International journal of advanced smart convergence
The Institute of Internet, Broadcasting and Communication
- Quarterly
- /
- 2288-2847(pISSN)
- /
- 2288-2855(eISSN)
Domain
- Media/Communication/Library&Information > Media/Consumers
Aim & Scope
The International Journal of Advanced Smart Convergence(IJASC) is an international interdisciplinary journal published by the Institute of Internet, Broadcasting and Communication (IIBC). The journal aims to present the advanced smart convergence of all academic and industrial fields through the publication of original research papers. These papers present the original and novel findings as well as important results along with various articles that have the greastest possible impact on various disciplines from the wide areas of Advanced Smart Convergence(ASC). The journal covers all areas of academic and industrial fields in 6 focal sections: 1. Telecommunication Information Technology (TIT) 2. Human-Machine Interaction Technology (HIT) 3. Nano Information Technology (NIT) 4. Culture Information Technology (CIT) 5. Bio and medical Information Technology (BIT) 6. Environmental Information Technology (EIT)
KSCI KCIVolume 10 Issue 3
-
In the Internet of Thing (IoT) framework, massive machine-type communications (MMTC) have required large spectral efficiency. For this, non-orthogonal multiple access (NOMA) has emerged as an efficient solution. Recently, a non-successive interference cancellation (SIC) NOMA scheme has been implemented without loss. This lossless NOMA without SIC is achieved via correlated superposition coding (SC), in contrast to conventional independent SC. However, conventional minimum high-correlated SC for only 2-user NOMA schemes was investigated in the lossless 2-user non-SIC NOMA implementation. Thus, this paper investigates a 3-user low-correlated SC scheme, especially for an inflated achievable sum rate, with a design of 3-user low-correlated SC. First, we design the 3-user low-correlated SC scheme by taking the minimum sum rate between 3-user SIC NOMA and 3-user non-SIC NOMA, both with correlated SC. Then, simulations demonstrate that the low correlation in the direction of the first user's power allocation inflates the sum rate in the same direction, compared to that of conventional minimum high-correlated SC NOMA, and such inflation due to low correlation is also observed similarly, in the direction of the second user's power allocation. Moreover, we also show that the two low correlations of the first and second users inflates doubly in the both directions of the first and second users' power allocations. As a result, the proposed 3-user low-correlated SC could be considered as a promising scheme, with the inflated sum rate in the future fifth-generation (5G) NOMA networks.
-
In this paper, we devise a Shapley-value-based covert channel in smartphones. More specifically, unlike ordinary use of Shapley value in cooperative game, we make use of a series of Shapley values, which are computed from sensor data collected from smartphones, in order to create a covert channel between encoding smartphone and decoding smartphone. To the best of our knowledge, we are the first to contrive covert channel based on Shapley values. We evaluate the encoding process of our proposed covert channel through simulation and present our evaluation results.
-
As a new paradigm in non-orthogonal multiple access (NOMA), correlated superposition coding (CSC) has gained an attention in the literature of NOMA, in contrast to standard independent superposition coding (ISC). In the conventional 3-user CSC scheme, it has been reported that the average allocated power can be reduced, owing to an introduced correlation between transmitted signals. Thus, this paper proposes a 3-user cross CSC scheme with purely-imaginary correlation coefficients. First, we derive the achievable data rates of the proposed 3-user cross CSC scheme, for each of the three users. Then, simulations demonstrate that for the proposed 3-user cross CSC scheme, the achievable data rates of the first and second users increase greatly and slightly, respectively, whereas the achievable data rate of the third user decreases little, compared to those of the conventional 3-user CSC scheme. In addition, we also show that the sum rate of the three users of the proposed 3-user cross CSC scheme is much larger than that of the three users of the conventional 3-user CSC scheme. As a result, the proposed 3-user cross CSC scheme could be a solution to the problem of the reduction of the average allocated total power in the conventional 3-user CSC scheme toward the fifth-generation (5G) NOMA mobile networks.
-
The purpose of this study is to identify the impact of online golf product consumers' face on symbolic consumption trends, product satisfaction and new product purchase intention. To this end, a survey was conducted on 300 customers who have purchased golf products online at golf practice centers located in Seoul, Gyeonggi Province and Chungcheongnam-do Province. Data processing was performed using SPSS 23 and AMOS 18 to analyze verifiable factors, reliability, correlation, and structural equations. We obtained the following results. First, face has been shown to have a significant impact on symbolic consumption propensity. Second, symbolic consumption tendencies have a significant impact on product satisfaction and intention to purchase new products. Third, product satisfaction has been shown to have a negative impact on the intention of purchasing new products.
-
Recently, wearable computers equipped with various biosensors such as smart watches, smart bands, and smart patches that support daily health management of users as well as patients have been released. Users of wearable computers such as smart watches face various difficulties in performing biometric information processes such as data sensing, collection, transmission, real-time analysis, and feedback in a weak wireless and mobile biometric information service environment. In particular, the biometric information collection interface is an important basic process that determines the quality and performance of the entire biometric information service. So far, research has focused on sensing hardware and logic. This study intensively considers the interface method for effectively sensing and collecting raw biometric information. In particular, the process of collecting biometric information is designed and analyzed from the perspective of periodicity. Therefore, we propose an efficient and stable periodic collection method.
-
The purpose of this study is to analyze various energy platforms using data in the US and to suggest directions and implications. Some of the leading energy platforms are selected and analyzed based on the opening platform model. We focus on the case analysis of the US utility companies. In case of the horizontal open platform, Green Button sponsor's 'Connect My Data (CMD)' driven by the government invites the utility companies to jointly develop the sponsor's data solution. In case of the vertical open platform, the certification program 'Share My Data (SMD)' allows backward compatibility, because the technical improvement is minimal. The utility companies benchmark Amazon's three-sided market mediation and prefer platform and category exclusivity. For the former, they have data analytics companies like Enervee, Opower and for the latter, they have electronics manufactures and energy service providers (ESPs) like Distributed Energy Resources (DERs). Based on this US case study, we suggest the energy platforms to open their platform for renewable energy supply, energy conservation, high-efficiency products, and residential DER dissemination. To successfully implement the government's energy transition policy, the US platforms should be benchmarked as a business model. Especially, it is needed for them to coordinate a platform ecosystem. To ensure trust in the products and services offered on the marketplace platform, platform's certification program is helpful.
-
In this paper, we propose a deep learning classifier for estimating the number of layers in the Earth's structure. When installing a grounding system, knowledge of the subsurface in the area is absolutely necessary. The subsurface structure can be modeled by the earth parameters. Knowing the exact number of layers can significantly reduce the amount of computation to estimate these parameters. The classifier consists of a feedforward neural network. Apparent resistivity curves were used to train the deep learning classifier. The apparent resistivity at 20 equally spaced log points in each curve are used as the features for the input of the deep learning classifier. Apparent resistivity curve data sets are collected either by theoretical calculations or by Wenner's measurement method. Deep learning classifiers are coded by Keras, an open source neural network library written in Python. This model has been shown to converge with close to 100% accuracy.
-
In this paper, we propose the AI certification standardization activities for systematic research and planning for the standardization of trustworthy artificial intelligence (AI). The activities will be in two-fold. In the stage 1, we investigate the scope and possibility of standardization through AI reliability technology research targeting international standards organizations. And we establish the AI reliability technology standard and AI reliability verification for the feasibility of the AI reliability technology/certification standards. In the stage 2, based on the standard technical specifications established in the previous stage, we establish AI reliability certification program for verification of products, systems and services. Along with the establishment of the AI reliability certification system, a global InterOp (Interoperability test) event, an AI reliability certification international standard meetings and seminars are to be held for the spread of AI reliability certification. Finally, TAIPP (Trustworthy AI Partnership Project) will be established through the participation of relevant standards organizations and industries to overall maintain and develop standards and certification programs to ensure the governance of AI reliability certification standards.
-
Lim, Myung-Jae;Jung, Dong-Kun;Kim, Kyu-Dong;Kwon, Young-Man 66
Recent healthcare environments have characteristics of expanding the scope of healthcare-impacting healthcare, complexity resulting from diversification of components, and accelerating the pace of change. Drugs are used for the prevention, mitigation, and treatment of diseases, so they can inevitably cause harm, while they have efficacy and effectiveness, which are key elements of health recovery. Therefore, many countries regulate permits for safe and effective medicines, and also designate essential drugs directly related to life as pay targets and guarantee health insurance. Especially Pharmacist relying on manpower for composition medicine is liable for mal-manufacture due to combination of toxic medical substances or other chemical usage. In this paper, we focus on using Kiosk and Optical Character Recognition (OCR) for automated pharmacy to level up medical service and create labor friendly environment for pharmacist themselves through maintenance of prescription data and automated manufacturing solution. Presentation of drug substances and precautions will lead to efficient drug prescription and prevent misuse of information while auto manufacturing system efficiently maintain labor force and raise patient satisfaction level by reduction of waiting time. -
Metaverse is an immersive 3D virtual environment, a true virtual artificial community in which avatars act as the user's alter ego and interact with each other. If we do not manage the hype for the metaverse, which has recently been receiving a surge in interest, the metaverse will fail to cross the chasm. In this study, to provide stakeholders with insights for the successful introduction and growth of the 3D immersive next-generation virtual world, metaverse, we analyzed user-side interest, media-side interest, and research-side interest. For this purpose, in this study, search traffic, news frequency and topic, and research article frequency and topic were analyzed. The methodology and results of this study are expected to provide insight for the stable success of metaverse transformation and the coexistence of the real world and the virtual world through hyper-connection and hyper-convergence.
-
This paper proposes two types of subharmonic RF receiver front-end (called LMV) where, in a single stage, quadrature voltage-controlled oscillator (QVCO) is stacked on top of a low noise amplifier. Since the QVCO itself plays the role of the single-balanced subharmonic mixer with the dc current reuse technique by stacking, the proposed topology can remove the RF mixer component in the RF front-end and thus reduce the chip size and the power consumption. Another advantage of the proposed topologies is that many challenges of the direct conversion receiver can be easily evaded with the subharmonic mixing in the QVCO itself. The intermediate frequency signal can be directly extracted at the center taps of the two inductors of the QVCO. Using a 65 nm complementary metal oxide semiconductor (CMOS) technology, the proposed subharmonic RF front-ends are designed. Oscillating at around 2.4 GHz band, the proposed subharmonic LMVs are compared in terms of phase noise, voltage conversion gain and double sideband noise figure. The subharmonic LMVs consume about 330 ㎼ dc power from a 1-V supply.
-
Jung, Se Jun;Kim, Janghwan;Lee, Won Young;Park, Bo Kyung;Son, Hyun Seung;Kim, R. Young Chul 89
In various areas of the 4th industry, a big issue is software quality enhancement for stability and reliability of the smart software systems. After revising software promotion law at 2020, we must clearly define requirements and separate design parts and implementation parts of an all public software development contracts. In this study, we need to validate whether the final implementation of software is followed by the original design or not. To do this, we consider the design restoration through software visualization based on reverse engineering. Therefore we propose an UML design extraction and visualization method based on reverse engineering. Based on this, we may validate whether it is implemented according to the original design, and how much visualizes and includes the code the internal complexity for improvement of software quality. -
Nguyen, Quoc Cuong;Tran, Thi Huyen;Nguyen, Quoc Kien;Kwon, HyukDong 97
The Industrial Revolution 4.0 has significantly improved labor productivity, upholding the role of people as the creator of core values and the focus of sustainable development. Vietnam is facing an important turning point when GDP growth has gradually slowed down in the context that natural resources are beginning to dry up. This requires Vietnamese businesses to innovate to promote economic growth and improve competitiveness. This paper focuses on clarifying the activity and policy Vietnam's innovation. Thereby to propose the solution for supporting and promoting of innovative startup enterprise in accordance with the conditions and circumstances of Vietnam in the context of Industry 4.0 -
This study was conducted on 878 retired women in their 50s and 60s across the country using the 7th data from the National Pension Service's KReiS. We used SPSS WIN 18.0, and the analysis results are as follows. First, there were many highly educated people in their 50s or older and those in their 60s and undereducated. Second, families in their 50s had the largest number of members with more than three, while households in their 60s had the largest number of two. Third, both age groups chose themselves and their spouses as responsibilities for preparing for retirement. In addition, more people in their 60s chose the government as their responsibility for preparing for retirement than in their 50s. Both people in their 50s and 60s say they are "not prepared" to prepare for retirement expenses, raising concerns about elderly poverty. Fourth, economic strength, health, and medical care were important for retirement in both age groups as part of their preparations for retirement, and they chose economic strength, health, medical care and job as the things to do in society. Fifth, both people in their 50s and 60s have very low public and private pension subscription rates, requiring special attention from the government and society to their old age. Judging from the above results, both women in their 50s and 60s have retired, but preparations for retirement are very insufficient. Therefore, the government and society need to strengthen the public pension system and create jobs for the elderly.
-
This study was conducted on 1,174 retirees in their 50s and 60s nationwide using the 7th data of the National Pension Service's National Elderly Security Panel Survey. We were able to confirm the following results through the SPSS WIN 18.0 program.. First, men showed a higher level of education than women. From these results, it is expected that men will be better prepared for retirement. Second, men had spouses and two or more household members than women. According to previous studies showing that men are better prepared for retirement if they have a spouse, it is expected that men are better prepared for retirement. Second, 38% of men and 62% of women were voluntary retirees. Third, both men and women responded that their own and spouses should play the main role in preparing for retirement. Fourth, both men and women had very low rates of preparation for old age, economic independence, and public and private pensions. Among them, women were lower than men. Fifth, economic problem solving, health, and medical care were the priority as parts to be done for retirement in oneself and society. Based on these results, the directions for preparing retirees for retirement are as follows. First, education on wage peak system, retirement age extension and financial management for involuntary retirees is required, and guidance and management methods on health care and disease should be provided to address needs for health and health care. Women had more voluntary retirees than men, and they need to know why. Second, when both men and women are very poor at preparing for retirement, there should be job creation measures to ensure that they and their spouses are fully prepared for retirement.
-
This study is about an Artificial Intelligence-based fake news identification system and its methods to determine the authenticity of content distributed over the Internet. Among the news we encounter is news that an individual or organization intentionally writes something that is not true to achieve a particular purpose, so-called fake news. In this study, we intend to design a system that uses Artificial Intelligence techniques to identify fake content that exists within the news. The proposed identification model will propose a method of extracting multiple unit factors from the target content. Through this, attempts will be made to classify unit factors into different types. In addition, the design of the preprocessing process will be carried out to parse only the necessary information by analyzing the unit factor. Based on these results, we will design the part where the unit fact is analyzed using the deep learning prediction model as a predetermined unit. The model will also include a design for a database that determines the degree of fake news in the target content and stores the information in the identified unit factor through the analyzed unit factor.
-
Recently, there has been an active service that provides customized news to news subscribers. In this study, we intend to design a customized news service system through Deep Learning-based Social Network Service (SNS) activity analysis, applying real news and avoiding fake news. In other words, the core of this study is the study of delivery methods and delivery devices to provide customized news services based on analysis of users, SNS activities. First of all, this research method consists of a total of five steps. In the first stage, social network service site access records are received from user terminals, and in the second stage, SNS sites are searched based on SNS site access records received to obtain user profile information and user SNS activity information. In step 3, the user's propensity is analyzed based on user profile information and SNS activity information, and in step 4, user-tailored news is selected through news search based on user propensity analysis results. Finally, in step 5, custom news is sent to the user terminal. This study will be of great help to news service providers to increase the number of news subscribers.
-
Smartphones have been widely used for various purposes and stay connected with people at all times. However, the use of such touchscreen devices can be physically restricted depending on users' context where only one hand is available to interact with the device. Even major smartphone manufacturers (e.g., Apple, Samsung) offer one handed mode, they still lack functions in the third-party applications, and the process is also complicated. We propose OverIT, a system that enables users to customize interfaces by adding new buttons on an interactive overlay which can be positioned anywhere on the touchscreen where each button serves the same functionality as an existing one. It is designed to support users to map a certain button event freely and easily to a newly created button by performing a demonstration of a button tap. We expect our system to improve the overall user experience of one-handed interaction with touchscreen devices.
-
Today, 3D softwares have become an essential tool in all areas of Video, including Movies, Animations, CFs, Motion Graphics and Games. One of the most commonly used fields is the 3D character video part. However, these 3D character animations and motion graphics softwares are difficult to learn and too much to learn, making it difficult to learn them all in a university education with a limited time of four years. In this paper, many Inverse kinematics tools, which are essential in the 3D character animations and motion graphics field, compare and analyze the strengths and weaknesses of each tool, focusing on Bone, Character Studio, and Character Animation Toolkit, which are most commonly used in work fields. And use Delphi techniques for 3D experts to secure objectivity. Therefore, for universities that require large amounts of teaching in a limited time, I propose an analysis of which of the above three Inverse Kinetics tools is advantageous for students to select and focus on for efficient education.
-
With the recent increase in YouTube content, many YouTubers are shooting with a handheld camera. Audiences are increasingly accustomed to the movement of handheld cameras. As the camera moves faster than the camera movement of the old movies, and the camera moves splendidly to the music of the music video, the camera movement in CG animation is also needed to change. The handheld Steadicam creates a natural camera movement by compensating so that the screen does not vibrate significantly even when the vibration is large and by minimizing rotation. In order to implement such camera movement, we tried to make a handheld Steadicam using nParticle simulation of Maya software and apply it to the scene to verify whether it is possible to implement the necessary natural and various movement.
-
Recently, Machine Learning-based visualization approaches have been proposed to combat the problem of malware detection. Unfortunately, these techniques are exposed to Adversarial examples. Adversarial examples are noises which can deceive the deep learning based malware detection network such that the malware becomes unrecognizable. To address the shortcomings of these approaches, we present Block-matching and 3D filtering (BM3D) algorithm and deep image prior based denoising technique to defend against adversarial examples on visualization-based malware detection systems. The BM3D based denoising method eliminates most of the adversarial noise. After that the deep image prior based denoising removes the remaining subtle noise. Experimental results on the MS BIG malware dataset and benign samples show that the proposed denoising based defense recovers the performance of the adversarial attacked CNN model for malware detection to some extent.
-
The purpose of this study is to analyze the structural relationship among perfectionism and dance achievement of middle and high school students majoring in dance. Specifically, this study aims to investigate the effects of perfectionism on dance achievement through the medium of dance commitment and career decision-making self-efficacy. For this purpose, a structural equation model based on the previous studies was constructed with perfectionism as an exogenous variable and dance commitment, career decision-making self-efficacy, and dance achievement as endogenous variables. The final subjects of this study were 279 middle and high school students majoring in dance. The data were processed by frequency analysis to find out personal characteristics using SPSS 23 and exploratory factor analysis and reliability analysis were conducted on the research tools. In addition, AMOS 21 was used for confirmatory factor analysis, correlation analysis and structural equation model analysis. As a result of data processing on the research model. First, the sub-dimensions of perfectionism tendency 'worry about mistakes', 'personal standard', and 'doubt about behavior' had a statistically significant effect on dance commitment. Second, the sub-dimensions of perfectionism 'worry about mistakes', 'personal standard', and 'doubt about behavior' had statistically significant effects on career decision-making self-efficacy. Third, dance commitment did not have a statistically significant effect on dance achievement, but career decision-making self-efficacy had a statistically significant effect on dance achievement. These results provide implications.
-
Among human intellectual creations, the right granted by law to what is worth protecting is defined as intellectual property rights. Copyright is a legal right to creative finished products made by individuals, and in recent years, this legal right has been recognized as very important. In other words, copyright is a system created to protect the rights of individuals who created creations and to recognize their efforts. Works subject to copyright vary from poetry, thesis, novels to designs, paintings, music, and architecture, and the scope of the subject is gradually expanding. Recently, research has begun on how far the Metaverse design area absorbed into the real world among works. Computer-generated video productions and software program works are also subject to digital copyright protection, but it is also true that the interpretation of the author protection law for works, designs, and trademarks in the virtual world is unclear. This study aims to analyze copyrights based on case studies and theoretical backgrounds on copyright protection and to discuss the protection limitations of Metaverse design in the virtual world. In other words, the direction for the protection of Metaverse design is presented through clear distinction and definition of copyright protection in the tertiary virtual world. This study aims to present methods for design copyright protection in the era of Metaverse, respect copyright holders' creative activities, and develop our culture through protection of creations.
-
We present following research summary and implications through the analysis of the research. First, the before the opening of public cremation facilities compared to new opening of those, the number of the corpse cremation increases to annual average of 5.5% of the rate, and it has a positive effect on increasing rate of the cremation. Therefore, a policy of expanding the supply of public cremation facilities should be pursued to improve cremation rate in the area of uninstalled public cremation facilities. Second, the before the opening of public cremation facilities compared to new opening of those, the number of the corpse cremation has increased to the annual average 3,623 people(56.9%) at jurisdiction area, while it has decreased to 949 people (28.3%) at the out of the jurisdiction area. The active efforts and building the funding expansion should be made to establish public cremation facilities of the central and local governments to improve convenience of the use of public cremation facilities. Third, since the before and after opening of public cremation facilities at Jeongeup City lead to great effect on demand of jurisdiction area and out of the jurisdiction area, the cremation demand should be reduced through the supply expansion of public cremation facilities and differentiation strategy to control cremation demand at the out of the jurisdiction area, focusing on metropolitan areas with high cremation demand, such as metropolitan areas or metropolitan cities.
-
Based on the results of the survey and analysis of this study, we suggested a plan to activate the use of Capital Area Public Charnel Facilities as follows. First, the elderly population in Korea increased from 11.9% in 2013 to 16.4% in 2020, and the number of deaths also increased from 266,257 in 2013 to 305,127 in 2020. The supply of Public Charnel Facilities should be expanded, reflecting the cremation demand in the future and condition for the supply and increasing demand of Public Charnel Facilities after cremation, due to an increase of 14.6%. Second, it is urgent to expand the supply because the available period of using Capital Area Public Charnel Facilities is a short period of at least one year up to five years. However, as it is difficult to build Public Charnel Facilities due to location conflicts with local residents, joint construction plans between local governments should be promoted along with renting Private Charnel Facilities. Third, the enshrinement number ratio of the Public Charnel Facilities to the total cremation number of Capital Area Public Cremation Facilities is 16.3%, which is low. Therefore, when building Public Charnel Facilities, improvement plans for the use of public funeral facilities, such as modernization and promotion of facility level, quality improvement of service level, and creation of a pleasant environment, should be actively promoted.
-
Jang, Eun Choul;Kim, Janghwan;Kim, R. Young Chul 207
Informatization and digital transformation across industries are big trends in the world. However, although a few food groups are investing in informatization on a pilot basis, informatization is still delayed in related industries, such as distribution, logistics, etc. Therefore, consumers often are not able to have easy access to detailed information about products. In this paper, to improve these problems, we propose a fresh food logistics solution that adopts Proof of Nonce (PoN) consensus algorithm with Internet of Thing (IoT) technology. The recently developed PoN algorithm dramatically reduces a time for generating a block and is suitable for a platform that collects and services real-time information. We expect to improve their trust in the platform by preventing forgery/falsification of information recorded in real time through this paper. -
We was confirmed that the antler extract increases the expression of marker genes expressed in the process of bone formation, and that the effect on the increase in the expression of the gene is further increased by fermentation of the antler extract. In addition, the mouse model in which menopausal was induced by ovary extraction significantly reduced the movement distance and exercise time of mice compared to the control group. But the decrease was somewhat alleviated by the administration of the antler extract, and completely restored when the fermented antler extract was administered. In the menopause-induced mice, the body weight ratio of heart, liver, and spleen weights increased compared to the control group, but the antler extract and the antler ferment extract restored the body weight ratio of various organ weights to the level of the control group in the menopause-induced mice. Consequently, this has led to mitigating changes in the metabolism affected by menopause.
-
In the search for another appealing source of future food to cover the increasing need for nutrients of a growing global population, this study reviewed the potential of insects as human food. This study assessed some common edible insects, but concentrated on mealworms. Insects, especially mealworms, have a similar or higher nutritional value than many conventional food sources. The present study aimed to promote health through the development of blueberry cake by Mealworm Powder (Tenebrio molitor Lavare). The results of Sensory evaluation comparison of Blueberry cake to different levels of mealworm powder. The sensory evaluation showed that sample 3 had the highest color, taste, texture, and overall texture except flavour. Therefore, mealworm blueberry cake made with 60g of mealworm powder showed the best results. The results of analyzing the general components of the Mealworm blueberry cake showed more than two times higher Crude protein and less than half Crude fat compared to control blueberry cake. It is believed that the addition of mealworm powder means that the protein in the cake, a high carbohydrate food, has been strengthened. This is the development of bakery products with both nutritional excellence and symbolism, and it is believed that wheat worm powder is a good food material as a favorite food, not a hateful food, which will improve consumer awareness of edible insects.
-
This study analyzed the changes in carbon monoxide, carbon dioxide, oxygen and visual distance by presence of sprinkler heads and their types in the event of a fire in an indoor gymnasium. Based on carbon monoxide and visual distance that affects human bodies enormously, first, if there is no sprinkler head, carbon monoxide will reach 0.4% within five seconds and visual distance rapidly shrank within five seconds. Seconds, in the event of standard sprinkler heads, carbon monoxide gradually increased from 30 seconds onwards and visual distance rapidly shrank after five seconds. Second, Third, if there are special sprinkler heads, carbon monoxide fluctuated after opening the head and visual distance became 5m or below from 15 seconds. Finally, in the event of early response sprinkler heads, carbon monoxide fluctuated up and down at 3 seconds due to falling water drops. Visual distance shrank up to 5m or below at 6 seconds. In the future, time for operation of each sprinkler head shall be analyzed.
-
This study is significant in determining the reduction of safety accidents by applying PDCA's theory by subdividing it into a case analysis technique for construction sites by PDCA's theory. For this study, accidents accounted for the largest proportion of each type of disaster in the construction site were considered, and safety accidents were reduced through the PDCA theory through prior research. The analysis method of this study derived improvement plans by applying PDCA techniques to plan, implement, confirm, review, and improve disaster accidents at construction sites. The conclusions of this study are as follows. In the plan, first of all, measures shall be taken to prepare a safety management plan, to verify the implementation of the plan, and to verify the degree of implementation by the field manager. In the implementation, first of all, it is necessary to introduce a safety education history system to strengthen the safety education curriculum to suit the site, as long-term work is impossible for field workers depending on field conditions. First of all, it is necessary to strengthen the installation of safety facilities, including "work scaffolding" and "conducting prevention facilities" at construction sites. In management review and improvement, the risk assessment system for construction sites needs to be expanded first°.
-
Oh, Deok-Soo;Kim, Hyeong-Soo;Kim, Seung-Hee 257
As the definition of the vendor-oriented implementation method, which was utilized in adopting an ERP system, has been centered around the project construction business, it was difficult for the EPR adopting organization to systematically prepare ERP projects and have enough deliberative opportunities to change-related policies. Furthermore, this method does not have a fully standardized construction process. Accordingly, by defining an organization that wants to adopt an ERP system as a customer, this paper develops the customer-based ERP construction process framework that assists both customers and developers who construct the system. For this purpose, this paper reviews the previous research and collects the construction processes of the commercial ERP SW vendor and ERP construction cases while proposing the three-layer process framework to construct ERP through the KJ method. The ERP process framework consists of 7 processes, 32 activities, 141 tasks while providing definitions for concepts of each component. Furthermore, the proposed processes and phases were set in order of the recommended execution, while the activities were suggested as an open-ended type so that the application and usability can be increased and polished by reflecting experts' opinions. The contribution of this study is to standardize the ERP project process by transforming the previous supplier-based ERP construction method into the customer-based one while providing important procedure and activity frameworks that apply to diverse ERP solutions per vendor. At the same time, this study provides an theoretical foundation to develop the construction process for the customer -based Cloud ERP. In practice, At the beginning of the ERP system construction project, it provides communication or process tailoring tools for the stakeholder.