http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
자동차 가상생산 기술 적용(V) - 객체지향 방법에 의한 디지털 조립공장의 파라메트릭 모델링
박태근,김건연,노상도,박영진,Park, Tae-Keun,Kim, Gun-Yeon,Noh, Sang-Do,Park, Young-Jin 대한산업공학회 2005 산업공학 Vol.18 No.1
Digital Manufacturing is a technology to facilitate effective product developments and agile productions by digital environments representing the physical and logical schema and the behavior of real manufacturing system including manufacturing resources, processes and products. A digital factory as a well-designed and integrated environment is essential for successful applications of this technology. In this research, we constructed a sophisticated digital factory of an automotive company’ general assembly shop by measuring and 3-D CAD modeling using parametric methods. Specific parameters of each objects were decided by object-oriented schema of the general assembly shop. It is expected that this method is very useful for constructions of a digital factory, and helps to manage diverse information and re-use 3D models.
The Life Cycle Cost Optimization Methodology as a Tool for Designing Apartment Units
박태근,Park Tae Keun Korean Institute of Construction Engineering and M 2000 한국건설관리학회 논문집 Vol.1 No.1
The future costs of energy and the cost of the repair of apartment buildings are expected to rise continuously in proportion to the initial costs. Therefore it has become important for these increasing costs to be incorporated and reflected in the design of the building. Systems such as structure and services for the buildings remain constant, but a number of the walls and windows can vary and thus have a major influence on the total construction and running costs of a building. The critical factor in the apartment unit design for the optimization of life cycle cost (LCC) is the ratio of the x and y axis of the walls in the unit plan. This paper demonstrates how to achieve the optimal size and thus optimize the LCC of the building. 최근 공동주택의 유지관리를 위한 인건비, 에너지비가 급속하게 증가하고 있다. 이에 따라 설계단계에서 이 비용을 절감할 수 있는 기법의 필요성이 제기되고 있다. 공동주택에 있어서는 대부분의 경우 세대당 동일한 내외벽, 창호 등이 반복적으로 사용되므로 단위평면의 LCC 최적화가 전체 건물의 LCC 최적화에 있어서 가장 중요하다. 이를 위하여 본 연구에서는 LCC 비용항목 중 공동주택의 물리적 시스템에 탄력성있게 변화하는 LCC 비용항목을 파악하였고, 초기건축비, 보수교체비, 에너지비를 종합적으로 최적화시킬 수 있도록 LCC 부위단가 개념을 도입하여 공동주택 적정치수 산정방법을 제시하였다. 여기에서 보수교체비산정은 보수교체비용 최소화에 의한 최적 보수교체주기법에 근거하였으며, 에너지 소비량 추정은 DOE-2에 의한 동적 에너지 부하량을 추정하여 LCC 부위단가 개념에 접목하였다. 보수교체비 최적화 기법과 동적에너지 분석에 의한 LCC 부위단가 개념은 기존의 개념과는 다른 독창적인 개념이다.
클러스터 기반 센서 망에서 데이터 전달 방법들의 성능 분석
박태근,Park Tae-Keun 한국통신학회 2006 韓國通信學會論文誌 Vol.31 No.3A
본 논문은 클러스터 기반 센서 망에 적합한 에너지 효율적인 토폴로지 관리 기법 개발을 위한 기반 연구로서, 세가지 종류의 데이터 전달 방법의 성능을 비교 분석한다. 첫 번째 방법에서는 각 클러스터의 헤더들만 무선 송수신 모듈을 활성화시켜 RTS/CTS/DATA/ACK 메시지 송수신에 참여하구 두 번째 방법에서는 각 클러스터당 다수 노드들이 메시지 교환에 참여한다. 마지막 방법에서는 각 클러스터의 헤더들만 RTS/CTS 메시지 교환을 위하여 무선 송수신 모듈을 활성화하는데, 자신의 클러스터 ID가 목적지 클러스터로 지정되어 있는 RTS 메시지를 수신한 클러스터 헤더는 다수 노드들의 무선 송수신 모듈을 활성화시켜 DATA 메시지 수신과 ACK 메시지 송신에 참여하도록 한다. 시뮬레이션을 통하여, 클러스터당 활성화될 노드의 수와 부하 및 패킷 손실 확률에 따라 이상의 세 가지 방법의 에너지 소모량을 비교 분석한다. This paper evaluates the performance of three types of data delivery mechanisms in clustered sensor networks, as a basic research to develop an energy efficient topology management scheme. In the first mechanism, one node per cluster(clusterhead) turns on its radio(or wakes up) to transmit and receive RTS/CTS/DATA/ACK messages, but in the second one, k nodes per cluster wake up and participate in the message exchange. In the last mechanism, clusterheads turn on the radio to exchange RTS/CTS messages, and if a clusterhead receives RTS containing its cluster m as a destination, it makes k nodes in the cluster hun on the radio to receive DATA and transmit ACK. Through simulation, we show the energy consumption of the three types of data delivery mechanisms as functions of the number of active nodes per cluster, offered load, and packet loss probability.
An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks
Tae-Keun Park(박태근),Kyung-Min Park(박경민),Dae-Sung Moon(문대성) 한국컴퓨터정보학회 2019 韓國컴퓨터情報學會論文誌 Vol.24 No.9
In this paper, we propose an approach to apply network-based moving target defense into Internet of Things (IoT) networks. The IoT is a technology that provides the high interconnectivity of things like electronic devices. However, cyber security risks are expected to increase as the interconnectivity of such devices increases. One recent study demonstrated a man-in-the-middle attack in the statically configured IoT network. In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. The approach continuously changes system’s attack surface to prevent attacks. After analyzing IPv4 / IPv6-based moving target defense schemes and IoT network-related technologies, we present our approach in terms of addressing systems, address mutation techniques, communication models, network configuration, and node mobility. In addition, we summarize the direction of future research in relation to the proposed approach.
Design of a Protected Server Network with Decoys for Network-based Moving Target Defense
박태근(Tae-Keun Park),박경민(Kyung-Min Park),문대성(Dae-Sung Moon) 한국컴퓨터정보학회 2018 韓國컴퓨터情報學會論文誌 Vol.23 No.9
In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. In this paper, we design a protected server network with a large number of decoys to anonymize the protected servers that dynamically mutate their IP address and port numbers according to Hidden Tunnel Networking, which is a network-based moving target defense scheme. In the network, a protected server is one-to-one mapped to a decoy-bed that generates a number of decoys, and the decoys share the same IP address pool with the protected server. First, the protected server network supports mutating the IP address and port numbers of the protected server very frequently regardless of the number of decoys. Second, it provides independence of the decoy-bed configuration. Third, it allows the protected servers to freely change their IP address pool. Lastly, it can reduce the possibility that an attacker will reuse the discovered attributes of a protected server in previous scanning. We believe that applying Hidden Tunnel Networking to protected servers in the proposed network can significantly reduce the probability of the protected servers being identified and compromised by attackers through deploying a large number of decoys.