• Title/Summary/Keyword: network based system monitoring

Search Result 1,155, Processing Time 0.033 seconds

A Study of Measuring Traffic Congestion for Urban Network using Average Link Travel Time based on DTG Big Data (DTG 빅데이터 기반의 링크 평균통행시간을 이용한 도심네트워크 혼잡분석 방안 연구)

  • Han, Yohee;Kim, Youngchan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.5
    • /
    • pp.72-84
    • /
    • 2017
  • Together with the Big Data of the 4th Industrial Revolution, the traffic information system has been changed to an section detection system by the point detection system. With DTG(Digital Tachograph) data based on Global Navigation Satellite System, the properties of raw data and data according to processing step were examined. We identified the vehicle trajectory, the link travel time of individual vehicle, and the link average travel time which are generated according to the processing step. In this paper, we proposed a application method for traffic management as characteristics of processing data. We selected the historical data considering the data management status of the center and the availability at the present time. We proposed a method to generate the Travel Time Index with historical link average travel time which can be collected all the time with wide range. We propose a method to monitor the traffic congestion using the Travel Time Index, and analyze the case of intersections when the traffic operation method changed. At the same time, the current situation which makes it difficult to fully utilize DTG data are suggested as limitations.

Frequency Domain Pattern Recognition Method for Damage Detection of a Steel Bridge (강교량의 손상감지를 위한 주파수 영역 패턴인식 기법)

  • Lee, Jung Whee;Kim, Sung Kon;Chang, Sung Pil
    • Journal of Korean Society of Steel Construction
    • /
    • v.17 no.1 s.74
    • /
    • pp.1-11
    • /
    • 2005
  • A bi-level damage detection algorithm that utilizes the dynamic responses of the structure as input and neural network (NN) as pattern classifier is presented. Signal anomaly index (SAI) is proposed to express the amount of changes in the shape of frequency response functions (FRF) or strain frequency response function (SFRF). SAI is calculated using the acceleration and dynamic strain responses acquired from intact and damaged states of the structure. In a bi-level damage identification algorithm, the presence of damage is first identified from the magnitude of the SAI value, then the location of the damage is identified using the pattern recognition capability of NN. The proposed algorithm is applied to an experimental model bridge to demonstrate the feasibility of the algorithm. Numerically simulated signals are used for training the NN, and experimentally-acquired signals are used to test the NN. The results of this example application suggest that the SAI-based pattern recognition approach may be applied to the structural health monitoring system for a real bridge.

Comparison of The Importance of Evaluation Items for Landscape Performance and Sustainability Using Analytic Network Process (ANP) (ANP기법을 이용한 조경성능 및 친환경 평가항목 중요도 비교)

  • Ryu, Myeung-Ji;Lee, Hyung-Sook
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.6
    • /
    • pp.45-52
    • /
    • 2019
  • As international criteria and standards are required in the fields of design and construction, landscape performance must also be considered not only for the value of the landscape but also for providing quality assurance and sustainability. Given the lack of research on landscape performance, the present research was purposed to analyze the importance of potential assessment categories and items using an analytical network process. A list of assessment items, which is composed of 20 items and 6 categories, was derived through a literature review and a preliminary survey of 11 landscape professionals. An ANP model was established and a survey was conducted among 30 landscape practitioners to determine the weight of priorities considering the criteria. The results of ANP showed that the categories of site selection, preservation and health, and convenience had high priorities while materials had the lowest importance score. For the assessment items, a monitoring plan was the highest importance, followed by cultural/ historic preservation, management cost reduction, and natural ground areas. Despite the difficulties in quantifying landscape achievements, most respondents agreed that there needs to be an evaluation system for landscape performance in order to assure the quality and sustainability of landscape development. More research and discussion are needed to develop an assessment system for landscape performance that is applicable to Korean context.

A Network Module and a Web Server for Web-based Remote Control of Embedded Systems (웹 기반 원격 제어를 위한 내장형 시스템용 네트워크 모듈 및 웹 서버)

  • 선동국;김성조;이재호;김선자
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.3
    • /
    • pp.231-242
    • /
    • 2004
  • Remote control and monitoring of information appliances require RTOS and TCP/IP network module to communicate each other. Traditional TCP/IP protocol stacks, however, require relatively large resources to be useful in small 8 or 16-bit systems both in terms of code size and memory usage. It motivates design and implementation of micro TCP/IP that is lightweight for embedded systems. Micro embedded web server is also required to control and monitor information appliances through the Web. In this paper, we design and implement micro TCP/IP and Web server for information appliances. For this goal, we investigate requirements for the interoperability of embedded systems with the Internet and the Web-based control of embedded systems. Next, we compare our micro TCP/IP protocol stack with that of RTIP and QPlus in terms of object code size and performance. The size of micro TCP/IP protocol stack can be reduced by 3/2 and 1/4, respectively, comparing with that of RTIP and QPlus. We also show that the performance of our micro TCP/IP is similar to that of RTIP and QPlus since it handles 2.9Mbps when delayed ACK is not adapted.

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.

Web-based Measurement of ECU Signals on Vehicle using Embedded Linux

  • Choi, Kwang-Hun;Lee, Lee;Lee, Young-Choon;Kwon, Tae-Kyu;Lee, Seong-Cheol
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.138-142
    • /
    • 2004
  • In this paper, we present a new method for monitoring of ECU's sensor signals of vehicle. In order to measure the ECU's sensor signals, the interfaced circuit is designed to communicate ECU and the Embedded Linux is used to monitor communication result through Web the Embedded Linux system and this system is said "ECU Interface Part". In ECU Interface Part the interface circuit is designed to match voltage level between ECU and SA-1110 micro controller and interface circuit to communicate ECU according to the ISO, SAE communication protocol standard. Because Embedded Linux does not allow to access hardware directly in application level, anyone who wants to modify any low level hardware must develop device driver. To monitor ECU's sensor signals the most important thing is to match serial level between ECU and ECU Interface Part. It means to communicate correctly between two hardware we need to match voltage and signal level, and need to match baudrate. The voltage of SA-1110 is 0 ${\sim}$ +3.3V and ECU is 0 ${\sim}$ +12V and, ECU's communication Line K does multiple operation so, the interface circuit is used to match voltage and signal level. In Addition to ECU's baudrate is 10400bps, it's not standard baudrate in computer environment. So, we need to develop a device driver to control the interface circuit, and change baudrate. To monitor ECU's sensor signals through web there's a network socket program is working in Embedded Linux. It works as server program and manages user's connections and commands. Anyone who wants to monitor ECU's sensor signals he just only connect to Embedded Linux system with web browser then, Embedded Linux webserver will return the ActiveX webbased measurement software. It works in web browser and inits ECU, as a result it returns sensor signals through web. All the programs are developed with GCC(GNU C Compiler) and, webbased measurement software is developed with Borland C++ Builder.

  • PDF

The Analysis of the APT Prelude by Big Data Analytics (빅데이터 분석을 통한 APT공격 전조 현상 분석)

  • Choi, Chan-young;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1129-1135
    • /
    • 2016
  • The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on december in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attacks(Advanced Persistent Threat Attacks) thus far. We will use big data analytics to analyze whether or not APT attacks has occurred. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean Defense System. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attacks. Lastly, we will present an effective response method to address a detected APT attacks.

A Study on Receiver Sensitivity Measurement using Pilot $E_c/I_o$ Compensation Method at CDMA Communication Network (CDMA 기지국에서 Pilot $E_c/I_o$ 보상기법을 이용한 수신감도 측정에 관한 연구)

  • Jeong, Ki-Hyeok;Ra, Keuk-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.8
    • /
    • pp.9-16
    • /
    • 2007
  • Currently, the measurement of RF parameters for a base station in operation is typically limited to easily measured forward path items. In this paper, the forward monitoring ports of base stations are used to measure the reverse RF performance. The system has been implemented and effectiveness has been proven on an operating base station. The receiver sensitivity is measured using an internal CDMA modem which is used to monitor the output power based on closed loop power control when the modem is connected to the base station via a voice call. In order to improve accuracy, in addition to the modem Tx adjust(TxAdj) parameter, the detector's actual measurement is used. For accurate receiver sensitivity, the measurement should be made when there is no traffic which is not possible on an operating base station. Therefore, pilot channel chip energy to received signal power spectral density ratio$(E_c/I_o)$ compensation method is used to offset the receiver sensitivity degradation with voice traffic increase.

Coastal and Marine Environment Monitoring System using Flooding Routing Protocol (플러딩 라우팅 프로토콜을 이용한 연안.해양 환경모니터링 시스템)

  • Yoo, Jae-Ho;Lee, Seung-Chul;Kim, Jong-Jin;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.180-183
    • /
    • 2011
  • Recently, environmental problems have been deteriorating rapidly. Therefore, there is an urgent need to establish policies and research in the conservation of the global environment. Many researchers are studied in environment systems to prevent and reduce pollution of water, air and soil actively. In this paper, several parameters such as temperature, humidity, illumination, barometric pressure, dew point, water quality data, and air conditions are collected and transmitted thorough wireless sensor network. The field server is located in the coastal and marine area so that any abrupt changes can be detected quickly. In addition, WSN based flooding routing protocol for efficient data transmission is designed to support and monitor information of climate and marin factors.

  • PDF

The Analysis of the APT Prelude by Big Data Analytics (빅데이터 분석을 통한 APT공격 전조 현상 분석)

  • Choi, Chan-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.317-320
    • /
    • 2016
  • The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and Classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on December in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attack thus far. Therefore, we will use big data analytics to analyze whether or not APT attack has occurred in order to defend against the manipulative attackers. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean defense system. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attack and evaluate the models' accuracy and other results. Lastly, we will present an effective response method to address a detected APT attack.

  • PDF