• Title/Summary/Keyword: Extend 모델

Search Result 288, Processing Time 0.02 seconds

Smartphone-based casual games, character development practices through the development of business models - In the case of developing games(Craze Monkey) (스마트폰 기반 캐쥬얼게임 개발 사례를 통한 캐릭터 수익모델 개발 연구 -크레이지 몽키 개발사례 분석)

  • Lee, Jong-Ho;Lee, Dong-Lyeor;Lee, Wan-Bok;Ryu, Seuc-Ho;Kyung, Byung Pyo
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.391-396
    • /
    • 2013
  • Character industry is fundamentally based on a technical environment, a media, like any other cultural content industry. In order to extend a life of a character and increase the brand value, a choice and utilization of a more efficient way is necessary. Analyzing why game characters are less worth as a value of commodities than other media contents is presented and suggests complementary methods for the matter. In this study, an approach to increase a brand value of a game character, as well as, linking to develop profitable models afterward is suggested presenting a case of game development.

Design on Optimum Control of Subthreshold Current for Double Gate MOSFET (DGMOSFET에서 최적의 서브문턱전류제어를 위한 설계)

  • Jung, Hak-Kee;Na, Young-Il;Lee, Jong-In
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.887-890
    • /
    • 2005
  • The double gate(DG) MOSFET is a promising candidate to further extend the CMOS scaling and provide better control of short channel effect(SCE). DGMOSFETs, having ultra thin updoped Si channel for SCEs control, are being validated for sub-20nm scaling, A channel effects such as the subthreshold swing(SS), and the threshold voltage roll-off(${\Delta}V_{th}$). The propsed model includes the effects of thermionic emission and quantum tunneling of carriers through the source-drain barrier. The proposed model is used to design contours for gate length, channel thickness, and gate oxide thickness.

  • PDF

An Active Temporal Rule Model for a Nuclear Plant Monitoring System (원전감시 시스템을 위한 능동적 시간지원 규칙 모델)

  • Nam, Gwang-U;Park, Jeong-Seok;Ryu, Geun-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2281-2293
    • /
    • 1999
  • Many applications such as nuclear power plant monitoring, plant process control, stock market management, and network data management require a database system supporting both temporal data model and active rule processing. There have been some efforts to extend the temporal functionalities of the active database system, but an active database system based on temporal database, especially the one applied to the real application is rare. In this paper, we proposed an active temporal rule model based on bi-temporal database. And a rule language following the proposed rule model was described with its execution semantics. Then, how to apply to the nuclear power plant monitoring system was given as the examples.

  • PDF

Design and Analysis of Real-time Intrusion Detection Model for Distributed Environment (분산환경을 위한 실시간 침입 탐지 모델의 설계)

  • 이문구;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.71-84
    • /
    • 1999
  • The most of intrusion detection methods do not detect intrusion when it happens. To solve the problem, we are studying a real-time intrusion detection. Because a previous intrusion detection system(IDS) is running on the host level, it difficult to port and to extend to other system on the network level that distributed environment. Also IDS provides the confidentiality of messages when it sends each other. This paper proposes a model of real-time intrusion detection using agents. It applies to distributed environment using an extensibility and communication mechanism among agents, supports a portability, an extensibility and a confidentiality of IDS.

Principles and Methods for Critical Mathematics Education: An Explorative Study of a Program (비판적 수학교육의 원리와 방법 탐색: 프로그램 개발을 위한 기초연구로서)

  • Song, Ryoon-Jin;Ju, Mi-Kyung
    • Journal of Educational Research in Mathematics
    • /
    • v.27 no.4
    • /
    • pp.857-888
    • /
    • 2017
  • Due to globalization, diversification, and informatization, modern society confronts change and crisis in a variety of areas such as economy, politics, and culture. In that context, mathematics educators seek for how to reform school mathematics for democratic and just society. This research proposes critical mathematics education as an alternative model of school mathematics for democratic society. In particular, this research is an explorative study to construct a model of critical mathematics education program. For the purpose, we conducted a comprehensive literature review to identify goals, contents, and methods of teaching and learning, and method of assessment for critical mathematics education. We checked the validity of the model by using the cases of critical mathematics education. Since this research is explorative in the regard that the model is based on theoretical literatures, further research is necessary to extend the model through design research in school context.

Security-Reverse-Attack Engineering Life-cycle Model for Attack System and Attack Specification Models (공격시스템을 위한 보안-역-공격공학 생명주기 모델과 공격명세모델)

  • Kim, Nam-Jeong;Kong, Mun-Soo;Lee, Gang-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.6
    • /
    • pp.17-27
    • /
    • 2017
  • Recently, as cyber attacks have been activated, many such attacks have come into contact with various media. Research on security engineering and reverse engineering is active, but there is a lack of research that integrates them and applies attack systems through cost effective attack engineering. In this paper, security - enhanced information systems are developed by security engineering and reverse engineering is used to identify vulnerabilities. Using this vulnerability, we compare and analyze lifecycle models that construct or remodel attack system through attack engineering, and specify structure and behavior of each system, and propose more effective modeling. In addition, we extend the existing models and tools to propose graphical attack specification models that specify attack methods and scenarios in terms of models such as functional, static, and dynamic.

Development of a SEAMCAT Based Interference Evaluation Tool with ITU-R P.526 (ITU-R P.526을 지원하는 SEAMCAT 기반 전파 간섭 평가 도구 개발)

  • Lim, Chang Heon;Kwon, Jong Man;Kim, Yong Hoon;Lee, Yang Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.9
    • /
    • pp.791-801
    • /
    • 2012
  • Currently, SEAMCAT has been widely used as a tool to evaluate the effects of interference among a variety of wireless communication systems. This supports various channel propagation models, all of which are based on some statistical models for the channel propagation and do not exploit any specific terrain characteristics. Thus it is not appropriate for assessing the effects of interference between wireless systems, given some specific terrain features. In order to overcome this limit in its use, it is necessary to extend the capability of SEAMCAT to support a channel propagation model which takes into account terrain informations. The ITU-R P.526 is a familiar channel propagation model which calculates the path loss considering the terrain features. In this paper, we present an enhanced version of SEAMCAT which supports the ITU-R P.526 and provide a few examples of interference evaluation using it.

Construction of an Agent-based Fault-Tolerant Object Group Model (에이전트 기반의 고장허용 객체그룹 모델 구축)

  • Kang, Myung-Seok;Kim, Hag-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1B
    • /
    • pp.74-85
    • /
    • 2009
  • We propose an Agent-based Fault Tolerant Object Group model based on the agent technology and FTOG model with replication mechanism for effective object management and fault recovery. We define the five kind of agents - internal processing agent, registration agent, state handling agent, user interface agent, and service agent - that extend the functions of the FTOG model. The roles of the agents in the proposed model are to reduce the remote interactions between distributed objects and provide more effective service execution. To verify the effectiveness of the proposed model, we implemented the Intelligent Home Network Simulator (IHNS) which virtually provides general home networking services. Through the simulations, it is validated that the proposed model decreases the interactions of the object components and supports the effective fault recovery, while providing more stable and reliable services.

Stability and PSR(Power-Supply Rejection) Models for Design Optimization of Capacitor-less LDO Regulators (회로 최적화를 위한 외부 커패시터가 없는 LDO 레귤레이터의 안정도와 PSR 성능 모델)

  • Joo, Soyeon;Kim, Jintae;Kim, SoYoung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.1
    • /
    • pp.71-80
    • /
    • 2015
  • LDO(Low Drop-Out) regulators have become an essential building block in modern PMIC(Power Managment IC) to extend battery life of electronic devices. In this paper, we optimize capacitor-less LDO regulator via Geometric Programming(GP) designed using Dongbu HiTek $0.5{\mu}m$ BCDMOS process. GP-compatible models for stability and PSR of LDO regulators are derived based on monomial formulation of transistor characteristics. Average errors between simulation and the proposed model are 9.3 % and 13.1 %, for phase margin and PSR, respectively. Based on the proposed models, the capacitor-less LDO optimization can be performed by changing the PSR constraint of the design. The GP-compatible performance models developed in this work enables the design automation of capacitor-less LDO regulator for different design target specification.

RDB-based XML Access Control Model with XML Tree Levels (XML 트리 레벨을 고려한 관계형 데이터베이스 기반의 XML 접근 제어 모델)

  • Kim, Jin-Hyung;Jeong, Dong-Won;Baik, Doo-Kwon
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.129-145
    • /
    • 2009
  • As the secure distribution and sharing of information over the World Wide Web becomes increasingly important, the needs for flexible and efficient support of access control systems naturally arise. Since the eXtensible Markup Language (XML) is emerging as the de-facto standard format of the Internet era for storing and exchanging information, there have been recently, many proposals to extend the XML model to incorporate security aspects. To the lesser or greater extent, however, such proposals neglect the fact that the data for XML documents will most likely reside in relational databases, and consequently do not utilize various security models proposed for and implemented in relational databases. In this paper, we take a rather different approach. We explore how to support security models for XML documents by leveraging on techniques developed for relational databases considering object perspective. More specifically, in our approach, (1) Users make XML queries against the given XML view/schema, (2) Access controls for XML data are specified in the relational database, (3) Data are stored in relational databases, (4) Security check and query evaluation are also done in relational databases, and (5) Controlling access control is executed considering XML tree levels

  • PDF