• Title/Summary/Keyword: 자원최적화

Search Result 829, Processing Time 0.038 seconds

A study on Strategic Fitness of Digital Transformation and Competitive Strategy (디지털 트랜스포메이션의 경쟁전략과의 적합성에 관한 연구)

  • Noh, Kyoo-Sung
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.257-265
    • /
    • 2021
  • Although researches on digital transformation and competitive strategies are active, but research or alternatives considering fitness between them are still insufficient. Therefore, this study aims to identify the relationship between the types of digital transformation project and the innovation of competitive strategies, and to suggest strategic implications and alternatives for how to utilize digital transformation when establishing a competitive strategy. To this end, this study first derived 14 types of digital transformation in 4 areas through literature research. Then, the relevance of digital transformation and competitive strategy identified through previous studies and case analysis was identified, an effective link between competition strategy and digital transformation, and optimization of fitness between competition strategy and internal resources were presented. This study contributed in that it attempted to advance research on competitive strategies in an academic perspective by approaching them from the perspective of strategic fitness about digital transformation. In addition, in the industrial aspect, it contributed to the fact that it supported the systematic implementation of the competitive strategic response of companies that had to deal with the situation where they wanted to promote digital transformation wisely from the viewpoint of fitness.

Electrochmical Performance of Silicon/Carbon Anode Materials for Li-ion Batteries by Silicon Content (실리콘 함량에 따른 리튬이온전지용 실리콘/탄소 음극소재의 전기화학적 특성)

  • Choi, Yeon-Ji;Kim, Sung-Hoon;Ahn, Wook
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.338-344
    • /
    • 2022
  • It is necessarily required in developing Si-based anode materials for lithium ion batteries, and the related researches are actively working especially in Si-carbon composite material. On the other hand, the photovoltaic and semiconductor industries discard huge amount of Si resources, facing the environmental issue. In this study, recycled Si resource is adopted to obtain Si-carbon composite for LIB(Lithium-Ion Batteries). In order to improve high-capacity retention characteristics and cycle stability of a Si anode material for the LIB, two differenct composites having a mass ratio of silicon and pitch of 1:1 and 2:1 are synthesized and electrochemical characteristics of the anode material manufactured by simple self-assembly method. This result in excellent initial capacity with stable cycle life, and confirming the potential use of recycled Si material for LIB.

Hybrid Trust Computational Model for M2M Application Services (M2M 애플리케이션 서비스를 위한 하이브리드형 신뢰 평가 모델)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.53-62
    • /
    • 2020
  • In the end-user domain of an IoT environment, there are more and more intelligent M2M devices that provide resources to create and share application services. Therefore, it can be very useful to manage trust by transferring the role of the existing centralized service provider to end users in a P2P environment. However, in a decentralized M2M computing environment where end users independently provide or consume services, mutual trust building is the most important factor. This is because malicious users trying to build malfunctioning services can cause security problems in M2M computing environments such as IoT. In this paper, we provide an integrated analysis and approach for trust evaluation of M2M application services, and an optimized trust evaluation model that can guarantee reliability among users of the M2M community.

Lightweight AES-based Whitebox Cryptography for Secure Internet of Things (안전한 사물인터넷을 위한 AES 기반 경량 화이트박스 암호 기법)

  • Lee, Jin-Min;Kim, So-Yeon;Lee, Il-Gu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1382-1391
    • /
    • 2022
  • White-box cryptography can respond to white-box attacks that can access and modify memory by safely hiding keys in the lookup table. However, because the size of lookup tables is large and the speed of encryption is slow, it is difficult to apply them to devices that require real-time while having limited resources, such as IoT(Internet of Things) devices. In this work, we propose a scheme for collecting short-length plaintexts and processing them at once, utilizing the characteristics that white-box ciphers process encryption on a lookup table size basis. As a result of comparing the proposed method, assuming that the table sizes of the Chow and XiaoLai schemes were 720KB(Kilobytes) and 18,000KB, respectively, memory usage reduced by about 29.9% and 1.24% on average in the Chow and XiaoLai schemes. The latency was decreased by about 3.36% and about 2.6% on average in the Chow and XiaoLai schemes, respectively, at a Traffic Load Rate of 15 Mbps(Mega bit per second) or higher.

Restriction of groundwater drawdown levels in one representative drought-prone zone (상습가뭄지역 지하수위 한계치 설정 연구)

  • Lee, Byung Sun;Myoung, Wooho;Lee, Gyu Sang;Song, Sung-Ho;Ha, Kyoochul
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.31-31
    • /
    • 2020
  • 가뭄 발생 시 국내 농어촌 지자체 대부분은 추가 수원공 확보를 위한 긴급 대책으로 신규 관정을 개발하거나, 저수지와 하천을 준설하여 가뭄 수요에 대응하는 편이다. 이러한 방법은 즉시 대응에는 효과가 있지만, 고가의 비용이 소요되고, 무엇보다도 국지적으로 가뭄이 빈번하게 발생하는 지역에는 적용에 한계가 있다. 이러한 한계를 극복하기 위하여, 최근 기설 관정을 연계 이용하여 지하수 공급 극대화를 도모하는 기술이 제안되었다. 그런데 기설 관정 연계 이용 시 가장 중요한 사항은 모든 관정에서 최대 양수량을 유지하며 지하수를 공급할 수 있도록 관리해야 하는 점이며, 특히 암반관정의 과잉양수로 인한 간섭현상으로 충적관정이 고갈되어 공급가능한 지하수 수량이 오히려 감소되는 것을 사전에 방지하여야 한다. 이 연구에서는 가뭄 발생 시 암반관정(양수정)에서 최대로 양수했을 때에도 주변 충적관정의 양수능이 유지되는 최소 지하수위를 「지하수위 저하 한계치」로 지정하여 관정 연계 이용의 최적화를 도모하였다. 지하수위 저하 한계치 산정을 위하여, Theis의 자유면 대수층 정상류 우물수리 방정식과 지하수영향반겅 설정에 관한 경험식(Schultz, Weber, Kozeny 및 Jacob 경험식)을 이용하였다. 그런데 지정된 지하수위 저하 한계치는 충적관정의 지하수위이므로, 암반관측공만 소재하는 지역에 대해서는 충적층 지하수위 변동과 암반층 지하수위 변동 간의 상관분석을 통해 암반 관측공의 지하수위 저하 한계치를 추정하였다. 이후, 양수시험 자료(양수정과 주변 관측공의 수위변동 자료)를 이용하여 지하수 대수층의 이방성을 확인하였고, 이를 통해 암반관정의 양수에 따른 간섭을 크게 받는 충적관정과 그렇치 않은 충적관정을 구분하여 이방성에 따른 지하수위 저하 한계치를 수정하고, 상습가뭄 발생지역의 암반관정과 충적관정의 최적 지하수 양수를 도모하였다.

  • PDF

Study on the size-based separation of nano to micron particles in natural water and soil using flow and sedimentaion Field-flow fractionation (흐름 및 침강 장-흐름 분획법에 의한 자연수 및 토양 중 나노 크기로부터 마이크론 입자들의 크기별 분리에 관한 연구)

  • Eum, Chul Hun;Kang, Dong Young;Lee, Tae Woo;Lee, Seungho
    • Analytical Science and Technology
    • /
    • v.22 no.1
    • /
    • pp.75-81
    • /
    • 2009
  • A flow and sedimentation field-flow fractionation method has been used to characterize colloidal particles in environmental samples. The opposed flow sample concentration (OFSC) method was employed. The OFSC procedure was optimized for the analysis of particles in ground water with respect to various experimental parameters including sample introduction time, flow rates, etc. The effectiveness in low concentration and characterization of the OFSC-FlFFF was demonstrated with GW-1 and GW-2 ground water samples. Ground water of upto 100 mL has been successfully loaded, concentrated, and characterized by OFSC-FlFFF. The OFSC technique allow the application of FlFFF possible for the separation and characterization of colloidal particles in very low concentrations. The results show FFF provides a simplified alternative to existing off-line concentration procedures, and shows a high potential for the applications to the analysis of dilute colloidal particles in the environmental samples.

A Study on the Operation and System Improvement of Cyber Security Center (사이버보안관제센터 운영 및 제도 개선에 관한 연구)

  • Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.39-45
    • /
    • 2024
  • The purpose of security control in the public sector is to secure the safety of administrative services for the public by preventing resource loss or information infringement in information systems and information and communication networks. The security control system is a process that performs real-time detection, analysis, response, and reporting through system vulnerability analysis and security system detection pattern optimization. This study aims to objectively identify the current situation of the mismatch between the supply and demand of cyber security control centers currently in operation and specialized security control companies that can be entrusted to operate them, and to derive and propose practical and institutional improvement measures. Considering that the operation of security control centers in the public sector is expected to increase in the future, research on the practical supplementation required for the operation process of security control centers and the improvement of the designation system of security control specialized organizations has fundamental and timely significance, and it is an area that requires continuous research in terms of strategic industrialization.

Comparative Analysis and Validation of CSRF Defense Mechanisms in Spring Security and Apache Shiro (Spring Security와 Apache Shiro의 CSRF 공격 방어 기법 비교 분석 및 검증)

  • Jj-oh Kim;Da-yeon Namgoong;Sanghoon Jeon
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.79-87
    • /
    • 2024
  • This paper addresses the increasing cyber attacks exploiting security vulnerabilities in software due to the rise in web applications. CSRF (Cross-Site Request Forgery) attacks pose a serious threat to web users and developers and must be prevented in advance. CSRF involves performing malicious requests without the user's consent, making protection methods crucial for web applications. This study compares and verifies the CSRF defense performance of two frameworks, Spring Security and Apache Shiro, to propose an effectively applicable framework. The results show that both frameworks successfully defend against CSRF attacks; however, Spring Security processes requests faster, averaging 2.55 seconds compared to Apache Shiro's 5.1 seconds. This performance difference stems from variations in internal processing methods and optimization levels. Both frameworks showed no significant differences in resource usage. Therefore, Spring Security is more suitable for environments requiring high performance and efficient request processing, while Apache Shiro needs improvement. These findings are expected to serve as valuable references for designing web application security architectures

A Comparative Study of Classification Systems for Organizing a KOS Registry (KOS 레지스트리 구조화를 위한 분류체계 비교 연구)

  • Ziyoung Park
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.58 no.2
    • /
    • pp.269-288
    • /
    • 2024
  • To structure the KOS registry, it is necessary to select a classification system that suits the characteristics of the collected KOS. This study aimed to classify domestic KOS collected through various classification schems, and based on these results, provide insights for selecting a classification system when structuring the KOS registry. A total of 313 KOS data collected via web searches were categorized using five types of classification systems and a thesaurus, and the results were analyzed. The analysis indicated that for international linkage of the KOS registry, foreign classification systems should be applied, and for optimization with domestic knowledge resources or to cater to domestic researchers, domestic classification systems need to be applied. Additionally, depending on the field-specific characteristics of the KOS, research area KOS should apply classification systems based on academic disciplines, while public sector KOS should consider classification systems based on government functions. Lastly, it is necessary to strengthen the linkage between domestic and international KOS, which also requires the application of multiple classification systems.

Exploring sustainable packaging design (지속 가능한 포장 디자인 탐구)

  • AN BOWEN
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.495-499
    • /
    • 2024
  • This article summarizes the importance, definition, key strategies and future directions of sustainable packaging design.In modern society, sustainable packaging design is not only concerned with environmental protection and resource conservation, but also involves economic, social and cultural sustainable development.This paper explores strategies to reduce environmental burden and promote ecological balance by using environmentally friendly materials, optimizing packaging design, improving packaging recyclability and reuse. In addition, the article emphasizes the importance of design innovation, such as adopting a simplified design concept and modular system, as well as increasing the versatility of packaging.It also explores the application of life cycle assessment in packaging design to ensure that every step from design to disposal minimizes environmental impact. Finally, despite the environmental and social benefits that sustainable packaging design brings, it still faces technical, economic and regulatory challenges in practice.Future design will require interdisciplinary collaboration, integration of advanced technologies, consumer education and engagement, and enhanced policy and standard-setting to promote widespread adoption and practice of sustainable packaging.