• Title/Summary/Keyword: maritime communications

Search Result 316, Processing Time 0.019 seconds

Comparative Study of the Effects of the Intermodal Freight Transport Policies (인터모달 추진 정책과 효과에 관한 비교연구)

  • Woo, Jung-Wouk
    • Journal of Distribution Science
    • /
    • v.13 no.10
    • /
    • pp.123-133
    • /
    • 2015
  • Purpose - The Korean government has devised intermodal transportation policies and granted subsidies to shippers and logistics companies that made a conversion of transportation means through the policies. This provides support by expanding the complex uniform railroad transportation and overhauling the deteriorated railroad facilities. As for 2013, however, the freight transportation percentage of railroad was 4.5% in tons and 8.5% in ton kilometers. Meanwhile, since the 1990s, developed countries such as the U.S. and Europe have been trying to expand intermodal freight transport with a legal and institutional support to build a logistics system corresponding with social and economic environmental changes. In this study, I set out to examine the effects of the intermodal freight transport policies in the EU and the U.S., and to explore the direction of setting up a rail intermodal transport system in South Korea. Research design, data, and methodology - The paper used a qualitative research methodology through the literature review. First, was an overview of Intermodal transportation in the EU, U.S. and UN. Second, it describes the development of transport in Europe and the U.S. with particular emphasis on intermodal freight transport. Third, it explores the direction of setting up a intermodal freight transport in South Korea. The last section contains concluding remarks. Results - As for the EU, it has been promoting integration between transport and intermodal logistics network designs while utilizing ITS or ICT and supports for rail freight intermodal by giving reduction to a facilities fee or subsidizing for rail freight in order to minimize the cost of external due to freight transport. On the other hand, as for the U.S., it has been made up of an industrial-led operating project and has been promoting it to improve accessibility between intermodal hubs and cargo terminals through intermodal corridor program, and an intermodal cargo hub access corridor projects, etc. Moreover, it has tried to construct intermodal transport system using ITS or ICT and to remove Barrier. As a result, in these countries, the proportion of intermodal freight transport is going to be the second significant transport compared with rail and maritime transport. An Effective rail intermodal transport system is needed in South Korea, as seen in the case of these countries. In order to achieve this object, the following points are required to establish radical infrastructure policy; diversify investment financing measures taken under public-private partnerships, legal responsibilities, improvement of utilization of existing facilities to connect the railway terminal and truck terminal, and enhancement service competitiveness through providing cargo tracking and security information that combines the ITS and ICT. Conclusions - This study will be used as a basis for policy and support for intermodal freight transport in South Korea. In the future, it is also necessary to examine from the perspective of the shipper companies using the rail intermodal transport, ie, recognition of shipper, needed institutional supports, and transportation demand forecasting and cost-effective analysis of the railway infrastructure systems improvement.

Improvement Scheme of Lease Rate Assessment System for Terminal Operating Company's Wharf (부두운영회사(TOC)제 부두 임대료 체계 개선방안)

  • Kil, Kwang-soo;Kim, Eun-soo
    • Journal of Korea Port Economic Association
    • /
    • v.32 no.4
    • /
    • pp.127-147
    • /
    • 2016
  • This study proposes the improvement scheme of the current lease rate assessment system (2003~2014), as a major problem solving area, for the Terminal Operating Company (TOC)'s wharf since the introduction of the TOC system in 1997. The study considers the reform system using three criteria: standardization, simplification, and fairness. The final alternative presented by the study adopts the lease rate assessment system, which newly reflects changes of facilities' property values for aprons, combining it with the related fees of the Korean seaport dues for open storage yards, warehouses (shed), passages, buildings and lands within leased facilities. The proposal anticipates that the new system will not only minimize stakeholders' confusion, but also resolve the main problems within the current system. The study, further, introduces the adjustment ratio, which will make the new lease rate of the apron equal to the current lease rate of a berth, for the individual TOC's wharf, in order to prevent a sharp increment in the lease rate of the apron. This is because the government or port authorities as lessors, need to give priority to lightening the burden of TOC's costs under the deteriorating business environment such as the slowdown in port throughputs' growth. This study makes a contribution by suggesting a new lease rate assessment system for the TOC's wharf, reflecting the value of property as well as leading to its simplification and standardization. Additionally, it may lead to the improvement of fairness by applying the same rate to all leased wharfs for the lease rates of open storage yards, warehouses (shed) and passages. However, it has a limitation that hinders the fairness: the lease rate for the apron cannot be imposed in proportion to the leased area, by applying the individual adjustment ratios. In the future, those adjustment ratios should be, gradually, rationalized to be the same target ratio (0.5) for each wharf, following an improvement in the terminal operating business environment.

A Congestion Control Scheme for transmittiing Connectionless Data Traffic in ATM Network (ATM망에서 비연결형 데이터 트래픽 전달을 위한 폭주 제어 방안)

  • Park, Chun-Kwan;Jeon, Byung-Chun;Kim, Young-Sun
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.10
    • /
    • pp.42-51
    • /
    • 1998
  • This paper suggests a congestion control scheme for CL (ConnectionLess) overlay network using the feedback loops between CL user and CL server, between CL servers, and between end-to-end CL users, and the header translation table of CL server. The CL overlay network for CBDS(Connectionless Broadhand Data Service) defined by ITU-T((International Telecommunication Union-Telecommunication) consists of CL servers which route frames and links which connect between CL user and CL server or between CL servers. In the CL overlay network, two kinds of congestion, CL link congestion and CL server congestion, may occur. We considered the schemes to solve the congestion. link-by-link method[18] has used the ABR feedback loops of ATM layer between CL user and CL server or between CL servers, and the congestion table using header translation table of CL server. As in congestion of output virtual channel this method has an effect on all the traffic transmitting through the link, then it has an effect on the traffic that has not caused the congestion. As a result, the link utilization of output virtual channel that does not bring the congestion and outputs the traffic is decreased. To overcome this drawback of link-by-link, we proposed the hybrid method that are using the ABR feedback loops of link-by-link method, the feedback loop between CL users in end-to-end, the congestion table using and the header translation table. This scheme deals with teh congestion immediately by link-by-link loops and the header translation table, and then regulates the sending rate of CL user that causes the congestion by end-to-end loop.

  • PDF

Channel characteristics of multi-path power line using a contactless inductive coupling unit (비접촉식 유도성 결합기를 이용한 다중경로 전력선 채널 특성)

  • Kim, Hyun-Sik;Sohn, Kyung-Rak
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.9
    • /
    • pp.799-804
    • /
    • 2016
  • Broadband powerline communication (BPLC) uses distribution lines as a medium for achieving effective bidirectional data communication along with electric current flow. As the material characteristics of power lines are not good at the communication channel, the development of power line communication (PLC) systems for internet, voice, and data services requires measurement-based models of the transfer characteristics of the network suitable for performance analysis by simulation. In this paper, an analytic model describing a complex transfer function is presented to obtain the attenuation and path parameters for a multipath power line model. The calculated results demonstrated frequency-selective fading in multipath channels and signal attenuation with frequency, and were in good agreement with the experimental results. Inductive coupling units are used as couplers for coupling the signal to the power line to avoid physical connections to the distribution line. The inductance of the ferrite core, which depends on the frequency, determines the cut-off frequency of the inductive coupler. Coupling loss can be minimized by increasing the number of windings around the coupler. Coupling efficiency was improved by more than 6 dB with three windings compared to the results obtained with one winding.

An Analysis of the Concentration Ratios and the Shift Effect of Korean Container Ports (우리나라 컨테이너항만의 집중도와 변이효과 분석)

  • Kim, Eun-Soo;Lee, Su-Young
    • Journal of Korea Port Economic Association
    • /
    • v.32 no.1
    • /
    • pp.135-149
    • /
    • 2016
  • This study analyzes the concentration ratios (CR) and the shift effect in the system of Korean container ports that concern the export and import of container cargos, especially from/to 5 overseas origin/destination (O/D) regions, using the Hirshmann-Herfindahl Index (HHI) and the Shift-Share Method. The results shows that the CR has decreased during the last 20 years, from 0.86 to 0.44, mainly because cargos from/to the Far-East/South-East Asian regions have become more dispersed to several domestic container ports, especially from the Port of Busan. This study also indicates that there has been little change in the CR for all cargos, like the value of -0.3%, in the last 5 years. However the change in CRs for the cargos from/to the North America and Europe is positive, with the value of 7.6% and 6.6%, respectively. It can be inferred that the future development of medium- and small-sized container ports in Korea is not very likely. The study also suggests that the CR and the shift effect of the Korean container ports for the cargos by the domestic O/D regions should be analyzed in the future to suggest policy implications in great detail.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF