• Title/Summary/Keyword: 물리적 제약성

Search Result 209, Processing Time 0.025 seconds

Design of Information Appliances Based on User's Preference - in the Case of Information Retrieval Method for Pedestrians' Navigation - (정보기기 디자인에 있어서 사용자의 감성을 고려한 콘텐츠 개발방법 - 보행자의 이동지원을 목적으로 한 감성정보검색을 사례로 -)

  • Kim, Don-Han
    • Archives of design research
    • /
    • v.20 no.3 s.71
    • /
    • pp.203-214
    • /
    • 2007
  • This study proposes an information retrieval method reflecting the user's preferences based on the fuzzy set theory to develop information contents which support pedestrian's navigation. Firstly, the research evaluated subjects' preferences on commercial spaces set to a hypothetical destination. Also it surveyed the causal relationship between the visual characteristics and the emotional characteristics to propose methods of Navigation Knowledge Base (NKB). The NKB was composed of three elements; 1. the correlation model between emotional characteristics, 2. the causal relationship between visual characteristics and emotional characteristics, 3. the transformation model between visual characteristics and the physical characteristics. Secondly, this study classified the pedestrian's destination search into 4 types with his or her preferences and the time conditions limited during navigation. For each type it presented the Destination Search Algorithm (DSA). Finally, the research simulated the destination search in 4 navigation types using NKB and DSA and verified the availability of the information retrieval method reflecting pedestrian's preferences. In conclusion, the proposed information search method will be applied to reflect the user's preferences to develop information appliances.

  • PDF

Proposal of security method using financial transactions and OTP (금융거래와 LFSR를 활용한 보안 방식 제안)

  • Kim, Ki-hwan;Parkn, Seong-hwan;Yu, Seo-yeong;Lee, Hoon-jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.41-44
    • /
    • 2019
  • Most of the financial transactions in modern society are traded online, and offline transactions can be made with cards and smart phones in addition to cash transactions. The advantage of monetary transactions on-line is that the purchasing process is simple, volume increases due to cash, and mobility degradation factors such as weight disappear. However, the online environment has no limitation on the physical distance, and there is a problem that if personal information is exposed to another person, it can be directly connected with financial loss. Of course, in most financial sectors, there is no problem because security policies are prepared for financial accidents. In this paper, we show that it is possible to prevent stealing of encrypted information and to operate with a simple structure by arbitrarily changing the fixed card number, expiration date, and CVC every time using OTP.

  • PDF

Application of linear array microtremor survey for rock mass classification in urban tunnel design (도심지 터널 암반분류를 위한 선형배열 상시진동 탄성파탐사 적용)

  • Cha Young Ho;Kang Jong Suk;Jo Churl Hyun;Lee Kun
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2005.05a
    • /
    • pp.157-164
    • /
    • 2005
  • Urban conditions such as underground facilities and ambient noises due to cultural activity restrict the application of conventional geophysical techniques in general. We used the refraction microtremor (REMI) technique as an alternative way to get the geotechnical information, in particular shear-wave (S-wave) velocity information, at a site along an existing rail road. The REMI method uses ambient noises recorded using standard refraction equipment to derived shear-wave velocity information at a site. It does a wavefield transformation on the recorded wavefield to produce Rayleigh wave dispersion curve, which are then picked and modeled to get the shear-wave velocity structure. At this site the vibrations from the running trains provided strong noise sources that allowed REMI to be very effective. REMI was performed along the planned new underground rail tunnel. In addition, Suspension PS logging (SPS) were carried out at selected boreholes along the profile in order to draw out the quantitative relation between the shear wave velocity from the PS logging and the rock mass rating (RMR) determined from the inspection of the cores recovered from the same boreholes, These correlations were then used to relate the shear-wave velocity derived from REMI to RMR along the entire profile. The correlation between shear wave velocity and RMR was very good and so it was possible to estimate the RMR of the total zone of interest for the design of underground tunnel,

  • PDF

Analysis of Security Technology for Internet of things (사물인터넷 보안 기술 분석)

  • Lee, Ho-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.43-48
    • /
    • 2017
  • Today our society is approaching new intelligence information society, which has been caused by the Fourth Industrial Revolution along with the development of information and communication technology(ICT). And this has just opened a new era of Internet of Things(IoT) that connects between human and objects and between objects through network, allowing transmission and reception of information beyond the limits of space. However, many crises occurred in the existing communication environment may threaten the security of Internet of Things, by violating the three components of information security. In this paper, this study aims to analyze security technology to achieve advanced security by dividing IoT security technology for coping with security vulnerability found in different components into three groups.

Development of Stochastic Markov Process Model for Maintenance of Armor Units of Rubble-Mound Breakwaters (경사제 피복재의 유지관리를 위한 추계학적 Markov 확률모형의 개발)

  • Lee, Cheol-Eung
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.25 no.2
    • /
    • pp.52-62
    • /
    • 2013
  • A stochastic Markov process (MP) model has been developed for evaluating the probability of failure of the armor unit of rubble-mound breakwaters as a function of time. The mathematical MP model could have been formulated by combining the counting process or renewal process (CP/RP) on the load occurrences with the damage process (DP) on the cumulative damage events, and applied to the armor units of rubble-mound breakwaters. Transition probabilities have been estimated by Monte-Carlo simulation (MCS) technique with the definition of damage level of armor units, and very well satisfies some conditions constrained in the probabilistic and physical views. The probabilities of failure have been also compared and investigated in process of time which have been calculated according to the variations of return period and safety factor being the important variables related to design of armor units of rubble-mound breakwater. In particular, it can be quantitatively found how the prior damage levels can effect on the sequent probabilities of failure. Finally, two types of methodology have been in this study proposed to evaluate straightforwardly the repair times which are indispensable to the maintenance of armor units of rubble-mound breakwaters and shown several simulation results including the cost analyses.

Design and Implementation of the Simulator for Evaluating the Performance of Container Cranes (컨테이너크레인 성능평가를 위한 시뮬레이터 설계 및 구현)

  • Won, Seung-Hwan;Choi, Sang-Hei
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.3
    • /
    • pp.119-136
    • /
    • 2009
  • According to the increase of container flows and the appearance of large-sized container vessels, the container handling equipment in ports is evolving continuously. This research introduces the simulation model for evaluating in detail the mechanical productivity of container cranes. The model considers a single trolley and dual trolleys as the mechanism of a container crane and a single lift, a twin lift, and a tandem lift as the spreader type of it. Additionally, the detail specifications such as the dimension and the speed of a container crane are inputted and the kinematic characteristics of it are simulated. The model also considers the size of a vessel, the storage position of containers in the vessel, and the weight of containers as external physical constraints. Experimental conditions can be configured conveniently because various parameters in the model are separated. Moreover, the model can accommodate flexibly new equipment types and the changes of the existing equipment because it is designed and developed in object-oriented concept.

  • PDF

A Business System Analysis Model with Extended Entity Concept (확장된 개체 개념의 비즈니스 시스템 분석 모델)

  • Lee, Seo-Jeong;Ko, Byung-Sun;Choi, Mi-Sook;Park, Jai-Nyun
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.12
    • /
    • pp.885-895
    • /
    • 2001
  • Existing system analysis models suggest various ideas to present entity relations and event flows for consistency between analysis and design paradigms. However, they are preferred to derive and arrange related entities on system flow than to identify entities. To identify entities systematically is a basic and important work of software development, and identified entities can be major assets of business system. In case of business systems the business rules or the computed or derived information like attendance lists of lecture system can be the most important system assets. The management information or meta data are also. In this paper, we suggest a business system analysis models to derive and present entities. System is identified entities, interfaces and event or behaviors through this model then entities are extended to independent entities, dependent entities, which are dependent to independent entities, constraint shows the physical and administrative notices. Various entity identification can reduce the incompleteness of entity analysis.

  • PDF

Smartwork Wired Wireless System Security Design (스마트워크의 유·무선시스템 보안설계)

  • Cheon, Jae-Hong;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.346-348
    • /
    • 2017
  • The speed of technology development is increasing, and high-performance digital devices are spreading. Smart walks that can work effectively anytime and anywhere by being restricted from space and time in wired digital devices such as PC, System security design is needed to secure integrity and availability against various security threats such as physical threats such as lost, stolen and damaged terminals, technical threats such as theft, denial of service, and unauthorized access, compared with the wired environment. In this paper, we analyze smart work network system, wired / wireless link system, and digital smart device. We study security design method for smart work wired system and future wireless system which are used in present work. This study will be used as basic data for building a secure smart work.

  • PDF

Cyber-attack and Cybersecurity Design for a Smart Work System (스마트워크 시스템을 위한 사이버 공격 및 사이버 보안 설계)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.207-214
    • /
    • 2019
  • The speed of technological development is increasing, and high-performance digital devices are spreading. Wired digital devices such as PCs have been optimized for existing wired environments, but needs are shifting away from the constraints of space and space to smart work that enables efficient work anywhere and anytime. The Smart Work System security design is needed to secure integrity and availability in the face of various security threats including physical threats (lost, stolen, and damaged terminals), technical threats (data theft, DoS: denial of service), and unauthorized access outside the wired environment. In this study, we analyzed smart work network systems, wired / wireless link systems, and digital smart devices. We also studied cyber-attack analysis and cybersecurity design methods for a Smart Work wired system and a future wireless system. This study will be used as basic data for building a secure Smart Work system.

Collaborative Stepwise Movement of Mobile Sensor Nodes for Energy Efficient Dynamic Sensor Network Coverage Maintenance (모바일 센서노드들의 협동형 단계적 이동기법 기반의 에너지 효율적인 동적 센서네트워크 커버리지 관리)

  • Han, Ngoc-Soc;Kim, Seong-Whan
    • The KIPS Transactions:PartC
    • /
    • v.16C no.4
    • /
    • pp.535-542
    • /
    • 2009
  • Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed autonomous devices, using sensors to cooperatively monitor physical or environmental conditions. WSNs face the critical challenge of sustaining long-term operation on limited battery energy. Coverage maintenance has been proposed as a promising approach to prolong network lifetime. Mobile sensors equipped with communication devices can be leveraged to overcome the coverage problem. In this paper, we propose a stepwise movement scheme using perimeter coverage property for the coverage maintenance problem. In our scheme, each sensor monitors neighboring dead nodes, determines vulnerable node (i.e. dead node which makes uncovered area), computes the center of uncovered area HC, and makes a coordinated stepwise movement to compensate the uncovered area. In our experimental results, our scheme shows at least 50 % decrease in the total moving distance which determines the energy efficiency of mobile sensor.