• Title/Summary/Keyword: Defense Model

Search Result 1,790, Processing Time 0.034 seconds

A study on the relations beween leisure activity duty stress and separation intention (민간경비원의 여가활동과 직무스트레스 및 이직의사의 관계)

  • Kim, Kyong-Sik;Kim, Pyung-Su;Lee, Kwang-Lyeol;Kim, Chan-Sun;Song, Kang-Young
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.602-607
    • /
    • 2009
  • This study is to examine the relation of empowerment and organizational commitment of security practitioners. and it establishes a temporary model that the empowerment of security practitioners effect the organization commitment. for this firstly, it is necessary to understand that their activity of voluntary empowerment is dynamic in any way through security organization. furthermore, all possible efforts of the activity of empowerment must be made for the sustainable self-development. Therefore the development of security organization is dependent upon the improvement of organization commitment through their empowerment.

  • PDF

A Development on Conceptual Design Tool of Fuel Supply and Cooling System for High-speed Vehicles using Fluid-thermal System Design Framework (프레임워크를 이용한 연료공급 및 냉각계통 예비설계 프로그램 개발)

  • Choi, Seyoung;Park, Sooyong;Hyun, Seokho;Choi, Won;Park, Jeongbae
    • Journal of Aerospace System Engineering
    • /
    • v.12 no.4
    • /
    • pp.90-97
    • /
    • 2018
  • In this study, we propose a conceptual design tool to develop fuel supply and engine cooling systems for high-speed vehicles. The preliminary designing of the systems and their validation were performed using this tool. Improvement in the design tool program was made using the fluid-thermal system design framework, which was applied to ensure efficient data processing using combined modules. The model geometry and thermal environment values were entered into the program. The thermodynamic properties of the system components were computed using the design tool, and simulation was performed to check the satisfaction rate of the requirements. It is hypothesized that our proposed design tool would be suitable for designing components for use in fuel supply and engine cooling systems of high-speed vehicles.

Verification of Underwater Blasting Response Analysis of Air Gun Using FSI Analysis Technique (FSI 해석기법을 이용한 에어건 수중발파 응답해석 검증)

  • Lee, Sang-Gab;Lee, Jae-Seok;Park, Ji-Hoon;Jung, Tae-Young;Lee, Hwan-Soo;Park, Kyung-Hoon
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.54 no.6
    • /
    • pp.522-529
    • /
    • 2017
  • Air gun shock system is used as an alternative energy source as part of the attempt to overcome the restrictions of economical expense and environmental damage, etc., due to the use of explosives for the UNDerwater EXplosion (UNDEX) shock test. The objectivity of this study is to develop the simulation technique of air gun shock test for the design of model-scale one for the near field non-explosive UNDEX test through its verification with full-scale SERCEL shock test result. Underwater blasting response analysis of full-scale air gun shock test was carried out using highly advanced M&S (Modeling & Simulation) system of FSI (Fluid-Structure Interaction) analysis technique of LS-DYNA code, and was verified by comparing its shock characteristics and behaviors with the results of air gun shock test.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.205-214
    • /
    • 2006
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware or Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache Poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside. and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

Development Plan of the Education Welfare Policy for Children and Adolescents of Low Income Group (저소득층 아동·청소년 교육복지정책 발전방안)

  • Moon, Aram;Lee, Youn Hwan
    • Journal of Digital Convergence
    • /
    • v.16 no.3
    • /
    • pp.333-344
    • /
    • 2018
  • The purpose of the study is to analyse the management state of three education welfare policies such as education welfare priority support program, Dream Start and after school program, the main education welfare policy for children and adolescent of the low income group and to suggest the development plan for the establishment of the effective and efficient education welfare policy. The study examines the advanced research and uses literature review to meet the purpose. The study draws the problem of each program and suggests the development plan of the education welfare policy for the children and adolescent of the low income group on the basis of the result of the comprehensive analysis. First, the related projects run separately by each government department should be rearranged into an integrated system in order to control comprehensively and together. Second, the system should be established to improve the expertise personnel in charge and increase the employment stability of the private personnel. Third, the authorities should raise the awareness on education and welfare through the connection and the discussion between each institution and the experts. Fourth, a new service model should be invented.

New Nurse's on Reality Shock and Organizational Commitment Convergence Study (신규간호사의 현실충격, 조직몰입 융복합연구)

  • Kim, Won Soon
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.377-386
    • /
    • 2020
  • This study aims to examine the effect of coaching leadership on reality shock and organizational commitment of new nurses in general hospitals. Data were analyzed through the SPSS/WIN 21.0 program using descriptive statistics, t-test, ANOVA, Pearson's correlation coefficients, and Standard Multiple Regression. Regression analysis proved relevance of the organizational commitment model (F=6.17, p<.001), and coaching leadership had 39.2% explanatory power on reality shock. The results of the study showed that coaching leadership lowers reality shock and boosts organizational commitment of new nurses. This study provides necessary background knowledge of human and material resource management to alleviate the reality shock and help vocational adaptation to reduce turnover rates of new nurses. Hence, with such results, this study aims to provide basic information on future coaching leadership research and coaching leader defense program developments.

Analysis of Vessel Traffic in Tokyo Bay Observed by New Remote Radar Network System

  • Okano, Tadashi;Ohtsu, Kohei;Hagiwara, Hideki;Shoji, Ruri;Tamaru, Hitoi;Liu, Shun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.08a
    • /
    • pp.208-216
    • /
    • 2004
  • Since 2000, the authors have been developing remote radar network system to observe the vessel traffic in Tokyo Bay. In December 2002, the first operational remote radar station was set at the National Defense Academy in Yokosuka, and vessel traffic observation was started. However, it was impossible to perform accurate observation in the northern part of Tokyo Bay by this Yokosuka radar station only. In September 2003, the second remote radar station and AIS receiving station were installed at Higashi Ogishima in Kawasaki. This second radar enabled us to carry out accurate observation in that area. Both radars can be remotely controlled from the monitoring station in Tokyo University of Marine Science and Technology. On September 30 and October 1,2003, the vessel traffic observation was carried out using both radars. Combining radar images observed by both radars, the ships' tracks were taken and the dangerous ships were extracted by using SJ value and Bumper Model. The time changes of dangerous ship density in some areas in Tokyo Bay and utilization ratio of the traffic routes were also investigated. In addition, analyzing the AIS date received at Kawasaki station, the positions and speed vectors of the ships equipped with AIS were shown.

  • PDF

A Study on Method for Insider Data Leakage Detection (내부자 정보 유출 탐지 방법에 관한 연구)

  • Kim, Hyun-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.11-17
    • /
    • 2017
  • Organizations are experiencing an ever-growing concern of how to prevent confidential information leakage from internal employees. Those who have authorized access to organizational data are placed in a position of power that could well be abused and could cause significant damage to an organization. In this paper, we investigate the task of detecting such insider through a method of modeling a user's normal behavior in order to detect anomalies in that behavior which may be indicative of an data leakage. We make use of Hidden Markov Models to learn what constitutes normal behavior, and then use them to detect significant deviations from that behavior. Experiments have been made to determine the optimal HMM parameters and our result shows detection capability of 20% false positive and 80% detection rate.

Software Development Effort Estimation Using Partition of Project Delivery Rate Group (프로젝트 인도율 그룹 분할 방법을 이용한 소프트웨어 개발노력 추정)

  • Lee, Sang-Un;No, Myeong-Ok;Lee, Bu-Gwon
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.259-266
    • /
    • 2002
  • The main issue in software development is the ability of software project effort and cost estimation in the early phase of software life cycle. The regression models for project effort and cost estimation are presented by function point that is a software sire. The data sets used to conduct previous studies are of ten small and not too recent. Applying these models to 789 project data developed from 1990 ; the models only explain fewer than 0.53 $R^2$(Coefficient of determination) of the data variation. Homogeneous group in accordance with project delivery rate (PDR) divides the data sets. Then this paper presents general effort estimation models using project delivery rate. The presented model has a random distribution of residuals and explains more than 0.93 $R^2$ of data variation in most of PDR ranges.

Design of Decentralized $H^\infty$ Filter using the Generalization of $H^\infty$ Filter in Indefinite Inner Product Spaces (부정 내적 공간에서의$H^\infty$ 필터의 일반화를 통한 분산 $H^\infty$ 필터의 설계)

  • Kim, Gyeong-Geun;Jin, Seung-Hui;Yun, Tae-Seong;Park, Jin-Bae
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.6
    • /
    • pp.735-746
    • /
    • 1999
  • We design the robust and inherently fault tolerant decetralized$$H^infty$$ filter for the multisensor state estimation problem when there are insufficient priori informations on the statistical properties of external disturbances. For developing the proposed algorithm, an alternative form of suboptimal$$H^infty$$ filter equations are formulated by applying an alternative form of Kalman filter equations to the indefinite inner product space state model of suboptimal$$H^infty$$ filtering problems. The decentralized$$H^infty$$ filter that consists of local and central fusion filters can be designed effciently using the proposed alternative$$H^infty$$ filiter gain equations. The proposed decentralized$$H^infty$$ filter is robust against un-known external disturbances since it bounds the maximum energy gain from the external disturbances to the estimation errors under the prescribed level$$r^2$$ in both local and central fusion filters and is also fault tolerant due to its inherent redundancy. In addition, the central fusion equations between the global and local data can reduce the unnecessary calculation burden effectively. Computer simulations are made to ceritfy the robustness and fault tolerance of the proposed algorithm.

  • PDF