• 제목/요약/키워드: Most powerful

검색결과 1,256건 처리시간 0.024초

동아시아에서의 미국과 중국의 군사경쟁과 한국안보 (U.S. and China's Military Competition in east-Asia and Korea's Security)

  • 박응수;고광섭
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2012년도 추계학술대회
    • /
    • pp.214-218
    • /
    • 2012
  • 중국이 명실상부한 세계적 강대국으로 부상하고 있다. 2011년 현재 보편적 국력으로 보았을 때 중국은 미국 다음으로 강한 국력을 가진 국가로 아시아를 넘어 세계적인 패권국으로 성장하고 있다. 중국이 이와 같은 강대국으로 부상하면서 동아시아에서 미국중심의 국제정치질서가 도전받고 있으며, 특히 동아시아 해양패권을 놓고 기존의 패권국인 미국과 경쟁이 본격화 되고 있다. 이러한 중국과 미국과의 경쟁은 동아시아의 해양을 무대로 진행되고 있어 해양을 통해 국가의 안전과 번영을 유지하고 있는 해양국가인 한국의 안보에 직접적인 영향을 미치고 있다. 중국의 부상에 따른 동아시아 해양에서의 미-중 군사경쟁 배경과 현황, 그리고 이러한 경쟁이 동아시아와 한국안보에 미치는 영향과 대책을 모색해 본다.

  • PDF

수동 소나 쌍을 이용한 에너지 인식 분산탐지 체계의 설계 및 성능 분석 (Design and Performance Analysis of Energy-Aware Distributed Detection Systems with Two Passive Sonar Sensors)

  • 도주환;김송근;홍순목
    • 대한전자공학회논문지SP
    • /
    • 제46권4호
    • /
    • pp.139-147
    • /
    • 2009
  • 이 논문에서는 한 쌍의 수동 광대역 소나로 구성된 병렬구조 분산센서 망에 적용할 수 있는 에너지 인식 분산탐지 체계의 설계 및 성능분석에 대해 검토한다. 이 분산탐지기는 융합규칙으로 AND 규칙과 OR 규칙을 사용하였다. 이 경우 각 센서노드의 문턱값 규칙은 전체 분산센서망의 탐지확률을 최대로 하는 UMP(uniformly most powerful)임을 증명하였다. 그리고 소나 체계에서 오경보에 의해 발생하는 에너지 비용을 제한 조건으로 주었을 때, 탐지확률을 최대화하는 센서노드의 최적 문턱값이 갖는 특성을 이론적으로 검토하였다. 나아가 신호 강도, 에너지 비용에 대한 제한조건, 센서노드 사이의 간격등이 탐지성능에 미치는 영향을 수치실험을 통해 분석하였다.

A Modified E-LEACH Routing Protocol for Improving the Lifetime of a Wireless Sensor Network

  • Abdurohman, Maman;Supriadi, Yadi;Fahmi, Fitra Zul
    • Journal of Information Processing Systems
    • /
    • 제16권4호
    • /
    • pp.845-858
    • /
    • 2020
  • This paper proposes a modified end-to-end secure low energy adaptive clustering hierarchy (ME-LEACH) algorithm for enhancing the lifetime of a wireless sensor network (WSN). Energy limitations are a major constraint in WSNs, hence every activity in a WSN must efficiently utilize energy. Several protocols have been introduced to modulate the way a WSN sends and receives information. The end-to-end secure low energy adaptive clustering hierarchy (E-LEACH) protocol is a hierarchical routing protocol algorithm proposed to solve high-energy dissipation problems. Other methods that explore the presence of the most powerful nodes on each cluster as cluster heads (CHs) are the sparsity-aware energy efficient clustering (SEEC) protocol and an energy efficient clustering-based routing protocol that uses an enhanced cluster formation technique accompanied by the fuzzy logic (EERRCUF) method. However, each CH in the E-LEACH method sends data directly to the base station causing high energy consumption. SEEC uses a lot of energy to identify the most powerful sensor nodes, while EERRCUF spends high amounts of energy to determine the super cluster head (SCH). In the proposed method, a CH will search for the nearest CH and use it as the next hop. The formation of CH chains serves as a path to the base station. Experiments were conducted to determine the performance of the ME-LEACH algorithm. The results show that ME-LEACH has a more stable and higher throughput than SEEC and EERRCUF and has a 35.2% better network lifetime than the E-LEACH algorithm.

Anatomy of Sentiment Analysis of Tweets Using Machine Learning Approach

  • Misbah Iram;Saif Ur Rehman;Shafaq Shahid;Sayeda Ambreen Mehmood
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.97-106
    • /
    • 2023
  • Sentiment analysis using social network platforms such as Twitter has achieved tremendous results. Twitter is an online social networking site that contains a rich amount of data. The platform is known as an information channel corresponding to different sites and categories. Tweets are most often publicly accessible with very few limitations and security options available. Twitter also has powerful tools to enhance the utility of Twitter and a powerful search system to make publicly accessible the recently posted tweets by keyword. As popular social media, Twitter has the potential for interconnectivity of information, reviews, updates, and all of which is important to engage the targeted population. In this work, numerous methods that perform a classification of tweet sentiment in Twitter is discussed. There has been a lot of work in the field of sentiment analysis of Twitter data. This study provides a comprehensive analysis of the most standard and widely applicable techniques for opinion mining that are based on machine learning and lexicon-based along with their metrics. The proposed work is helpful to analyze the information in the tweets where opinions are highly unstructured, heterogeneous, and polarized positive, negative or neutral. In order to validate the performance of the proposed framework, an extensive series of experiments has been performed on the real world twitter dataset that alter to show the effectiveness of the proposed framework. This research effort also highlighted the recent challenges in the field of sentiment analysis along with the future scope of the proposed work.

사례로 살펴본 렌섬웨어 공격에 의한 피해를 최소화하는 연구 고찰 (Research on Minimizing the Damage from Ransomware Attack by Case Study)

  • 최희식;조양현
    • 디지털산업정보학회논문지
    • /
    • 제13권1호
    • /
    • pp.103-111
    • /
    • 2017
  • Recently, new variants of Ransomware are becoming a new security issue. Ransomware continues to evolve to avoid network of security solutions and extort users' information to demand Bitcoin using social engineering technique. Ransomware is damaging to users not only in Korea but also in all around the world. In this thesis, it will present research solution to prevent and cope from damage by new variants Ransomware, by studying on the types and damage cases of Ransomware that cause social problems. Ransomware which introduced in this paper, is the most issued malicious code in 2016, so it will evolve to a new and more powerful Ransomware which security officers cannot predict to gain profit. In this thesis, it proposes 4 methods to prevent the damage from the new variants of Ransomware to minimize the damage and infection from Ransomware. Most importantly, if user infected from Ransomware, it is very hard to recover. Thus, it is important that users understand the basic security rules and effort to prevent them from infection.

Determinants of Research Productivity: A Korean Case

  • Kim, Ki-Hyoung
    • Asian Journal of Innovation and Policy
    • /
    • 제3권2호
    • /
    • pp.193-215
    • /
    • 2014
  • This study analyzes the factors on the determinants of research productivity. In addition, this study uncovers the relationships between research productivity and various explanatory variables, and between explanatory variables. As for research productivity, 3 indices were used such as the number of papers, patents, and a combination of them. The data is the 3-year average from 2010-2012 by 1,383 researchers from 6 disciplines such as physics, chemistry, biology, mechanical engineering, electricity and electronics, and chemical engineering, reported to the National Research Foundation of Korea. Personal factors such as sex, age, academic rank and location of affiliation show the group difference for productivity. In addition, most resource factors such as the number of graduate students and research funds showed the same result with personal factors. As for the determinants, master and doctoral students and government funds are the most powerful factors for research productivity, but industry funds for patent and overall productivity.

Stearic Acid Langmuir-Blodgett (LB) 막의 ${\pi}-A$ 특성 (${\pi}-A$ Characteristics of Stearic Acid LB Films)

  • 이대일;최용성;장상목;권영수
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1991년도 하계학술대회 논문집
    • /
    • pp.241-243
    • /
    • 1991
  • The LB technique is one of the most, powerful fabricating methods of organic ultra thin film, which deposits a monolayer film in molecular level onto the surface of the substrate. In order to fabricate the LB film with optimal condition, we have to deposite monolayer film at optimum depositing pressure. which is dependent on the kind of deposit materials. ${\pi}-A$ curve is one of the most important, criteria to determine the optimum pressure. In this paper, we obtained that the optimum pressure is $20{\sim}50(mN/m)$ from ${\pi}-A$ curve of the stearic acid. In our experiments, it was known that LB ultra thin film is deposited beat at 30(mN/m) by checking the characteristics of LB film.

  • PDF

Revised Iterative Goal Programming Using Sparsity Technique on Microcomputer

  • Gen, Mitsuo;Ida, Kenichi;Lee, Sang M.
    • 한국경영과학회지
    • /
    • 제10권1호
    • /
    • pp.14-30
    • /
    • 1985
  • Recently, multiple criteria decision making has been well established as a practical approach to seek a satisfactory solution to a decision making problem. Goal programming is one of the most powerful MCDM tools with satisfying operational assumptions that reflect the actual decision making process in real-world situations. In this paper we propose an efficient method implemented on a microcomputer for solving linear goal programming problems. It is an iterative revised goal simplex method using the sparsity technique. We design as interactive software package for microcomputers based on this method. From some computational experiences, we can state that the revised iterative goal simplex method using the sparsity technique is the most efficient one for microcomputer for solving goal programming problems.

  • PDF

관측기 설계에 의한 시간지연 시스템의 강인한 제어 (Robust control of input time delay systems by observer design)

  • 김정원;이장명
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1998년도 하계종합학술대회논문집
    • /
    • pp.239-242
    • /
    • 1998
  • Most of time delay existing in industrial processes can be modeled as an input time-delay which causes a lot of difficulties. To implement a time-delay free control, loop transfer function is recovered through the direct state feedback. For the proper state feedback, and observer is designed based upon the factorization approach which is known as one of the most powerful tool for the design of various control systems. The design scheme is parctically applied for the control of a DC motro which suffers from input time-delay. Simulational results demonstrate that this new algorithm guarantess the stability of the time-delayed system, as well as performance improvement compared to the conventional PI control.

  • PDF

The Protection Offered by "Umbrella Clauses" in Korean Investment Treaties

  • Mouawad, Caline;Dulac, Elodie
    • 한국중재학회지:중재연구
    • /
    • 제23권3호
    • /
    • pp.127-147
    • /
    • 2013
  • Korea is, after China, the Asian country with the largest number of concluded investment treaties. One of the protections that Korean investment treaties frequently afford to foreign investors and their investment is the so-called "umbrella clause," which requires the host state of the investment to observe the commitments that it has undertaken toward the foreign investor or its investment. This is a potentially very powerful protection. Umbrella clauses, however, have proven to be amongst the most controversial provisions in investment treaties, giving rise to diverging interpretations by tribunals and commentators that are still not reconciled today.

  • PDF