Comparison of bandwidth by video resolution.

Comparison of bandwidth by video resolution.

Source publication
Article
Full-text available
National defense requires uninterrupted decision-making, even under direct or indirect impacts of non-traditional threats such as infectious diseases. Since all work utilizes information systems, it is very important to ensure the sustainability and availability of information systems. In particular, in terms of security management, defense work is...

Context in source publication

Context 1
... on the classified attributes, text may be compressed without loss, images may be compressed in JPEG Turbo format, and videos may be compressed in H.264 or MPEG-2 format to reduce CPU usage and network traffic. The data usage between video transmission for VDI solutions used commercially was measured and compared as shown in Figure 3. The size of the bandwidth used in the case of remotely playing and watching videos through VDI of companies T and V, which are used commercially, was measured. ...

Similar publications

Article
Full-text available
Robust Lombard speech-in-noise detecting is challenging. This study proposes a strategy to detect Lombard speech using a machine learning approach for applications such as public address systems that work in near real time. The paper starts with the background concerning the Lombard effect. Then, assumptions of the work performed for Lombard speech...

Citations

... The international regulation regarding the establishment of the recovery priorities for 'national functions' is described under the functional analysis stage of the Continuity of Operations Plan (COOP) within International Organization for Standardization (ISO) 22301 [33,34]. The functional analysis stage states that all national functions should be categorised. ...
Article
Full-text available
National functions are categories of operations prioritised for restoration when disrupted by emergencies such as disasters. However, the simultaneous restoration of all national functions when some or all are paralysed is limited by time and resources. Delays in the restoration of key functions can lead to public dissatisfaction. Thus, it is necessary to broadly classify national functions and analyse their restoration priorities based on criticality. This study identifies 19 national functions from Republic of Korea’s comprehensive Business Reference Model. A survey was conducted among citizens and officials to determine the criticality of each function. Statistical analyses verified the consistency (Cronbach’s alpha = 0.860) and correlation (average Cramer’s V = 0.107) of the criticality responses across regions. The null hypothesis of no regional differences in the criticality of national functions was accepted, validating their universality. Restoration priorities were derived from these criticality values, with ‘Disaster Safety Response’ as the highest priority and ‘Regional Development’ as the lowest. These results provide foundational data for the post-disaster restoration priorities of national functions and emphasise the need to consider public opinion, needs, and government resource limitations in disaster management planning.
Article
Full-text available
To advance defense interoperability, foster productive collaboration, and enhance the capabilities of defense systems to respond to evolving threats, it is imperative to tackle the challenges of defensive strategic issues in Network security. That is why an experimental study was done to assess the application of the interoperability defense theory to an operational target network system. The study used five strategies, including "Risk," "Complexity," "Dependency," "Personnel," and "Environment," and employed DEMATEL and performance analysis evaluation. These five defense techniques to interoperability are conceptualized. The experimental results revealed that network defense, instead of being consistently passive, is the recipient of influence in an interoperable defensive system. Interoperability protective strategies have varying degrees of influence on network security evaluations. A significant relationship was observed between the level of technological complexity and the ability to tolerate its significant effects. Within the complexity group, further analysis showed a noteworthy reduction in "Risk". However, there were no significant variations in " Environment" before and after the interoperable implementation. Finally, the DEMATEL analysis indicates that the entire variables are effect criteria no cause criteria. Given that all criteria are categorized as "effect" and none as "cause," it suggests a scenario in which each criterion is interconnected and influenced by other criteria within the system, but none of them serve as direct influencers or causes. Therefore, this study contributes to the evaluation of interoperability in strategic network security defense.