• Title/Summary/Keyword: most powerful

Search Result 1,256, Processing Time 0.025 seconds

U.S. and China's Military Competition in east-Asia and Korea's Security (동아시아에서의 미국과 중국의 군사경쟁과 한국안보)

  • Park, Eung-soo;Ko, Kwang-soop
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.214-218
    • /
    • 2012
  • China has definitely been arising as the world's most powerful nation. By looking at general national power it seems that China's national prestige in 2011 is already way beyond Asia and even it closely catches up with the United States which is the most powerful nation over the world. The United states-centered world political order has begun to struggle by China's growth. Moreover, there has been an earnest competition arisen for the east-Asia sea supremacy between previous U.S. hegemony and arising China's power. East-Asia's ocean is the stage for this strife and it grows more serious. At this point, South Korea, one of the east-Asia country seeking the nation's stability and prosperity through its ocean, has come under the influence of this strife among the super powers of the world. The Author will closely examine the backgrounds and future opportunities of military competition between U.S. and China to analyze the influence of the power competition towards the security status of east-Asia especially South Korea.

  • PDF

Design and Performance Analysis of Energy-Aware Distributed Detection Systems with Two Passive Sonar Sensors (수동 소나 쌍을 이용한 에너지 인식 분산탐지 체계의 설계 및 성능 분석)

  • Do, Joo-Hwan;Kim, Song-Geun;Hong, Sun-Mog
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.4
    • /
    • pp.139-147
    • /
    • 2009
  • In this paper, optimum design of energy-aware distributed detection is considered for a parallel sensor network system consisting of a fusion center and two passive sonar nodes. AND rule and OR rule are employed as the fusion rules of the sensor network. For the fusion rules, it is shown that a threshold rule of each sensor node has uniformly most powerful properties. Optimum threshold for each sensor is investigated that maximizes the probability of detection under a constraint on energy consumption due to false alarms. It is also investigated through numerical experiments how signal strength, an energy constraint, and the distance between two sensor nodes affect the system detection performances.

A Modified E-LEACH Routing Protocol for Improving the Lifetime of a Wireless Sensor Network

  • Abdurohman, Maman;Supriadi, Yadi;Fahmi, Fitra Zul
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.845-858
    • /
    • 2020
  • This paper proposes a modified end-to-end secure low energy adaptive clustering hierarchy (ME-LEACH) algorithm for enhancing the lifetime of a wireless sensor network (WSN). Energy limitations are a major constraint in WSNs, hence every activity in a WSN must efficiently utilize energy. Several protocols have been introduced to modulate the way a WSN sends and receives information. The end-to-end secure low energy adaptive clustering hierarchy (E-LEACH) protocol is a hierarchical routing protocol algorithm proposed to solve high-energy dissipation problems. Other methods that explore the presence of the most powerful nodes on each cluster as cluster heads (CHs) are the sparsity-aware energy efficient clustering (SEEC) protocol and an energy efficient clustering-based routing protocol that uses an enhanced cluster formation technique accompanied by the fuzzy logic (EERRCUF) method. However, each CH in the E-LEACH method sends data directly to the base station causing high energy consumption. SEEC uses a lot of energy to identify the most powerful sensor nodes, while EERRCUF spends high amounts of energy to determine the super cluster head (SCH). In the proposed method, a CH will search for the nearest CH and use it as the next hop. The formation of CH chains serves as a path to the base station. Experiments were conducted to determine the performance of the ME-LEACH algorithm. The results show that ME-LEACH has a more stable and higher throughput than SEEC and EERRCUF and has a 35.2% better network lifetime than the E-LEACH algorithm.

Anatomy of Sentiment Analysis of Tweets Using Machine Learning Approach

  • Misbah Iram;Saif Ur Rehman;Shafaq Shahid;Sayeda Ambreen Mehmood
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.97-106
    • /
    • 2023
  • Sentiment analysis using social network platforms such as Twitter has achieved tremendous results. Twitter is an online social networking site that contains a rich amount of data. The platform is known as an information channel corresponding to different sites and categories. Tweets are most often publicly accessible with very few limitations and security options available. Twitter also has powerful tools to enhance the utility of Twitter and a powerful search system to make publicly accessible the recently posted tweets by keyword. As popular social media, Twitter has the potential for interconnectivity of information, reviews, updates, and all of which is important to engage the targeted population. In this work, numerous methods that perform a classification of tweet sentiment in Twitter is discussed. There has been a lot of work in the field of sentiment analysis of Twitter data. This study provides a comprehensive analysis of the most standard and widely applicable techniques for opinion mining that are based on machine learning and lexicon-based along with their metrics. The proposed work is helpful to analyze the information in the tweets where opinions are highly unstructured, heterogeneous, and polarized positive, negative or neutral. In order to validate the performance of the proposed framework, an extensive series of experiments has been performed on the real world twitter dataset that alter to show the effectiveness of the proposed framework. This research effort also highlighted the recent challenges in the field of sentiment analysis along with the future scope of the proposed work.

Research on Minimizing the Damage from Ransomware Attack by Case Study (사례로 살펴본 렌섬웨어 공격에 의한 피해를 최소화하는 연구 고찰)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.103-111
    • /
    • 2017
  • Recently, new variants of Ransomware are becoming a new security issue. Ransomware continues to evolve to avoid network of security solutions and extort users' information to demand Bitcoin using social engineering technique. Ransomware is damaging to users not only in Korea but also in all around the world. In this thesis, it will present research solution to prevent and cope from damage by new variants Ransomware, by studying on the types and damage cases of Ransomware that cause social problems. Ransomware which introduced in this paper, is the most issued malicious code in 2016, so it will evolve to a new and more powerful Ransomware which security officers cannot predict to gain profit. In this thesis, it proposes 4 methods to prevent the damage from the new variants of Ransomware to minimize the damage and infection from Ransomware. Most importantly, if user infected from Ransomware, it is very hard to recover. Thus, it is important that users understand the basic security rules and effort to prevent them from infection.

Determinants of Research Productivity: A Korean Case

  • Kim, Ki-Hyoung
    • Asian Journal of Innovation and Policy
    • /
    • v.3 no.2
    • /
    • pp.193-215
    • /
    • 2014
  • This study analyzes the factors on the determinants of research productivity. In addition, this study uncovers the relationships between research productivity and various explanatory variables, and between explanatory variables. As for research productivity, 3 indices were used such as the number of papers, patents, and a combination of them. The data is the 3-year average from 2010-2012 by 1,383 researchers from 6 disciplines such as physics, chemistry, biology, mechanical engineering, electricity and electronics, and chemical engineering, reported to the National Research Foundation of Korea. Personal factors such as sex, age, academic rank and location of affiliation show the group difference for productivity. In addition, most resource factors such as the number of graduate students and research funds showed the same result with personal factors. As for the determinants, master and doctoral students and government funds are the most powerful factors for research productivity, but industry funds for patent and overall productivity.

${\pi}-A$ Characteristics of Stearic Acid LB Films (Stearic Acid Langmuir-Blodgett (LB) 막의 ${\pi}-A$ 특성)

  • Lee, Dae-Il;Choi, Yong-Sung;Chang, Sang-Mok;Kwon, Young-Soo
    • Proceedings of the KIEE Conference
    • /
    • 1991.07a
    • /
    • pp.241-243
    • /
    • 1991
  • The LB technique is one of the most, powerful fabricating methods of organic ultra thin film, which deposits a monolayer film in molecular level onto the surface of the substrate. In order to fabricate the LB film with optimal condition, we have to deposite monolayer film at optimum depositing pressure. which is dependent on the kind of deposit materials. ${\pi}-A$ curve is one of the most important, criteria to determine the optimum pressure. In this paper, we obtained that the optimum pressure is $20{\sim}50(mN/m)$ from ${\pi}-A$ curve of the stearic acid. In our experiments, it was known that LB ultra thin film is deposited beat at 30(mN/m) by checking the characteristics of LB film.

  • PDF

Revised Iterative Goal Programming Using Sparsity Technique on Microcomputer

  • Gen, Mitsuo;Ida, Kenichi;Lee, Sang M.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.10 no.1
    • /
    • pp.14-30
    • /
    • 1985
  • Recently, multiple criteria decision making has been well established as a practical approach to seek a satisfactory solution to a decision making problem. Goal programming is one of the most powerful MCDM tools with satisfying operational assumptions that reflect the actual decision making process in real-world situations. In this paper we propose an efficient method implemented on a microcomputer for solving linear goal programming problems. It is an iterative revised goal simplex method using the sparsity technique. We design as interactive software package for microcomputers based on this method. From some computational experiences, we can state that the revised iterative goal simplex method using the sparsity technique is the most efficient one for microcomputer for solving goal programming problems.

  • PDF

Robust control of input time delay systems by observer design (관측기 설계에 의한 시간지연 시스템의 강인한 제어)

  • 김정원;이장명
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.239-242
    • /
    • 1998
  • Most of time delay existing in industrial processes can be modeled as an input time-delay which causes a lot of difficulties. To implement a time-delay free control, loop transfer function is recovered through the direct state feedback. For the proper state feedback, and observer is designed based upon the factorization approach which is known as one of the most powerful tool for the design of various control systems. The design scheme is parctically applied for the control of a DC motro which suffers from input time-delay. Simulational results demonstrate that this new algorithm guarantess the stability of the time-delayed system, as well as performance improvement compared to the conventional PI control.

  • PDF

The Protection Offered by "Umbrella Clauses" in Korean Investment Treaties

  • Mouawad, Caline;Dulac, Elodie
    • Journal of Arbitration Studies
    • /
    • v.23 no.3
    • /
    • pp.127-147
    • /
    • 2013
  • Korea is, after China, the Asian country with the largest number of concluded investment treaties. One of the protections that Korean investment treaties frequently afford to foreign investors and their investment is the so-called "umbrella clause," which requires the host state of the investment to observe the commitments that it has undertaken toward the foreign investor or its investment. This is a potentially very powerful protection. Umbrella clauses, however, have proven to be amongst the most controversial provisions in investment treaties, giving rise to diverging interpretations by tribunals and commentators that are still not reconciled today.

  • PDF