• Title/Summary/Keyword: Power resource

Search Result 1,530, Processing Time 0.029 seconds

The Difference Analyses between Users' Actual Usage and Perceived Preference: The Case of ERP Functions on Legacy Systems (사용자의 실제 이용과 인지된 선호도 차이 분석: 레거시 시스템의 ERP 기능을 중심으로)

  • Cho, Yong-Tak;Kim, Injai
    • The Journal of Information Systems
    • /
    • v.23 no.1
    • /
    • pp.185-202
    • /
    • 2014
  • ERP, a typical enterprise application, helps companies to increase their productivity and to support their decision makings. ERP is composed of diverse functions that are optimized under PC environment, whereas the ERP applications on a mobile platform have many constraints such as a small screen, limited resolution, and computing power. Because all the functions of a ERP legacy system are not required for ERP on a mobile device, the core functions of the ERP system should be selected to increase system efficiency. In this study, two main methods were used; interviews and log analyses. The end users using a ERP system were interviewed for their perceptions, and log data analyses were made for the hitting number of specific ERP functions. The differences between the actual usage based on log data and users' cognitive preferences about ERP functions were analysed. Finally, the functional differences between users' perception and actual usage were suggested for some practical implications.

Implementation of Expert System Simulation based on 2th Security of Network (네트워크 2중 보안을 위한 전문가시스템 시뮬레이션의 구현)

  • Lee Chang-Jo
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.309-325
    • /
    • 2000
  • Organizations rely on Secure ID resources today to handle vast amounts of information. Because the data can vary widely in type and in degree of sensitivity, employees need to be able to exercise flexibility in handling and protecting it. It would not be practical or cost-effective to require that all data be handled in the same manner or be subject to the same protection requirements. Without some degree of standardization, however inconsistencies can develop at introduce risks. Policy formulation is an important step toward standardization of security activities for ID resources. ID security policy is generally formulated from the input of many members of an organization, including security officials, line managers, and ID resource specialists. However, policy is ultimately approved and issued by the organization's senior management. In environments where employees feel inundated with policies, directives, guidelines and procedures, an ID security policy should be introduced in a manner that ensures that management's unqualified support is clear. The organization's policy is management's vehicle for emphasizing the commitment to ID security and making clear the expectations for employee involvement and accountability. This paper will discuss ID security Policy in terms of the different types (program-level and issue-specific), components, and Implementation of Expert System Simulation based on 4GL, PowerBuilder.

  • PDF

OPTIMIZED NUMERICAL ANNULAR FLOW DRYOUT MODEL USING THE DRIFT-FLUX MODEL IN TUBE GEOMETRY

  • Chun, Ji-Han;Lee, Un-Chul
    • Nuclear Engineering and Technology
    • /
    • v.40 no.5
    • /
    • pp.387-396
    • /
    • 2008
  • Many experimental analyses for annular film dryouts, which is one of the Critical Heat Flux (CHF) mechanisms, have been performed because of their importance. Numerical approaches must also be developed in order to assess the results from experiments and to perform pre-tests before experiments. Various thermal-hydraulic codes, such as RELAP, COBRATF, MARS, etc., have been used in the assessment of the results of dryout experiments and in experimental pre-tests. These thermal-hydraulic codes are general tools intended for the analysis of various phenomena that could appear in nuclear power plants, and many models applying these codes are unnecessarily complex for the focused analysis of dryout phenomena alone. In this study, a numerical model was developed for annular film dryout using the drift-flux model from uniform heated tube geometry. Several candidates of models that strongly affect dryout, such as the entrainment model, deposition model, and the criterion for the dryout point model, were tested as candidates for inclusion in an optimized annular film dryout model. The optimized model was developed by adopting the best combination of these candidate models, as determined through comparison with experimental data. This optimized model showed reasonable results, which were better than those of MARS code.

Quality Characteristics and Ginsenosides Composition of Ginseng-Yakju According to the Particle Size of Ginseng Powder

  • Lee, Je-Hyuk;Choi, Kang Hyun;Sohn, Eun-Hwa;Jang, Ki-Hyo
    • Preventive Nutrition and Food Science
    • /
    • v.18 no.4
    • /
    • pp.234-241
    • /
    • 2013
  • The aim of this study was to develop rice wine (Yakju) containing various amounts and particle sizes of ginseng powder and to analyze the physicochemical characteristics and content of ginsenosides in ginseng-Yakju. Soluble solid content, pH, ethanol concentration, acidity, amino acid content, and evaluation of preference showed no difference between four kinds of Yakju groups, regardless of ginseng supplementation and particle size of the ginseng powder. During fermentation of Yakju containing ginseng, the contents of ginsenosides Rb1, Rb2, Rb3, and Rc were decreased. Otherwise, the content of ginsenoside Rh1 was increased highly by brewing microorganisms in Yakju. Recovery ratios of ginsenosides in ginseng-Yakju were approximately 25.4% (coarse ginseng power) and 23.8% (fine ginseng powder), which were superior to the recovery ratio of ginsenosides in Yakju containing ginseng slices (5%).

Development of Customer Oriented Load Management Software for Savings on Utility Bills in the Electricity Market

  • Chung, Koo-Hyung;Lee, Chan-Joo;Kim, Jin-Ho;Hur, Don;Kim, Balho-H.;Park, Jong-Bae
    • Journal of Electrical Engineering and Technology
    • /
    • v.2 no.1
    • /
    • pp.42-49
    • /
    • 2007
  • For electricity markets to function in a truly competitive and efficient manner, it is not enough to focus solely on improving the efficiencies of power supply. To recognize price-responsive load as a reliability resource, the customer must be provided with price signals and an instrument to respond to these signals, preferably automatically. This paper attempts to develop the Windows-based load management system in competitive electricity markets, allowing the user to monitor the current energy consumption or billing information, to analyze the historical data, and to implement the consumption strategy for cost savings with nine possible scenarios adopted. Finally, this modeling framework will serve as a template containing the basic concepts that any load management system should address.

Suggestion of CPA Attack and Countermeasure for Super-Light Block Cryptographic CHAM (초경량 블록 암호 CHAM에 대한 CPA 공격과 대응기법 제안)

  • Kim, Hyun-Jun;Kim, Kyung-Ho;Kwon, Hyeok-Dong;Seo, Hwa-Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.5
    • /
    • pp.107-112
    • /
    • 2020
  • Ultra-lightweight password CHAM is an algorithm with efficient addition, rotation and XOR operations on resource constrained devices. CHAM shows high computational performance, especially on IoT platforms. However, lightweight block encryption algorithms used on the Internet of Things may be vulnerable to side channel analysis. In this paper, we demonstrate the vulnerability to side channel attack by attempting a first power analysis attack against CHAM. In addition, a safe algorithm was proposed and implemented by applying a masking technique to safely defend the attack. This implementation implements an efficient and secure CHAM block cipher using the instruction set of an 8-bit AVR processor.

Antioxidant and Anticancer Properties of the Extracts from Lepisorus thunbergianus (Kaulf.) Ching (일엽초 추출물의 항산화 및 항암 효과)

  • Yang, Jinfeng;Kwon, Yong Soo;Lim, Jung Dae;Yu, Chang Yeon;Kim, Myong Jo
    • Korean Journal of Medicinal Crop Science
    • /
    • v.23 no.4
    • /
    • pp.324-333
    • /
    • 2015
  • Lepisorus thunbergianus (Kaulf.) Ching has been used in folk medicine in Korea. In this study, a L. thunbergianus methanol extract and its fractions were investigated for their antioxidant properties. The results showed that the ethyl acetate and butanol fractions of L. thunbergianus possess potent DPPH radical scavenging activities. Both fractions also possessed reducing power and inhibited reactive oxygen species formation. In addition, the cytotoxic activity of the L. thunbergianus n-hexane fraction (HF) was investigated. The results suggested that the HF remarkably suppressed proliferation of human breast, liver and colon cancer cells. These results demonstrate, for the first time, that L. thunbergianus extract induces apoptosis in SW620 cells, suggesting that L. thunbergianus may have potential as a therapeutic agent for colon cancer.

Low-Complexity Energy Efficient Base Station Cooperation Mechanism in LTE Networks

  • Yu, Peng;Feng, Lei;Li, Zifan;Li, Wenjing;Qiu, Xuesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.3921-3944
    • /
    • 2015
  • Currently Energy-Saving (ES) methods in cellular networks could be improved, as compensation method for irregular Base Station (BS) deployment is not effective, most regional ES algorithm is complex, and performance decline caused by ES action is not evaluated well. To resolve above issues, a low-complexity energy efficient BS cooperation mechanism for Long Time Evolution (LTE) networks is proposed. The mechanism firstly models the ES optimization problem with coverage, resource, power and Quality of Service (QoS) constraints. To resolve the problem with low complexity, it is decomposed into two sub-problems: BS Mode Determination (BMD) problem and User Association Optimization (UAO) problem. To resolve BMD, regional dynamic multi-stage algorithms with BS cooperation pair taking account of load and geographic topology is analyzed. And then a distributed heuristic algorithm guaranteeing user QoS is adopted to resolve UAO. The mechanism is simulated under four LTE scenarios. Comparing to other algorithms, results show that the mechanism can obtain better energy efficiency with acceptable coverage, throughput, and QoS performance.

Elliptic Curve Cryptography Algorithms for IC Card (IC 카드용 타원곡선 암호 알고리즘)

  • 이택희;서창호;김영철;이태훈;윤보현
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.4
    • /
    • pp.319-327
    • /
    • 2004
  • This paper describes implementations and test results of Elliptic Curve Cryptography (ECC) and Elliptic Curve KCDSA(ECKCDSA) algorithms based on Java card. 163-Bit ECC guarantees as secure as 1024-Bit Rivest-Shamir-Adleman (RSA) public key algorithm, which has been frequently used until now. According to our test results, 163-bit ECC processing time is about five times fast compared with 1024-bit RSA and amount of resource usages of ECC is smaller than RSA. Therefore, ECC is more appropriate for use on secure devices such as smart cards and wireless devices with constrained computational power consumption and small memory resources.

A Thought on Social Captial Paradigm and Social-Emotional Goods (사회자본 패러다임과 사회·감성재화에 관한 소고)

  • Park, Seong-Kwae
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.16 no.2
    • /
    • pp.199-209
    • /
    • 2004
  • The main purpose of this study is to explore a social capital paradigm which can be applied to many forms of social capital and intangible goods. The social capital paradigm introduces a new form of capital. This new form of capital produces a flow of socio-emotional goods that have value. Moreover, these socio-emotional goods can attach themselves to the objects used to convey them and change their value and meaning. This change in value and meaning is defined as attachment values. Exchanges of socio-emotional goods occur in networks where social capital resides. Formal and informal institutions provide order and meaning to exchanges of tangible and intangible goods. Social capital is a powerful resource that makes our choices interdependent. The social capital paradigm does not alter or contradict the basic economic theories of exchange. While the social capital paradigm accepts that selfish preferences motive many actions, it adds that sympathy and the desire to consume socio-emotional goods are powerful motivators. In case of marine affairs, ocean and fishing villages and their culture have been not only a fundamental basis of fisheries development but they also have made a great deal of contribution to forming social capital. In spite of this fact, the main reason that the problems of fisheries fishing villages fishermen in our society are kept at a distance is because they have been loosing their capability of forming social capital and producing socio-emotional goods, in addition to lowered relative economic share.