• Title/Summary/Keyword: 모델 접근 방법

Search Result 1,718, Processing Time 0.028 seconds

Research on Effective Use of A Serious Bio-Game (기능성 Bio-Game의 활용 방안에 관한 연구)

  • Park, Sung-Jun;Lee, Jun;Kim, Jee-In
    • Journal of Korea Game Society
    • /
    • v.9 no.1
    • /
    • pp.93-103
    • /
    • 2009
  • A Serious Game helps the learners to recognize the problems effectively, grasp and classify important information needed to solve the problems and convey the contents of what they have learned. Owing not only to this game-like fun but also to the educational effect, The Serious Game can be usefully applied to education and training in the areas of scientific technology and industrial technology. This study proposes the Serious Game that users can apply to biotechnology by using intuitive multi-modal interfaces. In this study, a stereoscopic monitor is used to make three dimensional molecular structures, and multi-modal interface is used to efficiently control. Based on a such system, this study easily solved the docking simulation function, which is one of the important experiments, by applying these game factors. For this, we suggested the level-up concept as a game factor that depends on numbers of objects and users. The proposed system was evaluated in performance comparison in result time of a new drug design process on AIDS virus with previous approach.

  • PDF

A Cause-Effect Model for Human Resource Management (정보시스템의 효율적인 인적자원 관리를 위한 Cause-Effect, Model의 활용)

  • Lee, Nam-Hoon;In, Hoh;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.161-169
    • /
    • 2006
  • According to the development of information system, many information system and application soft-ware are develop. However, cyber attack and incident have more increased to the development of them. To defend from cyber attack and incident, many organizations has run information security systems, such as Intrusion Detection System, Firewall, VPN etc, and employed information Security person till now But they have many difficulty in operating these information security component because of the lack of organizational management and analysis of each role. In this paper, We propose the formal Cause-Effect Model related with the information security system and administrative mission per each security. In this model, we regard information system and information system operator as one information component. It is possible to compose the most suitable information component, such as information system, human resource etc., according to the analysis of Cause-Effect Model in this paper. These analysis and approaching methodology can make effective operation of each limited resource in organization and effective defense mechanism against many malicious cyber attack and incident.

  • PDF

Assessing Infinite Failure Software Reliability Model Using SPC (Statistical Process Control) (통계적 공정관리(SPC)를 이용한 무한고장 소프트웨어 신뢰성 모형에 대한 접근방법 연구)

  • Kim, Hee Cheul;Shin, Hyun Cheul
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.85-92
    • /
    • 2012
  • There are many software reliability models that are based on the times of occurrences of errors in the debugging of software. It is shown that it is possible to do asymptotic likelihood inference for software reliability models based on infinite failure model and non-homogeneous Poisson Processes (NHPP). For someone making a decision about when to market software, the conditional failure rate is an important variables. The finite failure model are used in a wide variety of practical situations. Their use in characterization problems, detection of outliers, linear estimation, study of system reliability, life-testing, survival analysis, data compression and many other fields can be seen from the many study. Statistical Process Control (SPC) can monitor the forecasting of software failure and there by contribute significantly to the improvement of software reliability. Control charts are widely used for software process control in the software industry. In this paper, we proposed a control mechanism based on NHPP using mean value function of log Poission, log-linear and Parto distribution.

Application of geographical and temporal weighted regression model to the determination of house price (지리시간가중 회귀모형을 이용한 주택가격 영향요인 분석)

  • Park, Saehee;Kim, Minsoo;Baek, Jangsun
    • Journal of the Korean Data and Information Science Society
    • /
    • v.28 no.1
    • /
    • pp.173-183
    • /
    • 2017
  • We investigate the factors affecting the price of apartments using the spatial and temporal data of private real estate prices. The factors affecting the price of apartment were analyzed using geographical and temporal weighted regression (GTWR) model which incorporates the temporal and spatial variation. In contrast to the OLS, a general approach used in previous studies, and GWR method which is most widely used for analyzing spatial data, GTWR considers both temporal and spatial characteristics of the house price, and leads to better description of the house price determination. Year of construction and floor area are selected as the significant factors from the analysis, and the house price are affected by them temporally and geographically.

Strength Model for Punching Shear of Flat Plate-Column Connections (플랫플레이트-기둥 접합부의 뚫림전단강도)

  • Choi Kyoung-Kyu;Park Hong-Gun
    • Journal of the Korea Concrete Institute
    • /
    • v.16 no.2 s.80
    • /
    • pp.163-174
    • /
    • 2004
  • A number of experiments were performed to investigate the punching shear strength of flat plate-column connections. According to the experiments, the punching shear strength varies significantly with design parameters such as the column size of the connection, reinforcement ratio, and boundary condition. However, current design methods do not properly address the effects of such design parameters. In the present study, a theoratical approach using Rankine's failure cirterion was attempted to define the failure mechanism of the punching shear According to the study, the failure mechanism can be classified into the compression-controlled and the tension-controlled, depending on the amount of bottom re-bars placed at the connection, and the punching shear strength is also significantly affected by the flexural damage of slab. Based on the finding, a new strength model of punching shear was developed, and verified by the comparisons with existing experiments and nonlinear finite element analyses. The comparisons show that the proposed strength model addressing the effects of various design parameters can predict accurately the punching shear strength, compared to the existing strength models.

Developing Teachers' Professionalism -Focusing on Korean Cases- (교사 전문성 향상 방안 연구 -한국의 학습 커뮤니티 사례-)

  • Na, Hyeok-Jin
    • Industry Promotion Research
    • /
    • v.5 no.1
    • /
    • pp.53-62
    • /
    • 2020
  • This study reviewed the structural and operational systems of two professional learning communities in Korean society and analyzed their strengths and weaknesses: the Association of Korean History Teachers and the Communities of Elementary School Classroom Management. In order to analyze these cases, Robey's organizational change model was used as a theoretical frame. Two research methods were mainly employed for this study: literature review and on-site interviews. The analysis found several strengths (easy accessibility, led by teachers' initiative and autonomous will, abundant and practical teaching solutions) and weaknesses (financial burden, lack of theoretical background, sporadic participants). In conclusion, this study suggests three strategies for an educational leader who has an important role in developing a teacher's professionalism: 1) Make an institutional effort to stimulate teachers' motivation to learn, 2) Create a strong network of university professors and other experts for career advice, 3) Build a synthesized and consolidated system.

HVDC Application Considering Fault Current Characteristics (고장 전류 특성을 고려한 HVDC 적용 방안)

  • Park, Jung-Soo;Jang, Gil-Soo;Kim, Chan-Ki
    • Journal of IKEEE
    • /
    • v.11 no.4
    • /
    • pp.239-246
    • /
    • 2007
  • One of the most serious problems in KEPCO power system is the load centralization in the capital area. The load capacity in the capital area is almost 40% of the total load. However, the generation capacity in this area is just 16% of the total generation. The inequality, between the power demand and supply, in this area needs the power transmission from other regions. The simplest method to solve the problem is the installation of power plants or the addition of high-capacity transmission line in the metropolitan area. However, because of the concentration of human and material resources, there is a difficulty in the installation of the generation and transformer facility. As a result, instead of the installation of large scale facilities, the approach to maximize the application of existing facilities is required. In this research, we will develop a scheme with an HVDC installation for enhancing power transfer capability by utilizing the existing transmission lines.

  • PDF

Chinese Online Circulation Market and Market Approaching Strategy (중국 온라인 유통시장의 발전과 시장진출 전략)

  • Song, Jae-Do;Lee, Chan-Woo
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.477-487
    • /
    • 2017
  • This paper releases strategies for firms that wish to enter into online circulation business in China. SWOT based on a Korean manufacturing company teaches us better way to approach Chinese online market. Chinese online market is under oligopoly, where Alibaba and Jingdong account for about 80% of the total market. Game theory is used as a measure of threat and opportunity between Korean manufacturer and Chinese online market retailer. Game shows that they are easy to accept opportunity and sales uplift rather than low risk. Analysis shows that Korean companies should improve its products and brand competitiveness in the offline market before entering into the Chinese online retail market. They need to prepare a localization model.

Three-dimensional Finite-difference Time-domain Modeling of Ground-penetrating Radar Survey for Detection of Underground Cavity (지하공동 탐지를 위한 3차원 시간영역 유한차분 GPR 탐사 모델링)

  • Jang, Hannuree;Kim, Hee Joon;Nam, Myung Jin
    • Geophysics and Geophysical Exploration
    • /
    • v.19 no.1
    • /
    • pp.20-28
    • /
    • 2016
  • Recently many sinkholes have appeared in urban areas of Korea, threatening public safety. To predict the occurrence of sinkholes, it is necessary to investigate the existence of cavity under urban roads. Ground-penetrating radar (GPR) has been recognized as an effective means for detecting underground cavity in urban areas. In order to improve the understanding of the governing physical processes associated with GPR wave propagation, and interpret underground cavity effectively, a theoretical approach using numerical modeling is required. We have developed an algorithm employing a three-dimensional (3D) staggered-grid finite-difference time-domain (FDTD) method. This approach allows us to model the full electromagnetic wavefield associated with GPR surveys. We examined the GPR response for a simple cavity model, and the modeling results showed that our 3D FDTD modeling algorithm is useful to assess the underground cavity under urban roads.

Performance of pilot-based signal detection for digital IoT doorlock system (디지털 도어락 시스템을 위한 파일럿 기반 신호검출 성능)

  • Lee, Sun Yui;Hwang, Yu Min;Sun, Young Ghyu;Yoon, Sung Hoon;Kim, Jin Young
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.723-728
    • /
    • 2018
  • This paper proposes a signal detection method for IoT door lock system which is a new application field of VLC (Visible Light Communication). This paper describes the signal detection technique for user recognition that needs to be overcome in order to apply VLC to door lock system which has a demand for new technology due to security issue. This system has security and high signal detection characteristics because it uses existing infrastructure to communicate with visible light. In order to detect the signal using FFT, the signal of the user who accesses the authentication channel based on the pilot signal is detected, and the performance of the false alarm probability and detection probability is shown in the channel model.