http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
멱법칙 기반의 풍하중과 건축구조기준의 고도분포계수(Kzr)를 이용한 풍하중의 비교분석
김예준,조영민 한국전산유체공학회 2023 한국전산유체공학회지 Vol.28 No.3
Wind load is an essential consideration in all building design. It refers to the force of the wind on the building and is a crucial factor in determining the strength and stability of the structure. There are several reasons why it is important to set wind load for calculating building wind. Firstly, wind load is one of the significant loads that a building must withstand. Resistance to wind load is essential to prevent structural damage during high wind events such as storms, hurricanes, and tornadoes. By setting wind load, engineers can determine the wind pressure that the building will experience and design the structure accordingly. Secondly, wind load affects the performance and energy efficiency of the building. The front of the building is typically the primary obstacle to wind load and can have a significant impact on the building's energy consumption. By setting wind load, designers can optimize the building's appearance to minimize energy consumption and improve the building's performance. In this study, we compared and analyzed wind loads calculated using the power law method and the altitude distribution coefficient of wind speed (Kzr) that varies depending on the surface condition. Through this comparison, we were able to analyze the differences in the wake resulting from wind load settings and determine the wind load settings according to the ground environment.
Taxonomy of Korean Scaphisoma Leach (Coleoptera: Staphylinidae: Scaphidiinae)
김예준,안기정 국립중앙과학관 2022 Journal of Asia-Pacific Biodiversity Vol.15 No.4
A taxonomic study of the Scaphisoma Leach in Korea is presented. Scaphisoma unicolor Achard andS. subalpinum ussuricum Löbl are reported for the first time in the Korean Peninsula. We provide a keyand diagnoses with illustrations of habitus and diagnostic characters of six Korean Scaphisoma species.
The first discovery of Parabolitobius Li, Zhao and Sakai (Coleoptera: Staphylinidae) in Korea
김예준,안기정 국립중앙과학관 2022 Journal of Asia-Pacific Biodiversity Vol.15 No.1
The genus Parabolitobius Li, Zhao and Sakai is reported for the first time in the Korean Peninsula. Adiagnosis and habitus photographs of P. prolongatus (Sharp) are provided to facilitate identification.
제조 공정 결함 탐지를 위한 MixMatch 기반 준지도학습 성능 분석
김예준,정예은,김용수 한국산업경영시스템학회 2023 한국산업경영시스템학회지 Vol.46 No.4
Recently, there has been an increasing attempt to replace defect detection inspections in the manufacturing industry using deep learning techniques. However, obtaining substantial high-quality labeled data to enhance the performance of deep learning models entails economic and temporal constraints. As a solution for this problem, semi-supervised learning, using a limited amount of labeled data, has been gaining traction. This study assesses the effectiveness of semi-supervised learning in the defect detection process of manufacturing using the MixMatch algorithm. The MixMatch algorithm incorporates three dominant paradigms in the semi-supervised field: Consistency regularization, Entropy minimization, and Generic regularization. The performance of semi-supervised learning based on the MixMatch algorithm was compared with that of supervised learning using defect image data from the metal casting process. For the experiments, the ratio of labeled data was adjusted to 5%, 10%, 25%, and 50% of the total data. At a labeled data ratio of 5%, semi-supervised learning achieved a classification accuracy of 90.19%, outperforming supervised learning by approximately 22%p. At a 10% ratio, it surpassed supervised learning by around 8%p, achieving a 92.89% accuracy. These results demonstrate that semi-supervised learning can achieve significant outcomes even with a very limited amount of labeled data, suggesting its invaluable application in real-world research and industrial settings where labeled data is limited.
김예준,정재형,박찬국 제어·로봇·시스템학회 2020 제어·로봇·시스템학회 논문지 Vol.26 No.9
In this paper, we apply a keyframe selection strategy that applies a 2-way marginalization method to a MSCKF(Multi-State Constraint Kalman Filter), which converts a sliding window to consist of keyframes. In SLAM(Simultaneous Localization and Mapping) or VIO(Visual Inertial Odometry) problems, various criteria for keyframes are used, such as relative translation, rotation, and tracking rate. However, each criterion has thresholds that determine whether the frame is a keyframe, and setting all of the thresholds is a cumbersome task. In this paper, the only criteria considered were those that are ratios of the number of newly observed features in that frame to all currently tracking features, since these criteria can substitute for other criteria. It was also found that the optimal threshold changed according to the mean feature tracking length, and the relation between them was determined via simulations and fitted with a polynomial. Adaptive keyframe threshold selection using the fitted polynomial was then applied to the trajectory whose mean feature tracking length varied in the simulation and KITTI dataset. The results indicate that the position error was decreased compared to the fixed keyframe threshold method. .
체계적인 IoT 기기의 펌웨어 보안 분석 방법에 관한 연구
김예준(Yejun Kim),김정현(Jeonghyeon Gim),김승주(Seungjoo Kim) 한국정보보호학회 2021 정보보호학회논문지 Vol.31 No.1
IoT 기기는 네트워크 통신이 가능한 임베디드 기기를 의미한다. IoT 기기는 금융, 개인, 산업, 공공, 군 등과 같이 우리 주변의 다양한 분야에서 많이 사용되고 있기 때문에 공격이 발생할 경우 개인정보 유출과 같은 다양한 피해가 발생할 수 있다. IoT에 대한 취약점 분석은 IoT 기기와 상호작용 하는 스마트폰의 애플리케이션, 웹 사이트와 같은 소프트웨어 인터페이스 분석뿐만 아니라, IoT 기기의 주요 구성요소인 펌웨어에 대해서도 필수적으로 수행되어야 한다. 하지만 문제는 펌웨어의 추출 및 분석이 생각보다 쉽지 않으며, 보안팀 내 분석하는 사람의 전문성에 따라 같은 대상을 분석하더라도 결과물의 수준이 다를 수 있어 일정한 수준의 품질 관리가 쉽지 않다는 것이다. 따라서 본 논문에서 우리는 IoT 기기의 펌웨어에 대한 취약점 분석 프로세스를 정립하고 단계별로 사용 가능한 도구를 제시함으로써, IoT 보안성 분석에 있어 로드맵을 제시하고 일정한 수준의 품질 관리가 가능하였다. 우리는 다양한 상용 제조사들이 생산한 IoT 기기의 펌웨어 획득부터 분석까지의 과정을 제안하였으며, 이를 다양한 제조사의 드론 분석에 직접 적용해 봄으로써 그 타당성을 입증하였다. IoT devices refer to embedded devices that can communicate with networks. Since there are various types of IoT devices and they are widely used around us, in the event of an attack, damages such as personal information leakage can occur depending on the type of device. While the security team analyzes IoT devices, they should target firmware as well as software interfaces since IoT devices are operated by both of them. However, the problem is that it is not easy to extract and analyze firmware and that it is not easy to manage product quality at a certain level even if the same target is analyzed according to the analyst"s expertise within the security team. Therefore, in this paper, we intend to establish a vulnerability analysis process for the firmware of IoT devices and present available tools for each step. Besides, we organized the process from firmware acquisition to analysis of IoT devices produced by various commercial manufacturers, and we wanted to prove their validity by applying it directly to drone analysis by various manufacturers.