• Title/Summary/Keyword: 신용문제

Search Result 346, Processing Time 0.025 seconds

Data Dissemination Protocol Considering Target Mobility in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크 환경에서 감지대상의 이동성을 고려한 데이터 전달 프로토콜)

  • Suh Yu-Hwa;Kim Ki-Young;Shin Young-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3A
    • /
    • pp.311-320
    • /
    • 2006
  • This paper proposes DDTM for USN having end-point mobility. The existing network protocols did not consider target's and sink's mobility. So it requires flooding and path update whenever targets or sinks move. This can lead to drain battery of sensors excessively and decrease lifetime of USN. DDTM is the protocol based on TTDD considering sink's mobility. TTDD provides sink's mobility efficiently by using the grid structure, but it requires the high energy because of reconstructing the grid structure whenever targets move. In this way, the proposed protocol can decrease a consumption of energy, since it reuses the existing grid structure of TTDD, if the target moves in local cell. We compare DDTM with TTDD under the total message and the energy consumption by using a discrete analytical model for cost analysis. Analytical results demonstrated that our proposed protocol can provide the higher efficiency on target's mobility.

Multi-channel MAC Protocol for Improving Channel Efficiency in Wireless Networks (무선 네트워크에서 채널 효율성을 높이기 위한 멀티채널 MAC 프로토콜)

  • Kim, Young-Kyoung;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5A
    • /
    • pp.549-560
    • /
    • 2008
  • In this paper, we propose a new multi-channel MAC protocol to improve the channel efficiency by using two interfaces. Most of previous researches that have considered multi-channel wireless network environments use a common control channel to exchange control signals and they have a bottle neck problem at common control channel as increasing the number of data channels. In the proposed MAC protocol, we separate receiving and transmitting channels so that sending and receiving data and control packets at the same time is possible. It increases the total network throughput. Since there is no common control channel, the network does not suffer from the bottle neck problem. By applying a TDMA scheme, we can avoid packet collisions between data packets and control packets and reduce the possibility of CTS or ACK packet collisions. Simulation results show that the proposed multi-channel MAC protocol improves the total network throughput and channel efficiency compared with the existing method.

A Study on the Transaction Security of Electronic Payment (전자결제의 보안성에 관한 연구)

  • 홍선의
    • The Journal of Information Technology
    • /
    • v.1 no.1
    • /
    • pp.173-188
    • /
    • 1998
  • In this paper we discussed various types of electronic payment schemes that are emerging. Threats vary from malicious hackers attempting to crash a system, to threats to data or transaction integrity. An understanding of the various types of threats can assist a security manager in selecting appropriate cost-effective controls to protect valuable information resources. An overview of many of today's common threats presented in this paper will be useful to mangers studying their own threat environments with a view toward developing solutions specific to their organization. To ensure security on the Internet, several methods have been developed and deployed. They include authentication of users and servers, encryption, and data integrity. Transaction security is critical : without it, information transmitted over the Internet is susceptible to fraud and other misuse. So computer systems represents an Intermediary with the potential to access the flow of information between a user. Security is needed to ensure that intermediaries cannot eavesdrop on transactions, or copy/modify data. Online firms must take additional precautions to prevent security breaches. To protect consumer information, they must maintain physical security of their servers and control access to software passwords and private keys. Techniques such as secret and public-key encryption and digital signatures play a crucial role in developing consumer confidence in electronic commerce.

  • PDF

On a Concurrency Control and an Interface Design of Collaboration-aware Applications (공동작업을 위한 응용 프로그램에서의 동시성 제어 문제 및 인터페이스 설계 에 관한 연구)

  • Yun, Seok-Hwan;Lee, Jae-Yeong;Park, Chi-Hang;Sin, Yong-Baek
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.3
    • /
    • pp.631-639
    • /
    • 1996
  • In this paper we discuss the elements which must be considered for collaboration- aware application design and their effcets on user interfaces. Collaboration-aware applications have inter-user and user/system interaction features besides generic real-time distribution system features and this restricts the design freedom with the requirement of consistent user interfaces. Programmers, therefore, must provide uniform and logically consistent user interfaces to user and, for this end, they should consider main design features such as concurrency control algorithms, system topology and object replication scheme. Among the design factors concurrency control algorithms have relatively significant impact on user interfaces and we consider the impact of concurrency control agorithms along with that of thesystem to pologyand the objectreplication scheme. Coshed/SAS, a groupeditor, is given as an example of application of the factors.

  • PDF

Parameter estimation for the imbalanced credit scoring data using AUC maximization (AUC 최적화를 이용한 낮은 부도율 자료의 모수추정)

  • Hong, C.S.;Won, C.H.
    • The Korean Journal of Applied Statistics
    • /
    • v.29 no.2
    • /
    • pp.309-319
    • /
    • 2016
  • For binary classification models, we consider a risk score that is a function of linear scores and estimate the coefficients of the linear scores. There are two estimation methods: one is to obtain MLEs using logistic models and the other is to estimate by maximizing AUC. AUC approach estimates are better than MLEs when using logistic models under a general situation which does not support logistic assumptions. This paper considers imbalanced data that contains a smaller number of observations in the default class than those in the non-default for credit assessment models; consequently, the AUC approach is applied to imbalanced data. Various logit link functions are used as a link function to generate imbalanced data. It is found that predicted coefficients obtained by the AUC approach are equivalent to (or better) than those from logistic models for low default probability - imbalanced data.

Cost Ratios for Cost and ROC Curves (비용곡선과 ROC곡선에서의 비용비율)

  • Hong, Chong-Sun;Yoo, Hyun-Sang
    • Communications for Statistical Applications and Methods
    • /
    • v.17 no.6
    • /
    • pp.755-765
    • /
    • 2010
  • For classification problems on mixture distribution, a threshold based on cost functions is optimal from the viewpoint of a minimum expected cost. Assuming that there is no cost information, we propose cost ratios in the expected cost corresponding to thresholds where the total accuracy and the true rate are maximized to explain the relation of these cost ratios minimizing the expected cost. Other cost ratios are also proposed by comparing the normalized expected costs when classification accuracy is maximized. The values of these cost ratios are located between two cost ratios for the expected costs based on classification accuracies, and converge to that of the minimum expected cost. This work suggests two cost ratios: one is minimized by the expected cost and the normalized expected cost, and the other in the expected cost and the normalized expected cost functions that are maximized classification accuracies. We discuss their compatibility based on the relation of these cost ratios.

진공 장비용 코팅부품의 내플라즈마 특성 평가 방법

  • No, Seung-Wan;Sin, Jae-Su;Lee, Chang-Hui;Gang, Sang-U;Kim, Jin-Tae;Sin, Yong-Hyeon;Yun, Ju-Yeong
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2010.02a
    • /
    • pp.329-329
    • /
    • 2010
  • 반도체 및 디스플레이의 진공부품은 알루미늄 모제에 전해연마법(electrolytic polishing), 양극산화피막법(Anodizing), 플라즈마 용사법(Plasma spray) 등을 사용하여 $Al_2O_3$ 피막을 성장시켜 사용되고 있다. 반도체 제조공정 중 30~40% 이상의 비중을 차지하는 식각(etching) 및 증착(deposition) 공정은 대부분 플라즈마를 사용하고 있다. 플라즈마에 의해 화학적, 물리적 침식이 발생하여 코팅막에 손상을 일으켜 코팅막이 깨지거나 박리되면서 다량의 Particle을 생성함으로써 생산수율에도 문제를 야기 시킨다고 알려져 있다. 하지만 이들 코팅막을 평가하는 방법은 거의 전무하여 산업계에서 많은 애로를 겪고 있다. 이러한 코팅부품의 내플라즈마 성능평가 방법과 기준이 없어 적절한 교체시기를 파악하기 위한 코팅부품의 손상정도를 정량화 및 평가 방법의 표준화를 구축하는 연구를 수행하였다. 본 연구에서는 이러한 소재의 특성평가를 위해 공정에서 사용 중 손상되어 교체된 샘플의 모폴로지 관찰하고 내전압 측정으로 전기적 특성을 분석하여 손상 전, 후의 변화를 관찰하였다. 또한 플라즈마의 영향에 따른 코팅 막 형태 변화 및 전기적 특성의 변화를 알아보기 위하여 양극산화피막법(Anodizing)으로 $Al_2O_3$를 성장시킨 평가용 샘플을 제작한 후, Plasma chamber 장비를 이용하여 플라즈마 처리에 따른 코팅막의 내전압, 식각율, 표면 미세구조의 변화를 측정하였고 이를 종합적으로 고려하여 진공 장비용 코팅부품의 공정영향에 의한 내플라즈마 특성평가방법 개발에 관하여 연구하였다. 이러한 실험을 통해 플라즈마 처리 후 코팅 막에 크랙이 발생되는 것을 확인할 수 있었고 코팅 막의 손상으로 전기적 특성이 감소를 것을 확인할 수 있었다. 또한 ISPM 장비를 이용하여 진공 장비용 코팅부품이 플라즈마 공정에서 발생하는 오염 입자를 측정할 수 있는 방법을 연구하였다. 이러한 결과를 이용하여 진공공정에서 사용되는 코팅부품이 플라즈마에 의한 손상정도를 정량화 하고 평가방법을 개발하여 부품 양산업체의 진공장비용 코팅부품 개발 신뢰성 향상이 가능할 것으로 본다.

  • PDF

A Strategic Development of Ship Management in Korea (우리나라 선박관리 업의 발전 방안에 관한 연구 - 선원관리제도를 중심으로 -)

  • Ryoo, Dong-Keun;Kim, Jong-Tae;Shin, Yong-John
    • Journal of Navigation and Port Research
    • /
    • v.32 no.10
    • /
    • pp.821-827
    • /
    • 2008
  • In Korea a crew employment right is only allowed to shipowners and cooperative business between ship management and crew management company is not allowed. It is anticipated that overseas ship management companies' entry into Korean ship management markets will weaken Korean ship management companies' competitiveness. Therefore, it is necessary to amend crew management regulation. The purpose of this study is to investigate the situation of Korean ship management industry and to suggest the scheme for strengthening its competitiveness. The result of this study will contribute to the growth of the Korean ship management industry and enhance their business scope internationally.

Cybersquatting-related Precedent Tendency (사이버스쿼팅 관련 판례 동향)

  • Oh, Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.221-227
    • /
    • 2013
  • Cybersquatting is a type of conflicts between a trademark and a domain, and refers to "behaviors of registering, retaining, transferring, and using the identical or similar domain name in bad faith for the profit from the mark such as trademark". That is, it is preoccupying behavior to abuse the fact that the domain name in the Internet can be freely registered on a first come, first served basis and can't duplicate. Though this should be prohibited, given the reality that most of our daily lives are based in the Internet, this is creating many problems in IT environment beyond social structure in rule of law. Therefore, this study has the purpose that it provides cybersquatting-related information and suggests legislative implications hereafter through the analysis of cybersquatting-related precedent from the Supreme Court.

Evaluating Importance of Defects through Defect Dispute Case Study in Apartment Buildings (하자분쟁사례를 통한 공동주택 하자 중요도 평가에 관한 연구)

  • Lee, Sang-Hoon;Kim, Jae-Jun;Lee, Sang-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.3
    • /
    • pp.56-64
    • /
    • 2019
  • Various defects that occur in the maintenance stage are connected to all kinds of wasted resources and economic losses as additional investments are made. Residents are harmed temporally, materially, and psychologically, and businesses suffer not only monetary losses but also reduced credit ratings. The aim of this study was to increase the efficiency of quality management and minimize defect disputes by estimating the importance of the defect type considering the defect frequency and severity in apartment buildings. For this, 7,548 defect items for 48 apartment buildings were examined. The analysis confirmed that defects are concentrated on RC, finishing and MEP work. In addition, defects with high importance are identified as broken, incorrect installation, missing tasks, and water problems. In addition, the exterior wall/roof, the Internal wall, ceiling, and floor, which are constructed in the field, are more important than the furniture and MEP equipment installed in the field.