• 제목/요약/키워드: Technological Search

검색결과 123건 처리시간 0.028초

선행기술조사가 국가연구개발사업의 성과에 미치는 영향: 특허성과를 중심으로 (The Effect of Prior Art Search on Patent Output from National R&D Program)

  • 임부루;박규호;이근
    • 기술혁신연구
    • /
    • 제19권1호
    • /
    • pp.177-201
    • /
    • 2011
  • 본 연구는 특허정보활용과 연구개발활동 사이의 관계에 대한 분석을 위해, 국가연구개발사업을 대상으로 특허기술동향조사가 국가연구개발사업의 성과에 미치는 영향을 기술적 성과인 특허성과에 집중하여 그 영향을 추정하였다. 정부는 2005년부터 국가연구개발사업에 대하여 특허기술동향조사사업을 시행하고 그 범위를 확대해 왔다. 특허기술동향조사사업은 국가연구개발사업의 기획단계 또는 과제 선정단계에서 특허 동향 및 선행기술에 대한 정보를 제공하여 중복 투자, 유사기술 개발의 가능성을 줄여 국가연구개발사업의 효율성과 성과를 제고하기 위한 사업이다. 이러한 특허기술동향조사가 국가연구개발사업의 기술적 성과에 어떠한 효과를 지니는지를 투입요소, 개발주체의 특성, 자금의 공급자 요인을 고려한 모형을 사용하여 추정하였다. 2005년부터 2008년까지 국가연구개발사업의 성과 자료와 특허기술동향조사사업에 대한 자료를 바탕으로 특허기술동향조사 사업의 효과를 추정한 결과, 선행기술조사는 국내 및 해외 특허의 출원 및 등록 성과를 유의하게 제고하는 것으로 밝혀졌다. 이러한 결과로부터 국가연구개발사업에서 특허정보활용을 통해 기술적 성과의 제고가 가능하다는 점을 알 수 있다. 이는 특허정보활용을 통해 국가연구개발사업의 효율성과 효과성이 제고되었음을 보여준다.

  • PDF

KRISTAL기반의 FSTA 구축을 위한 효율적인 관리 시스템 구현 (Efficient Management System Implementation for FSTA Database based on KRISTAL)

  • 윤희준;이석형;윤화묵;김한기
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2006년도 춘계 종합학술대회 논문집
    • /
    • pp.495-498
    • /
    • 2006
  • 국내의 정보서비스 업체나 기관들은 세계적인 과학기술정보의 최신 동향과 연구 정보를 제공하기 위해 해외에서 발행된 데이터베이스를 도입, 구축한 정보를 서비스로 제공하고 있다. 여러 데이터베이스 중에서 FSTA(Food Science and Technology Abstracts)는 전 세계의 식품과학, 식품공학, 식품기술 및 음식과 관련된 식품 영양학에 관한 광범위한 초록 정보를 제공하는 데이터베이스이다. 식품과학에 관련된 정보를 유일하게 제공하는 FSTA 데이터베이스를 한국과학기술정보연구원(KISTI)에서 개발한 정보검색관리 시스템인 KRISTAL를 기반으로 데이터베이스를 구축하여 서비스를 제공할 수 있도록 데이터베이스 도입, 구축, 검색, 수정, 재구축, 통계 등의 여러 과정이 필요하다. 본 논문은 국내 이용자들에게 FSTA 데이터베이스의 정보를 서비스하기 위해 FSTA 데이터베이스를 입수하는 단계부터 KRISTAL 정보검색관리 시스템에 구축하는 단계까지의 과정을 체계적으로 구축하여 효율적으로 관리할 수 있도록 하는 시스템을 구현하는데 있다. 보다 빠르고 정확한 FSTA 데이터베이스 구축을 통해 사용자들은 최신의 FSTA 데이터베이스를 검색하여 원하는 정보를 얻을 수 있다.

  • PDF

Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering

  • Peng, Jianshan;Zhang, Mi;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권10호
    • /
    • pp.4933-4956
    • /
    • 2016
  • Use-After-Free (UAF) is a common lethal form of software vulnerability. By using tools such as Web Browser Fuzzing, a large amount of samples containing UAF vulnerabilities can be generated. To evaluate the threat level of vulnerability or to patch the vulnerabilities, automatic deduplication and exploitability determination should be carried out for these samples. There are some problems existing in current methods, including inadequate pertinence, lack of depth and precision of analysis, high time cost, and low accuracy. In this paper, in terms of key dangling pointer and crash context, we analyze four properties of similar samples of UAF vulnerability, explore the method of extracting and calculate clustering eigenvalues from these samples, perform clustering by fast search and find of density peaks on a large number of vulnerability samples. Samples were divided into different UAF vulnerability categories according to the clustering results, and the exploitability of these UAF vulnerabilities was determined by observing the shape of class cluster. Experimental results showed that the approach was applicable to the deduplication and exploitability determination of a large amount of UAF vulnerability samples, with high accuracy and low performance cost.

Analysis of Technical Trend of Electric Agricultural Field Machinery

  • Kim, Yong Joo;Kim, Wan Su;Chung, Sun Ok;Lee, Dae Hyun
    • Agribusiness and Information Management
    • /
    • 제6권2호
    • /
    • pp.40-48
    • /
    • 2014
  • As basic research to develop HEV and EV agricultural field machinery, the present study analyzes the technical trend of electric agricultural field machinery through product analysis, paper analysis, and patent analysis concerning HEV and EV in the automobile, construction machinery, and agricultural machinery sectors. For product analysis, the homepages of companies in these sectors were consulted to analyze the number of products of each company. For paper analysis, key words related to HEV and EV were selected, a search formula was drawn up, and articles search sites were consulted. And for patent analysis too, key words were selected and then a search formula was drawn up to examine published patent applications or registered patent applications, and trends were analyzed by structure, country, and year. The number of HEV and EV products were 17 in the automobile area, 8 in construction machinery, and 4 in agricultural machinery. Notably, in the agricultural machinery area, all HEV and EV products were from advanced companies overseas. In terms of papers, papers published in the past 5 years were searched and 33,195 papers were from the automobile area, 3,806 were from construction machinery, and 2,687, the fewest papers, were from the agricultural machinery area. A search of patents in the electric drive technology area in Korea, USA, and Japan, and Europe showed 1,927 valid patents, with 1,120 in Japan, 497 in USA, 193 in Korea, and 117 in Europe. Analysis of the trend of research on electric agricultural field machinery by product, paper, and patent shows the development of HEV and EV technology in Korea is insufficient compared to USA, Japan, and Europe, which means rapid technological development is needed.

Does Rain Really Cause Toothache? Statistical Analysis Based on Google Trends

  • Jeon, Se-Jeong
    • 치위생과학회지
    • /
    • 제21권2호
    • /
    • pp.104-110
    • /
    • 2021
  • Background: Regardless of countries, the myth that rain makes the body ache has been worded in various forms, and a number of studies have been reported to investigate this. However, these studies, which depended on the patient's experience or memory, had obvious limitations. Google Trends is a big data analysis service based on search terms and viewing videos provided by Google LLC, and attempts to use it in various fields are continuing. In this study, we endeavored to introduce the 'value as a research tool' of the Google Trends, that has emerged along with technological advancements, through research on 'whether toothaches really occur frequently on rainy days'. Methods: Keywords were selected as objectively as possible by applying web crawling and text mining techniques, and the keyword "bi" meaning rain in Korean was added to verify the reliability of Google Trends data. The correlation was statistically analyzed using precipitation and temperature data provided by the Korea Meteorological Agency and daily search volume data provided by Google Trends. Results: Keywords "chi-gwa", "chi-tong", and "chung-chi" were selected, which in Korean mean 'dental clinic', 'toothache', and 'tooth decay' respectively. A significant correlation was found between the amount of precipitation and the search volume of tooth decay. No correlation was found between precipitation and other keywords or other combinations. It was natural that a very significant correlation was found between the amount of precipitation, temperature, and the search volume of "bi". Conclusion: Rain seems to actually be a cause of toothache, and if objective keyword selection is premised, Google Trends is considered to be very useful as a research tool in the future.

A Physical-layer Security Scheme Based on Cross-layer Cooperation in Dense Heterogeneous Networks

  • Zhang, Bo;Huang, Kai-zhi;Chen, Ya-jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권6호
    • /
    • pp.2595-2618
    • /
    • 2018
  • In this paper, we investigate secure communication with the presence of multiple eavesdroppers (Eves) in a two-tier downlink dense heterogeneous network, wherein there is a macrocell base station (MBS) and multiple femtocell base stations (FBSs). Each base station (BS) has multiple users. And Eves attempt to wiretap a macrocell user (MU). To keep Eves ignorant of the confidential message, we propose a physical-layer security scheme based on cross-layer cooperation to exploit interference in the considered network. Under the constraints on the quality of service (QoS) of other legitimate users and transmit power, the secrecy rate of system can be maximized through jointly optimizing the beamforming vectors of MBS and cooperative FBSs. We explore the problem of maximizing secrecy rate in both non-colluding and colluding Eves scenarios, respectively. Firstly, in non-colluding Eves scenario, we approximate the original non-convex problem into a few semi-definite programs (SDPs) by employing the semi-definite relaxation (SDR) technique and conservative convex approximation under perfect channel state information (CSI) case. Furthermore, we extend the frame to imperfect CSI case and use the Lagrangian dual theory to cope with uncertain constraints on CSI. Secondly, in colluding Eves scenario, we transform the original problem into a two-tier optimization problem equivalently. Among them, the outer layer problem is a single variable optimization problem and can be solved by one-dimensional linear search. While the inner-layer optimization problem is transformed into a convex SDP problem with SDR technique and Charnes-Cooper transformation. In the perfect CSI case of both non-colluding and colluding Eves scenarios, we prove that the relaxation of SDR is tight and analyze the complexity of proposed algorithms. Finally, simulation results validate the effectiveness and robustness of proposed scheme.

On Optimizing Route Discovery of Topology-based On-demand Routing Protocols for Ad Hoc Networks

  • Seet, Boon-Chong;Lee, Bu-Sung;Lau, Chiew-Tong
    • Journal of Communications and Networks
    • /
    • 제5권3호
    • /
    • pp.266-274
    • /
    • 2003
  • One of the major issues in current on-demand routing protocols for ad hoc networks is the high resource consumed by route discovery traffic. In these protocols, flooding is typically used by the source to broadcast a route request (RREQ) packet in search of a route to the destination. Such network-wide flooding potentially disturbs many nodes unnecessarily by querying more nodes than is actually necessary, leading to rapid exhaustion of valuable network resources such as wireless bandwidth and battery power. In this paper, a simple optimization technique for efficient route discovery is proposed. The technique proposed herein is location-based and can be used in conjunction with the existing Location-Aided Routing (LAR) scheme to further reduce the route discovery overhead. A unique feature of our technique not found in LAR and most other protocols is the selective use of unicast instead of broadcast for route request/query transmission made possible by a novel reuse of routing and location information. We refer to this new optimization as the UNIQUE (UNIcast QUEry) technique. This paper studies the efficacy of UNIQUE by applying it to the route discovery of the Dynamic Source Routing (DSR) protocol. In addition, a comparative study is made with a DSR protocol optimized with only LAR. The results show that UNIQUE could further reduce the overall routing overhead by as much as 58% under highly mobile conditions. With less congestion caused by routing traffic, the data packet delivery performance also improves in terms of end-to-end delay and the number of data packets successfully delivered to their destinations.

A Case Study of the Base Technology for the Smart Grid Security: Focusing on a Performance Improvement of the Basic Algorithm for the DDoS Attacks Detection Using CUDA

  • Huh, Jun-Ho;Seo, Kyungryong
    • 한국멀티미디어학회논문지
    • /
    • 제19권2호
    • /
    • pp.411-417
    • /
    • 2016
  • Since the development of Graphic Processing Unit (GPU) in 1999, the development speed of GPUs has become much faster than that of CPUs and currently, the computational power of GPUs exceeds CPUs dozens and hundreds times in terms of decimal calculations and costs much less. Owing to recent technological development of hardwares, general-purpose computing and utilization using GPUs are on the rise. Thus, in this paper, we have identified the elements to be considered for the Smart Grid Security. Focusing on a Performance Improvement of the Basic Algorithm for the Stateful Inspection to Detect DDoS Attacks using CUDA. In the program, we compared the search speeds of GPU against CPU while they search for the suffix trees. For the computation, the system constraints and specifications were made identical during the experiment. We were able to understand from the results of the experiment that the problem-solving capability improves when GPU is used. The other finding was that performance of the system had been enhanced when shared memory was used explicitly instead of a global memory as the volume of data became larger.

SIMMER extension for multigroup energy structure search using genetic algorithm with different fitness functions

  • Massone, Mattia;Gabrielli, Fabrizio;Rineiski, Andrei
    • Nuclear Engineering and Technology
    • /
    • 제49권6호
    • /
    • pp.1250-1258
    • /
    • 2017
  • The multigroup transport theory is the basis for many neutronics modules. A significant point of the cross-section (XS) generation procedure is the choice of the energy groups' boundaries in the XS libraries, which must be carefully selected as an unsuitable energy meshing can easily lead to inaccurate results. This decision can require considerable effort and is particularly difficult for the common user, especially if not well-versed in reactor physics. This work investigates a genetic algorithm-based tool which selects an appropriate XS energy structure (ES) specific for the considered problem, to be used for the condensation of a fine multigroup library. The procedure is accelerated by results storage and fitness calculation speedup and can be easily parallelized. The extension is applied to the coupled code SIMMER and tested on the European Sustainable Nuclear Industrial Initiative (ESNII+) Advanced Sodium Technological Reactor for Industrial Demonstration (ASTRID)-like reactor system with different fitness functions. The results show that, when the libraries are condensed based on the ESs suggested by the algorithm, the code actually returns the correct multiplication factor, in both reference and voided conditions. The computational effort reduction obtained by using the condensed library rather than the fine one is assessed and is much higher than the time required for the ES search.

User Needs for Haptic Communication of VR Fashion Product Shopping

  • Kim, Jongsun;Ha, Jisoo
    • 한국의류산업학회지
    • /
    • 제21권4호
    • /
    • pp.401-411
    • /
    • 2019
  • Non-contact judgment and evaluation for products are increasingly needed along with a rapid environmental change in fashion that sows urgency in the need to implement services that allows users to judge and experience a tactile sense in a fashion product without actual contact. Technological development is required to provide users with syn-aesthetic experiences that integrate the visual, tactile and the auditory. There is also a need to conduct research to increase immersion that provides users with ICT-related experiences communicated through fashion images. The study analyzed demands for haptic communication technology by Korean users in immersive VR fashion product shopping. Accordingly, it defined haptic communication through literature research, investigated immersion in the VR environment and conducted in-depth interviews for haptic communication applicable to VR shopping. Findings show that hedonic reactions by fantasy, emotion and fun function are an important motive in selecting VR shopping. VR fashion product shopping steps were divided into 4: move to store, search in store, search of product and purchase based on offline store shopping experience. It defined the haptic communication by steps and analyzed the types of the haptic feedback to be implemented. The study results provide basic data for developing haptic communication technology that can enhance e a sense of the presence and immersion experiences that can help lay a groundwork for pilot studies on the convergence of the virtual and the real.