Major countries are trying to expand the construction of smart factories by introducing ICT such as the Internet of Things, cloud, and big data into the manufacturing sector to secure national-level manufacturing competitiveness in the era of the 4th industrial revolution. In addition, Germany is pushing for Industry 4.0 to build a fully automatic production system through the Internet of Things, and China is pushing for the expansion of smart factories to enhance the country's industrial competitiveness through Made in China 2025, Japan's intelligent manufacturing system, and the Korean government's manufacturing innovation 3.0. In this study, considering the increasing security connectivity of smart factories, we would like to identify security threats in the external connection part of smart factories and suggest security enhancement measures based on domestic and international standard security models to respond to the identified security threats. Eventually the proposed method can be applied by accurately identifying the smart factory security status, diagnosing vulnerabilities, establishing appropriate improvement plans, and expanding security strategies to respond to security threats.
Purpose: Maximizing human comfort in design of medical environments depends immensely on specialized architects particularly critical care design; the study proposes Evidence-Based Design as an apparent analog to Evidence-Based Medicine. Healthcare facility designs are substantially based on the findings of study in an effort to design environments that augment care by improving patient safety and being therapeutic. On SPSS (Statistical Package for Social Science) t-test is applied to simulate two independent variables of PDR (Pre Design-Research) and POE (Post- Occupancy Evaluation). PDR is conducted on relatively new hospital Hallym University Dongtan Sacred Heart Hospital to analyse visibility from researchers' point of view, here the ICU is arranged in I-Shape. POE is applied on Dongguk University Ilsan Hospital to simulate walking on LogWare where two NS are designed based on L- Shape and Seoul St. Mary's Hospital, The Catholic University of Korea where five NS are functional for ICU Intensive Care Unit, Surgical Intensive Care Unit (SICU), Medical Intensive Care Unit (MICU), Critical Care Unit (CCU), Korean Oriental Medical Care Unit which are mostly arranged in U-Shape, and walking pattern is recognized to be in a zigzag path. Method: T-Test is applied on two dependent communication variables: walkability and visibility, with confidence interval of 95%. This study systematically analyses the Nurse Station (NS) typo-morphology, and simulates nurse horizontal circulation, by computing round route visits to patient's bed, then estimating minimum round route on LogWare stop sequence software. The visual connectivity is measured on depth map graphs. Hence the aim is to reduce staff stress and fatigue for better patients care by minimizing staff horizontal travel time and to facilitate nurse walk path and support space distribution by increasing effectiveness in delivering care. Result: Applying visibility graph and isovist field on space syntax on I- Shape, L- Shape and U- Shape ICU (SICU, MICU and CCU) configuration, I-shape facilitated 20% more patients in linear view as they stir to rise from their beds from nurse station compared to U-shape. In conclusion, it was proved that U-Shape supply minimum walking and maximum visibility; and L shape provides just visibility as the nurse is at pivot. I shape provides panoramic view from the Nurse Station but very rigorous walking.
This study was implemented to select the suitable site for Palustrine Wetland at habitat restoration for Oriental stork, red species and top-level predator in ecosystem. The evaluation items was fitted by review the antecedent studies on the suitable site selection model and evaluation items of wetland. The study sites were setted in $5,884,800m^2$ area including Yesan-gun Dae-ree, in which Oriental stork' park will be located, through DEM(Digital Elevation Model) watershed analysis. The thematic map by valuation items with secure of water resource, soil, topography, distance between roads, houses, etc., land using, wildlife corridor, and type of water resource was prepared using GIS program. The sites with high evaluation score were selected as suitable creation sites for wetland through overlapping those maps. Total 8 sites with over 18 point were selected. The characteristics of selected sites show that the soil are consisted of clay, the connectivity is valued high with surface water, the slope are gentle, and the connectivity is good with surroundings ecosystem. The result of water quality analysis, which was implement to survey available water resources and develop the solution of problem of water environment, showed that water quality at Salmok reservoir and Bogang reservoir is generally good, but the water quality at stagnant water body rising out from groundwater is not good. This study has limit to select the suitable sites of wetland only by analyzing physiotherapy environment in study area. Hereafter, the study is need to examine closely enhancement effects of biological diversity through investigation of biotic environment.
The purpose of this study is to examine satisfaction with liberal education at H university. In particular, the study is interested in students' and satisfaction with the courses of and , compulsory liberal studies. As a result of analysis, students were most satisfied with 'the percentage of liberal studies credits', being followed by 'the number of students per liberal studies class' and 'the systemicity of curriculum.' The survey also showed that, in and , students were highly satisfied with 'chance for communication with native faculty, improvement of ral expression skills' and 'improvement of orthography and grammar skill and so on. With regard to items whose satisfaction were low, the survey showed that there was the lack of connectivity between liberal studies and employment in 3 categories in common. Therefore, a direction toward enhancement of efficiency in connection with career center and the like was required in addition to establishing, developing and specifying employment category in liberal studies.
Journal of the Korea Academia-Industrial cooperation Society
/
v.19
no.4
/
pp.41-46
/
2018
Recently, the importance of the northeast economies including Russia has been growing, and according to the Eurasian initiative policy, the enhancement of transportation, logistics and connectivity between the northeast Asian countries is emerging as one of the challenges for future growth. However, due to the different vehicle systems used in each country, the railway connections between countries are not operating smoothly. Especially, the couplers of the railway cars which pass through the countries of northeast Asia including Russia have different regulations, which render their shape and characteristics incompatible. In this study, we propose a method of interconnecting the AAR type coupler used in Korea and China and the CA-3 type coupler compatible with the Russian GOST standard, and verify that its structural safety conforms with each set of regulations. We analyze the possibilities offered by this method of interconnection by performing tests while developing materials satisfying the mechanical properties required for the freight coupler.
cdma2000 offers several enhancement as compared to TIA/EIA-95, although it remains fully compatible with TIA/EIA-95 systems and allows for a smooth migration from one to the other-Major new capability include:1)connectivity to GSM-MAP in addition to IP and IS-41 networks; 2) new layering with new LAC and MAC architectures for improved service multiplexing and QoS management and efficient use of radio resource ;3) new bands and band widths of operation in support of various operator need and constraints, as well as desire for a smooth and progressive migration to cdma 2000; and 4) flexible channel structure in support of multiple services with various QoS and variable transmission rates at up to 1 Mbps per channel and 2 Mbps per user. Given the phenomenal success of wireless services and desire for higher rate wireless services. improved spectrum efficiency was a major design goal in the elaboration of cdma2000. Major capacity enhancing features include; 1) turbo coding for data transmission: 2)fast forward link power control :3) forward link transmit diversity; 4) support of directive antenna transmission techniques; 5) coherent reverse link structure; and 6) enhanced access channel operation. As users increasingly rely on their cell phone at work and at home for voice and data exchange, the stand-by time and operation-time are essential parameters that can influence customer's satisfaction and service utilization. Another major goal of cdma2000 was therefore to enable manufacturers to further optimize power utilization in the terminal. Major battery life enhancing features include; 1) improved reverse link performance (i.e., reduced transmit power per information bit; 2) new common channel structure and operation ;3) quick paging channel operation; 4) reverse link gated transmission ; and 5) new MAC stated for efficient and ubiquitous idle time idle time operation. this article provides additional details on those enhancements. The intent is not to duplicate the detailed cdma2000 radio access network specification, but rather to provide some background on the new features of cdma2000 and on the qualitative improvements as compared to the TIA/EIA-95 based systems. The article is focused on the physical layer structure and associated procedures. It therefore does not cover the MAC, LAC, radio resource management [1], or any other signaling protocols in any detail. We assume some familiarity with the basic CDMA concepts used in TIA/EIA-95.
The Journal of Korean Institute of Communications and Information Sciences
/
v.38B
no.10
/
pp.785-800
/
2013
In MANET, AODV(Ad hoc On-demand Distance Vector) has its advantages as on-demand approach but it also has a disadvantage that the control packet overhead is high compared to other routing protocols. This paper improves the problem caused by Hello messages that are broadcasted periodically to detect the local connectivity and maintain neighbor list. Periodic hello messages reduce the Packet delivery ratio and the efficiency in the limited bandwidth. And its increased Control packet overhead leads to decrease the Residual battery capacity and the Network lifetime. Further, non-reactive nature of periodic hello messages in AODV has also been the source of numerous controversies. In order to solve these problems, this paper improves the performance by using the interrupt driven approach which removes periodic hello messages and decreases the Control packet overhead. Performance comparisons between the traditional AODV and proposed mod_AODV done with network simulator QualNet 5.0 show that the mod_AODV performs better in most performance metrics under scenarios with various values of simulation parameters.
Critical infrastructure has been operating in a closed environment with a completely separate information system and in the private area. However, with the current ICT environment changes due to convergence and open platforms it has increased the threats and risks to critical infrastructure. The importance of cyber security is increasing in the infrastructure control system, such as the outbreak of Ukraine blackout in 2015 by a malicious code called 'black energy'. This thesis aims to recognize the importance and necessity of protecting the critical infrastructure service, designing a security framework reflecting environmental and characteristic changes, and analyzing the management system suitable for a security framework. We also propose a theoretical basis for constructing a new security framework by comparing and analyzing seven international security management system standards, such as NIST 800-82 and IEC 62443-2-1, which are used in the control system. As a result, the environment surrounding critical infrastructure changes with the characteristics of connectivity, openness, and finality was studied, and as a response to this, many scholars and institutions present critical infrastructure security frameworks as cycle enhancement type structures, risk management structures, and management domain expansion structures. In response, the security framework encompassing these structures, CISF (Critical Infrastructure Security Framework), was designed. Additionally, through the security related international standard and criterion analysis, as a newly designed security standard suitable for CISF, IEC 62443-2-1 is reviewed and suggestions are made.
This study aims to evaluate the factors which affect the competitiveness of Gwangyang port, and to suggest strategies for the enhancement of its competitiveness by priority. This study inquires both 5 key rating factors: port location, port operations management, port costs, port facilities, and hinterland conditions and the priority of 14 detailed assessments through AHP method. First, the importances of main evaluation items for port competitiveness are analysed in the following orders: port location, port facilities, port costs, port operations, hinterland conditions. Second, the comprehensive importances based on the detailed evaluation properties complex weighting are identified in the following orders: connectivity with hinterland, accessibility of international harbor, incentives, the area of terminal, expertise and skills of port operations personnel, container throughput, and scale berths. Third, the strategies referring to the port location like centrality, transit, and merit on use should be actively conducted for the promotions of Gwangyang port's competitiveness, according to its international port competitiveness analysis. This study will provide both academic and policy implications with its related scholars, government, and research institutions. In addition, this will be contributed to formulating a basic theory for port competitiveness evaluation and providing a basic framework of evaluation analysis.
Purpose : To investigate the 3-bond and spatial connectivity of human brain metabolites by scalar coupling and dipolar nuclear Overhauser effect/enhancement (NOE) interaction through 2D- correlation spectroscopy (COSY) and 2D- NOE spectroscopy (NOESY) techniques. Materials and Methods : All 2D experiments were performed on Bruker Avance 500 (11.8 T) with the zshield gradient triple resonance cryoprobe at 298 K. Human brain metabolites were prepared with 10% $D_2O$. Two-dimensional spectra with 2048 data points contains 320 free induction decay (FID) averaging. Repetition delay was 2 sec. The Top Spin 2.0 software was used for post-processing. Total 7 metabolites such as N-acetyl aspartate (NAA), creatine (Cr), choline (Cho), lutamine (Gln), glutamate (Glu), myo-inositol (Ins), and lactate (Lac) were included for major target metabolites. Results : Symmetrical 2D-COSY and 2D-NOESY pectra were successfully acquired: COSY cross peaks were observed in the only 1.0-4.5 ppm, however, NOESY cross peaks were observed in the 1.0-4.5 ppm and 7.9 ppm. From the result of the 2-D COSY data, cross peaks between the methyl protons ($CH_3$(3)) at 1.33 ppm and methine proton (CH(2)) at 4.11 ppm were observed in Lac. Cross peaks between the methylene protons (CH2(3,$H{\alpha}$)) at 2.50ppm and methylene protons ($CH_2$,(3,$H_B$)) at 2.70 ppm were observed in NAA. Cross peaks between the methine proton (CH(5)) at 3.27 ppm and the methine proton (CH(4,6)) at 3.59 ppm, between the methine proton (CH(1,3)) at 3.53 ppm and methine proton (CH(4,6)) at 3.59 ppm, and between the methine proton (CH(1,3)) at 3.53 ppm and methine proton (CH(2)) at 4.05 ppm were observed in Ins. From the result of 2-D NOESY data, cross peaks between the NH proton at 8.00 ppm and methyl protons ($CH_3$) were observed in NAA. Cross peaks between the methyl protons ($CH_3$(3)) at 1.33 ppm and methine proton (CH(2)) at 4.11 ppm were observed in Lac. Cross peaks between the methyl protons (CH3) at 3.03 ppm and methylene protons (CH2) at 3.93 ppm were observed in Cr. Cross peaks between the methylene protons ($CH_2$(3)) at 2.11 ppm and methylene protons ($CH_2$(4)) at 2.35 ppm, and between the methylene protons($CH_2$ (3)) at 2.11 ppm and methine proton (CH(2)) at 3.76 ppm were observed in Glu. Cross peaks between the methylene protons (CH2 (3)) at 2.14 ppm and methine proton (CH(2)) at 3.79 ppm were observed in Gln. Cross peaks between the methine proton (CH(5)) at 3.27 ppm and the methine proton (CH(4,6)) at 3.59 ppm, and between the methine proton (CH(1,3)) at 3.53 ppm and methine proton (CH(2)) at 4.05 ppm were observed in Ins. Conclusion : The present study demonstrated that in vitro 2D-COSY and NOESY represented the 3-bond and spatial connectivity of human brain metabolites by scalar coupling and dipolar NOE interaction. This study could aid in better understanding the interactions between human brain metabolites in vivo 2DCOSY study.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.