• Title/Summary/Keyword: 몰 시스템

Search Result 518, Processing Time 0.024 seconds

Analysis of Induced Voltage on the Gas Pipeline at the Fault in a Underground Power Cables (지중전력케이블에서 고장발생시 인근 가스배관에 유도되는 전압 해석)

  • Bae J. H.;Kim D. K.;Kim K. J.
    • Journal of the Korean Institute of Gas
    • /
    • v.4 no.3 s.11
    • /
    • pp.26-32
    • /
    • 2000
  • Because of the continuous growth of energy consumption, and also the tendency to site power lines and pipelines along the same routes, the close proximity of high voltage structures and metallic pipelines has become more and more frequent. Moreover, normal steady state and fault currents become higher as electric networks increase in size and power Therefore, there has been and still is a growing concern(safety of people marking contact with pipeline, risk of damage to the pipeline coating, the metal and equipment connected to pipeline, especially cathodic protection system) about possible hazards resulting from the influence of high voltage power system on metallic structures(gas pipeline, oil pipeline and water pipeline etc.). Therefore, we analyze the interference problems when the gas pipeline is buried with power cable in the same submarine tunnel. This paper present the results of the study about interference mechanism, AC corrosion limitation of safety voltage and analysis of induction voltage.

  • PDF

Implementation of Client Authentication System on Transparency Cache (투명 캐시에서의 사용자 인증 시스템 구현)

  • Kim, Seong-Rak;Gu, Yong-Wan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.181-188
    • /
    • 2002
  • There are recently a lot of inconvenience because every client should be set to the proxy server on the browser in order to control the access by means of the client authentication in the proxy server. The client authentication technology using the transparency cache in this paper will be transparently used for every user in the internet which option of the authentication function is simply set in the cache server. In addition, the administrator will get the benefit since he can control the traffic of each client and strengthen the security. And also, this system is expected to use in the eCRM deeply rotated to the tendency of the client in the field of the e-commerce like shopping mall in the internet since the administrator can monitor the pattern of the client using the internet. This technique can be applied to the company affiliated research center, the EC website, and the military where it is essential for the tight security even though there are no additional security devices.

Simultaneous Optimization Model of Case-Based Reasoning for Effective Customer Relationship Management (효과적인 고객관계관리를 위한 사례기반추론 동시 최적화 모형)

  • Ahn, Hyun-Chul;Kim, Kyoung-Jae;Han, In-Goo
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.2
    • /
    • pp.175-195
    • /
    • 2005
  • 사례기반추론(case-based reasoning)은 사례간 유사도를 평가하여 유사한 이웃사례를 찾아내고, 이웃사례의 결과를 이용하여 새로운 사례에 대한 예측결과를 생성하는 전통적인 인공지능기법 중 하나다. 이러한 사례기반추론이 최근 적용이 쉽고 간단하다는 장점과 모형의 갱신이 실시간으로 이루어진다는 점 등으로 인해, 온라인 환경에서의 고객관계관리를 위한 도구로 학계와 실무에서 주목을 받고 있다 하지만, 전통적인 사례기반추론의 경우, 타 인공지능기법에 비해 정확도가 상대적으로 크게 떨어진다는 점이 종종 문제점으로 제기되어 왔다. 이에, 본 연구에서는 사례기반추론의 성과를 획기적으로 개선하기 위한 방법으로 유전자 알고리즘을 활용한 사례기반추론의 동시 최적화 모형을 제안하고자 한다. 본 연구가 제안하는 모형에서는 기존 연구에서 사례기반추론의 성과에 중대한 영향을 미치는 요소들로 제시된 바 있는 사례 특징변수의 상대적 가중치 선정(feature weighting)과 참조사례 선정(instance selection)을 유전자 알고리즘을 이용해 최적화함으로서, 사례간 유사도를 보다 정밀하게 도출하는 동시에 추론의 결과를 왜곡할 수 있는 오류사례의 영향을 최소화하고자 하였다. 제안모형의 유용성을 검증하기 위해, 본 연구에서는 국내 한 전문 인터넷 쇼핑몰의 구매예측모형 구축사례에 제안모형을 적용하여 그 성과를 살펴보았다. 그 결과, 제안모형이 지금까지 기존 연구에서 제안된 다른 사례기반추론 개선모형들은 물론, 로지스틱 회귀분석(LOGIT), 다중판별분석(MDA), 인공신경망(ANN), SVM 등 다른 인공지능 기법들에 비해서도 상대적으로 우수한 성과를 도출할 수 있음을 확인할 수 있었다.

  • PDF

Sensitive Personal Information Protection Model for RBAC System (역할기반 접근제어시스템에 적용가능한 민감한 개인정보 보호모델)

  • Mun, Hyung-Jin;Suh, Jung-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.103-110
    • /
    • 2008
  • Due to the development of the e-commerce, the shopping mall such as auction collects and manages the personal information of the customers for efficient service. However, because of the leakage of the Personal information in auction, the image of the companies as well as the information subjects is damaged. Even though the organizations and the companies store the personal information as common sentences and protect using role based access control technique, the personal information can be leaked easily in case of getting the authority of the database administrator. And also the role based access control technique is not appropriate for protecting the sensitive information of the information subject. In this paper, we encrypted the sensitive information assigned by the information subject and then stored them into the database. We propose the personal policy based access control technique which controls the access to the information strictly according to the personal policy of the information subject. Through the proposed method we complemented the problems that the role based access control has and also we constructed the database safe from the database administrator. Finally, we get the control authority about the information of the information subject.

  • PDF

Design of visitor counting system using edge computing method

  • Kim, Jung-Jun;Kim, Min-Gyu;Kim, Ju-Hyun;Lee, Man-Gi;Kim, Da-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.75-82
    • /
    • 2022
  • There are various exhibition halls, shopping malls, theme parks around us and analysis of interest in exhibits or contents is mainly done through questionnaires. These questionnaires are mainly depend on the subjective memory of the person being investigated, resulting in incorrect statistical results. Therefore, it is possible to identify an exhibition space with low interest by tracking the movement and counting the number of visitors. Based on this, it can be used as quantitative data for exhibits that need replacement. In this paper, we use deep learning-based artificial intelligence algorithms to recognize visitors, assign IDs to the recognized visitors, and continuously track them to identify the movement path. When visitors pass the counting line, the system is designed to count the number and transmit data to the server for integrated management.

The Implementation of e-Learning System for the Dress Unit in the Subject of Technology & Home Economics in the Middle School (중학교 기술.가정과 옷차림 단원 학습을 위한 e-러닝 시스템 구현)

  • Lee, Young-Lim;Cho, Hyun-Ju
    • Journal of Korean Home Economics Education Association
    • /
    • v.21 no.2
    • /
    • pp.45-60
    • /
    • 2009
  • This study is intended to implement an e-Learning system assisted class for the dress unit in the subject of technology & home economics in the middle school. This class is aimed at making teaching-learning in the dress unit effective, triggering students' interest in it, enhancing their understanding and offering basic materials for the e-Learning development about clothing instruction in the subject of technology & home economics. To make the concrete situational learning effective and provide realistic learning environments, learning contents were implemented so that the learners themselves could manipulate the contents by clicking. How to wear clothing according to learners' individuality was presented in order to trigger the learners' attention and motivation using the latest clothing pictures from the Internet shopping mall, and the dress fashion pictures of their peers. The result of this study can be summed up as follows. First, the implementation of learning materials with which simulation manipulation and visualization were possible could make the students reach the learning goals easily. Second, teaching-learning activity could be made more effective using audios, images and moving pictures rather than written texts. Third, learning the dress unit, which is especially related with a new fashion, made the most of the advantage of e-Learning by providing realistic and lively learning materials in a timely manner. And it triggered learners' motivation by providing pictures or moving pictures related with their real life. Based on these research results, this study suggests further research to develop e-Learning contents using various multimedia authoring tools as well as the ones applied to this study in learning the dress unit. It also suggests that the database of teaching-learning materials be constructed to securely prepare abundant instruction materials.

  • PDF

Mixed Micellizations of TTAB with Other Surfactants (DTAB, CTAB, Tween-20, Tween-40, and Tween-80) (TTAB와 다른 계면활성제(DTAB, CTAB, Tween-20, Tween-40 및 Tween-80)와의 혼합미셀화에 대한 연구)

  • Lee, Nam-Min;Lee, Byung-Hwan
    • Journal of the Korean Chemical Society
    • /
    • v.56 no.5
    • /
    • pp.556-562
    • /
    • 2012
  • The critical micelle concentration (CMC) and the counter-ion binding constant (B) for the mixed micellizations of TTAB (tetradecyltrimethylammonium bromide) with other surfactants (DTAB, CTAB, Tween-20, Tween-40, and Tween-80) in aqueous solution of 4-chlorobenzoic acid (0.5 mM) at $25^{\circ}C$ were determined as a function of ${\alpha}_1$ (the overall mole fraction of TTAB) by using the spectrophotometric method and the conductivity method. Various thermodynamic parameters ($X_i$, ${\gamma}_i$, $C_i$, $a_i^M$, ${\beta}$, and ${\Delta}H_{mix}$) were calculated for each mixed surfactant system and compared with the other mixed surfactant systems by means of the equations derived from the nonideal mixed micellar model. The results show that TTAB/DTAB mixed system has a great positive deviation from the ideal mixed micellar model and the other mixed systems have great negative deviations from the ideal mixed model.

A Study on the Telemetry system for the Inhabitant Environments and Distribution of Fish-I - Sea Temperature , Salinity and Distribution of Fish - (어류의 서식환경과 분포생태의 원격계측에 관한 연구-I - 수온, 염분과 어류의 분포생태 -)

  • Sin, Hyeong-Il;An, Yeong-Hwa;Sin, Hyeon-Ok
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.33 no.4
    • /
    • pp.321-333
    • /
    • 1997
  • This paper describe on the transmitting/receiving functions and the monitoring effects for the telemetry system which is designed to monitor the environmental condition of a culturing fishery ground inside a bay. The telemetry experiments were carried out by the telemetry system which constructed with the sea water temperature/salinity measuring sensor and telesounder at culturing fishery ground located in the coast of Sangyang-Myon, Kyongsangnam-Do province from October, 1995 to May, 1996. The results of this experiment showed that the developed telemetry system could be used for monitoring the sea water temperature/salinity and the distribution of fish in culturing fishery ground.

  • PDF

A Study on Analysis of efficient Shelter Guide For Multiple-use Facilities (다중이용시설물에서의 효율적인 피난유도에 관한 현황 분석)

  • Park, In-Sook;Kim, Whoi-Yul;Kim, Byeoung-Su;Ahn, Byung-Ju;Lee, Yoon-Sun;Kim, Jae-Jun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.791-796
    • /
    • 2007
  • As large-scale buildings, skyscrapers, and multi-purpose buildings recently increase in numbers dramatically, the internal space of such buildings becomes more and more large and complicated accordingly. Since such structures usually accommodate a number of random people, the potential possibilities of disastrous tragedies are high, and the rates of injury and physical damage caused by the complicated system of the building also increase as well. However, most of the shelter designs of the existing buildings are based on the specifications according to the assigned laws and involved regulations. In this case, only general criteria are referred to regardless of the characteristics of each structure while other disaster-related features are not taken into consideration sufficiently. Since any actual fire may cause a terrible calamity, in such plans, shelter inducement can be neither safe nor effective. Thus, this study examines and analyzes currently run disaster prevention systems and shelter inducement facilities with COEX Mall as its subject, and analyzes the responding system to each situation based on the fire scenarios by means of As-Is Model. Through this analysis, presented are the measures to solve the problems of current disaster prevention systems and to improve shelter inducement methods effectively.

  • PDF

An Integrated QoS Management System for Large-Scale Heterogeneous IP Networks : Design and Prototype Implementation (대규모 이기종 IP 망의 통합품질관리 시스템의 설계 및 구현)

  • Choi, Tae-Sang;Chung, Hyung-Seok;Choi, Hee-Sook;Kim, Chang-Hoon;Jeong, Tae-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3633-3650
    • /
    • 2000
  • Internet is no longer a network for special communities but became a global means of communication infrastructure for everyday life. People are exchanging their personal messages using e-mails, students are getting their educational aids through the web, people are buying a variety of goods from cyber shopping malls, and companies are conducting their businesses over the Internet. Recently, such an explosive growth of the traffic in the Internet raised a big concern on how to accommodate ever-changing user's needs in terms of an amount of the traffic, characteristics of the traffic, and various service quality requirements, Over provisioning can be a simple solution but it is too expensive and inefficient. Thus many new technologies to solve this very difficult puzzle have bcen introduced recently, Any single solution, however, can be insufficient and a carefully designed architecture, which integrates a group of solutions, is required. In this paper, we propose a policy-based Internet QoS provisioning, traffic engineering and perfonnance management system as our solution to this problem. Our integrated management QoS solution can provide highly responsive flow-through service provisioning, more realistic service and resource policy control based on the real network performance information, and centralized control of traffic engineering for heterogeneous networks.

  • PDF