• Title/Summary/Keyword: 컴퓨터가이드

Search Result 304, Processing Time 0.029 seconds

A Research on Derivation of Strategic Brain Research Areas by the AHP Approach (AHP를 이용한 뇌융합 전략분야 발굴 연구)

  • Kim, Junhuck;Suh, Dukrok;Choi, Jee Hyun;Kim, Han-Gook
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.4
    • /
    • pp.36-44
    • /
    • 2016
  • This article serves as a guideline to the policy on Korea brain science program. Given limited resources within Korea, setting priorities in brain science topics is important in science policy. In this study, we determined the priorities of important brain science topics based on the frontier properties, innovativeness, and prospective outcome. Firstly, the significant topics were chosen after the interview with the top nationwide brain scientists, which were neuroglia, brain precision medicine, neuromorphic engineering, neuroepigenetics, and brain oscillation. Secondly, the analytic hierarchy process (AHP) survey were conducted to prioritize and assign the important weight for not only the criteria but also the research topics in pair choice evaluation. In regards to the importance among the criteria, prospects of the topic was determined to be the top criterion to ranked criterion to consider in the government investment. The priority of the research topics was determined by the order for the project to be considered in national science policy in a comparative way.

Priority Evaluation for Support of Cultural Technologies Using Fuzzy TOPSIS (퍼지 TOPSIS를 이용한 문화기술 육성 우선순위 평가)

  • Park, Hyun Min
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.105-113
    • /
    • 2020
  • The development and application of cultural technologies(CT) are expected to lead to create various service scenarios and business models. Considering the wide range of application and extensibility of CT, it is necessary to design multidimensional evaluation methods for priority of the support of R&D budgets. The method should include the various evaluation criteria such as economic feasibility and user benefit of service made by a cultural technology. Our research addresses priority decision for fosterage of cultural technologies using fuzzy TOPSIS. Seven evaluation attributes are used to compare five specific technologies. Based on the results, service usefulness is the most important factor among the evaluation attributes. Also, technologies of computer graphics and UI/UX have higher priority than the others. We expect our research to help to provide guidelines for selection of promising cultural technologies which foster the culture and contents industry.

A Study on the Approach Method of Product Form by User Mental -Concentrated on Implicit & Explicit memory- (사용자 심리적 연상에 의한 제품형태 접근 방법에 관한연구 -암묵기억과 외현기억을 중심으로-)

  • 안철홍;정도성
    • Archives of design research
    • /
    • v.15 no.1
    • /
    • pp.27-36
    • /
    • 2002
  • To do this, study of human memory and theoretical approach on form in general is carried out to compare the types of memories and the stage of perceive theoretically to discover the relationship between psychological perceive and form. In the second please, scenario of form recognition in cultural aspect is studied through various written records to obtain unbiased critics on what a person can feel from a form through various analysis and experiment. Examples will be given on products designed on the basis of correlation with form through analysis. Through this procedure, elements of reactions on implicit and explicit is derived (Data obtained from experiments on computers and inquiries are used) Analyzed elements are than divided into, general knowledge, memories of reality and subconsciousness memories and basic mental image and user mental image and mental image of form of each products are analyzed. In the third phase, the way of adapting of the elements obtained from the analysis of implicit and explicit reaction to the field of design is predicted. Together with this, future theme this the study will be suggested. Confusions obtained from this study can be listed as below.

  • PDF

UML Extension for Object-Relational Database Design - Focusing on Oracle11g - (객체-관계형 데이터베이스 설계를 위한 UML 확장 - Oracle11g를 중심으로 -)

  • Joo, Kyung-Soo;Jho, Do-Hyung
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.149-159
    • /
    • 2011
  • The current applications can be characterized as consisting of complex objects related by complex relationship. Therefore the relational database has been extended to object-relational database because of the complex objects. Accordingly, we need database design methodology for object-relational database. In this pager, we develop an integrated design methodology based on a extended UML class diagram for object-relational database. We make the extend UML class diagram by adding new stereotypes for object-relational database. Also we propose a guideline for transforming the extended UML class diagram to object-relational database schema. We use SQL:1999 as a object-relational data model and Oracle11g as a target object-relational database. We can build more easily and efficiently object-relational database for Oracle11g by using our methodology. Finally we applied our methodology on a computer classroom reservation system for evaluation the methodology.

A Study on Driver Experience in Autonomous Car Based on Trust and Distrust Model of Automation System (자율주행 자동차 환경에서의 운전자 경험에 대한 연구: 신뢰와 불신 형성 모형 중 심으로)

  • Lee, Jiin-in;Kim, Na-eun;Kim, Jin-woo
    • Journal of Digital Contents Society
    • /
    • v.18 no.4
    • /
    • pp.713-722
    • /
    • 2017
  • Recently technological drive on autonomous vehicle is on the rush. Along with the trend, researches on driver's perspective are increasing. However, previous studies have limitations in terms of study period and rich experience. In this paper, we conducted an ethnographically inspired fieldwork to observe human-autonomous car interaction. We had six participants to ride a prototype autonomous car on the real road for six days. After, we generated trust, distrust factors according to Lee & See's categorization of trust dimension: process, performance, and purpose. We derived eight distrust factors that saliently influences passenger's experience in autonomous vehicle. Our research broadens trust model into autonomous driving context based on real road field study and contributes to automotive community with design guidelines to increase trust toward autonomous vehicle.

Efficient Multicasting Mechanism for Mobile Computing Environment (교육 영상제작 시스템 설계 및 구현)

  • Kim, Jungguk;Cho, Wijae;Park, Subeen;Park, Suhyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.482-484
    • /
    • 2017
  • Over the past 70 years, movies and television have revolutionized the way people communicate. However, even with this development, TV has been used only as a means of communication targeting an unspecified number of people due to the restriction of media such as radio waves and movies. However, the development of the Internet and online video has come to a time when 100 million people watch YouTube videos uploaded from the other side of the world by eliminating these restrictions. The message that you want to deliver now can be delivered to anyone, but making the image with these messages remains the last obstacle to communication. To solve these problems, we implemented a web application and a video production program through AWS. This system basically provides the administrator with the video production through the easy interface, the information management and the program on the server on the internet through AWS, the assigned lecture including the computer and the smart phone, the learning materials, And implemented to increase the efficiency of educational video production service.

  • PDF

Development of Optimal Seismic Design Model for Inverted V-type Special Concentrically Braced Frames (역V형 특수중심가새골조의 최적내진설계 모델 개발)

  • Choi, Se-Woon;Yang, Hee-Jin;Park, Hyo-Seon
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.23 no.1
    • /
    • pp.111-119
    • /
    • 2010
  • Many researchers have studied on the optimal seismic design with the development of the computer. So far the application structure of most researches on the optimal seismic design was almost the moment resisting frame. Because the braced frames are the representative lateral load resisting system with the moment resisting frames, it is estimated that the effect on the practice will be great if it can is provided a design guideline through the development of optimal seismic design model for the braced frames. The purpose of this study is to propose the optimal seismic design model for the inverted V-type special concentrically braced frames considering the buckling of braces. The objective functions of this are to minimize the structural weight and maximize the total dissipated energy of the structure and the constraints of this are the strength conditions for the column, beam, brace and inter-story drifts condition. To verify the proposed model, it is applied to 2D steel concentrically braced frames of 3-story and 9-story.

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜)

  • Lee, Jong-kwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.729-738
    • /
    • 2019
  • In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.

Expressing Variability in Software Product Line Architecture Models: A Comparative Study (소프트웨어 제품라인 아키텍처 모델에서의 가변성 표현 방법 비교 연구)

  • Lee, Hyesun;Cho, Sungbae;Kang, Kyo Chul
    • Journal of Software Engineering Society
    • /
    • v.24 no.3
    • /
    • pp.77-89
    • /
    • 2011
  • Software product line engineering is a software reuse paradigm that helps organizations improve software productivity and quality by developing software products from reusable core assets. For the satisfaction of common and variable requirements among products in the product line, the core assets must be configurable according to the selection of variable features. Therefore, unlike software architecture model of a single product, product line architecture model must embed and express variabilities among the products. Many researches have proposed methods of embedding and expressing variabilities in the product line architecture models, but there are few comparative studies on the proposed methods. In this paper we discuss strong points and weak points of the proposed methods and compare expressiveness of the methods, which helps select a proper method.

  • PDF

Systematic and Comprehensive Comparisons of the MOIS Security Vulnerability Inspection Criteria and Open-Source Security Bug Detectors for Java Web Applications (행정안전부 소프트웨어 보안 취약점 진단기준과 Java 웹 어플리케이션 대상 오픈소스 보안 결함 검출기 검출대상의 총체적 비교)

  • Lee, Jaehun;Choe, Hansol;Hong, Shin
    • Journal of Software Engineering Society
    • /
    • v.28 no.1
    • /
    • pp.13-22
    • /
    • 2019
  • To enhance effective and efficient applications of automated security vulnerability checkers in highly competitive and fast-evolving IT industry, this paper studies a comprehensive set of security bug checkers in open-source static analysis frameworks and how they can be utilized for source code inspections according to the security vulnerability inspection guidelines by MOIS. This paper clarifies the relationship be tween all 42 inspection criteria in the MOIS guideline and total 323 security bug checkers in 4 popular open-source static analysis frameworks for Java web applications. Based on the result, this paper also discuss the current challenges and issues in the MOIS guideline, the comparison among the four security bug checker frameworks, and also the ideas to improve the security inspection methodologies using the MOIS guideline and open-source static security bug checkers.