• Title/Summary/Keyword: 정보획득효율성

Search Result 527, Processing Time 0.024 seconds

The Study on the SEP (Standard Essential Patents) Procurement Strategy to accelerate the Trade Negotiation Competitiveness (통상 협상의 경쟁력 강화를 위한 표준특허 확보전략 연구)

  • Cho, Dongmin;Cho, Wongil
    • International Commerce and Information Review
    • /
    • v.18 no.4
    • /
    • pp.263-281
    • /
    • 2016
  • The Importance of SEP (Standard Essential Patents) Procurement Operation is on the side of Governmental and Public both to accelerate the national trade negotiation competitiveness. To operate cooperative system of SEP creation and management, Government should monitor the effect and performance periodically to public sectors. and To achieve the support objectives, it should establish the virtuous circle infrastructure between R&D and economic performance on SEP. This can make the SEP enhancement to pursue the international competitiveness on Intellectual Property Rights. Especially the specific support approach to each phase of the SEP declaration matrix is essential to consolidate the possibility of SEP creation and acquisition. In this study, the concepts of SEP to accelerate the national trade negotiation competitiveness and the prior research were verified through the investigation of market trend and current state of affair analysis. Through the analysis of international and domestic situation of SEP procurement and management, We have found the results as follows. First of all, the leading conglomerates and the Government should focus on the secondary and tertiary industries to create and acquire SEPs to accomplish the effectiveness of selection and concentration. In second, the SMEs and Univ. Labs should focus on the quaternary sector of the economy to retain the competitiveness of speed and challenge on SEP related. From this study, the appropriateness of the tailored-support management model should be institutionalized, and the results implied an research in order to examine the suitability among the current SEP to enhance the competitiveness of national trade research issues.

  • PDF

Analysis of Target Identification Performances Using Bistatic ISAR Images (바이스태틱 ISAR 영상을 이용한 표적식별 성능 분석)

  • Lee, Seung-Jae;Lee, Seong-Hyeon;Kang, Min-Seok;Yang, Eunjung;Kim, Kyung-Tae
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.6
    • /
    • pp.566-576
    • /
    • 2016
  • Inverse synthetic aperture radar(ISAR) image generated from bistatic radar(Bi-ISAR) represents two-dimensional scattering distribution of a target, and the Bi-ISAR can be used for bistatic target identification. However, Bi-ISAR has large variability in scattering mechanisms depending on bistatic configurations and do not represent exact range-Doppler information of a target due to inherent distortion. Thus, an efficient training DB construction is the most important factor in target identification using Bi-ISARs. Recently, a database construction method based on realistic flight scenarios of a target, which provides a reliable identification performance for the monostatic target identification, was applied to target identification using high resolution range profiles(HRRPs) generated from bistatic radar(Bi-HRRPs), to construct efficient training DB under bistatic configurations. Consequently, high identification performance was achieved using only small amount of training Bi-HRRPs, when the target is a considerable distance away from the bistatic radar. Thus, flight scenarios based training DB construction is applied to target identification using Bi-ISARs. Then, the capability and efficiency of the method is analyzed.

A Tree-Based Routing Algorithm Considering An Optimization for Efficient Link-Cost Estimation in Military WSN Environments (무선 센서 네트워크에서 링크 비용 최적화를 고려한 감시·정찰 환경의 트리 기반 라우팅 알고리즘에 대한 연구)

  • Kong, Joon-Ik;Lee, Jae-Ho;Kang, Ji-Heon;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.637-646
    • /
    • 2012
  • Recently, Wireless Sensor Networks (WSNs) are used in many applications. When sensor nodes are deployed on special areas, where humans have any difficulties to get in, the nodes form network topology themselves. By using the sensor nodes, users are able to obtain environmental information. Due to the lack of the battery capability, sensor nodes should be efficiently managed with energy consumption in WSNs. In specific applications (e.g. in intrusion detections), intruders tend to occur unexpectedly. For the energy efficiency in the applications, an appropriate algorithm is strongly required. In this paper, we propose tree-based routing algorithm for the specific applications, which based on the intrusion detection. In addition, In order to decrease traffic density, the proposed algorithm provides enhanced method considering link cost and load balance, and it establishes efficient links amongst the sensor nodes. Simultaneously, by using the proposed scheme, parent and child nodes are (re-)defined. Furthermore, efficient routing table management facilitates to improve energy efficiency especially in the limited power source. In order to apply a realistic military environment, in this paper, we design three scenarios according to an intruder's moving direction; (1) the intruder is passing along a path where sensor nodes have been already deployed. (2) the intruders are crossing the path. (3) the intruders, who are moving as (1)'s scenario, are certainly deviating from the middle of the path. In conclusion, through the simulation results, we obtain the performance results in terms of latency and energy consumption, and analyze them. Finally, we validate our algorithm is highly able to adapt on such the application environments.

Policy and Strategy Implications of Smart Electricity Distribution Technologies in the Perspective of IT Ecosystem (스마트 배전의 경쟁전략 및 정책 시사점: IT Ecosystem의 관점에서)

  • Kim, Tae-Ha;Park, Chan-Hi
    • Information Systems Review
    • /
    • v.12 no.1
    • /
    • pp.189-207
    • /
    • 2010
  • We applied IT ecosystem analysis to Smart Grid system in this paper and thereby compared various arguments about Smart Grid technologies against the reality of the power generation and distribution in South Korea with a special attention to the power distribution side. Our work attempts to propose policy implications in the government-level based on a firm-level analysis using the framework of the competitive strategy and advantage. The Smart Grid initiative is expected to enhance the efficiency in the power generation and distribution. In addition, the Smart Grid initiative aims at capturing the opportunities in the electric power business such as parts, components, supplies, and system products in the global arena. Prerequisites of smart distribution system include building infrastructure based on smart distribution parts, information systems, communication technologies, and developing various application programs and interfaces that would interact with the consumers. Consumers are expected to play an integral role by changing their consumption patterns in response to dynamic pricing and quality choices enabled by the smart distribution technologies. In order to induce the consumers to participate actively in the program, firms and policy makers should consider providing consumers economic incentives and proper education for better understanding of new technologies. Our work helps policy makers and firm better understand the nature of technology and stakeholders for the successful implementation of smart distribution technologies.

The Design and Implementation of Ontology for Simulation based Architecture Framework (ONT-AF) in Military Domain (SBA AF의 구축을 지원하는 온톨로지의 설계 및 구현(ONT-SAF))

  • Kwon, Youngmin;Sohn, Mye;Lee, Wookey
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.3
    • /
    • pp.233-241
    • /
    • 2012
  • Architecture framework (AF) is a guideline to define components needed to develop and operate enterprise architecture (EA), and to define relationships among the components. There are many architecture frameworks to operate EA of governments and businesses such as Zachman framework, DoDAF, TOGAF, FEAF, and TEAF. DoDAF is the most representative AF to support the development of the EA in the military domain. DoDAF is composed of eight viewpoints and 40 views that are affiliated with the viewpoints. To develop an AF for a specific goal, system architects decide a set of views. Furthermore, they determine data that are needed for a view modeling. However, views and data in DoDAF are structurally inter-related explicitly and/or implicitly. So, developing an AF for a specific goal is going to be a project to be carried out over a long haul. To reduce the burden of its development, in this paper, we develop ONT-SAF (Ontology for DoDAF) that can infer inter-relationships like referential and transitive relationships and the sequences among the views. Furthermore, to promote reusability and consistency of the views and the data within an AF, we adopt the view-data separation strategy. ONT-DAT contains classes like 'viewpoint', 'view', 'data', 'expression method', and 'reference model', and 11 properties including 'hasView.' To prove the effectiveness of ONT-SAF, we perform a case study.

The Precise Three Dimensional Phenomenon Modeling of the Cultural Heritage based on UAS Imagery (UAS 영상기반 문화유산물의 정밀 3차원 현상 모델링)

  • Lee, Yong-Chang;Kang, Joon-Oh
    • Journal of Cadastre & Land InformatiX
    • /
    • v.49 no.1
    • /
    • pp.85-101
    • /
    • 2019
  • Recently, thank to the popularization of light-weight drone through the significant developments in computer technologies as well as the advanced automated procedures in photogrammetry, Unmanned Aircraft Systems have led to a growing interest in industry as a whole. Documentation, maintenance, and restoration projects of large scaled cultural property would required accurate 3D phenomenon modeling and efficient visual inspection methods. The object of this study verify on the accuracies achieved of 3D phenomenon reconstruction as well as on the validity of the preservation, maintenance and restoration of large scaled cultural property by UAS photogrammetry. The test object is cltural heritage(treasure 1324) that is the rock-carved standing Bodhisattva in Soraesan Mountain, Siheung, documented in Goryeo Period(918-1392). This standing Bodhisattva has of particular interests since it's size is largest stone Buddha carved in a rock wall and is wearing a lotus shaped crown that is decorated with arabesque patterns. The positioning accuracy of UAS photogrammetry were compared with non-target total station survey results on the check points after creating 3D phenomenal models in real world coordinates system from photos, and also the quantified informations documented by Culture Heritage Administration were compared with UAS on the bodhisattva image of thin lines. Especially, tests the validity of UAS photogrammetry as a alternative method of visual inspection methods. In particular, we examined the effectiveness of the two techniques as well as the relative fluctuation of rock surface for about 2 years through superposition analysis of 3D points cloud models produced by both UAS image analysis and ground laser scanning techniques. Comparison studies and experimental results prove the accuracy and efficient of UAS photogrammetry in 3D phenomenon modeling, maintenance and restoration for various large-sized Cultural Heritage.

Analysis on Relation between Rehabilitation Training Movement and Muscle Activation using Weighted Association Rule Discovery (가중연관규칙 탐사를 이용한 재활훈련운동과 근육 활성의 연관성 분석)

  • Lee, Ah-Reum;Piao, Youn-Jun;Kwon, Tae-Kyu;Kim, Jung-Ja
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.6
    • /
    • pp.7-17
    • /
    • 2009
  • The precise analysis of exercise data for designing an effective rehabilitation system is very important as a feedback for planing the next exercising step. Many subjective and reliable research outcomes that were obtained by analysis and evaluation for the human motor ability by various methods of biomechanical experiments have been introduced. Most of them include quantitative analysis based on basic statistical methods, which are not practical enough for application to real clinical problems. In this situation, data mining technology can be a promising approach for clinical decision support system by discovering meaningful hidden rules and patterns from large volume of data obtained from the problem domain. In this research, in order to find relational rules between posture training type and muscle activation pattern, we investigated an application of the WAR(Weishted Association Rule) to the biomechanical data obtained mainly for evaluation of postural control ability. The discovered rules can be used as a quantitative prior knowledge for expert's decision making for rehabilitation plan. The discovered rules can be used as a more qualitative and useful priori knowledge for the rehabilitation and clinical expert's decision-making, and as a index for planning an optimal rehabilitation exercise model for a patient.

A Study on Detecting Fake Reviews Using Machine Learning: Focusing on User Behavior Analysis (머신러닝을 활용한 가짜리뷰 탐지 연구: 사용자 행동 분석을 중심으로)

  • Lee, Min Cheol;Yoon, Hyun Shik
    • Knowledge Management Research
    • /
    • v.21 no.3
    • /
    • pp.177-195
    • /
    • 2020
  • The social consciousness on fake reviews has triggered researchers to suggest ways to cope with them by analyzing contents of fake reviews or finding ways to discover them by means of structural characteristics of them. This research tried to collect data from blog posts in Naver and detect habitual patterns users use unconsciously by variables extracted from blogs and blog posts by a machine learning model and wanted to use the technique in predicting fake reviews. Data analysis showed that there was a very high relationship between the number of all the posts registered in the blog of the writer of the related writing and the date when it was registered. And, it was found that, as model to detect advertising reviews, Random Forest is the most suitable. If a review is predicted to be an advertising one by the model suggested in this research, it is very likely that it is fake review, and that it violates the guidelines on investigation into markings and advertising regarding recommendation and guarantee in the Law of Marking and Advertising. The fact that, instead of using analysis of morphemes in contents of writings, this research adopts behavior analysis of the writer, and, based on such an approach, collects characteristic data of blogs and blog posts not by manual works, but by automated system, and discerns whether a certain writing is advertising or not is expected to have positive effects on improving efficiency and effectiveness in detecting fake reviews.

A Method for Detecting the Exposure of an OCSP Responder's Session Private Key in D-OCSP-KIS (D-OCSP-KIS에서 OCSP Responder의 세션 개인키의 노출을 검출하는 방법)

  • Lee, Young-Gyo;Nam, Jung-Hyun;Kim, Jee-Yeon;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.83-92
    • /
    • 2005
  • D-OCSP-KIS proposed by Koga and Sakurai not only reduces the number or OCSP Responder's certificate but also criers the certificate status validation about OCSP Responder to the client. Therefore, D-OCSP-KIS is an effective method that can reduce the communication cost, computational time and storage consumption in client, but it has some problems. In case an attacker accidentally acquires an OCSP Responder's session private key in a time period (e.g., one day), she can disguise as the OCSP Responder in the time period unless the OCSP Responder recognizes. She can offer the wrong response to the client using the hash value intercepted. And the server and user on I-commerce can have a serious confusion and damage. And the computation and releasing of hash chain can be a load to CA. Thus, we propose a method detecting immediately the exposure of an OCSP Responder's session private key and the abuse of hash value in D-OCSP-KIS.

A Study on the Development of Topic Map for Analysis of Customer Satisfaction in Tourism Industry (관광산업의 고객만족도 분석을 위한 토픽맵 개발에 관한 연구)

  • Kang, Min Shik
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.249-255
    • /
    • 2017
  • The domestic tourism industry mostly relies on quantitative surveys for customer satisfaction. However, customer participation of the questionnaires is extremely low and the improvement of the dissatisfactory factors is not being performed promptly. In this paper, we propose a new topic map system and prove its empirical effectiveness to improve the accuracy of customer feedback information and the efficiency of the analysis process. The topic map system is a system for analyzing large amounts of customer feedback data in real time. It uses text mining and ontology techniques by integrating data collected over a certain period from real-time SNS and quantitative data obtained from existing survey systems. The effect after improving the analyzed factors of dissatisfaction is also a new and innovative evaluation system for monitoring customer satisfaction in real time. The classification based on this integrated data is a classification system that is specific to the product or the customer. According to this classification, it is possible to measure the effect of the recognition and improvement of the complaint factor in real time on the topic map system. This provides a sophisticated prioritization of the improvement factors and enables customer satisfaction quality control as a PDCA feedback system. In addition, the survey period and costs are greatly shortened, and responses can be more precise to the existing survey method. As a practical application, this system is applied to the largest H travel agency in Korea to prove the accuracy and efficiency of the proposed system.