• Title/Summary/Keyword: u-Infrastructure

Search Result 344, Processing Time 0.022 seconds

A Study on the U-learning Service Application Based on the Context Awareness (상황인지기반 U-Learning 응용서비스)

  • Lee, Kee-O;Lee, Hyun-Chang;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.81-89
    • /
    • 2008
  • This paper introduces u-learning service model based on context awareness. Also, it concentrates on agent-based WPAN technology, OSGi based middleware design, and the application mechanism such as context manager/profile manager provided by agents/server. Especially, we'll introduce the meta structure and its management algorithm, which can be updated with learning experience dynamically. So, we can provide learner with personalized profile and dynamic context for seamless learning service. The OSGi middleware is applied to our meta structure as a conceptual infrastructure.

  • PDF

Ubiquitous Operation Composition based on Task (태스크 기반의 유비쿼터스 오퍼레이션 조합)

  • Hwang, Yun-Young;Lee, Kyu-Chul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.5
    • /
    • pp.519-524
    • /
    • 2010
  • In this paper, we will introduce our approach for composing operation based on user tasks. It is based on Service Component Architecture (SCA). In addition, we developed ontology based on OWL and the MIT process handbook, called u-TO(universal task ontology), which can be used for users describing and specifying semantically their needs. We represent the hierarchy of tasks, and classify tasks according to views in u-TO. It aims at facilitating the modeling of complex demands or systems without regarding details of technical aspects of underlying infrastructure.

Plans for the Integrated Operation of Intelligent Service Facilities (지능화시설의 통합운영 방안)

  • YIM, Du-Hyun;PARK, Jeong-Woo;NAM, Kwang-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.20 no.1
    • /
    • pp.127-136
    • /
    • 2017
  • U-City laws are divided into three categories: intellectual laws, information superhighway laws, and integrated operation center laws. Previous studies have suggested that efficient infrastructure operation and management is necessary in Ubiquitous-City (U-City). However, infrastructure is often interpreted differently by different laws. The purpose of this study was to plan for the integrated operation of intelligent service facilities by comprehensively analyzing the law system of domestic intelligent service facilities and problems in operation and management based on this critical mind. For this, present conditions and problems of intelligent service facilities were found through interviews with people who are in charge of the law system and other practitioners. The necessity of integrated use, including city information generated from intelligent service facilities and installment locations, has been demonstrated. Government ministries and local governments have established various information systems using ICT and U-City laws that specify integrated management and operation, but do not clearly specify definitions for the specific responsibility and authority for main agents participating in facility operation. A system is needed to smoothly mediate the relevant divisions so that they can use installed equipment simultaneously for efficient operation in generating city information. This objective of this study was to prepare a unitary law system for efficient installment and management of intelligent service facilities by establishing a logically linked relationship among the relevant laws and regulations. This will provide a foundation for a management system that has an integrated linkage of intelligent service facilities.

A Building Method of Security Vulnerability Measurement Framework under u-Healthcare System Traffic Domain Environment Based on USN (USN기반 u-Healthcare 시스템 트래픽도메인 환경에서의 보안위험도 평가체계 설계방안)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2011
  • Smart environment of health information technology, u-Healthcare architecture, ad-hoc networking and wireless communications environment are major factors that increase vulnerability of u-healthcare information systems. Traffic domain is the concept of network route that identifies the u-Healthcare information systems area as the traffic passing and security technologies application. The criterion of division is an area requiring the application of security technology. u-Healthcare information system domains are derived from the intranet section. the public switched network infrastructure, and networking sectors. Domains of health information systems are separated by domain vulnerability reason. In this study, domain-specific security vulnerability assessment system based on the USN in u-Healthcare system is derived. The model used in this study suggests how to establish more effective measurement USN-based health information network security vulnerability which has been vague until now.

A Study on Five Levels of Security Risk Assessment Model Design for Ensuring the u-Healthcare Information System (u-헬스케어시스템의 정보보안 체계 확보를 위한 5단계 보안위험도 평가모델 설계)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.11-17
    • /
    • 2013
  • All u-Health system has security vulnerabilities. This vulnerability locally(local) or network(network) is on the potential risk. Smart environment of health information technology, Ad-hoc networking, wireless communication environments, u-health are major factor to increase the security vulnerability. u-health care information systems user terminal domain interval, interval public network infrastructure, networking section, the intranet are divided into sections. Health information systems by separating domain specific reason to assess vulnerability vulnerability countermeasure for each domain are different. u-Healthcare System 5 layers of security risk assessment system for domain-specific security vulnerability diagnosis system designed to take the security measures are needed. If you use this proposed model that has been conducted so far vaguely USN-based health information network security vulnerabilities diagnostic measures can be done more systematically provide a model.

A Benchmarking Study for Deriving Data-driven Asset Management Strategy: U.S. Federal Transit Administration (FTA) Case (데이터 기반 노후 철도시설 자산관리 전략 도출을 위한 벤치마킹 연구)

  • Baek, Seungwon;Yoo, Minkyung;Yun, Sungmin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.41 no.5
    • /
    • pp.591-599
    • /
    • 2021
  • Rail transit agencies in Korea have been struggling to set up a performance-based rail facility maintenance plan because there are no formal definition and decision criteria for aging infrastructure. This study investigates the definition of aging infrastructure through extensive literature review and identifies benchmarking criteria through comparison with rail transit facility management systems in Korea and United States. As results, an aging infrastructure should be defined considering both service age and performance level of a facility. The priority of repair/replacement should be also determined with reasonable criteria based on relationship between service age and performance level. To determine the definition and decision criteria, a practicable classification system for aging rail transit needs to be established in accordance with classification system for performance assessment. Furthermore, a comprehensive database needs to be built including useful life, performance level, and maintenance cost of each component of rail transit. It will allow establishing an efficient budget execution plan for aging infrastructure.

Research on the Relative Importance and the Priority for the Functions of the U-City Service Aid Organization (U-City 서비스 지원기관 기능의 상대적 중요도와 우선순위 연구)

  • Yi, Mi Sook;Shin, Dong Bin;Lee, Jae Yong
    • Spatial Information Research
    • /
    • v.21 no.2
    • /
    • pp.35-43
    • /
    • 2013
  • The aim of this research is to analyze the priority to functions of the U-city Service Aid Organization(USAO), which is to support invigorating U-City industry. This research analyzes the relative importance and the priority about the functional area and components of UASO based on AHP. This research also performs a sensitivity analysis. The research result shows that relative importance of functional area is like following orders: 1) distribution of U-City service-related information, 2) quality certification of U-City-related products and services, 3) R&D of U-City technology, 4) standardization of U-City, 5) U-City human resource development. The relative importance order of functional components is 1) establishment of U-City information distribution organization, 2) construction and management of U-City information distribution network, 3) supporting U-City information distribution and price policy, 4) providing U-City information list for distribution, 5) preparation and application of quality certification standard of U-City products and services, 6) research on legal system of U-City items, targets, and procedures for quality certification, 7) research, analysis, and provision of U-City information distribution situation, 8) level examination of constructed infrastructures and services in U-City, 9) U-City core technology development and localization of technology, 10) standardization of collected U-City information, service classification, distribution system. This research result can be applied directly to design functions of USAO. The result also can be used for duty management, human resource planning, or resource allocation.

A Study on the Security Management for Critical Key Infrastructure(SCADA) (중요핵심기반시설(SCADA)에 대한 보안 관리 연구)

  • Kim InJung;Chung YoonJung;Koh JaeYoung;Won Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8C
    • /
    • pp.838-848
    • /
    • 2005
  • Most of the national critical key infrastructure, such as power, piped gas and water supply facilities, or the high-speed railroad, is run on the SCADA system. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. Thus, it is time to adopt the relevant security management techniques. This paper attempts to propose such security management techniques, including information protection measures and troubleshooting, based on a risk analysis process concerning assets, threats/vulnerability, and hazards, and to examine the security management status of critical key infrastructure in the U.S. and Japan.

Characterization of the Behavior of Naturally Occurring Radioactive Elements in the Groundwater within the Chiaksan Gneiss Complex : Focusing on the Mineralogical Interpretation of Artificial Weathering Experiments (치악산 편마암 지질의 지하수 내 자연 방사성 원소의 거동 특성 연구: 인공풍화 실험을 통한 광물학적 해석)

  • Woo-Chun Lee;Sang-Woo Lee;Hyeong-Gyu Kim;Do-Hwan Jeong;Moon-Su Kim;Hyun-Koo Kim;Soon-Oh Kim
    • Korean Journal of Mineralogy and Petrology
    • /
    • v.36 no.4
    • /
    • pp.289-302
    • /
    • 2023
  • The study area was Gangnim-myeon, Hoengseong-gun, Gangwon-do, composed of the Chiaksan gneiss complex, and it was revealed that the concentrations of uranium (U) and thorium (Th) within the groundwater of the study area exceeded their water quality standards. Hence, artificial weathering experiments were conducted to elucidate mineralogically the mechanisms of their leaching using drilling cores obtained from the corresponding groundwater aquifers. First of all, the mineralogical compositions of core samples were observed, and the results indicated that the content of clinochlore, a member of the chlorite group of minerals that can form through low- and intermediate-temperature metamorphisms, was relatively higher. In addition, the Th concentration was measured ten times higher than that of U. The results of artificial weathering experiments suggested that the Th concentrations gradually increased through the dissolution of radioactive-element-bearing minerals up to the first day, and then they tended to decrease. It could be attributed to the fact that Th was leached with the dissolution of thorite, which might be a secondary mineral, and then dissolved Th was re-precipitated as the various forms of salt, such as sulfate. Even though the U content was lower than that of Th in the core samples, the U concentration was one hundred times higher than that of Th after the weathering experiments. It is likely caused by the gradual dissolution and desorption of U included in intensively weathered thorite or adsorbed as a form of UO22+ on the mineral surface. In addition, the leaching tendency of U and Th was positively correlated with the bicarbonate concentration. However, the concentrations between U and Th in groundwater exhibited a relatively lower correlation, which might result from the fact that they occurred from different sources, as aforementioned. Among various kinetic models, the parabolic diffusion and pseudo-second-order kinetic models were confirmed to best fit the dissolution kinetics of both elements. The period that would be taken for the U concentration to exceed its drinking-water standard was inferred using the regressed parameters of the best-fitted models, and the duration of 29.4 years was predicted in the neutral-pH aquifers with relatively higher concentrations of HCO3, indicating that U could be relatively quickly leached out into groundwater.

Application and Evaluation of the Attention U-Net Using UAV Imagery for Corn Cultivation Field Extraction (무인기 영상 기반 옥수수 재배필지 추출을 위한 Attention U-NET 적용 및 평가)

  • Shin, Hyoung Sub;Song, Seok Ho;Lee, Dong Ho;Park, Jong Hwa
    • Ecology and Resilient Infrastructure
    • /
    • v.8 no.4
    • /
    • pp.253-265
    • /
    • 2021
  • In this study, crop cultivation filed was extracted by using Unmanned Aerial Vehicle (UAV) imagery and deep learning models to overcome the limitations of satellite imagery and to contribute to the technological development of understanding the status of crop cultivation field. The study area was set around Chungbuk Goesan-gun Gammul-myeon Yidam-li and orthogonal images of the area were acquired by using UAV images. In addition, study data for deep learning models was collected by using Farm Map that modified by fieldwork. The Attention U-Net was used as a deep learning model to extract feature of UAV in this study. After the model learning process, the performance evaluation of the model for corn cultivation extraction was performed using non-learning data. We present the model's performance using precision, recall, and F1-score; the metrics show 0.94, 0.96, and 0.92, respectively. This study proved that the method is an effective methodology of extracting corn cultivation field, also presented the potential applicability for other crops.