• Title/Summary/Keyword: 공간시스템

Search Result 10,431, Processing Time 0.038 seconds

COVID-19 Rapid Antigen Test Results in Preschool and School (March 2 to May 1, 2022) (유치원·학교 구성원의 코로나19 신속항원검사 결과(2022년 3월 2일부터 5월 1일까지))

  • Gowoon Yun;Young-Joon Park;Eun Jung Jang;Sangeun Lee;Ryu Kyung Kim;Heegwon Jeong;Jin Gwack
    • Pediatric Infection and Vaccine
    • /
    • v.31 no.1
    • /
    • pp.113-121
    • /
    • 2024
  • Purpose: In response to the surge in coronavirus disease 2019 (COVID-19) omicron variant cases, we have implemented preemptive testing for preschool and school. The purpose is to quickly detect COVID-19 cases using a rapid antigen test (RAT) kit so that normal school activities can continue. Methods: The results entered in The Healthcare Self-Test App were merged with the information on the status of confirmed cases in the COVID-19 Information Management System by Korea Disease Control and Prevention Agency (KDCA) for preschool and school of students and staffs March 2 to May 1, 2022 to analyze the RAT positive rate and positive predictive value of RAT. Results: In preschool and school 19,458,575 people were tested, weekly RAT positive rate ranged from 1.10% to 5.90%, positive predictive value of RAT ranged from 86.42% to 93.18%. By status, RAT positive rate ranged from 1.13% to 6.16% for students, 0.99% to 3.93% for staffs, positive predictive value of RAT ranged from 87.19% to 94.03% for students, 77.55% to 83.10% for staffs. RAT positive rate by symptoms ranged from 76.32% to 88.02% for those with symptoms and 0.34% to 1.11% for those without symptoms. As a result of preschool and school RAT, 943,342 confirmed cases were preemptively detected, before infection spread in preschool and school. Conclusions: RAT was well utilized to detect confirmed cases at an early stage, reducing the risk of transmission to minimize the educational gap in preschool and school. To compensate for the limitations of RAT, further research should continue to reevaluate the performance of RAT as new strains of viruses continue to emerge. We will have to come up with various ways to utilize it, such as performing periodic and repeated RAT and parallel polymerase chain reaction.

An Analysis of Accessibility to Hydrogen Charging Stations in Seoul Based on Location-Allocation Models (입지배분모형 기반의 서울시 수소충전소 접근성 분석)

  • Sang-Gyoon Kim;Jong-Seok Won;Yong-Beom Pyeon;Min-Kyung Cho
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.2
    • /
    • pp.339-350
    • /
    • 2024
  • Purpose: This study analyzes accessibility of 10 hydrogen charging stations in Seoul and identifies areas that were difficult to access. The purpose is to re-analyze accessibility by adding a new location in terms of equity and safety of location placement, and then draw implications by comparing the improvement effects. Method: By applying the location-allocation model and the service area model based on network analysis of the ArcGIS program, areas with weak access were identified. The location selection method applied the 'Minimize Facilities' method in consideration of the need for rapid arrival to insufficient hydrogen charging stations. The limit distance for arrival within a specific time was analyzed by applying the average vehicle traffic speed(23.1km/h, Seoul Open Data Square) in 2022 to three categories: 3,850m(10minutes), 5,775m(15minutes), 7,700m(20minutes). In order to minimize conflicts over the installation of hydrogen charging stations, special standards of the Ministry of Trade, Industry and Energy applied to derive candidate sites for additional installation of hydrogen charging stations among existing gas stations and LPG/CNG charging stations. Result: As a result of the analysis, it was confirmed that accessibility was significantly improved by installing 5 new hydrogen charging stations at relatively safe gas stations and LPG/CNG charging stations in areas where access to the existing 10 hydrogen charging stations is weak within 20 minutes. Nevertheless, it was found that there are still areas where access remains difficult. Conclusion: The location allocation model is used to identify areas where access to hydrogen charging stations is difficult and prioritize installation, decision-making to select locations for hydrogen charging stations based on scientific evidence can be supported.

Improving Memorial Services for Sustainable Forest Burials (지속가능한 수목장림을 위한 추모 서비스 개선방안)

  • Lee, JeungSun;Cha, Seong-Soo
    • Journal of Service Research and Studies
    • /
    • v.14 no.2
    • /
    • pp.37-47
    • /
    • 2024
  • Currently, social interest in post-cremation funerals is growing due to the establishment of cremation culture. In addition, as awareness of nature-friendly funeral methods spreads in modern times, the demand for tree burial grounds and tree groves, which are representative natural burial methods, is increasing. However, if the current method of relying on trees is used, the forest burial may damage the forest and turn it into another cemetery. The tree decoration is a funeral method that contains the temporal meaning of humans returning to the space of nature that we have, and the philosophical meaning that humans return in compliance with nature. Like this, there are quite a few concerns. Even though tree burials are not the traditional burial facilities we are familiar with, many of the facilities and operating systems adopt the standards of park cemeteries and have stricter standards and restrictions than natural burials under the law. This rigidity is intended to preserve the forest, but the reality is that it limits the expansion and operation of tree plantations. To this end, this study seeks to find specific improvement measures for sustainable tree plantation operation. To this end, we look at the types of natural fields in foreign countries and find directions for tree planting that can be effectively applied and established in accordance with the sentiments of the people. Specific improvement measures include an enshrinement method that does not rely on memorial trees, the operation of anonymous or anonymous tree planting, a change in the method of visiting and commemorating, and various mountaineering methods, thereby suggesting alternatives to sustainable tree planting in Korea. The place where tree planting is implemented is the forest, that is, the forest itself. I should be a place where the spirit of natural return, which is the essence of the deceased, can be celebrated through the forest, not a funeral facility. By doing so, it will be possible to provide the public value of the forest, that is, the social function of the forest, in the name of an eco-friendly funeral service.

A Comparative Study on Factors Affecting Satisfaction by Travel Purpose for Urban Demand Response Transport Service: Focusing on Sejong Shucle (도심형 수요응답 교통서비스의 통행목적별 만족도 영향요인 비교연구: 세종특별자치시 셔클(Shucle)을 중심으로)

  • Wonchul Kim;Woo Jin Han;Juntae Park
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.2
    • /
    • pp.132-141
    • /
    • 2024
  • In this study, the differences in user satisfaction and the variables influencing the satisfaction with demand response transport (DRT) by travel purpose were compared. The purpose of DRT travel was divided into commuting/school and shopping/leisure travel. A survey conducted on 'Shucle' users in Sejong City was used for the analysis and the least absolute shrinkage and selection operator (LASSO) regression analysis was applied to minimize the overfitting problems of the multilinear model. The results of the analysis confirmed the possibility that the introduction of the DRT service could eliminate the blind spot in the existing public transportation, reduce the use of private cars, encourage low-carbon and public transportation revitalization policies, and provide optimal transportation services to people who exhibit intermittent travel behaviors (e.g., elderly people, housewives, etc.). In addition, factors such as the waiting time after calling a DRT, travel time after boarding the DRT, convenience of using the DRT app, punctuality of expected departure/arrival time, and location of pickup and drop-off points were the common factors that positively influenced the satisfaction of users of the DRT services during their commuting/school and shopping/leisure travel. Meanwhile, the method of transfer to other transport modes was found to affect satisfaction only in the case of commuting/school travel, but not in the case of shopping/leisure travel. To activate the DRT service, it is necessary to consider the five influencing factors analyzed above. In addition, the differentiating factors between commuting/school and shopping/leisure travel were also identified. In the case of commuting/school travel, people value time and consider it to be important, so it is necessary to promote the convenience of transfer to other transport modes to reduce the total travel time. Regarding shopping/leisure travel, it is necessary to consider ways to create a facility that allows users to easily and conveniently designate the location of the pickup and drop-off point.

Effect and Satisfaction according to the Review of the Electronic Document of Environmental Impact Assessment - Focus on Cost and Carbon Emissions Reduction - (환경영향평가서 전자문서 검토에 따른 효과와 만족도 - 비용 및 탄소 배출 저감을 중심으로 -)

  • Mina Choi;Jungkwon Kim;Seonmi Lee
    • Journal of Environmental Impact Assessment
    • /
    • v.33 no.1
    • /
    • pp.30-41
    • /
    • 2024
  • The way we work is changing significantly with the rapid development of digitaltechnology, and paper documents are being replaced by electronic documents. However, in accordance with the Enforcement Decree and Enforcement Regulation of the Environmental Impact Assessment Act, the environmental impact assessment report must submit a set number of paper reports to organizations related to the project, and about 42 years have passed since it was submitted as a paperreport. In 2022, the National Institute of Ecology introduced a system to review paperreports as electronic documents in line with the trend of digital transformation. The cost reduction and carbon emission reduction effects of electronic document review were analyzed for 1,398 environmental impact assessments submitted and reviewed in 2022. In addition, a satisfaction survey was conducted targeting type 1 environmental impact assessment companies that were directly affected, and a total of 134 people responded. As a result of analyzing the effect of reviewing electronic documents, costs are reduced by a total of 101,424,900 won per year and carbon emissions are reduced by about 59.7 tons. As a result of the satisfaction survey, 94.8% of the respondents said electronic documentreview was very helpful, and 4.5% said it was helpful. The effectiveness of electronic documentreview was high, with 94.8% of respondents saying it was helpful in economic terms and 91.8% saying it was helpful in reducing work hours. If electronic documents are reviewed through the revisions to the Enforcement Decree and Enforcement Regulation of the Environmental Impact Assessment Act, the implementation of electronic document review is expected to have a ripple effect across the country, not only reducing costs and carbon emissions, but also reducing administrative time and saving storage space. Rapid changes in law and administration are needed to adapt to the digital transformation era.

A case study of elementary school mathematics-integrated classes based on AI Big Ideas for fostering AI thinking (인공지능 사고 함양을 위한 인공지능 빅 아이디어 기반 초등학교 수학 융합 수업 사례연구)

  • Chohee Kim;Hyewon Chang
    • The Mathematical Education
    • /
    • v.63 no.2
    • /
    • pp.255-272
    • /
    • 2024
  • This study aims to design mathematics-integrated classes that cultivate artificial intelligence (AI) thinking and to analyze students' AI thinking within these classes. To do this, four classes were designed through the integration of the AI4K12 Initiative's AI Big Ideas with the 2015 revised elementary mathematics curriculum. Implementation of three classes took place with 5th and 6th grade elementary school students. Leveraging the computational thinking taxonomy and the AI thinking components, a comprehensive framework for analyzing of AI thinking was established. Using this framework, analysis of students' AI thinking during these classes was conducted based on classroom discourse and supplementary worksheets. The results of the analysis were peer-reviewed by two researchers. The research findings affirm the potential of mathematics-integrated classes in nurturing students' AI thinking and underscore the viability of AI education for elementary school students. The classes, based on AI Big Ideas, facilitated elementary students' understanding of AI concepts and principles, enhanced their grasp of mathematical content elements, and reinforced mathematical process aspects. Furthermore, through activities that maintain structural consistency with previous problem-solving methods while applying them to new problems, the potential for the transfer of AI thinking was evidenced.

A Study on Market Size Estimation Method by Product Group Using Word2Vec Algorithm (Word2Vec을 활용한 제품군별 시장규모 추정 방법에 관한 연구)

  • Jung, Ye Lim;Kim, Ji Hui;Yoo, Hyoung Sun
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.1
    • /
    • pp.1-21
    • /
    • 2020
  • With the rapid development of artificial intelligence technology, various techniques have been developed to extract meaningful information from unstructured text data which constitutes a large portion of big data. Over the past decades, text mining technologies have been utilized in various industries for practical applications. In the field of business intelligence, it has been employed to discover new market and/or technology opportunities and support rational decision making of business participants. The market information such as market size, market growth rate, and market share is essential for setting companies' business strategies. There has been a continuous demand in various fields for specific product level-market information. However, the information has been generally provided at industry level or broad categories based on classification standards, making it difficult to obtain specific and proper information. In this regard, we propose a new methodology that can estimate the market sizes of product groups at more detailed levels than that of previously offered. We applied Word2Vec algorithm, a neural network based semantic word embedding model, to enable automatic market size estimation from individual companies' product information in a bottom-up manner. The overall process is as follows: First, the data related to product information is collected, refined, and restructured into suitable form for applying Word2Vec model. Next, the preprocessed data is embedded into vector space by Word2Vec and then the product groups are derived by extracting similar products names based on cosine similarity calculation. Finally, the sales data on the extracted products is summated to estimate the market size of the product groups. As an experimental data, text data of product names from Statistics Korea's microdata (345,103 cases) were mapped in multidimensional vector space by Word2Vec training. We performed parameters optimization for training and then applied vector dimension of 300 and window size of 15 as optimized parameters for further experiments. We employed index words of Korean Standard Industry Classification (KSIC) as a product name dataset to more efficiently cluster product groups. The product names which are similar to KSIC indexes were extracted based on cosine similarity. The market size of extracted products as one product category was calculated from individual companies' sales data. The market sizes of 11,654 specific product lines were automatically estimated by the proposed model. For the performance verification, the results were compared with actual market size of some items. The Pearson's correlation coefficient was 0.513. Our approach has several advantages differing from the previous studies. First, text mining and machine learning techniques were applied for the first time on market size estimation, overcoming the limitations of traditional sampling based- or multiple assumption required-methods. In addition, the level of market category can be easily and efficiently adjusted according to the purpose of information use by changing cosine similarity threshold. Furthermore, it has a high potential of practical applications since it can resolve unmet needs for detailed market size information in public and private sectors. Specifically, it can be utilized in technology evaluation and technology commercialization support program conducted by governmental institutions, as well as business strategies consulting and market analysis report publishing by private firms. The limitation of our study is that the presented model needs to be improved in terms of accuracy and reliability. The semantic-based word embedding module can be advanced by giving a proper order in the preprocessed dataset or by combining another algorithm such as Jaccard similarity with Word2Vec. Also, the methods of product group clustering can be changed to other types of unsupervised machine learning algorithm. Our group is currently working on subsequent studies and we expect that it can further improve the performance of the conceptually proposed basic model in this study.

Removal Torque Values of Retaining Screws Tightened to Implant-Supported Prosthesis with Different Connection Systems by Various Tightening Technique (다른 연결 시스템을 갖는 임플랜트 상부 구조물에서 조임술식에 따른 지대주 나사의 풀림 토크값에 대한 연구)

  • Kim, Dong-Wook;Choi, Yu-Sung;Jo, In-Ho
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.27 no.4
    • /
    • pp.343-358
    • /
    • 2011
  • As implant treatment has become popular, lots of different shapes and materials of the implant upper component have been supplied. And there are also diverse reports about failures including loosening of the abutment screw which is one of the most common reason. Purpose : The purpose of this study is to find out how different screw tightening orders and methods influence on screw loosening according to the different connection systems. The upper component was fabricated by casting method. After fabricating master models that are precisely attached to the upper component, 5 experimental models each for the external connection system and internal connection system were fabricated using splinting impression technique. First, to find out the influence of the screw tightening order, screws were tightened in 3 orders; 1-2-3-4, 2-3-1-4, 2-4-3-1. After tightening, removal torque values (RTV) of each group was measured. And also to find out the influence of screw tightening method, a model with 2-3-1-4 screw tightening order was tightened with 30 Ncm at one time(1-step method) and the RTV was compared with the same order group (2-3-1-4) in the 2 step method. In the external connection system, RTV appeared significantly lower in group 2-3-1-4 than group 2-4-3-1 (p<0.05). And also in the internal connection system, the RTV of group 2-3-1-4 appeared significantly lower than that of group 2-4-3-1 and 1-2-3-4 (p<0.05). When comparing the tightening number of the screw without considering the screw tightening order, the first tightened screw appeared significantly higher RTV than the second one in the external connection system (p<0.05), however there was no significant difference from the first tightened screw to the last tightened screw in the internal connection system. And there was no statistically significant difference between the two screw tightening methods in both internal and external connection system. In the comparison of external and internal connection system, each RTV appeared 16.27 Ncm and 14.25 Ncm and appeared as a statistically significant difference (p<0.05). There was a significant difference in RTV measured according to the screw tightening order. The lowest RTV appeared in the groups started tightening from the middle. There was also a significant difference in RTV between the two connection system groups. A further study is needed to find out the influence factors in RTV and also a study is required related to the load condition.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.