• Title/Summary/Keyword: 성능표시

Search Result 392, Processing Time 0.025 seconds

Ad Planning Model by Comparison Challenge Approach in the e-Marketplace (e-Marketplace에서의 비교도전에 의한 광고계획 모델)

  • 이재규;이재원
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.137-153
    • /
    • 2003
  • Comparison shopping is the most popular functionality in the e-Marketplace. Most of their revenue has been generated kent the Internet advertisement, but the ad earning was declined as the ad costing per action method widespread. Seller less familiar to the customer shrinks from chances for advertising and exposing their products. So, we need an efficient methodology subject to the seller's ad budget and other constraints, and it also has to increase comparison broker's earning in the e-Marketplace. Our research proposed and developed an ad planning methodology using comparison challenge approach which can be applied by 3$^{rd}$ party comparison brokers. Comparison challenge planning is organized with challenge policy of competitor level, product level and specification level. With that policies and basic challenge propositions, we measure the quantified value of functional distance between the specifications of my product and competitor's product. My product challenges the comparison using the comparative ad format to the similar but inferior competitor's product based on quantified valuation. Comparison challenge planning system has two phases of comparative value generation and optimization. We developed a prototype system and applied it to the desktop PC market of five major manufacturers. Our performance was emphasized by comparing to other comparative ad methods such as random display method and minimum distance method..

  • PDF

A Development of Smartphone-connected Fishing Net Tracking and Management System (스마트폰 연계형 어망위치 추적 및 관리 시스템의 개발)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Woo, Yun-Tae;Shin, Il-Sik;Yu, Yung-Ho;Baek, Woon-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.401-408
    • /
    • 2017
  • Recently, the environment at littoral sea has been contaminated and damaged by submarine deposits, e.g. the fishing nets. To solve this problem, the government pushes the policies such as management plan of the fishing nets in whole life cycle of them. The representative causes are dumping and drifting away of the fishing nets, and shed new light on technological methods for tracking and management of the fishing nets. To prevent this drawbacks, this paper covers a development of tracking and management system for the fishing nets. To do this, we analyzed the existing products, and figured out performance improvement points. Also we proposed additional enhancement techniques which connects with a smartphone application and displays the positions and state information of the fishing nets, and so on. To adopt the proposed methods, we design and implement a tracking and management system based on ENC with the smartphone application, and verified the usefulness of the system.

Characteristics and Application of PLT Thin-Films Deposited on ITO Substrate (ITO 기판위에 증착시킨 PLT 박막의 특성 및 그 응용)

  • Bae, Seung-Choon;Park, Sung-Kun;Choi, Byung-Jin;Kim, Ki-Wan
    • Journal of Sensor Science and Technology
    • /
    • v.6 no.5
    • /
    • pp.423-429
    • /
    • 1997
  • We fabricated PLT thin films on ITO substrate for flat pannel display and investigated the characteristics, then we applicated to electroluminescent device and investigated application possibility. When we fabricated PLT thin films with substrate temperature of $500^{\circ}C$, and pressure of 30 mTorr, the relative deielectric constant and breakdown electricfield of PLT thin films were 120 and 3.2MV/cm. The electric resistivity was $2.0{\times}10^{12}{\Omega}{\cdot}cm$. PLT thin films had polycrystal structure of perovskite and pyrochlore at the higher substrate temperature than $450^{\circ}C$, and had good crystallinity at higher pressure. To use PLT insulator film and ZnS:Mn phosphor, we fabricated thin film electroluminescent device of ITO/PLT/ZnS:Mn/PLT/Al structure. At the result, threshold voltage was $35.2V_{rms}$ and brightness was $2400cd/m^{2}$ at $50V_{rms}$ and 1kHz. Maximum luminescence efficiency was 0.811m/W.

  • PDF

Development of Standards of Tattoo Machine for Safety and Performance Evaluation (의료용 표시기의 안전성 및 성능 평가를 위한 시험 항목 및 시험방법(안)연구)

  • Kim, Y.G.;Cho, S.K.;Lee, T.W.;Yeo, C.M.;Jung, B.J.;Kwon, Y.M.;Cha, J.H.;Hur, C.H.;Park, K.J.;Kim, D.S.;Kim, H.S.
    • Journal of Biomedical Engineering Research
    • /
    • v.32 no.2
    • /
    • pp.151-157
    • /
    • 2011
  • Tattooing is a performance for decorative and cosmetic marking by placing permanent ink into the skin. As the cultural meaning of tattoo in Korea is changing, the tattoo machines are widely spread n permanent cosmetic market. Though the use of the tattoo machine was increased, the evaluation standards of tattoo machine were not existed. Korea Food and Drug Association regulated the electrical and mechanical safety standards which were founded on the IEC 601-1 second edition. Also they regulated he biological safety standards which were derived from the ISO 10993 series, however, these general valuations of common medical device were insufficient for evaluating tattoo machine. We developed the standards of tattoo machine for safety and performance evaluation for tattoo machine by preliminary hazard analysis in ISO 14971. The evaluation criteria of tattoo machines are focused on the mechanical invasion. We suggested the additional evaluation items of the needle speed, length, vibration with general valuation criteria of common medical device. We anticipate that this research may be a primary stage to figure a standard regulation and evaluation for tattoo machine.

Development of Digital Solder Station Based on PID Controller (PID 제어기를 이용한 전기인두기의 온도 제어 시스템 개발)

  • Oh, Kab-Suk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.866-872
    • /
    • 2010
  • In this paper, we developed a digital soldering station based on PID controller, which supply stable power by controlling the current of heater of soldering iron. The proposed system designed PID controller to converge quickly to the set up temperature by user, and regain the lost of heat by external factors quickly. PID controller, designed by Ziegler-Nichols' tuning method, decides triac's trigger timing using setting temperature and present temperature to control the phase of AC 24V power that supply to the heater. Also, we give the function that shows present temperature and setting temperature of iron, and working time by graphic LCD. And during the rest time, we decided the power saving and extension of iron tip by dropping to the optimal temperature. Two experiments had implemented in $25^{\circ}C$ laboratory to confirm the performance of proposed method. The first experiment took 12sec, 13sec, 16sec, 18sec, reaching to $200^{\circ}C$, $300^{\circ}C$, $400^{\circ}C$, $480^{\circ}C$ respectively which result showed shorten of rising time than previous method. In the loading experiment of $300^{\circ}C$, $400^{\circ}C$, $480^{\circ}C$ steady state showed temperature drop of $3.8^{\circ}C$, $4.1^{\circ}C$, $4.5^{\circ}C$ which result showed the low temperature deviation than previous method.

Scalable Fingerprinting Scheme based on Angular Decoding for LCCA Resilience (선형결합 공모공격에 강인한 각도해석 기반의 대용량 핑거프린팅)

  • Seol, Jae-Min;Kim, Seong-Whan
    • The KIPS Transactions:PartD
    • /
    • v.15D no.5
    • /
    • pp.713-720
    • /
    • 2008
  • Fingerprinting scheme uses digital watermarks to trace originator of unauthorized or pirated copies, however, multiple users may collude and escape identification by creating an average or median of their individually watermarked copies. Previous research works are based on ACC (anti-collusion code) for identifying each user, however, ACC are shown to be resilient to average and median attacks, but not to LCCA and cannot support large number of users. In this paper, we propose a practical SACC (scalable anti-collusion code) scheme and its angular decoding strategy to support a large number of users from basic ACC (anti-collusion code) with LCCA (linear combination collusion attack) robustness. To make a scalable ACC, we designed a scalable extension of ACC codebook using a Gaussian distributed random variable, and embedded the resulting fingerprint using human visual system based watermarking scheme. We experimented with standard test images for colluder identification performance, and our scheme shows good performance over average and median attacks. Our angular decoding strategy shows performance gain over previous decoding scheme on LCCA colluder set identification among large population.

Incremental Maintenance of Horizontal Views Using a PIVOT Operation and a Differential File in Relational DBMSs (관계형 데이터베이스에서 PIVOT 연산과 차등 파일을 이용한 수평 뷰의 점진적인 관리)

  • Shin, Sung-Hyun;Kim, Jin-Ho;Moon, Yang-Sae;Kim, Sang-Wook
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.463-474
    • /
    • 2009
  • To analyze multidimensional data conveniently and efficiently, OLAP (On-Line Analytical Processing) systems or e-business are widely using views in a horizontal form to represent measurement values over multiple dimensions. These views can be stored as materialized views derived from several sources in order to support accesses to the integrated data. The horizontal views can provide effective accesses to complex queries of OLAP or e-business. However, we have a problem of occurring maintenance of the horizontal views since data sources are distributed over remote sites. We need a method that propagates the changes of source tables to the corresponding horizontal views. In this paper, we address incremental maintenance of horizontal views that makes it possible to reflect the changes of source tables efficiently. We first propose an overall framework that processes queries over horizontal views transformed from source tables in a vertical form. Under the proposed framework, we propagate the change of vertical tables to the corresponding horizontal views. In order to execute this view maintenance process efficiently, we keep every change of vertical tables in a differential file and then modify the horizontal views with the differential file. Because the differential file is represented as a vertical form, its tuples should be converted to those in a horizontal form to apply them to the out-of-date horizontal view. With this mechanism, horizontal views can be efficiently refreshed with the changes in a differential file without accessing source tables. Experimental results show that the proposed method improves average performance by 1.2$\sim$5.0 times over the existing methods.

Detecting Security Vulnerabilities in TypeScript Code with Static Taint Analysis (정적 오염 분석을 활용한 타입스크립트 코드의 보안 취약점 탐지)

  • Moon, Taegeun;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.2
    • /
    • pp.263-277
    • /
    • 2021
  • Taint analysis techniques are popularly used to detect web vulnerabilities originating from unverified user input data, such as Cross-Site Scripting (XSS) and SQL Injection, in web applications written in JavaScript. To detect such vulnerabilities, it would be necessary to trace variables affected by user-submitted inputs. However, because of the dynamic nature of JavaScript, it has been a challenging issue to identify those variables without running the web application code. Therefore, most existing taint analysis tools have been developed based on dynamic taint analysis, which requires the overhead of running the target application. In this paper, we propose a novel static taint analysis technique using symbol information obtained from the TypeScript (a superset of JavaScript) compiler to accurately track data flow and detect security vulnerabilities in TypeScript code. Our proposed technique allows developers to annotate variables that can contain unverified user input data, and uses the annotation information to trace variables and data affected by user input data. Since our proposed technique can seamlessly be incorporated into the TypeScript compiler, developers can find vulnerabilities during the development process, unlike existing analysis tools performed as a separate tool. To show the feasibility of the proposed method, we implemented a prototype and evaluated its performance with 8 web applications with known security vulnerabilities. We found that our prototype implementation could detect all known security vulnerabilities correctly.

The Study on the Fire Monitoring Dystem for Full-scale Surveillance and Video Tracking (전방위 감시와 영상추적이 가능한 화재감시시스템에 관한 연구)

  • Baek, Dong-hyun
    • Fire Science and Engineering
    • /
    • v.32 no.6
    • /
    • pp.40-45
    • /
    • 2018
  • The omnidirectional surveillance camera uses the object detection algorithm to level the object by unit so that broadband surveillance can be performed using a fisheye lens and then, it was a field experiment with a system composed of an omnidirectional surveillance camera and a tracking (PTZ) camera. The omnidirectional surveillance camera accurately detects the moving object, displays the squarely, and tracks it in close cooperation with the tracking camera. In the field test of flame detection and temperature of the sensing camera, when the flame is detected during the auto scan, the detection camera stops and the temperature is displayed by moving the corresponding spot part to the central part of the screen. It is also possible to measure the distance of the flame from the distance of 1.5 km, which exceeds the standard of calorific value of 1 km 2,340 kcal. In the performance test of detecting the flame along the distance, it is possible to be 1.5 km in width exceeding $56cm{\times}90cm$ at a distance of 1km, and so it is also adaptable to forest fire. The system is expected to be very useful for safety such as prevention of intrinsic or surrounding fire and intrusion monitoring if it is installed in a petroleum gas storage facility or a storing place for oil in the future.

A study on the standard for determining airborne sound insulation performance of sound barrier panels (방음판의 음향투과손실 측정규격에 관한 연구)

  • Oh, Yang Ki
    • The Journal of the Acoustical Society of Korea
    • /
    • v.41 no.3
    • /
    • pp.302-311
    • /
    • 2022
  • Sound barrier walls are one of the most effective alternatives for reducing environmental noise on roads and railways in the city center. The insertion loss of the sound barrier against road traffic noise is the sum of the sound transmission loss, sound absorption loss, and sound energy reduction due to the diffraction attenuation of the sound barrier. The sound transmission loss of the sound barrier is one of the important factors that determine the insertion loss of the sound barrier and is a basic indicator that determines the performance of the sound barrier. Nevertheless, there is not a separate standard in Korea for measuring the acoustic transmission loss of sound barrier panels. There are only a few conditions in KS F 4770 series that stipulates on the general material of sound barrier panels. This thesis examines the necessity of the acoustic transmission loss measurement and evaluation standards of sound barrier walls, and seeks a measurement method in a free sound field (anechoic chamber) sound receiving room considering the characteristics of sound barrier walls installed in external spaces, unlike indoor building materials. In addition, a single number evaluation method using a reference spectrum was proposed so that the sound insulation effect according to various installation places such as roadside or railroad side can be easily displayed.