• Title/Summary/Keyword: 한국컴퓨터

Search Result 35,675, Processing Time 0.057 seconds

University Students Impact of Martial-Arts Training on Self-Realization among Security Majors (경호전공 대학생의 무도수련이 자아실현에 미치는 영향)

  • Son, Sung-Rak;Jung, Sung-Suk;Wang, Sug-Won;Jang, Ye-Jin
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.101-118
    • /
    • 2008
  • The subjects in this study were 500 students who were selected from a population that consisted of security majors who took courses in martial arts in four different four-year-course universities. After a survey was conducted, the answer sheets from 451 students were analyzed except 49 incomplete ones. The collected data were analyzed with SPSS Ver. 12.0 program. Frequency analysis, t-test and one-way ANOVA were utilized, and LSD and regression analysis were employed to make a post-hoc comparison. All the hypotheses formulated in this study were verified at the a=.05(Chronbach's alpha) level of significance. The findings of the study were as follows: First, as for relations between demographic characteristics and self- realization, the college students investigated were statistically different according to gender in three subvariables of self-realization that included ability development, ability display and attainment of ideal. Age and academic year made a significant difference to their ability development and attainment of ideal, and they differed statistically significantly in terms of ability development according to black lebel test. Second, concerning connections between the degree of martial-arts training and self-realization, training term, one of the subvariables of the degree of martial-arts training had a positive correlation to their ability development and attainment of ideal at the 5% level of significance, and training time was positively correlated to their ability development at the 5% level of significance. Third, training term, one of the subvariables of the degree of martial- arts training, had an impact on ability development, and that exerted a firsthand influence on attainment of ideal as well.

  • PDF

Rough Computational Annotation and Hierarchical Conserved Area Viewing Tool for Genomes Using Multiple Relation Graph. (다중 관계 그래프를 이용한 유전체 보존영역의 계층적 시각화와 개략적 전사 annotation 도구)

  • Lee, Do-Hoon
    • Journal of Life Science
    • /
    • v.18 no.4
    • /
    • pp.565-571
    • /
    • 2008
  • Due to rapid development of bioinformatics technologies, various biological data have been produced in silico. So now days complicated and large scale biodata are used to accomplish requirement of researcher. Developing visualization and annotation tool using them is still hot issues although those have been studied for a decade. However, diversity and various requirements of users make us hard to develop general purpose tool. In this paper, I propose a novel system, Genome Viewer and Annotation tool (GenoVA), to annotate and visualize among genomes using known information and multiple relation graph. There are several multiple alignment tools but they lose conserved area for complexity of its constrains. The GenoVA extracts all associated information between all pair genomes by extending pairwise alignment. High frequency conserved area and high BLAST score make a block node of relation graph. To represent multiple relation graph, the system connects among associated block nodes. Also the system shows the known information, COG, gene and hierarchical path of block node. In this case, the system can annotates missed area and unknown gene by navigating the special block node's clustering. I experimented ten bacteria genomes for extracting the feature to visualize and annotate among them. GenoVA also supports simple and rough computational annotation of new genome.

Design and Implementation of Sequential Pattern Miner to Analyze Alert Data Pattern (경보데이터 패턴 분석을 위한 순차 패턴 마이너 설계 및 구현)

  • Shin, Moon-Sun;Paik, Woo-Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.1-13
    • /
    • 2009
  • Intrusion detection is a process that identifies the attacks and responds to the malicious intrusion actions for the protection of the computer and the network resources. Due to the fast development of the Internet, the types of intrusions become more complex recently and need immediate and correct responses because the frequent occurrences of a new intrusion type rise rapidly. Therefore, to solve these problems of the intrusion detection systems, we propose a sequential pattern miner for analysis of the alert data in order to support intelligent and automatic detection of the intrusion. Sequential pattern mining is one of the methods to find the patterns among the extracted items that are frequent in the fixed sequences. We apply the prefixSpan algorithm to find out the alert sequences. This method can be used to predict the actions of the sequential patterns and to create the rules of the intrusions. In this paper, we propose an extended prefixSpan algorithm which is designed to consider the specific characteristics of the alert data. The extended sequential pattern miner will be used as a part of alert data analyzer of intrusion detection systems. By using the created rules from the sequential pattern miner, the HA(high-level alert analyzer) of PEP(policy enforcement point), usually called IDS, performs the prediction of the sequence behaviors and changing patterns that were not visibly checked.

  • PDF

Implementation and Application of the EDISON platform's integrated file management service (EDISON 플랫폼의 통합 파일관리 서비스 구현 및 적용)

  • Ma, Jin;Seo, Jerry;Ruth-Lee, Jong suk;Park, Min jae
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.71-79
    • /
    • 2016
  • As computer technology continues to evolve, the Computational Sciences utilized in Physics, Chemistry, Materials Science, and Life Sciences have been attracting more attention. In Korea, to compensate for the drawbacks in Computational Science, students and researchers have been using the EDISON platform. The EDISON platform provides a web portal service for education and research and an environment for addressing complex issues involving five fields, e.g., Computational Fluid Dynamics (CFD), Nanophysics, Computational Chemistry, Structural Dynamics, and Computational Design. As the platform and user scale increase beyond service provision, the need for efficient operation of its currently running data management system is on the rise. In this study, we resolve the data synchronization issues between the existing EDISON platform and web portal. As the EDISON platform is integrated with the web portal, a file management service is implemented to integrate the management of user data and files, which ultimately improves the overall efficiency of file management.

Study of N-Port Electric Vehicle Charging Systems Using OPC-UA (OPC UA를 이용한 N-Port EV 충전 시스템 연구)

  • Lee, Seong Joon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.8
    • /
    • pp.343-352
    • /
    • 2017
  • IEC62541, known as OPC-UA, is a standard communication protocol for Smart Grid (SG) and Smart Factory application platform. It was accepted as an IEC standard (IEC62541) in 2011 by IEC TC57, and is extending range of application as collaborating with other standrads. The government's policies to popularize EVs ("Workplace Charging Challenge"), the number of Electric vehicle which try to be charging in the factory is expected to increase. In this situation, indiscreet and uncontrolled EV charging can lead to some problems, such as excess of the peak demand capacity. Therefore, EVs, which is charging in SFs, must be monitoring and controlling to avoid and reduce peak demand. However, the standards for EVs charging differ from the standards for SFs. In other words, to increase the ease of use for drivers, and reduce risk for enterprise, we have needs of study to develop the protocols or to provide interoperability, for EVs charging in SFs. This paper deals with a EV charging management platform installing in a smart factory. And this platform can be easily integrated as part of SF management software. The main goal of this paper is to implement EV management system based on IEC61851 and IEC62541.

A Study on Temperature Analysis for Smart Electrical Power Devices (스마트 전력 기기의 온도 분석에 관한 연구)

  • Vasanth, Ragu;Lee, Myeongbae;Kim, Younghyun;Park, Myunghye;Lee, Seungbae;Park, Jwangwoo;Cho, Yongyun;Shin, Changsun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.8
    • /
    • pp.353-358
    • /
    • 2017
  • An electrical power utility, like an electrical power pole, includes various kinds of sensors for smart services. Temperature data is considered one of the important factors that can influence the smart operations of this utility. This study suggests a method for temperature data analysis for deciding the status of the smart electrical power utilities by using Kalman Filter and Ensemble Model. The suggested approach separates the temperature data according to the different positions of the temperature sensors of a utility, then uses Kalman Filter and Ensemble Model to analyse the characteristics of the temperature variation. With detailed processes, method explains the variation between an external temperature factor like weather temperature data and the sensed temperature data, and then, analysis the temperature data from each position of electrical power utilities. In this process, the suggested method uses Kalman Filter to remove error data and the ensemble model to find out mean value of every hour of electrical data. The result and discussion of temperature analysis were described clearly with the analysed results of electrical data. Finally, we were able to check the working condition of the power devices and the range of the temperature data foe each devices, which may help to indicate any causalities with respect to the devices in the utility pole.

Policy and Strategy for Intelligence Information Education and Technology (지능정보 교육과 기술 지원 정책 및 전략)

  • Lee, Tae-Gyu;Jung, Dae-Chul;Kim, Yong-Kab
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.8
    • /
    • pp.359-368
    • /
    • 2017
  • What is the term "intelligence information society", which is a term that has been continuously discussed recently? This means that the automation beyond the limits of human ability in the whole societies based on intelligent information technology is a universalized social future. In particular, it is a concept that minimizes human intervention and continuously pursues evolution to data (or big data) -based automation. For example, autonomous automation is constantly aiming at unmanned vehicles with artificial intelligence as a key element. However, until now, intelligent information research has focused on the intelligence itself and has made an effort to improve intelligence logic and replace human brain and intelligence. On the other hand, in order to replace the human labor force, we have continued to make efforts to replace workers with robots by analyzing the working principles of workers and developing optimized simple logic. This study proposes important strategies and directions to implement intelligent information education policy and intelligent information technology research strategy by suggesting access strategy, education method and detailed policy road map for intelligent information technology research strategy and educational service. In particular, we propose a phased approach to intelligent information education such as basic intelligence education, intelligent content education, and intelligent application education. In addition, we propose education policy plan for the improvement of intelligent information technology, intelligent education contents, and intelligent education system as an important factor for success and failure of the 4th industrial revolution, which is centered on intelligence and automation.

Optimized Handoff Scheme with Fuzzy logic in Heterogeneous Vehicular Mobile Networks (이종의 차량 모바일 네트워크에서 퍼지 로직을 이용한 최적의 핸드오프 기법)

  • Roh, Youngsam;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.35-46
    • /
    • 2012
  • The development of wireless communication systems has resulted in the availability of several access technologies at any geographic area, such as 3G networks, wireless local area networks (WLANs) and wireless broadband networks. The development of these technologies is provided for users who have experienced mobile network environments which are slow or fast-movement environment and change distance between the AP(Access Point). This paper describes network performance issues in various environmental changes. Also, Fuzzy logic is applied to evaluate the performance in vehicle networks around users' environmental factors to focusing on the minimizing of transfer time and costs. First, WLAN and 3G networks fixed distance between AP, Second, WLAN and 3G networks random distance between APs, finally above two environmental with vehicle Ad hoc networks is analyzed. These V2I and V2V environmental condition are assumed. Results which based on Fuzzy logic suggest an optimal performance in vehicle network environments according to vehicle speed and distance between APs. Proposed algorithm shows 21% and 13% improvement of networks performance in V2I and V2V environment.

Energy-efficient Set-associative Cache Using Bi-mode Way-selector (에너지 효율이 높은 이중웨이선택형 연관사상캐시)

  • Lee, Sungjae;Kang, Jinku;Lee, Juho;Youn, Jiyong;Lee, Inhwan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.1-10
    • /
    • 2012
  • The way-lookup cache and the way-tracking cache are considered to be the most energy-efficient when used for level 1 and level 2 caches, respectively. This paper proposes an energy-efficient set-associative cache using the bi-mode way-selector that combines the way selecting techniques of the way-tracking cache and the way-lookup cache. The simulation results using an Alpha 21264-based system show that the bi-mode way-selecting L1 instruction cache consumes 27.57% of the energy consumed by the conventional set-associative cache and that it is as energy-efficient as the way-lookup cache when used for L1 instruction cache. The bi-mode way-selecting L1 data cache consumes 28.42% of the energy consumed by the conventional set-associative cache, which means that it is more energy-efficient than the way-lookup cache by 15.54% when used for L1 data cache. The bi-mode way-selecting L2 cache consumes 15.41% of the energy consumed by the conventional set-associative cache, which means that it is more energy-efficient than the way-tracking cache by 16.16% when used for unified L2 cache. These results show that the proposed cache can provide the best level of energy-efficiency regardless of the cache level.

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.