• Title/Summary/Keyword: Most powerful

Search Result 1,261, Processing Time 0.029 seconds

A Study on Dry Bulkers' Optimal Deadweight and Speed under Certain Available Cargo Lot Sizes (선적화물량에 따른 살적화물선의 최적적화중량준 및 속력의 결정에 관한 연구)

  • 이명진
    • Journal of the Korean Institute of Navigation
    • /
    • v.8 no.1
    • /
    • pp.17-48
    • /
    • 1984
  • The economy of ship's size and speed is affected by the freight rates, sailing distances, cargo handling rates, fuel oil prices and even interest rates of the borrowed funds. It can be a step more powerful measures if the economic evaluation model takes in a cargo lot size which prevails in the shipping markets. This paper has dealt with hypothetical cargo lots which happen to the market with uniform distribution in probability. The evaluation models are either profit maximization method or cost minimization method. The former compares among different voyages in profitability to the invested funds, the later defines the transportation efficiency in ton-mile unit and be used in comparing two or more transportation means. This paper adopted both of above methods to derive out ships economical evaluation contours for the various ship's speed and deadweight for certain cargo lot sizes, which can be used as important managerial decision data in purchasing ships or selecting a most profitable one among the proposed voyages. This evaluation contours will also be efficiently used in appraising so called "handy size ships" in connection with port water depth and conditions of voyage tracks.ge tracks.

  • PDF

A Study of Security Threats and Security Requirements of Software Defined Networking Technology (소프트웨어 정의 네트워킹 기술의 보안 위협 및 보안 요구사항에 대한 연구)

  • Kang, Yong-Hyeog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.561-562
    • /
    • 2017
  • Software defined networking technology allows centralized and powerful network control by separating packet processing and network control. However, powerfulness of software-defined networking technology threats the network itself. Most security researches of software-defined networking focus on discovering and defending network vulnerabilities. But, there is not much security for this technology itself. In this paper, the security vulnerabilities that can occur in this networking technology are analyzed and the security requirements of it are proposed. The biggest threats are the threats to the controller, the reliability problem between the controller and the switch must be solved, and a technique to detect attacks that malfunction by manipulating configuration information are needed.

  • PDF

Management of ASP Outsourcing Project Risks using Real Option Approach (실물옵션 접근법을 활용한 ASP 아웃소싱 리스크 관리)

  • Nam, Seung-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.7
    • /
    • pp.2396-2405
    • /
    • 2010
  • Information System (IS) Outsourcing is one of the powerful alternatives to guarantee the competitive advantages in the rapidly changing business environment. Most studies on IS outsourcing area have focused on the Critical Success Factors(CSFs) influencing the Success of IS outsourcing or the performance measuring the success of IS outsourcing projects. The CSFs or the performances which measures the success of IS outsourcing project have limitations to explain how to succeed in doing IS outsourcing project. This study uses Real Options Approach to make IS outsourcing projects' success by recognizing and minimizing IS outsourcing risks.

A Study on Decision Making Factors of Cloud Computing Adoption Using BCOR Approach (BCOR 접근법을 이용한 클라우드 컴퓨팅 도입의 의사결정 요인에 관한 연구)

  • Lee, Young-Chan;Hanh, Tang Nguyen
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.155-171
    • /
    • 2012
  • With the continuous and outstanding development of information technology(IT), human being is coming to the new computing era which is called cloud computing. This era brings lots of huge benefits also at the same time release the resources of IT infrastructure and data boom for man. In the future no longer, most of IT service providers, enterprises, organizations and systems will adopt this new computing model. There are three main deployment models in cloud computing including public cloud, private cloud and hybrid cloud; each one also has its own cons and pros. While implementing any kind of cloud services, customers have to choose one of three above deployment models. Thus, our paper aims to represent a practical framework to help the adopter select which one will be the best suitable deployment model for their requirements by evaluating each model comprehensively. The framework is built by applying the analytic hierarchy process(AHP), namely benefit-cost-opportunity-risk(BCOR) model as a powerful and effective tool to serve the problem. The gained results hope not only to provide useful information for the readers but also to contribute valuable knowledge to this new area. In addition, it might support the practitioners' effective decision making process in case they meet the same issue and have a positive influence on the increase of right decision for the organization.

Design and Implementation of Embedded Linux Router (내장형 리눅스를 이용한 라우터의 설계 및 구현)

  • Ju, Min-Gyu;Choe, Gyeong-Hui;Kim, Jong-Su;Mun, Jong-Uk;Jeong, Gi-Hyeon
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.339-344
    • /
    • 2001
  • In this paper, we describe the issues associated with implementing embedded Linux system. As an example of embedded system, a router which utilizes the powerful networking capability of Linux is implemented and the details of porting Linux to the dedicated hardware is discussed. Several efficient methods to avoid performance degradation resulted from porting lap top computer oriented Linux to embedded system are suggested. To verify the eligibility of the method to embed Linux into standalone system and to see the performance of the implemented router, comparison data with one of the most popular routers is presented.

  • PDF

Optimal Design of Single-sided Linear Induction Motor Using Genetic Algorithm (유전알고리즘을 이용한 편측식 선형유도전동기의 최적설계)

  • Ryu, Keun-Bae;Choi, Young-Jun;Kim, Chang-Eob;Kim, Sung-Woo;Im, Dal-Ho
    • Proceedings of the KIEE Conference
    • /
    • 1993.07b
    • /
    • pp.923-928
    • /
    • 1993
  • Genetic algorithms are powerful optimization methods based on the mechanism of natural genetics and natural selection. Genetic algorithms reduce chance of searching local optima unlike most conventional search algorithms and especially show good performances in complex nonlinear optimization problems because they do not require any information except objective function value. This paper presents a new model based on sexual reproduction in nature. In the proposed Sexual Reproduction model(SR model), individuals consist of the diploid of chromosomes, which are artificially coded as binary string in computer program. The meiosis is modeled to produce the sexual cell(gamete). In the artificial meiosis, crossover between homologous chromosomes plays an essential role for exchanging genetic informations. We apply proposed SR model to optimization of the design parameters of Single-sided Linear Induction Motor(SLIM). Sequential Unconstrained Minimization Technique(SUMT) is used to transform the nonlinear optimization problem with many constraints of SLIM to a simple unconstrained problem, We perform optimal design of SLIM available to FA conveyer systems and discuss its results.

  • PDF

Transmission Effect of Price Variations (가격변동의 전이효과)

  • Kim, Tae-Ho;Ann, Ji-Hee
    • Communications for Statistical Applications and Methods
    • /
    • v.17 no.2
    • /
    • pp.241-253
    • /
    • 2010
  • As standard unit root tests are empirically proved to fail to reject the null hypothesis of a unit root for many economic and business time series, it is doubtful that most of those series are informative about the existence of a unit root or that those tests are powerful against relevant alternative hypotheses. This study attempts to perform tests of the null hypothesis of stationarity as well as tests of the null hypothesis of a unit root using the time series data of housing prices in the major metropolitan areas. The results of the additional analyses such as lead-lag, cross-correlation and impulse response for testing the statistical interrelationships between the prices are generally found to be consistent.

The Separation and Utilization of Carbohydrates from Waste Liquor in Modified Pulping Process (개량(改良)펄프화법(化法) 폐액(廢液)으로 부터 당(糖)의 분리(分離)와 이용(利用))

  • Lee, Jong-Yoon;Yang, Jae-Kyung;Hwang, Byung-Ho;Cho, Hern-Joung
    • Journal of the Korean Wood Science and Technology
    • /
    • v.22 no.2
    • /
    • pp.19-24
    • /
    • 1994
  • This study was performed to study utilization of separated carbohydrates as well as separation, following analysis of the major components and separation of the carbohydrates in waste liquors of SP, KP, ASAM and AS. The result can be summerized as follows; Inorganic contents in waste liquors increase in this order AS

  • PDF

An Intelligent Exhibition Rule Management System using PMML

  • Moon, Hyun Sil;Cho, Yoon Ho;Kim, Jae Kyeong
    • Asia pacific journal of information systems
    • /
    • v.25 no.1
    • /
    • pp.83-97
    • /
    • 2015
  • Recently, the exhibition industry has developed rapidly with the development of information technologies. Most exhibitors in an exhibition plan and deploy many events that may provide advantages to visitors as a method of effective promotion. The growth and propagation of wireless technologies is a powerful marketing tool for exhibitors. However, exhibitors still rely on domain experts who are costly and time consuming because of the manual knowledge input procedure. Moreover, it is prone to biases and errors and not suitable for managing fast-growing and tremendous amounts of data that far exceed a human's ability to comprehend. To overcome these problems, data mining technology may be a great alternative, but it needs to be fit to each exhibition. This study uses data mining technology with the Predictive Model Markup Language (PMML) to suggest a system that supports intelligent services and that improves stakeholder satisfaction. This system provides advantages to the exhibitor, show organizer, and system designer, and is first enhanced by integrating data mining technologies through the knowledge of exhibition experts. Second, using the PMML, the system can automate the process of applying data mining models to solve real-time processing problems in the exhibition environment.

Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks

  • Feng, Jingyu;Zhang, Yuqing;Lu, Guangyue;Zhang, Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.1-17
    • /
    • 2014
  • Cooperative spectrum sensing (CSS) is considered as a powerful approach to improve the utilization of scarce radio spectrum resources. However, most of CSS schemes assume all secondary users (SU) are honest, and thus offering opportunities for malicious SUs to launch the spectrum sensing data falsification attack (SSDF attack). To combat such misbehaved behaviors, recent efforts have been made to trust schemes. In this paper, we argue that powering CSS with traditional trust schemes is not enough. The rational SSDF attack is found in this paper. Unlike the simple SSDF attack, rational SSDF attackers send out false sensing data on a small number of interested primary users (PUs) rather than all PUs. In this case, rational SSDF attackers can keep up high trustworthiness, resulting in difficultly detecting malicious SUs in the traditional trust schemes. Meanwhile, a defense scheme using a novel trust approach is proposed to counter rational SSDF attack. Simulation results show that this scheme can successfully reduce the power of rational SSDF, and thus ensure the performance of CSS.