• Title/Summary/Keyword: IT Infrastructure

Search Result 4,892, Processing Time 0.027 seconds

Stability Evaluation of Anchors Using Lift-off Field Test (리프트오프 현장시험을 이용한 앵커의 안정성 평가)

  • Choi, Tae Sic;Yun, Jung Mann;Kim, Yong Seong;You, Seung Kyong;Lee, Kang Il
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.128-142
    • /
    • 2021
  • Purpose: This study examines the safety management of anchors that have already been constructed and evaluates the results of lift-off tests conducted at the site. The purpose of the project is to study countermeasures if necessary. Method: Compare the residual load gained after the lift-off test at 36 points behind the site with the preemptive load, allowable load, and design load. We also analyze stability through this and evaluate the stability of anchors. Results and Conclusion: The residual tension at 26 points remained stable. However, the residual load at 10 points was analyzed to be greater than the designed load and less than the allowable load, and it was evaluated as an instability that could cause fracture problems. Therefore, anchors with unstable conditions at 10 points should be monitored and monitored through periodic measurements and quality tests, and the anchor should be observed at the surrounding points as well as the relevant points to maintain stability.

Technology and Policy for Blockchain-based Spectrum Sharing (블록체인 기반의 전파 공유 기술과 전파 정책)

  • Shin, Na Yeon;Nam, Ji-Hyun;Choi, Ye Jin;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.13-21
    • /
    • 2019
  • The restricted network or the unbalanced distribution of spectrum is causing the problems of lack of spectrum resources and deterioration of the service quality. In addition, the existing centralized radio sharing method has not been a fundamental solution for radio sharing and is inefficient in terms of cost, convenience, and security. In this paper, we propose a blockchain-based spectrum sharing as a low-cost, trustworthy, high-efficiency platform that can distribute and share spectrum resources, and propose policies to realize this. In the spectrum sharing platform, spectrum information about Wi-Fi AP and LTE mobile hotspot is registered in the blockchain, and spectrum sharers and users can conclude peer-to-peer spectrum sharing contract quickly and efficiently through smart contract. The pay for the shared spectrum resources and reward for spectrum quality management open platform ecosystem to activate the circulation-sharing and it can provide a convenient and efficient public wireless infrastructure.

An Experimental Study on Construction Efficiency of High-Frequency Arc Metal Spray Machine (고주파 아크 금속용사 장치의 시공성능 평가에 관한 실험적 연구)

  • Jang, Jong-Min;Lee, Han-Seung
    • Journal of the Korea Institute of Building Construction
    • /
    • v.20 no.6
    • /
    • pp.481-488
    • /
    • 2020
  • The arc thermal metal spraying method (ATMSM) has been used in Korea to improve the electromagnetic pulse (EMP) shielding effect of building and infrastructure by three machines of MS, KMS and HMS (Metal Spray, Korea Metal Spray, High-frequency Meta Spray). The adhesion ability of sprayed metal was found to be 58.32, 64.66 and 87.62% for MS, KMS and HMS, respectively. The metal sprayed area per hour of MS, KMS and HMS was calculated and found to be 14.3, 19.25 and 22.16㎡/h, respectively. The HMS showed the highest metal spray area attributed to the diameter of metal wire i.e. 1.6mm which sprayed 80 mm with 18 m/min. There was minimum loss of metal and the highest efficiency by HMS compared to others. Therefore, it is suggested to use HMS for metal spraying by ATMSM to enhance the EMP shielding effect.

Platform design and source coding of AI responsive AR business cards (AI 반응 AR명함의 Platform 설계 및 Source Coding)

  • Choi, Su-Youn;Han, Su-Yeon;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.4
    • /
    • pp.489-493
    • /
    • 2020
  • The technological development of the Fourth Industrial Revolution is accelerating the development of the world and society. Fourth industrial technology is connected to Cyber World to develop national and social infrastructure. The application of the fourth industrial technology can create Cyber-city and Cyber-life systems. In the ICT business industry that connects Cyber with the real world, we need to connect Cyber with real-life work. It is to use AR business cards as one of the ways to connect Cyber business with real business. When an AR business card is recognized as a smartphone, a 3D character appears to introduce the main character of the business card. In addition, AR business cards are reflected in AR for product and service of business operators, enabling promotion of products, services, etc. Using connected wired and wireless 5G communication, real-time e-commerce is also possible. In this paper, AR business card will be produced with Source Coding and AR business card platform will be designed.

Development of A Model for Diagnosing Management Capabilities of Public Facility (공공시설물관리 역량 진단 모델 개발)

  • Sung, Yookyung;Yoo, Wi Sung
    • Journal of the Korea Institute of Building Construction
    • /
    • v.20 no.6
    • /
    • pp.555-566
    • /
    • 2020
  • Recently, the aging of public facilities in Korea have accelerated, and the existing framework for facility management is shifting toward to facility asset management in terms of performance-based proactive control. Therefore, the operation of public facility involves both safety assurance from the deteriorated facilities and management capabilities for sustainable maintenance in the required valuation and level of service, such as valuation of facility assets, life-cycle management plans, financing, and so on. In this study, the Facility Asset Management Indicator(FAMI) has been developed for public facility asset management, and it provides the quantitative management grade, based on international standards, such as ISO 55000 series and International Infrastructure Management Manual(IIMM). The FMMI includes 10 key areas to apply a diagnosis model into management capabilities, 113 detailed elements, and 5 maturity grades. As the importance of public facility asset management is increasing constantly, this is expected to identify previously the strengths and weaknesses of public facility operating institutions. Eventually, they can obtain the effective ways to improve their own capabilities, minimize the public funds, establish the strategies for innovating the current management structures, and operate stably the facilities in the required performance.

Factors Affecting FDI Intentions of Investors: Empirical Evidence from Provincial-Level Data in Vietnam

  • TA, Van Loi;DO, Anh Duc;PHAN, To Uyen;NGUYEN, Quang Huy;NGUYEN, Thi Thuy Hong;LE, Thuy Duong;NGUYEN, Thanh Phong
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.4
    • /
    • pp.125-134
    • /
    • 2021
  • This study aimed to explore the factors affecting the foreign direct investment (FDI) intentions of investors into Quang Ninh province, located in the north-eastern of Viet Nam. Researchers used two main methods, namely, Exploratory Factors Analysis (EFA) and the Structural Equation Model (SEM) based on partial least squares structural equation modeling (PLS SEM) to explore and measure the impact of factors affecting the investors' FDI intentions into Quang Ninh province. The empirical analysis used data from the survey of 206 domestic and foreign investors into Quang Ninh province, including representatives of the Board of Directors, members, and management representatives at the department level, with reliable tools (SPSS 26 and SmartPLS 3.0 software). The research results identified the following factors affecting investment into Quang Ninh: FDI attraction policies have the strongest impact on the investors' FDI intentions; it is followed by infrastructure, public services and human capital with strong effects on intentions of investors' FDI; and finally the standards of living that affects the investors' FDI intentions. There is also a positive relationship between all the factors and the investors' FDI intentions. Several recommendations are further suggested to enhance attraction of foreign direct investment into Quang Ninh province.

Design of a Secure and Fast Handoff Method for Mobile If with AAA Infrastructure (AAA 기반 Mobile IP 환경에서 안전하고 빠른 핸드오프 기법 설계)

  • 김현곤
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.79-89
    • /
    • 2004
  • Mobile IP Low Latency Handoffs allow greater support for real-time services on a Mobile W network by minimizing the period of time when a mobile node is unable to send or receive IP packets due to the delay in the Mobile IP Registration process. However, on Mobile IP network with AAA servers that are capable of performing Authentication, Authorization, and Accounting(AAA) services, every Registration has to be traversed to the home network to achieve new session keys, that are distributed by home AAA server, for a new Mobile IP session. This communication delay is the time taken to re-authenticate the mobile node and to traverse between foreign and home network even if the mobile node has been previously authorized to old foreign agent. In order to reduce these extra time overheads, we present a method that performs Low Latency Handoffs without requiring funker involvement by home AAA server. The method re-uses the previously assigned session keys. To provide confidentiality and integrity of session keys in the phase of key exchange between agents, it uses a key sharing method by gateway foreign agent that Performs a ousted thirty party. The Proposed method allows the mobile node to perform Low Latency Handoffs with fast as well as secure operation

Practical Secure E-mail Protocols Providing Perfect Forward Secrecy (완전한 전방향 안전성을 제공하는 실용적인 전자우편 프로토콜)

  • Lee, Chang-Yong;Kim, Dae-Young;Shim, Dong-Ho;Kim, Sang-Jin;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.27-38
    • /
    • 2007
  • One of the most important security issues of e-mail service is user privacy. Currently, various security protocols, like PGP(pretty Good Privacy), S/MIME(Secure/Multipurpose Internet Mail Extension), have been proposed. These protocols, however, do not provide forward secrecy. Recently, some security protocols that provide forward secrecy were proposed. But all of them require changes to the current e-mail infrastructure. Moreover, contrary to authors' intention, some of them do not actually provide perfect forward secrecy. In this paper, we propose a new practical e-mail security protocol. The proposed protocol provides perfect forward secrecy and uses a practical e-mail model that dose not require any changes to existing e-mail servers. It encrypts and authenticates messages efficiently using elliptic curve based signcryption scheme. In addition, we provide a way to send secure group e-mails.

A Design of Traceable and Privacy-Preserving Authentication in Vehicular Networks (VANET 환경에서 프라이버시를 보호하면서 사고 발생 시 추적 가능한 인증 프로토콜)

  • Kim, Sung-Hoon;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.115-124
    • /
    • 2008
  • In vehicular networks, vehicles should be able to authenticate each other to securely communicate with network-based infrastructure, and their locations and identifiers should not be exposed from the communication messages. however, when an accident occurs, the investigating authorities have to trace down its origin. As vehicles communicate not only with RSUs(Road Side Units) but also with other vehicles, it is important to minimize the number of communication flows among the vehicles while the communication satisfies the several security properties such as anonymity, authenticity, and traceability. In our paper, when the mutual authentication protocol is working between vehicles and RSUs, the protocol offers the traceability with privacy protection using pseudonym and MAC (Message Authentication Code) chain. And also by using MAC-chain as one-time pseudonyms, our protocol does not need a separate way to manage pseudonyms.

A Study on Security Architecture for Digital Content Dissemination (디지탈 컨텐츠 배포를 위한 보안 체계에 관한 연구)

  • 김대엽;주학수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.147-155
    • /
    • 2003
  • The diffusion of internet infrastructure and a fast increase of Population to use it is becoming a base of the service that can use various information, data and digital contents which were provided through off-line physically and used. Recently, the. techniques for copy deterrence and copyright protection have been important in e-commerce because various contents in digital form can be duplicated easily. The Access Control(AC) technique that only a user having the qualifications can access and use contents normally has been studied. The Conditional Access System(CAS) used in a satellite broadcasting md Digital Right Management System(DRMS) used for contents service are representative models of current commercialized access control. The CAS and DRM can be considered as an access control technique based on the payment based type(PBT). This paper describe the access control method of payment free type(PFT) suggested in [5] which are independent on the payment structure. And then we suggest a new access control method of payment free type which is more efficient than the previous one.