• Title/Summary/Keyword: 주석기반

Search Result 331, Processing Time 0.019 seconds

Residual Battery Capacity and Signal Strength Based Power-aware Routing Protocol in MANET (MANET에서 배터리 잔량과 신호세기를 동시에 고려한 Power-aware 라우팅 프로토콜)

  • Park Gun-Woo;Choi Jong-Oh;Kim Hyoung-Jin;Song Joo-Seok
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.219-226
    • /
    • 2006
  • The shortest path is only maintained during short time because network topology changes very frequently and each mobile nodes communicate each other by depending on battery in MANET(Mobile Ad-hoc Network). So many researches that are to overcome a limitation or consider a power have executed actively by many researcher. But these protocols are considered only one side of link stability or power consumption so we can make high of stability but power consumption isn't efficient. And also we can reduce power consumption of network but the protocol can't make power consumption of balancing. For that reason we suggest RBSSPR(Residual Battery Capacity and Signal Strength Based Power-aware Routing Protocol in MANET). The RBSSPR considers residual capacity of battery and signal strength so it keeps not only a load balancing but also minimizing of power consumption. The RBSSPR is based on AODV(Ad-hoc On-demand Distance Vector Routing). We use ns-2 for simulation. This simulation result shows that RBSSPR can extense lifetime of network through distribution of traffic that is centralized into special node and reducing of power consumption.

Anti-Reflection Coating Technology Based High Refractive Index Lens with Ultra-Violet Rays Blocking Function (반사방지 코팅기술 기반 자외선 차단 기능의 고굴절률 안경렌즈)

  • Kim, Ki-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.482-487
    • /
    • 2016
  • Ultra-violet rays are very harmful to eye health care. The blocking of ultra-violet rays and a reduction of optical reflection in the visible light range, which is to increase the share of transmitted light, and avoid the formation of ghost images in imaging, are important for the applications of polymer eyeglasses lenses. In this study, the high-refractive index polymer lenses, n=1.67, were fabricated by injection-molded method with the xylene diisocyanate monomer, 2,3-bis-1-propanethiol monomer, and benzotriazol UV absorber (SEESORB 709) mixture. To reduce the reflection of the polymer lens surfaces, multi-layer anti-reflection (AR) coatings were coated for both sides of the polymer lens using an E-beam evaporation system. The optical properties of the UV blocking polymer lens were characterized using a UV-visible spectrometer. The material properties of the thin films, which were composed AR coating layers, refractive index, and surface roughness, were analyzed by ellipsometry and atomic force microscopy. As a result, the fabricated polymer lens perfectly blocked ultra-violet rays below 395 nm with a blocking rate greater than 99%.

A study on the effect of SME IT resource on performance (중소기업의 IT자원이 업무성과에 미치는 영향에 관한 연구)

  • Jin, Jeongsuk;Park, Jooseok;Park, Jaehong
    • The Journal of Bigdata
    • /
    • v.4 no.2
    • /
    • pp.141-158
    • /
    • 2019
  • Based on RBV(Resource Based View), IT of SMEs classified into IT resource and capabilities. And We confirmed that capabilities and resources affected each performance. In other words, based on the questionnaire of SMEs and IT professionals, divides capability from the overall IT resource that are possessed by SMEs. Among the four attributes (value, rare, non-substitutability, imperfect imitability) presented by Barney (1991), this study targeted at value and imperfect imitability and investigated how SMEs recognize IT resource and capability. Furthermore, this study tests how IT resource and capability influence corporate performance. The result of this study finds that resources that are needed on "Knowledge-based" are classified into IT capability, otherwise classified into IT resource. Analysis shows that server, DB(database), system administrators, programmers, CIO, BA were capabilities, Desktop PC, PC software, software for salary and accounting management, e-commerce, Homepage, and network inside th enterprise were resources. Secondly, this study reveals that both IT resource and IT capability affected company performance (employee satisfaction, CEO satisfaction). IT is certainly having an impact on corporate performance. In conclusion, resource can be either IT resource or IT capability based on they way of utilization. And both IT resource and IT capability have an influence on corporate performance (employee job satisfaction, CEO satisfaction). Therefore, when considering IT investment, a company can purchase necessary IT resource and actively utilize it to be IT capability, which can have an influence on corporate performance in return.

  • PDF

Comparisons of Middle-, Old-, and Stroked Old-Age Drivers' Reaction Time and Accuracy Based on Multiple Reaction Time Tasks (중다 반응시간 과제에 기반한 중년, 고령 및 뇌졸중 고령 운전자의 반응시간과 반응정확성에서의 차이 비교)

  • Lee, Jaesik;Joo, Mijung;Kim, Jung-Ho;Kim, Young-Keun;Lee, Won-Young;Ryu, Jun-Beom;Oh, Ju-Seok
    • Science of Emotion and Sensibility
    • /
    • v.20 no.1
    • /
    • pp.115-132
    • /
    • 2017
  • Differences in reaction time and accuracy were compared among driver groups of middle-, old-, and stroke old-age drivers using various reaction time tasks including simple reaction task, 2-choice task, 4-choice task with different stimuli eccentricity, search task, and moving target detection task. The results can be summarized as followings. First, although overall reaction time tended to be slowed with age and stroke, stroke old drivers showed significantly slower reaction time than the other driver groups when the stimuli were presented in a large eccentricity. Second, differences in reaction time for 2-choice task and moving target detection task seemed to be determined mainly by participants' simple reaction time. Third, the search task which required temporary retention of previously presented stimuli was found to be more sensitive in discriminating difference in reaction time between middle-age drivers and old-age drivers (including stroke old drivers). Fourth, reaction accuracy of old (and stroke old) drivers decreased when more stimuli alternatives were presented and temporary retention for stimuli was required. Altogether, memory demand in reaction time task can be sensitive to evaluate performance for different age groups, whereas size of useful field of view for brain stroke.

Forward/Reverse Engineering Approaches of Java Source Code using JML (JML을 이용한 Java 원시 코드의 역공학/순공학적 접근)

  • 장근실;유철중;장옥배
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.1_2
    • /
    • pp.19-30
    • /
    • 2003
  • Based upon XML, a standard document format on the web, there have been many active studies on e-Commerce, wireless communication, multimedia technology and so forth. JML is an XML application suitable for understanding and reusing the source code written using JAVA for various purposes. And it is a DTD which can effectively express various information related to hierarchical class structures, class/method relationships and so on. This paper describes a tool which generates JML document by extracting a comment information from Java source code and information helpful for reusing and understanding by JML in terms of the reverse engineering and a tool which generates a skeleton code of Java application program from the document information included in the automatically or manually generated JML document in terms of the forward engineering. By using the result of this study, the information useful and necessary for understanding, analyzing or maintaining the source code can be easily acquired and the document of XML format makes it easy for developers and team members to share and to modify the information among them. And also, the Java skeleton coed generated form JML documents is a reliable robust code, which helps for developing a complete source code and reduces the cost and time of a project.

Induction of the High Order Calibration Equation of Metal Oxide Semiconductor Gas Sensors (산화물 반도체식 가스센서의 입출력 고차 캘리브레이션 방정식 도출)

  • Park, Gyoutae;Kim, Kangmin;Lee, Hyeonggi;Yoon, Myeongsub
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.2
    • /
    • pp.44-49
    • /
    • 2020
  • In this paper, a measuring circuit is designed through analyzing manufacture specification of the sensor based on MOS. And the best input-output polynomial are induced that really gas sensors are used in gas safety management industrial fields. Response characteristics of a MOS gas sensor is analysed by through sensor's output voltages are measured after standard gases with six kinds of concentrations are manufactured and are injected to the sensor. A lookup table is created by relations of sensor's output voltages by injecting gases with other concentrations. Because data of the formed lookup table are equal interval, a polynomial can be induced of method of approximation function. So the 5th polynomial of input-output for a sensor is defined, coefficients are calculated by using least squares method, and the 5th polynomial is completed for representing characteristics of the sensor. If the proposed polynomial is applied to gas leak detectors, an inverse transformation of polynomial and programing of array codes are recreated. In this research, polynomial is implemented with array types that intervals of values of a lookup table are one-fifth sampled and interpolated. The performance of proposed 5th calibration equation is verified that errors are reduced than a linear expression when tests are performed by measurement of concentrations against injection of standard gases.

The Exploratory Study on the Method of Information System Introduction in SMEs using Delphi Technique (델파이 기법을 이용한 중소기업의 정보시스템 도입방법에 관한 탐색적 연구)

  • Kim, Narang;Joo, Seok Jeong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.1
    • /
    • pp.47-58
    • /
    • 2013
  • This study offers a $3{\times}2$ matrix on the development method pursuant to the level of readiness and necessity for IS of SMEs, and the Delphi method survey through the assistance of a panel of IT experts was employed. Upon analyzing the results, in all rounds, the 1st quadrant and 2nd quadrant resulted in a preference for leasing methods (ASP/SaaS) and the other quadrants resulted in a preference for outsourcing. Quadrants closer to the 1st quadrant showed a preference for leasing methods (ASP/SaaS) and quadrants closer to the 6th quadrant showed a preference for outsourcing. In the case of the IS implementation for the entire company, all three levels of readiness resulted in a preference for outsourcing. The point in which the implementation method changed depending on the level of readiness was when unit systems were implemented, and among the implementation methods, in-house development showed the lowest results.

The Study on the Network Targeting Using the Non-financial Value of Customer (고객의 비재무적 가치를 이용한 네트워크 타겟팅에 관한 연구)

  • Kim, Jin;Oh, Yoon-Jo;Park, Joo-Seok;Kim, Kyung-Hee;Lee, Jung-Hyun
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.2
    • /
    • pp.109-128
    • /
    • 2010
  • The purpose of our research is to figure out the 'non-financial value' of consumers applying networks amongst consumer groups, the data-based marketing strategy to the analysis and delve into the ways for enhancing effectives in marketing activities by adapting the value to the marketing. To verify the authenticity of the points, we did the empirical test on the consumer group using 'the Essence Cosmetics Products' of high involvement that is deeply affected by consumer perceptions and the word-of-mouth activities. 1) The empirical analysis reveals the following features. First, the segmented market for 'Essence Consumer' is composed of several independent networks, each network shows to have the consumers that is high degree centrality and closeness centrality. Second, the result proves the authenticity of the non-financial value for boosting corporate profits by the high degree centrality and closeness centrality consumer's word-of-mouth activities. Lastly, we verify that there lies a difference in the network structure of 'Essence Cosmetics Market'per each product origin(domestic, foreign) and demographic characteristics. It does, therefore, indicate the need to consider the features applying mutually complementary for the network targeting.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

Performance Evaluation of VoIP Secure Communication Protocols based on SIP in Mobile Environment (모바일 환경에서 적용 가능한 SIP기반 인터넷전화(VoIP) 보안 통신 프로토콜 성능 평가)

  • Yoon, Seok-Ung;Jung, Hyun-Cheol;Che, Xuemei;Chu, Gyeong-Ho;Park, Han;Baek, Jae-Jong;Song, Joo-Seok;Yoo, Hyeong-Seon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.143-150
    • /
    • 2011
  • The adoption of VoIP is continuously increasing in public institutions, private enterprises and households due to cheaper cost and various supplementary services. Also, it is expected to spread widely the use of VoIP in mobile environment through the increasing use of smartphone. With the growing concern over the incidents of VoIP service while the VoIP service has become increasingly. Especially eavesdropping, it is possible to invade user privacy and drain the secret of company. So, it is important to adopt the protocols for VoIP secure communication. VoIP security protocols are already adopted in public institutions, but it is not adopted in private enterprises and households. In addition, it is necessary to verify whether the VoIP security protocol could be adopted or not in mobile VoIP due to its limited computing power. This paper compared the VoIP security protocol under fixed network and mobile network through performance evaluation. Finally, we found that it is possible to adopt the VoIP security protocols in mobile network.