• 제목/요약/키워드: Becoming

검색결과 6,521건 처리시간 0.031초

CAIV개념을 적용한 국방연구개발 개선방안 연구 (A study on the Improvement of the Defense R&D applying the CAIV Concept)

  • 박재영;최석철
    • 한국국방경영분석학회지
    • /
    • 제27권2호
    • /
    • pp.1-24
    • /
    • 2001
  • As the weapon systems of the 21st century are becoming more and more performance /technoloriven, it is only becoming more expensive to obtain the weapon systems. Therefore, it is absolutely vital for every nation to find a way to reduce cost objectives. As CAIV is a strategy that entails setting aggressive, yet realistic cost objectives when defining operational requirements and acquiring defense systems and managing achievement of these objectives, we believe that it is essential for us to find out what it is and how we can adopt it so that we can provide ourselves with highly capable systems that are affordable. Therefore, In this paper we will give a brief overview of CAIV that is one of the main acquisition strategies adopted by DoD of U.S. including some case studies of CAIV. Furthermore, the paper will analyze stated cost objectives in our country and suggest realistic opportunities for cost reduction.

  • PDF

창조적 지식기만사회의 수학교육과정 개발을 위한 기초조사연구 -수학교육목표에 대한 교사.학생의 인식- (Students and Teachers′Perceptions on the Goals of Mathematics Education -A Foundational Research for the Development of Mathematics Curriculum Model for a Creative Knowledge-based Society-)

  • 노선숙;김민경;유현주;차인숙
    • 한국수학교육학회지시리즈A:수학교육
    • /
    • 제40권2호
    • /
    • pp.161-177
    • /
    • 2001
  • This study is to investigate what students want to learn and what mathematics teachers should teach in their classrooms. 1314 students and 527 mathematics teachers were randomly selected to administer the questionnaire. The result shows that their is a considerable mismatch between students'learning desires and teachers'teaching practices in classrooms. What students want to learn is creative knowledge; however, what they learn in the classroom is ‘imitative’ knowledge. This study suggests that the overall educational goal of mathematics education in Korea should emphasize (1) learning to communicate mathematically, (2) loaming to reason mathematically, (3) becoming confident in pupils'own ability, (4) learning to$.$value mathematics, and (5) becoming mathematical problem solvers.

  • PDF

가축사육의 지역분류와 공간이동에 관한 연구 (Classification of Livestock Raising Area and Spatial Mobility)

  • 김재환;박치호;강희설;곽정훈;최동윤;최희철
    • 한국축산시설환경학회지
    • /
    • 제7권1호
    • /
    • pp.45-56
    • /
    • 2001
  • The following statistics are the results of a survey that analyzed the classification of livestock area and spatial mobility based upon the number of livestock and an area of 151 towns and cities from 1975 to 1995. 1. As a results of analysis about the degree of location concentration using C.V., Korean native cattles (HanWoo) and swines are becoming more centralized while dairies and chickens are becoming decentralized. 2. 49 regions, that is 32.5%, were classified as growing regions, 30 regions (19.9%) were stagnant regions and 72 regions (47.7%) were withering regions. The classification was based upon the calculation according to the numbers of converted grown animals and growth index. Kyonggi-do and Chungchongnam-do, specifically, took up 26.6% and 24.5% of the developing regions which shows that these two regions are the dominant regions for livestock. 3. Kyongsangbuk-do and Chungchongnam-do play significant roles for overall livestock, and Chollanam-do is considering a transition from swines to Korean native cattles and Kyongsangbuk-do is shifting from Korean native cattles to swines.

  • PDF

인공지능 응용을 위한 하이브리드 메모리 설계 탐색 기법 (An Design Exploration Technique of a Hybrid Memory for Artificial Intelligence Applications)

  • 조두산
    • 한국산업융합학회 논문집
    • /
    • 제24권5호
    • /
    • pp.531-536
    • /
    • 2021
  • As artificial intelligence technology advances, it is being applied to various application fields. Artificial intelligence is performing well in the field of image recognition and classification. Chip design specialized in this field is also actively being studied. Artificial intelligence-specific chips are designed to provide optimal performance for the applications. At the design task, memory component optimization is becoming an important issue. In this study, the optimal algorithm for the memory size exploration is presented, and the optimal memory size is becoming as a important factor in providing a proper design that meets the requirements of performance, cost, and power consumption.

Analysis of Deep Learning Methods for Classification and Detection of Malware

  • Moon, Phil-Joo
    • International Journal of Advanced Culture Technology
    • /
    • 제9권3호
    • /
    • pp.291-297
    • /
    • 2021
  • Recently, as the number of new and variant malicious codes has increased exponentially, malware warnings are being issued to PC and smartphone users. Malware is becoming more and more intelligent. Efforts to protect personal information are becoming more and more important as social issues are used to stimulate the interest of PC users and allow users to directly download malicious codes. In this way, it is difficult to prevent malicious code because malicious code infiltrates in various forms. As a countermeasure to solve these problems, many studies are being conducted to apply deep learning. In this paper, we investigate and analyze various deep learning methods to detect and classify malware.

Crowdsourced Urban Sensing: Urban Travel Behavior Using Mobile Based Sensing

  • Shin, Dongyoun
    • Architectural research
    • /
    • 제20권4호
    • /
    • pp.109-120
    • /
    • 2018
  • In the context of ever-faster urbanization, cities are becoming increasingly complex, and data collection to understand such complex relationships is becoming a very important factor. This paper focuses on the lighter weight of the method of collecting urban data, and studied how to use such complementary data collection using crowdsourcing. Especially, the method of converting mobile acceleration sensor information to urban trip information by combining with locational information was experimented. Using the parameters for transportation type classification obtained from the research, information was obtained and verified in Singapore and Zurich. The result of this study is thought to be a good example of how to combine raw data into meaningful behavior information.

미래 자율주행 자동차 사고에서 시나리오 기반의 보안 윤리 모델 연구 (Enhancing of Security Ethics Model base on Scenario in Future Autonomous Vehicle Accident)

  • 박원형
    • 융합보안논문지
    • /
    • 제18권5_1호
    • /
    • pp.105-112
    • /
    • 2018
  • 최근 기술의 발전과 더불어 자율주행 자동차가 상용화가 되어 가고 있다. 하지만 자율주행 자동차에 대한 사고가 발생하고 있어 자율주행 자동차의 안전성 문제가 화두가 되고 있다. 또한, 현재 명확한 법률과 보안윤리에 대한 구체적인 가이드라인이 정해져 있지 않는 문제점이 있다. 이러한 가이드라인이 정해지려면 많은 정보와 경험이 필요하다. 본 연구는 과거에서 현재까지 사고 사례를 바탕으로 기본적으로 시나리오 기반의 모델을 정한다. 본 연구는 미래 자율주행 자동사 사고 시 보안윤리에 대한 사고 시나리오 사례를 통한 보안 고려 요소에 대한 모델을 제안 한다.

  • PDF

비대면(Untact) 업무를 위한 화상인식 PCA 사용자 인증 시스템 연구 (A Study on the PCA base Face Authentication System for Untact Work)

  • 박종순;박찬길
    • 디지털산업정보학회논문지
    • /
    • 제16권4호
    • /
    • pp.67-74
    • /
    • 2020
  • As the information age develops, Online education and Non-face-to-face work are becoming common. Telecommuting such as tele-education and video conferencing through the application of information technology is also becoming common due to the COVID-19. Unexpected information leakage can occur online when the company conducts work remotely or holds meetings. A system to authenticate users is needed to reduce information leakage. In this study, there are various ways to authenticate remote access users. By applying burn authentication using a biometric system, a method to identify users is proposed. The method used in the study was studied the main component analysis method, which recognizes several characteristics in facial recognition and processes interrelationships. It proposed a method that can be easily utilized without additional devices by utilizing a camera connected to a computer by authenticating the user using the shape and characteristics of the face by using the PCA method.

The Ripple Effects of Climate X-Events

  • Sang-Keun Cho;Ji-Min Lee;Sang-Hyuk Park
    • International Journal of Advanced Culture Technology
    • /
    • 제11권3호
    • /
    • pp.83-88
    • /
    • 2023
  • The increasing global average temperature and the emergence of various abnormal climate phenomena are already being experienced in reality. The problems arising from climate change are expanding and becoming catastrophic, despite the efforts of various organizations to prevent them. In order to avoid climate issues from becoming black elephants, we conducted interviews with emergency planning officer from various institutions to identify potential X-events caused by climate change. The results of analyzing the anticipated X-events by these emergency planning officer revealed a chain of ripple effects associated with their occurrence. This implies that once an X-event happens, its influence is broader and more significant. Through this study, we aim to share the understanding of the ripple effects of climate X-events with many people, raising awareness of the severity of climate issues. We hope that this will serve as a starting point for more institutions, individuals, and nations to make efforts in resolving climate problems, turning X-events into opportunities rather than crises.

Asymmetric Terrorist Alliances: Strategic Choices of Militant Groups in Southeast Asia

  • Alexandrova, Iordanka
    • 수완나부미
    • /
    • 제11권1호
    • /
    • pp.101-132
    • /
    • 2019
  • Why do some local rebel groups choose to form asymmetric alliances with large transnational terrorist organizations? This paper examines asymmetric terrorist alliance patterns by studying the international ties of domestic insurgencies in Southeast Asia. It uses data from Indonesia, Malaysia, the Philippines, and Thailand to construct a theory defining the determinants of the choice of alliance strategies by terrorist groups. The findings conclude that rebels with limited aims prefer to act alone out of fear of entrapment. They are cautious of becoming associated with the struggle of transnational radical groups and provoking organized response from international and regional counterterrorism authorities. Local groups are more likely to seek alliance with an established movement when they have ambitious final objectives, challenging the core interests of the target state. In this case, the benefits of training and logistic support provided by an experienced organization outweigh the costs of becoming a target for coordinated counterterrorist campaign.

  • PDF