• Title/Summary/Keyword: IS요구도

Search Result 25,669, Processing Time 0.052 seconds

Effects of Strength Reduction Factors for Capacity Spectrum Analysis of Bridge Structures using Inelastic Demand Spectrum (비탄성 요구도 스펙트럼을 이용한 교량구조물의 역량스펙트럼 해석에 대한 강도감소계수의 영향)

  • Song, Jong-Keol;Jin, He-Shou;Jang, Dong-Hui
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.1A
    • /
    • pp.25-37
    • /
    • 2008
  • The capacity spectrum method (CSM) is a simple and graphical seismic analysis procedure. Originally, it has been developed for buildings, but now its applicability has been extended to bridge structures. It is based on the capacity curve estimated by pushover analysis and demand spectrum reduced from linear elastic design spectrum by using effective damping or strength reduction factor. In this paper, the inelastic demand spectrum as the reduced demand spectrum is calculated from the linear elastic design spectrum by using the several formulas for the strength reduction factor. The effects of the strength reduction factor for the capacity spectrum analysis are evaluated for 3 types of symmetric and asymmetric bridge structures. To investigate an accuracy of the CSM which several formulas for strength reduction factor were applied, the maximum displacements estimated by the CSM are compared with the results obtained by nonlinear time history analysis for 8 artificially generated earthquakes. The maximum displacements estimated by the CSM using the SJ formula among the several strength reduction factors provide the most accurate agreement with those calculated by the inelastic time history analysis.

Analysis of the Security Requirements of the Chatbot Service Implementation Model (챗봇서비스 구현 모델의 보안요구사항 분석)

  • Kyu-min Cho;Jae-il Lee;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.167-176
    • /
    • 2024
  • Chatbot services are used in various fields in connection with AI services. Security research on AI is also in its infancy, but research on practical security in the service implementation stage using it is more insufficient. This paper analyzes the security requirements for chatbot services linked to AI services. First, the paper analyzes the recently published papers and articles on AI security. A general implementation model is established by investigating chatbot services provided in the market. The implementation model includes five components including a chatbot management system and an AI engine Based on the established model, the protection assets and threats specialized in Chatbot services are summarized. Threats are organized around threats specialized in chatbot services through a survey of chatbot service managers in operation. Ten major threats were drawn. It derived the necessary security areas to cope with the organized threats and analyzed the necessary security requirements for each area. This will be used as a security evaluation criterion in the process of reviewing and improving the security level of chatbot service.

A Study on the Support Method for Activate Youth Start-ups in University for the Creation of a Start-up Ecosystem: Focused on the Case of Seoul City (지역 청년창업생태계 조성을 위한 대학의 지원방안 탐색: 서울시 사례를 중심으로)

  • Kim, In Sook;Yang, Ji Hee
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.4
    • /
    • pp.57-71
    • /
    • 2022
  • The purpose of this study was to analyze the perception and demand of local youth and to find ways to support universities in order to create an youth start-up ecosystem. To this end, 509 young people living in Seoul were analyzed to recognize and demand young people in the region for youth start-ups, and to support universities. The findings are as follows. First, as a result of analyzing young people's perception of youth start-ups in the region, the "Youth Start-up Program" was analyzed the highest in terms of the demand for regional programs by university. In addition, there was a high perception that the image of youth startups in the region was "challenging" and "good for changing times." Second, after analyzing the demand for support for youth start-ups in the region, it appeared in the order of mentoring, start-up education, and creation of start-up spaces. And it showed different needs for different ages. Third, the results were derived from analysis of the demand for university support for the creation of a regional youth start-up ecosystem, the criteria for selecting local youth start-up support organizations, and the period of participation in local youth start-up support. Based on the results of the above research, the implications and suggestions of university support for the creation of a community of youth start-up ecosystem are as follows. First of all, it is necessary to develop and operate sustainable symbiosis mentoring programs focusing on university's infrastructure and regional symbiosis. Second, it is necessary to develop and utilize step-by-step systematic microlearning content based on the needs analysis of prospective youth start-ups. Third, it is necessary to form an open youth start-up base space for local residents in universities and link it with the start-up process inside and outside universities. The results of this study are expected to be used as basic data for establishing policies for supporting youth start-ups and establishing and operating strategies for supporting youth start-ups at universities.

The Requirements of Payload for the UAV (무인기용 임무장비 선정시 요구사항)

  • Kim, Joong-Wook
    • Aerospace Engineering and Technology
    • /
    • v.6 no.2
    • /
    • pp.245-249
    • /
    • 2007
  • The objective of the UAV removes the life loss of the pilot who is the maximum weak point of the manned reconnaissance aircraft, accomplishes the reconnaissance it is an aircraft for. The camera which will confirm the pilot substitution reconnaissance result which stands is necessary, we should confirm; the target which this camera probably is what. The report which described like this demand condition against the consideration fact which is necessary to the selection of the image sensory device which is a camera which with character will be applied in UAV.

  • PDF

Numerical Analysis on the Tow Point of Gaori Kite (가오리연의 매듭에 대한 수치해석 연구)

  • Sah, Jong-Youb
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.44 no.3
    • /
    • pp.195-202
    • /
    • 2016
  • There is two popular kites, Bangpae and Gaori. While the Bangpae kite is being widely loved by experts, the Gaori kite is popular for kids and beginners. Three types of Gaori kite product have been survayed on the tow point. The aerodynamic force on Gaori kite is numerically calculated by using Fluent. Through flight simulations at the tow point of each kite type, the new tow point, at which the required minimum velocity is lower than those of existing tow points, has been proposed as a standard. The required minimum velocity is the threshold wind velocity at which the kite begins to fly.

A Specifying Method for Real-Time Software Requirement

  • Kim, Jung-Sool
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.1
    • /
    • pp.1-6
    • /
    • 1999
  • This paper is on the analysis for the real-time software requirement. This method can be used for TNPN(Timed Numerical Peri Net) as a easy communication means with real-users. It is based on the RTTL(Real Time Temporal Logic) for correctness the system. TNPN is used to represent a behavior specification language, the validity of specified behaviors in TNPN is expressed in RTTL, and analyzed through the teachability graph. Thus, the requirement between user and system is satisfied Using the example of shared track, the validity of the property of real-time(safetiness, responsiveness, liveness, priority) is verified. Also this framework if given to connection with a object, natually.

  • PDF

Ways to Revitalize Bibliotherapy Services in Public Libraries Based on User Perception and Need (이용자의 인식과 요구를 통해 본 공공도서관 독서치료 서비스의 활성화 방안)

  • Kim, Kyung-Sook;Song, Jung-Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.1
    • /
    • pp.349-376
    • /
    • 2013
  • The purpose of this study is to understand user perception and need of bibliotherapy services in public libraries. A survey was conducted using a questionnaire that asked 648 public library users in Busan, Ulsan, and Gyeongsangnam-do to give their opinions on bibliotherapy services in public libraries, along with the particular areas of the service with which they thought needed the most improvement. The results of the questionnaire were analyzed in order to suggest ways to revitalize bibliotherapy services provided in public libraries.

A need assessment on the key tasks of convergence security specialists (융합보안전문가의 핵심과업 요구분석 - 방위산업체 보안전문가를 중심으로 -)

  • Woo, Kwang Jea;Song, Hae-Deok
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.87-98
    • /
    • 2016
  • As the informative society becomes intensified, the rise of the convergence security offers an alternative strategic correspondence to the technology leaks that are becoming more advanced, complex, and intelligent. In order to the convergence security to provide its efficacy, training convergence security specialists is essential. However, research on the subject has yet to be considered sufficient. Thus this research focuses on defense industry security specialists to define the duty and analze critical task as well as drawn and therefore the required academic level of the critical task was examined. These research work contributes to the competence development of convergence security specialists and further enhancement on convergence security training process of academic institutions and job training institutions.

Admission Control Policy Heuristic Algorithm for fairness of Call Blocking Probability in Differentiated Service Networks (차별화된 서비스를 갖는 인터넷 망에서 호 블로킹 확률의 공평성을 위한 수락 제어 정책 Heuristic 알고리즘 연구)

  • Min, Jun-Ki;Rhea, Woo-Seop;Chung, Jong-Soo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.121-128
    • /
    • 2005
  • Recently, as the research of effective resource management for supporting of various next generation internet service, the admission control mechanisms using the dynamic provisioning methods in differentiated service networks are studied. However, even though admission control mechanism is applied to the network, there exits the unfairness of call blocking probability among the different bandwidth requested services. In this paper, we propose the new admission control policy heuristic algorithm that provides fairness of call blocking probability between the large bandwidth requested service and the small bandwidth requested service. The simulation results show that the proposed algorithm provides not only blocking probability fairness but also high bandwidth utilization.

  • PDF

Operation Status and Needs Analysis for the Improvement of KESLI Consortium (KESLI 컨소시엄 활성화를 위한 운영현황 및 요구분석)

  • Lee, Yong-Gu;Park, Sungjae;Kim, Jeonghwan
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.1
    • /
    • pp.221-236
    • /
    • 2013
  • The purpose of this study is to improve the KESLI consortium by analyzing the status of participant organizations and their needs. A survey questionnaire including questions on consortium selection, management, and evaluation was distributed. The findings from the 179 responses indicate that the needs of the participants include issues related to the collection development policy, the cataloging of e-journals, user education, and evaluation. Therefore, KESLI should provide the following: (1) examples of collection development policy used for reference, (2) system development for e-journal cataloging, (3) materials and program guidelines for user education, and (4) education related to evaluation techniques for e-journal usages.