• Title/Summary/Keyword: 라운드

Search Result 829, Processing Time 0.025 seconds

The hierarchical structures of cause-and-effect relationships on the profit factors in overseas construction projects (해외건설공사 수익성 영향인자의 계층구조 및 사레적용에 관한 연구)

  • Han, Seung-Heon;Sun, Seung-Min;Park, Sang-Hyuk;Jung, Do-Young
    • Korean Journal of Construction Engineering and Management
    • /
    • v.7 no.5
    • /
    • pp.64-76
    • /
    • 2006
  • Korea's overseas construction industry has been rather depressed by the weakened profitability as well as the sharp decrease of the market shares due to the lack of international competitiveness and the declined international market. There exist a lot of various risks in performing the overseas construction, and especially EPC projects, which entail complicated process from different parts, also require a sophisticated procurement and management skill. Subsequently, to survive in the competitive international market, we need to establish strategies to select potentially profitable projects at the initial stage of bidding process and to mitigate the high degree of risk exposure through contract negotiation and its adjustment. This research discusses the trend of environment in international construction markets. Then, it identifies the key factors that affect the profitability significantly through the structured surveys from 59 actual overseas projects, and it analyzes the key factors by using statistical methods. This research provides the profitability evaluation bases, with which overseas construction participants can forecast and analyze the risk more systematically, by eliciting profit-influencing factors using the result of statistical analysis, literature review and structuring their cause-and-effect relationships. The profitability casual hierarchy structure describes the profitability factors' hierarchy in details and their interrelationships. It also enables us to find out critical factors directly related to profitability aggravation through a qualitative and quantitative analysis. Ultimately, with this hierarchy structure as the base, the research will suggest how to develop the quantitative profitability forecasting model.

A Design of AES-based WiBro Security Processor (AES 기반 와이브로 보안 프로세서 설계)

  • Kim, Jong-Hwan;Shin, Kyung-Wook
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.7 s.361
    • /
    • pp.71-80
    • /
    • 2007
  • This paper describes an efficient hardware design of WiBro security processor (WBSec) supporting for the security sub-layer of WiBro wireless internet system. The WBSec processor, which is based on AES (Advanced Encryption Standard) block cipher algorithm, performs data oncryption/decryption, authentication/integrity, and key encryption/decryption for packet data protection of wireless network. It carries out the modes of ECB, CTR, CBC, CCM and key wrap/unwrap with two AES cores working in parallel. In order to achieve an area-efficient implementation, two design techniques are considered; First, round transformation block within AES core is designed using a shared structure for encryption/decryption. Secondly, SubByte/InvSubByte blocks that require the largest hardware in AES core are implemented using field transformation technique. It results that the gate count of WBSec is reduced by about 25% compared with conventional LUT (Look-Up Table)-based design. The WBSec processor designed in Verilog-HDL has about 22,350 gates, and the estimated throughput is about 16-Mbps at key wrap mode and maximum 213-Mbps at CCM mode, thus it can be used for hardware design of WiBro security system.

A Study On Radiation Detection Using CMOS Image Sensor (CMOS 이미지 센서를 사용한 방사선 측정에 관한 연구)

  • Lee, Joo-Hyun;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.193-200
    • /
    • 2015
  • In this paper, we propose the radiation measuring algorithm and the device composition using CMOS image sensor. The radiation measuring algorithm using CMOS image sensor is based on the radiation particle distinguishing algorithm projected to the CMOS image sensor and accumulated and average number of pixels of the radiation particles projected to dozens of images per second with CMOS image sensor. The radiation particle distinguishing algorithm projected to the CMOS image sensor measures the radiation particle images by dividing them into R, G and B and adjusting the threshold value that distinguishes light intensity and background from the particle of each image. The radiation measuring algorithm measures radiation with accumulated and average number of radiation particles projected to dozens of images per second with CMOS image sensor according to the preset cycle. The hardware devices to verify the suggested algorithm consists of CMOS image sensor and image signal processor part, control part, power circuit part and display part. The test result of radiation measurement using the suggested CMOS image sensor is as follows. First, using the low-cost CMOS image sensor to measure radiation particles generated similar characteristics to that from measurement with expensive GM Tube. Second, using the low-cost CMOS image sensor to measure radiation presented largely similar characteristics to the linear characteristics of expensive GM Tube.

The Exploratory Study on the Method of Information System Introduction in SMEs using Delphi Technique (델파이 기법을 이용한 중소기업의 정보시스템 도입방법에 관한 탐색적 연구)

  • Kim, Narang;Joo, Seok Jeong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.1
    • /
    • pp.47-58
    • /
    • 2013
  • This study offers a $3{\times}2$ matrix on the development method pursuant to the level of readiness and necessity for IS of SMEs, and the Delphi method survey through the assistance of a panel of IT experts was employed. Upon analyzing the results, in all rounds, the 1st quadrant and 2nd quadrant resulted in a preference for leasing methods (ASP/SaaS) and the other quadrants resulted in a preference for outsourcing. Quadrants closer to the 1st quadrant showed a preference for leasing methods (ASP/SaaS) and quadrants closer to the 6th quadrant showed a preference for outsourcing. In the case of the IS implementation for the entire company, all three levels of readiness resulted in a preference for outsourcing. The point in which the implementation method changed depending on the level of readiness was when unit systems were implemented, and among the implementation methods, in-house development showed the lowest results.

Pin Pull Characteristics of Pin Lead with Variation of Mechanical Properties of Pin Lead in PGA (Pin Grid Array) Package (PGA (Pin Grid Array) 패키지의 Lead Pin의 기계적 특성에 따른 Pin Pull 거동 특성 해석)

  • Cho, Seung-Hyun;Choi, Jin-Won;Park, Gyun-Myoung
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.17 no.1
    • /
    • pp.9-17
    • /
    • 2010
  • In this study, von Mises stress and total strain energy density characteristics of lead pin in PGA (Pin Grid Array) packages have been calculated by using the FEM (Finite Element Method). FEM computation is carried out with various heat treatment conditions of lead pin material under $20^{\circ}$ bending and 50 mm tension condition. Results show that von Mises stress locally concentrated on lead pin corners and interface between lead pin head and solder. von Mises stress and total strain energy density decrease as heat treatment temperature of lead pin increases. Also, round shaped corner of lead pin decreases both von Mises stress and total strain energy density on interface between lead pin head and solder. This means that PGA package reliability can be improved by changing the mechanical property of lead pin through heat treatment. This has been known that solder fatigue life decreases as total strain energy density of solder increases. Therefore, it is recommended that both optimized lead pin shape and optimized material property with high lead pin heat treatment temperature determine better PGA package reliability.

Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks (센서 네트워크에서 mHEED를 이용한 에너지 효율적인 분산 침입탐지 구조)

  • Kim, Mi-Hui;Kim, Ji-Sun;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.151-164
    • /
    • 2009
  • The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.

A New Web Cluster Scheme for Load Balancing among Internet Servers (인터넷 환경에서 서버간 부하 분산을 위한 새로운 웹 클러스터 기법)

  • Kim, Seung-Young;Lee, Seung-Ho
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.115-122
    • /
    • 2002
  • This paper presents a new web cluster scheme based on dispatcher which does not depend on operating system for server and can examine server's status interactively. Two principal functions are proposed for new web cluster technique. The one is self-controlled load distribution and the other is transaction fail-safe. Self-controlled load distribution function checks response time and status of servers periodically, then it decides where the traffic goes to guarantee rapid response for every query. Transaction fail-safe function can recover lost queries including broken transaction immediately from server errors. Proposed new web cluster scheme is implemented by C language on Unix operating system and compared with legacy web cluster products. On the comparison with broadcast based web cluster, proposed new web cluster results higher performance as more traffic comes. And on the comparison with a round-robin DNS based web cluster, it results similar performance at the case of traffic processing. But when the situation of one server crashed, proposed web cluster processed traffics more reliably without lost queries. So, new web cluster scheme Proposed on this dissertation can give alternative plan about highly increasing traffics and server load due to heavy traffics to build more reliable and utilized services.

A Study on Wear Characteristics of Cutting Tools in a Titanium Roughing Cut Machining (티타늄 황삭가공에 있어서 절삭공구의 마모 특성에 관한 연구)

  • Bae, Myung-whan;Jung, Hwa;Park, Hyeong-yeol
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.24 no.1
    • /
    • pp.67-73
    • /
    • 2016
  • The application of titanium has been gradually rising because the utilizing ranges for low weight and high strength are rapidly increased by the need for improving the fuel economy in production industries such as the aviation and automotive in recent. The purpose in this study is to investigate the appropriate cutting conditions on the life of flat and round end mills by measuring the maximum cutting temperature relative to the machining time, and calculating the wear rates of cutting tool with the spindle speed and feed rate of vertical machining center as a parameter in the titanium roughing cut machining which is widely used in critical parts of aircraft, cars, etc. When the wetted roughing cut machining of titanium with a soluble cutting oil is conducted by the flat and round end mills, the maximum cutting temperatures for a variety of spindle speed and feed rate are measured at ten-minute intervals during 60 minutes by an infrared thermometer, and the wear rates of cutting tool are calculated by the weight ratios based on tool wear before and after the experiment. It is found that the maximum cutting temperature and the wear rates of cutting tool are raised as the cutting amount per tool edge is increased with the rise of feed rate, in this experimental range, and as the frictional area due to the rise of contacting friction numbers between tool and specimen is increased with the rises of cutting time and spindle speed. In addition, the increasing rate of maximum cutting temperature in the flat and round end mills are the highest for the cutting time from 50 to 60 minutes, and the wear rate of cutting tool in the flat end mill is 1.14 to 1.55 times higher than that in the round end mill for all experimental conditions.

An Actor-Network Theory Approach to Korean Flower Auctions (화훼시장 경매에 대한 행위자-연결망 이론적 접근)

  • JIN, Bo-ra;KIM, Eun-sung
    • Journal of Science and Technology Studies
    • /
    • v.19 no.2
    • /
    • pp.1-40
    • /
    • 2019
  • Built upon ethnographic method such as participant observation and in-depth interview, this study analyzes the material culture of electronic flower auctions at Yangjae Flower Market. From the viewpoint of Actor-Network Theory(ANT), this research examines how human actors like dealers and auctioneers interact with nonhuman actors such as market devices and these interactions form networks called "agencement." This research is focused on three main objectives: first, to study how the performance of auctions - i.e. the interactions between auctioneers and dealers - change in the wake of new market devices in the auctions; secondly, to look into what changes artifacts bring to the social relationships between auctioneers and dealers; lastly, to analyze the influence of new market devices on auction price in the market. The results of this research are as follows. First, the appearance of new market devices generates changes in the performance of auctions, which means the change of 'agencement' of flower auctions. Direct interactions between auctioneers and dealers turned into indirect interactions through new market devices. Moreover, the changes in the agencement brought changes to the identity of auctioneers and dealers. Secondly, the new agencement caused by the inflow of new market devices formed the trust between the devices and human actors, which gave rise to the trust in electronic auction and in counterpart actors as well. In addition, new market devices lowered direct interactions between auctioneers and dealers and thus made more equal relationships between the two than before. Lastly, market devices like trading screen reduced the leverage of auctioneers by providing dealers with bidding information previously possessed by auctioneers much openly and dealers were able to decide auction prices in more reasonable and dispassionate manner. Economic agency, power, trust, price, and information in the market is material and sensory.

High Performance Hardware Implementation of the 128-bit SEED Cryptography Algorithm (128비트 SEED 암호 알고리즘의 고속처리를 위한 하드웨어 구현)

  • 전신우;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.13-23
    • /
    • 2001
  • This paper implemented into hardware SEED which is the KOREA standard 128-bit block cipher. First, at the respect of hardware implementation, we compared and analyzed SEED with AES finalist algorithms - MARS, RC6, RIJNDAEL, SERPENT, TWOFISH, which are secret key block encryption algorithms. The encryption of SEED is faster than MARS, RC6, TWOFISH, but is as five times slow as RIJNDAEL which is the fastest. We propose a SEED hardware architecture which improves the encryption speed. We divided one round into three parts, J1 function block, J2 function block J3 function block including key mixing block, because SEED repeatedly executes the same operation 16 times, then we pipelined one round into three parts, J1 function block, J2 function block, J3 function block including key mixing block, because SEED repeatedly executes the same operation 16 times, then we pipelined it to make it more faster. G-function is implemented more easily by xoring four extended 4 byte SS-boxes. We tested it using ALTERA FPGA with Verilog HDL. If the design is synthesized with 0.5 um Samsung standard cell library, encryption of ECB and decryption of ECB, CBC, CFB, which can be pipelined would take 50 clock cycles to encrypt 384-bit plaintext, and hence we have 745.6 Mbps assuming 97.1 MHz clock frequency. Encryption of CBC, OFB, CFB and decryption of OFB, which cannot be pipelined have 258.9 Mbps under same condition.