• Title/Summary/Keyword: management of technology

Search Result 25,252, Processing Time 0.057 seconds

FMEA for rotorcraft landing system using Dempster-Shafer evidence theory (Dempster-Shafer 증거 이론을 이용한 회전익 항공기 착륙장치의 FMEA)

  • Na, Seong-Hyeon;So, Hee-Soup
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.76-84
    • /
    • 2021
  • The quality assurance activities can detect the factors that affect the quality based on risk identification in the course of mass production. Risk identification is conducted with risk analysis, and the risk analysis method for the rotorcraft landing system is selected by failure mode effects analysis (FMEA). FMEA is a method that detects the factors that can affect the product quality by combining severity, occurrence, and detectability. The results of FMEA were prioritized using the risk priority number. On the other hand, these methods have certain shortcomings because the severity, occurrence, detectability are weighted equally. Dempster-Shafer evidence theory can conduct uncertainty analysis for the opinions with personal reflections and subjectivity. Based on the theory, the belief function and the plausibility function can be formed. Moreover, the functions can be utilized to evaluate the belief rate and credibility. The system is exposed to impact during take-off and landing. Therefore, experts should manage failure modes in the course of mass production. In this paper, FMEA based on the Dempster-Shafer evidence theory is discussed to perform risk analysis regarding the failure mode of the rotorcraft landing system. The failure priority was evaluated depending on the factor values. The results were derived using belief and plausibility function graphs.

Operational Strategies of a Bus-Exclusive Lane Using Barrier Transfer Systems to Control Tidal Traffic Flows (비대칭적 중방향 교통류 대응을 위한 이동식 중앙분리대 활용 버스전용차로 도입 전략 분석)

  • Kim, Taewan;Chung, Younshik;Jeon, Gyo Seok;Kim, Wongil
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.2
    • /
    • pp.209-217
    • /
    • 2022
  • Lane management with a central variable lane(s) (or reversible lane) where the traffic flow is temporarily reversed in one or more lanes during peak periods has been evaluated as an effective strategy to alleviate congestion caused by tidal traffic flows. However, due to traffic safety issues, such a movable barrier system can be considered as an alternative to supplement the existing its operation facilities such as static and/or dynamic signs and special pavement markings. In addition, when combined with a bus exclusive lane strategy, its effectiveness could be greatly increased. The objective of this study is to propose a feasibility analysis procedure for operational strategies of a bus-exclusive lanes using a barrier transfer system (BTS) for urban expressways. To this end, a case study was conducted on two urban expressways on the west side of the Han River in Seoul. As a result, temporary operation during rush hour in the morning was found to be most effective. The results presented in this study are expected to serve as a basis for establishing bus-exclusive lane operation strategies using similar systems in the future.

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

Consumer's Negative Brand Rumor Acceptance and Rumor Diffusion (소비자의 부정적 브랜드 루머의 수용과 확산)

  • Lee, Won-jun;Lee, Han-Suk
    • Asia Marketing Journal
    • /
    • v.14 no.2
    • /
    • pp.65-96
    • /
    • 2012
  • Brand has received much attention from considerable marketing research. When consumers consume product or services, they are exposed to a lot of brand related stimuli. These contain brand personality, brand experience, brand identity, brand communications and so on. A special kind of new crisis occasionally confronting companies' brand management today is the brand related rumor. An important influence on consumers' purchase decision making is the word-of-mouth spread by other consumers and most decisions are influenced by other's recommendations. In light of this influence, firms have reasonable reason to study and understand consumer-to-consumer communication such as brand rumor. The importance of brand rumor to marketers is increasing as the number of internet user and SNS(social network service) site grows. Due to the development of internet technology, people can spread rumors without the limitation of time, space and place. However relatively few studies have been published in marketing journals and little is known about brand rumors in the marketplace. The study of rumor has a long history in all major social science. But very few studies have dealt with the antecedents and consequences of any kind of brand rumor. Rumor has been generally described as a story or statement in general circulation without proper confirmation or certainty as to fact. And it also can be defined as an unconfirmed proposition, passed along from people to people. Rosnow(1991) claimed that rumors were transmitted because people needed to explain ambiguous and uncertain events and talking about them reduced associated anxiety. Especially negative rumors are believed to have the potential to devastate a company's reputation and relations with customers. From the perspective of marketer, negative rumors are considered harmful and extremely difficult to control in general. It is becoming a threat to a company's sustainability and sometimes leads to negative brand image and loss of customers. Thus there is a growing concern that these negative rumors can damage brands' reputations and lead them to financial disaster too. In this study we aimed to distinguish antecedents of brand rumor transmission and investigate the effects of brand rumor characteristics on rumor spread intention. We also found key components in personal acceptance of brand rumor. In contextualist perspective, we tried to unify the traditional psychological and sociological views. In this unified research approach we defined brand rumor's characteristics based on five major variables that had been found to influence the process of rumor spread intention. The five factors of usefulness, source credibility, message credibility, worry, and vividness, encompass multi level elements of brand rumor. We also selected product involvement as a control variable. To perform the empirical research, imaginary Korean 'Kimch' brand and related contamination rumor was created and proposed. Questionnaires were collected from 178 Korean samples. Data were collected from college students who have been experienced the focal product. College students were regarded as good subjects because they have a tendency to express their opinions in detail. PLS(partial least square) method was adopted to analyze the relations between variables in the equation model. The most widely adopted causal modeling method is LISREL. However it is poorly suited to deal with relatively small data samples and can yield not proper solutions in some cases. PLS has been developed to avoid some of these limitations and provide more reliable results. To test the reliability using SPSS 16 s/w, Cronbach alpha was examined and all the values were appropriate showing alpha values between .802 and .953. Subsequently, confirmatory factor analysis was conducted successfully. And structural equation modeling has been used to analyze the research model using smartPLS(ver. 2.0) s/w. Overall, R2 of adoption of rumor is .476 and R2 of intention of rumor transmission is .218. The overall model showed a satisfactory fit. The empirical results can be summarized as follows. According to the results, the variables of brand rumor characteristic such as source credibility, message credibility, worry, and vividness affect argument strength of rumor. And argument strength of rumor also affects rumor intention. On the other hand, the relationship between perceived usefulness and argument strength of rumor is not significant. The moderating effect of product involvement on the relations between argument strength of rumor and rumor W.O.M intention is not supported neither. Consequently this study suggests some managerial and academic implications. We consider some implications for corporate crisis management planning, PR and brand management. This results show marketers that rumor is a critical factor for managing strong brand assets. Also for researchers, brand rumor should become an important thesis of their interests to understand the relationship between consumer and brand. Recently many brand managers and marketers have focused on the short-term view. They just focused on strengthen the positive brand image. According to this study we suggested that effective brand management requires managing negative brand rumors with a long-term view of marketing decisions.

  • PDF

A Novel Idle Mode Operation in IEEE 802.11 WLANs: Prototype Implementation and Performance Evaluation (IEEE 802.11 WLAN을 위한 Idle Mode Operation: Prototype 구현 및 성능 측정)

  • Jin, Sung-Geun;Han, Kwang-Hun;Choi, Sung-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2A
    • /
    • pp.152-161
    • /
    • 2007
  • IEEE 802.11 Wireless Local Area Network (WLAN) became a prevailing technology for the broadband wireless Internet access, and new applications such as Voice over WLAM (VoWLAN) are fast emerging today. For the battery-powered VoWLAN devices, the standby time extension is a key concern for the market acceptance while today's 802.11 is not optimized for such an operation. In this paper, we propose a novel Idle Mode operation, which comprises paging, idle handoff, and delayed handoff. Under the idle mode operation, a Mobile Host (MH) does not need to perform a handoff within a predefined Paging Area (PA). Only when the MH enters a new PA, an idle handoff is performed with a minimum level of signaling. Due to the absence of such an idle mode operation, both IP paging and Power Saving Mode (PSM) have been considered the alternatives so far even though they are not efficient approaches. We implement our proposed scheme in order to prove the feasibility. The implemented prototype demonstrates that the proposed scheme outperforms the legacy alternatives with respect to energy consumption, thus extending the standby time.

Secure Management Method for Private Key using Smartphon's Information (스마트폰 고유정보를 이용한 안전한 개인키 관리 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.90-96
    • /
    • 2016
  • The 3390 million people, around 83% of the adult population in Korea use smartphone. Although the safety problem of the certificate has been occurred continuously, most of these users use the certificate. These safety issues as a solution to 'The owner of a mobile phone using SMS authentication technology', 'Biometric authentication', etc are being proposed. but, a secure and reliable authentication scheme has not been proposed for replace the certificate yet. and there are many attacks to steal the certificate and private key. For these reasons, security experts recommend to store the certificate and private key on usb flash drive, security tokens, smartphone. but smartphones are easily infected malware, an attacker can steal certificate and private key by malicious code. If an attacker snatchs the certificate, the private key file, and the password for the private key password, he can always act as valid user. In this paper, we proposed a safe way to keep the private key on smartphone using smartphone's unique information and user password. If an attacker knows the user password, the certificate and the private key, he can not know the smart phone's unique information, so it is impossible to use the encrypted private key. Therefore smartphone user use IT service safely.

Design on Protection and Authentication System of IPTV Contents using OTP (OTP를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.129-137
    • /
    • 2009
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents protection and authentication system tends to draw more attentions. So we need a system that can protect contents and allow only authenticated person to use right service by controling user authority and using content encryption. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But the weak point of this system are in high costs, complexity and using HW. For resolving these problems, in this paper, we proposed IPTV contents protection and authentication system using OTP. When we transmit the content encrypted by OTP key using contents delivery technology, we operate XOR with contents using another settop-box's OTP key which was transmitted from distribution server. And contents are reconstructed and transmitted to the settop-box, In the end, downloaded content are encrypted by OTP key and are superior in content protection when contents redistribution. Since OTP use double-authentication elements in encryption process, this method is excellent in content protection. And it is very effective in cost aspect because it could be implemented by SW program. Another benefit is that we can shorten the development time period. In this paper, we propose and find its possibility as a new content protection and authentication method suitable for IPTV services.

The Related Research Issues and the Suggestion of the Radical Services Innovation Process Models in the Service Firms (기업수준에서의 급변적 서비스 혁신 프로세스 모형과 관련 연구 이슈 탐색)

  • Ahn, Yeon S.
    • Journal of Service Research and Studies
    • /
    • v.3 no.2
    • /
    • pp.75-89
    • /
    • 2013
  • In the services industry and firms, the successful new service development is very important issue today, But the innovation process for service firms is comprehensively little treated until now. This study was performed to suggest the new service development process model for the firms level in the perspective of the radical service innovation. So, in this paper the new process development model can be made by reviewing the concepts about the radical service innovation and by analyzing the some existing new service development process models. In the suggested service development process model, the three key process such as technology forecast, market analysis, and strategy development were included for front phase activity as the new service development process. Also the four key process for searching phase, and the other three key process for implementation phase were included. And for the application for the service firms' service innovation, the innovation's outcome estimation reference model is included. I hope to be executed the various case research and the improvement and optimization for this suggested process model in the future.

  • PDF

Review of Waste Acceptance Criteria in USA for Establishing Very Low Level Radioactive Waste Acceptance Criteria in the 3rd Step Landfill Disposal Site (국내 극저준위방폐물 처분시설 인수기준 마련을 위한 미국 처분시설의 인수기준 분석)

  • Park, Kihyun;Chung, Sewon;Lee, Unjang;Lee, Kyungho
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.18 no.1
    • /
    • pp.91-102
    • /
    • 2020
  • According to the Korea Radioactive Waste Agency's (KORAD's) medium and low level radioactive waste management implementation plan, the Domestic 3rd Step Landfill Disposal Facility has planned to accept a total of 104,000 drums (2 trenches) of very low level radioactive waste (VLLW), from the decommissioning site from April 2019 - February 2026 (total budget: 224.6 billion Won). Subsequently, 260,000 drums (5 trenches) will be disposed in a 34,076 ㎡. Accordingly, KORAD is preparing a waste acceptance criteria (WAC) for this facility. Every disposal facility for VLLW in other countries such as France and Spain, operate their WAC for each VLLW facility with a reasonable application approach, This, paper focuses on analyzing the WAC conditions in VLLW sites in the USA and discusses whether these can be met in domestic VLLW WAC. It also helps in the preparation of WAC for the 3rd Step Landfill Disposal Site in Gyeongju, since the USA has prior experience on decommissioning nuclear waste.

The Channel Scheduler based on Water-filling Algorithm for Best Effort Forward Link Traffics in AMC/TDM/CDM System (AMC/TDM/CDM 다중접속방식에서의 Best Effort 순방향 서비스를 위한 Water-filling Based 채널 스케줄러)

  • Ma, Dongl-Chul;Ki, Young-Min;Kim, Dong-Ku
    • Journal of Advanced Navigation Technology
    • /
    • v.7 no.1
    • /
    • pp.59-71
    • /
    • 2003
  • The channel scheduler is suggested the radio resource management method in order to provide service with guaranteeing fairness and throughput to the users who use limited wireless channel. Proportional fairness scheduling algorithm is the channel scheduler used in the AMC(Adaptive Modulation and Coding)/TDM system, and this algorithm increases the throughput considering the user's time fairness. In this paper is suggested the channel scheduler combining CDM scheme available in AMC/TDM/CDM system. Unlike the system which only uses TDM which provide the only one user at the same slot, this scheduler can service a lot of users since this uses the CDM scheme with multi-cord channel. At every moment, allocation of transmission power to multi-channel users is problematic because of CDM scheme. In this paper, we propose a water-filling scheduling algorithm to solve the problem. Water-filling fairness(WF2) scheduling algorithm watches the average channel environment. So, this modified method guarantees fairness for each user in terms of power and service time.

  • PDF