• Title/Summary/Keyword: 개별 시스템

Search Result 2,355, Processing Time 0.03 seconds

A Study on the Operation & Management of Smart City R&D Testbed Projects (스마트시티 관련 R&D 테스트베드 사업의 운영관리 방향에 관한 연구)

  • Han, Sun-Hee;Lee, Jae-Yong
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.13-25
    • /
    • 2017
  • The Korean government is pursuing technological development through nearly every government agency, and Korea's growing R&D spending is yielding good results in many fields. With the country moving from the technology development stage to the demonstration stage, it is actively implementing testbed projects to demonstrate developed technologies and services. This is, however, not without problems. There is no consistent systematic system for the testbed projects because government agencies compete against each other in the planning of execution of R&D: they do not work together. The most serious problem is that both testbeds and developed technologies die out due to poor operation management after the completion of test projects. Research should, therefore, be done on operation management and commercialization. However, the government still does not consider the system after the test: it focuses on building testbeds to verify developed technologies. This study intends to determine the basic orientation of operation management to ensure maximum performance, efficiency, and continuity of national projects through intensive analysis of ongoing national R&D testbed projects and examination of success stories of operation management at home and abroad.

Development and Evaluation of Road Safety Information Contents Using Commercial Vehicle Sensor Data : Based on Analyzing Traffic Simulation DATA (사업용차량 센서 자료를 이용한 도로안전정보 콘텐츠 개발 : 교통시뮬레이션 자료 분석을 중심으로)

  • Park, Subin;Oh, Cheol;Ko, Jieun;Yang, Choongheon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.2
    • /
    • pp.74-88
    • /
    • 2020
  • A Cooperative Intelligent Transportation System (CITS) provides useful information on upcoming hazards in order to prevent vehicle collisions. In addition, the availability of individual vehicle travel information obtained from the CITS infrastructure allows us to identify the level of road safety in real time and based on analysis of the indicators representing the crash potential. This study proposes a methodology to derive road safety content, and presents evaluation results for its applicability in practice, based on simulation experiments. Both jerk and Stopping Distance Index (SDI) were adopted as safety indicators and were further applied to derive road section safety information. Microscopic simulation results with VISSIM show that 5% and 20% samples of jerk and SDI are sufficient to represent road safety characteristics for all vehicles. It is expected that the outcome of this study will be fundamental to developing a novel and valuable system to monitor the level of road safety in real time.

The Effect of the Equity of the Objective Performance on the Cognitive Performance and the Behavioral Intention (객관적 성과의 형평성이 인지적 성과 및 게임 이용 행동 의도에 미치는 영향)

  • Choi, Dong-Seong;Choi, Bo-Reum;Lee, In-Seong;Kim, Jin-Woo
    • Journal of Korea Game Society
    • /
    • v.7 no.2
    • /
    • pp.1-10
    • /
    • 2007
  • Many game designers suggested that if players got many objective performance, they could have a fun experience while playing the MMORPG. Does a quantity of objective performance lead to player's fun experience in the MMORPG? According to the Equity Theory, the reason of players getting fun experience is not only that players get reasonable objective performances as many as efforts of theirs but also that amount of their objective performances were same as others. This study analysed that the equity of objective performances would have an effect on the player's fun experience. The results were that the equity of objective performances produced an effect on the players' behavioral intention, flow experience, and cognitive performance. Hence if game designers want that players are interested in the online game playing, they have to support the equity of objective performance to players.

  • PDF

A Study on the Development of Transfer Papers -Focused on Tile Design for Remodeling- (전사지 개발에 대한 연구 -리모델링을 위한 타일디자인을 중심으로-)

  • 모인순
    • Archives of design research
    • /
    • v.15 no.2
    • /
    • pp.213-222
    • /
    • 2002
  • A transfer paper, is needed in the third firing, is usually utilized for industrial ceramics in order to produce tablewares or promoting products. Products may have the same form, however; the price might be different by what kinds of design have transferred. We need to fully understand these methods in order to create high value and quality. Remodeling, the so-called second architecture, results from social Needs for renovation of structures and changing functions. Tile satisfying the need for a custom-made design which fits the features of a space. Most importantly, the remodeler must make an individual design ordered for the customer with an emphasis on economy and time efficiency. Tiles currently in the market are mass-produced using an automated system with a high-priced mold. It is difficult to find tiles of distinct design that are made in a small quantity. We need to develop a method for making various kinds of tile designs that would be marketed for the remodeling industry. In this study, after designing a certain wall with the tiffs in the space, 1 will talk about developing a method to make transfer paper to produce individual tiles for the space. 1 hope that the functional and aesthetic effect on remodeling will gain in popularity, and that we will foster a new demand for tiles in harmony with the other materials mentioned in this study.

  • PDF

A Real-Time and Statistical Visualization Methodology of Cyber Threats Based on IP Addresses (IP 주소 기반 사이버공격 실시간 및 통계적 가시화 방법)

  • Moon, Hyeongwoo;Kwon, Taewoong;Lee, Jun;Ryou, Jaecheol;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.465-479
    • /
    • 2020
  • Regardless of the domestic and foreign governments/companies, SOC (Security Operation Center) has operated 24 hours a day for the entire year to ensure the security for their IT infrastructures. However, almost all SOCs have a critical limitation by nature, caused from heavily depending on the manual analysis of human agents with the text-based monitoring architecture. Even though, in order to overcome the drawback, technologies for a comprehensive visualization against complex cyber threats have been studying, most of them are inappropriate for the security monitoring in large-scale networks. In this paper, to solve the problem, we propose a novel visual approach for intuitive threats monitoring b detecting suspicious IP address, which is an ultimate challenge in cyber security monitoring. The approach particularly makes it possible to detect, trace and analysis of suspicious IPs statistically in real-time manner. As a result, the system implemented by the proposed method is suitably applied and utilized to the real-would environment. Moreover, the usability of the approach is verified by successful detecting and analyzing various attack IPs.

Dynamic Multi-Proxy Signature Schemes based on Secret Sharing and Diffie-bellman Problem (비밀분산법과 Diffie-Hellman 문제에 기반한 동적 멀티 대리서명 프로토콜)

  • 박소영;이상호
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.8
    • /
    • pp.465-472
    • /
    • 2004
  • Proxy signatures is a signature scheme that an original signer delegates one's signature capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. Delegation of authority is a common practice in the real world, in particular, it happens naturally in hierarchical groups such as company, bank and army, etc. In this paper, we propose a new dynamic multi-proxy signature scheme allowing repetitive delegations in a hierarchical group. We adopt multi-proxy signatures to enhance the security of proxy signature. In multi-proxy signatures, plural proxy signers can generate a valid proxy signature collectively on behalf of one original signer. In our scheme, the proxy group is not fixed but constructed dynamically according to some situations. Delegations are processed from higher level to lower level in the hierarchy using delegation tickets. When the original signer wants to delegate one's signature authority, the original signer generates a delegation ticket based on secret sharing and Diffie-Hellman problems. The delegation ticket is shared among proxy signers and then all the proxy signers can generate a valid proxy signature collectively by reconstructing the original signer's delegation ticket. If a certain proxy signer can not attend the proxy signature generating protocol, the proxy signer can also delegate repetitively his partial signature authority to the lower level participants, and then the proxies are constructed dynamically.

The Alternatives of Communication Model and Geographic Visualization (커뮤니케이션 이론에 대한 대안과 지리적 시각화)

  • Son, Ill
    • Journal of the Korean association of regional geographers
    • /
    • v.4 no.1
    • /
    • pp.27-41
    • /
    • 1998
  • The communication model has been accepted as the basic research paradigm of cartography since Board(1967) discussed the map/model analogy. In that paradigm, the function of maps was limited to the media of communication, and the functionality of maps was extremely emphasized. Therefore the model could not play its own role under the new environments such as computer, GIS, scientific visualization. Nowadays, the model has been attacked on several grounds and several alternatives have been suggested. Among the objections raised are (1) geographic visualization in which maps are considered as the tool of scientific visualization, (2) the contributions of art which are ignored in the positivist cartographic research, and (3) deconstructionist arguments which deny the scientific epistemology of map as an objective form of knowledge and recognize the textuality of maps including their metaphorical and rhetorical nature. Since a publication by McCormick et al, the scientific visualization based on the powerful computer graphics is used in a wide context. Maps are treated as the tools of scientific visualization and emphasis is on exploration of the geographic data to gain understanding and insight in the geographic visualization processes. The research on geographic visualization have stayed in the early stage of developing the conceptual model and the basic visualization tools. But, it is expected that the geographic or visual thinking which is emphasized in the geographic visualization will contribute the reestablishment of links between cartography and geography. Also, the development of scientific visualization tools and strategies will offer the opportunities to suggest a fresh idea, to synthesize information and develop holistic approaches to geographical problems.

  • PDF

A Solute Transport Analysis around Underground Storage Cavern by using Eigenvalue Numerical Technique (고유치 수치기법을 이용한 지하저장공동 주위의 용질이동해석)

  • Chung, Il-Moon;Kim, Ji-Tae;Cho, Won-Cheol;Kim, Nam-Won
    • The Journal of Engineering Geology
    • /
    • v.18 no.4
    • /
    • pp.381-391
    • /
    • 2008
  • The eigenvalue technique is introduced to overcome the problem of truncation errors caused by temporal discretization of numerical analysis. The eigenvalue technique is different from simulation in that only the space is discretized. The spatially discretized equation is diagonized and the linear dynamic system is then decoupled. The time integration can be done independently and continuously for any nodal point at any time. The results of eigenvalue technique are compared with the exact solution and FEM numerical solution. The eigenvalue technique is more efficient than the FEM to the computation time and the computer storage in the same conditions. This technique is applied to the solute transport analysis in nonuniform flow fields around underground storage caverns. This method can be very useful for time consuming simulations. So, a sensitivity analysis is carried out by using this method to analyze the safety of caverns from nearly located contaminant sources. According to the simulations, the reaching time from source to the nearest cavern may takes 50 years with longitudinal dispersivity of 50 m and transversal dispersivity of 5 m, respectively.

Study of Benefit Characteristics for Low Impact Development (LID) Facilities demonstrated in Seoul Metropolitan (서울시 저영향개발(LID) 시범 시설에 대한 편익 특성 연구)

  • Lee, Seung Won;Kim, Reeho
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.38 no.6
    • /
    • pp.299-308
    • /
    • 2016
  • Seoul metropolitan has established a vision as 'Healthy water-cycle city' to resolve urban water-environmental deterioration. And it established administrative structure to expand Low Impact Development (LID) facilities to recover aggravated water-cycle and water-environment. Therefore, various LID facilities are constructed and operated, however, benefit analytic plans for systematic valuation are insufficient. In this study, to analyze economic, environmental and social benefits of LID facilities, contents for benefit analysis were selected and categorized as water, energy, air quality and climate changes. As a result of quantification and valuation to the beneficial effects, LID facilities showed the total benefit as 1,191~3,292 won/yr. Characteristics of benefit distribution by analysis contents were various reflecting functional characteristics of each LID facility (Water: 30~90%, Energy: 4~44%, Air quality: <1~2%, Climate change: 5~22%). As a result of Triple Bottom Line analysis, economic benefit showed the greatest portion as 75~90%. As further studies, suggested benefit assessment plans for each LID facility should be applied to inter-connected LID systems on complex-scaled area, and synergy effects by various LID systems would be evaluated such as prevention of heat island and flood disasters.

Studies of gas chromatographic analysis of malodorous S compounds in air (대기 중 악취황 성분들에 대한 GC 분석의 특성)

  • Kim, Ki-Hyun;Oh, Sang In;Choi, Y.J.
    • Analytical Science and Technology
    • /
    • v.17 no.2
    • /
    • pp.145-152
    • /
    • 2004
  • In this study, analytical characteristics of S gas detection technique were investigated against four major reduced S compounds (including hydrogen sulfide; methyl mercaptan; dimethyl sulfide (DMS); and dimethyl disulfide (DMDS)). To analyze such properties, an analytical system was constructed by combining the GC/PFPD system with the loop injection method. The results of our analysis indicated that response behavior of S gases differs greatly between compounds; H2S exhibited the weakest sensitivity of all compounds, while DMDS with two S-atom compounds the strongest sensitivity. To learn more about their response behavior on GC/PFPD method, their calibration patterns were compared using the three arbitrarily set concentration ranges of low, intermediate, and high. The results showed that calibration patterns of each compound are distinguished because of different factors. There was a line of evidence that calibration of $H_2S$ was affected noticeably by adsorptive loss within the system, whereas those of DMS and DMDS were influenced most sensitively by such factor as the linearity response at a given PMT voltage setting. The overall results of our study suggest that quantification of malordorous S compounds require a better knowledge of compound-specific response behavior against GC detection.