• Title/Summary/Keyword: 기술동향정보

Search Result 4,711, Processing Time 0.036 seconds

Research Trend Analysis of Risk Cost Model for UAM Flight Path Planning (UAM 비행 경로 계획을 위한 위험 비용 모델 연구 동향 분석)

  • Jae-Hyeon Kim;Dong-Min Lee;Myeong-Jin Lee;Yeong-Hoon Choi;Ji-Hun Kwon;Jong-Whoa Na
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.68-76
    • /
    • 2024
  • With the recent rapid growth of the domestic and international unmanned aerial vehicle (UAV) market and the increasing importance of UAV operations in urban centers, such as UAMs, the safety management and regulatory framework for human life and property damage caused by UAV failures has been emphasized. In this study, we conducted a comparative analysis of risk-cost models that evaluate the risk of an operating area for safe UAM flight path planning, and identified the main limitations of each model to derive considerations for future model development. By providing a basic model for improving the safety of UAM operations, this study is expected to make an important contribution to technical improvements and policy decisions in the field of UAM flight path planning.

Model of Customer Classification Target Marketing in Automotive Corporation (자동차산업의 고객분류 및 타겟 마케팅 모델)

  • Lee, Byoung-Yup;Park, Yong-Hoon;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.313-322
    • /
    • 2009
  • Recently, According to computer technology has been improving, Massive customer data has stored in database. Using this massive data, decision maker can extract the useful information to make a valuable plan with data mining. Data mining offers service providers great opportunities to get closer to customer. Data mining doesn't always require the latest technology, but it does require a magic eye that looks beyond the obvious to find and use the hidden knowledge to drive marketing strategies Automotive market face an explosion of data arising from customer but a rate of increasing customer is getting lower. therefore, we need to determine which customer are profitable clients whom you wish to hold. This paper builds model of customer loyalty detection and analyzes customer patterns in automotive market with data mining using association rule and basic statics methods. With 4he help of information technology.

Derivation of System Requirements and Implementation of System Framework for BIM-based Urban Facility Maintenance System (BIM 기반 도시시설물 유지관리 시스템 요구사항 도출 및 프레임워크 구축)

  • Kim, Ji-Eun;Choi, Hyun-Sang;Gang, Tae-Yook
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.4
    • /
    • pp.397-406
    • /
    • 2014
  • Recently the existing urban facility management integrating with advanced IT has been created more effective and various service for solving the problems what are the inadequacy of operating system, data continuity and expandability, etc. Therefore this study analyzed the research trend of BIM based urban facility maintenance, and implemented the environment with smart facility maintenance function and facility information system. Also this suggested the BIM based maintenance system framework after considerations as system operation and construction are deducted for development of system managing urban facility like bridge and tunnel. The output will be used as preliminary data for the study of development of maintenance system and derivation of real scenarios.

A Study on the Preparation of National Cyber Warfare (국가 사이버전 대비방안 연구)

  • J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.141-151
    • /
    • 2006
  • The destructive power of cyber threat arrived to until the phase which it threatens to direct and seriously in national security undergoes an important national institutuin hacking event of 2004 and Internet paralysis accidents of 2003. 1. 25. So Cyber terror and Cyber warfare is not the hypothetical enemy situation. It is more actual security situation and identify as magnification of warfare concept of incapacitation national important ability include military command system of the adversary, communication, energy, finance and transportation system. consequently, with the progress of cyber threat, it is necessary that looking at a number of general plan to make up for the weak points in cyber warfare operation system. Thus, the focus of this study is to examine new ways of developing a comprehensive cyber security management system.

  • PDF

Robot-Assisted Learning in r-Learning (r-Learning에서의 로봇보조학습)

  • Han, Jeong-Hye;Jo, Mi-Heon
    • Journal of The Korean Association of Information Education
    • /
    • v.13 no.4
    • /
    • pp.497-508
    • /
    • 2009
  • As the educational use of intelligent service robots has been proved to be effective, educational service robots have been utilized in kindergarten. In addition, service robots will be used in elementary schools from 2010 for the after-school English program. This trend indicates that r-Learning using service robots will become a major educational paradigm in preparing for future education. This article consists of the following four parts. First, the concept and the type of educational robots were defined and the trend of previous research was examined. Second, the characteristics of robot-assisted learning were analyzed as a part of r-Learning, and difference between r-Learning and u-Learning was compared. Third, the contents and service using a robot-assisted learning system were discussed, the models and trend of service using the robot-assisted learning system were examined, and the aspects of viewing evolution were compared. Finally, suggestions for activating the service market of robot-assisted learning were made for the educational institution, research institution, government and robot companies.

  • PDF

A Study on Network Mobility Support for Uniquitous Communication Environment (유비쿼터스 통신 환경을 위한 네트워크 이동성 지원 방안에 관한 연구)

  • Lee, Ho-Seon;Kim, Seong-Chul;Cho, Yong-Bum;Cho, Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.589-592
    • /
    • 2007
  • Ubiquitous environment means the environment in which users can access the Internet at anytime and anywhere. Network mobility support is needed for seamless Internet service in ubiquitous environment. When users try to access the Internet in public transportation such as bus, train, airplane, to support network mobility by composing several sub-networks is more efficient than to support host mobility. IETF established 'Network Mobility(NEMO)' working group to research and develop network mobility technology. In this paper, we investigate the concept of network mobility, trends of research in NEMO and developed technology on the basis of 'Network Mobility Basic Support Protocol' standardized by IETF.

  • PDF

중국의 사회 연결망 서비스 이용에 영향을 미치는 요인에 관한 연구

  • Bang, Hwa-Ryong;Gwon, Sun-Dong
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2008.10b
    • /
    • pp.218-234
    • /
    • 2008
  • 중국은 2008년 현재 메신저 이용자 수와 블로그 등의 웹 2.0 이용자 수에 있어서 세계 1위이다. 그리고 중국의 2007년 850억 달러의 인터넷 디지털 시장은 2015년에 2640억 달러로 성장할 전망이다. 이와 같이 인터넷 시장의 규모와 성장 가능성으로 인해 중국 인터넷 비즈니스의 중요성이 높아지고 있다. 이러한 필요성에 따라서 본 연구에서는 중국의 인터넷 동향 중에서 가장 큰 주목을 끌고 있는 웹 2.0 기반의 사회 연결망 서비스 분야에서 다음 세 가지의 연구 질문을 설정하고 그 답을 찾아보았다. 첫째, 중국 사회 연결망 서비스의 주요 특징은 무엇인가? 이러한 질문에 답하기 위해 본 연구에서는 문헌연구를 바탕으로 중국의 대표적인 사회 연결망 서비스 업체로 Tencent QQ와 Sina Poco를 살펴보았고, 중국 사회 연결망 서비스 이용자의 가입 이유, 갱신 이유, 주요 내용, 유상 서비스에 대한 태도 등을 살펴보았으며, 중국 인터넷 사용자의 집단별 특징에 대해 살펴보았다. 둘째, 중국 사회 연결망 서비스의 이용에 영향을 미치는 주요 요인들은 무엇인가? 이러한 질문에 답하기 위해 동기부여이론, TAM 이론. 관련 선행연구 등을 검토하여 중국 사회 연결망 서비스의 이용에 영향을 미치는 요인들로서 사용자 참여, 사회적 영향, 네트워크 효과, 유용성, 시스템 품질 등을 도출하였고 PLS를 이용한 데이터 분석을 통해 검증하였다. 검증결과, 사회 연결망 서비스 이용에 유용성이 가장 큰 영향을 미치고, 다음으로 네트워크 효과, 사용자 참여, 시스템 품질 순으로 유의한 영향을 미치는 것으로 나타났다. 반면, 사회적 영향은 유의하지 않은 것으로 나타났다. 셋째, 중국과 한국은 어떠한 점에서 차이가 있는가? 가장 두드러진 차이는 사회적 영향에 있어서 한국은 유의 적인데 비해 중국이 유의적이지 않다는 점이다. 이는 한국과 중국 사이에 국가 문화적 차이가 존재하기 때문에 발생했다고 생각할 수도 있고, 중국이 인터넷 성장기에 있는데 비해 한국은 인터넷 성숙기에 있는 등의 기술적, 사회적, 경제적 발달 과정상의 차이에 의한 것이라고도 볼 수 있다.

  • PDF

Design and Implementation of Tool Constructing Migration of Legacy System (레거시시스템의 마이그레이션을 위한 지원도구의 설계 및 구현)

  • Yang, Hae-Seung;Park, Pyung-Hyung;Yang, Hae-Sool
    • The KIPS Transactions:PartD
    • /
    • v.14D no.7
    • /
    • pp.763-772
    • /
    • 2007
  • Due to increased software development cost, interest about the method and automated tool for reusing legacy system have been running high. Therefore, In this study, it proves the definition, concept and also background of legacy system by showing real market and technology trend. Automation tool is designed and developed to handle the concrete development methodology, procedure and reference. Also, we implemented the process that analyze the legacy system and extract, refine, store and reuse the candidate components by using LM(Legacy to Modern System) supporting tool presented in this paper. If LM supporting tool is applied to legacy system migration, we can expect cutting costs, shortening the developing period and succeeding the intellectual property by software re-engineering.

Policy Trends and Issues on Crypto Currency of Japanese Government (일본정부의 암호화폐(Crypto currency)에 대한 최근 정책 동향과 시사점)

  • Kim, Hyun-jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1398-1404
    • /
    • 2018
  • The Blockchain technology could represent a solution to unexpected problems. In modern society, the domain of value has become diversified. The Crypto currency would replace the area that conventional currency could not function. The Japanese government recognized the Bitcoin as an official currency from April 2017 through amendment of the Money Transfer Act in 2016, and has been leading the related regulation policy recently. This paper examines the policy strategy of the Japanese government that is leading the current policy related to the Crypto currency market. The sequence of this paper is as follows: Coordination Process of Japanese Government's Crypto currency Policy of Special Mission Committee on IT Strategy as a Coordinator, Amendment of the Fund Settlement Act and the Establishment of a Self-Regulation Organizations in Crypto currency and Japan's Crypto currency Taxation and Supplementary System.

Effective Pose-based Approach with Pose Estimation for Emotional Action Recognition (자세 예측을 이용한 효과적인 자세 기반 감정 동작 인식)

  • Kim, Jin Ok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.3
    • /
    • pp.209-218
    • /
    • 2013
  • Early researches in human action recognition have focused on tracking and classifying articulated body motions. Such methods required accurate segmentation of body parts, which is a sticky task, particularly under realistic imaging conditions. Recent trends of work have become popular towards the use of more and low-level appearance features such as spatio-temporal interest points. Given the great progress in pose estimation over the past few years, redefined views about pose-based approach are needed. This paper addresses the issues of whether it is sufficient to train a classifier only on low-level appearance features in appearance approach and proposes effective pose-based approach with pose estimation for emotional action recognition. In order for these questions to be solved, we compare the performance of pose-based, appearance-based and its combination-based features respectively with respect to scenario of various emotional action recognition. The experiment results show that pose-based features outperform low-level appearance-based approach of features, even when heavily spoiled by noise, suggesting that pose-based approach with pose estimation is beneficial for the emotional action recognition.