (A Study on the Spatial Composition Strategy in the Remodeling of General Hospitals - Focused on the Departmental Relocation and Circulation System -)

  • 김하진;양내원
    • 한국실내디자인학회논문집
    • /
    • 제13권6호
    • /
    • pp.123-131
    • /
    • 2004
  • The hospitals built In the seventies and eighties have gone through many different extensions and renovations. However, as there had been no prior projections of the future extensions, irrational processes in terms of interdepartmental functional relocations and space availability have recurred. As well, areas and departments are located in several wings, which bring about a decrease in interdepartmental functional linkage, causing a lot of confusion and trouble in hospital management. Through this research we acquire concluding remarks. 1) To restore functional linkage in the whole hospital, strategy of interdepartmental relocation with the clinic-in-the clinic concept is the measure to minimize the problems of the increase in interdepartmental functional linkage since the clinic-in-the clinic concepts minimize circulation and maximizes efficiency of hospital management by making all the dispersed wings as professional as possible. 2) The measure of smooth circulation in order to resolve the problems of patients' difficulty in identifying directions and in decrease in staff's work performance, which arises from the extensions without considering the traffic systems of the whole hospital involves introduction of linear circulation systems in which connections between departments or areas can be made centering main axes of circulation. It is also a responsive measure to enhance the functional linkage between buildings and efficiency of patient's ease in identification of directions.

Field Measurements of the New CCTV Tower in Beijing

  • Xu, Y.L.;Zhan, S.;Xia, H.;Xia, Y.;Zhang, N.
    • 국제초고층학회논문집
    • /
    • 제2권3호
    • /
    • pp.171-178
    • /
    • 2013
  • The emergence of a growing number of tall buildings, often with unusual shapes and innovative structural systems, has led to the realization of the need for and the importance of field measurements. The new China Central Television (CCTV) Tower in Beijing is one of tall buildings with a highly unusual shape and a complex structural system, requiring field measurements to identify its dynamic characteristics for the subsequent dynamic analysis of the tower under wind excitation, seismic-induced ground motion and traffic-induced ground motion. The structural system and the finite element model of the CCTV Tower are first introduced in this paper. The computed natural frequencies and mode shapes are then presented as a reference for the field measurement. After introducing the arrangement of the ambient vibration measurement, the field measured natural frequencies and damping ratios of the CCTV Tower are presented and the measured natural frequencies are finally compared with the computed ones. It was found that the structural damping ratios of the CCTV Tower are small and the computed natural frequencies are smaller than the measured ones by about 12~17%.

트래픽 세션의 포트 역할을 이용한 네트워크 공격 시각화 (Network Attacks Visualization using a Port Role in Network Sessions)

  • 장범환
    • 디지털산업정보학회논문지
    • /
    • 제11권4호
    • /
    • pp.47-60
    • /
    • 2015
  • In this paper, we propose a simple and useful method using a port role to visualize the network attacks. The port role defines the behavior of the port from the source and destination port number of network session. Based on the port role, the port provides the brief security features of each node as an attacker, a victim, a server, and a normal host. We have automatically classified and identified the type of node based on the port role and security features. We detected and visualized the network attacks using these features of the node by the port role. In addition, we are intended to solve the problems with existing visualization technologies which are the reflection problem caused an undirected network session and the problem caused decreasing of distinct appearance when occurs a large amount of the sessions. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacker, victim, server, and hosts. In addition, by providing a categorized analysis of network attacks, this method can more precisely detect and distinguish them from normal sessions.

전자 태그의 보안 레벨을 기반으로 하는 RFID 인증 프로토콜 (RFID Tag's Security Level Based RFID Authentication Protocol)

  • 오수현;곽진
    • 한국통신학회논문지
    • /
    • 제30권6C호
    • /
    • pp.593-600
    • /
    • 2005
  • 최근 들어 RFID 시스템을 물류${\cdot}$유통 시스템을 비롯한 여러 산업분야에 널리 활용하기 위해 태그에 저장된 정보를 보호하고 임의의 태그에 대한 추적 방지가 가능한 인증 프로토콜에 대한 연구가 활발히 진행 중이다. 본 논문에서는 보안 레벨(security level)의 개념을 이용하여 태그를 인증하기위해 back-end DB에 요구되는 계산량을 감소시킬 수 있는 RFID 인증 프로토콜을 제안한다. 제안하는 방식은 해쉬 함수에 기반하며 재전송 공격, 스푸핑 공격, 트래픽 분석, 위치 프라이버시 등에 대해 안전하다는 장점이 있다.

우리나라 연안해역을 통항하는 선박에 대한 AIS 데이터 입력 오류의 분석 및 개선 방안 연구 (Studies on the Improvement and Analysis of Data Entry Error to the AIS System for the Traffic Ships in the Korean Coastal Area)

  • 전재호;정태권
    • 수산해양교육연구
    • /
    • 제28권6호
    • /
    • pp.1812-1821
    • /
    • 2016
  • The purpose of this study is to survey input data error of ship automatic identification system (AIS) and suggest its improvement. The effects of AIS were observed. Input data error of AIS was investigated by dividing it into dynamic data, static data by targeting actual ships and its improvement method was suggested. The findings are as follows. Looking into accidents before and after AIS is enforced to install on the ship, total collision were decreased after AIS installed. Static data error of AIS took place mainly in the case that ship name, call sign, MMSI, IMO number, ship type, location of antenna (ship length and width) were wrongly input or those data were not input initially. Dynamic data error of AIS was represented by input error of ship's heading. As errors of voyage related data take place as well, confusion is made in sailing or ship condition. Counter measures against the above are as follows. First, reliability of AIS data information should be improved. Second, incessant concern and management should be made on the navigation officers.

드론 영상 종합정보처리 및 분석용 시스템 개발 (Integrated Video Analytics for Drone Captured Video)

  • 임송원;조성만;박구만
    • 방송공학회논문지
    • /
    • 제24권2호
    • /
    • pp.243-250
    • /
    • 2019
  • 본 논문에서는 다양한 재난치안안전 임무 상황에서 적용할 수 있는 드론 영상 종합정보 처리 및 분석용 시스템을 제안한다. 제안하는 시스템은 드론에서 획득한 영상을 서버에 저장하고, 다양한 시나리오에 따른 영상 처리 및 분석을 수행한다. 각 임무에 따라 필요한 기능은 딥러닝을 활용하여 드론으로부터 확보하는 영상에서 영상분석 시스템을 구성한다. 실험 영상을 통해 교통량 측정, 용의자 및 차량 추적, 조난자 식별 및 해상 초계 임무에 적용할 수 있음을 확인했다. 드론 운용자가 임무에 따른 필요 기능을 선택하고 신속하게 대처할 수 있는 시스템을 구현하였다.

부호 분할 다중 접속 이동 통신망을 위한 인증 키 분해 프로토콜 (An authenticated key distribution protocol for the CDMA mobile communication network)

  • Hak S. Jeon;Dong K. Kim
    • 정보보호학회논문지
    • /
    • 제7권2호
    • /
    • pp.43-54
    • /
    • 1997
  • 본 논문에서는 부호 분할 다중 접속(Code Division Multiple Access) 이동 통신망을 위한 안전하고 최소의 인증 및 키 분배 프로토콜을 제안한다. 가입자의 인증과 가입자 트래픽의 안전성을 유지하기 위해 CDMA 이동 통신망의 보안 프로토콜은 개발되었다. 기존 프로토콜은 이동 통신망의 무선 구간에 대한 통신 보안을 고려하였고, 유선 구간의 통신 보안은 고려하지 않는다. 본 논문에서는 무선 구간의 통신뿐만 아니라 유선 구간의 통신 보안을 보장할 수 있는 인증 및 키 분배 프로토콜을 제안한다. 제안된 프로토콜은 사용자 식별 번호의 기밀성을 유지하면서, 기존 프로토콜과 비교하여 최소의 정보 흐름을 유지한다.

Moon Phase based Threshold Determination for VIIRS Boat Detection

  • Kim, Euihyun;Kim, Sang-Wan;Jung, Hahn Chul;Ryu, Joo-Hyung
    • 대한원격탐사학회지
    • /
    • 제37권1호
    • /
    • pp.69-84
    • /
    • 2021
  • Awareness of boats is a main issue in areas of fishery management, illegal fishing, and maritime traffic, etc. For the awareness, Automatic Identification System (AIS) and Vessel-Pass System (V-PASS) have been widely used to collect the boat-related information. However, only using these systems makes it difficult to collect the accurate information. Recently, satellite-based data has been increasingly used as a cooperative system. In 2015, U.S. National Oceanic and Atmospheric Administration (NOAA) developed a boat detection algorithm using Visible Infrared Imaging Radiometer Suite (VIIRS) Day & Night Band (DNB) data. Although the detections have been widely utilized in many publications, it is difficult to estimate the night-time fishing boats immediately. Particularly, it is difficult to estimate the threshold due to the lunar irradiation effect. This effect must be corrected to apply a single specific threshold. In this study, the moon phase was considered as the main frequency of this effect. Considering the moon phase, relational expressions are derived and then used as offsets for relative correction. After the correction, it shows a significant reduction in the standard deviation of the threshold compared to the threshold of NOAA. Through the correction, this study can set a constant threshold every day without determination of different thresholds. In conclusion, this study can achieve the detection applying the single specific threshold regardless of the moon phase.

UDP-Based Active Scan for IoT Security (UAIS)

  • Jung, Hyun-Chul;Jo, Hyun-geun;Lee, Heejo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권1호
    • /
    • pp.20-34
    • /
    • 2021
  • Today, IoT devices are flooding, and traffic is increasing rapidly. The Internet of Things creates a variety of added value through connections between devices, while many devices are easily targeted by attackers due to security vulnerabilities. In the IoT environment, security diagnosis has problems such as having to provide different solutions for different types of devices in network situations where various types of devices are interlocked, personal leakage of security solutions themselves, and high cost, etc. To avoid such problems, a TCP-based active scan was presented. However, the TCP-based active scan has limitations that it is difficult to be applied to real-time systems due to long detection times. To complement this, this study uses UDP-based approaches. Specifically, a lightweight active scan algorithm that effectively identifies devices using UPnP protocols (SSDP, MDNS, and MBNS) that are most commonly used by manufacturers is proposed. The experimental results of this study have shown that devices can be distinguished by more than twice the true positive and recall at an average time of 1524 times faster than Nmap, which has a firm position in the field.

드론 원격 식별 규정 및 표준화 동향 분석 (Analysis of Regulation and Standardization Trends for Drone Remote ID)

  • 김희욱;강군석;김대호
    • 전자통신동향분석
    • /
    • 제36권6호
    • /
    • pp.46-54
    • /
    • 2021
  • Drone remote identification (ID) capability is essential to ensure public safety, help law enforcement, and secure the safety and efficiency of the national airspace. Remote ID technology can be used to differentiate compliant drones from illegal drones that pose a potential security risk by providing airspace awareness to the civil aviation agency and law enforcement entities. In addition, the increased safety and efficiency obtained by mandating remote ID will make it possible to operate drones over populated areas and beyond visual lines of sight. In addition, remote ID will allow drones to be safely integrated into unmanned traffic management systems and the national airspace. Remote ID devices can be categorized by type, i.e., broadcast remote ID or network remote ID. The broadcast remote ID, which has high technical maturity and will be applied in the near future, is primarily considered to ensure the security of drones. The network remote ID, which is being developed and tested and will be applied in the distant future, can be used additionally to ensure the safety and the efficiency of the national airspace. In this paper, we analyze the trends on regulation and standardization activities for drone remote ID primarily in the United State and Europe.