• Title/Summary/Keyword: existing network

Search Result 5,670, Processing Time 0.047 seconds

A Study on Labor Market Precariousness of the Working High School Graduate Youths (고졸 청년 노동자의 노동시장 불안정 연구)

  • Nahm, Jae wook;Kim, Young min;Han, Ki myung
    • Korean Journal of Social Welfare Studies
    • /
    • v.49 no.1
    • /
    • pp.221-262
    • /
    • 2018
  • This study aims to explore life experiences associated with poverty and discrimination in processes of growth, career exploration, entry into the labor market, and career accumulation of the working high school graduate youths. With this exploration, we also intent to grasp their difficulties and needs, thus look for policy tasks for them. The analysis is based on qualitative case study. The results are following. Typical working high school graduate youths choose not to go on to university under the influence of unfavorable economic situation of the original families. They enter the labor market without enough career exploration and try to continue working mainly in low-income and unskilled jobs. They usually work long hours to increase incomes, thus, do not have enough time to invest on their own human resources. They locate in a vicious circle of income poverty, time poverty, and skill poverty, but rarely protected by existing employment and income support programs. It is necessary to improve or introduces policy packages including labor market transition support for the high school graduate, education, training, and career exploration support, income support for the working poor, social network support, and support for reducing the dead zone of social insurances.

ROUTE/DASH-SRD based Point Cloud Content Region Division Transfer and Density Scalability Supporting Method (포인트 클라우드 콘텐츠의 밀도 스케일러빌리티를 지원하는 ROUTE/DASH-SRD 기반 영역 분할 전송 방법)

  • Kim, Doohwan;Park, Seonghwan;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.849-858
    • /
    • 2019
  • Recent developments in computer graphics technology and image processing technology have increased interest in point cloud technology for inputting real space and object information as three-dimensional data. In particular, point cloud technology can accurately provide spatial information, and has attracted a great deal of interest in the field of autonomous vehicles and AR (Augmented Reality)/VR (Virtual Reality). However, in order to provide users with 3D point cloud contents that require more data than conventional 2D images, various technology developments are required. In order to solve these problems, an international standardization organization, MPEG(Moving Picture Experts Group), is in the process of discussing efficient compression and transmission schemes. In this paper, we provide a region division transfer method of 3D point cloud content through extension of existing MPEG-DASH (Dynamic Adaptive Streaming over HTTP)-SRD (Spatial Relationship Description) technology, quality parameters are further defined in the signaling message so that the quality parameters can be selectively determined according to the user's request. We also design a verification platform for ROUTE (Real Time Object Delivery Over Unidirectional Transport)/DASH based heterogeneous network environment and use the results to validate the proposed technology.

Lightweight Validation Mechanism for IoT Sensing Data Based on Obfuscation and Variance Analysis (난독화와 변화량 분석을 통한 IoT 센싱 데이터의 경량 유효성 검증 기법)

  • Yun, Junhyeok;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.9
    • /
    • pp.217-224
    • /
    • 2019
  • Recently, sensor networks are built and used on many kinds of fields such as home, traffic, medical treatment and power grid. Sensing data manipulation on these fields could be a serious threat on property and safety. Thus, a proper way to block sensing data manipulation is necessary. In this paper, we propose IoT(Internet of Things) sensing data validation mechanism based on data obfuscation and variance analysis to remove manipulated sensing data effectively. IoT sensor device modulates sensing data with obfuscation function and sends it to a user. The user demodulates received data to use it. Fake data which are not modulated with proper obfuscation function show different variance aspect with valid data. Our proposed mechanism thus can detect fake data by analyzing data variance. Finally, we measured data validation time for performance analysis. As a result, block rate for false data was improved by up to 1.45 times compared with the existing technique and false alarm rate was 0.1~2.0%. In addition, the validation time on the low-power, low-performance IoT sensor device was measured. Compared to the RSA encryption method, which increased to 2.5969 seconds according to the increase of the data amount, the proposed method showed high validation efficiency as 0.0003 seconds.

Management Automation Technique for Maintaining Performance of Machine Learning-Based Power Grid Condition Prediction Model (기계학습 기반 전력망 상태예측 모델 성능 유지관리 자동화 기법)

  • Lee, Haesung;Lee, Byunsung;Moon, Sangun;Kim, Junhyuk;Lee, Heysun
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.6 no.4
    • /
    • pp.413-418
    • /
    • 2020
  • It is necessary to manage the prediction accuracy of the machine learning model to prevent the decrease in the performance of the grid network condition prediction model due to overfitting of the initial training data and to continuously utilize the prediction model in the field by maintaining the prediction accuracy. In this paper, we propose an automation technique for maintaining the performance of the model, which increases the accuracy and reliability of the prediction model by considering the characteristics of the power grid state data that constantly changes due to various factors, and enables quality maintenance at a level applicable to the field. The proposed technique modeled a series of tasks for maintaining the performance of the power grid condition prediction model through the application of the workflow management technology in the form of a workflow, and then automated it to make the work more efficient. In addition, the reliability of the performance result is secured by evaluating the performance of the prediction model taking into account both the degree of change in the statistical characteristics of the data and the level of generalization of the prediction, which has not been attempted in the existing technology. Through this, the accuracy of the prediction model is maintained at a certain level, and further new development of predictive models with excellent performance is possible. As a result, the proposed technique not only solves the problem of performance degradation of the predictive model, but also improves the field utilization of the condition prediction model in a complex power grid system.

Token-Based IoT Access Control Using Distributed Ledger (분산 원장을 이용한 토큰 기반 사물 인터넷 접근 제어 기술)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.377-391
    • /
    • 2019
  • Recently, system studies using tokens and block chains for authentication, access control, etc in IoT environment have been going on at home and abroad. However, existing token-based systems are not suitable for IoT environments in terms of security, reliability, and scalability because they have centralized characteristics. In addition, the system using the block chain has to overload the IoT device because it has to repeatedly perform the calculation of the hash et to hold the block chain and store all the blocks. In this paper, we intend to manage the access rights through tokens for proper access control in the IoT. In addition, we apply the Tangle to configure the P2P distributed ledger network environment to solve the problem of the centralized structure and to manage the token. The authentication process and the access right grant process are performed to issue a token and share a transaction for issuing the token so that all the nodes can verify the validity of the token. And we intent to reduce the access control process by reducing the repeated authentication process and the access authorization process by reusing the already issued token.

An Origin-Centric Communication Scheme to Support Sink Mobility for Continuous Object Detection in IWSNs (산업용 무선 센서망을 이용한 연속개체 탐지에서 이동 싱크 지원을 위한 발원점 중심의 통신방안)

  • Kim, Myung-Eun;Kim, Cheonyong;Yim, Yongbin;Kim, Sang-Ha;Son, Young-Sung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.12
    • /
    • pp.301-312
    • /
    • 2018
  • In industrial wireless sensor networks, the continuous object detection such as fire or toxic gas detection is one of major applications. A continuous object occurs at a specific point and then diffuses over a wide area. Therefore, many studies have focused on accurately detecting a continuous object and delivering data to a static sink with an energy-efficient way. Recently, some applications such as fire suppression require mobile sinks to provide real-time response. However, the sink mobility support in continuous object detection brings challenging issues. The existing approaches supporting sink mobility are designed for individual object detection, so they establish one-to-one communication between a source and a mobile sink for location update. But these approaches are not appropriate for a continuous object detection since a mobile sink should establish one-to-many communication with all sources. The one-to-many communication increases energy consumption and thus shortens the network lifetime. In this paper, we propose the origin-centric communication scheme to support sink mobility in a continuous object detection. Simulation results verify that the proposed scheme surpasses all the other work in terms of energy consumption.

Cybersecurity Architecture for Reliable Smart Factory (신뢰성 있는 스마트팩토리를 위한 사이버보안 아키텍처)

  • Kim, HyunJin;Kim, SungJin;Kim, Yesol;Kim, Sinkyu;Shon, TaeShik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.629-643
    • /
    • 2019
  • In the era of the 4th industrial revolution, countries around the world are conducting projects to rapidly expand smart factory to secure competitiveness in manufacturing industries. However, unlike existing factories where the network environment was closed, smart factories can be vulnerable because internal and external objects are interconnected and various ICT technologies are used. And smart factories are likely to be the subject of cyber-attacks that are designed to cause monetary damage to certain targets because economic damage is so serious when an accident occurs. Therefore, it is necessary to study and apply security for smart factories, but there is no specific smart factory system architecture, so there is no establish for smart factory security requirements. In order to solve these problems, this paper derives the smart factory architecture that can extract and reflect the main characteristics of a smart factory based on the domestic and foreign reference model of smart factories. And this paper identifies the security threats based on the derived smart factory architecture and present the security requirements to cope with them for contributing to the improvement of the security of the smart factory.

A Study on the Reconstruction of Self-Life of the Recovering Substance Addicts -Qualitative Case Study Approach- (마약중독에서 탈출한 회복자들의 자기 삶 재건에 대한 연구 -질적 사례연구접근-)

  • Kang, Sun Kyung;Moon, Jin Young;Yang, Dong Hyun
    • 재활복지
    • /
    • v.20 no.1
    • /
    • pp.87-111
    • /
    • 2016
  • This study is a qualitative case study of 5 substance abusers recovered from drug addiction. It is useful socially and practically to understand about the rehabilitation and its process of recovering from drug addiction. Since this study deals with very private and sensitive issues, qualitative research approach is suitable. Data were collected through one to one in-depth interviews, and were analyzed by using analysis within/cross cases suggested by Creswell(2007). 5 individual cases were presented including substance addicts experiences and recovery process through within-cases analysis. Based on the within-cases analysis, common themes were presented through cross-cases analysis. Total 19 themes, related with recovery from substance addicts, were derived from the five individual cases, and 4 common themes were classified. These 4 common themes were first, recovery of sense of reality, second, taking self-existing pattern, third, self reconstruction in the context of social network, fourth, self-love. Based on the study results and discussions, practical implications were suggested to help persons claiming recovery from substance addicts for their recovery and rehabilitation.

A Study on the Cultural Function of Space and Place: Its Focus on Travel Program (공간과 장소의 문화적 기능: 여행 프로그램 <어서와 한국은 처음이지?>를 중심으로)

  • Hahm, Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.3
    • /
    • pp.168-175
    • /
    • 2019
  • The purpose of this paper is to examine the characteristics of organic relations according to the characteristics of space and place in which human activities are spreading. The diffusion of various human experiences and the interaction of space and place that form a mutual construction network create momentum for expanding individual or collective experiences. The space and place that lead to the interactions of human activities are expressed in various ways. Through the domestic travel program especially, the ways of expressing space and place are spreading as various "fields of experience." The composition and the expression system of a travel program is transformed into a subject of thought, not a mere experience of space and place through the formation of a "field of experience" that can be thought out and thought of as an existing travel style. Therefore, in this study, we examine the characteristics of the MBC Plus channel from a socio-cultural perspective, expressed through the experience of space and place characteristics expressed through a travel program. The result of an analysis of story development composition for this study shows that the experience of space and place minimizes the boundaries of various cultural discounts according to their relationships to food and communication. In addition, the analysis results of a three-way communication structure show that the emotional code of the audience is maximized through the process of maximizing the effect of reality, and minimizing the gap between the cultural differences and the boundaries through the empathic situation and the empathic subject.

Vulnerable Analysis of Emergency Medical Facilities based on Accessibility to Emergency Room and 119 Emergency Center (응급실과 119 안전센터의 접근성을 고려한 응급의료 취약지 분석)

  • Jeon, Jeongbae;Park, Meejeong;Jang, Dodam;Lim, Changsu;Kim, Eunja
    • Journal of Korean Society of Rural Planning
    • /
    • v.24 no.4
    • /
    • pp.147-155
    • /
    • 2018
  • The purpose of this study was to identify vulnerable area of emergency medical care. In the existing method, the emergency medical vulnerable area is set as an area that can not reach the emergency room within 30 minutes. In this study, we set up an area that can not reach within 30 minutes including the accessibility of 119 emergency center. To accomplish this, we obtained information on emergency room and 119 emergency center through Open API and constructed road network using digital map to perform accessibility analysis. As a result, 509 emergency room are located nationwide, 78.0% of them are concentrated in the region, 1,820 emergency center are located, and 61.0% of them are located in rural areas. The average access time from the center of the village to the emergency room was analyzed as 15.3 minutes, and the average access time considering the 119 emergency center was 21.8 minutes, 6.5 minutes more. As a result of considering the accessibility of 119 emergency center, vulnerable areas increased by 2.5 times, vulnerable population increased by 2.0 times, and calculating emergency medical care vulnerable areas, which account for more than 30% of the urban unit population, it was analyzed that it increased from 17 to 34 cities As a further study, it will be necessary to continuously monitor and research the real-time traffic information, medical personnel, medical field, and ambulance information to reflect the reality and to diagnose emergency medical care in the future.