• Title/Summary/Keyword: former researches

Search Result 149, Processing Time 0.03 seconds

A Study on the Methodology to Performance Security on the Korea Small/Medium Sized Construction Firms for Venturing into International Market (국내 중소건설업체의 해외 진출 활성화를 위한 건설 보증 확대 방안에 관한 연구)

  • Ahn, Hyoung-Jun;Kim, Ju-Hyung;Kim, Jae-Jun
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2009.11a
    • /
    • pp.225-229
    • /
    • 2009
  • International construction market has been open to other countries, and it derives the development of our overseas construction industry quantitatively as well as qualitatively. Until now, the major companies have an absolute majority in the overseas construction market, and the small and medium enterprises have had difficulty to get a leadership in the international construction market because of the lack of the technical expertise and the capital strength. Especially in the Middle East Asia, our construction companies has touched off a boom, so our market share also has grown, which derived from the up toward ratchet oil prices and a worldwide boom in real estate development. The small and medium enterprise minority have recognition that the overseas construction market is the major company's native territory. But Data from the existing researches and many statistics indicate the most companies tend to underestimate the capacity and international competitiveness of the small and medium enterprises. As a matter of fact, hundreds of small and medium enterprise cut a conspicuous figure in overseas market. Consequently, it is indispensable to overcome the international financial crisis by revitalizing our overseas construction industry which obtains excellent results in international market. this study suggested the ways to expand overseas bonding capacity of Korean financial institution. This study proposed the Korean government to allow Construction Guarantee (former Korea Construction Financial Cooperative) to deal with foreign exchange so that Construction Guarantee will underwrite the overseas construction bond.

  • PDF

A Study on Design of the Image Retrieval System Using Embedded System (임베디드 시스템을 이용한 이미지 검색 시스템 설계에 관한 연구)

  • Kim, Kyung-Soo
    • Convergence Security Journal
    • /
    • v.10 no.1
    • /
    • pp.49-53
    • /
    • 2010
  • Recently multimedia has been formed, provided, and shared enough not to compare with the past, due to the proliferation of Internet and the development of hardware relating to multimedia. Accordingly to internationally give a proper expression to metadata of multimedia, the standard of MPEG-7 has been established, and researches for image search among various data of multimedia using MPEG-7 are going on. Thus there are meaning-based search. In the former there is a merit that search speed is fast, but technology and accuracy by technical knowledge on the image. In the latter the accuracy of search is decreasing because of not understanding the meaning about image and the internet of users. In this study to solve these problems a search system has been designed by combining the two methods. Also the search and manage image data by handheld devices such as portable PDA or smart phone, a system. Once this is used, multimedia data can be efficiently searched and utilized by handheld devices.

Theoretical Performance Analysis between Attack Prevention Schemes and Attack Mitigation Schemes (공격차단 기법과 공격경감 기법 간 이론적 성능 분석)

  • Ko Kwang-Sun;Eom Young-Ik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.84-92
    • /
    • 2006
  • To defeat abnormal traffic driven by DoS (Denial-of-Service) or DDoS (Distributed DoS), there has been a variety of researches or studies in a few decades. In this paper, we present the results of theoretical performance analysis between attack prevention schemes and attack mitigation schemes. The former is a scheme that prevents abnormal incoming traffic from forwarding into a specific network based on filtering rules, and the latter is a scheme that makes some perimeter or intermediate routers, which exist on the traffic forwarding path, prevent abnormal traffic based on their own abnormal traffic information, or that mitigates abnormal traffic by using quality-of-service mechanisms at the gateway of the target network. The aspects of theoretical performance analysis are defined as the transit rates of either normal traffic or false-positive traffic after an attack detection routine processes its job, and we also present the concrete network bandwidth rates to control incoming traffic.

The Revision of Sajik Ritual System during the early Ming Dynasty and the Debates about National Sajik Altar Alteration during the early Joseon Dynasty (명 초 사직단 제도 개정과 조선 초 사직단 논쟁)

  • Baik, So-Hun
    • Journal of architectural history
    • /
    • v.24 no.5
    • /
    • pp.21-32
    • /
    • 2015
  • Sajik, the altar of land and grain was treated as one of the most important national ritual facilities by the Joseon dynasty and the Ming dynasty because it symbolized the legitimacy of a dynasty, and its architectural ordonnance was arranged strictly by the government. But when the Joseon government considered to reconstruct its national Sajik altar in Hanyang during the Sejong period, they found the new architectural ordonnance for local Sajik altars recorded in "Hongwulizhi(洪武禮制)" had been published by the Ming government was hard to adopt, because it was too narrow and totally different from the traditional style. Above all things, they doubt of there was other architectural ordonnance for kingdoms, not for local governments. King Sejong ordered to investigate the origin form and former examples, and tried to get other ritual documents of authority published by the Ming government such as "Damingjili(大明集禮)". After several academic researches and intense debates, they decided to create a new architectural ordonnance for their national Sajik altar, its form was in accord with the traditional style and its size was in accord with the new ordonnance. But they did not know there had already been the architectural ordonnance for the kingdom in the Ming dynasty. Because the first emperor of the Ming dynasty had changed its Sajik ritual system several times, even the whole country of the Ming dynasty also had gone through chaos on this issue even after his death. Consequentially, the official documentation works had been made partially, there was no a complete document on this issue even in the Ming government.

Novel Accuracy Enhancement Method for Absolute Temperature Measurement Using TEC-LESS Control in Uncooled Thermal Imaging (비냉각 열상시스템에서 TEC-Less를 이용한 절대온도 측정 정밀도 향상 기법)

  • Han, Joon Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.41-47
    • /
    • 2012
  • Every object over $O^{\circ}K$ emits radiant energy based on its own temperature. Uncooled thermal imaging system displays the detected incident radiant energy as an image by signal processing. Recently, the uncooled thermal imaging system is applied to various areas such as medical, industrial, and military applications. Also, several researches are in progress to find new applications of the uncooled thermal imaging system. In this paper, we present effective method for controlling TEC-less detector in the uncooled thermal imaging system and also present the efficient control scheme for maximizing the accuracy of temperature measurement. The proposed scheme is to apply TEC-less and temperature detection algorithm in Uncooled thermal imaging system. In results of tests performed by using the actual chamber, we acquired images of better quality than the former system and temperature measurement accuracy was improved to less than $1^{\circ}C$.

A Study on Industrial Technology Leakage and Effective Industrial Security Measures through analysis of domestic portal article data (국내 포털 기사자료 분석을 통한 산업기술유출 사례와 산업보안 강화 방안 연구)

  • Yang, Hyun Jung;Lee, Chang Moo
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.3-13
    • /
    • 2017
  • In the knowledge-information society, many domestic companies put lots of investment in technical development to possess core technologies and intellectual property. However, in the results of passive investment in security to protect their technologies compared to the active investment in technical development, the technology leaks from many companies and research institutes are rapidly increasing. Such increase of technology leaks not only causes damage to companies, but also has harmful effects on national economy directly and indirectly. Even though it has been perceived that a lot of industrial technology leak crimes are committed by former/current workers of small and medium-sized businesses, it is hard to find researches that mainly compare and analyze them. Therefore, this study aimed to understand the actual status of industrial technology leaks by analyzing cases of industrial technology leaks from 2014 to 2016 based on the type of victimized companies, corporate internal leakers' positions, matter of complicity, tools used for technology leaks, and motivation for technology leaks. Through the analysis in each type, the patterns and characteristics of industrial technology leaks were researched, and also the exploratory research on industrial security for the prevention of industrial technology leaks was conducted.

The Development and Prospect for Economic Geography in a Knowledge-Information-Based Society (지식정보사회의 경제지리학 발전과 과제)

  • Han, Ju-Seong
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.11 no.3
    • /
    • pp.273-301
    • /
    • 2008
  • This study aims not only to examine the globalization, imformationization, and networking as background of knowledge-information-based society, but also to clarify the research fields of 'geography of knowledge' and further research themes for economic geography in a knowledge-information-based society. As a result of globalization, the degree of regional disparity, which had decreased with neoliberal policy in Europe and America in 1980's, has increased in early development states such as China and Eastern European countries. In opposition to the globalization that has led to increasing regional disparities at a global scale, many scholars argue that grassroots globalization or globalization from below is needed. Based on a pessimistic view on globalization, many maintain that unequal access to information has enlarged the gap between rich and poor. They also argue that the study of the geography of poverty is crucial in oder to solve the problem of bipolization. According to the world system theory, spatial grasp of commodity chains, actors' diversities, flows towards innovation in learning knowledges, and geographical, organizational, and institutional proximities are intertwined. Because these elements make significant influences each other in social networks, the interrelationships among those elements should be carefully considered. A 'geography of knowledge' deals with manufacturing, finance and service, media, cultural, and creative industries. Former researches in economic geography have tended to deal with those industries separately without attempting to make meaningful linkages among discussions on those industries.

  • PDF

A Study on Development of Internal Information Leak Symptom Detection Model by Using Internal Information Leak Scenario & Data Analytics (내부정보 유출 시나리오와 Data Analytics 기법을 활용한 내부정보 유출징후 탐지 모형 개발에 관한 연구)

  • Park, Hyun-Chul;Park, Jin-Sang;Kim, Jungduk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.957-966
    • /
    • 2020
  • According to the recent statistics of the National Industrial Security Center, about 80% of the confidential leak are caused by former and current employees in the case of domestic confidential leak accidents. Most of the information leak incidents by these insiders are due to poor security management system and information leak detection technology. Blocking confidential leak of insiders is a very important issue in the corporate security sector, but many previous researches have focused on responding to intrusions by external threats rather than by insider threats. Therefore, in this research, we design an internal information leak scenario to effectively and efficiently detect various abnormalities occurring in the enterprise, analyze the key indicators of the leak symptoms derived from the scenarios by using data analytics and propose a model that accurately detects leak activities.

General-Purpose Multi-Touch Inter action System for Multi-I/O Content Control (다중 입출력 컨텐츠 제어를 위한 범용 멀티 터치 인터렉션 시스템)

  • Bae, Ki-Tae;Kwon, Doo-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1933-1939
    • /
    • 2011
  • The former people who made musical instruments used touch devices for sound control. As the first multi-touch system appeared in 1982, the performance of the system has been improved rapidly by many researches. In spite of such performance improvement, the popularization of multi-touch interface was looked difficult. However, in 2007, multi-touch interfaces have become popular with Apple Iphone and people have been able to experience easily multi-touch interface using smart phones. In this paper we propose a general-purpose multi-touch interaction system for multi-touch content producer and market invigoration of multi-touch interface. We show by real field tests that the proposed method has benefits in the aspects of price and performance compared with other techniques.

Raw Sensor Single Image Super Resolution Using Color Corrector-Attention Network (코렉터 어텐션 네트워크을 이용한 로우 센서 영상 초해상화 기법)

  • Paul Shin;Teaha Kim;Yeejin Lee
    • Journal of Broadcast Engineering
    • /
    • v.28 no.1
    • /
    • pp.90-99
    • /
    • 2023
  • In this paper, we propose a super resolution network for raw sensor image which data size is lower comparatively to RGB image. But the actual capabilities of raw image super resolution depends on color correction because its absent of camera post processing that leads to unintended result having different white balance, saturation, etc. Thus, we introduce novel color corrector attention network by adopting the idea of precedent raw super resolution research, and tune to the our faced problem from data specification. The result is not superior to former researches but shows decent output on certain performance matrix. In the same time, we encounter new challenging problem of unexpected shadowing artifact around image objects that cause performance declination despite its good result overall. This problem remains a task to be solved in the future research.