• Title/Summary/Keyword: PW

Search Result 341, Processing Time 0.027 seconds

CRM에서의 DW 활용방안

  • 장중호
    • Proceedings of the Korea Database Society Conference
    • /
    • 2001.06a
    • /
    • pp.106-112
    • /
    • 2001
  • o CRM이란 기업이 모든 기업 활동을 고객 지향적으로 관리하기 위한 전략적, 프로세스, 조직적, 기술적 변화 과정 자체를 의미함. 기업은 고객과 관련한 지식을 획득하여 각 조직으로 확산시키고, 다양한 방법으로 고객과 만나면서 그러한 정보를 활용하게 되며, 그 결과 기업의 매출이 증대되고 기업이 효율적으로 활동하게 됨(Gartner Group) (중략)

  • PDF

Effects of Axial Flow Compressor Surge on the Performance of Turbofan Engine (터보팬 엔진의 축류압축기 서지가 엔진성능에 미치는 영향)

  • Oh, Chang-Yong;Koo, Ja-Ye
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.13 no.3
    • /
    • pp.1-8
    • /
    • 2009
  • This thesis has analyzed the effect of the surge happening in flight on the engine performance, especially on the PW4000 turbofan engine. It is to be judged that the flight surge can occur more often at the time of takeoff than it does en route due to the fact that the engine parameters are prone to fluctuate. EPR is judged to be the most highly sensitive parameter responding when surge occurs. Both Engine rpm and Wf decrease almost simultaneously just like an EPR. During the take-off rolling, N1 vibration is more sensitive than the N2 vibration. Consequently, the surge can be detected by EGT increase, while the other parameters (EPR, rpm, Wf, etc) decrease.

Financial violations by messenger hacking (Internet banking) Attack Analysis (메신저 해킹을 통한 금융침해(인터넷뱅킹) 공격 분석)

  • Roo, Kyong-Ha;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.451-455
    • /
    • 2012
  • In this paper, Nateon, MSN Messenger, including how to hack into the most intimate acquaintance formed as follows, for hacking (keyloggers, remote monitoring, etc.) by sending a bank and ID, PW, certificate, security card, etc. personal financial information obtained after the withdrawal of the account balance to have a personal financial analysis infringement attack vulnerable elements found in internet banking, the vulnerabilities and countermeasures concerning the prevention of accidents, including violations by seeking a more secure Internet banking personal Internet Banking is to devise a deal.

  • PDF

Pattern Recognition of Meteorological fields Using Self-Organizing Map (SOM)

  • Nishiyama Koji;Endo Shinichi;Jinno Kenji
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2005.05b
    • /
    • pp.9-18
    • /
    • 2005
  • In order to systematically and visually understand well-known but qualitative and rotatively complicated relationships between synoptic fields in the BAIU season and heavy rainfall events in Japan, these synoptic fields were classified using the Self-Organizing Map (SOM) algorithm. This algorithm can convert complex nonlinear features into simple two-dimensional relationships, and was followed by the application of the clustering techniques of the U-matrix and the K-means. It was assumed that the meteorological field patterns be simply expressed by the spatial distribution of wind components at the 850 hPa level and Precipitable Water (PW) in the southwestern area including Kyushu in Japan. Consequently, the synoptic fields could be divided into eight kinds of patterns (clusters). One of the clusters has the notable spatial feature represented by high PW accompanied by strong wind components known as Low-Level Jet (LLJ). The features of this cluster indicate a typical meteorological field pattern that frequently causes disastrous heavy rainfall in Kyushu in the rainy season. From these results, the SOM technique may be an effective tool for the classification of complicated non-linear synoptic fields.

  • PDF

IP camera security using device unique identifier authentication (Device unique identifier인증을 이용한 IP Camera 인증 보안)

  • Kim, Ji-Hun;Kim, Young-kil;Hong, Man-pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.82-85
    • /
    • 2018
  • The purpose of this paper is to improve the authentication method for IP camera user authentication. Since existing authentication uses knowledge-based authentication method, if ID and PW are exposed to attack by attacker, IP camera becomes defenseless from attacker. The attacker can access the IP Camera and acquire and distribute real time video and voice, which can be exploited as a second crime, and there is a fear of a secret leak when a secret facility is installed. In order to compensate for this vulnerability, this paper proposes a DUI authentication method that identifies and registers a device using DUI (Device Unique Identifier), blocks access to unauthorized devices by subordinating the device to the IP Camera and authenticates only authorized devices.

  • PDF

MODELING AND SIMULATION OF BEAD MOVEMENT CONTROL SYSTEMS (머리운동 제어 시스템의 모델링과 시뮬레이션에 관한 연구)

  • Nam, Moon-Hyon;Cho, Yong-Jin
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.1333-1337
    • /
    • 1987
  • 본 연구는 머리운동 제어 시스템에 대한 생체 물리학적인 모델링과 시뮬레이션을 통하여 모델의 동특성을 조사하였으며, 생체운동(머리-안구)의 상호 관계를 비교하였다. 결과를 요약하면 다음과 같다. 1) 시스템을 구성하고 있는 매개변수의 변화가 출력에 미치는 영향을 조사하기 위해 감도해석법을 써서 감도계수를 구한 결과, 입력 제어신호의 펄스높이(PH), 동근의 펄스폭(PW1), 길항근의 펄스폭(PW2)이, 시스템의 출력특성을 결정하는 가장 중요한 매개변수 임을 알 수 있었다. 2) 비 선형 제어모델의 선형화를 통하여 선형모델의 응답특성과 크나큰 차이가 없음을 알았다. 3) Main-Sequence도를 작성하여 실험 데이터와 비교한 결과, 거의 일치함으로서 모델의 타당성을 입증하였다. 4) 머리운동이 시간최적으로 응답하기 위해서는 bang-bang 제어법칙이 적용되어야 함을 알았다. 5) 머리운동이 목표점에 도달하는 순간에는 길항근의 역제통 펄스가 가해 짐으로서, 길항근이 궤적의 마지막 부분을 지배함을 알았다. 6) 머리-안구운동의 main-sequence도를 비교 함으로서 상호관계를 규명하였다. 앞으로는 이 모델링 법을 개선확장하면, 비행시 파일럿의 생체 시뮬레이션, 헬멧 조준 사격 시스템등의 항공공학, 생체의용공학 연구 및 제어입력을 생체신호로 하는 로봇틱스 연구에 본 연구 방법은 유용하리라 생각된다.

  • PDF

Effects of Axial Flow Compressor Surge on the Performance in Turbofan Engine (터보팬 엔진의 축류압축기 서지가 엔진성능에 미치는 영향)

  • Oh, Chang-Yong;Koo, Ja-Ye
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2008.05a
    • /
    • pp.236-239
    • /
    • 2008
  • This thesis has analyzed the effect of the surge happening in flight on the engine performance of the PW4000 turbofan engine. EPR is judged to be the most highly sensitive parameter responding when surge occurs. Both N1 rpm and N2 rpm decreases almost simultaneously just like an EPR. During the take-off rolling, the N1 vibration is more sensitive than the N2 vibration. Consequently, the surge can be detected by EGT increase, while the other parameters decrease.

  • PDF

Development of Transient Simulation Program for Smart UAV Propulsion System (스마트 무인기 추진기관의 천이 모사 프로그램 개발)

  • Lee, Chang-Ho;Ki, Ja-Young
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.15 no.6
    • /
    • pp.63-69
    • /
    • 2011
  • The Smart UAV must have the control characteristics of propulsion system necessary for both rotary aircraft and fixed wing aircraft though it equips turbo-shaft engine. To develop an electronic engine controller in the future, it is necessary to accumulate the experience of engine operation and data of tilt rotor aircraft. For this purpose, the computer programs which predict engine performance in the steady state and transient state can be utilized for the supplementation of flight test data. In this work, we developed a dynamic analysis program using engine performance data gathered during the flight tests. In addition the accuracy of the program was verified through comparison with flight test data and the results of steady-state performance analysis program.