• Title/Summary/Keyword: Effectiveness secure

Search Result 287, Processing Time 0.022 seconds

Development of Teaching Methods to Improve Mathematical Capabilities for Electronics Engineering

  • LEE, Seung-Woo;LEE, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.120-126
    • /
    • 2021
  • The importance of mathematics is emerging to create new values and secure competitiveness in an intelligent information society based on the Fourth Industrial Revolution. This study was conducted with the aim of improving the academic performance and increasing interest of electronics majors in mathematics subjects. In order to develop learners' mathematical capabilities in major fields that utilize mathematics that electronics majors do not prefer, we have proposed a new teaching method to promote employment in mathematics-based electronics fields. In addition, to enhance learners' self-directed learning, we developed teaching methods for efficient mathematics subjects with programming languages as tools in electronics engineering and applied them to real-world teaching sites to effectively cultivate academic performance improvement of majors. Finally, we conducted a survey and statistically analyze the effectiveness of the developed teaching methods to present effective operational measures for mathematics education, an essential tool in intelligent information technology.

Obstacle-avoidance Algorithm using Reference Joint-Velocity for Redundant Robot Manipulator with Fruit-Harvesting Applications

  • Y.S. Ryuh;Ryu, K.H.
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 1996.06c
    • /
    • pp.638-647
    • /
    • 1996
  • Robot manipulators for harvesting fruits must be controlled to track the desired path of end-effector to avoid obstacles under the consideration of collision free area and safety path. This paper presents a robot path control algorithm to secure a collision free area with the recognition of work environments. The flexible space, which does not damage fruits or branches of tree due to their flexibility and physical properties , extends the workspace. Now the task is to control robot path in the extended workspace with the consideration of collision avoidance and velocity limitation at the time of collision concurrently. The feasibility and effectiveness of the new algorithm for redundant manipulators were tested through simulations of a redundant manipulator for different joint velocities.

  • PDF

Analytic Hierarchy Process-Based Prioritization in Expanding Health Insurance Benefit Package: in Case of Four Major Serious Diseases (Analytic Hierarchy Process를 이용한 건강보험 급여 우선순위 결정: 4대 중증질환 비급여항목을 중심으로)

  • Jeong, Hyoung-Sun;Cho, Jae-Young;Ko, Hey-Jin
    • Health Policy and Management
    • /
    • v.24 no.2
    • /
    • pp.181-190
    • /
    • 2014
  • Background: Demands are recently rising for the securement of procedural justification of policy decision-making. This study aims to improve the procedure of making a decision to expand health insurance benefit package from the perspective of building a social consensus. Methods: Major priority principles were firstly derived through literature search. Weights for such principles were calculated through an analytic hierarchy process, based upon the survey conducted for the health policy experts. Priority for 11 non-covered services was assessed by applying the weights as above to the results of the questionnaire survey targeted at people including members of related committees or societies. Results: Weights for priority principles were in the order of 'severity/urgency (0.428)', 'cost-effectiveness (0.318)', 'substitutability (0.164),' and 'accountability (0.090)'. What was obtained by applying these weights to the results of the questionnaire survey was considerably in line with what health experts classified those items into 3 groups depending on their own judgement of service necessity (consistent with 9 services out of 11). Conclusion: Results of the study are suggestive as to how far a brief assessment by experts could be utilized in case there are constraints on time and expenses in implementing all the process to secure procedural justification. Various attempts and endeavors need to be made to secure procedural justification that will not mar efficiency of decision-making in the days to come.

Analysis of Effectiveness for Water Cycle and Cost-Benefit according to LID Application Method in Environmentally-Friendly Village (친환경시범마을의 LID 적용에 따른 물순환 효과 및 비용편익 분석)

  • Baek, Jongseok;Lee, Sangjin;Shin, Hyunsuk;Kim, Hyungsan
    • Journal of Korean Society on Water Environment
    • /
    • v.34 no.1
    • /
    • pp.57-66
    • /
    • 2018
  • Water disasters such as flash floods and inundation caused by localized heavy rainfall in urban areas have a large impact on climate change but are also closely related to the increase in impervious areas as pointed out in domestic and international studies. It is difficult to secure natural green areas in urban areas that have already been developed. So, urban regeneration can be expected using water management optimized with technologies to secure infiltration and storage capacity such as Low-Impact Development technology. In this study, the water cycle improvement ability was confirmed by applying the LID technology within the district unit plan of the environmentally friendly village, and the economic feasibility of LID application was analyzed by estimating the costs and benefits of installing the facilities. The site was planned to conserve sufficient green and plans for securing the watershed infiltration and storage capacity were formulated with the application of additional LID technology, such as infiltration trenches, rain barrels and permeable pavements. The LID design method applicable to the site was established, and the water balance of the watershed was analyzed through simulations of the SWMM model. The water circulation improvement effect was confirmed through the water balance analysis, and the cost-benefits were determined according to the estimation method, and the economic analysis was conducted. This study confirms that the investment of LID technology is economically feasible for the hydrological improvement effect of the housing complex.

A Study on Security of E-Government Service Based on Web Service (웹 서비스 기반의 전자정부 서비스 보안에 관한 연구)

  • Lee Eun-Seon;Yang Jin-Seok;Lim Jung-Muk;Moon Ki-Young;Lee Jae-Seung;Chung Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.347-360
    • /
    • 2005
  • E-Government service is national project that is necessary for international competitiveness, openness of government and effectiveness of governmental work process. E-Government security is very important because it treats data has relatively high sensitivity. But, until now, the development point of E-Government service has been limited to only it's contents and infrastructure based on web without consideration of E-Government security. Lately research for E-Government security has been studied by some advanced country of E-Government service, but it is insufficient. To construct E-Government security based on web Infra, first of all, analysis of web service security technology is needed to precede. And then research for appling the technology to E-Government service are required. We propose secure E-Government service scenario with web service security technology based on development stages of E-Government service. We also suggest overall view and secure scenario of E-Government service in Integrated Computing Environment.

A Multi-Level Access Control Scheme on Dynamic Multicast Services (동적 멀티캐스트 서비스상의 다단계 접근통제 기법)

  • 신동명;박희운;최용락
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.47-58
    • /
    • 2002
  • The access control techniques, which can control unauthorized members to access to multicast service, have not been studied very often while there are a lot of on-going study on secure multicast architecture, multicast key distribution and sender authentication scheme have been studied. Multi level access control scheme in multicast can be used in a remote secure conference or to provide graduated multimedia services to each customers. In fact, multicast network has its own virtual networks according to different security levels. However, Early schemes are not effective when it protects unauthorized access in multi-access network environment. Furthermore this scheme does not provide us with hierarchical access control mechanism. This paper, therefore, proposes hierarchical access control scheme to provide the effectiveness in network layer by security level comparison. And we also suggests hierarchical key distribution scheme for multi level access control in application layer and effective hierarchical key renewal scheme in dynamic multicast environment which is easy to join and leaving the multicast group.

A Study on the Activation Plan of Village Maintenance for Public Housing Project of Local Small and Medium-Sized Cities (지방 중소도시 마을정비형 공공주택사업 활성화 방안 연구)

  • Kang, Dong-Ryeol;Ahn, Jung-Geun;Bae, Min-Cheul
    • Journal of Korean Society of Rural Planning
    • /
    • v.28 no.2
    • /
    • pp.21-32
    • /
    • 2022
  • Since the village maintenance type public housing project was introduced in 2015, the resident needs for regional revitalization and pleasant living conditions are not being met due to the poor performance of the public housing complexes that reflect the surrounding area maintenance plan (village plan) and regional characteristics. The purpose of this study is to suggest a plan to revitalize the village maintenance type public housing project in consideration of regional characteristics as a result of analyzing the needs of local residents through the problems of the village maintenance type public housing project being promoted so far and resident satisfaction. As a result of the analysis based on the public housing project implementation status analysis and resident satisfaction, the plans to activate the village maintenance type public housing project are as follows. First, in order to secure the effectiveness of the village plan, it is desirable to promote the public housing project and the village plan at the same time. It is necessary to secure a budget according to the selection of public offering projects in the village plan, such as promoting public housing projects without setbacks by prioritizing land purchases for public housing sites and establishing specialized strategies considering regional characteristics. Second, a public housing project that responds to local demand is required. The evaluation factors such as continuous promotion of the urban architecture integration plan and strengthening of regional linkage plans such as specialization of regionally tailored designs should be supplemented so that regional resources and village plans are linked with the public housing specialization plan. Third, surrounding area maintenance plan (village plan) should be secured by the strengthen of the legal status or establishing related provisions. It is also necessary to promote system improvement for area maintenance plan (village plan) when selecting a publicly funded public project.

Analysis of Data Isolation Methods for Secure Web Site Development in a Multi-Tenancy Environment (멀티테넌시 환경에서 안전한 웹 사이트 개발을 위한 데이터격리 방법 분석)

  • Jeom Goo Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.35-42
    • /
    • 2024
  • Multi-tenancy architecture plays a crucial role in cloud-based services and applications, and data isolation within such environments has emerged as a significant security challenge. This paper investigates various data isolation methods including schema-based isolation, logical isolation, and physical isolation, and compares their respective advantages and disadvantages. It evaluates the practical application and effectiveness of these data isolation methods, proposing security considerations and selection criteria for data isolation in the development of multi-tenant websites. This paper offers important guidance for developers, architects, and system administrators aiming to enhance data security in multi-tenancy environments. It suggests a foundational framework for the design and implementation of efficient and secure multi-tenant websites. Additionally, it provides insights into how the choice of data isolation methods impacts system performance, scalability, maintenance ease, and overall security, exploring ways to improve the security and stability of multi-tenant systems.

Difference Across Indutries of Innovation Appropriability Mechanism's Effectiveness and Classification (기술혁신 보상확보 메커니즘 효과성의 산업별 차이와 유형)

  • Park, Seong Taek;Kim, Young Ki
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.135-144
    • /
    • 2014
  • In devising technological innovation strategies and implementing successful technological innovation, some of the most important factors may be to determine whether to protect technological innovation and to choose how to protect it. Traditionally, technological innovation has been emphasized to obtain compensation as much as possible for innovation in terms of economics and strategy. However, it can be regarded as a very complicated problem to determine such a protection and its level. Generally speaking, enterprises have some common mechanisms to secure compensation for technological innovation, which are known to be patents, secrecy and lead time advantage. From the standpoint of enterprises, it is very important what strategies should be devised to secure profits for technological innovation. According to some domestic and oversea research results revealed that specific patents are not the best way to Appropriability for technological innovation, while also implying that there exist several different kinds of mechanisms to Appropriability for technological innovation in each industry. Nevertheless, since it shouldn't be ignored that most of the researches have overlooked the characteristics of Korean enterprises and industrial differences, this study intends to clarify the effectiveness of technological innovation Appropriability mechanisms reflecting actual circumstances and industrial characteristics in Korea while classifying them. Also The questionnaires and delphi method used in this study. As the result of analysis, in the entire industries, the priorities turned out to be in the order of Superior sales and service efforts, Leadtime advantage, Complementary manufacturing.

Partial Path Selection Method in Each Subregion for Routing Path Optimization in SEF Based Sensor Networks (통계적 여과 기법 기반 센서 네트워크에서 라우팅 경로 최적화를 위한 영역별 부분 경로 선택 방법)

  • Park, Hyuk;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.108-113
    • /
    • 2012
  • Routing paths are mightily important for the network security in WSNs. To maintain such routing paths, sustained path re-selection and path management are needed. Region segmentation based path selection method (RSPSM) provides a path selection method that a sensor network is divided into several subregions, so that the regional path selection and path management are available. Therefore, RSPSM can reduce energy consumption when the path re-selection process is executed. However, it is hard to guarantee optimized secure routing path at all times since the information using the path re-selection process is limited in scope. In this paper, we propose partial path selection method in each subregion using preselected partial paths made by RSPSM for routing path optimization in SEF based sensor networks. In the proposed method, the base station collects the information of the all partial paths from every subregion and then, evaluates all the candidates that can be the optimized routing path for each node using a evaluation function. After the evaluation process is done, the result is sent to each super DN using the global routing path information (GPI) message. Thus, each super DN provides the optimized secure routing paths using the GPI. We show the effectiveness of the proposed method via the simulation results. We expect that our method can be useful for the improvement of RSPSM.