RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재후보

        디지털 생산성 향상을 위한 신경망 사용자 인증 모형 연구

        하태용,신용백 한국생산성학회 2004 生産性論集 Vol.18 No.3

        Web security middle ware system has two functions, which are user authentication and security access control. User authentication is to verify a valid user. User authentication is commonly based on the method of password. The losing, opening, and hacking password causes a critical security problem. This research is focused on developing a neural network approach for user authentication using keystroke. Two-phase approach for user authentication and verification is designed. This first-phase is based on pattern analysis of keystroke of user ID and password. The second-phase also employs patterns analysis on keystroke of randomly generated characters complementarily. Keystroke includes the information on duration of pressing a character and delay interval time between pressing a character and next character. The proposed approach basically relied on the individual keystroke pattern. Conventional back-propagation learning algorithm is adopted with multi-modal sigmoid function. Various experimental analysis are performed to verify the presented method. Seven characters are used as keystroke pattern data. Classical minimum distance classifier and single perceptron are compared to back-propagation. Back-propagation algorithm has superior performance among the three approaches having 0.02441 FRR and 0.0288% FAR, which are close to other recognition rate. After user authentication is performed, Access control is designed for controlling not permitted or not allowed access. The presented neural network based user authentication is applied for Web security middle ware system.

      • 玉內 製造企業의 管理圖適用 現況分析과 平均値와 範圍管理圖의 比較分析

        辛容伯,黃義徹 亞洲大學校 1985 論文集 Vol.8 No.-

        Recently control chart method are used more than about 86% of QC technics. Especially mean & range control chart are applied very useful above 68% of all control charts in manufacturing companies. Qccasionally a result of analyzing data from process sampling data do not estimate normal populations from a distribution of data so mean and range control charts for nonsymmetrical distributions are not estimate normal populations directly. Same that the distribution of sample mean is much closer to the normal form than the distribution of items in a skewed population, the populatin sometimes departs so far from the normal population are unsatisfactory. These solutions of the problem are possible, increase the sample size, use unsymmetrical control limits, transform the data into an approximately normal formly the use of some other function. In Korea manufacturing companies are used very popular to mean and range control charts recently. But mean and range control chart of non-normal distribution for 3 sigma method sujest following that normal and good quality products are accured assignable cause from process during so analytical control charts can be analysed exactness as much more.

      • 韓國的 小集團 分任造活動의 效果的인 推進模型設定에 關한 硏究 : 工長새마을品質管理 分任造活動을 中心으로

        辛容伯 亞洲大學校 1986 論文集 Vol.9 No.-

        Since November 1982 QC circle and Factory Saemaul activity small group conventions has been united, many problems have been disclosed that are against the basic principles more or less. Worker's group activity is, essentially, a trouble shooting oriented voluntary small group within their working place to improve the surroundings creatively. In practice, however, many groups are so typical and so impetuous of the material effect that it is worried to be inclined to outform rather than contents. To prevent this point it is recommaned that worker's group activity be promoted continuously and on the basis of the original principle of small group activity to obtain practical and rich results, so systematic procedure model is designed for effective small group activity and application of technical control method in Korea industry.

      • KCI등재후보

        디지털 생산성 향상을 위한 웹 보안 미들웨어시스템 구현에 관한 연구

        하태용,이강원,신용백 한국생산성학회 2003 生産性論集 Vol.17 No.1

        The puropose of this paper is the materialization of web security middle wear system for the improvement of digital productivity in e-business. Tnternet changed e-business information epochally and contributed in digital productivity enlargement through easy access of resources. But, Internet have a weakness security, because it is offered through many unspecific access. For this reason, the web security problem solution play important role in the digital productivity elevation in e-business environment. The role of security system is prevent resources of system from user who is not permitted. In a recent, there is a case that use strong interception system such as a security firewall for the security, but there is a fair difficulty at introduction expense and operation. Specially, A wrong policy decision have influence on all network and it could be a major cause for reduction network. This study proposes security solution though the research about middle wear embodiment such as user certification and access control from the view point of individuation web system defense.

      • KCI등재

        저작물의 인용평가 시스템 구현에 관한 연구

        하태용,신용백 한국생산성학회 2001 生産性論集 Vol.15 No.1

        The purpose of this study is to analyze and implementation of the extract evaluation system about literary works. Recently, many literary works is copied by illegal, but there is no measure unit about it. The degree of extraction is evaluated by its key word in some of literary works, but it is impossible to measure its degree of extraction exactly. This study implemented evaluation system to measure the extract status of literary work using by how to block binary file and its algorithm. Follow the next step. Step 1: Select two files (source file, target file) Step 2: Block files with specified size. Step 3: Search source block in target file. Step 4: Calculate the rate of extract Step 5: Group the similar literary works. Step 6: Report The results are expected to provide the information of extract degree in literary works. However, this study has several limitations. First, it takes long time to compare files. Second, this study has many meaningless blocks in files. Therefore, hereafter, literary works must be clustered with a kind of its and we will need searching for meaningless blocks.

      • KCI등재후보

        경제성을 고려한 자동차 부품공장에서의 재고관리시스템 개발

        이강원,신용백 대한설비관리학회 2004 대한설비관리학회지 Vol.9 No.1

        Many variables in corporate environment make it difficult to plan and set cost-effective safety inventory levels. This study proposes a new model for setting safety inventory levels; its model considers orders and inventory cost under the Two-Bin system and ABC inventory management in order to reduce costs and keep the due date. It applys its model to the traditional inventory management systems of automobile parts sub-manufacturers which is changed unpredictedly and frequently. They should meet two conditions to keep economic inventory levels and continuous supply inventory ones. This study revises the traditional concepts and techniques in the inventory management. The results provide traditional systems with cost reduction, less inventory and more flexibility.

      • KCI등재

        제조기업의 생산성향상을 위한 체질중심적 작업할당 연구

        윤상원,신용백 한국생산성학회 2001 生産性論集 Vol.15 No.1

        We detect lots of problems on the manufacturing spot because of working results done without considering the aptitude and inherited temper(constitution, blood type, male and female) of the worker, and they lead to results not only the occupational disease and the cause of industrial accidents but also quality deterioration and productivity reduction in point of view of manufacturing management. For the purpose of solving these problems, this study is performed by grasping the correlation sasang constitutions and job characteristic of small & medium enterprises. We classify sasang constitutions to four types : so-yang-in type, tae-yang-in type, tae-em-in type, so-em-in type by the utilization of QSCC II and the doctor aid of oriental medicine. This study tries to identify significant features between major jobs resulting from sasang constitution types in a specific small & medium enterprise producing electronic productions(CCTV). The results of this case study indicated that sasang constitution types influenced job types. Under the working conditions that virtual reality scene photographed by video camera are running, also the effects of brain function of each worker using Electroencephalograms(EEGs) are investigated. An statistical analysis of experiments conducted shows the various changes of brain waves (α, β, θ, δ waves). By means of these study results, we can identify that sasang constitutions should be applied to contribute much to quality advancement and productivity improvement through a comparative study on the job characteristic.

      • KCI등재
      • KCI등재
      • KCI등재

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼