• Title/Summary/Keyword: Flow Fields

Search Result 2,028, Processing Time 0.027 seconds

Research on the Access Control Methodology for Dualised Hierarchical Personal Information Life-Cycle (이원화된 계층적 개인정보 Life-Cycle 접근제어 방법론에 관한 연구)

  • Seo, Woo-Seok;Kim, Kye-Soon;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.8
    • /
    • pp.1161-1170
    • /
    • 2013
  • Currently in 2013, a law that was drawn as a result of social agreement for personal information protection was enacted, and through several amendments, definite policy of written law and guideline were presented for definitive information protection in various fields of social business including IT field. Based on a series of social issues about the importance of personal information, a new access paradigm to personal information appeared. And from macroscopic access method called information protection, the necessity of technical access method came to the fore. Of course, it seems somewhat irrational to restrict all data in the form of personal information to a certain category of information until now. But in the deluge of information based on IT field, it is true that the part of checking the flow of personal information and selecting as security target has been standardized. But still there are cases in which it is difficult to routinely apply the five standardized flows of personal information Life-Cycle-collect, process, provide, store, and destroy-to information that all companies and organizations have. Therefore, the researcher proposes the standardized methodology by proposing the access control methodology for dualised hierarchical personal information Life-Cycle. The results of this research aim to provide practical data which makes optimal access control to personal information Life-Cycle possible.

Collaboration and Node Migration Method of Multi-Agent Using Metadata of Naming-Agent (네이밍 에이전트의 메타데이터를 이용한 멀티 에이전트의 협력 및 노드 이주 기법)

  • Kim, Kwang-Jong;Lee, Yon-Sik
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.105-114
    • /
    • 2004
  • In this paper, we propose a collaboration method of diverse agents each others in multi-agent model and describe a node migration algorithm of Mobile-Agent (MA) using by the metadata of Naming-Agent (NA). Collaboration work of multi-agent assures stability of agent system and provides reliability of information retrieval on the distributed environment. NA, an important part of multi-agent, identifies each agents and series the unique name of each agents, and each agent references the specified object using by its name. Also, NA integrates and manages naming service by agents classification such as Client-Push-Agent (CPA), Server-Push-Agent (SPA), and System-Monitoring-Agent (SMA) based on its characteristic. And, NA provides the location list of mobile nodes to specified MA. Therefore, when MA does move through the nodes, it is needed to improve the efficiency of node migration by specified priority according to hit_count, hit_ratio, node processing and network traffic time. Therefore, in this paper, for the integrated naming service, we design Naming Agent and show the structure of metadata which constructed with fields such as hit_count, hit_ratio, total_count of documents, and so on. And, this paper presents the flow of creation and updating of metadata and the method of node migration with hit_count through the collaboration of multi-agent.

A Study on the System for Improving the Safety Device of the Hydrogen Fluoride ISO Tank (AHF ISO Tank의 안전성 향상을 위한 안전장치에 관한 연구)

  • Park, Sang Bae;Lee, Chang Jun
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.3
    • /
    • pp.54-62
    • /
    • 2020
  • Watching the leakage accident of the Gumi Hube Global AHF(Anhydrous fluoric Acid), I experienced how much chemical accidents affect on our society. Since then, many studies have been conducted on chemical accident in many fields. The use department wanted to find improvement plans for the process system and apply them to the field. The safety field wanted to study improvement of safety through the analysis of damage effects and apply them to emergency response to reduce damage effects. In this study, Mechanical safe devices have been applied which can respond quickly to chemical accidents occurring during the charging operation to enhance the safety of the AFH ISO Tank(Anhydrous fluoric Acid International Organization for Standardization Tank). Investigation of similar tanks confirmed that other chlorine tanks with the same working procedure as AHF ISO Tank have a mechanical safety device, EFV(Excess Flow Valve). Applicability and performance for emergency shutdown when EFV is introduced in AHF ISO Tank can be verified by comparing and examining the accident situation of Hube Global Accident and the accident in Ulsan 2018. Comparing accident cases, expected performance and applicability, It is suggested that EFV, a mechanical safety device that can reduce damage from chemical accidents to the tank and handle accidents early, should be introduced to the tank.

A fundamental study on the ventilation analysis method for the network-type tunnel - focused on the none hardy-cross method (네트워크형 터널의 환기해석 방법에 대한 기초연구-비 Hardy-Cross 방법을 중심으로)

  • Kim, Hyo-Gyu;Choi, Pan-Gyu;Ryu, Ji-Oh;Lee, Chang-Woo
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.18 no.3
    • /
    • pp.291-303
    • /
    • 2016
  • Recently, various forms of diverging sections in tunnels have been designed as the demand for underground passageway in urban areas increases. Therefore, the complexity of the ventilation system in tunnels with diverging sections requires a ventilation analysis method different from the conventional method for the straight tunnels. None of the domestic and foreign tunnel ventilation design standards specifies the method for the ventilation network analysis, and the numerical analysis methods have been most widely used. This paper aims at reviewing the ventilation network analytical method applicable as the design standard. The proposed method is based on the characteristic equations rather than the numerical analysis. Thanks to the advantages of easy application, the Hardy-Cross method has been widely applied in the fields of mine ventilation and tunnel ventilation. However, limitations with the cutting errors in the Taylor series expansion and the convergence problem mainly caused by the mesh selection algorithm have been reported. Therefore, this paper examines the applicability of the ventilation analysis method for network-type tunnels with the gradient method that can analyze flow rate and pressure simultaneously without the configuration of mesh. A simple ventilation analysis method for network-type tunnels is proposed.

The Structural Relationship among Trust in MIM, Attitude toward Emoticons, and the Intention to Purchase Emoticons in Kakao Talk (모바일 인스턴트 메신저에 대한 신뢰, 이모티콘 사용 태도와 이모티콘 구매의도 사이의 구조적 관계: 카카오톡 사례)

  • Jung, Bohee;Bae, Jungho
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.10
    • /
    • pp.311-325
    • /
    • 2016
  • The communication via MIM(Mobile Instant Messenger) has unique characteristics; one of them is use of emoticons. Although using emoticons in MIM is getting a lot of attention from business fields and emoticons markets in MIM is growing rapidly, there are little researches focused on emoticons in MIM in consumer behaviors and marketing area. So, the purpose of this study is to fill this theoretical and practical gap. For this purpose, we explore the effect of and trust in MIM system and attitude toward use of emoticons on purchase intention to emotions in MIM. Our study used structural equation modeling analysis; the results showed that perceived benefits and perceived risk to MIM affected trust in MIM system significantly, more specifically, while perceived benefits affected trust in MIM system positively, perceived risk affected trust in MIM system negatively. We also found that perceived usefulness of emoticon in MIM and flow experience influenced attitude toward use of emoticons positively. Lastly, trust in MIM system and attitude toward use of emoticons had positive effect on purchase intention to emoticons in MIM. The implication and limitations of this study are also discussed.

Impacts of Combined Hydrogeological and Chemical Heterogeneities on the Transport of Leachate through Landfill Sites (수리지질학적, 화학적 특성의 복합 불균질성이 매립지반 내 침출수 이동에 미치는 영향)

  • Lee, Kun-Sang
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.31 no.4
    • /
    • pp.300-307
    • /
    • 2009
  • The transport of landfill leachate in the subsurface formations of unlined landfill sites is considered. The impacts of hydrogeological and chemical heterogeneities on the leachate transport are assessed by examining the results from a series of Monte-Carlo simulations. The landfill system simulated in this study is hypothetically represented with three levels of spatial variability for the hydrogeological and chemical parameter; (1) homogeneous hydraulic conductivity (K) and distribution coefficient ($K_d$), (2) K heterogeneity only, and (3) combined heterogeneities of K and $K_d$. To calculate the transport of leachate through negatively-correlated random hypothetical K-$K_d$ fields generated using geostatistical input parameters, a saturated flow model is linked with a contaminant transport model. Point statistic values such as mean, standard deviation, and coefficient of variation of the concentration were obtained from 100 Monte-Carlo trials. Results of point statistics show that the heterogeneities of K and $K_d$ in the landfill site prove to be an important parameter in controlling leachate concentrations. Consideration of combined K and $K_d$ heterogeneities results in enhancing the variability of contaminant transport. The variability in the leachate concentration for different realizations also increases as the distance between source and monitoring well increase.

The Study on the Elaboration of Technology Valuation Model and the Adequacy of Volatility based on Real Options (실물옵션 기반 기술가치 평가모델 정교화와 변동성 유효구간에 관한 연구)

  • Sung, Tae-Eung;Lee, Jongtaik;Kim, Byunghoon;Jun, Seung-Pyo;Park, Hyun-Woo
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.3
    • /
    • pp.732-753
    • /
    • 2017
  • Recently, when evaluating the technology values in the fields of biotechnology, pharmaceuticals and medicine, we have needed more to estimate those values in consideration of the period and cost for the commercialization to be put into in future. The existing discounted cash flow (DCF) method has limitations in that it can not consider consecutive investment or does not reflect the probabilistic property of commercialized input cost of technology-applied products. However, since the value of technology and investment should be considered as opportunity value and the information of decision-making for resource allocation should be taken into account, it is regarded desirable to apply the concept of real options, and in order to reflect the characteristics of business model for the target technology into the concept of volatility in terms of stock price which we usually apply to in evaluation of a firm's value, we need to consider 'the continuity of stock price (relatively minor change)' and 'positive condition'. Thus, as discussed in a lot of literature, it is necessary to investigate the relationship among volatility, underlying asset values, and cost of commercialization in the Black-Scholes model for estimating the technology value based on real options. This study is expected to provide more elaborated real options model, by mathematically deriving whether the ratio of the present value of the underlying asset to the present value of the commercialization cost, which reflects the uncertainty in the option pricing model (OPM), is divided into the "no action taken" (NAT) area under certain threshold conditions or not, and also presenting the estimation logic for option values according to the observation variables (or input values).

Factors Impacting Public Technology Transfer and Commercialization and Its Strategy for R&D Management (공공기술이전·사업화 영향요인 및 연구개발 관리전략)

  • Sung, Oong-Hyun;Moon, Hye-Jung;Kang, Hun
    • Journal of Korea Technology Innovation Society
    • /
    • v.18 no.3
    • /
    • pp.468-491
    • /
    • 2015
  • The major objective of this research is to suggest the proactive strategy and management of public R&D for the active transfer of technology based on the influential factor analysis of technology transfer. This study identified influential factors which make the greatest impact on the success of public technology transfer and commercialization through three points of view-technology supplier's view, technology adopter's view and view of commercialization-which contribute to successful technology transfer and commercialization. The core influential variables for blocking technology transfer are identified such as additional technological development, search for technology adopter followed by mass production technology and testing of confidence. Technology adopter is to create new markets or expand existing markets through the superiority (innovation) of licensing technology, increasing the internal innovation capabilities and maximizing the impacts of technology. This research suggests two effective strategies for improving technology transfer such as technology planning and marketing in the view of technology license. The strategy of technology planning should be established and executed to meet both technology trends and adopter's needs. And strong patents should be secured in terms of licensing of technology. Also the technological performance should be evaluated at mid-term appraisal, confirming the needs of adopter and competitive advantage of technology and patent. In addition to this, the customized technology marketing strategy for different fields of applications is also required in order to improve the likelihood of technology transfer. If the performance of R&D organization could be evaluated by global technological competitiveness and spillover effects of commercialization rather than quantitative output, the flow of technology transfer and commercialization would be accelerated.

The Development Method of IFC Extension Elements using Work Breakdown Structure in River Fields (작업분류체계를 활용한 하천분야 IFC 확장 개발방안)

  • Won, Jisun;Shin, Jaeyoung;Moon, Hyoun-Seok;Ju, Ki-Beom
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.77-84
    • /
    • 2018
  • As the application of BIM (Building Information Modeling) to the civil sector has become practical, and mandatory for road projects, the standardization, development of systems, etc. for the application and operation of BIM are required. In particular, it is important to develop BIM data standards for producing, sharing and managing the lifecycle data of civil facilities because they are commonly national public facilities. The BIM data standards have been developed by utilizing or extending IFC (Industry Foundation Classes), which is an international standard, but schema extensions of river facilities has not been developed thus far. This study proposes an approach to an IFC extension for river facilities using the WBS (Work Breakdown Structure) as a fundamental study for IFC-based schema extension in the river field. For this purpose, the research was carried out as follows. First, the IFC extension development method was selected to represent the river facilities by analyzing the existing IFC structure and previous research cases for the IFC extension. Second, extended elements of the river facilities were identified through an analysis of the WBS and classified according to the high-level structure of the IFC schema. Third, the classified elements were arranged based on the IFC hierarchy and the IFC schema extension for river facilities was established. Based on the suggested extension method of IFC schema, this study developed the schema by defining the element components and parts of river facilities, such as distribution flow elements and deriving their detailed types and properties.

A Porting Technique of WiFi Device on Android Platform (안드로이드 플랫폼에 WiFi 디바이스 탑재 기법)

  • Jeong, Uyeong;Ju, Youngkwan;Jeon, Joongnam
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.1
    • /
    • pp.51-58
    • /
    • 2012
  • Android platform is a powerful operating system developed on Linux 2.6 Kernel, and provides many features such as comprehensive libraries, a multimedia environment, and powerful interface for phone applications. Since Android is an open operating system, which can be installed in any vendors's equipments. Current smartphones as well as netbooks, navigations, car PCs, tablet PCs, Industrial PCs are used in various fields. It is difficult a lot that to mount to other devices on the Android platform or new devices. In this Paper, The process that data that occurred from a hardware was passed to the highest application and Android platform system for managing hardware devices were analyzed. Building Android & driver compilation environment, How to support the protocol for the use of WiFi in the kernel, How to Mount a WiFi device in the kernel, Device driver registration for the Android platform, WiFi Management Service Daemon (wpa_supplicant) and IP allocation services daemon (dhcpcd) registration, How to create a socket for communication between the daemon (wpa_supplicant) and HAL have been presented. In the experiment using the proposed method, WiFi devices were mounted on the Android platform in the X-86 & ARM family. Understanding the whole process of control flow in Android hierarchy is very important to porting a new device on it. The process included in this paper can help technicians who might encounter the obstacles in their porting works.

  • PDF