• Title/Summary/Keyword: 가상의

Search Result 12,350, Processing Time 0.04 seconds

한국경기순환(韓國景氣循環)의 원인(原因) : 구조모형(構造模型)에 의한 분석(分析)

  • Baek, Ung-Gi;Lee, Jin-Myeon
    • KDI Journal of Economic Policy
    • /
    • v.16 no.3
    • /
    • pp.3-44
    • /
    • 1994
  • 본교(本橋)는 백터자기회귀모형(自己回歸模型)(VAR)에 비하여 작성과정이 까다롭고 복잡하지만 경제구조의 파악이 용이하고 경제체계내에 주어진 충격의 해석이 분명한 연립방정식(聯立聯立方程式) 구조모형(構造模型)을 사용하여 경기순환(景氣循環)의 원인을 밝히고자 하였다. 새로 작성된 경기순환모형(景氣循環模型)은 거시경제(巨視經濟) 분기모형(分期模型)으로서 추정기간은 1972년부터 1992년까지 21년으로 통계청(統計廳) 기준의 제1순환기부터 제5순환기까지 포함하고 있으며, 경기순환(景氣循環)의 원인분석을 위해서 가상적(假想的) 시뮬레이션(counter factual simulation) 기법을 사용하였다. 본고(本稿)는 향후 경기순환(景氣循環)의 안정(安定)을 도모하거 위해서 다음의 몇가지 결론을 내리고 있다. 첫째, 건설투자(建設投資)는 경기변동(景氣變動)의 진복(振福)을 확대(擴大)시켜 온 경향이 있기 때문에 경기부양(景氣浮揚) 및 경기진정(景氣鎭靜)을 위한 정책변수로 바람직하지 않다. 왜냐하면 정부가 경기변동(景氣變動)을 감지(感知)하기까지는 시간이 걸리며, 경기변동(景氣變動)의 체감 직후 건설투자(建設投資)를 통해서 경기부양(景氣浮揚) 혹은 경기진정(景氣鎭靜)을 이루고자 하더라도 정책수립부터 정책효과의 가시화(可視化)에까지 이르는 시차(時差)로 인하여 건설투자(建設投資)가 정부의 의도와는 반대로 경기순행적(景氣順行的)인 역할(役割)을 할 가능성이 있기 때문이다. 둘째, 통화(通貨)가 생산(生産) 및 물가변동(物價變動)에 미치는 영향은 서로 상충관계(相衝關係)(trade-off) 에 있는 것으로 보이기 때문에 정부는 민간신용(民間信用) 등 통화변수(通貨變數)를 경기조절수단(景氣調節手段)으로 사용할 경우에는 사전에 정책효과(政策效果)를 충분히 고려해서 시행해야 할 것이다. 셋째 해외도매물가(海外都賣物價), 원유도입가격(原油導入價格) 및 국제상품가격(國際商品價格) 등 해외물가변수(海外物價變數)의 변동은 GNP는 물론이고 큰 폭의 물가변동(物價變動)을 초래하기 때문에, 해외부문(海外部門)의 충격에 따른 경기변동(景氣變動)을 안정시키기 위해서 정부는 유가자유화(油價自由化)를 통한 유류가격안정(油類價格安定)및 원유비양수준(原油備養水準)의 제고(提高), 해외원자재(海外原資材) 수입선(輸入先)의 다변화 등을 통하여 해외물가충격(海外物價衝擊)이 국내경제에 미치는 영향을 최소화하도록 노력해야 할 것이다.

  • PDF

The Characteristic Analysis for Thrust and Normal Force of Linear Pulse Motor (리니어 펄스 모터의 추력 및 수직력에 대한 특성 해석)

  • Yoon, Shin-Yong;Baek, Soo-Hyun;Kim, Yong
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.13 no.4
    • /
    • pp.142-151
    • /
    • 1999
  • Linear Pulse Motors (LPM) are used a field where SImOth linear motion is required, and it's position accuracy higher than that of a lead According to the advanUlge such as simplicity of rrechanical frarre, high reliability, precise open-loop operation, low inertia etc. LPM is awlied largely where it have made motor of this kind more and rmre attractive in many application areas such as factory automation and high speed positioning. This paper is researched to analyze for force characteristics of hybrid LPM with high accuracy and repeatability. Both the thrust and normal force are very sensitive to the airgap and tooth pitches of the forcer and platen. Here, the thrust shows a high content while the normal force is much higher than the thrust. For magnetic circuits of hybrid LPM is the complicated structure, the finite element rrethod (FEM) is employed with suitable rrethod for calculating the force. Therefore, both the virtual work principle and maxwell stress tensor have been used.n used.

  • PDF

A Study on Security Container to Prevent Data Leaks (정보 유출 방지를 위한 보안 컨테이너의 효과성 연구)

  • Lee, Jong-Shik;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1225-1241
    • /
    • 2014
  • Recently, Financial companies implement DLP(Data Leaks Prevention) security products and enforce internal controls to prevent customer information leaks. Accidental data leaks in financial business increase more and more because internal controls are insufficient. Security officials and IT operation staffs struggle to plan countermeasures to respond to all kinds of accidental data leaks. It is difficult to prevent data leaks and to control information flow in business without research applications that handle business and privacy information. Therefore this paper describes business and privacy information flow on applications and how to plan and deploy security container based OS-level and Hypervisor virtualization technology to enforce internal controls for applications. After building security container, it was verified to implement internal controls and to prevent customer information leaks. With security policies additional security functions was implemented in security container and With recycling security container costs and time of response to security vulnerabilities was reduced.

Analyses of Hardware Architecture for High-speed VPN System (VPN 시스템 고속화를 위한 하드웨어 구조 분석)

  • 김정태;허창우;한종욱
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1471-1477
    • /
    • 2003
  • In order to realize the Gbps VPN system, however, newer and more advanced technologies are required to enable wire-rate processing across a wide range of functions and layers. While it is generally accepted that a software soluTion on general-purpose processors cannot scale to process these functionsa wire rate, the KEY POINT is that a software solution on general-purpose processors is the most practical way by which these security allocationscan be developed. Many of these security functions require application layer processing on the content of the packets, and the very nature of application layer software development is characterized by relatively large code size with a high need for portability an flexibility. We have analysed the consideration and specification for realizing Gbps VPN system. from this work. we can obtain a technology of originality.

Image Mosaic from a Video Sequence using Block Matching Method (블록매칭을 이용한 비디오 시퀀스의 이미지 모자익)

  • 이지근;정성태
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1792-1801
    • /
    • 2003
  • In these days, image mosaic is getting interest in the field of advertisement, tourism, game, medical imaging, and so on with the development of internet technology and the performance of personal computers. The main problem of mage mosaic is searching corresponding points correctly in the overlapped area between images. However, previous methods requires a lot of CPU times and data processing for finding corresponding points. And they need repeated recording with a revolution of 360 degree around objects or background. This paper presents a new image mosaic method which generates a panorama image from a video sequence recorded by a general video camera. Our method finds the corresponding points between two successive images by using a new direction oriented 3­step block matching methods. Experimental results show that the suggested method is more efficient than the methods based on existing block matching algorithm, such as full search and K­step search algorithm.

The implementation of home network using the RS422 Multi-drop mode serial communication (RS422 Multi-drop mode 시리얼 통신을 이용한 홈 네트워크 구현)

  • Byun, Pil-Sang;Kim, Myeung-Hwan;Kim, Deok-Jin;Park, Se-Hyun;Park, Yeoun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.512-516
    • /
    • 2005
  • Home-Network is an integrated network of the PC and all electric home appliances in the home so that they can communicate with each other. In the 21th century, here are various technology for home Network environment such as HomePNA, IEEE1394, Ethernet Lan and Bluetooth. For Home Network construction, generally, the standard series interface 'RS232' is used to make communication possible between electric home appliances. However Home network using RS232 has a problem. That is, All machines have to be connected to each other with RS232 using Point-to-Point mode. In this case, the system becomes complicated because we have to use circuits as much as there are machines and increased expenses. To improve this problem, In this thesis, designed home network using RS422 Multi-drop mode serial communication and controled it with embedded linux system. And connected RS422 with motors and sensors using PIC to make the home network virtual environment.

  • PDF

Design and Test of Communication Networks for Aids to Navigation based on AIS (AIS 기반의 항로표지 통신망 서비스 설계 및 실험)

  • Park, In-Hwan;Lee, Seo-Jeong;Hwang, Seung-Wook
    • Journal of Navigation and Port Research
    • /
    • v.34 no.5
    • /
    • pp.337-342
    • /
    • 2010
  • As AIS AtoN has worked an essential role for aids to navigation, the World-wide IALA-Net has announced plans to build the system. Systematic beacon network may offer opportunities to make an infrastructure for information service and upgrade AtoN service performance. This paper proposes Aids to Navigation information service network for e-NAV. Network based on AIS is consist of AIS AtoN channels as Real, Synthetic or Virtual AIS AtoN. And inner network is consist of Wireless networks as AIS, WCDMA, WIFI, WIBRO, USN or VSAT. Introducing of various network systems can lead to combine and design aomong land, beacon and service network infrastructures.

Design and Implementation of iATA-based RAID5 Distributed Storage Servers (iATA 기반의 RAID5 분산 스토리지 서버의 설계 및 구현)

  • Ong, Ivy;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.305-311
    • /
    • 2010
  • iATA (Internet Advanced Technology Attachment) is a block-level protocol developed to transfer ATA commands over TCP/IP network, as an alternative network storage solution to address insufficient storage problem in mobile devices. This paper employs RAID5 distributed storage servers concept into iATA, in which the idea behind is to combine several machines with relatively inexpensive disk drives into a server array that works as a single virtual storage device, thus increasing the reliability and speed of operations. In the case of one machine failed, the server array will not destroy immediately but able to function in a degradation mode. Meanwhile, information can be easily recovered by using boolean exclusive OR (XOR) logical function with the bit information on the remaining machines. We perform I/O measurement and benchmark tool result indicates that additional fault tolerance feature does not delay read/write operations with reasonable file size ranged in 4KB-2MB, yet higher data integrity objective is achieved.

An Educational Effect on the Process of Design for 3D Simulation of Disaster Response System (재난 대응 3D 시뮬레이션 설계과정을 통한 교육적 효과)

  • Song, Eun-Jee;Suh, Don-Hee
    • Journal of Practical Engineering Education
    • /
    • v.8 no.1
    • /
    • pp.23-29
    • /
    • 2016
  • Our society is endemic in safety insensitivity, yet we have been concerned for safety education and disaster drill since the Sewol Ferry accident. However, the practical training costs very high, and it has its limit to increase reality. Recently, industry fields put emphasis on virtual reality (VR) as alternatives, so various contents are invented by using advantages of VR. The paper explores crucial application in 3-dimensional simulation for fire drill, suggests novel design, and contemplates about educative result through designing process. In order to construct and materialize the suggested system, practical 3D spatial information model and various disaster-drill scenarios are necessary. Also, to apply game elements for augmentation in users' utility, educations based on computer science and visual art are inevitable, which requires skills in programing and modeling respectively. Thus, this study investigates educational effect of convergence field through the suggested system designing process.

A VPN controlled by CE Routers on MPLS Networks (CE 라우터 기반의 MPLS VPN)

  • Lee, Young-Seok;Han, Min-Ho;Chun, Woo-Jik;Choi, Hoon
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.1
    • /
    • pp.31-39
    • /
    • 2002
  • The VPN(Virtual Private Network) is a private network constructed logically on a public network infrastructure. There have been numerous studies to support the VPN services by using different technologies such as IP in IP, GRE, L2TP, MPLS and so on. Among these technologies, MPLS has shown many merits in aspects of QoS, security, and management, compared with other technologies. As an enhancement of the VPN that is controlled by MPLS PE(Provider Edge) routers, this paper presents the VPN controlled by MPLS CE(Customer Edge) routers. The functional architecture of the CE based VPN and operations of the CE routers are described along with the performance comparison of CE based MPLS VPN. It has been shown that the CE based VPN has more advantages than PE based VPN with respect to independency, scalability, security, and complexity.