• Title/Summary/Keyword: 기술복잡성

Search Result 2,391, Processing Time 0.031 seconds

The Study on Control Algorithm of Elevator EDLC Emergency Power Converter (승강기 EDLC 비상전원 전력변환장치 제어 알고리즘 연구)

  • Lee, Sang-min;Kim, IL-Song;Kim, Nam
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.709-718
    • /
    • 2017
  • The installation of the elevator ARD(Automatic Rescue Device) system has been forced into law in these days in order to safely rescue passengers during power failure. The configuration of the ARD system consists of energy storage device, power converter and control systems. The EDLC(Electric Double Layer Capacitor) are used as energy storage device for rapid charge/discharge purposes. The power conditioning system (PCS) consists of bi-directional converter, 3-phase converter and control system. The dead-beat control system is adopted for most systems however it requires complex mathematical calculations, the high performance microprocessors are mandatory and thus it can be a cause of high manufacturing cost. In this paper the new control method for average current mode control is presented for simple structure. The control algorithm is applied to the single phase system and then expands to three phase system to meet the sysem requirements. The mathematical modeling using average modeling method is presented and analysed by PSIM computer simulation to verifie the validity of the proposed control methods.

Nonlinear Analysis of Concrete Girders Strengthened with Unboded Prestressed CFRP Plates (비부착 프리스트레스트 CFRP 판으로 보강된 콘크리트 거더의 비선형 해석)

  • Choi, Kyu-Chon;Lee, Jae Seok
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.6A
    • /
    • pp.495-502
    • /
    • 2010
  • A study for the nonlinear analysis method of flexural behavior of concrete girders strengthened with unbonded prestressed CFRP plates is presented. The concrete girders strengthened with unbonded prestressed CFRP plates exhibit more complex nonlinear behavior due to the slip between the concrete girder and the CFRP plates than the case of bonded CFRP plates. The unbonded CFRP plate is modeled as an assemblage of the curved elements both ends of which are rigidly linked to the nodes of fibered frame elements. The slip effect of the unbonded CFRP plate is taken into account using the force equilibrium relationship at each node. To evaluate the validity and the capability of the proposed analysis method, the ultimate analysis results of the concrete beams strengthened with unbonded prestressed CFRP plate are compared with the experimental results obtained from other investigators. The proposed analysis method is found to predict ultimate behaviors of these beams fairly well. Additionally the time-dependent deformations of the concrete beam seems to have little influence on the ultimate behaviors of concrete beams strengthened with unbonded prestressed CFRP plate, and the cracks of the concrete beam which occurred before strengthening it with CFRP plate are found to have almost no influence on the ultimate capacity of the beam.

A Blockchain Network Construction Tool and its Electronic Voting Application Case (블록체인 자동화도구 개발과 전자투표 적용사례)

  • AING TECKCHUN;KONG VUNGSOVANREACH;Okki Kim;Kyung-Hee Lee;Wan-Sup Cho
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.151-159
    • /
    • 2021
  • Construction of a blockchain network needs a cumbersome and time consuming activity. To overcome these limitations, global IT companies such as Microsoft are providing cloud-based blockchain services. In this paper, we propose a blockchain-based construction and management tool that enables blockchain developers, blockchain operators, and enterprises to deploy blockchain more comfortably in their infrastructure. This tool is implemented using Hyperledger Fabric, one of the famous private blockchain platforms, and Ansible, an open-source IT automation engine that supports network-wide deployment. Instead of complex and repetitive text commands, the tool provides a user-friendly web dashboard interface that allows users to seamlessly set up, deploy and interact with a blockchain network. With this proposed solution, blockchain developers, operators, and blockchain researchers can more easily build blockchain infrastructure, saving time and cost. To verify the usefulness and convenience of the proposed tool, a blockchain network that conducts electronic voting was built and tested. The construction of a blockchain network, which consists of writing more than 10 setting files and executing commands over hundreds of lines, can be replaced with simple input and click operations in the graphical user interface, saving user convenience and time. The proposed blockchain tool will be used to build trust data infrastructure in various fields such as food safety supply chain construction in the future.

A Guidance Methodology Using Ubiquitous Sensor Network Information in Large-Sized Underground Facilities in Fire (대형 지하시설물에서 화재발생 시 USN정보를 이용한 피난 유도 방안)

  • Seo, Yonghee;Lee, Changju;Jung, Jumlae;Shin, Seongil
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.4D
    • /
    • pp.459-467
    • /
    • 2008
  • Because of the insufficiency of ground space, the utilization of underground is getting more and more in these days. Moreover, underground space is being used not only buildings but multipurpose space for movement, storage and shopping. However, ground space has vital weakness for fire compared to ground space. Especially in case of underground shopping center, there are various stuffs to burn and poisonous gas can be exposed on this count when the space is burned. A large number of casualties can be also occurred from conflagration as underground space has closed structures that prevent rapid evacuation and access. Therefore, this research proposes the guidance methodology for evacuation from conflagration in large-sized underground facilities. In addition, suggested methodology uses high technology wireless sensor information from up-to-date ubiquitous sensor networks. Fire information collected by sensors is integrated with existing underground facilities information and this is sent to guidance systems by inducing process. In the end, this information is used for minimum time paths finding algorithm considering the passageway capacity and distance. Also, usefulness and inadequacies of proposed methodology is verified by a case study.

A case study on the application of service design in a tertiary care hospital - Focusing on patient and Medical staff experience data at a Regional emergency medical center - (상급종합병원 서비스디자인 적용 단일 사례연구 -권역응급의료센터의 환자와 의료진 경험 데이터를 중심으로-)

  • Choi, Jugnmin;Ahn, Jinho
    • Journal of Service Research and Studies
    • /
    • v.13 no.4
    • /
    • pp.113-130
    • /
    • 2023
  • This study is a single case study of the application of service design in a regional emergency medical centre of a senior general hospital, focusing on the experiences of patients and medical staff. It aims to measure and improve the experience of healthcare services using service design techniques and to verify their effectiveness. A qualitative case study centred on ethnography and design workshops was conducted to collect in-depth experience data from patients and medical staff. The study identified key experiential differences between patients and healthcare workers, with a particular focus on the challenges faced in emergency medical services. The qualitative data collected through patient and healthcare worker interviews and design thinking workshops were analysed and incorporated into the design in order to understand the complex dynamics of the regional emergency medical centre environment. The results of the study highlighted the need to improve communication, manage patient flow, and improve the environment in three main aspects of the current state of design reflecting the needs of patients and medical staff. By analysing the differences in the specific needs of the two groups of patients and medical staff, a design-led implementation process can be applied to improve the services of the regional emergency medical centre. This study highlights the role and importance of design in healthcare and provides an efficient way to bridge the gap between theoretical research and practical design implementation. This will contribute to creating a faster, more effective, and more satisfying healthcare experience. It is hoped that this will be a new opportunity to see service design as a key to a new innovation process for the satisfaction of both patients and medical staff.

A Multi-Compartment Secret Sharing Method (다중 컴파트먼트 비밀공유 기법)

  • Cheolhoon Choi;Minsoo Ryu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.34-40
    • /
    • 2024
  • Secret sharing is a cryptographic technique that involves dividing a secret or a piece of sensitive information into multiple shares or parts, which can significantly increase the confidentiality of a secret. There has been a lot of research on secret sharing for different contexts or situations. Tassa's conjunctive secret sharing method employs polynomial derivatives to facilitate hierarchical secret sharing. However, the use of derivatives introduces several limitations in hierarchical secret sharing. Firstly, only a single group of participants can be created at each level due to the shares being generated from a sole derivative. Secondly, the method can only reconstruct a secret through conjunction, thereby restricting the specification of arbitrary secret reconstruction conditions. Thirdly, Birkhoff interpolation is required, adding complexity compared to the more accessible Lagrange interpolation used in polynomial-based secret sharing. This paper introduces the multi-compartment secret sharing method as a generalization of the conjunctive hierarchical secret sharing. Our proposed method first encrypts a secret using external groups' shares and then generates internal shares for each group by embedding the encrypted secret value in a polynomial. While the polynomial can be reconstructed with the internal shares, the polynomial just provides the encrypted secret, requiring external shares for decryption. This approach enables the creation of multiple participant groups at a single level. It supports the implementation of arbitrary secret reconstruction conditions, as well as conjunction. Furthermore, the use of polynomials allows the application of Lagrange interpolation.

A Study on Biometric Model for Information Security (정보보안을 위한 생체 인식 모델에 관한 연구)

  • Jun-Yeong Kim;Se-Hoon Jung;Chun-Bo Sim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.317-326
    • /
    • 2024
  • Biometric recognition is a technology that determines whether a person is identified by extracting information on a person's biometric and behavioral characteristics with a specific device. Cyber threats such as forgery, duplication, and hacking of biometric characteristics are increasing in the field of biometrics. In response, the security system is strengthened and complex, and it is becoming difficult for individuals to use. To this end, multiple biometric models are being studied. Existing studies have suggested feature fusion methods, but comparisons between feature fusion methods are insufficient. Therefore, in this paper, we compared and evaluated the fusion method of multiple biometric models using fingerprint, face, and iris images. VGG-16, ResNet-50, EfficientNet-B1, EfficientNet-B4, EfficientNet-B7, and Inception-v3 were used for feature extraction, and the fusion methods of 'Sensor-Level', 'Feature-Level', 'Score-Level', and 'Rank-Level' were compared and evaluated for feature fusion. As a result of the comparative evaluation, the EfficientNet-B7 model showed 98.51% accuracy and high stability in the 'Feature-Level' fusion method. However, because the EfficietnNet-B7 model is large in size, model lightweight studies are needed for biocharacteristic fusion.

5G Network Resource Allocation and Traffic Prediction based on DDPG and Federated Learning (DDPG 및 연합학습 기반 5G 네트워크 자원 할당과 트래픽 예측)

  • Seok-Woo Park;Oh-Sung Lee;In-Ho Ra
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.33-48
    • /
    • 2024
  • With the advent of 5G, characterized by Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communications (URLLC), and Massive Machine Type Communications (mMTC), efficient network management and service provision are becoming increasingly critical. This paper proposes a novel approach to address key challenges of 5G networks, namely ultra-high speed, ultra-low latency, and ultra-reliability, while dynamically optimizing network slicing and resource allocation using machine learning (ML) and deep learning (DL) techniques. The proposed methodology utilizes prediction models for network traffic and resource allocation, and employs Federated Learning (FL) techniques to simultaneously optimize network bandwidth, latency, and enhance privacy and security. Specifically, this paper extensively covers the implementation methods of various algorithms and models such as Random Forest and LSTM, thereby presenting methodologies for the automation and intelligence of 5G network operations. Finally, the performance enhancement effects achievable by applying ML and DL to 5G networks are validated through performance evaluation and analysis, and solutions for network slicing and resource management optimization are proposed for various industrial applications.

Changes and Improvements of the Standardized Eddy Covariance Data Processing in KoFlux (표준화된 KoFlux 에디 공분산 자료 처리 방법의 변화와 개선)

  • Kang, Minseok;Kim, Joon;Lee, Seung-Hoon;Kim, Jongho;Chun, Jung-Hwa;Cho, Sungsik
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.20 no.1
    • /
    • pp.5-17
    • /
    • 2018
  • The standardized eddy covariance flux data processing in KoFlux has been updated, and its database has been amended accordingly. KoFlux data users have not been informed properly regarding these changes and the likely impacts on their analyses. In this paper, we have documented how the current structure of data processing in KoFlux has been established through the changes and improvements to ensure transparency, reliability and usability of the KoFlux database. Due to increasing diversity and complexity of flux site instrumentation and organization, we have re-implemented the previously ignored or simplified procedures in data processing (e.g., frequency response correction, stationarity test), and added new methods for $CH_4$ flux gap-filling and $CO_2$ flux correction and partitioning. To evaluate the effects of the changes, we processed the data measured at a flat and homogeneous paddy field (i.e., HPK) and a deciduous forest in complex and heterogeneous topography (i.e., GDK), and quantified the differences. Based on the results from our overall assessment, it is confirmed that (1) the frequency response correction (HPK: 11~18% of biases for annually integrated values, GDK: 6~10%) and the stationarity test (HPK: 4~19% of biases for annually integrated values, GDK: 9~23%) are important for quality control and (2) the minimization of the missing data and the choice of the appropriate driver (rather than the choice of the gap-filling method) are important to reduce the uncertainty in gap-filled fluxes. These results suggest the future directions for the data processing technology development to ensure the continuity of the long-term KoFlux database.

A Study on Korean Style of Typography - Aesthetic of Simplicity, the Essence of Style (타이포그라피의 한국성 연구 - 단순 미학, 그 고유성의 근거에 대하여)

  • 유정미
    • Archives of design research
    • /
    • v.12 no.1
    • /
    • pp.145-154
    • /
    • 1999
  • With the introduction of digital technology since the late 1970s, we have been shifting from the industrial era into the information age. New communication systems have changed our concept of reality. Korea has a wealthy communication heritage with its own language and alphabet. However, Korean typography today has struggled to keep its originality, and does not hold up well to international standards. Korean contemporary typography is not efficient for communicating. It is not orderly, organised and simple. It has currently become complicated and decorative. Moreover, many young designers are attracted by imitations of western trends. It is now time for Korea to reveal its own identity. How can it develop a new typographic language that is more sympathetic to Korean tradition\ulcorner How will Korean information design produce a contemporary style with international relevance that contributes to world culture\ulcorner This thesis will be developed a new Korean typographic language that relies more on Korean traditions. Simultaneously, in this thesis will be examined Swiss typography as a relevant style for a new Korean typography to incorporate. Swiss typography maintained a similar philosophy to Korean tradition with its emphasis on clarity and simplicity. This study will be explored the potential of creating a contemporary Korean typographic solution which combines the traditions of Korea with the clarity of Swiss typography. The first attitude of the new typographic language should focus on legibility. The second condition of the new typographic philosophy based on the ability of designers is interpretation of context. The third concept of the new language is founded on an objective, rational design attitude. The final mental attitude of the new typographic language should feel a deep obligation to traditions. It is crucial time for Korean alphabet to establish a relevant standard rather than goes uncritically with the international current. Korea has had worthy traditions. It is suggested that the answers to 'good design' lie in the study of Korea's own history. Simultaneously, the research of Swiss design which is a

  • PDF