• Title/Summary/Keyword: 네트워크 위험도

Search Result 705, Processing Time 0.022 seconds

A Study on the Policy Direction for the Introduction and Activation of Smart Factories by Korean SMEs (우리나라 중소기업의 스마트 팩토리 수용 및 활성화 제고를 위한 정책 방향에 대한 연구)

  • Lee, Yong-Gyu;Park, Chan-Kwon
    • Korean small business review
    • /
    • v.42 no.4
    • /
    • pp.251-283
    • /
    • 2020
  • The purpose of this study is to provide assistance to the establishment of related policies to improve the level of acceptance and use of smart factories for SMEs in Korea. To this end, the Unified Technology Acceptance Model (UTAUT) was extended to select additional factors that could affect the intention to accept technology, and to demonstrate this. To achieve the research objective, a questionnaire composed of 7-point Likert scales was prepared, and a survey was conducted for manufacturing-related companies. A total of 136 questionnaires were used for statistical processing. As a result of the hypothesis test, performance expectation and social influence had a positive (+) positive effect on voluntary use, but effort expectation and promotion conditions did not have a significant effect. As an extension factor, the network effect and organizational characteristics had a positive (+) effect, and the innovation resistance had a negative effect (-), but the perceived risk had no significant effect. When the size of the company is large, the perceived risk and innovation resistance are low, and the level of influencing factors for veterinary intentions, veterinary intentions, and veterinary behaviors are excluded. Through this study, factors that could have a positive and negative effect on the adoption (reduction) of smart factory-related technologies were identified and factors to be improved and factors to be reduced were suggested. As a result, this study suggests that smart factory-related technologies should be accepted.

Predicting the Retention of University Freshmen Using Peer Relationships (대학 신입생들의 교우관계를 통한 학업유지 예측)

  • Lee, Yeonju;Choi, Sungwon
    • Korean Journal of School Psychology
    • /
    • v.18 no.1
    • /
    • pp.31-48
    • /
    • 2021
  • The purpose of this study was to determine whether the retention of university freshmen could be predicted using their peer relationships in a specific department. In this study, retention was defined as a student staying enrolled in their university for a certain period of time. Social relationships are formed through interaction between people, so both students' self-perceptions and others' perceptions of them must be accounted for, so we used a social network analysis that did so. We examined social networks visualizations that allowed for a rich interpretation of numerical information. Participants in this study were freshmen who enrolled in an undergraduate program in 2017, 2018, or 2019. We used the name generator method to determine how quantitative friendship network variables predicted the academic retention up to the first semester of 2020. Cox proportional hazard model analysis showed that the weighted indegree centrality with intimacy positively predicted retention. The results of this study can be used to identify and conduct interventions for students who may be likely to disenroll. However all of the students did not participate in the department, it was difficult to examine their entire peer networks. Thus, this study's results cannot be generalized because the participants are students of a specific major, so further research is needed to produce more generalizable results.

Evaluation of fire-proofing performance of reinforced concrete tunnel lining coated by newly developed material (신개발 내화재료에 피복된 철근콘크리트 터널라이닝의 내화성능평가)

  • Park, Hae-Genn;Kim, Jang-Ho Jay
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.10 no.4
    • /
    • pp.329-336
    • /
    • 2008
  • Efficient traffic network is required in urban area for good living condition. However, dense traffic network creates traffic jam and gives bad influences to the ground environment. Therefore, advanced use of underground and tunnel is required. But, in the last 20 years many tunnel fire accidents have occurred all over the world. Increase of tunnels and increase of traffics result in increase of tunnel fire. Tunnel fire creates damage to people and to the tunnel structure. Also, tunnel fire creates a big economical loss. In a mountain tunnel, the stability of the tunnel will not be disturbed by fire although the tunnel lining will get a severe damage. However, in a shield tunnel or immersed tube tunnel, cut and cover tunnel, there is a high possibility that tunnel itself will collapse by fire because their tunnel concrete lining is designed as a structural member. The aim of this experimental research is to verify the fire protection performance of newly developed cementitious material compared with the broadly used existing products in Europe and Japan. For the experiments, the general NATM tunnel concrete linings with the newly developed material were tested using fire loading curve of RABT (Maximum peak temperature is $1,200^{\circ}C$) and RWS (Maximum peak temperature is $1,350^{\circ}C$). From the test results, the newly developed fire protection material applied with 30 mm thickness showed good fire-proofing performance under RABT fire loading.

  • PDF

Establishment of Preservative Green Spaces and Potential Focus Areas by the Green Infrastructure Assessment of the City of Daejeon (녹지기반성 분석에 의한 보전녹지와 중점관리지역 설정에 관한 연구 - 대전광역시를 대상으로 -)

  • Lee, Shi-Young;Shim, Joon-Young;Jang, Min;Heo, Jun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.36 no.4
    • /
    • pp.65-73
    • /
    • 2008
  • Due to the amendment of the Act for Urban Parks in 2005, local governments have to establish long-range plans for securing and managing urban parks and green areas. This study aims to propose a method of setting priorities for green areas of land to be preserved before the development stage through the introduction of the concept of Green Infrastructure Assessment, and provide basic data to establish the network of urban parks and green areas by applying the GIA method to the city of Daejeon. The concept of GIA and the process of analysis have been drawn as a result of literature research and case studies. The results of this study show that an introduction of the GIA concept to set park and open space planning promotes the connection of the city planning process as well as presents very a reasonable source to facilitate sustainable development. Also, other results present a priority ranking for protection of parks and green areas as well as a means to manage potential focus areas. This study, does have research limitations such as a limited study area, scale, and conflicts between domestic and foreign computing data. Further studies need to set the planning process and examine the index survey to apply this method to various situations and areas.

Analysis on the Credit Guarantee System for Creative Economy in Korea (창조경제 활성화를 위한 금융지원 방안에 대한 연구 : 신용보증제도를 중심으로)

  • Yoo, Kyeongwon;Kim, Kyungkeun;Bae, Sang Hoo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.6
    • /
    • pp.47-64
    • /
    • 2014
  • Considering the network externality and spill-over effects, this paper constructs the theoretical model for analyzing the financial policies focusing on the credit guarantee system for Creative Economy, which has been set as the new policy paradigm for the Korean Economy. The analytical results show that it is as much as important to improve the efficiency of the financial markets and construct the infrastructure for reducing the information asymmetry problem which would be more serious in the creative finance. Although it is important to fill the gap due to the market failure it is also crucial to construct the appropriate financial schemes for the various stages of the innovative firms growth. Without these, the impacts of current public funding policies may crowd out the amount of private market funds for the innovative firms or reduce the possibility of commercialization of new technologies in these firms. Based on the evaluation of current related public policies from the perspectives of creative finance, we imply that the current financial policies appear to be quantity oriented not the quality based. Although the policy goals would be appropriately set for vitalizing the Creative Economy in Korea, they appear to be still unsuccessful to address the information asymmetry issue which is the major concern in vitalizing the creative economy. Thus we emphasize the market friendly policies, risk-sharing between the various market participants, revitalizing the relationship banking and efficient management of credit guarantee system in Korea based on the analytical model as well as the evaluation of related policies regarding the creative economy.

  • PDF

Requirement Analysis of Satellite On-the-Move Transportable Terminal System (이동통신형 차량위성단말 시스템 요구사항 분석)

  • Oh, Il-Hyuk;Song, Choong-Ho;Ko, Dong-Kuk
    • Journal of Satellite, Information and Communications
    • /
    • v.3 no.1
    • /
    • pp.41-47
    • /
    • 2008
  • Line-of-sight communications cannot easily support korean armed forces because of mountainous terrain. ADD(Agency for Defense Development) introduced ANASIS(Army Navy Air-force Satellite Information System) to meet the Korean warfighter's operational needs. Currently, army's military satcom terminal is designed for either fixed site or on-the-pause operation. The US army is under development of multi-band integrated on-the-move satellite terminals to let the army's communication capability to keep pace with globally deployable Joint Task Force for network-centric application. In this paper we analyzed X-band and Ka-band link and subsystem requirement. Our focus here is to describe key technical issues. Especially, On the basis of 3dB beam width of 0.9m antenna, Tracking accuracy and disturbances compensation signal processing on-the-move of Antenna Tracking system is analyzed. Also, protocol is analyzed that minimize blockage on the move due to an obstacle. when the received signal blocked, it stop to transmit burst signal and retransmit when blockage removed through received synchronization signal monitoring. Analyzed specification will be used to make prototype terminal to analyze risk for mass production

  • PDF

Analysis of the effect on Road Network with Communication Failure Rate of C-ITS Information System for Rear-end Collision Avoidance (C-ITS 차량 추돌방지 지원 시스템의 통신 부하를 고려한 도로네트워크 영향 분석)

  • Kim, Jun-Yong;Kim, Jin-Tae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.5
    • /
    • pp.71-82
    • /
    • 2016
  • Information System for rear-end collision avoidance is a unit service of C-ITS pilot project. Road environment that the number of vehicles at the same driving high-speed has a possibility that the communication delay or failure caused by heavy load of vehicle to vehicle communication. In this study, effects of the road network about a communication failure rate of information system for rear-end collision avoidance was analyzed quantitatively with micro traffic simulation. The simulation was carried out in situation that crash of two vehicles are occurred at merging area with speed limit 80km/h and information of collision is prvoided to the rear vehicle. From simulation results, it can confirm the trend of the increasing 14% of potential conflict according to 10% increasing of the communication failure rate. C-ITS service has a goal of increasing safety. The coommunication failure rate increases due to heavy load of vehicle causes a fatal result in road safety administrator position. For the success of C-ITS project, a communication system developers side should perform the effort to reduce the communication failure rate.

An Empirical Study on Effects of Global Alliance Networks' Motives on Firm's Capabilities, Partner's Capabilities, Operating Structures, and Performances of Korean Companies (글로벌 제휴네트워크 추진 동기가 기업 역량, 파트너 역량, 운영구조, 제휴 성과에 미치는 영향에 관한 실증연구)

  • Jeong, Jong-Sik
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.249-269
    • /
    • 2012
  • The focus of our work is to identify and understand the drivers of alliance performance so that businesses can maximize their chances of a successful alliance-an area that has received little attention in empirical modeling. Although both conceptual and applied research on alliances has increased, an empirically tested comprehensive theoretical model that explains alliance performance has yet to be developed. Using five salient perspective, namely market power theory, transaction cost theory, the resource-based view, institutional theory, real option theory, this paper attempts to provide a theoretical rationale linking motives of global alliance networks on firm's capabilities, partner's capabilities, operating structures, and performances of Korean companies. The key contribution of this study is that it paints a picture of what matters in driving alliance performance. Our work shows the complex nature of driving performance and the interplay of firm's capabilities, partner's capabilities, and operating structures for understanding alliance performances. This study has given us a small but significant step forward towards understanding the intricacies of alliance performance. We are now better able to understand the respective roles played by various alliance factors and derive insights that lead to improved alliance performance.

  • PDF

Reinforcement Mining Method for Anomaly Detection and Misuse Detection using Post-processing and Training Method (이상탐지(Anomaly Detection) 및 오용탐지(Misuse Detection) 분석의 정확도 향상을 위한 개선된 데이터마이닝 방법 연구)

  • Choi Yun-Jeong;Park Seung-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06b
    • /
    • pp.238-240
    • /
    • 2006
  • 네트워크상에서 발생하는 다양한 형태의 대량의 데이터를 정확하고 효율적으로 분석하기 위해 설계되고 있는 마이닝 시스템들은 목표지향적으로 훈련데이터들을 어떻게 구축하여 다룰 것인지에 대한 문제보다는 대부분 얼마나 많은 데이터 마이닝 기법을 지원하고 이를 적용할 수 있는지 등의 기법에 초점을 두고 있다. 따라서, 점점 더 에이전트화, 분산화, 자동화 및 은닉화 되는 최근의 보안공격기법을 정확하게 탐지하기 위한 방법은 미흡한 실정이다. 본 연구에서는 유비쿼터스 환경 내에서 발생 가능한 문제 중 복잡하고 지능화된 침입패턴의 탐지를 위해 데이터 마이닝 기법과 결함허용방법을 이용하는 개선된 학습알고리즘과 후처리 방법에 의한 RTPID(Refinement Training and Post-processing for Intrusion Detection)시스템을 제안한다. 본 논문에서의 RTPID 시스템은 active learning과 post-processing을 이용하여, 네트워크 내에서 발생 가능한 침입형태들을 정확하고 효율적으로 다루어 분석하고 있다. 이는 기법에만 초점을 맞춘 기존의 데이터마이닝 분석을 개선하고 있으며, 특히 제안된 분석 프로세스를 진행하는 동안 능동학습방법의 장점을 수용하여 학습효과는 높이며 비용을 감소시킬 수 있는 자가학습방법(self learning)방법의 효과를 기대할 수 있다. 이는 관리자의 개입을 최소화하는 학습방법이면서 동시에 False Positive와 False Negative 의 오류를 매우 효율적으로 개선하는 방법으로 기대된다. 본 논문의 제안방법은 분석도구나 시스템에 의존하지 않기 때문에, 유사한 문제를 안고 있는 여러 분야의 네트웍 환경에 적용될 수 있다.더욱 높은성능을 가짐을 알 수 있다.의 각 노드의 전력이 위험할 때 에러 패킷을 발생하는 기법을 추가하였다. NS-2 시뮬레이터를 이용하여 실험을 한 결과, 제안한 기법이 AOMDV에 비해 경로 탐색 횟수가 최대 36.57% 까지 감소되었음을 알 수 있었다.의 작용보다 더 강력함을 시사하고 있다.TEX>로 최고값을 나타내었으며 그 후 감소하여 담금 10일에는 $1.61{\sim}2.34%$였다. 시험구간에는 KKR, SKR이 비교적 높은 값을 나타내었다. 무기질 함량은 발효기간이 경과할수록 증하였고 Ca는 $2.95{\sim}36.76$, Cu는 $0.01{\sim}0.14$, Fe는 $0.71{\sim}3.23$, K는 $110.89{\sim}517.33$, Mg는 $34.78{\sim}122.40$, Mn은 $0.56{\sim}5.98$, Na는 $0.19{\sim}14.36$, Zn은 $0.90{\sim}5.71ppm$을 나타내었으며, 시험구별로 보면 WNR, BNR구가 Na만 제외한 다른 무기성분 함량이 가장 높았다.O to reduce I/O cost by reusing data already present in the memory of other nodes. Finally, chunking and on-line compression mechanisms are included in both models. We demonstrate that we can obtain significantly high-performanc

  • PDF

A Study on Generalization of Security Policies for Enterprise Security Management System (통합보안관리시스템을 위한 보안정책 일반화에 관한 연구)

  • Choi, Hyun-H.;Chung, Tai-M.
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.823-830
    • /
    • 2002
  • Enterprise security management system proposed to properly manage heterogeneous security products is the security management infrastructure designed to avoid needless duplications of management tasks and inter-operate those security products effectively. In this paper, we propose the model of generalized security policies. It is designed to help security management build invulnerable security policies that can unify various existing management infrastructures of security policies. Its goal is not only to improve security strength and increase the management efficiency and convenience but also to make it possible to include different security management infrastructures while building security policies. In the generalization process of security policies. we first diagnose the security status of monitored networks by analyzing security goals, requirements, and security-related information that security agents collect. Next, we decide the security mechanisms and objects for security policies, and then evaluate the properness of them on the basis of security goals, requirements and a policy list. With the generalization process, it is possible to integrate heterogeneous security policies and guarantee the integrity of them by avoiding conflicts or duplications among security policies. And further, it provides convenience to manage many security products existing in large networks.