• Title/Summary/Keyword: 국제전달경로

Search Result 12, Processing Time 0.021 seconds

A Study on Macroeconomic Linkages between the USA and Japan (미일간 거시경제적 연계성에 대한 연구)

  • Lee, Jai Ki
    • International Area Studies Review
    • /
    • v.15 no.3
    • /
    • pp.175-188
    • /
    • 2011
  • This study aims to examine how the U.S. economic shocks affect the Japanese economy. It is widely believed that the U.S. economy has a significant effect on the Japanese economy. Actually, the U.S. accounts for a considerable amount of Japan's exports and imports. To the economic policymakers, it is very important to know how economic disturbances generated by the U.S. are transmitted to the Japanese economy. A vector autoregression(VAR) model is employed to investigate the international transmission channel of economic disturbances. The interactions of the U.S.-Japansese economy are investigated by using variance decompositions(VDCs). The results of this study provided the evidence that the U.S. economic shocks were important for the Japanese economy during the sample period. This study supports the notion of economic dependence of smaller open economy such as Japan as compared with larger economy such as the U.S.

Data Analysis of International Joint Road and Sea Transportation Tests Under Normal Conditions of Transport (국제공동 육해상 정상운반시험의 데이터 분석)

  • Lim, JaeHoon;Cho, Sang Soon;Choi, Woo-seok
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.18 no.2_spc
    • /
    • pp.275-289
    • /
    • 2020
  • In 2017, multimodal transportation tests for evaluating road, sea, and rail transport were performed by research institutes in the US, Spain, and the Republic of Korea. In this study, acceleration and strain data determined through road and sea tests were analyzed. It was investigated whether the load generated for each transport mode was amplified or attenuated according to the load transfer path. From the results, it was confirmed that the load transfer characteristics differed according to the transportation mode and loading path. The effects of strain determined through each test on the structural integrity of the spent nuclear fuel were also investigated. It was found that the magnitude of the measured strain had a negligible effect on the structural integrity of the spent nuclear fuel, considering its fatigue strength. The results for the acceleration and strain data analyses obtained in this study will be useful for scheduled domestic transportation tests under normal transport conditions.

The MCSTOP Algorithm about the Minimum Cost Spanning Tree and the Optimum Path Generation for the Multicasting Path Assignment (최적 경로 생성 및 최소 비용 신장 트리를 이용한 멀티캐스트 경로 배정 알고리즘 : MCSTOP)

  • Park, Moon-Sung;Kim, Jin-Suk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.1033-1043
    • /
    • 1998
  • In this paper, we present an improved multicasting path assignment algorithm based on the minimum cost spanning tree. In the method presented in this paper, a multicasting path is assigned preferentially when a node to be received is found among the next degree nodes of the searching node in the multicasting path assignment of the constrained steiner tree (CST). If nodes of the legacy group exist between nodes of the new group, a new path among the nodes of new group is assigned as long as the nodes may be excluded from the new multicasting path assignment taking into consideration characteristics of nodes in the legacy group. In assigning the multicasting path additionally, where the source and destination nodes which can be set for the new multicasting path exist in the domain of identical network (local area network) and conditions for degree constraint are satisfied, a method of producing and assigning a new multicasting path is used. The results of comparison of CST with MCSTOP, MCSTOp algorithm enhanced performance capabilities about the communication cost, the propagation delay, and the computation time for the multicasting assignment paths more than CST algorithm. Further to this, research activities need study for the application of the international standard protocol(multicasting path assignment technology in the multipoint communication service (MCS) of the ITU-T T.120).

  • PDF

A Node Mobility-based Adaptive Route Optimization Scheme for Hierarchical Mobile IPv6 Networks (노드 이동성을 고려한 계층적 이동 IPv6 네트워크에서의 적응적 경로 최적화 방안)

  • 황승희;이보경;황종선;한연희
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.474-483
    • /
    • 2003
  • The secret sharing is the basic concept of the threshold cryptosystem and has an important position in the modern cryptography. At 1995, Jarecki proposed the proactive secret sharing to be a solution of existing the mobile adversary and also proposed the share renewal scheme for (k, n) threshold scheme. For n participants in the protocol, his method needs O($n^2$) modular exponentiation per one participant. It is very high computational cost and is not fit for the scalable cryptosystem. In this paper, we propose the efficient share renewal scheme that need only O(n) modular exponentiation per participant. And we prove our scheme is secure if less that ${\frac}\frac{1}{2}n-1$ adversaries exist and they static adversary.

A Vision Disabled-Aid using the Context of Internet of Things (사물인터넷을 이용한 시각 장애자 보조 방법)

  • Sahu, Nevadita;Jeong, Min Hyuk;Chun, Jonghoon;Kim, Sang-Kyun
    • Journal of Broadcast Engineering
    • /
    • v.22 no.1
    • /
    • pp.78-86
    • /
    • 2017
  • The Internet of Things can offer disabled people the assistance and support, which is essential to achieve a good quality of life. The visually impaired people need assistance in finding locations, detecting obstacles on the way, and getting directions while moving around to reach their destination. Based on this persistent need, this paper proposes a navigation system for blind people using Internet of Things. The technologies used in our proposed system are: a smart cane containing an RFID reader and an ultrasonic sensor, a smart phone and Internet. The sensed data from the ultrasonic sensor for detecting obstacle is converted to International Standard format from ISO/IEC 23005-5 (MPEG-V Part 5). The system detects the blind person's location using the RFID tags implemented on the way. The system uses voice message in the smart phone to communicate with the blind person to lead him to his destination. The proposed system has been tested to navigate successfully in the campus.

A Development and Implementation of Model of Location Referencing Systems for ITS (ITS용 위치참조체계의 모델개발과 적용에 관한 연구)

  • 최기주;이광섭
    • Proceedings of the KOR-KST Conference
    • /
    • 1998.10b
    • /
    • pp.191-191
    • /
    • 1998
  • ITS를 구성하는 서비스나 기능이 대부분 동적인 특성을 지니고 있어, 앞으로는 이를 효율적으로 뒷받침할 수 있는 공간데이터(Spatial Data)가 필요하다. 특히, 대부분의 ITS서비스와 기능이 정보의 신속한 전달을 위해서 유무선통신을 사용할 것이다. 또한, 최정 사용자서비스와 응용분야가 공간데이터라는 기본적인 정보를 공유하므로써 위치에 대한 정적·동적교통정보를 제공받게 된다. 정보사용자가 사용하는 공간데이터가 상이하다면, 정보의 공유가 이루어지지 않거나 정확하게 제공되지 않는 것은 자명한 사실이다. 이러한 이유는 정보사용자가 자신들의 정보수집, 정보전달, 정보분석 등의 목적에 적합한 공간데이터를 제작하여 유지하기 때문이다. 결과적으로 정보의 공유를 위해서는 상이한 공간데이터들 간에 동일한 교통정보를 공유하도록 하는 조작이나 방법이 필요하다. 서로 다른 원본으로 구성된 데이터를 통합하고 이를 ITS서비스와 기능을 위한 각 시스템에 적용하기 위해서는 서로 다른 수준을 가지고 있는 공간데이터(수치지도 데이터)의 해상도, 위치정확도, 속성정확도, 정밀도, 범위 등과 같은 문제들이 최종 응용시스템에 적용되어져야 하고, 이를 통해 공간적인 위치와 수치지도를 구성하는 각종 엔터티가 참조되어야 할 것이다. 이뿐 아니라, 향후 데이터 공유의 방법에 있어서도, 각종 무선통신의 발달과 인터넷과 같은 정보전달매체의 대중화가 이루어짐에 따라, 정보의 공유가 동시적으로 이루어질 것이다. 본 연구에서는 공공기관주도로 제작된 전국범위의 수치지도를 하여, ITS용 네트워크데이터구성을 위한 기능분석과 사양을 제시를 함으로써, 이에 대한 프로파일 개발한다. 정보공유를 위한 위치참조모델(LRM)과 프로파일을 ITS데이터에 적용함으로써, 위치참조모델의 기능과 적용성을 평가한다.키기 위한 향후의 연구과제를 제시한다.Si결정의 크기를 비교하였을 때 45$\mu\textrm{m}$ 이하의 분말을 섞어 압출하였을 때 가장 작은 초정 Si입자 크기를 얻음 을 볼 수 있었다. 주의 Fairfax County에 소재한 주간 고속도로 66번(I-66)과 인접 교통망의 교통자료를 사용하여 각종 돌발교통 혼잡 상황을 전제로 한 Traffic Simulation과 정보제공시나\리오를 INTEGRATION Model을 이용해 실행하였다. 그 결과 적응형 알고리즘이 개개인의 최단시간 경로를 제공하는 사용자 평형 경로안내전략에 비해 교통혼잡도와 정체시간의 체류정도에 따라 3%에서 10%까지 전체통행시간을 절약할 수 있다는 결론을 얻었다.출발참, 구성대외개방선면축심, 실현국제항선적함접화국내항반적전항, 형성다축심복사식항선망; 가강기장건설, 개피포동제이국제기장건설, 괄응포동개발경제발전적수요. 부화개시일은 각 5월 26일과 5월 22일이었다. 11. 6월 중순에 애벌레를 대상으로 처리한 Phenthoate EC가 96.38%의 방제가로 약효가 가장 우수하였고 3월중순 및 4월중순 월동후 암컷을 대상으로 처리한 Machine oil, Phenthoate EC 및 Trichlorfon WP는 비교적 약효가 낮았다.>$^{\circ}$E/$\leq$30$^{\circ}$NW 단열군이 연구지역 내에서 지하수 유동성이 가장 높은 단열군으로 추정된다. 이러한 사실은 3개 시추공을 대상으로 실시한 시추공 내 물리검층과 정압주입시험에서도 확인된다.. It was resulted from increase of weight of single cocoon. "Manta"2.5ppm produced 22.2kg of cocoon. It

  • PDF

Korea's Strategy for Participating in Arctic Biodiversity International Cooperation Projects (한국의 북극 생물다양성 국제협력사업 참여 전략)

  • Sung-Ryong Kang;Jihyun Yoon;Inyoung Jang
    • Korean Journal of Ecology and Environment
    • /
    • v.55 no.4
    • /
    • pp.390-397
    • /
    • 2022
  • Conservation of Arctic Flora and Fauna (CAFF) is the biodiversity working group of the Arctic Council. CAFF conducts Monitoring, Assessment, Policy, and expert group activities to preserve Arctic biodiversity and ensure the sustainability of biological resources and communicates the results to governments and indigenous peoples. The main tasks of CAFF consist of monitoring (Circumpolar Biodiversity Monitoring Program), assessment (Arctic Biodiversity Assessment) and strategic projects(Arctic Migratory Bird Initiative, AMBI). Korea has been directly participating in the AMBI since 2015 after acquiring observer status of the Arctic Council in 2013. The AMBI aims to preserve habitats on migration routes used by breeding birds in the Arctic and prevent illegal hunting. Thus, observer countries on migratory routes are directly participating in the project. When selecting priorities for participation in Arctic cooperation projects by 2030, Korea should consider continuing participation in AMBI and participating in the "CAFF Youth Program" in connection with the Arctic Academy program operated by Korea's public institutes.

Comparative Study on the Committed Dose Equivalent for Adults and Infants (예탁선양치(預託線量値)에서 본 성인(成人)과 유아(幼兒)와의 비교연구(比較硏究))

  • Sung, Kye-Yong;Yook, Chong-Chul;Ha, Chung-Woo
    • Journal of Radiation Protection and Research
    • /
    • v.9 no.2
    • /
    • pp.76-89
    • /
    • 1984
  • Weighted committed dose equivalents($W_T\;H_{50}$) per intake of unit activity of four nuclides-I-131, I-133, Cs-134 and Cs-137-, which was based on the concepts of ICRP Pub. 30, are calculated for adult who is 70 kg and 25 years old and, for infant who is 10 kg and 1 year old. Metabolism of iodine taken through oral or inhalation pathway is described by using the three-compartment model which consists of inorganic, thyroid and organic compartment. After intake, the amount of iodine in every compartment is calculated by solving the transfer equations among the these compartments. As soon as caesium is taken into the body, it is distributed uniformly in the body through the transfer compartment. In this case, the amount of caesium in total body is calculated by using the total body compartment model which is divided into two tissue compartments because of their different biological half-lifes of caesium in body. As a result of calculations, whether oral or inhalation pathway, the values of ($W_T\;H_{50}$) per intake of unit activity of I-131 for infants are about ten times as much as those of adults. On the other hand, for Cs-134 and Cs-137, the values of $W_T\;H_{50}$ per intake of unit activity show that, whether adults of infants, they have almost the same values.

  • PDF

Analysis of Media Characteristic for Information Acquisition of Male Beauty for Industrial Promotion Strategy (남성 뷰티 산업의 광고 전략을 위한 남성 뷰티 트렌드의 정보획득 매체특성 연구)

  • KO, Kwangil;Kim, Hye-kyun
    • Journal of Digital Contents Society
    • /
    • v.17 no.4
    • /
    • pp.279-286
    • /
    • 2016
  • Recently, the cosmetics industry considers male customers as a consumptive, active customer base who also have purchasing power with their stronger desire for their personal image enhancement. Male-preferred image brands have entered the era of unlimited competition through social media, thus increasing the acquisition of male beauty. Therefore, the information for designing favorable image strategies should be examined. This paper examines male awareness, determined by the degree of appearance management based on four categories (i.e., hair and skin care, makeup, foot and hand care, and plastic surgery). Based on the research, the paper proposes a data service to address the spatial and temporal separation problem between TV CF (the major media for recognizing information) and online $caf{\acute{e}}$/blog the major media for obtaining detailed information.

Study on Fraud and SIM Box Fraud Detection Method in VoIP Networks (VoIP 네트워크 내의 Fraud와 SIM Box Fraud 검출 방법에 대한 연구)

  • Lee, Jung-won;Eom, Jong-hoon;Park, Ta-hum;Kim, Sung-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1994-2005
    • /
    • 2015
  • Voice over IP (VoIP) is a technology for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Instead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs in the form of IP packets over a packet-switched network which consist of several layers of computers. VoIP Service that used the various techniques has many advantages such as a voice Service, multimedia and additional service with cheap cost and so on. But the various frauds arises using VoIP because VoIP has the existing vulnerabilities at the Internet and based on complex technologies, which in turn, involve different components, protocols, and interfaces. According to research results, during in 2012, 46 % of fraud calls being made in VoIP. The revenue loss is considerable by fraud call. Among we will analyze for Toll Bypass Fraud by the SIM Box that occurs mainly on the international call, and propose the measures that can detect. Typically, proposed solutions to detect Toll Bypass fraud used DPI(Deep Packet Inspection) based on a variety of detection methods that using the Signature or statistical information, but Fraudster has used a number of countermeasures to avoid it as well. Particularly a Fraudster used countermeasure that encrypt VoIP Call Setup/Termination of SIP Signal or voice and both. This paper proposes the solution that is identifying equipment of Toll Bypass fraud using those countermeasures. Through feature of Voice traffic analysis, to detect involved equipment, and those behavior analysis to identifying SIM Box or Service Sever of VoIP Service Providers.