• Title/Summary/Keyword: 통신학교

Search Result 906, Processing Time 0.036 seconds

Application Method and EMTP-RV Simulation of Series Resonance Type Fault Current Limiter for Smart Grid based Electrical Power Distribution System (스마트 그리드 배전계통을 위한 직렬 공진형 한류기 적용 방법 및 EMTP-RV 시뮬레이션 연구)

  • Yun-Seok Ko;Woo-Cheol Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.2
    • /
    • pp.361-370
    • /
    • 2024
  • In this paper, a method was studied for applying a series resonant type fault current limiter that can be manufactured at low cost to the smart grid distribution system. First, the impact of the harmonic components of the short-circuit fault current injected into the series resonance circuit of the fault current limiter on the peak value of the transient response was analyzed, and a methodology for determining the steady-state response was studied using percent impedance-based fault current computation method. Next, the effectiveness of the method was verified by applying it to a test distribution line. The test distribution system using the designed current limiter was modeled using EMTP_RV, and a three-phase short-circuit fault was simulated. In the fault simulation results, it was confirmed that the steady-state response of the fault current accurately followed the design target value after applying the fault current limiter. In addition, by comparing the fault current waveform before and after applying the fault current limiter, it was confirmed that the fault current was greatly suppressed, confirming the effect of applying the series resonance type current limiter to the distribution system.

SaaS Platform Structure Design for Authentication and Accounting based on Trusted Computing Technology (신뢰 컴퓨팅기술 기반 SaaS 인증 및 과금 플랫폼 구조 설계)

  • Lee, Sang Hwan;Kim, Jane Chungyoon;Jun, Sungik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.991-994
    • /
    • 2007
  • 최근 컴퓨터 기술의 발전과 네트워크의 개방화 그리고 무선 모바일 통신 기술의 비약적인 보급으로 인하여 컴퓨팅 환경을 이루고 있는 각종 장치(PC, 모바일 단말, 저장장치, 네트워크 기기 등)가 다양한 형태의 보안 위협에 노출되어 데이터의 유실, 조작, 유출되어 금전적인 피해를 입거나 프라이버시 침해를 받고 있다. 이러한 문제를 근본적으로 해소하기 위하여 설립된 TCG(Trusted Computing Group)는 세계적인 IT 핵심기업들을 중심으로 구성된 비영리 단체로서 PC 혹은 모바일 기기 등의 단말과 서버 장비 그리고 저장 장치 및 네트워크로 구성된 컴퓨팅 환경에서 보안성 향상 및 데이터의 신뢰성을 제고하기 위하여 TPM(Trusted Platform Module)이라는 반도체 칩을 신뢰의 기반(root of trust)으로 한 신뢰 플랫폼을 제안하고 있다. 한편 SaaS(Software as a Service)는 패키지 형태의 소프트웨어를 네트워크 서비스 형태로 바꾸어 사용량에 비례한 요금제로 과금하는 방식을 채택하고 사용자가 온디맨드로 요청한 서비스를 적시에 제공하는 기술로 최근 전세계적으로 각광을 받고 있다. 이때 다양한 컴퓨팅 환경 안의 사용자에게 높은 신뢰성과 보안성 그리고 연속성을 갖는 SaaS 서비스를 제공하고 데이터의 무결성 및 비밀유지와 정확한 서비스 사용시간을 기록하고 업로드하는 기능들을 제공하는 SaaS 플랫폼은 TPM기반의 신뢰컴퓨팅 기술을 통하여 쉽게 구현될 수 있다. 본 논문에서는 일시적으로 네트워크와 차단된 상태의 PC 혹은 모바일 단말에서도 위의 조건들을 만족하는 SaaS 서비스를 지원하는 신뢰 플랫폼이 가져야 할 기능들에 대하여 분석-도출한 후 그러한 기능들을 제공하는 컴포넌트로 구성된 신뢰형 SaaS 사용자 플랫폼을 설계하였다.

Development of Bonding Dispenser and Press Machine to Regenerate Retainer Ring for Semiconductor CMP Process (반도체 CMP 공정용 리테이너 링 재생을 위한 본딩 디스펜서 및 프레스 머신 개발)

  • Hyoung-Keun Park
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.3
    • /
    • pp.507-514
    • /
    • 2024
  • In the semiconductor manufacturing line, continuous efforts are being made to reduce the cost of products produced, and the demand for this is accelerating in the chemical mechanical polishing(CMP) process, and a representative example of these cost reduction items is the 5-Zone Ring. After about 150 hours of use in the CMP process, the thickness of the ring decreases to less than 1 mm and must be replaced with a new product. Therefore, in this study, bonding dispensers and press machines with a dispensing amount error of 10g±0.8% or less and a pressure uniformity of ±1.8% or less were developed to reduce semiconductor manufacturing costs by repeatedly regenerating worn parts of the retainer ring, and to minimize environmental pollution caused by industrial waste treatment.

Model Interpretation through LIME and SHAP Model Sharing (LIME과 SHAP 모델 공유에 의한 모델 해석)

  • Yong-Gil Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.177-184
    • /
    • 2024
  • In the situation of increasing data at fast speed, we use all kinds of complex ensemble and deep learning algorithms to get the highest accuracy. It's sometimes questionable how these models predict, classify, recognize, and track unknown data. Accomplishing this technique and more has been and would be the goal of intensive research and development in the data science community. A variety of reasons, such as lack of data, imbalanced data, biased data can impact the decision rendered by the learning models. Many models are gaining traction for such interpretations. Now, LIME and SHAP are commonly used, in which are two state of the art open source explainable techniques. However, their outputs represent some different results. In this context, this study introduces a coupling technique of LIME and Shap, and demonstrates analysis possibilities on the decisions made by LightGBM and Keras models in classifying a transaction for fraudulence on the IEEE CIS dataset.

Exploratory Data Analysis on the Connection of the Software Curriculum between the Primary and Secondary Curriculums and the Higher Curriculums (초중등 교육과정과 고등교육과정의 소프트웨어 교과의 연계 문제에 대한 탐색적 데이터 분석)

  • Mi-yeon Kim;Choong-ho Lee
    • Journal of Practical Engineering Education
    • /
    • v.16 no.3_spc
    • /
    • pp.283-290
    • /
    • 2024
  • Software education is an important subject in the era of forth industrial evolution generation, and the number of hours is gradually expanding in Korea's elementary and secondary curriculum, and universities have also opened software-related courses to take liberal arts mandatory regardless of major. The Ministry of Education presented elementary and secondary school programming achievement standards and emphasized the connection between prerequisite subjects as educational goals. Applicants for programming classes at H University also completed information classes in elementary and secondary courses, but many students were new to programming without taking related classes. Therefore, this study analyzed the data using the survey data and achievement scores of programming learners. As a result of the analysis, information classes completed in elementary and secondary courses were not linked to higher education courses at all, and improvements for problem solving were derived. This study is meaningful as a study for effective software education in higher education courses.

Development of a Game to Improve Awareness of Endangered Species (멸종위기종 인식 개선 게임 개발)

  • Yeon-Woo No;Ji-Hye Park;Soo-Bin Yang;Ju-Ram Lee;Jung-Yi Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.65-70
    • /
    • 2024
  • Biodiversity, which has recently become increasingly recognized due to the destruction of the ecosystem, is an important factor in the survival of humans and the ecosystem, and has a significant impact on the survival of endangered species. Accordingly, social education is necessary to maintain biodiversity, and education through media can be more effective than simple theory because it is more accessible and has higher demand. This study developed a game to improve awareness of endangered species protection by investigating and analyzing theories and research data from existing literature. Pre- and post-tests were conducted on the game developed as a result of the research to confirm that it had an effect of improving awareness. The results of the research are expected to be utilized in educational institutions such as schools through supplementation.

Behavioral Analysis to reduce Alcohol and Smoking Rates of Adolescents (청소년 음주율 및 흡연율 감소를 위한 행태 분석)

  • Seung-Yeon Hwang;Jin-Yong Moon;Jae-Kon Oh;Jeong-Joon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.177-182
    • /
    • 2024
  • The issue of teenage drinking and smoking has been raised repeatedly over the years. However, for various reasons, adolescents have continued to drink and smoke up to the present. Consequently, various preventive education programs are being implemented in all elementary, middle, and high schools, but these efforts have not been significantly effective in reducing the rates of adolescent drinking and smoking. Furthermore, while youth centers exist in various locations, they are often underutilized due to inadequate promotion or facilities. Given that drinking can lead to serious juvenile crimes, and there are indeed cases to this effect, preventive measures are absolutely necessary. Therefore, this paper analyzes the behavior of adolescents regarding drinking and smoking using public data. Based on the analysis conducted using R, a tool for big data analysis, this paper proposes measures to reduce the rates of adolescent drinking and smoking. The proposed measures focus more on prevention than on post-event solutions.

Analysis of Wireless Network in Freight Container Terminal and Methods for Service Quality Enhancement (컨테이너 터미널의 무선 네트워크 분석과 서비스 품질 향상 방안)

  • Han, Seung-Ho;Park, Hyun-Sung;Kim, Jong-Deok;Kim, Yong-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3B
    • /
    • pp.235-246
    • /
    • 2009
  • The number of industry wireless networks based on IEEE 802.11 WLAN technology deployed in large outdoor work sites, such as freight container terminal, is increasing these days. Wider service coverage, frequent movements of stations and high requirement on service reliability are main characteristics of these networks compared to the conventional IEEE 802.11 networks used in home, office and school. While the importance of these networks Bets higher, we can hardly find previous studies including concrete analysis on these networks based on actual experiments. We carried out several field experiments at a freight container terminal to analyze its IEEE 802.11 network and found out some problematic situations, such as over 50% retransmission rates and frequent disruption of communication link while a station is moving. We explain why these problematic situations happen and suggest some solutions, such as application of mesh technology, smart handoff based on location and movement pattern and adjustment of signal strength and channel allocation. Methods and tools used in the experiments are also detailed in the paper which may be helpful for similar future studies.

Educational Practice Example of Information and Communications Technology: Measurement of Data Transfer Time for Concurrent Server Model (정보통신기술 실습사례: 병행서버모델의 데이터 전송시간 측정)

  • Son, Myung-Rak;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.33 no.1
    • /
    • pp.265-281
    • /
    • 2008
  • The objective of this study is to show practice example let student experience about concurrent servers based multi-processes and multi-thread among the principles of data communication in ICT(information and communications technology). For this, we first implement multi-process server(fork server) and multi-thread server(thread server), and multi-thread client(thread client), Secondly, for experimental environment, we developed small ethernet networks and measure data transfer time with relation to the number of users. Experimental results show that mean transfer time of thread server is less than that of fork server by 20~61 % on average. Furthermore, it is found that the difference of data transfer time between fork server and thread server is proportional to that of the number of users. Main reason of performance difference dues to the difference between process forking time and thread creation time. We can also find that context switching for process and thread affects the load of web server. Our presentation and experimental results can be applied to used as the educational practice materials with which student can experience data communication principles.

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.