• Title/Summary/Keyword: IoT 결함

Search Result 645, Processing Time 0.032 seconds

Characteristics by deposition and heat treatment of Cr and Al thin film on stainless steel (금속 기판위에 Cr과 Al 증착 및 열처리 융합 기술에 의한 표면 형상 변화)

  • Kim, Kyoung-Bo;Lee, Jongpil;Kim, Moojin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.167-173
    • /
    • 2021
  • There is an increasing interest in manufacturing various electronic devices on a bendable substrate. In this paper, we observed a surface morphology by annealing for 20 minutes at temperatures of 150 ℃, 350 ℃, and 550 ℃, respectively, with samples coated by chromium and aluminum. Data on surfaces are investigated using high-resolution SEM and AFM that can measure roughness up to nm. There is no difference from the sample without heat treatment up to 350 ℃, but the change of crystal grains can be observed at 550 ℃. In the future, for application to the flexible optoelectronic field, additional characteristics such as electrical conductivity and reflectivity will be analyzed and optical devices will be manufactured. In conclusion, we will explore the possibility of applying metal materials to flexible electronic devices.

Development of Photonic Quantum Ring Device with Different Oscillation Characteristics for Driving with Secondary Battery (이차전지로 구동하기 위한 다른 발진 특성을 나타내는 조명용 광양자테 소자 개발)

  • Kim, Kyoung-Bo;Lee, Jongpil;Kim, Moojin
    • Journal of Digital Convergence
    • /
    • v.19 no.11
    • /
    • pp.341-349
    • /
    • 2021
  • We studies to verify results similar to those of previous experiments, and their potential as a lighting device through optical characteristics experiments and resonance and optical characteristics simulations of array devices. The photonic quantum ring (PQR) device having a mesa diameter of 40 ㎛ and an internal hole diameter of 3 ㎛ was fabricated. Through the near-field observation of the fabricated device, it was found that the PQR device operates even at ㎂, and also that the mesa and hole devices are driven independently of each other. As a result of measuring the wavelength spectrum of the device according to the location, the coupling phenomenon due to mesa and holes was confirmed.

Analyzing the Determinants of Performance in Government Research Institutes Using Fuzzy Set Qualitative Comparative Analysis(fsQCA) (퍼지집합 질적 비교 분석을 활용한 정부출연연구기관의 성과에 대한 결정요인 분석)

  • Junyeong Lee;Dongyeon Kim;Minwoo Jeong;Boram Kwon
    • Information Systems Review
    • /
    • v.26 no.1
    • /
    • pp.251-268
    • /
    • 2024
  • In the Fourth Industrial Revolution era, global powers are enhancing R&D support to leverage innovations like AI, IoT, and big data for productivity gains and structural economic and social reforms. Yet, the declining R&D budget growth rate and the forecasted sharp cut in South Korea's R&D budget in 2024 highlight the critical need for national R&D performance management system discussions. Diverging from previous studies focused on quantitative analysis of performance determinants, this research utilizes fuzzy set qualitative comparative analysis(fsQCA) to explore the interplay of factors affecting research institutions' outcomes comprehensively. Analyzing data from 2018 to 2022, it examines three outcome types of research institutions, identifying factor combinations crucial for success. By pinpointing these factors' configurations, the study offers institution-specific performance enhancement guidelines and insights for national R&D policy management and performance evaluation efficiency.

Study into prosodic morphological analysis in Korean and Standard Chinese partial reduplication and contrastive analysis using optimality theory (한국어와 표준 중국어 부분 중첩 의성·의태어에 대한 운율 형태론적 분석의 문제와 최적성 이론적 분석을 통한 대조 분석)

  • Chang, Jae-Woong
    • Cross-Cultural Studies
    • /
    • v.49
    • /
    • pp.275-301
    • /
    • 2017
  • Based on the previous analysis by Wanghongjun(2008), this paper applies Optimality Theory (OT) to the field of partial reduplication in Korea to increase its scientific validity. Toward this end, I propose an alternative analysis of Korean partial reduplication, applied as a single process of prefixation. Reduplicated words by prefixation are divided into two types: with a heavy syllable of the stem, and another with the stem. The two types of partial reduplication are closely related by the sound features. In addition, I discussed Chinese partial reduplication from a prefixation perspective within the framework of OT and performed contrastive analysis of Korean and Standard Chinese processes of reduplication by focusing on constrained rankings. As a result, the alternative analysis showed a systematic relationship among the reduplicated words in Korean and Standard Chinese. Lastly, I explained that the coronal /t/ and liquid /l/ have a special functional hierarchy in both languages. This study can be re-explained based on the framework of OT according to a few major constraints, involving MAX-BR, MAX-IO. Their rankings show the adequacy of analysis.

Paradigm Shift and Response Strategies for Spatial Information in a Hyper-connected Society (초연결 시대 공간정보 패러다임 변화와 대응전략)

  • SAKONG, Ho-Sang
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.4
    • /
    • pp.81-90
    • /
    • 2018
  • The 'Hyper-connected society' in which all objects such as people, device, place are connected via networks and share information being realized. As the information and communication environment changes, spatial information also faces a significant challenge. Korean government is striving to meet the social demand for spatial information that will bring 'Hyper-connectivity' such as autonomous vehicles, drones. Until now, however, it has only partially responded to urgent demand and has not prepared a fundamental countermeasure. In order to effectively and actively respond to the demand for spatial information that is needed in the Hyper-connected society, a strategy that can lead to mid- to long-term fundamental changes is needed. The purpose of this study is to analyze the future demand and application characteristics of spatial information confronted with a big paradigm shift called 'Hyper-connected society', and to search spatial information strategy that can cope with the demand of spatial information in future society.

Developments of Local Festival Mobile Application and Data Analysis System Applying Beacon (비콘을 활용한 위치기반 지역축제 모바일 애플리케이션과 데이터 분석 시스템 개발)

  • Kim, Song I;Kim, Won Pyo;Jeong, Chul
    • Korea Science and Art Forum
    • /
    • v.31
    • /
    • pp.21-32
    • /
    • 2017
  • Local festivals form the regional cultures and atmosphere of communication; they increase the demand of domestic tourism businesses and thus, have an important role in ripple effects (e.g. regional image improvement, tourist influx, job creation, regional contents development, and local product sales) and economic revitalization. IoT (Internet of Thing) technologies have been developed especially, beacon-one of the IoT services has been applied as plenty of types and forms both domestically and internationally. However, notwithstanding expansion of current digital mobile technologies, it still remains as difficult for the individual to track the information about all the local festivals and to fulfill the tourists' needs of enjoying festivals given the weak strategic approaches and advertisement activities. Furthermore, current festival-related mobile applications don't function well as delivering information and have numerous contents issues (e.g. ways of information delivery within the festival places, independent application usage for each festival, one time usage due to one time event). This research, based on the background mentioned above, aims to develop the local festival mobile application and data analysis system applying beacon technology. First of all, three algorithms were developed, namely, 'festival crowding algorithm', 'visitor stats algorithm', and 'customized information algorithm', and then beta test was followed with the developed application and data analysis system. As a result, they could form the database of visitors' types and behaviors, and provide functions and services, such as personalized information, waiting time for festival contents, and 'hot place' function. Besides, in Google Play store, they also got the titles given with more than 13,000 downloads within first three months and as the most exposed application related with festivals; and, thus, got credited with their marketability and excellence. This research follows this order: chapter 2 shows the literature review of local festival related with technology development, beacon service, and festival application. In Chapter 3, design plans and conditions are described of developing local festival mobile application and data analysis system with beacon. Chapter 4 evaluates the results of the beta performance test to verify applicability of the developed application and data analysis system, and lastly, chapter 5 explains the conclusion and suggests the future research.

An Architecture of the Military Aircraft Safety Check System Using 4th Industrial Revolution Technology (4차 산업혁명기술을 활용한 군 항공기 안전점검 체계 설계)

  • Eom, Jung-Ho
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.145-153
    • /
    • 2020
  • The aviation safety policy master plan is promoting the development of aviation safety management technology applying the 4th industrial revolution technology with the goal of establishing a flawless aviation safety management system and establishing a future aviation safety infrastructure. The master plan includes the establishment of various aviation safety management systems such as aircraft fault management using AI & Big data and flight training system using VR/AR. Currently, the Air Force is promoting a flight safety management system using new technology under the goal of building smart air force. Therefore, this study intends to apply the 4th Industrial Revolution technology to the aircraft condition check system that finally checks the safety of the aircraft before flight. The Air Force conducts airframe flaw checks and pre-flight aircraft check. In this study, we architect the airframe flaw check system using AI and drones, and the pre-flight aircraft condition check system using the IoT and big data for more precise and detailed check of aircraft condition and flawlessness check.

Research on major technology trends in the field of financial security through Korea and foreign patent data analysis (국내외 특허 데이터 분석을 통한 금융보안 분야 주요 기술 동향 분석연구)

  • Chae, Ho-Kuen;Lee, Jooyeoun
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.53-63
    • /
    • 2020
  • Electronic financial transactions are also actively increasing due to the rapid spread of information communication media such as the Internet, smart devices, and IoT, but as a derivative by-product, threats of financial security such as leakage of various personal information and hacking are also increasing. Therefore, the importance of financial security against this is increasing, but in Korea, financial security technology is relatively insufficient compared to advanced countries in the field of financial security, such as Active-X. Therefore, this study aims to present the major development direction in the domestic financial security field by comparing key technology trends with IPC classification frequency analysis, keyword frequency analysis, and keyword network analysis based on domestic and foreign financial security-related patent data. In conclusion, it seems that recent domestic and foreign trends have focused on the development of related technologies according to the development of smart device-based electronic financial services. Accordingly, it is intended to be used as the basis data for technology development of financial security by mapping the trend of financial security research trend and technology trend analysis through thesis data analysis that reflects the research of the preceding aspect as the technology of commercialization in the future.

A Design of PRESENT Crypto-Processor Supporting ECB/CBC/OFB/CTR Modes of Operation and Key Lengths of 80/128-bit (ECB/CBC/OFB/CTR 운영모드와 80/128-비트 키 길이를 지원하는 PRESENT 암호 프로세서 설계)

  • Kim, Ki-Bbeum;Cho, Wook-Lae;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1163-1170
    • /
    • 2016
  • A hardware implementation of ultra-lightweight block cipher algorithm PRESENT which was specified as a standard for lightweight cryptography ISO/IEC 29192-2 is described. The PRESENT crypto-processor supports two key lengths of 80 and 128 bits, as well as four modes of operation including ECB, CBC, OFB, and CTR. The PRESENT crypto-processor has on-the-fly key scheduler with master key register, and it can process consecutive blocks of plaintext/ciphertext without reloading master key. In order to achieve a lightweight implementation, the key scheduler was optimized to share circuits for key lengths of 80 bits and 128 bits. The round block was designed with a data-path of 64 bits, so that one round transformation for encryption/decryption is processed in a clock cycle. The PRESENT crypto-processor was verified using Virtex5 FPGA device. The crypto-processor that was synthesized using a $0.18{\mu}m$ CMOS cell library has 8,100 gate equivalents(GE), and the estimated throughput is about 908 Mbps with a maximum operating clock frequency of 454 MHz.

Effects of Information Overload to Information Privacy Protective Response in Internet of Things(Iot) (사물인터넷 시대의 개인정보과잉이 정보프라이버시 보호반응에 미치는 영향)

  • So, Won-Geun;Kim, Ha-Kyun
    • Management & Information Systems Review
    • /
    • v.36 no.1
    • /
    • pp.81-94
    • /
    • 2017
  • In the age of information overload such as Internet of Things(IoT), big data, and cloud computing, Data and informations are collected to processed regardless of the individual's will. The purpose of this paper presents a model related to personal information overlord, information privacy risk, information privacy concern (collection, control, awareness) and personal information privacy protective response. The results of this study is summarized as follows. First, personal information overload significantly affects information privacy risk. Second, personal information overload significantly affects information privacy concern(collection, control, awareness) Third, information privacy risk significantly affects collection and awareness among information privacy concern, but control does not significantly affects. This results shows that users are cognitively aware the information risk through collection and awareness of information. Users can not control information by self, control of information does not affects. Last, information privacy concern(collection and awareness significantly affect information privacy protective response, but information privacy concern (control) does not affect. Personal information users are concerned about information infringement due to excessive personal information, ability to protect private information became strong.

  • PDF