• Title/Summary/Keyword: Trail Network

Search Result 27, Processing Time 0.033 seconds

A Study on the Critical Factors of Determining Regional Trail Routes (광역 탐방로 노선설정을 위한 계획요소 연구)

  • Jung, Hui;Yang, Byoung-E.
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.36 no.5
    • /
    • pp.35-41
    • /
    • 2008
  • The purpose of this study is to determine those factors critical in the determining of regional trail routes. Initially, a consideration of the concept of the regional trail was conducted through literature reviews and 13 planning elements were determined from previous studies related to trail planning and trail construction studies. An additional 13 items were taken from literature research related to nature experiences or were sourced by interviewing experts. To verify these planning elements, a survey of experts was conducted. Individual elements were assessed concerning their degree of importance. As a result of this survey, it was found that the protection of ecologically sensitive areas and the use of existing trail routes are important route planning factors. These planning factors can be used for making decisions regarding regional trail route directions and situations.

Design of Intrusion Detection and Audit Trail System using Network Events (전산망 사건을 이용한 침입 감지 및 감사 추적 시스템 설계)

  • Kim, Ki-Jung;Yun, Sang-Hun;Lee, Yong-Jun;Ryu, Keun-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2342-2353
    • /
    • 1997
  • According to the outstanding development of information industry, a study of firewall is progressing as one of methods to cope with threat and loss of the data through computer network. For the secure network, this paper proposes the method diminishing threat and loss of the network using the correlation firewall with network audit trail system. Also, this paper suggests not only the audit analyzer execution model but also the type of databases used in audit analyzer to analyze the audit data. Network audit trail system has the function of identifing and analyzing of all intruder actions using audit records created by users.

  • PDF

Optimal Landing Location and Skid Trail Network Selection in Timber Harvesting Area (목재수확작업지의 적정 집재장 선정 및 작업로 배치)

  • Ji, Byoung-Yun;Oh, Jae-Heun;Park, Sang-Jun;Hwang, Jin-Sung;Cha, Du-Song
    • Journal of Forest and Environmental Science
    • /
    • v.27 no.3
    • /
    • pp.195-203
    • /
    • 2011
  • Forest in the our country is in the age that needs positive operation in order to foster economical forest. Multiple operations for making valuable forest should be conducted steadily and timely from afforestation to harvesting. In order to execute these kinds of forest operations, the construction of skid trail network that can be effectively used as a pathway for forestry machine and working space is necessary. To investigate facility effect of skid trail network, we executed the location of skid trail network through centroid method by GIS for 50ha of harvesting workplace in mechanized model forest located in Hongcheon, Gangwon Province. As a result of this research, skid trail density in this area changed from 79m/ha with current method to 42m/ha with improved method. It appeared that skid trail density with improved method is nearly half of current method even though the cutting area is the same as the current cutting area. Also, skidding distance changed from 117m with current method to 57m with improved method. It appears that skidding distance with improved method is nearly half of current method even though cutting area was enlarged in adjacent tending cutting area.

A Study on Networks of Stakeholders to Manage Korean Major Forest Trails (국내 주요 숲길의 운영·관리에 대한 이해관계자 네트워크 특성 연구)

  • Kim, Jae-Hyun;Chang, Chu-Youn;Kim, Jae-Jun
    • Journal of Korean Society of Forest Science
    • /
    • v.104 no.3
    • /
    • pp.454-465
    • /
    • 2015
  • This research analyzed characteristics of networks among stakeholders related to forest trail management. Results of analysis showed that Jiri way and Uljin trail had council-led network. As both trails were supported by government, the government had much power to make decisions and manage trail. But parts that mediated differences of interests among various stakeholders were insufficient. To manage forest trails effectively, it is necessary that hub organization which can have networks and make decision considering different interests have to develop and it have to authorize hub organization to take a right role for management of forest trails.

Secure QoS Billing System Using Audit Trail Subsystem Design & Implementation (감사 추적 시스템 설계 및 구현을 통한 안전한 QoS 빌링 시스템)

  • Park, U-Chul;Kim, Jeong-Nyeo;Lee, Byeong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.597-606
    • /
    • 2001
  • In this paper, we propose the delay sensitive traffic and a high bandwidth QoS service in order to supply real-time traffic such as VoIP, multimedia service. We use IntServ over DiffServ network to supply end-to-end QoS service in the IETF. We define the proposed QoS services which are Best, Good, Default service. We analyze the performance using NS simulator with end to end QoS service in IntServ over DiffServ network. The proposed billing system uses the Accounting, Authentication, Authorization (AAA) functions of RADIUS protocol and proposes the dynamic pricing method according to network usage state using end-to-end QoS of IntServ over DiffServ network. In order to secure billing system, we design and implement audit trail system by the IEEE POSIX.1E standard.

  • PDF

Practical Security Evaluation against Differential and Linear Cryptanalyses for the Lai-Massey Scheme with an SPS F-function

  • Fu, Lishi;Jin, Chenhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3624-3637
    • /
    • 2014
  • At SAC 2004, Junod and Vaudenay designed the FOX family based on the Lai-Massey scheme. They noted that it was impossible to find any useful differential characteristic or linear trail after 8 rounds of FOX64 or FOX128. In this paper, we provide the lower bound of differentially active S-boxes in consecutive rounds of the Lai-Massey scheme that has SPS as its F-function, and we propose the necessary conditions for the reachability of the lower bound. We demonstrate that similar results can be obtained with respect to the lower bound of linearly active S-boxes by proving the duality in the Lai-Massey scheme. Finally, we apply these results to FOX64 and FOX128 and prove that it is impossible to find any useful differential characteristics or linear trail after 6 rounds of FOX64. We provide a more precise security bound for FOX128.

The Adoption of a Greenway System for Enhancing the of Open Space in Urban Areas : The Case of City of Taegu (도시자연녹지(都市自然綠地)의 이용실태(利用實態)와 효율적(效率的) 활용방안(活用方案)을 위한 Greenway 시스템 도입(導入)에 관한 연구(硏究) : 대구광역시(大邱廣域市)를 중심(中心)으로)

  • Lee, Ju-Hee;Han, Sang-Yoel;Kim, Bum-Su;Suh, Eung-Chul
    • Journal of Korean Society of Forest Science
    • /
    • v.89 no.5
    • /
    • pp.576-584
    • /
    • 2000
  • The term 'greenways' is a fairly new one. The term greenways refer to linear corridors which set aside pieces of nature. The objective of this study was to find out the feasibility of developing greenways in Taegu. Sample of 446 trail users were asked to describe their use patterns and as well as their perceptions of the benefits and problems associated with trails through on-site interviews conducted during the months of July and August of 1999. Trail users in Taegu were predominately male(61%) and over half of the respondents used private vehicle to access to the study areas as compared to 2% of respondents used bicycle. Trail users responded that health & fitness and open space preservation were the two most important benefits, and the provision of trail access to disabled persons was ranked last. As problems at study areas, lack of interpretive information was the biggest problem followed by lack of drinking water, poor trail marking/signs and not enough information. Most(94.1%) of the trail users surveyed indicated that they would support greenways development and 96.8% of respondent would use after greenways development. Willingness to pay for developing greenways was assessed with hypothetical scenario. Average willingness to pay in the survey was 10,200 won as a tax. The development/application of greenways in Taegu would work best when establish a network of trails with environmentally sensitive manner.

  • PDF

Design of ESN(Educational Sensor Network) for interpretation of the data

  • Park, In-Deok;Paek, Seung-Eun;Kim, Si-Kyung
    • The Journal of Information Technology
    • /
    • v.12 no.3
    • /
    • pp.1-6
    • /
    • 2009
  • This paper has focused on the development of an educational sensor network (ESN) based on wireless sensor networks(WSN) and pervasive monitoring systems for students' activity during scientific experiments. A number of WSN systems have been proposed with integrated wireless transmission, mounted sensor boards and local processing. However, there is no trail to employ WSN on the educational field. In this paper, to facilitate research and development using wireless sensor network and multi-sensor data fusion, the educational sensor network (ESN) hardware development platform is presented. The ESN project is conducted over one semester time period (Spring Semesters). It involves approximately twenty middle school students who enrolled a gifted program in Kongju National University. Though under prepared, these students are in general highly motivated to learning specially when presented with the ESN project. An ESN project such as this is expected to provide an excellent means for teaching and learning scientific and mathematical principles.

  • PDF

Implementation of Audit Trail Service System for EDI Security (EDI 보안 감사 추적 서비스 시스템 구현)

  • Jeong, Gyeong-Ja;Kim, Gi-Jung;Seo, Gyeong-Ran;Ryu, Geun-Ho;Gang, Chang-Gu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.3
    • /
    • pp.754-766
    • /
    • 1997
  • In this paper,we implement the Audit Trail Service Sydtem for the EDI Security.It has solved a law dispute between enterprises by informations that have generated by the EDI serice systrm.The audit trail service sys-tem implemented for EDI security satisfied the requirements of audit and the protocol of the security serive of X.435 and X.400.The EDI Security Audit System consists of the event discrimiator,the audit recirder,the audit archiver,and the provider of audit services .The event discriminator classified the reansmitted data from the EDI network ot audit sercices.The audit recorder constructs an index that has combined time information wiht audit unformations which are classified by the event discriminator.ZThe audit archiver performas the vacumming of added audit imformations by passing time by passing time.The audit provider is a module that carries out the audit trail servies by using stored audit informations. The audit provider suports audit servies,which are non-requdiation,proof and probe,controller of security,and accesing infrimation.The audit trail service system for EDI security constructs audit information by using index that is combining time imfromation,so it supports especially fast accesing audit information.

  • PDF

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF