• Title/Summary/Keyword: 수가정보

Search Result 2,863, Processing Time 0.025 seconds

Determinants of Technology Transfer for Convergence Management Strategy of Small and Medium Enterprises (중소기업의 융복합 경영전략을 위한 기술이전의 결정요인에 관한 연구)

  • Lee, Dae-Yong;Kim, Sun-Geun
    • Journal of Digital Convergence
    • /
    • v.14 no.3
    • /
    • pp.83-94
    • /
    • 2016
  • The objective of this paper is to examine the determinants of technology transfer for Small and Medium Enterprises. Based on IP-MARKET, KIPRIS, and Wintelips, we employ the logistic regression analysis using all data related with technology transfer in markets for intellectual property rights from 2008 through 2012. Our main results are as followings: (i)the more inventors the higher possibility; and (ii)the more claims and forwards the higher possibility of success in technology transfer in Small and Medium Enterprises.

Integrated Modeling of Distributed Object-Oriented Systems (다수모델을 이용한 객체지향적 분산처리 시스템의 디자인 방법)

  • Lee, Sang-Bum
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.5
    • /
    • pp.1103-1111
    • /
    • 1996
  • The design of distrbuted systems is difficult to achieve as the execution patterns of distrbuted systems are typically more complex than those of non- distributed systems. Thus, research toward the development of design methods for distributed systems is quitely needed. As object-oriented systems and distrbuted systems share similar properties, the combination of these two is somehow natural. In this work, a design of distributed systems is introduced. The goal of the method in this paper is to provide assistance to the process of specifying a formal object- oriented specification from graphical representation specification inputs such as data flow diagrams, state transition diagrams and Petri nets. It addresses the extraction of objects, operations and reationshipsfrom the problem domain with emphasis on the specification of the characteristics of distributed systems. This object identification method is supported by a knowledge base that provides for the automated analysis and reasoning about objects and their relationsships. The final object model is represented in a format which provides a formal mechanism for reprsenting the object information.

  • PDF

Hardware Implementation of the Fuzzy Fingerprint Vault System (지문 퍼지볼트 시스템의 하드웨어 구현)

  • Lim, Sung-Jin;Chae, Seung-Hoon;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.15-21
    • /
    • 2010
  • The user authentication using fingerprint information not only provides the convenience but also high security. However, the fingerprint information for user authentication can cause serious problems when it has been compromised. It cannot change like passwords, because the user only has ten fingers on two hands. Recently, there is an increasing research of the fuzzy fingerprint vault system to protect fingerprint information. The research on the problem of fingerprint alignment using geometric hashing technique carried out. This paper proposes the hardware architecture fuzzy fingerprint vault system based on geometric hashing. The proposed architecture consists of software and hardware module. The hardware module has charge of matching between enrollment hash table and verification hash table. Based on the experimental results, the execution time of the proposed system with 36 real minutiae is 0.2 second when 100 chaff minutiae, 0.53 second when 400 chaff minutiae.

Cybersecurity of The Defense Information System network connected IoT Sensors (IoT Sensor가 연결된 국방정보통신망의 사이버보안 연구)

  • Han, Hyun-Jin;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.802-808
    • /
    • 2020
  • The IoT(Internet of Things) is based on the development of sensor technology and high-speed communication infrastructure, and the number of IoT connected to the network is increasing more than the number of people, and the increase is also very fast. In the field of defense, IoT is being deployed in various fields such as operations, military, base defense, and informatization, and the need is also increasing. Unlike the existing PC/server information protection system, cyber threats are also increasing as IoT sensors, which are vulnerable to information protection, are increasing in the network, so it is necessary to study the platform to protect the defense information and communication network. we investigated the case of connecting wired and wireless IoT to the defense network, and presented an efficient interlocking design method of the IoT integrated independent network with enhanced security by minimizing the contact point with the defense network.

Information Mapping for Corporate Information Resources Managements (기업의 정보자원관리(情報資源管理)를 위한 정보(情報) 매핑)

  • Kim, Jae-Soo
    • Journal of Information Management
    • /
    • v.23 no.4
    • /
    • pp.39-58
    • /
    • 1992
  • Using information mapping methodology we will discover which of the multitude of information sources, services and systems used by corporation are actually resources and which are less important, redundant, or unnecessary. The discovery process of information resources will illuminate problems and opportunities related corporation's strengths and weeknesses in information quality, accessibility, performance, use, and effectiveness.

  • PDF

Pulse forming's switching control adopted a Transcranial Magnetic Stimulation Biomedical engineering, Dongju College University (펄스포밍의 스위칭 제어기술을 적용한 경두개 자기자극장치)

  • Kim, Whi-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.729-736
    • /
    • 2010
  • In this study, a magnetic stimulation (MS) device with controllable pulse forming technology and pulse shape (MS) is described. The MS device uses an IGBT with appropriate snubbers to switch coil currents up to 6 kA, enabling pulse forming technology control from 5 s to over 100 s. The induced electric field pulses use 2% - 34% less energy and generate 57% - 67% less coil heating compared to matched conventional cosine pulses. MS is used to stimulate rhesus monkey motor cortex in vivo with pulse forming technology of 20 to 100 s, demonstrating the expected decrease of threshold pulse amplitude with increasing pulse forming technology. The technological solutions used in the MS prototype can expand functionality, and reduce power consumption and coil heating in MS, enhancing its research and therapeutic applications.

Proposal and Performance Evaluation of A Scalable Scheduling Algorithm According to the Number of Parallel Processors (병렬 처리장치의 개수에 따른 스케줄링 알고리즘의 제안 및 성능평가)

  • Gyung-Leen Park;Sang Joon Lee;BongKyu Lee
    • Journal of Internet Computing and Services
    • /
    • v.1 no.2
    • /
    • pp.19-28
    • /
    • 2000
  • The scheduling problem in parallel processing systems has been a challenging research issue for decades. The problem is defined as finding an optimal schedule which minimizes the parallel execution time of an application on a target multiprocessor system. Duplication Based Scheduling (DBS) is a relatively new approach for solving the problem. The DBS algorithms are capable of reducing communication overhead by duplicating remote parent tasks on local processors. Most of DBS algorithms assume an availability of the unlimited number of processors in the system. Since the assumption may net hold in practice, the paper proposes a new scalable DBS algorithm for a target system with limited number of processors. It Is shown that the proposed algorithm with N available processors generates the same schedule as that obtained by the algorithm with unlimited number of processors, where N is the number of input tasks. Also, the performance evaluation reveals that the proposed algorithm shows a graceful performance degradation as the number of available processors in the system is decreased.

  • PDF

A Study on the Design of OSPF Area and Data Flow in the Tactical Data Networks (전술 데이터망에서 OSPF Area 설정과 데이터 흐름에 관한 연구)

  • Kwon, Soo-Gab;Jeong, Kyu-Young;Kim, Jeong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.267-276
    • /
    • 2007
  • In OSPF, the larger and more unstable the area, the greater the likelihood for performance problems associated with routing protocol recalculation. Generally, an area should have no more than 50 routers. Areas with unstable links should be smaller. Military tactical data network is used for military operations during war-time. It consists of wireless network for mobility of node. Thus, it has low-bandwidth and unstable property. In addition, it is expected that many kinds of router-failure, Link-failure and recovery at emergency period. However, Military tactical data network is designed with about one and half times the number of recommendation. This paper proves that the traffic is limited by the increase of re-calculation of area.

An Analysis on the Juvenile Books on Korea and Japan in the WorldCat (WorldCat 수록 한국 및 일본 관련 청소년 책의 분석)

  • Yoon, Cheong-Ok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.3
    • /
    • pp.5-23
    • /
    • 2013
  • The purpose of this study is to analyze the characteristics of juvenile books on Korea and Japan in WorldCat and observe the possibility of diffusing knowledge on each country. The distribution of bibliographic records of books published from 1993 through 2012, and especially the books published in 1997, when the numbers of books on both countries were the closest, were analyzed in detail in terms of language, genre, subject headings, and holding libraries. The result shows much fewer bibliographic records of juvenile books on Korea than those of books on Japan, and their growing gap every year. There were also much fewer holding libraries and copies of books on Korea, published in 1997, compared to books on Japan. The texts were mostly written in Korean and in tones set for very young readers. A serious lack of diversity in subjects and genres with the focus on Korean folklores and anecdotal biographies were also observed. Therefore, there seems to be nothing much interesting to read that would help promote the diffusion of knowledge on Korea through libraries around the world.

A Study on the Effects of the Macroeconomic Variables on the Economic Growth by VECM Model (VECM모형을 활용한 거시경제변수가 성장에 미치는 영향분석)

  • Cho, Woo-Sung
    • International Commerce and Information Review
    • /
    • v.14 no.4
    • /
    • pp.27-47
    • /
    • 2012
  • The study aims to analyze how the variables for Korea, such as the exports, imports, FDI(Inward) and FDI(Outward), influence the economic growth and how they affect each other. For the purpose of empirical analysis, this paper used the quarterly time series data from 1980 to 2010, dividing the period before and after 1997(IMF). The variables used in this study were log-transformation from the original variables. This study empirically tests the relationship among variables by using VECM with considering the time-series properties of each variable. The results found from the study are as followings. Causality analysis using VECM proved that no causality between GDP and exports existed, whereas causality between GDP and FDI(Inward) existed, in which GDP affected FDI(Inward) since IMF. However, it was found that other periods and FDI(Inward) did not affect GDF and had no causality among them.

  • PDF