• Title/Summary/Keyword: 기업공개

Search Result 360, Processing Time 0.021 seconds

Development of a Three Dimensional Control System for Implementing Rapid Prototyping Technology (쾌속조형기술의 구현을 위한 3차원 제어시스템 개발)

  • Cho, Sung-Mok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.775-780
    • /
    • 2007
  • Rapid Prototyping (RP) is a technology that produces prototype parts from 3D computer aided design model data without intermediate processing technology rapidly. CAD model data are created from 3D object digitizing systems but presented just as 2D data when they are printed as a hard copy or displayed on a monitor. However, Rapid Prototyping Technology fabricates 3D objects the same that CAD data because it transforms designed 3D CAD data into 2D cross sectional data, and manufactures layer by layer deposition sequentially. But most of all the small and medium scale companies which produce a toothbrush, a toy and such like provisions are in difficult situations to buy RP system because it is very expensive. In this paper, we propose a 3D control system adopting open source programs for implementing Rapid Prototyping Technology in order that RP system can be purchase at a moderate price.

  • PDF

Trend on the Recycling Technologies for the waste stripper solution by the Patent Analysis (특허(特許)로 본 스트리핑 공정(工程) 재활용(再活用) 기술(技術) 동향(動向))

  • Park, Myung-Jun;Lee, Ho-Kyung;Koo, Kee-Kahb;Kang, Kyung-Seok;Han, Hye-Jung
    • Resources Recycling
    • /
    • v.18 no.1
    • /
    • pp.58-67
    • /
    • 2009
  • The annual requirement of domestic waste photoresist stripper solution is about 1 trillion won level (50,000 tons) depends entirely on imports for its supplies. Nevertheless, there waste strippers which contain the impurities have been recycled or incinerated to a low level of recycle. These days the recycling technologies of the waste stripper solution has been widely studied from the view points of economy and efficiency. In this paper, the recycling technologies on patent of the waste stripper solution were analyzed. The range of search was limited within the open patents of USA (US), European Union (EP), Japan (JP), and Korea (KR) up to september, 2007. Patents have been collected using key-words searching and filtered by filtering criteria. The trends of the patents was analyzed by the years, countries, companies, and technologies.

An Efficient cryptography for healthcare data in the cloud environment (클라우드 환경에서 헬스케어 데이터를 위한 효율적인 암호화 기법)

  • Cho, Sung-Nam;Jeong, Yoon-Su;Oh, ChungShick
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.63-69
    • /
    • 2018
  • Recently, healthcare services are using cloud services to efficiently manage users' healthcare data. However, research to ensure the stability of the user's healthcare data processed in the cloud environment is insufficient. In this paper, we propose a partial random encryption scheme that efficiently encrypts healthcare data in a cloud environment. The proposed scheme generates two random keys (p, q) generated by the user to optimize for the hospital medical service and reflects them in public key and private key generation. The random key used in the proposed scheme improves the efficiency of user 's healthcare data processing by encrypting only part of the data without encrypting the whole data. As a result of the performance evaluation, the proposed method showed 21.6% lower than the existing method and 18.5% improved the user healthcare data processing time in the hospital.

Lightweight Convolution Module based Detection Model for Small Embedded Devices (소형 임베디드 장치를 위한 경량 컨볼루션 모듈 기반의 검출 모델)

  • Park, Chan-Soo;Lee, Sang-Hun;Han, Hyun-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.9
    • /
    • pp.28-34
    • /
    • 2021
  • In the case of object detection using deep learning, both accuracy and real-time are required. However, it is difficult to use a deep learning model that processes a large amount of data in a limited resource environment. To solve this problem, this paper proposes an object detection model for small embedded devices. Unlike the general detection model, the model size was minimized by using a structure in which the pre-trained feature extractor was removed. The structure of the model was designed by repeatedly stacking lightweight convolution blocks. In addition, the number of region proposals is greatly reduced to reduce detection overhead. The proposed model was trained and evaluated using the public dataset PASCAL VOC. For quantitative evaluation of the model, detection performance was measured with average precision used in the detection field. And the detection speed was measured in a Raspberry Pi similar to an actual embedded device. Through the experiment, we achieved improved accuracy and faster reasoning speed compared to the existing detection method.

VPN-Filter Malware Techniques and Countermeasures in IoT Environment (사물인터넷 환경에서의 VPN-Filter malware 기술과 대응방법)

  • Kim, Seung-Ho;Lee, Keun-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.231-236
    • /
    • 2018
  • Recently, a wide variety of IoT environment is being created due to the rapid development of information and communication technology. And accordingly in a variety of network structures, a countless number of attack techniques and new types of vulnerabilities are producing a social disturbance. In May of 2018, Talos Intelligence, the Cisco threat intelligence team has newly discovered 'VPN-Filter', which constitutes a large-scale IoT-based botnet, is infecting consumer routers in over 54 countries around the world. In this paper, types of IoT-based botnets and the attack techniques utilizing botnet will be examined and the countermeasure technique through EXIF metadata removal method which is the cause of connection method of C & C Server will be proposed by examining the characteristics of attack vulnerabilities and attack scenarios of VPN-Filter.

The Effects of Information Culture and Organizational Culture on Knowledge Utilization (정보문화와 조직문화 유형이 지식활용에 미치는 영향 분석)

  • Seo, Eun-Gyoung;Park, Heejin
    • Journal of the Korean Society for information Management
    • /
    • v.35 no.4
    • /
    • pp.285-308
    • /
    • 2018
  • Knowledge utilization is an activity directly linked to organizational capacity and is the most essential activity in knowledge management that is to produce new values. Thus, systematic and comprehensive understanding of factors and the environment that affect knowledge utilization are needed. The purpose of this study is to investigate the effects of information culture and organizational culture on knowledge utilization. For this, data were collected from 300 workers from 6 institutions including government-funded research institutes, libraries, and cooperation research institutes. This study analyzes the effects of six aspects of information cultures and four organizational culture types on knowledge utilization. The results show that information cultures(control, transparency, proactiveness) and organizational culture (The Clan Culture, The Adhocracy Culture, The Market Culture, The Hierarchy Culture) are significantly influential factors for the knowledge utilization. Based on results, this study provides the implication of knowledge sharing in the organizations and suggests further studies.

Survey on Out-Of-Domain Detection for Dialog Systems (대화시스템 미지원 도메인 검출에 관한 조사)

  • Jeong, Young-Seob;Kim, Young-Min
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.1-12
    • /
    • 2019
  • A dialog system becomes a new way of communication between human and computer. The dialog system takes human voice as an input, and gives a proper response in voice or perform an action. Although there are several well-known products of dialog system (e.g., Amazon Echo, Naver Wave), they commonly suffer from a problem of out-of-domain utterances. If it poorly detects out-of-domain utterances, then it will significantly harm the user satisfactory. There have been some studies aimed at solving this problem, but it is still necessary to study about this intensively. In this paper, we give an overview of the previous studies of out-of-domain detection in terms of three point of view: dataset, feature, and method. As there were relatively smaller studies of this topic due to the lack of datasets, we believe that the most important next research step is to construct and share a large dataset for dialog system, and thereafter try state-of-the-art techniques upon the dataset.

P-RBACML : Privacy Enhancing Role-Based Access Control Policy Language Model (P-RBACML : 프라이버시 강화형 역할기반접근통제 정책 언어 모델)

  • Lee, Young-Lok;Park, Jun-Hyung;Noh, Bong-Nam;Park, Hae-Ryong;Chun, Kil-Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.149-160
    • /
    • 2008
  • As individual users have to provide more information than the minimum for using information communication service, the invasion of privacy of Individual users is increasing. That is why client/server based personal information security platform technologies are being developed such as P3P, EPAL and XACML. By the way enterprises and organizations using primarily role based access control can not use these technologies. because those technologies apply access control policies to individual subjects. In this paper, we suggest an expression language for privacy enhancing role-based access control policy. Suggested privacy enhancing role-based access control policy language model is a variation of XACML which uses matching method and condition, and separately contains elements of role, purpose, and obligation. We suggest policy language model for permission assignment in this paper, shows not only privacy policy scenario with policy document instance, but also request context and response context for helping understanding.

A Study on the Operation Plans for Seongnam Public Library Programs in the Post-COVID-19 Era (포스트 코로나 시대 성남시 도서관의 문화프로그램 운영 방안 연구)

  • Song, Min Sun
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.177-186
    • /
    • 2022
  • The purpose of this study is to suggest operation plans for library programs in preparation for the post-COVID-19 by analyzing the current status of library programs before and after the outbreak of COVID-19 based on the data of the Seongnam public libraries on the Public Data Portal. So, based on 1,317 data collected through the data purification process for duplicates and errors in the files uploaded by Seongnam City, ①programs' subject & type, ②program target users, ③program operation types(online or offline), ④program operating time & number of days, ⑤characteristics of programs preferred by users etc. were analyzed. As results of the analysis, online programs were not operated at all before COVID-19, but online programs started to be operated in earnest after August 2020. Also, there were many experiential activity lectures for infants and elementary school students in 2019, but reading activity lectures for adults and elementary school students increased in 2020. There were many types of online lectures, such as real-time lectures using online video conferencing programs, YouTube video viewing & live broadcasting, and the use of Naver Band & Cafe.

A Study on the Algorithm Transparency Act and Right to Explanation - Focus on the Review of Algorithm Transparency Act -

  • Lee, Young-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.233-236
    • /
    • 2021
  • Recently, the Justice Party is pushing for legislation of a bill called the Algorithm Transparency Act. The bill is a revision to the Information and Communication Network Act proposed by Rep. Ryu Ho-jung on June 25, 2021, and aims to form a separate committee under the Korea Communications Commission to ask organizations operated for profit to search algorithms and explain the principles of arrangement. Currently, Korea treats algorithms as corporate secrets and does not disclose them, while the European Union (EU) implements the Personal Information Protection Regulations (GDPR) in relation to algorithm regulations. Therefore, this study summarizes the main contents of the Algorithm Transparency Act currently proposed to the National Assembly and reviews the current status of algorithm-related laws and systems in the European Union (EU) and the improvement of algorithm transparency.