http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
대형 트럭․트레일러용 슈퍼 싱글 휠 구조해석 및 위상최적화에 관한 연구
정윤식(Yunsik Jeong),노윤식(Yunsik Ro),장병춘(Byeongchun Jang),변용완(Yongwan Byeon),하태수(Taesoo Ha) 한국자동차공학회 2011 한국자동차공학회 학술대회 및 전시회 Vol.2011 No.11
Heavy duty vehicles such as large trucks, tractors, trailers consist of approximately four to five axles and tires and wheels in the rear axles is genearally used to the dual type. But, this type are some problems such as the increase of total weight, the rise of manufacturing costs, the brakedown of tire by extraneous bodies, and the rollover of vehicle. To solve the problem, super-single wheel is developed and produced in USA and EU. In the domestic market, the super-single tires were already developed with tire makers as the center, but super-single wheels remain to the unexplored area. The purpose of this paper is 3D modeling of super-sing wheel by Catia V5, structure analysis to use Ansys, coupled analysis using Tosca and design of super-single wheel appling topology optimization.
A Study on the Intelligent Business Matching System Using Celebrity Relationship Graph
Yunsik Son,Junho Jeong,Seokhoon Ko,Seman Oh 보안공학연구지원센터 2016 International Journal of Software Engineering and Vol.10 No.4
This paper proposes an intelligent recommendation system that has increasing promotion effect. Normally, intelligent recommendation system suggests suitable product to consumer but the Intelligent Recommendation System recommends fit well-known person to company for increasing promotion effect. It uses weight based algorithm and matching model based on well-known person relation graph.
관계형 데이터베이스 관리시스템 기반의 차량 위치정보 관리시스템 구현
길기정(Ki-jeong Khil),곽동호(Dongho Kwak),김민섭(Minseop Kim),김태환(Taehwan Kim),신우섭(Wooseop Sin),곽윤식(Yunsik Kwak),송석일(Seokil Song) 한국정보기술학회 2011 Proceedings of KIIT Conference Vol.2011 No.5
본 논문에서는 차량의 현재 위치 추적 및 과거 이동 경로, 특정 영역내의 차량 검색등을 지원하는 RDBMS 기반의 차량 위치정보 관리시스템을 구현하였다. 개발하는 시스템은 차량의 위치정보를 수신하고 저장하는 서버와 사용자에게 차량 위치에 대한 다양한 정보를 제공하는 클라이언트로 구성되어 있다. In this paper, we design and implement a vehicle location manager providing various location services such as tracking current locations of vehicles, search moving history of vehicles, range search and so on. Our developed system consists of a vehicle location server for gathering and managing vehicle locations and a client to present various services to users.
Lee, YangSun,Jeong, Junho,Son, Yunsik Elsevier 2017 Future generation computer systems Vol.76 No.-
<P><B>Abstract</B></P> <P>Recent years have seen the development of computing environments for IoT (Internet of Things) services, which exchange large amounts of information using various heterogeneous devices that are always connected to networks. Since the data communication and services occur on a variety of devices, which not only include traditional computing environments and mobile devices such as smartphones, but also household appliances, embedded devices, and sensor nodes, the security requirements are becoming increasingly important at this point in time. Already, in the case of mobile applications, security has emerged as a new issue, as the dissemination and use of mobile applications have been rapidly expanding. This software, including IoT services and mobile applications, is continuously exposed to malicious attacks by hackers, because it exchanges data in the open Internet environment. The security weaknesses of this software are the direct cause of software breaches causing serious economic loss. In recent years, the awareness that developing secure software is intrinsically the most effective way to eliminate the software vulnerability, rather than strengthening the security system of the external environment, has increased. Therefore, methodology based on the use of secure coding rules and checking tools is attracting attention to prevent software breaches in the coding stage to eliminate the above vulnerabilities. This paper proposes a compiler and a virtual machine with secure software concepts for developing secure and trustworthy services for IoT environments. By using a compiler and virtual machine, we approach the problem in two stages: a prevention stage, in which the secure compiler removes the security weaknesses from the source code during the application development phase, and a monitoring stage, in which the secure virtual machine monitors abnormal behavior such as buffer overflow attacks or untrusted input data handling while applications are running.</P> <P><B>Highlights</B></P> <P> <UL> <LI> Secure software for developing secure/trustworthy services for IoT was proposed. </LI> <LI> A secure compiler was used in the development phase to eliminate the weaknesses. </LI> <LI> A virtual machine was used in the operating phase to watch the abnormal behaviors. </LI> </UL> </P>