• Title/Summary/Keyword: 컴퓨터기술

Search Result 11,409, Processing Time 0.041 seconds

A Study on the Application of Composites to Pipe Support Clamps for the Light-weight LNGC (LNGC 경량화를 위한 파이프 지지용 클램프의 복합소재 적용 연구)

  • Bae, Kyong-Min;Yim, Yoon-Ji;Yoon, Sung-Won;Ha, Jong-Rok;Cho, Je-Hyoung
    • Composites Research
    • /
    • v.34 no.1
    • /
    • pp.8-15
    • /
    • 2021
  • In the shipbuilding and marine industry, as a technology for reducing the weight of parts to reduce energy and improve operational efficiency of ships is required, a method of applying fibers-reinforced composites which is high-strength lightweight materials, as part materials can be considered. In this study, the possibility of applying fibers-reinforced composites to the pipe support clamps was evaluated to reduce the weight of LNGC. The fibers-reinforced composites were manufactured using carbon fibers and glass fibers as reinforcing fibers. Through the computer simulation program, the properties of the reinforcing materials and the matrix materials of the composites were inversely calculated, and the performance prediction was performed according to the change in the properties of each fiber lamination pattern. In addition, the structural analysis of the clamps according to the thickness of the composites was performed through the finite element analysis program. As a result of the study, it was confirmed that attention is needed in selecting the thickness when applying the fibers-reinforced composites of the clamp for weight reduction. It is considered that it will be easy to change the shape of the structure and change the structure for weight reduction in future supplementary design.

Trends and Synchronization of Transaction Amounts by Product group of Online Malls in Online Shopping Malls (온라인쇼핑몰에서 Online몰의 상품군별 거래액 동향과 동조화 현상)

  • Choi, Soo-Ho;Choi, Jeong-Il
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.151-160
    • /
    • 2021
  • The purpose of this study is to classify online shopping malls into total transaction amount and transaction amount by product, and compare them to find synchronism. The data used in this study were collected from KOSIS for Food Services, Home Appliances·Electronics·Communication devices, Food & Beverages, House_Goods, Clothing, Computers & Peripheral Devices. The analysis period is a total of 44 monthly data from January 2017 to August 2020. In descriptive statistics, variability is relatively very stable in the case of food service, but is large in the case of clothing. In the correlation analysis, the total transaction amount shows a certain level of correlation with each product. In the analysis of the increase rate, Food Service increased by 1,039%, Home Appliances·Electronics·Communication devices increased by 325%, Food & Beverages increased by 296% and House Goods by 250%, but Clothing decreased slightly to 92.56%. In the Scatter Charts analysis, the distribution of Total transaction amount & House Goods, Total transaction amount & Home Appliances·Electronics·Communication devices is generally upward, showing a high level of synchronization. Due to Corona 19, we will have to continue our efforts to provide speed, stability, convenience and various services in preparation for the increase in transaction volume of online shopping malls.

Opportunities and Challenges for Vietnam in AEC (AEC 출범 이후 베트남 경제의 기회와 도전)

  • Beak, Yong Hun
    • International Area Studies Review
    • /
    • v.21 no.4
    • /
    • pp.101-124
    • /
    • 2017
  • This study is to examine the current situation of the AEC (ASEAN Economic Community) and analyze macroeconomic situation of Vietnam since the launch of AEC. According to recent trade indicators, Vietnam is expected to be more productive in the manufacturing and processing sectors because it is at the heart of the global value chains (GVCs) in electronics, telephones, and textiles and shoes industry. Vietnam has signed or is negotiating free trade agreements with various countries around the world including Korea, Israel, EU and RCEP and so on. Therefore, it is expected that Vietnam's trade dependency and FDI inflows to Vietnam increase more and more. However, the fact that the proportion of exports by foreign-invested companies accounts for about 70% of the total exports implies the uncertainty of Vietnam's economy in the future. Attracting FDI investment can further reduce the competitiveness of domestic companies in Vietnam. Therefore, in order for Vietnam to maintain sustainable development in the future, it is necessary to reform the momentum of foreign-invested enterprises to the development of Vietnamese companies.

Shared Key and Public Key based Mobile Agent Authentication Scheme supporting Multiple Domain in Home Network Environments (홈 네트워크 환경에서 다중 도메인을 지원하는 공유키 및 공개키 기반의 이동 에이전트 인증 기법)

  • 김재곤;김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.109-119
    • /
    • 2004
  • The home network environment can be defined as a network environment, connecting digital home devices such as computer systems, digital appliances, and mobile devices. In this kind of home network environments, there will be numerous local/remote interactions to monitor and control the home network devices and the home gateway. Such an environment may result in communication bottleneck. By applying the mobile agents that can migrate among the computing devices autonomously and work on behalf of the user, remote interactions and network traffics can be reduced enormously. The mobile agent authentication is necessary to apply mobile agent concept to the home network environments, as a prerequisite technology for authorization or access control to the home network devices and resources. The existing mobile agent systems have mainly used the public key based authentication scheme, which is not suitable to the home network environments, composed of digital devices of limited computation capability. In this paper, we propose a shared key based mobile agent authentication scheme for single home domain and expand the scheme to multiple domain environments with the public key based authentication scheme. Application of the shared key encryption scheme to the single domain mobile agent authentication enables to authenticate the mobile agent with less overhead than the public key based authentication scheme.

Enhanced and Practical Alignment Method for Differential Power Analysis (차분 전력 분석 공격을 위한 향상되고 실제적인 신호 정렬 방법)

  • Park, Jea-Hoon;Moon, Sang-Jae;Ha, Jae-Cheol;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.93-101
    • /
    • 2008
  • Side channel attacks are well known as one of the most powerful physical attacks against low-power cryptographic devices and do not take into account of the target's theoretical security. As an important succeeding factor in side channel attacks (specifically in DPAs), exact time-axis alignment methods are used to overcome misalignments caused by trigger jittering, noise and even some countermeasures intentionally applied to defend against side channel attacks such as random clock generation. However, the currently existing alignment methods consider only on the position of signals on time-axis, which is ineffective for certain countermeasures based on time-axis misalignments. This paper proposes a new signal alignment method based on interpolation and decimation techniques. Our proposal can align the size as well as the signals' position on time-axis. The validity of our proposed method is then evaluated experimentally with a smart card chip, and the results demonstrated that the proposed method is more efficient than the existing alignment methods.

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.

A Study on Elementary Education Examples for Data Science using Entry (엔트리를 활용한 초등 데이터 과학 교육 사례 연구)

  • Hur, Kyeong
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.5
    • /
    • pp.473-481
    • /
    • 2020
  • Data science starts with small data analysis and includes machine learning and deep learning for big data analysis. Data science is a core area of artificial intelligence technology and should be systematically reflected in the school curriculum. For data science education, The Entry also provides a data analysis tool for elementary education. In a big data analysis, data samples are extracted and analysis results are interpreted through statistical guesses and judgments. In this paper, the big data analysis area that requires statistical knowledge is excluded from the elementary area, and data science education examples focusing on the elementary area are proposed. To this end, the general data science education stage was explained first, and the elementary data science education stage was newly proposed. After that, an example of comparing values of data variables and an example of analyzing correlations between data variables were proposed with public small data provided by Entry, according to the elementary data science education stage. By using these Entry data-analysis examples proposed in this paper, it is possible to provide data science convergence education in elementary school, with given data generated from various subjects. In addition, data science educational materials combined with text, audio and video recognition AI tools can be developed by using the Entry.

VENTOS-Based Platoon Driving Simulations Considering Variability (가변성을 고려하는 VENTOS 기반 군집 자율주행 시뮬레이션)

  • Kim, Youngjae;Hong, Jang-Eui
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.2
    • /
    • pp.45-56
    • /
    • 2021
  • In platoon driving, several autonomous vehicles communicate to exchange information with each other and drive in a single cluster. The platooning technology has various advantages such as increasing road traffic, reducing energy consumption and pollutant emission by driving in short distance between vehicles. However, the short distance makes it more difficult to cope with an emergency accident, and accordingly, it is difficult to ensure the safety of platoon driving, which must be secured. In particular, the unexpected situation, i.e., variability that may appear during driving can adversely affect the safety of platoon driving. Because such variability is difficult to predict and reproduce, preparing safety guards to prevent risks arising from variability is a challenging work. In this paper, we studied a simulation method to avoid the risk due to the variability that may occur while platoon driving. In order to simulate safe platoon driving, we develop diverse scenarios considering the variability, design and apply safety guards to handle the variability, and extends the detail functions of VENTOS, an open source platooning simulator. Based on the simulation results, we have confirmed that the risks caused form the variability can be removed, and safe platoon driving is possible. We believe that our simulation approach will contribute to research and development to ensure safety in platoon driving.

A Study on Court Auction System using Ethereum-based Ether (이더리움 기반의 이더를 사용한 법원 경매 시스템에 관한 연구)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.2
    • /
    • pp.31-40
    • /
    • 2021
  • Blockchain technology is also actively studied in the real estate transaction field, and real estate transactions have various ways. In this paper, we propose a model that simplifies the authentication procedure of auction systems using Ethereum's Ether to solve the problem of offline court auctions. The proposed model is written in Ethereum's Solidity language, the court registers the sale date and the sale date with the DApp browser, and the bidder accesses the address of the individual's wallet created through Metamask's private key. The bidder then selects the desired sale and enters the bid price amount to participate in the auction. The bidder's record of the highest bid price for the sale he wants is written on the Ethereum test network as a smart contract. and creates a block. Finally, smart contracts written on the network are distributed by the court auction manager to all nodes in the blockchain network, and each node in the blockchain network can be viewed and contract verified. As a result of analyzing the smart contracts of the proposed model and the performance of the system, there are fees incurred due to the creation and use of Ether on platforms using Ethereum, and participation. Ether's changes in value affect the price of the sale, resulting in inconsistent fees in smart contracts each time. However, in future work, we issue our own tokens to solve the market volatility problem and commission problem with the value change of Ether, and refine complex court auction systems.

Attitudes toward Artificial Intelligence of High School Students' in Korea (한국 고등학생의 인공지능에 대한 태도)

  • Kim, Seong-Won;Lee, Youngjun
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2020
  • With the advent of an intelligent information society, research toward artificial intelligence education was conducted. In previous studies, the subject of research is biased, and studies that analyze attitudes toward artificial intelligence are insufficient. So, in this study developed a test tool to measure the artificial intelligence of high school students and analyze their attitudes toward artificial intelligence. To develop the test tool, 229 high school students completed a preliminary test, of which the results were analyzed via exploratory factor analysis. To analyze the students' attitudes toward artificial intelligence, the resulting test tool was applied to 481 high school students, and their test results were analyzed according to factors. From the study's results, there was no difference according to gender in the students' attitudes toward artificial intelligence, but there was a significant difference per grade. In addition, there was a significant difference in attitudes according to artificial intelligence-related experiences: the high school students who had direct and indirect experience with artificial intelligence, programming, and more frequently used it had more positive attitudes toward artificial intelligence than students without this experience. However, artificial intelligence education experience negatively influenced the students' attitudes toward artificial intelligence. Overall, the higher their interest in artificial intelligence, the more positive the high school students' attitudes toward artificial intelligence.