• Title/Summary/Keyword: Basic Original Technology

Search Result 121, Processing Time 0.022 seconds

A Study on the Application Plan of Basic Original Technology in Science & Research Parks : Focus on Science Parks in Korea (과학연구단지의 기초원천 기술 활용방안에 관한 연구 : 지방과학연구단지를 중심으로)

  • Lee, Won Cheul;Choi, Jong-In
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.3
    • /
    • pp.63-74
    • /
    • 2014
  • From the 1950s, the science parks were begun the composition as a way for innovation and commercialization in the world around developed countries. Since the 1980s, Korea also starting with quantitative investment in R & D for technology innovation, so far has been a continuous effort. Korea's patent creation level according to these R & D investment is already within the world's top 10, but the fact that the domestic technology trade balance appearing current competitive level compared to the developed technology is very insufficient. This means that the creation of economic value is low as compared with financial commitment. Therefore the plans to ensure the economic value through technology are required. As one of plans to do this for local economy activation through technical advances, constructing regional innovation systems and making science parks have been made. These science parks are required to develop the basic original technology in order to secure new growth engines, but the science parks in Korea are facing difficulties of performing research and development for regional industry advancement and local economy activation. Accordingly, this study attempts to organize the concept of 'science park' is similar but there is difference, and to compare institutions with similar functions based on regional innovation systems theory. In addition, the study is to obtain the application plans of basic original technology in science & research Parks through the model for overcoming weaknesses of Korea's innovation system and enabling organic cross-linking between institutions.

  • PDF

A Study on the Acceptance Requirements of an Original" Document and Copies under UCP 600 (UCP 600에서의 원본서류와 사본의 수리요건에 관한 연구)

  • Huh, Jae-Chang
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.38
    • /
    • pp.123-152
    • /
    • 2008
  • It is a basic rule in the credit law that original documents are required unless otherwise stipulated by the credit. Due to modern technology enabling documents to be produced in many ways it may not always to decide whether a document is original or a photocopy. In consideration of modern technology and the advent of new methods of document production, ICC has drawn up the provisions on original documents in Article 22 (b) of UCP 400 for the first time. The equivalent provision in UCP 500 is Article 20 (b). As a result of many queries to ICC Banking Commission on what constitutes an "original" documents under UCP 500 and several court cases in connection with original documents, the ICC Banking Commission has issued Decision on original documents in July 1999. Based on this Decision, the ICC dealt it in Article 17 under UCP 600 which came into force on July 1, 2007. There are some changes, replacements and new provisions of UCP 600 concerning original documents and copies. Importers, exporters, insurance companies, other third parties and, above all, banks should pay attention to some changes and implications of UCP 600 concerning original documents and copies. The purpose of this paper is to examine the provisions on original documents and copies under UCP 600. For this purpose, firstly this study deals with the relative provisions on original documents and copies under pre-UCP 600. Secondly this study considers the provisions on original documents and copies under UCP 600. Thirdly this study compares the provisions under pre-UCP 600 with the provisions under UCP 600. Finally this study analyzes the cases decided both home and abroad in connection with original documents. This paper contribute to help the parties to letters of credit to understand the provisions on original documents and copies under UCP 600.

  • PDF

The Program Evaluation and Analysis of Creative Research Initiatives (창의적연구진흥사업 사업평가 및 분석)

  • 변명문
    • Journal of Technology Innovation
    • /
    • v.12 no.1
    • /
    • pp.161-188
    • /
    • 2004
  • The objective of this research is to evaluate the Creative Research Initiative Program (CRI), a national R&D program funded by the Ministry of Science & Technology in Korea. The evaluation of CRI covers the following research questions; 1) Have it set a unique position and characteristic distinguished from other government-funded R&D programs\ulcorner 2) Are the achievements of the program relevant to its goal\ulcorner 3) What is its performances and how much is it achieved its goal\ulcorner The results are the followings; 1) CRI is perceived as a pure basic research, distinguished from other national basic research programs, such as the Coal Oriented Basic Research Program and the SRC and ERC. 2) CRI is a well-adapted R&D program in confront of the environmental changes and R&D needs, as well as follows the planned R&D areas. 3) CRI have performed well in the raising-up world-class research leaders and the nation-wide diffusion of creative R&D culture, while it got few performances in the overcoming the limitation of the existing technologies and the independent development of original key technologies for future industries. However, the duration of the program, 5 year, is too short to expect concrete outcome, such as creating original technologies. Many of the outcomes of CRI gets a lot of attention from top class scientists in the world, it is expected to generate various R&D performances in the future.

  • PDF

A Cryptography Algorithm using Telescoping Series (망원급수를 이용한 암호화 알고리즘)

  • Choi, Eun Jung;Sakong, Yung;Park, Wang Keun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.103-110
    • /
    • 2013
  • In Information Technology era, various amazing IT technologies, for example Big Data, are appearing and are available as the amount of information increase. The number of counselling for violation of personal data protection is also increasing every year that it amounts to over 160,000 in 2012. According to Korean Privacy Act, in the case of treating unique personal identification information, appropriate measures like encipherment should be taken. The technologies of encipherment are the most basic countermeasures for personal data invasion and the base elements in information technology. So various cryptography algorithms exist and are used for encipherment technology. Therefore studies on safer new cryptography algorithms are executed. Cryptography algorithms started from classical replacement enciphering and developed to computationally secure code to increase complexity. Nowadays, various mathematic theories such as 'factorization into prime factor', 'extracting square root', 'discrete lognormal distribution', 'elliptical interaction curve' are adapted to cryptography algorithms. RSA public key cryptography algorithm which was based on 'factorization into prime factor' is the most representative one. This paper suggests algorithm utilizing telescoping series as a safer cryptography algorithm which can maximize the complexity. Telescoping series is a type of infinite series which can generate various types of function for given value-the plain text. Among these generated functions, one can be selected as a original equation. Some part of this equation can be defined as a key. And then the original equation can be transformed into final equation by improving the complexity of original equation through the command of "FullSimplify" of "Mathematica" software.

An Analysis on the Shaping Concepts of the Korean Original Passenger Cars (한국의 고유모델 승용차 차제 조형 개념의 분석)

  • Koo, Sang
    • Archives of design research
    • /
    • v.13 no.4
    • /
    • pp.57-66
    • /
    • 2000
  • The Korea's automotive industry have been achieved a remarkable growth with various original models since the first original model ‘Pony’for the 25years. Most of the design works were depended upon the designers of the other countries on the early times, but now the design work gets to have the independency with our own technology and the automobile is now one of the major exporting goods of Korea to other countries. The basic design concept of the body shape can be considered into four types, and they have their own characteristics. The period of time for the original model developement of the Korean auto makers can be thought as four periods ; introducing period, settling period, developing period and matured period are them. The models that developed on each period reflects the characteristics of the times with designers, technology and market conditions. The basic design concepts of the Korean car body show the variety but the concepts have been intergrated into the two types as the time gose by. This tendency would comes form mainly technology, but the consumers characteristics of the market would also influence as much as the technological reason. It would become more important on developing the original model with the autonomy in design concept of the body through grasping the change of formal characteristics clearly on an automobile in the future.

  • PDF

Efficient Proxy Signature Technology using Proxy-Register (위임등록을 통한 효율적인 대리 서명방식)

  • Park, Se-Joon;Lee, Yong-Jun;Oh, Hae-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1C
    • /
    • pp.166-174
    • /
    • 2004
  • Proxy signature is the signature that an original signer delegates his signing capability to a proxy signer and the proxy signer creates a signature on behalf of the original signer. The basic methodology of proxy signature is that the original signer creates a signature on delegation information and gives it secretly to the proxy signer, and the proxy signer uses it as a proxy private key or uses it to generate a proxy private key. In this paper, we suggest the proxy-register protocol that the original signer register to the verifier about the proxy related information, and verifier sets the warrant of proxy signer, validity period for proxy signature and some limitation.

Network Coding-based Maximum Lifetime Algorithm for Sliding Window in WSNs

  • Sun, Baolin;Gui, Chao;Song, Ying;Chen, Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1298-1310
    • /
    • 2019
  • Network coding (NC) is a promising technology that can improve available bandwidth and packet throughput in wireless sensor networks (WSNs). Sliding window is an improved technology of NC, which is a supplement of TCP/IP technology and can improve data throughput and network lifetime on WSNs. This paper proposes a network coding-based maximum lifetime algorithm for sliding window in WSNs (NC-MLSW) which improves the throughput and network lifetime in WSN. The packets on the source node are sent on the WSNs. The intermediate node encodes the received original packet and forwards the newly encoded packet to the next node. Finally, the destination node decodes the received encoded data packet and recovers the original packet. The performance of the NC-MLSW algorithm is studied using NS2 simulation software and the network packet throughput, network lifetime and data packet loss rate were evaluated. The simulations experiment results show that the NC-MLSW algorithm can obviously improve the network packet throughput and network lifetime.

A Study on CSMA/CA for IEEE 802.11 WLAN Environment

  • Moon Il-Young;Cho Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.2
    • /
    • pp.71-74
    • /
    • 2006
  • A basic access method about IEEE 802.11 MAC layer protocol using IEEE 802.11 wireless LANs is the DCF thatis based on the CSMA/CA. But, cause of IEEE 802.11 MAC layer uses original backoff algorithm (exponential backoff method), when collision occurred, the size of contention windows increases the double size Also, a time of packet transmission delay increases and efficienty is decreased by original backoff scheme. In this paper, we have analyzed TCP packet transmission time of IEEE 802.11 MAC DCF protocol for wireless LANs a proposed enhanced backoff algorithm. It is considered the transmission time of transmission control protocol (TCP) packet on the orthogonal frequency division multiplexing (OFDM) in additive white gaussian noise (A WGN) and Rician fading channel. From the results, a proposed enhanced backoff algorithm produces a better performance improvement than an original backoff in wireless LAN environment. Also, in OFDM/quadrature phase shift keying channel (QPSK), we can achieve that the transmission time in wireless channel decreases as the TCP packet size increases and based on the data collected, we can infer the correlation between packet size and the transmission time, allowing for an inference of the optimal packet size in the TCP layer.

A Study on CSMA/CA for WLAN Environment

  • Moon Il-Young;Cho Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.530-533
    • /
    • 2006
  • Recently, a basic access method about IEEE 802.11 MAC layer protocol using IEEE 802.11 wireless LANs is the DCF thatis based on the CSMA/CA. But, cause of IEEE 802.11 MAC layer uses original backoff algorithm (exponential backoff method), when collision occurred, the size of contention windows increases the double size. Also, a time of packet transmission delay increases and efficiency is decreased by original backoff scheme. In this paper, we have analyzed TCP packet transmission time of IEEE 802.11 MAC DCF protocol for wireless LANs a proposed enhanced backoff algorithm. It is considered the transmission time of transmission control protocol (TCP) packet on the orthogonal frequency division multiplexing (OFDM) in additive white gaussian noise (AWGN) and Rician fading channel. From the results, a proposed enhanced backoff algorithm produces a better performance improvement than an original backoff in wireless LAN environment. Also, in OFDM/quadrature phase shift keying channel (QPSK), we can achieve that the transmission time in wireless channel decreases as the TCP packet size increases and based on the data collected, we can infer the correlation between packet size and the transmission time, allowing for an inference of the optimal packet size in the TCP layer.

  • PDF

Analysis of articles published in the Journal of Korean Academy of dental technology (대한치과기공학회지 게재논문의 연구동향 분석)

  • Kim, Hee-Jung
    • Journal of Technologic Dentistry
    • /
    • v.34 no.1
    • /
    • pp.45-56
    • /
    • 2012
  • Purpose: This study reviews the recent trend of Korean Academy of dental technology research. The data examined are the articles published in the Korean Journal of Korean Academy of dental technology from 1979 to 2011. Methods: The data are retrieved through the internet database Korean Academy of dental technology. The number of paper published is 540, published in 33 volumes of the journal. This study examines research methods, subjects, and author information. Results: Among the 540 articles collected, 422 are Original papers, 106 Clinical Technical Papers, 12case Other papers. 235 are experimental studies. Most experimental studies(235) have examined the ceramic(Porcelain) parts(117). The sole author of 315, co-author of 225 appeared. In turn of dental technicians, and students appeared. Conclusion: The study is to present basic data for research and to indicate the direction of their study in the future.