• Title/Summary/Keyword: Code design

Search Result 4,806, Processing Time 0.035 seconds

Development of Market Growth Pattern Map Based on Growth Model and Self-organizing Map Algorithm: Focusing on ICT products (자기조직화 지도를 활용한 성장모형 기반의 시장 성장패턴 지도 구축: ICT제품을 중심으로)

  • Park, Do-Hyung;Chung, Jaekwon;Chung, Yeo Jin;Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.1-23
    • /
    • 2014
  • Market forecasting aims to estimate the sales volume of a product or service that is sold to consumers for a specific selling period. From the perspective of the enterprise, accurate market forecasting assists in determining the timing of new product introduction, product design, and establishing production plans and marketing strategies that enable a more efficient decision-making process. Moreover, accurate market forecasting enables governments to efficiently establish a national budget organization. This study aims to generate a market growth curve for ICT (information and communication technology) goods using past time series data; categorize products showing similar growth patterns; understand markets in the industry; and forecast the future outlook of such products. This study suggests the useful and meaningful process (or methodology) to identify the market growth pattern with quantitative growth model and data mining algorithm. The study employs the following methodology. At the first stage, past time series data are collected based on the target products or services of categorized industry. The data, such as the volume of sales and domestic consumption for a specific product or service, are collected from the relevant government ministry, the National Statistical Office, and other relevant government organizations. For collected data that may not be analyzed due to the lack of past data and the alteration of code names, data pre-processing work should be performed. At the second stage of this process, an optimal model for market forecasting should be selected. This model can be varied on the basis of the characteristics of each categorized industry. As this study is focused on the ICT industry, which has more frequent new technology appearances resulting in changes of the market structure, Logistic model, Gompertz model, and Bass model are selected. A hybrid model that combines different models can also be considered. The hybrid model considered for use in this study analyzes the size of the market potential through the Logistic and Gompertz models, and then the figures are used for the Bass model. The third stage of this process is to evaluate which model most accurately explains the data. In order to do this, the parameter should be estimated on the basis of the collected past time series data to generate the models' predictive value and calculate the root-mean squared error (RMSE). The model that shows the lowest average RMSE value for every product type is considered as the best model. At the fourth stage of this process, based on the estimated parameter value generated by the best model, a market growth pattern map is constructed with self-organizing map algorithm. A self-organizing map is learning with market pattern parameters for all products or services as input data, and the products or services are organized into an $N{\times}N$ map. The number of clusters increase from 2 to M, depending on the characteristics of the nodes on the map. The clusters are divided into zones, and the clusters with the ability to provide the most meaningful explanation are selected. Based on the final selection of clusters, the boundaries between the nodes are selected and, ultimately, the market growth pattern map is completed. The last step is to determine the final characteristics of the clusters as well as the market growth curve. The average of the market growth pattern parameters in the clusters is taken to be a representative figure. Using this figure, a growth curve is drawn for each cluster, and their characteristics are analyzed. Also, taking into consideration the product types in each cluster, their characteristics can be qualitatively generated. We expect that the process and system that this paper suggests can be used as a tool for forecasting demand in the ICT and other industries.

The costume culture of China is as old and varied as her long history (중국 소수민족의 복식 연구(1))

  • 박춘순
    • Journal of the Korean Society of Costume
    • /
    • v.26
    • /
    • pp.175-206
    • /
    • 1995
  • The costume culture of China is as old and varied as her long history. As China is a multiracial nation and consists of fifty-six min-ority races including Han race, there are not only fifty-six different costumes in China but each races' costume habit is very different. Therefore, Chinese penninsula can be considered an enor-mous exhibition center of the costumes. This study undertook on the assumption that the costumes' mainstream of Korea and east-northern Asia as well as that of China could be examined by investigating the minority races' costumes in the east-and west-northern areas of China. The process of evolution of the costume of a particular people, country or area is subject not only to constraints related to geography such as climate, topography or local products but is also affected by numorous environmental influences including cultural, economic, social and even pol-itical ones in terms of the selection of material, styling, color and standard of tailoring. In other words, things like philosophy of life, religious be-lief, aesthetic outlook, moral code, class system, degree of affluence, and cultural exchange will all be reflected directly or indirectly by features of a people's or country's style costume. Of course, there are several factors affecting to the style of costume of the minority people in China. However, the only three factors-geo-graphical and environmental, production method, and religious belef-will be touched in this study. First of all, the geograghical and eenviron-mental factor would be the decisive one because the costume should be designed to overcome the constraints of climate and geographical environ-ments. Accordingly, each race has an unique style of costume. The costume of the minority races in the northern parts are loose and wide, and made of warm furs. For instance, Mongolian robe has the quality of anti-wind, anti-cold and warmness, and the width of a sleeve is narrow and long. Secondly, the costume style can be said to be limited by the production pattern, when the geo-graphical environment was affected to decide the costume style, the production pattern was together affected to it . In case of Mongolian robe, they should satisfy the dual condition as the practical function. One is the condition that they should be fitted to the climate, and the other is the condition that they should be suit-able to the nomadic life. Mongolian robes are suitable to the nomadic peoples because they are designed for not only overcoming the cold wind and weather but being used as the bedquit at night. The costumes of Hoche people was made of the skin of the fish and wild animals because of their main means of living being fishing and hunting. Accordingly, their costumes are dur-able, warm and water-proof. Finally, the style of the costume is affected by the religious belief. In other words, the pattern in fashion is closely related with the religious be-lief or ancestor worship and nature worship. Ac-cordingly, the symbols of these worship are often emerged in the decoration of the costume. The design of costume of the people in the northern areas of China is very simple. It is related with their monotheism. On the other hand, the costumes of twen쇼 minority races in the east-northern parts of China can be devided into three racial groups such as the long robes of Man people and Mongols, Tunics of the peoples in the west-northern areas, and the pants and jackets of Hoche people. The minorority races all has not only the unique costume habit but their costumes are also related with their living style and production means.

  • PDF

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

Exploratory Case Study for Key Successful Factors of Producy Service System (Product-Service System(PSS) 성공과 실패요인에 관한 탐색적 사례 연구)

  • Park, A-Rum;Jin, Dong-Su;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.255-277
    • /
    • 2011
  • Product Service System(PSS), which is an integrated combination of product and service, provides new value to customer and makes companies sustainable as well. The objective of this paper draws Critical Successful Factors(CSF) of PSS through multiple case study. First, we review various concepts and types in PSS and Platform business literature currently available on this topic. Second, after investigating various cases with the characteristics of PSS and platform business, we select four cases of 'iPod of Apple', 'Kindle of Amazon', 'Zune of Microsoft', and 'e-book reader of Sony'. Then, the four cases are categorized as successful and failed cases according to criteria of case selection and PSS classification. We consider two methodologies for the case selection, i.e., 'Strategies for the Selection of Samples and Cases' proposed by Bent(2006) and the seven case selection procedures proposed by Jason and John(2008). For case selection, 'Stratified sample and Paradigmatic cases' is adopted as one of several options for sampling. Then, we use the seven case selection procedures such as 'typical', 'diverse', 'extreme', 'deviant', 'influential', 'most-similar', and 'mostdifferent' and among them only three procedures of 'diverse', 'most?similar', and 'most-different' are applied for the case selection. For PSS classification, the eight PSS types, suggested by Tukker(2004), of 'product related', 'advice and consulancy', 'product lease', 'product renting/sharing', 'product pooling', 'activity management', 'pay per service unit', 'functional result' are utilized. We categorize the four selected cases as a product oriented group because the cases not only sell a product, but also offer service needed during the use phase of the product. Then, we analyze the four cases by using cross-case pattern that Eisenhardt(1991) suggested. Eisenhardt(1991) argued that three processes are required for avoiding reaching premature or even false conclusion. The fist step includes selecting categories of dimensions and finding within-group similarities coupled with intergroup difference. In the second process, pairs of cases are selected and listed. The second step forces researchers to find the subtle similarities and differences between cases. The third process is to divide the data by data source. The result of cross-case pattern indicates that the similarities of iPod and Kindle as successful cases are convenient user interface, successful plarform strategy, and rich contents. The differences between the successful cases are that, wheares iPod has been recognized as the culture code, Kindle has implemented a low price as its main strategy. Meanwhile, the similarities of Zune and PRS series as failed cases are lack of sufficient applications and contents. The differences between the failed cases are that, wheares Zune adopted an undifferentiated strategy, PRS series conducted high-price strategy. From the analysis of the cases, we generate three hypotheses. The first hypothesis assumes that a successful PSS system requires convenient user interface. The second hypothesis assumes that a successful PSS system requires a reciprocal(win/win) business model. The third hypothesis assumes that a successful PSS system requires sufficient quantities of applications and contents. To verify the hypotheses, we uses the cross-matching (or pattern matching) methodology. The methodology matches three key words (user interface, reciprocal business model, contents) of the hypotheses to the previous papers related to PSS, digital contents, and Information System (IS). Finally, this paper suggests the three implications from analyzed results. A successful PSS system needs to provide differentiated value for customers such as convenient user interface, e.g., the simple design of iTunes (iPod) and the provision of connection to Kindle Store without any charge. A successful PSS system also requires a mutually benefitable business model as Apple and Amazon implement a policy that provides a reasonable proft sharing for third party. A successful PSS system requires sufficient quantities of applications and contents.

Site Characterization using Shear-Wave Velocities Inverted from Rayleigh-Wave Dispersion in Chuncheon, Korea (레일리파 분산을 역산하여 구한 횡파속도를 이용한 춘천시의 부지특성)

  • Jung, JinHoon;Kim, Ki Young
    • Geophysics and Geophysical Exploration
    • /
    • v.17 no.1
    • /
    • pp.1-10
    • /
    • 2014
  • To reveal and classify site characteristics in densely populated areas in Chuncheon, Korea, Rayleigh-waves were recorded at 50 sites including four sites in the forest area using four 1-Hz velocity sensors and 24 4.5-Hz vertical geophones during the period of January 2011 to May 2013. Dispersion curves of the Rayleigh waves obtained by the extended spatial autocorrelation method were inverted to derive shear-wave velocity ($v_s$) models comprising 40 horizontal layers of 1-m thickness. Depths to weathered rocks ($D_b$), shear wave velocities of these basement rocks ($v_s^b$), average velocities of the overburden layer ($\bar{v}_s^s$), and the average velocity to a depth of 30 m ($v_s30$), were then derived from those models. The estimated values of $D_b$, $v_s^b$, $\bar{v}_s^s$, and $v_s30$ for 46 sites at lower altitudes were in the ranges of 5 to 29 m, 404 to 561 m/s, 208 to 375 ms/s, and 226 to 583 m/s, respectively. According to the Korean building code for seismic design, the estimated $v_s30$ indicates that the lower altitude areas in Chuncheon are classified as $S_C$ (very dense soil and soft rock) or $S_D$ (stiff soil). To determine adequate proxies for $v_s30$, we compared the computed values with land cover, lithology, topographic slope, and surface elevation at each of the measurement sites. Due to a weak correlation (r = 0.41) between $v_s30$ and elevation, the best proxy of them, applications of this proxy to Chuncheon of a relatively small area seem to be limited.

An Association between Vitamin Intakes and Established Periodontitis in Korean Adult Population (한국 성인에서 비타민 섭취와 치주염 유병간의 관련성)

  • Cheon, Sae Hee;Jeong, Seong Hwa
    • Journal of dental hygiene science
    • /
    • v.14 no.4
    • /
    • pp.468-476
    • /
    • 2014
  • The aim of this study was to examine whether there is an association between vitamin intakes and established periodontitis in Korean adult population. The 6,245 subjects aged over 19 years old, who participated in health survey, oral examination and nutrition survey were selected for this study from the database of the Fourth Korean National Health and Nutrition Examination Survey. Established periodontitis was defined as ${\geq}$ code 3 in community periodontal index. Vitamin intake was assessed with the food-frequency questionnaire. In analysis, participants were classified by quintile of vitamin intakes. We also considered covariates as socio-demographic characteristics, health-related behaviors including physical activities, systemic diseases and oral health-related behaviors. Multiple logistic regression was performed to assess the crude and adjusted associations. All analyses considered a complex sampling design using SAS 9.2. In crude analysis, less intake of vitamin A, retinol and vitamin B2 significantly increased the risk of periodontitis (vitamin A, odds ratio [OR] Q1=1.00, Q2=0.73, Q3=0.80, Q4=0.77, Q5=0.78; retinol, OR: Q1=1.00, Q2=0.86, Q3=0.73, Q4=0.62, Q5=0.55; vitamin B2, OR: Q1=1.00, Q2=0.70, Q3=0.63, Q4=0.67, Q5=0.68). However, after adjusting for socio-demographics, general and oral health status and behaviors, only vitamin B2 was significantly associated with established periodontitis (OR: Q1=1.00, Q2=0.72, Q3=0.73, Q4=0.76, Q5=0.84). An adequate vitamin B2 intake was significantly associated with a decreased risk of periodontitis. This finding shows that nutrient intake is slightly correlated with periodontitis in Korean adult population. Further studies are needed to understand this association between nutrients intake and periodontitis in more details.

Behaviors of the High-profile Arch Soil-steel Structure During Construction (높은 아치형 지중강판 구조물의 시공 중 거동 분석)

  • 이종구;조성민;김경석;김명모
    • Journal of the Korean Geotechnical Society
    • /
    • v.19 no.6
    • /
    • pp.71-84
    • /
    • 2003
  • The metallic shell of soil-steel structures are so weak in bending moment that it should sustain the applied load by the interaction of the backfill soil around the structures. The shell can be subjected to excessive bending moment during side backfilling or under live-load when the soil cover is less than the minimum value. The current design code specifies the allowable deformation and Duncan(1979) and McGrath et al.(2001) suggested the strength analysis methods to limit the moments by the plastic capacity of the shell. However, the allowable deformation is an empirically determined value and the strength analysis methods are based on the results of FE analysis, hence the experimental verification is necessary. In this study, the full-scale tests were conducted on the high-profile arch to investigate its behaviors during backfilling and under static live-loads. Based on the measurements, the allowable deformation of the tested structure could be estimated to be 1.45% of rise, which is smaller than the specified allowable deformation. The comparison between the measurements and the results of two strength analyses indicate that Duncan underestimates the earth-load moment and overestimates the live-load moment, while McGrath et al. predicts both values close to the actual values. However, as the predicted factors of safeties using two methods coincide with the actual factor of safety, it can be concluded that both methods can predict the structural stability under live-loads adequately when the cover is less than the minimum.

A Study on the Textuality of China's Wuyi-Gugok, the Origin of Gugok-Wonlim -Focus on the Tradition Process to Korea - (구곡원림의 원류, 중국 무이구곡(武夷九曲)의 텍스트성 -국내 전승(傳承) 과정을 중심으로 -)

  • Rho, Jae-Hyun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.36 no.6
    • /
    • pp.66-80
    • /
    • 2009
  • This paper attempts to investigate how the cultural phenomena associated with 'Wuyi-Doga(武夷棹歌)' and 'Wuyi-Gugok (武夷九曲)' was introduced to Joseon. The icon and code of 'Gugok' cultural text which was observed in the process of transmitting the culture through repetition and imitation were examined. With regard to research methodology, an 'analysis and discussion framework' was designed based on the literature review, field survey and the seven textuality criteria proposed by Dressier. Then the textuality of 'Wuyi-Gugok' was analyzed in terms of the dependent relation of text, the relationship between the creator and user, repetition, imitation and the spread process. Since ZhouHee(朱熙)'s 'Wuyi-Doga' and 'Wuyi-Gugok' were introduced to Joseon through literature and paintings, they became a part of the cultural Phenomena with unprecedented popularity. As a result, a great number of imitations can be found. In addition, governors would even take care of political affairs in a scenic mountain valley as described in this literature. Regardless of the writer's intentiot 'Gugok' settled in Joseon as new culture in harmony with Taoism and Sung COnfucianism. In other words, Joseon's Gugok-Wonlim(九曲園林) accepted the nature-appreciation aesthetic consciousness in 'Wuyi-Doga' and 'Wuyi-Gugok' on the basis of Taoism and Sung Confucianism. In terms of the text-based dependent relation only, however, the geographical coherence was somewhat loosened while the Gugok Culture that was dependent on Taoism or elegance in life dominated the internal structure of the textuality. Meantime, the internal factors that dominated the textuality of 'Wdyi-Gugok' were interpreted as 1) 'Aesthetics of Bending, Water Whirls', 2) 'Territoriality Expression Carve letters,' 3) 'Cultural Landscape seeing through the Speculation of Meaning,' 4) 'The Pursuit of Oddness and Presentationism' and 5) 'Transcendental Landscape of Taoism and Topos.'

Experimental Design of S box and G function strong with attacks in SEED-type cipher (SEED 형식 암호에서 공격에 강한 S 박스와 G 함수의 실험적 설계)

  • 박창수;송홍복;조경연
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.1
    • /
    • pp.123-136
    • /
    • 2004
  • In this paper, complexity and regularity of polynomial multiplication over $GF({2^n})$ are defined by using Hamming weight of rows and columns of the matrix ever GF(2) which represents polynomial multiplication. It is shown experimentally that in order to construct the block cipher robust against differential cryptanalysis, polynomial multiplication of substitution layer and the permutation layer should have high complexity and high regularity. With result of the experiment, a way of constituting S box and G function is suggested in the block cipher whose structure is similar to SEED, which is KOREA standard of 128-bit block cipher. S box can be formed with a nonlinear function and an affine transform. Nonlinear function must be strong with differential attack and linear attack, and it consists of an inverse number over $GF({2^8})$ which has neither a fixed pout, whose input and output are the same except 0 and 1, nor an opposite fixed number, whose output is one`s complement of the input. Affine transform can be constituted so that the input/output correlation can be the lowest and there can be no fixed point or opposite fixed point. G function undergoes linear transform with 4 S-box outputs using the matrix of 4${\times}$4 over $GF({2^8})$. The components in the matrix of linear transformation have high complexity and high regularity. Furthermore, G function can be constituted so that MDS(Maximum Distance Separable) code can be formed, SAC(Strict Avalanche Criterion) can be met, and there can be no weak input where a fixed point an opposite fixed point, and output can be two`s complement of input. The primitive polynomials of nonlinear function affine transform and linear transformation are different each other. The S box and G function suggested in this paper can be used as a constituent of the block cipher with high security, in that they are strong with differential attack and linear attack with no weak input and they are excellent at diffusion.

The Standard of Judgement on Plagiarism in Research Ethics and the Guideline of Global Journals for KODISA (KODISA 연구윤리의 표절 판단기준과 글로벌 학술지 가이드라인)

  • Hwang, Hee-Joong;Kim, Dong-Ho;Youn, Myoung-Kil;Lee, Jung-Wan;Lee, Jong-Ho
    • Journal of Distribution Science
    • /
    • v.12 no.6
    • /
    • pp.15-20
    • /
    • 2014
  • Purpose - In general, researchers try to abide by the code of research ethics, but many of them are not fully aware of plagiarism, unintentionally committing the research misconduct when they write a research paper. This research aims to introduce researchers a clear and easy guideline at a conference, which helps researchers avoid accidental plagiarism by addressing the issue. This research is expected to contribute building a climate and encouraging creative research among scholars. Research design, data, methodology & Results - Plagiarism is considered a sort of research misconduct along with fabrication and falsification. It is defined as an improper usage of another author's ideas, language, process, or results without giving appropriate credit. Plagiarism has nothing to do with examining the truth or accessing value of research data, process, or results. Plagiarism is determined based on whether a research corresponds to widely-used research ethics, containing proper citations. Within academia, plagiarism goes beyond the legal boundary, encompassing any kind of intentional wrongful appropriation of a research, which was created by another researchers. In summary, the definition of plagiarism is to steal other people's creative idea, research model, hypotheses, methods, definition, variables, images, tables and graphs, and use them without reasonable attribution to their true sources. There are various types of plagiarism. Some people assort plagiarism into idea plagiarism, text plagiarism, mosaic plagiarism, and idea distortion. Others view that plagiarism includes uncredited usage of another person's work without appropriate citations, self-plagiarism (using a part of a researcher's own previous research without proper citations), duplicate publication (publishing a researcher's own previous work with a different title), unethical citation (using quoted parts of another person's research without proper citations as if the parts are being cited by the current author). When an author wants to cite a part that was previously drawn from another source the author is supposed to reveal that the part is re-cited. If it is hard to state all the sources the author is allowed to mention the original source only. Today, various disciplines are developing their own measures to address these plagiarism issues, especially duplicate publications, by requiring researchers to clearly reveal true sources when they refer to any other research. Conclusions - Research misconducts including plagiarism have broad and unclear boundaries which allow ambiguous definitions and diverse interpretations. It seems difficult for researchers to have clear understandings of ways to avoid plagiarism and how to cite other's works properly. However, if guidelines are developed to detect and avoid plagiarism considering characteristics of each discipline (For example, social science and natural sciences might be able to have different standards on plagiarism.) and shared among researchers they will likely have a consensus and understanding regarding the issue. Particularly, since duplicate publications has frequently appeared more than plagiarism, academic institutions will need to provide pre-warning and screening in evaluation processes in order to reduce mistakes of researchers and to prevent duplicate publications. What is critical for researchers is to clearly reveal the true sources based on the common citation rules and to only borrow necessary amounts of others' research.