• Title/Summary/Keyword: 기술통신

Search Result 28,213, Processing Time 0.056 seconds

An Empirical Analysis on the Efficiency of the Projects for Strengthening the Service Business Competitiveness (서비스기업경쟁력강화사업의 효율성에 대한 실증 분석)

  • Kim, Dae Ho;Kim, Dongwook
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.5
    • /
    • pp.367-377
    • /
    • 2016
  • The purpose of the projects for strengthening the Service Business Competitiveness, which had been sponsored by the Ministry of Trade, Industry and Energy, and managed by the NIPA, is to support for combining the whole business process of the SMEs with the business model considering the scientific aspects of the services, to enhance the productivity of them and to add the values of their activities. 5 organizations are selected in 2014, and 4 in 2015 as leading organizations for these projects. This study analyzed the efficiency of these projects using DEA. Throughout the analysis of the prior researches, this study used the amount of government-sponsored money as the input variable, and the number of new customer business, the sales revenue, and the number of new employment as the output variables. And the result of this analysis showed that the decision making unit 12, 15, and 21 was efficient. And from this study, we found out two more performance indicators such as, the number of new employment and the amount of sales revenue, besides the number of new customer businesses.

Explainable Artificial Intelligence Applied in Deep Learning for Review Helpfulness Prediction (XAI 기법을 이용한 리뷰 유용성 예측 결과 설명에 관한 연구)

  • Dongyeop Ryu;Xinzhe Li;Jaekyeong Kim
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.35-56
    • /
    • 2023
  • With the development of information and communication technology, numerous reviews are continuously posted on websites, which causes information overload problems. Therefore, users face difficulty in exploring reviews for their decision-making. To solve such a problem, many studies on review helpfulness prediction have been actively conducted to provide users with helpful and reliable reviews. Existing studies predict review helpfulness mainly based on the features included in the review. However, such studies disable providing the reason why predicted reviews are helpful. Therefore, this study aims to propose a methodology for applying eXplainable Artificial Intelligence (XAI) techniques in review helpfulness prediction to address such a limitation. This study uses restaurant reviews collected from Yelp.com to compare the prediction performance of six models widely used in previous studies. Next, we propose an explainable review helpfulness prediction model by applying the XAI technique to the model with the best prediction performance. Therefore, the methodology proposed in this study can recommend helpful reviews in the user's purchasing decision-making process and provide the interpretation of why such predicted reviews are helpful.

Correlation analysis of pollutants using IoT technology in LID facilities (LID 시설 내 IoT 기술을 활용한 오염물질 상관성 분석)

  • Jeon, Minsu;Choi, Hyeseon;kevin, Geronimo Franz;Reyes, N.J.DG.;Kim, Leehyung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.453-453
    • /
    • 2021
  • 도시지역 비점오염원관리, 물순환 회복, 침투 및 증발산량 증가, 열섬현상 저감을 위한 주요한 방안으로 저영향개발(low impact development, LID)과 그린인프라 기법의 적용되고 있다. LID 시설은 소규모 분산형 시설로써 넓은 지역에 많고 다양한 시설들이 적용되어 시설의 개수가 많으며, 수질 및 토양 내 기성제품에 대한 센서들의 가격은 고가로 형성되어 있어 기기의 경제성 및 유지관리 등 적용하는데 제한적이다. 따라서 과거 모니터링 자료를 기반으로 오염물질들과의 상관성 분석을 통하여 계측이 어려운 항목들을 계측가능한 항목들로부터 예측 가능하며, 선정된 항목들에 대한 비용효율적인 센서를 개발하여 실시간 LID 모니터링이 가능한 비용효율적 모니터링을 개발하였다. 공주대학교 천안캠퍼스의 LID 시설들은 2013년에 조성되어 현재까지 시설이 운영되고 있으며, 5년이상의 과거 강우시 모니터링 자료들을 이용하여 오염물질 상관성 분석을 수행가능 하기에 대상지로 선정하였다. 오염물질 상관성 분석은 2013년부터 2017년도에 침투도랑에서 수행된 강우시 모니터링 자료를 활용하여 각 오염물질들의 상관성을 분석을 수행하였다. 침투도랑 내 유입되는 평균 유입수는 TSS 286.1±318.3 mg/L, BOD 22.6±39.5 mg/L, TN 8.96±5.85 mg/L, TP 1.01±1.11 mg/L로 나타났다. 겨울철에 비해 여름철에서의 오염물질의 유입농도가 높은 것으로 분석되었다. 이는 여름철 고온건조로 인한 노면 내 차량의 주행으로 인한 중금속, 폐타이어 등과 장마철 강우 시 유출된 토사로 인하여 유입수의 농도가 높은 것으로 분석되었다. 오염물질 부하량은 TSS와 COD 0.66으로 유의성이 높은 것으로 나왔으며, COD와 TSS, TP, TN 등 유의성이 높은 것으로 분석되었다. Arduino와 Raspberry PI를 활용하여 저비용 센서와 LTE 모뎀통신과 데이터 베이스 연결하여 개발된 프로그램을 통해서 무선으로 LID 시설에 대한 모니터링을 침투화분2와 식생체류지에 조성하였다. 전력공급이 어려운 식생체류지의 경우 태양열(Solar system) 시스템과 보조 전력 배터리를 조성하여 장마철이나 장기적인 악천후로 인한 전력을 생산하지 못할 경우 보조전력배터리에서 전력을 제공하여 지속적인 모니터링이 이루어지도록 설계하였다. 토양함수량, 토양온도와 Conductivity 등 3종류의 센서를 적용하였으며, 프로그램은 현재 2단계를 통한 2차수정을 통하여 프로그램을 구축하였다. 오차, 오작동, 계측값에 대한 검·보정 작업이 필요하다. 또한 대기자료의 구축을 통해 보다 토양과 LID 시설에 대한 영향분석이 필요한 것으로 사료된다.

  • PDF

A Blockchain Network Construction Tool and its Electronic Voting Application Case (블록체인 자동화도구 개발과 전자투표 적용사례)

  • AING TECKCHUN;KONG VUNGSOVANREACH;Okki Kim;Kyung-Hee Lee;Wan-Sup Cho
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.151-159
    • /
    • 2021
  • Construction of a blockchain network needs a cumbersome and time consuming activity. To overcome these limitations, global IT companies such as Microsoft are providing cloud-based blockchain services. In this paper, we propose a blockchain-based construction and management tool that enables blockchain developers, blockchain operators, and enterprises to deploy blockchain more comfortably in their infrastructure. This tool is implemented using Hyperledger Fabric, one of the famous private blockchain platforms, and Ansible, an open-source IT automation engine that supports network-wide deployment. Instead of complex and repetitive text commands, the tool provides a user-friendly web dashboard interface that allows users to seamlessly set up, deploy and interact with a blockchain network. With this proposed solution, blockchain developers, operators, and blockchain researchers can more easily build blockchain infrastructure, saving time and cost. To verify the usefulness and convenience of the proposed tool, a blockchain network that conducts electronic voting was built and tested. The construction of a blockchain network, which consists of writing more than 10 setting files and executing commands over hundreds of lines, can be replaced with simple input and click operations in the graphical user interface, saving user convenience and time. The proposed blockchain tool will be used to build trust data infrastructure in various fields such as food safety supply chain construction in the future.

Study on Changes of Street Furniture in Digital Environment (디지털 환경에서 가로시설물의 변화에 관한 연구)

  • In, Chiho;Kim, Hyunsoo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.1D
    • /
    • pp.129-136
    • /
    • 2008
  • Along with the development in cutting-edge digital technology, the street space is also being changed. Mobile telecommunication units and internet give a big change in a human being's lifestyle. And the ubiquitous computing is proceeding with expanding its application range from the indoor space to the street space. As the street furniture is the convenient facility that allows a human being's life in street space to be abundant, it is getting advanced. First of all, in terms of such phenomenon, this study analyzed the cases of a research on application of street space and the actual condition of a change in the number of individuals for the street furniture, through a literature research of ubiquitous. Also, it researched into the realities of using the street furniture of the walking-desired streets at Daehac-ro and Hongdae district, where are two representative places related to digital generation. The next was carried out FGI (Focus Group Interview) with users of the street space in front of Hongik University and managers of the street furniture, and was researched into the use & management behavior, and recognition level on the street furniture. Thus, the key elements were extracted such as interchange of information for cultural activities, automation for interaction variability in function. Finally the core elements for future vision of street furniture in this digital era were extracted in 3I, namely, Information, Intellectualization, and Integration. This is considered to be applied to the establishment of direction in the process of high-tech digitalization in street furniture related to information hereafter.

Development of User Customized Path Finding Algorithm for Public Transportation Information (대중교통 정보제공을 위한 맞춤형 경로탐색 알고리즘 개발)

  • Shin, Sung Il;Park, Je Jin;Lee, Jong Chul;Ha, Tae Jun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.3D
    • /
    • pp.317-323
    • /
    • 2008
  • Mass transit information can contribute many benefits to users. Especially, transportation information technology is developing highly with information technology in Korea recently. Hereafter, it is expected to give customized transportation information to users individually with the advent of ubiquitous age in earnest. This public transportation information service can be realized by path finding algorithm in public transportation networks including travel and transfer attributes. In this research, constraints are constructed with the primary facts influencing users. Moreover, the method reducing user's path finding condition arbitrarily is proposed by making the maximum value as variables. In this study, transfer frequency, total travel time, seat confirmation, transfer time and travel time become constraint condition based on k path finding algorithm considering service time constraint condition. Moreover, case study about user customized transfer information is performed in Seoul and metropolitan subway networks.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

A Study on DID-based Vehicle Component Data Collection Model for EV Life Cycle Assessment (전기차 전과정평가를 위한 DID 기반 차량부품 데이터수집 모델 연구)

  • Jun-Woo Kwon;Soojin Lee;Jane Kim;Seung-Hyun Seo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.10
    • /
    • pp.309-318
    • /
    • 2023
  • Recently, each country has been moving to introduce an LCA (Life Cycle Assessment) to regulate greenhouse gas emissions. The LCA is a mean of measuring and evaluating greenhouse gas emissions generated over the entire life cycle of a vehicle. Reliable data for each electric vehicle component is needed to increase the reliability of the LCA results. To this end, studies on life cycle evaluation models using blockchain technology have been conducted. However, in the existing model, key product information is exposed to other participants. And each time parts data information is updated, it must be recorded in the blockchain ledger in the form of a transaction, which is inefficient. In this paper, we proposed a DID(Decentralized Identity)-based data collection model for LCA to collect vehicle component data and verify its validity effectively. The proposed model increases the reliability of the LCA by ensuring the validity and integrity of the collected data and verifying the source of the data. The proposed model guarantees the validity and integrity of collected data. As only user authentication information is shared on the blockchain ledger, the model prevents indiscriminate exposure of data and efficiently verifies and updates the source of data.

A Study on Automatic Discovery and Summarization Method of Battlefield Situation Related Documents using Natural Language Processing and Collaborative Filtering (자연어 처리 및 협업 필터링 기반의 전장상황 관련 문서 자동탐색 및 요약 기법연구)

  • Kunyoung Kim;Jeongbin Lee;Mye Sohn
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.127-135
    • /
    • 2023
  • With the development of information and communication technology, the amount of information produced and shared in the battlefield and stored and managed in the system dramatically increased. This means that the amount of information which cansupport situational awareness and decision making of the commanders has increased, but on the other hand, it is also a factor that hinders rapid decision making by increasing the information overload on the commanders. To overcome this limitation, this study proposes a method to automatically search, select, and summarize documents that can help the commanders to understand the battlefield situation reports that he or she received. First, named entities are discovered from the battlefield situation report using a named entity recognition method. Second, the documents related to each named entity are discovered. Third, a language model and collaborative filtering are used to select the documents. At this time, the language model is used to calculate the similarity between the received report and the discovered documents, and collaborative filtering is used to reflect the commander's document reading history. Finally, sentences containing each named entity are selected from the documents and sorted. The experiment was carried out using academic papers since their characteristics are similar to military documents, and the validity of the proposed method was verified.

A Model for Supporting Information Security Investment Decision-Making Considering the Efficacy of Countermeasures (정보보호 대책의 효과성을 고려한 정보보호 투자 의사결정 지원 모형)

  • Byeongjo Park;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.27-45
    • /
    • 2023
  • The importance of information security has grown alongside the development of information and communication technology. However, companies struggle to select suitable countermeasures within their limited budgets. Sönmez and Kılıç (2021) proposed a model using AHP and mixed integer programming to determine the optimal investment combination for mitigating information security breaches. However, their model had limitations: 1) a lack of objective measurement for countermeasure efficacy against security threats, 2) unrealistic scenarios where risk reduction surpassed pre-investment levels, and 3) cost duplication when using a single countermeasure for multiple threats. This paper enhances the model by objectively quantifying countermeasure efficacy using the beta probability distribution. It also resolves unrealistic scenarios and the issue of duplicating investments for a single countermeasure. An empirical analysis was conducted on domestic SMEs to determine investment budgets and risk levels. The improved model outperformed Sönmez and Kılıç's (2021) optimization model. By employing the proposed effectiveness measurement approach, difficulty to evaluate countermeasures can be quantified. Utilizing the improved optimization model allows for deriving an optimal investment portfolio for each countermeasure within a fixed budget, considering information security costs, quantities, and effectiveness. This aids in securing the information security budget and effectively addressing information security threats.