• Title/Summary/Keyword: Dynamic Targeting

Search Result 73, Processing Time 0.029 seconds

Fuzzy-AHP-Based Technology Evaluation Model for venture firms (Fuzzy-AHP에 기반을 둔 벤처기업의 기술력 평가 모델)

  • Joun, Hyang-Soon;Lee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.363-371
    • /
    • 2016
  • Technology evaluation for technology innovation of venture firms should take the rapidly changing corporate environment, the ambiguity of language used in evaluation, and the inaccuracy of evaluation index into consideration. In this paper, targeting the absorptive capacity and technological entrepreneurship which are typical evaluation factors of venture firms, an ACTEM model to calculate the importance, priority, and dynamic capability of factors, applying Fuzzy-AHP was proposed. The fuzzy theory was introduced to compensate for the ambiguity of cognitive judgments when calculating weighted values for the factors that made up an assessment scale. An assessment criteria framework for absorptive capacity, technological entrepreneurship, and dynamic capability, which were not considered in previous studies on the evaluation and measurement of technological prowess, so that the users could have a realistic alternative to choose. The study compared the ACTEM model with the old AHP assessment method and found that "knowledge acquisition" and "producing ability" were the highest in absorptive capacity and technological entrepreneurship, respectively, thus demonstrating its validity.

The Effect of Dynamic Lumbar Stabilization Exercise to Be Affected with Improvement and Maintenance of Trunk Stability after Opened Microscopic Laser Discectomy (개방형 현미경적 요추간판 제거술 후 동적 요부 안정화 운동에 따른 체간 안정성의 개선과 유지)

  • Nam, Kun-Woo;Kim, Jong-Soon
    • The Journal of Korean Academy of Orthopedic Manual Physical Therapy
    • /
    • v.11 no.1
    • /
    • pp.37-48
    • /
    • 2005
  • Objects: This study is designed to analysis improvement and maintaince of trunk stability targeting patients who need post operative rehabilitation exercise after undergoing opened microscopic laser discectomy(OMLD) due to HNP. Method: Between March 2004 and February 2005 a total sixty patients who underwent OMLD due to $L_4/L_5$, $L_5/S_1$ HNP and who agreed to the experiment were subject for this study. Experimental group consisted of 18 subjects, and they underwent 45 minutes dynamic lumbar stabilization exercise And control group consisted of 18 subjects who conducted conservative physical therapy based on the use of physical modality for 45 minutes except to exercise. Results: Experimental group that was lumbar extensor's isometric peak torque, weight distribution of both leg, trunk muscle balance and Oswestry LBP disability index increased during 12 weeks in a statistically significant manner compared to before exercise (p<.05). When re-test was tried, isometric peak torque (p>.05) and Oswestry LBP disability index(p<.05) maintained 12th week level or improved. Weight distribution rate of both leg and trunk muscle balance maintained the level of 8th week of exercise execution(p<.05). Control group that was lumbar extensor's isometric peak torque, weight distribution rate of both leg and trunk muscle balance aggravated during 12 weeks compared to pre-test(p>.05) But, Oswestry LBP disability index increased in a statistically significant level compared to pre-test(p<.05). When re-test was tried, isometric peak torque increased slightly compared to pre-test, but decreased when at least $60^{\circ}$ flexion angle(p>.05). Weight distribution rate of both leg and trunk muscle balance also aggravated compared to pre-test(p>.05), and Oswestry LBP disability index was similar to the 4th week of physical therapy execution(p>.05). Conclusion: Successive postoperative Especially, Application of dynamic lumbar stabilization exercise program is important than traditional lumbar strengthening exercise program in the maintaince of spinal stability.

  • PDF

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

A Study on Policies for the Activation of WiBro Market (와이브로 시장 활성화를 위한 정책 방안 연구)

  • Lee, Young-Suk;Jung, Jae-Lim;Park, Sang-Hyun;Kim, Sang-Wook
    • Korean System Dynamics Review
    • /
    • v.12 no.2
    • /
    • pp.37-67
    • /
    • 2011
  • This study first attempted to point out fundamental reasons behind the failure to have WiBro services off the saddle, investigating the previous studies, and second to screen the WiBro promotion policies after reviewing the major steps conducted thus far by the government. In order to put the screened policies in order by the importance, an AHP analysis was conducted targeting WiBro professionals in various fields such as government offices, universities, research institutes, and industry. One step further, causal loop diagramming on the system dynamics methodology was conducted to examine the dynamic structure of the WiBro market in holistic standpoint of view. Finally, a simulation model was developed based on the causal loop diagrams and the results of the AHP analysis in order to examine how various policy scenarios influence the growth of the WiBro market over time, and to compare the mix of policy options. Finally, the study attempted to draw some implications for WiBro vitalization.

  • PDF

DRINKING AS AN EPIDEMIC: A MATHEMATICAL MODEL WITH DYNAMIC BEHAVIOUR

  • Sharma, Swarnali;Samanta, G.P.
    • Journal of applied mathematics & informatics
    • /
    • v.31 no.1_2
    • /
    • pp.1-25
    • /
    • 2013
  • In this paper we have developed a mathematical model of alcohol abuse. It consists of four compartments corresponding to four population classes, namely, moderate and occasional drinkers, heavy drinkers, drinkers in treatment and temporarily recovered class. Basic reproduction number $R_0$ has been determined. Sensitivity analysis of $R_0$ identifies ${\beta}_1$, the transmission coefficient from moderate and occasional drinker to heavy drinker, as the most useful parameter to target for the reduction of $R_0$. The model is locally asymptotically stable at disease free or problem free equilibrium (DFE) $E_0$ when $R_0$ < 1. It is found that, when $R_0$ = 1, a backward bifurcation can occur and when $R_0$ > 1, the endemic equilibrium $E^*$ becomes stable. Further analysis gives the global asymptotic stability of DFE. Our aim of this analysis is to identify the parameters of interest for further study with a view for informing and assisting policy-makers in targeting prevention and treatment resources for maximum effectiveness.

Optimization of Bidirectional DC/DC Converter for Electric Vehicles Based On Driving Cycle

  • Yutao, Luo;Feng, Wang
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.5
    • /
    • pp.1934-1944
    • /
    • 2017
  • As a key component of high-voltage power conversion system for electric vehicles (EVs), bidirectional DC/DC (Bi-DC/DC) is required to have high efficiency and light weight. Conventional design methods optimize the Bi-DC/DC at the maximum power dissipation point (MPDP). For EVs application, the work condition of the Bi-DC/DC is not strict as the MPDP, where the design method using MPDP may not be optimal during travel of EVs. This paper optimizes the Bi-DC/DC converter targeting efficiency and weight based on the driving cycle. By analyzing the two-phase interleaved Bi-DC/DC for hybrid energy storage systems (HESS) of EVs, its power dissipation is calculated, and an efficiency model is derived. On this basis, weight models of capacitor, inductor and heat sink are built, as well as a dynamic temperature model of heat sink. Based on these models, a method using New European Driving Cycle (NEDC) for optimal design of Bi-DC/DC which simultaneously considered efficiency and weight is proposed. The simulation result shows that compare with conventional optimization methods revealed that the optimization approach based on driving cycle allowed significant weight reduction while meeting the efficiency requirements.

A Study on the Multi-level Optimization Method for Heat Source System Design (다단계 최적화 수법을 이용한 열원 설비 설계법에 관한 연구)

  • Yu, Min-Gyung;Nam, Yujin
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.28 no.7
    • /
    • pp.299-304
    • /
    • 2016
  • In recent years, heat source systems which have a principal effect on the performance of buildings are difficult to design optimally as a great number of design factors and constraints in large and complicated buildings need to be considered. On the other hand, it is necessary to design an optimum system combination and operation planning for energy efficiency considering Life Cycle Cost (LCC). This study suggests a multi-level and multi-objective optimization method to minimize both LCC and investment cost using a genetic algorithm targeting an office building which requires a large cooling load. The optimum method uses a two stage process to derive the system combination and the operation schedule by utilizing the input data of cooling and heating load profile and system performance characteristics calculated by dynamic energy simulation. The results were assessed by Pareto analysis and a number of Pareto optimal solutions were determined. Moreover, it was confirmed that the derived operation schedule was useful for operating the heat source systems efficiently against the building energy requirements. Consequently, the proposed optimization method is determined by a valid way if the design process is difficult to optimize.

Android malicious code Classification using Deep Belief Network

  • Shiqi, Luo;Shengwei, Tian;Long, Yu;Jiong, Yu;Hua, Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.454-475
    • /
    • 2018
  • This paper presents a novel Android malware classification model planned to classify and categorize Android malicious code at Drebin dataset. The amount of malicious mobile application targeting Android based smartphones has increased rapidly. In this paper, Restricted Boltzmann Machine and Deep Belief Network are used to classify malware into families of Android application. A texture-fingerprint based approach is proposed to extract or detect the feature of malware content. A malware has a unique "image texture" in feature spatial relations. The method uses information on texture image extracted from malicious or benign code, which are mapped to uncompressed gray-scale according to the texture image-based approach. By studying and extracting the implicit features of the API call from a large number of training samples, we get the original dynamic activity features sets. In order to improve the accuracy of classification algorithm on the features selection, on the basis of which, it combines the implicit features of the texture image and API call in malicious code, to train Restricted Boltzmann Machine and Back Propagation. In an evaluation with different malware and benign samples, the experimental results suggest that the usability of this method---using Deep Belief Network to classify Android malware by their texture images and API calls, it detects more than 94% of the malware with few false alarms. Which is higher than shallow machine learning algorithm clearly.

A Low Power Asynchronous MSP430 Processor for Ubiquitous Sensor Network (편재형 센서네트워크 노드를 위한 저전력 비동기 MSP430 프로세서)

  • Shin, Chi-Hoon;Shang, Belong;Oh, Myeong-Hoon;Kim, Young-Woo;Kim, Sung-Nam;Yakovlev, Alex;Kim, Sung-Woon
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.451-453
    • /
    • 2007
  • This paper describes the design of an asynchronous implementation of a sensor network processor. The main purpose of this work is the reduction of power consumption in sensor network node processors and the research presented here tries to explore the suitability of asynchronous circuits for this purpose. The Handshake Solutions toolkit is used to implement an asynchronous version of a sensor processor. The design is made compact, trading area and leakage power savings with dynamic power costs, targeting the typical sparse operating characteristics of sensor node processors. It is then compared with a synchronous version of the same processor. Both versions are then compared with existing commercial processors in terms of power consumption.

  • PDF

A Study on the Characteristics by Spatial Types and an Empirical Research for The Third Place - focused on a research targeting urban housewives - (제3의 장소에 대한 실증적 조사와 유형별 공간특성에 관한 연구 - 도시거주 전업주부를 대상으로 -)

  • Lee, Jeong-Mi
    • Korean Institute of Interior Design Journal
    • /
    • v.21 no.5
    • /
    • pp.65-76
    • /
    • 2012
  • The purpose of this study is to grasp the spatial characteristics and consciousness structure for The Third Place through the empirical research, focused on housewives as the survey who spend many times in neighborhood. The four types as the consciousness structure are deducted, Nature-oriented type, Unusual experience type, Solitude enjoyment type, and Originality-oriented type. And the spatial characteristics related to the four types are deducted as the followings: Nature-oriented type contains the spatial characteristics as Wild space, Speculative space, Dotty occupation space, and Green way. Unusual experience type contains as Rambling space, Dynamic sojourn space, and Theme-plex space. Solitude enjoyment type contains as Anonymous private space, Encircling space, and Religious space. Originality-oriented type contains as Chatter space, Self development space, and Community space between families. The results of this study represent six characteristics on the third place, advocated by Oldenburg, and show housewives' various needs and concrete examples for the Third place in city.

  • PDF