• 제목/요약/키워드: Core points

검색결과 393건 처리시간 0.024초

가상기업의 구축전략 (Implementation Strategies for Virtual Enterprise)

  • 정동길;정철용
    • 한국전자거래학회지
    • /
    • 제1권1호
    • /
    • pp.27-50
    • /
    • 1996
  • In this paper. we present a definition of the term virtual enterprise (VE) and discuss some related terms and concepts. The definition was given based on Porter's Value Chain Theory. Then we discuss some positioning strategies for entering or joining a virtual enterprise from an executive's viewpoint. which show a framework for making decisions on for what. when and how a (real) enterprise need to participate or form a virtual enterprise and whom the partners should be. The major pert of the paper is on underlying information technologies and architectures for building virtual enterprises. Requirements for modeling virtual enterprises and core technologies needed for implementation are discussed. A virtual enterprise reference architecture based on NIIIP's model is presented. Finally we discuss some points that should. addressed from a macroeconomic and public policies viewpoints. These are the issues of IT standardization and investments in IT infrastructure.

  • PDF

좌립형 폴리머 지지애자의 기계적 강도 해석 (Mechanical Strength Analysis of Station Type Po1ymer Insulator)

  • 조한구;박기호;한동희
    • 한국항해항만학회:학술대회논문집
    • /
    • 한국항해항만학회 2000년도 추계학술대회논문집
    • /
    • pp.85.1-88
    • /
    • 2000
  • FRP has been used very much as high strength core materials for insulators because of its high strength and good insulation properties. In this study cantilever, tension and torsion stress were simulation along to the unidirection glass fiber. In addition, FRP was made by pultrusion method. This paper proposed the procedure of the finite element model updating and pretest using the commerical finite element code MSC.Nastran. To ehance the efficiency of experimental modal analysis, we proposed the process which is the selection of the locations and the number of measurement points for pre-test.

  • PDF

An AP Selection Criteria for Enhanced Indoor Positioning using IEEE 802.11 RSSI Measurements and AP Configuration Information

  • Hwang, Jun Gyu;Lee, Kwang Eog;Park, Joon Goo
    • Journal of Electrical Engineering and Technology
    • /
    • 제11권2호
    • /
    • pp.537-542
    • /
    • 2016
  • The demand for LBS (Location Based Services) is increasing in the development of communication and mobile technologies. Positioning technology is a core technology for LBS, because LBS is based on a position of each device or user. But positioning technology especially for indoor environments is getting a lot of attention. Indoor positioning errors usually occur seriously in indoor environments where APs (Access Points) are set in a very concentrated and complex arrangement. In order to reduce indoor positioning errors, we adopt DOP (Dilution of Precision) which reflects an APs configuration information. In this paper, we propose an enhanced indoor positioning method using IEEE 802.11 RSSI measurements and AP configuration information.

도서관의 본질과 미래 도서관상 (The essential functions of library and a vision of future library)

  • 권은경
    • 한국도서관정보학회지
    • /
    • 제27권
    • /
    • pp.423-456
    • /
    • 1997
  • As information technology has been evolving, digital library emerges as a vision of future library. Many authors on digital library describe that the problems that today's libraries face would be completely solved by using digital technology. But it is su n.0, pposed that such technology oriented papers do not take care of what the library has been and should remain. This paper is prepared to identify what core elements of library services being provided in traditional environment must be transferred to the digital library. For this purpose, firstly historical transition from traditional library to digital discussed. Secondly, library's fundamental service functions are analysed from three points of view-library as cultural and social institution, library as intellectual reality, library as a collection. And 'control zone' concept is also investigated as a new possibility of academic digital libraries. In contrast to open zone in which information is not controled at all as in internet, in control zone, information is selected and maintained by academic library community, retaining such essential library functions as selection.

  • PDF

UCP 600: 국제 사적 부문 자체 규제의 일례 (UCP600: An Exercise in International Private Sector Self Regulation)

  • Byrne, James E.
    • 무역상무연구
    • /
    • 제36권
    • /
    • pp.47-84
    • /
    • 2007
  • The Uniform Customs and Practice for Documentary Credits ("UCP") may be treated as a useful laboratory for studying the scope and limitations of self regulation. This is due to its almost universal success on a global stage which provides it a perspective rarely available for self regulatory provisions and due to extensive experience of judicial review of it. In this sense, it is worthwhile to examine in brief the latest iteration of the UCP, Publication No. 600 ("UCP600"). This article describes and analyze some of core provisions of the UCP600 from the perspective of their adequacy as an exercise in self regulation. It is attempted first in view of several categories of private rulemaking; definitional rulemaking, default rules, procedural rules, and remedies. After that, it is examined second in view of sound rulemaking which is related to the relative role of law and practice. It points out rich and varied insights into the possibilities and problems associated with private rulemaking in connection with commercial transactions.

  • PDF

A Safety Assessment Methodology for a Digital Reactor Protection System

  • Lee Dong-Young;Choi Jong-Gyun;Lyou Joon
    • International Journal of Control, Automation, and Systems
    • /
    • 제4권1호
    • /
    • pp.105-112
    • /
    • 2006
  • The main function of a reactor protection system is to maintain the reactor core integrity and the reactor coolant system pressure boundary. Generally, the reactor protection system adopts the 2-out-of-m redundant architecture to assure a reliable operation. This paper describes the safety assessment of a digital reactor protection system using the fault tree analysis technique. The fault tree technique can be expressed in terms of combinations of the basic event failures such as the random hardware failures, common cause failures, operator errors, and the fault tolerance mechanisms implemented in the reactor protection system. In this paper, a prediction method of the hardware failure rate is suggested for a digital reactor protection system, and applied to the reactor protection system being developed in Korea to identify design weak points from a safety point of view.

SLAM 기반 GPS/INS/영상센서를 결합한 헬리콥터 항법시스템의 구성 (SLAM Aided GPS/INS/Vision Navigation System for Helicopter)

  • 김재형;유준;곽휘권
    • 제어로봇시스템학회논문지
    • /
    • 제14권8호
    • /
    • pp.745-751
    • /
    • 2008
  • This paper presents a framework for GPS/INS/Vision based navigation system of helicopters. GPS/INS coupled algorithm has weak points such as GPS blockage and jamming, while the helicopter is a speedy and high dynamical vehicle amenable to lose the GPS signal. In case of the vision sensor, it is not affected by signal jamming and also navigation error is not accumulated. So, we have implemented an GPS/INS/Vision aided navigation system providing the robust localization suitable for helicopters operating in various environments. The core algorithm is the vision based simultaneous localization and mapping (SLAM) technique. For the verification of the SLAM algorithm, we performed flight tests. From the tests, we confirm the developed system is robust enough under the GPS blockage. The system design, software algorithm, and flight test results are described.

생체신호 무선 송수신을 위한 소형,저전력 통신시스템 개발 (Low-power wireless communication System for Biosignal transmission)

  • 이강휘;이정환;김경섭;김동준
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.370-372
    • /
    • 2005
  • Inconveniences which might arise in transmitting measured biological data based on cable protocols generally are recognized critical points in tele-monitoring environment and also restrict the mobility of the user. a. Especially, activity monitoring which is importantly recognized as a core parameter in ubiquitous healthcare arena and weight management, pervasive and wireless measuring technology is most needed. In this paper, we would like to suggest lower power, miniaturized communication system in order to solve the above problems. The suggested system is powered by small coin-size battery. Also, The suggested system is compared with a blue-tooth module which is generally available in the commercial market. Even though, the suggested system didn't have higher transmission rate, its low power consumption make the suggested system would be feasible in ubiquitous monitoring of biological signals in ubiquitous healthcare arena.

  • PDF

침입 탐지 시스템과 침입 차단 시스템의 연동을 통한 보안 시뮬레이션 (Security Simulation with Collaboration of Intrusion Detection System and Firewall)

  • 서희석;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제10권1호
    • /
    • pp.83-92
    • /
    • 2001
  • For the prevention of the network intrusion from damaging the system, both IDS (Intrusion Detection System) and Firewall are frequently applied. The collaboration of IDS and Firewall efficiently protects the network because of making up for the weak points in the each demerit. A model has been constructed based on the DEVS (Discrete Event system Specification) formalism for the simulation of the system that consists of IDS and Firewall. With this model we can simulation whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. If an agent detects intrusions, it transfers attacker's information to a Firewall. Using this mechanism attacker's packets detected by IDS can be prevented from damaging the network.

  • PDF

신경망을 이용한 지문인식 임베디드 시스템 설계에 관한 연구 (Study on Design of Fingerprint Recognition Embedded System using Neural Network)

  • 이재현;김동한
    • 한국정보통신학회논문지
    • /
    • 제10권4호
    • /
    • pp.775-782
    • /
    • 2006
  • 지문인식 알고리즘에서 전처리 과정 중 방향성이 추출된 지문에서 블록을 형성하여 각 블록에서의 방향성 특징들을 신경회로망의 입력패턴으로 사용하여 학습을 시켜, 특이점을 추출하여 매칭에 이용했다. 이를 바탕으로 지문인식 임베디드 시스템을 설계하여 다양한 응용 시스템에 이용될 수 있도록 하기 위해 컨트롤 보드와 시리얼 통신을 통해 테스트한 결과 충분한 신뢰성을 입증할 수 있었다.