• Title/Summary/Keyword: Information Transferring

Search Result 404, Processing Time 0.429 seconds

The Development of Dual Transcutaneous Energy Transmission System (DTET) for Total Artificial Heart (인공심장용 병렬 무선에너지 전송장치의 개발)

  • Choi, S.W.;Chung, J.H.;Ahn, J.M.;Min, B.G.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1998 no.11
    • /
    • pp.239-240
    • /
    • 1998
  • DTET(Dual Transcutaneous Energy Transmission System) is the stable power transferring unit for TAH(Total Artificial Heart) which uses more power than any other artificial organ. It has better efficiency and safety than an ordinary single TET. By reducing the load, it can reduce the change of supplying current for each single TET and it causes the lower change of efficiency. The increment of magnetic flux in coils enables delivering power through thick skin. It can enable internal batteries remove when will be used in a failure of TET, for a lithium ion battery has heavier weight than TET. A DTET should be studied the effect between each coils that generate magnetic flux. It should be compared the advantage with the weakness when it is used.

  • PDF

An Empirical Study on the Detection of Phantom Transaction in Online Auction (온라인 경매에의 카드깡 탐지요인에 대한 실증적 연구)

  • Chae Myeong-Sin;Jo Hyeong-Jun;Lee Byeong-Chae
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.68-98
    • /
    • 2004
  • Although the internet is useful for transferring information, Internet auction environments make fraud more attractive to offenders because the chance of detection and punishment are decreased. One of fraud is phantom transaction which is a colluding transaction by the buyer and seller to commit illegal discounting of credit card. They pretend to fulfill the transaction paid by credit card, without actual selling products, and the seller receives cash from credit card corporations. Then seller lends it out buyer with quite high interest rate whose credit score is so bad that he cannot borrow money from anywhere. The purpose of this study is to empirically investigate the factors to detect of the phantom transaction in online auction. Based up on the studies that explored behaviors of buyers and sellers in online auction, bidding numbers, bid increments, sellers' credit, auction length, and starting bids were suggested as independent variables. We developed an Internet-based data collection software agent and collect data on transactions of notebook computers each of which winning bid was over 1,000,000 won. Data analysis with logistic regression model revealed that starting bids, sellers' credit, and auction length were significant in detecting the phantom transaction.

  • PDF

An Empirical Study on the Detection of Phantom Transaction in Online Auction (온라인 경매에서의 신용카드 허위거래 탐지 요인에 대한 실증 연구)

  • Chae Myungsin;Cho Hyungjun;Lee Byungtae
    • Korean Management Science Review
    • /
    • v.21 no.2
    • /
    • pp.273-289
    • /
    • 2004
  • Although the Internet is useful for transferring information, Internet auction environments make fraud more attractive to offenders, because the chance of detection and punishment is decreased. One of these frauds is the phantom transaction, which is a colluding transaction by the buyer and seller to commit the illegal discounting of a credit card. They pretend to fulfill the transaction paid by credit card, without actually selling products, and the seller receives cash from the credit card corporations. Then the seller lends it out with quite a high interest rate to the buyer, whose credit rating is so poor that he cannot borrow money from anywhere else. The purpose of this study is to empirically investigate the factors necessary to detect phantom transactions in an online auction. Based upon studies that have explored the behaviors of buyers and sellers in online auctions, the following have been suggested as independent variables: bidding numbers, bid increments, sellers' credit, auction lengths, and starting bids. In this study. we developed Internet-based data collection software and collected data on transactions of notebook computers, each of which had a winning bid of over W one million. Data analysis with a logistic regression model revealed that starting bids, sellers' credit, and auction length were significant in detecting the phantom transactions.

A Study on an Automatical BKLS Measurement By Programming Technology

  • Shin, YeounOuk;Kim, KiBum
    • International journal of advanced smart convergence
    • /
    • v.7 no.3
    • /
    • pp.73-78
    • /
    • 2018
  • This study focuses on presenting the IT program module provided by BKLS measure in order to solve the problem of capital cost due to information asymmetry of external investors and corporate executives. Barron at al(1998) set up a BKLS measure to guide the market by intermediate analysts. The BKLS measure was measured by using the changes in the analyst forecast dispersion and analyst mean forecast error squared. This study suggests a model of the algorithm that the BKLS measure can be provided to all investors immediately by IT program in order to deliver the meaningful value in the domestic capital market as measured. This is a method of generating and analyzing real-time or non-real-time prediction models by transferring the predicted estimates delivered to the Big Data Log Analysis System through the statistical DB to the statistical forecasting engine. Because BKLS measure is not carried out in a concrete method, it is practically very difficult to estimate the BKLS measure. It is expected that the BKLS measure of Barron at al(1998) introduced in this study and the model of IT module provided in real time will be the starting point for the follow-up study for the introduction and realization of IT technology in the future.

A Simulation-Based Study of FAST TCP Compared to SCTP: Towards Multihoming Implementation Using FAST TCP

  • Arshad, Mohammad Junaid;Saleem, Mohammad
    • Journal of Communications and Networks
    • /
    • v.12 no.3
    • /
    • pp.275-284
    • /
    • 2010
  • The current multihome-aware protocols (like stream control transmission protocol (SCTP) or parallel TCP for concurrent multipath data transfer (CMT) are not designed for high-capacity and large-latency networks; they often have performance problems transferring large data files over shared long-distance wide area networks. It has been shown that SCTP-CMT is more sensitive to receive buffer (rbuf) constraints, and this rbuf-blocking problem causes considerable throughput loss when multiple paths are used simultaneously. In this research paper, we demonstrate the weakness of SCTP-CMT rbuf constraints, and we then identify that rbuf-blocking problem in SCTP multihoming is mostly due to its loss-based nature for detecting network congestion. We present a simulation-based performance comparison of FAST TCP versus SCTP in high-speed networks for solving a number of throughput issues. This work proposes an end-to-end transport layer protocol (i.e., FAST TCP multihoming as a reliable, delaybased, multihome-aware, and selective ACK-based transport protocol), which can transfer data between a multihomed source and destination hosts through multiple paths simultaneously. Through extensive ns-2 simulations, we show that FAST TCP multihoming achieves the desired goals under a variety of network conditions. The experimental results and survey presented in this research also provide an insight on design decisions for the future high-speed multihomed transport layer protocols.

The VMDC(View, Model, Dispatcher, Controller) Architecture for Products Management (물품관리를 위한 VMDC(View, Model, Dispatcher, Controller) 아키텍처)

  • Kim, Da-Jeong;Lee, Eun-Ser
    • The KIPS Transactions:PartD
    • /
    • v.16D no.6
    • /
    • pp.881-888
    • /
    • 2009
  • This research introduces the architecture of managing products based software. There are many of the architectures for managing products using software instead of manpower. In case of MVC and existing architectures, The architectures transfer redundant data so the architectures cause a problem that unnecessary data moved. This research presents VMDC(View, Model, Dispatcher, Controller) architecture to solve the problem. Dispatcher of VMDC grasps necessary data and reconstructs objects to efficient transferring data. This research shows usecase that designed VMDC(View, Model, Dispatcher, Controller) and demonstrate efficiency of VMDC(View, Model, Dispatcher, Controller) together. after demonstration this research present with next research.

An Address Autoconfiguration Algorithm of Mobile IPv6 through Internet Gateway in Ad-Hoc Networks (Mobile IPv6기반 Ad-Hoc 네트워크에서의 Internet Gateway를 통한 IP주소 자동 할당 방법)

  • Choi Jung-Woo;Park Sung-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.150-155
    • /
    • 2006
  • A hybrid Ad-hoc network connected to the Internet needs an IP address configuration to communicate with the Internet. Most of proposed address autoconfiguration algorithms are node based. The node based address autoconfiguration algorithms waste bandwidth and consume much battery in mobile ad-hoc networks. In this paper, we propose the address allocation algorithm in hybrid Mobile ad-hoc network (MANET). The proposed algorithm reduces network traffic by transferring address configuration packet to the internet gateway by unicast method. Moreover, our IP address configuration algorithm also reduces battery consumption and address configuration time by decreasing number of configuration packets on internet gateway.

Optical Visual Cryptography based on Binary Phase Exctraction JTC (BPEJTC를 이용한 광 비쥬얼 크립토그래피)

  • 이상이;이승현
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.8
    • /
    • pp.589-597
    • /
    • 2003
  • Visual cryptography made it possible to decrypt thresholding scheme with not digital system but human vision system. This method, however, has some limit in it. Optical visual cryptography was proposed which used laser instead of human eyesight. As a result, it was possible to adapt cryptography to optical system. However, it also had some difficulties because it did not overcome the existing problem of visual cryptography completely. These problems occurred in the process of transferring data processing system from visual to optics. Therefore, it is appropriate to approach these problems in terms of optics. This paper analyzes the level of noise and the security characteristics for optical visual cryptography in terms of frequency based on joint transform correlator.

The Emergency Care Experience and Demand for Support of School Nurse (보건교사의 응급간호 경험과 지원요구)

  • Yoon, Jae Hee;Lee, In Sook
    • Research in Community and Public Health Nursing
    • /
    • v.28 no.2
    • /
    • pp.182-195
    • /
    • 2017
  • Purpose: This study explores school nurses' emergency care experiences and their needs for systemic institutional support. Methods: Data were collected in 2016 from the interviews with five focus groups comprising thirty school nurses. Qualitative content analysis was then performed using the collected data. Results: The study found that school nurses were vulnerable to over-reaction in uncertain situations as the school's sole health service provider. The study's findings are divided into ten categories. 1) Major obstacles to overcome as the sole health service provider, 2) Assessing an uncertain situation and making appropriate decisions, 3) Providing limited first aid while maintaining control over the situation, 4) Referring or transferring a student to a hospital that creates tensions and raises cost, 5) Becoming an advocate for information disclosure and treatment, 6) Ensuring follow-up actions and proper transfer of responsibility, 7) Making preparations for future emergency, 8) Responding to conflicts arising from over-reaction as a safeguard and professional expertise, 9) Need for the development of standardized manual for school emergency care, 10) Need for practical case-based training. Conclusion: The findings of this study should contribute to the development of the programs aimed at improving school emergency care and the professional competence of school nurse.

A Study on the Wireless Control System for the Shunting Route Indicator Applied with LTE-R technology (LTE-R 기술을 적용한 입환진로표시기 무선제어시스템 연구)

  • Suh, Ki-Bum;Im, Chul-Hoo;Lee, Kwang-Hee;Oa, Seong-Wook;Joeng, Wang-Kuk
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.1
    • /
    • pp.229-236
    • /
    • 2017
  • The railway has recently been expanded with the phase of the future transportation. Accordingly, using the new technologies such as smart devices and LTE-R, the needs for reducing operational costs and improving passenger services have emerged. To realize these needs, the government is pushing to build the dedicated wireless network for the railway systems. In this paper, the shunting route indicator was selected for this study because it has the best effect for the wireless system removed lots of wired cables. And the wireless shunting route indicator applied with LTE-R technology was developed to replace the current wired control system. The functional goal(the wireless control function applied LTE-R), the performance goal(less than 300ms for transferring the control information), and the reliability goal(over the 100,000 hours for MTBF) were set, and these goals were achieved and demonstrated through the test and validation.