• Title/Summary/Keyword: Operation key

Search Result 1,745, Processing Time 0.024 seconds

Economic analysis of integrated data analysis at variety marine protocols (다양한 해양 프로토콜의 분류 및 통합 데이터를 분석한 독립서버에 대한 경제적 분석)

  • Jang, Hyun-Young;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.243-246
    • /
    • 2016
  • Data transfer technique is one of the key elements of the IT infrastructure, in accordance with each environment and function, using some kind of protocol. Using the three protocols such as WCDMA, AIS, and TRS at sea IT industry. so It uses three protocols saw has a problem that the operation of each protocol-specific server. so server maintenance costs increase and sea Device Manager has been placed in a situation which operates to develop each of the protocol-specific analysis program. The reason of the protocol is divided into three, marine equipment (lighthouses, buoys, light buoy) manufacturing companies and the date of manufacture, such as, communication environment (distance, communication speed) because such is wrong all, trying to unify this and enormous cost and time is a situation that can not be the exchange occurred when. So in the Ministry of Maritime Affairs and Fisheries, the number of frequency of use is low, communication performance is seeking to refrain from Kure each local organizations and companies the use of low TRS protocol. his paper is intended to conduct research on the basis of the actual data to analyze whether the method is how economical to store a single DB by analyzing other types of protocols. This reduces the shortage of marine IT industry, even a little, shall helps reduce administrative costs.

  • PDF

A Study on the Mission Reliability of Combat System through the Design Structure Matrix and Interface Matrix (설계구조행렬(DSM) 및 인터페이스 매트릭스 설계를 통한 전투체계 임무신뢰도에 관한연구)

  • Lee, Jeong-Wan;Park, Chan-Hyeon;Kim, So-Jung;Kim, Eui-Whan;Jang, Joong Soon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.451-458
    • /
    • 2019
  • Reliability in the course of weapons system development and operation is a key measure of the ability of a system to perform the required functions under specified conditions over a specified period of time, and the mission confidence for the assessment of mission fulfillment is an important indicator of victory or defeat in a battle. Mission reliability indicates the probability that a given task will succeed or fail in an event or environmental situation over a given period of time. The existing mission reliability was calculated after creating a confidence blow map with only physical connections based on the mission. However, as modern weapons systems evolve and advance, the related equipment structure becomes increasingly complex, making it impossible to express mission relevance when mission classification is required based on functional or physical connections. In this study, the mission reliability was calculated for a gun control system, which is part of a ship's combat system, by expressing the association between the physical and functional structures using the design structure matrix technique and the interface matrix technique. We expect the study results to be used as verification data for mission reliability.

The Effect of ICT Environment on Management Performance -Focusing the Mediating Effects of Organizational Participation- (ICT환경과 경영성과의 관계분석 -조직참여도의 매개효과를 중심으로-)

  • Ryo, Woon-Jong;Kwon, Hyuk-Dae
    • Industry Promotion Research
    • /
    • v.4 no.2
    • /
    • pp.9-18
    • /
    • 2019
  • This study investigated the relationship between ICT environment and business performance. In the case of Korea's major industries, large corporations have already established and operate a considerable level of smart factories, leading the global market. However, SMEs, which account for 95% of the total companies, are not able to build smart factories themselves. Smart factory construction The total number of government-supported enterprises is 4.891 companies (3,984 companies, 907 companies in construction) 2.9% of factories and 97.1% (166,344 companies) There is a big problem to be improved. The result of this study is that the first research objective of this study, which suggests the theoretical system that the will of the manager is most important for the successful establishment of the smart factory, which is part of the corporate innovation to meet the rapidly changing environment. Second, it can be seen that financing for building a smart factory is a key factor in building a smart factory, as well as funding itself. Third, it was found that besides its own technology, technology support for government and external technology consulting support are very important for smart construction. Fourth, organizational participation of internal organizers showed that cooperative and positive positive participation is also a factor of success. As a follow-up study, we analyzed the cause of the company's operation, analyzed the cause of the problem with the 4M1E technique, developed the countermeasures, and compared it before and after the improvement, standardized the improvement and needed further study. It is meaningful that the study provided basic data for building a smart factory through the analysis of the relationship between the ICT environment and business performance of the company.

A Study on the Strategy for Improvement of Operational Test and Evaluation of Weapon System and the Determination of Priority (무기체계 운용시험평가 개선전략 도출 및 우선순위 결정)

  • Lee, Kang Kyong;Kim, Geum Ryul;Yoon, Sang Don;Seol, Hyeon Ju
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.177-189
    • /
    • 2021
  • Defense R&D is a key process for securing weapons systems determined by mid- and long-term needs to cope with changing future battlefield environments. In particular, the test and evaluation provides information necessary to determine whether or not to switch to mass production as the last gateway to research and development of weapons systems and plays an important role in ensuring performance linked to the life cycle of weapons systems. Meanwhile, if you look at the recent changes in the operational environment of the Korean Peninsula and the defense acquisition environment, you can see three main characteristics. First of all, continuous safety accidents occurred during the operation of the weapon system, which increased social interest in the safety of combatants, and the efficient execution of the limited defense budget is required as acquisition costs increase. In addition, strategic approaches are needed to respond to future battlefield environments such as robots, autonomous weapons systems (RAS), and cyber security test and evaluation. Therefore, in this study, we would like to present strategies for improving the testing and evaluation of weapons systems by considering the characteristics of the security environment that has changed recently. To this end, the improvement strategy was derived by analyzing the complementary elements of the current weapon system operational test and evaluation system in a multi-dimensional model and prioritized through the hierarchical analysis method (AHP).

The Significance and Utilization of the Jungwon Historical and Cultural Area (중원역사문화권 설정의 의미와 활용 방안)

  • SEONG, Jeongyong;YANG, Sieun
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.3
    • /
    • pp.204-227
    • /
    • 2021
  • This paper proposed the validity and necessity of establishing the Jungwon Historical and Cultural Area by reviewing the historical characteristics of the name Jungwon and its temporal and spatial range. We also explored ways to utilize the Jungwon historical and cultural Area under the Special Act on the Maintenance of Historical and Cultural Areas. Jungwon, which means the center of the country, has strategic value as a key area connecting the Korean Peninsula to the north and south through the Geripryeong and Jukryeong. It also includes Chungju, which connects the Namhan and Bukhan Rivers . From the Mahan period, the areas of Cheongju and Jincheon, the Miho Stream basin to the west, and Chungju to the east were closely connected to each other. Afterwards, Baekje, Koguryo, and Silla engaged in a fierce battle to occupy the Jungwon area. Jungwon culture was born through the negotiation and fusion of the cultures of the three kingdoms. In particular, Silla continued to value the Jungwon area, demonstrated by the installation of Seowongyeong in Cheongju and Bukwongyeong in Wonju, centering on the Jungwongyeong. Since we have a historical view with a focus on ancient kingdoms, we have overlooked the full value of the history and culture of Jungwon. We need to recognize the importance of Jungwon area and think about how to utilize it. Therefore, we suggested in this paper that there be more public information services on the cultural heritage of Jungwon, the historical heritage experience, and the education programs for local residents. The development and operation of Jungwon's history, culture, and tourism contents, as well as the various academic research papers should be used to reveal the identity of the Jungwon historical and cultural area.

A Study on Design of Wind Blade with Rated Capacity of 50kW (50kW 풍력블레이드 설계에 관한 연구)

  • Kim, Sang-Man;Moon, Chae-Joo;Jung, Gweon-Sung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.3
    • /
    • pp.485-492
    • /
    • 2021
  • The wind turbines with a rated capacity of 50kW or less are generally considered as small class. Small wind turbines are an attractive alternative for off-grid power system and electric home appliances, both as stand-alone application and in combination with other energy technologies such as energy storage system, photovoltaic, small hydro or diesel engines. The research objective is to develop the 50kW scale wind turbine blades in ways that resemble as closely as possible with the construction and methods of utility scale turbine blade manufacturing. The mold process based on wooden form is employed to create a hollow, multi-piece, lightweight design using carbon fiber and fiberglass with an epoxy based resin. A hand layup prototyping method is developed using high density foam molds that allows short cycle time between design iterations of aerodynamic platforms. A production process of five blades is manufactured and key components of the blade are tested by IEC 61400-23 to verify the appropriateness of the design. Also, wind system with developed blades is tested by IEC 61400-12 to verify the performance characteristics. The results of blade and turbine system test showed the available design conditions for commercial operation.

$AB^2$ Semi-systolic Architecture over GF$GF(2^m)$ ($GF(2^m)$상에서 $AB^2$ 연산을 위한 세미시스톨릭 구조)

  • 이형목;전준철;유기영;김현성
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.45-52
    • /
    • 2002
  • In this contributions, we propose a new MSB(most significant bit) algorithm based on AOP(All One Polynomial) and two parallel semi-systolic architectures to computes $AB^2$over finite field $GF(2^m)$. The proposed architectures are based on standard basis and use the property of irreducible AOP(All One Polynomial) which is all coefficients of 1. The proposed parallel semi-systolic architecture(PSM) has the critical path of $D_{AND2^+}D_{XOR2}$ per cell and the latency of m+1. The modified parallel semi-systolic architecture(WPSM) has the critical path of $D_{XOR2}$ per cell and has the same latency with PSM. The proposed two architectures, PSM and MPSM, have a low latency and a small hardware complexity compared to the previous architectures. They can be used as a basic architecture for exponentiation, division, and inversion. Since the proposed architectures have regularity, modularity and concurrency, they are suitable for VLSI implementation. They can be used as a basic architecture for algorithms, such as the Diffie-Hellman key exchange scheme, the Digital Signature Algorithm(DSA), and the ElGamal encryption scheme which are needed exponentiation operation. The application of the algorithms can be used cryptosystem implementation based on elliptic curve.

Systematic review for economic benefit of poison control center (중독관리센터의 경제적 효과에 대한 체계적 고찰)

  • Han, Eunah;Hwang, Hyuna;Yu, Gina;Ko, Dong Ryul;Kong, Taeyoung;You, Je Sung;Choa, Minhong;Chung, Sung Phil
    • Journal of The Korean Society of Clinical Toxicology
    • /
    • v.19 no.1
    • /
    • pp.1-7
    • /
    • 2021
  • Purpose: The purpose of this study was to conduct a systematic review to investigate the socio-economic benefits of the poison control center (PCC) and to assess whether telephone counseling at the poison control center affects the frequency of emergency room visits, hospitalization, and length of stay of patients with acute poisoning. Methods: The authors conducted a medical literature search of the PubMed, EMBASE, and Cochrane Library databases. Two reviewers evaluated the abstracts for eligibility, extracted the data, and assessed the study quality using a standardized tool. Key results such as the cost-benefit ratio, hospital stay days, unnecessary emergency room visits or hospitalizations, and reduced hospital charges were extracted from the studies. When meta-analysis was possible, it was performed using RevMan software (RevMan version 5.4). Results: Among 299 non-duplicated studies, 19 were relevant to the study questions. The cost-benefit ratios of PCC showed a wide range from 0.76 to 36 (average 6.8) according to the level of the medical expense of each country and whether the study included intentional poisoning. PCC reduced unnecessary visits to healthcare facilities. PCC consultation shortened the length of hospital stay by 1.82 (95% CI, 1.07-2.57) days. Conclusion: The systematic review and meta-analysis support the hypothesis that the PCC operation is cost-beneficial. However, when implementing the PCC concept in Korea in the future, it is necessary to prepare an institutional framework to ensure a costeffective model.

Design of an Effective Deep Learning-Based Non-Profiling Side-Channel Analysis Model (효과적인 딥러닝 기반 비프로파일링 부채널 분석 모델 설계방안)

  • Han, JaeSeung;Sim, Bo-Yeon;Lim, Han-Seop;Kim, Ju-Hwan;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1291-1300
    • /
    • 2020
  • Recently, a deep learning-based non-profiling side-channel analysis was proposed. The deep learning-based non-profiling analysis is a technique that trains a neural network model for all guessed keys and then finds the correct secret key through the difference in the training metrics. As the performance of non-profiling analysis varies greatly depending on the neural network training model design, a correct model design criterion is required. This paper describes the two types of loss functions and eight labeling methods used in the training model design. It predicts the analysis performance of each labeling method in terms of non-profiling analysis and power consumption model. Considering the characteristics of non-profiling analysis and the HW (Hamming Weight) power consumption model is assumed, we predict that the learning model applying the HW label without One-hot encoding and the Correlation Optimization (CO) loss will have the best analysis performance. And we performed actual analysis on three data sets that are Subbytes operation part of AES-128 1 round. We verified our prediction by non-profiling analyzing two data sets with a total 16 of MLP-based model, which we describe.

Analyses of Impact on Business Performance of Information Security Companies: The Perspective of Mediating Effects of Organizational and Innovative Capabilities (정보보호 기업의 경영성과에 미치는 영향 분석: 조직 및 혁신 역량의 매개 효과의 관점에서)

  • Shin, HyunMin;Kim, Injai
    • Knowledge Management Research
    • /
    • v.22 no.4
    • /
    • pp.157-172
    • /
    • 2021
  • Information security companies were established in earnest from the mid-late 1990s to early 2000s, far shorter than other national key industries. Nevertheless, the information security industry has made rapid progress. It is expected that the proportion of the information security industry will increase rapidly with the development of advanced technology along with the 4th industrial revolution. As COVID-19, which occurred at the end of 2019, spreads around the world in 2020, non-face-to-face services and digital transformation are accelerating, and cyber threats to users are also increasing. However, there are limitations in responding to new Cyber Security threats due to the shortage of information protection manpower, insufficient security capabilities of domestic companies, and the narrow domestic information protection market. This study examines the external environmental factors of information security companies such as government information protection system operation, government influence, government support, partnership between information security companies, and internal environmental factors such as top management support, financial status, human resources, organizational capability, This study was conducted using empirical data to analyze whether it affects innovation capability and whether organizational capability and innovation capability affect financial and non-financial performance. The results of this study can be used as basic data to suggest policies and implications for information security, and to strengthen the competitiveness of the information security industry.