The Transactions of The Korean Institute of Electrical Engineers
/
v.64
no.2
/
pp.228-231
/
2015
In power system research fields, one of current key issues is the construction and commercialization of micro grid site which is called green island, carbon zero island, energy independent island, building micro grid, etc. and various affiliated technologies have been being vigorously developed to realize. In addition, various researches about electric vehicles (EVs) are in progress and it is expected to penetrate rapidly with the next a few years. Some new load models should be developed integrating with electric vehicle loads because the EVs' deployment could cause the change of load composition rate on power system planning and operations. EVs are also resources for micro grid as well as distributed generation and demand response so that various supply and demand side resources should be considered for micro grid researches. In this paper, the load composition rate of residential sectors is prospected considering the deployment of EVs and the resource configuration of micro grid is optimized based on net present cost. In the optimization, the load patten of case studies includes EV's charging characteristics and various cases are simulated comparing micro grid environment and normal condition. HOMER is used to compare various cases and economic effects.
The Journal of the Convergence on Culture Technology
/
v.10
no.3
/
pp.19-24
/
2024
The future military combat environment is rapidly expanding the role and importance of artificial intelligence (AI) in defense, aligning with the current trends of declining military populations and evolving dynamics. Particularly, in the civilian sector, AI development has surged into new domains based on foundation models, such as OpenAI's Chat-GPT, categorized as Super-Giant AI or Hyperscale AI. The U.S. Department of Defense has organized Task Force Lima under the Chief Digital and AI Office (CDAO) to conduct research on the application of Large Language Models (LLM) and generative AI. Advanced military nations like China and Israel are also actively researching the integration of Super-Giant AI into their military capabilities. Consequently, there is a growing need for research within our military regarding the potential applications and fields of application for Super-Giant AI in weapon systems. In this paper, we compare the characteristics and pros and cons of specialized AI and Super-Giant AI (Foundation Models) and explore new application areas for Super-Giant AI in weapon systems. Anticipating future application areas and potential challenges, this research aims to provide insights into effectively integrating Super-Giant Artificial Intelligence into defense operations. It is expected to contribute to the development of military capabilities, policy formulation, and international security strategies in the era of advanced artificial intelligence.
The general aspects for the future warfare shows that the concept of firepower and maneuver centric warfare has been replacing with that of information and knowledge centric warfare. Thus, some developed countries are now trying to establish the information systems to perform intelligent warfare and innovate defense operations. The C4I(Command, Control, Communication, Computers and Intelligence for the Warrior) systems make it possible to do modern and systematic war operations. The basic idea of this study is to investigate how TAM(Technology Acceptance Model) can explain the acceptance behavior in military organizations. Because TAM is inadequate in explaining the acceptance processes forcomplex technologies and strict organizations, a revised research model based upon TAM was developed in order to assess the usage of the C4I system. The purpose of this study is to investigate factors affecting the usage of C4I in the Korean Army. The research model, based upon TAM, was extended through a belief construct such as self-efficacy as one of mediating variables. The self-efficacy has been used as a mediating variable for technology acceptance, and the variable was included in the research model. The external variables were selected on the basis of previous research. The external variables can be classified into following: 1) technological, 2) organizational, and 3) environmental factors on the basis of TOE(Technology-Organization-Environment) framework. The technological factor includes the information quality and the task-technology fitness. The organizational factor includes the influence of senior colleagues. The environmental factor includes the education/train data. The external variables are considered very important for explaining the behavior patterns of information technology or systems. A structured questionnaire was developed and administrated to those who were using the C4I system. Total 329 data were used for statistical data analyses. A confirmatory factor analysis and structured equation model were used as main statistical methods. Model fitness Indexes for measurement and structured models were verified before all 18 hypotheses were tested. This study shows that the perceived usefulness and the self-efficacy played their roles more than the perceived ease of use did in TAM. In military organizations, the perceived usefulness showed its mediating effects between external variables and dependent variable, but the perceived ease of use did not. These results imply that the perceived usefulness can explain the acceptance processes better than the perceived ease of use in the army. The self-efficacy was also used as one of the three mediating variables, and showed its mediating effects in explaining the acceptance processes. Such results also show that the self-efficacy can be selected as one possible belief construct in TAM. The perceived usefulness was influenced by such factors as senior colleagues, the information quality, and the task-technology fitness. The self-efficacy was affected by education/train and task-technology fitness. The actual usage of C4I was influenced not by the perceived ease of use but by the perceived usefulness and selfefficacy. This study suggests the followings: (1) An extended TAM can be applied to such strict organizations as the army; (2) Three mediation variables are included in the research model and tested at real situations; and (3) Several other implications are discussed.
Recently, The sea water temperature around Korean Peninsula is steadily increasing. Water temperature changes not only affect the fishing ecosystem, but also are closely related to military operations in the sea. The purpose of this study is to suggest which model is more suitable for the field of water temperature prediction by attempting short-term water temperature prediction through various prediction models based on deep learning technology. The data used for prediction are water temperature data from the East Sea (Goseong, Yangyang, Gangneung, and Yeongdeok) from 2016 to 2020, which were observed through marine observation by the National Fisheries Research Institute. In addition, we use Long Short-Term Memory (LSTM), Bidirectional LSTM, and Gated Recurrent Unit (GRU) techniques that show excellent performance in predicting time series data as models for prediction. While the previous study used only LSTM, in this study, the prediction accuracy of each technique and the performance time were compared by applying various techniques in addition to LSTM. As a result of the study, it was confirmed that Bidirectional LSTM and GRU techniques had the least error between actual and predicted values at all observation points based on 1 hour prediction, and GRU was the fastest in learning time. Through this, it was confirmed that a method using Bidirectional LSTM was required for water temperature prediction to improve accuracy while reducing prediction errors. In areas that require real-time prediction in addition to accuracy, such as anti-submarine operations, it is judged that the method of using the GRU technique will be more appropriate.
Journal of the Society of Naval Architects of Korea
/
v.59
no.4
/
pp.214-224
/
2022
It is necessary to estimate manoeuvring characteristics of submerged bodies at the design stage in order to ensure the safe operations. In this study, added mass coefficients in the mathematical model of submerged bodies are estimated by captive model tests and numerical calculations. Two kinds of models, MARIN 'BB2'submarine model and AUV (Autonomous unmanned vehicle) model are utilized in the forced oscillation tests. Compared to BB2 submarine, AUV with cylindrical type hull form shows relatively small added masses in roll, pitch, and yaw directions. Next, numerical calculations based on potential theory are performed under the assumption that viscous effects on inertia forces are negligible. Added masses obtained by numerical calculations are in good agreements with forced oscillation test results. And if slow manoeuvres of submerged bodies are presumed, some of velocity coupled terms can be approximated by combinations of added mass coefficients.
This study examines market acceptance for DMB service, one of the touted new business models in Korea's next-generation mobile communications service market, using adoption end diffusion of innovation as the theoretical framework. Market acceptance for DMB service was assessed by predicting the demand for the service using the Bass model, and the demand variability over time was then analyzed by integrating the innovation adoption model proposed by Rogers (2003). In our estimation of the Bass model, we derived the coefficient of innovation and coefficient of imitation, using actual diffusion data from the mobile telephone service market. The maximum number of subscribers was estimated based on the result of a survey on satellite DMB service. Furthermore, to test the difference in diffusion pattern between mobile phone service and satellite DMB service, we reorganized the demand data along the diffusion timeline according to Rogers' innovation adoption model, using the responses by survey subjects concerning their respective projected time of adoption. The comparison of the two demand prediction models revealed that diffusion for both took place forming a classical S-curve. Concerning variability in demand for DMB service, our findings, much in agreement with Rogers' view, indicated that demand was highly variable over time and depending on the adopter group. In distinguishing adopters into different groups by time of adoption of innovation, we found that income and lifestyle (opinion leadership, novelty seeking tendency and independent decision-making) were variables with measurable impact. Among the managerial variables, price of reception device, contents type, subscription fees were the variables resulting in statistically significant differences. This study, as an attempt to measure the market acceptance for satellite DMB service, a leading next-generation mobile communications service product, stands out from related studies in that it estimates the nature and level of acceptance for specific customer categories, using theories of innovation adoption and diffusion and based on the result of a survey conducted through one-to-one interviews. The authors of this paper believe that the theoretical framework elaborated in this study and its findings can be fruitfully reused in future attempts to predict demand for new mobile communications service products.
Elementary combinatorial problem may be classified into three different combinatorial models(selection, distribution, partition). The main goal of this research is to determine the effect of type of combinatorial operation and implicit combinatorial model on problem difficulty. We also classified errors in the understanding combinatorial problem into error of order, repetition, permutation with repetition, confusing the type of object and cell, partition. The analysis of variance of answers from 339 students showed the influence of the implicit combinatorial model and types of combinatorial operations. As a result of clinical interviews, we particularly noticed that some students were not able to transfer the definition of combinatorial operation when changing the problem to a different combinatorial model. Moreover, we have analysed textbooks, and we have found that the exercises in these textbooks don't have various types of problems. Therefore when organizing the teaching , it is necessary to pose various types of problems and to emphasize the transition of combinatorial problem into the different models.
Longterm memory is encoded in the neuronal connectivities of the brain. The most successful models of human memory in their operations are models of distributed and self-organized associative memory, which are founded in the principle of simulaneous convergence in network formation. Memory is not perceived as the qualities inherent in physical objects or events, but as a set of relations previously established in a neural net by simultaneousy occuring experiences. When it is easy to find correlations with existing neural networks through analysis of network structures, memory is automatically encoded in cerebral cortex. However, in the emergence of informations which are complicated to classify and correlated with existing networks, and conflictual with other networks, those informations are sent to the subcortex including hippocampus. Memory is stored in the form of templates distributed across several different cortical regions. The hippocampus provides detailed maps for the conjoint binding and calling up of widely distributed informations. Knowledge about the distribution of correlated networks can transform the existing networks into new one. Then, hippocampus consolidats new formed network. Amygdala may enable the emotions to influence the information processing and memory as well as providing the visceral informations to them. Cortico-striatal-pallido-thalamo-cortical loop also play an important role in memory function with analysis of language and concept. In case of difficulty in processing in spite of parallel process of informations, frontal lobe organizes theses complicated informations of network analysis through temporal processing. With understanding of brain mechanism of memory and information processing, the brain mechanism of mental phenomena including psychopathology can be better explained in terms of neurobiology and meuropsychology.
Journal of the Korea Society of Computer and Information
/
v.27
no.11
/
pp.47-55
/
2022
Recently, researches on the prediction of sea water temperature using artificial intelligence models has been actively conducted in Korea. However, most researches in the sea around the Korean peninsula mainly focus on predicting sea surface temperatures. Unlike previous researches, this research predicted the vertical sea water temperature profile of the East Sea, which is very important in submarine operations and anti-submarine warfare, using XBT(eXpendable Bathythermograph) data and machine learning models(RandomForest, XGBoost, LightGBM). The model was trained using XBT data measured from sea surface to depth of 200m in a specific area of the East Sea, and the prediction accuracy was evaluated through MAE(Mean Absolute Error) and vertical sea water temperature profile graphs.
A discrete event simulation model is developed to evaluate the performances of three different revenue management methods for an air cargo network from Northeast China to North America and Europe. In the first method, a bid price model is applied only to the routes that pass through Incheon. In the second method, the bid price model is applied to all the routes. In third method, bid price and virtual nesting models are applied to the routes that pass through Incheon. The results show that the total revenue significantly increases with the employment of pricing and capacity control. The developed simulation model is a useful research tool to study marketing strategies for air cargo operations.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.