http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
실도로 주행시험 데이터 기반 오르막차로 주행 시 운전패턴과 연비효율의 상관관계 연구
박준현(Junhyun Park),이영석(Youngseok Lee),정창현(Changhyun Jeong),정도현(Dohyun Jung),김진용(Jinyong Kim),정민지(MinJi Jeong) 한국자동차공학회 2011 한국자동차공학회 학술대회 및 전시회 Vol.2011 No.11
Even though you drive a fuel-efficient car, If it is not economical driving patterns, you difficult to get good fuel value. In this study, we demonstrated the economy driving pattern methods and effects in car uphill by analysing driving patterns of the actual drivers. As a first step, we classified the driving patterns of several drivers what drove gasoline and diesel vehicles on the same uphill course. In the second step, it analyzed the factors of economical driving by comparing the economical drivers and the uneconomical drivers driving patterns. Finally, we suggest the economical driving methods and explain those effects on the uphill course.
도로 속성정보를 활용한 경제운전 주행제어 알고리즘에 대한 T-Car 기반 성능 평가기술 개발
박준현(Junhyun Park),김진용(Jinyong Kim),정창현(Changhyun Jeong),정도현(Dohyun Jung),이영석(Youngseok Lee),정민지(MinJi Jeong) 한국자동차공학회 2012 한국자동차공학회 학술대회 및 전시회 Vol.2012 No.11
Although economical vehicles are under development, the fuel economy is hardly carried out in case that driving pattern is not effient. Therefore, the method to lead economic driving is highlighted nowadays. In this study, we tested the vehicle installed with an algorithm, which guarantees the stability of a driver and vehicle on the curved road section and displays the relationship between vehicle speed and fuel economy on the climbing road section.
鄭俊鉉,白永欽,金泰燕,孫光濟 대구대학교 과학기술연구소 1994 科學技術硏究 Vol.1 No.-
The purpose of this study is to identify the perception and attitudes of living norm(taboo) from tradition in the home, taking socio demographic factors into account. An instrument, based on previous research, was administered to 450 college students. Data are chi-square analyzed and frequencies and percentages are computed, using SAS program. Findings indicate that sex and academic major of students were significant factors in explaining the perceptual level of living abstention at home. For, the attitudes toward living abstention, academic major, family type, perceptual level were significant, while sex and religion were not significant factors. Similarities and differences between groups are discussed, and implications are provided.
The Social Relation Key: A new paradigm for security
Jeong, Sihyun,Lee, Jaehoon,Park, Junhyun,Kim, Chong-kwon Elsevier 2017 Information systems Vol.71 No.-
<P><B>Abstract</B></P> <P>For the last decade, online social networking services have consistently shown explosive annual growth, and have become some of the most widely used applications and services. Large amounts of social relation information accumulate on these platforms, and advanced services, such as targeted advertising and viral marketing, have been introduced to exploit this social information. Although many prior social relation-based services have been commerce oriented, we propose employing social relations to improve online security. Specifically, we propose that real social networks possess unique characteristics that are difficult to imitate through random or artificial networks. Also, the social relations of each individual are unique, like a fingerprint or an iris. These observations thus lead to the development of the Social Relation Key (SRK) concept. We applied the SRK concept in different use cases in the real world, including in the detection of spam SMSes, and another in pinpointing fraud in Twitter followers. Since spammers multicast the same SMS to multiple, randomly-selected receivers and normal users multicast an SMS to friends or acquaintances who know each other, we devise a detection scheme that makes use of a clustering coefficient. We conducted a large scale experiment using an SMS log obtained from a major cellular network operator in Korea, and observed that the proposed scheme performs significantly better than the conventional content-based Naive Bayesian Filtering (NBF). To detect fraud in Twitter followers, we use different social network signatures, namely isomorphic triadic counts, and the property of social status. The experiment based on a Twitter dataset again confirmed the feasibility of the SRK. Our codes are available on a website<ce:cross-ref refid='fn0001'> <SUP>1</SUP> </ce:cross-ref> .</P> <P><B>Highlights</B></P> <P> <UL> <LI> This paper proposes the concept of Social Relation Key using social relations for security purposes. </LI> <LI> We developed SMS spam detection scheme using clustering coefficient and a Twitter spam classifier using two social network features: the triad counts and social status. </LI> <LI> We conducted experiments using real-world large-scale social network data. </LI> <LI> The cellular network data is one of the largest and most recent sets of data, and our experimental results indicated the feasibility of the idea and the effectiveness for spam detection. </LI> </UL> </P>