• Title/Summary/Keyword: 사례검색

Search Result 605, Processing Time 0.026 seconds

A Study on the Construction Methods and the Distribution of Proper Spatial Function for Restoring Urban Streams into Close-to-Nature Streams - A Case Study of Hongjecheon(Stream) in Seodaemun-Gu, Seoul - (도시 내 자연형 하천 조성을 위한 적정 공간기능 배분과 조성방안 연구 - 서울시 서대문구 홍제천을 사례로 -)

  • Jung, Tae-Jun;Lee, Kyong-Jae;Han, Bong-Ho
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.41 no.3
    • /
    • pp.43-55
    • /
    • 2013
  • The purpose of this study is to propose a plan that properly organizes urban close-to-nature streams by evaluating the city park functions, ecological functions and landscape functions required for urban stream and setting up space function suitable for the space. The site of this study is Hongjecheon located in Seodaemun gu of Seoul City, whose length of channel spans 6.12km in total. The plan for the construction of close-to-nature streams had been established from late 2003, and the construction was completed. Evaluation Categories and indications were deduced from 4 stages. First, based on theoretical examination, we made a list of stream and park evaluation categories and added Category about Characteristic of urban streams. Next, we set Final Evaluation Categories and indications through the process of goal-relevance, indication verification, merging similar category. Final Evaluation Categories were deduced such as usage demand, usability(city park functions), biodiversity, inhabitation potential, rarity(ecological functions), historical cultural elements, and landscape Quality(landscape functions). As a result of allotting space functions, zones 1 through 4, got high grades at usage demand, was classified as a civic resort district; zones 5 through 6, close to major green area and remained original landscape, as ecological conservation and restoration district; zones 7 through 8, get high grades at usage demand and usability, as environmentally-friendly use district; and zones 9 through 10, many historical cultural elements and view points, and high green possession rate, as stream scenic district. In addition, detail space function and construction plan for each zones were proposed. As a result of this study, proposed space function assignment considering natural characteristics, humanities and social characteristics and landscape characteristics and is expected to be utilized at reasonable spatial planning considering various functions required for urban stream.

An Analysis for Deriving New Convergent Service of Mobile Learning: The Case of Social Network Analysis and Association Rule (모바일 러닝에서의 신규 융합서비스 도출을 위한 분석: 사회연결망 분석과 연관성 분석 사례)

  • Baek, Heon;Kim, Jin Hwa;Kim, Yong Jin
    • Information Systems Review
    • /
    • v.15 no.3
    • /
    • pp.1-37
    • /
    • 2013
  • This study is conducted to explore the possibility of service convergence to promote mobile learning. This study has attempted to identify how mobile learning service is provided, which services among them are considered most popular, and which services are highly demanded by users. This study has also investigated the potential opportunities for service convergence of mobile service and e-learning. This research is then extended to examine the possibility of active convergence of common services in mobile services and e-learning. Important variables have been identified from related web pages of portal sites using social network analysis (SNA) and association rules. Due to the differences in number and type of variables on different web pages, SNA was used to deal with the difficulties of identifying the degree of complex connection. Association analysis has been used to identify association rules among variables. The study has revealed that most frequent services among common services of mobile services and e-learning were Games and SNS followed by Payment, Advertising, Mail, Event, Animation, Cloud, e-Book, Augmented Reality and Jobs. This study has also found that Search, News, GPS in mobile services were turned out to be very highly demanded while Simulation, Culture, Public Education were highly demanded in e-learning. In addition, It has been found that variables involving with high service convergence based on common variables of mobile and e-learning services were Games and SNS, Games and Sports, SNS and Advertising, Games and Event, SNS and e-Book, Games and Community in mobile services while Games, Animation, Counseling, e-Book, being preceding services Simulation, Speaking, Public Education, Attendance Management were turned out be highly convergent in e-learning services. Finally, this study has attempted to predict possibility of active service convergence focusing on Games, SNS, e-Book which were highly demanded common services in mobile and e-learning services. It is expected that this study can be used to suggest a strategic direction to promote mobile learning by converging mobile services and e-learning.

  • PDF

Evaluation of Toxicological Data on Food Additives and Guideline for ADI establishment - Polydimethylsiloxane as emulsifier - (식품첨가물의 독성자료 고찰과 ADI 평가지침 - 소포제 Polydimethylsiloxane를 사례로 -)

  • Choi, Chan-Woong;Jeong, Ji-Yoon;Park, Hyoung-Su;Moon, Jin-Hyun;Lee, Kwang-Ho;Lee, Hyo-Min
    • Journal of Food Hygiene and Safety
    • /
    • v.24 no.4
    • /
    • pp.352-356
    • /
    • 2009
  • The purpose of this study was to introduce the toxicological study review to evaluate the safety of PDMS on the 69th JECFA meeting. Polydimethylsiloxane is a polymer and its ADI was established at 23rd JECFA meeting in 1979. The ADI was maintained although the specification was expanded at its 26th, 29 th, 37 th meetings. Recently, it was reported that PDMS with low molecular weight and viscosity has high absorption rate and different toxicity, so it was submitted at 69th meeting. Toxicological studies of PDMS were submitted from the sponsor and additional information is collected from a document searching. The toxicological studies were reviewed in accordance with the 'Guidelines for the preparation of toxicological working papers for the Joint FAO/WHO Expert Committee on Food Additives'. In the available acute, sub-chronic and chronic toxicity studies on PDMS, dose-related increases in incidence and severity of ocular lesions(corneal crystal, inflammation of the corneal epithelium etc.) were consistently observed after oral dosing. It seems to be a local irritant effect, but the mechanism by which the ocular lesions arose is unclear, although the lack of absorption of PDMS indicates that it is unlikely to be a direct systemic effect. Consequently, the relevance of the ocular lesions for food use of PDMS could not be determined. The ADI of PDMS was re-established from 0-1.5 mg/kg bw/day to 0-0.8 mg/kg bw/day by applying additional safety factor 2 based on its ocular toxicity. The result of 0-0.8 mg/kg bw/day is a temporary ADI until further data are provided to 2010.

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

Teacher's Practice of Activity Materials in the Housing Area of Middle School Technology & Home Economics Textbook (중학교 교사의 기술.가정 주생활영역 활동자료 활용실태)

  • Lee, Young-Doo;Cho, Jea-Soon
    • Journal of Korean Home Economics Education Association
    • /
    • v.20 no.4
    • /
    • pp.157-171
    • /
    • 2008
  • The year of 2007 Reformed Curriculum encourages various activity materials in the textbook facilitate students oriented self-help learning. The purpose of this paper is to find out how much the activity materials in housing area of middle school Technology and Home Economics are practiced in the class and why they are used or not used. The data were collected from 253 middle school teachers who had ever taught the housing unit in any of 6 textbooks. The analyses indicated that the most frequent teaching methode was lecture based on the textbook and internet data focused on the figures and contents of the individual textbook. The average rate of practicing the activity materials was differ by textbooks and the characteristics of the materials such as type of materials, feature of non sentence materials, and type of activity. The main two reasons to practice the activity materials were it's adequacy to class goals and application to everyday life. Low interests of students and shortage of time were the two main reasons why not used the materials. Textbook writers should consider these reasons as well as the characteristics of activity materials practiced in the class by the teachers in order to meet the goals of the reformed as well as current curricula.

  • PDF

The Legal Study of Prohibited Items on Aeroplane for the Aircraft Safety and Security (항공안전보장.질서유지를 위한 항공기반입금지 물품 관리.감독에 관한 입법적 개선방안)

  • Chang, In-Ho
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.1
    • /
    • pp.33-66
    • /
    • 2014
  • While the numbers of overseas travelers has been increased rapidly each year, the numbers of passengers in the aircraft also has continued to be increased gradually. In the mist of these increasing numbers, such accidents as threatening an aircraft safety like riot, aircraft hijacking and terrorism have happened constantly. In these circumstances, South Korean government has prescribed "Aviation on Security Act" in accordance with the Convention on International Civil Aviation and other international agreements. This act aims to prevent illegal activities and illegal items on the aircraft to ensure the safety and security of civil aviation. However, this act is not sufficiently regulating all the illegal crimes and illegal items on the flight. For the worse, there is a lack of effective supervisory capacity. Likewise, the inherent problems of the current laws relating to the prevention of the illegal items on the aircraft are appearing on the surface continually. Above all, illegal items on the aircraft are directly connected to the issue of aviation safety and security as well as a safe utilization of the flight service. Thus, when there occurs a serious accident on board, it surely would be led to a huge economic loss not mentioning the loss of lives following the accident. Therefore safety of the flight passengers cannot be guaranteed without ensuring the safety of aircraft facilities and good supervisory mechanism of illegal items on the aircraft. Accordingly, establishing a safe operation order tends to influence economy and tourism of a country in no small measure. Therefore, it is an urgent issue to settle down a reasonable and adequate supervisory regulations regarding the prevention of the illegal items on the aircraft. Consequently, in this article, I studied on a reasonal and effective mechanism to control the prevention of the illegal items and illegal acts on the aircraft in order to ensure a safety and security of civil aircraft.

Ground Security Activities for Prevention of Aviation Terrorism -Centered on San Francisco International Airport of the U.S.A.- (항공테러방지를 위한 지상 보안활동 -미국 샌프란시스코국제공항을 중심으로-)

  • Kang, Maeng-Jin;Kang, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.2
    • /
    • pp.195-204
    • /
    • 2008
  • With the growth of airline management, as well as computer and IT security, the international trade in this modern society has been rapidly increasing, Along with the advancing, airplanes have become a universal means of communication. However, the complications associated with airplane safety have also been brought up as a result, the most concerning of which is terrorism. One of the main counterplans for preventing terrorism is Ground security activities the core of Ground security activities is absolute safety for passengers in both passenger terminal and freight terminal. Subastral security refers to physical protection, proximity control and 100% security search and freight guarding of the passengers' possessions, and the personnel's duties to perform such jobs are be! coming more crucial. On the other hand, Airport security check has bee n gradually developing since the 1960's, when hijacking began to take place. Although the airports have been providing more safe and comfortable services to their customers, terrorism is still happening today. When Ground security activities is minute, the users feel displeasure and discomfort, yet considering solely their convenience can brings problems in achieving safety. Since the 9.11 terror in 2001, the idea of improving and strengthening airport security was reinforced and a considerable amount of estate is being spent today for invention and application of new technology. Various nations, including the United States, have been improving their systems of security through public services; public police department is actively carrying out their duties in airports as well. In San Francisco International Airport, private police department is in charge of collection of data, national events, VIP protection, law enforcement, cooperation within facilities, daily-based patrol and traffic control. Under guidance and supervision of national organizations, such as TSA, general police department interprets X-Rays, operates metal detectors, checks passports or IDs and observes reactions to explosives. Under these circumstances, studies about advancement of cooperation and duties of general police department and private police department necessitated: especially about private police department and their training for searching equipments, decrease in number of turn over rate, invention of technology and prior settlement in estate for security. The privacy of the public, who make up the major population of airport passengers, must also be minimized. In the following research, the activities of police departments in San Francisco International Airport will be analyzed in order to understand recent actions of the United States on airport security.

Development of Music Recommendation System based on Customer Sentiment Analysis (소비자 감성 분석 기반의 음악 추천 알고리즘 개발)

  • Lee, Seung Jun;Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.197-217
    • /
    • 2018
  • Music is one of the most creative act that can express human sentiment with sound. Also, since music invoke people's sentiment to get empathized with it easily, it can either encourage or discourage people's sentiment with music what they are listening. Thus, sentiment is the primary factor when it comes to searching or recommending music to people. Regard to the music recommendation system, there are still lack of recommendation systems that are based on customer sentiment. An algorithm's that were used in previous music recommendation systems are mostly user based, for example, user's play history and playlists etc. Based on play history or playlists between multiple users, distance between music were calculated refer to basic information such as genre, singer, beat etc. It can filter out similar music to the users as a recommendation system. However those methodology have limitations like filter bubble. For example, if user listen to rock music only, it would be hard to get hip-hop or R&B music which have similar sentiment as a recommendation. In this study, we have focused on sentiment of music itself, and finally developed methodology of defining new index for music recommendation system. Concretely, we are proposing "SWEMS" index and using this index, we also extracted "Sentiment Pattern" for each music which was used for this research. Using this "SWEMS" index and "Sentiment Pattern", we expect that it can be used for a variety of purposes not only the music recommendation system but also as an algorithm which used for buildup predicting model etc. In this study, we had to develop the music recommendation system based on emotional adjectives which people generally feel when they listening to music. For that reason, it was necessary to collect a large amount of emotional adjectives as we can. Emotional adjectives were collected via previous study which is related to them. Also more emotional adjectives has collected via social metrics and qualitative interview. Finally, we could collect 134 individual adjectives. Through several steps, the collected adjectives were selected as the final 60 adjectives. Based on the final adjectives, music survey has taken as each item to evaluated the sentiment of a song. Surveys were taken by expert panels who like to listen to music. During the survey, all survey questions were based on emotional adjectives, no other information were collected. The music which evaluated from the previous step is divided into popular and unpopular songs, and the most relevant variables were derived from the popularity of music. The derived variables were reclassified through factor analysis and assigned a weight to the adjectives which belongs to the factor. We define the extracted factors as "SWEMS" index, which describes sentiment score of music in numeric value. In this study, we attempted to apply Case Based Reasoning method to implement an algorithm. Compare to other methodology, we used Case Based Reasoning because it shows similar problem solving method as what human do. Using "SWEMS" index of each music, an algorithm will be implemented based on the Euclidean distance to recommend a song similar to the emotion value which given by the factor for each music. Also, using "SWEMS" index, we can also draw "Sentiment Pattern" for each song. In this study, we found that the song which gives a similar emotion shows similar "Sentiment Pattern" each other. Through "Sentiment Pattern", we could also suggest a new group of music, which is different from the previous format of genre. This research would help people to quantify qualitative data. Also the algorithms can be used to quantify the content itself, which would help users to search the similar content more quickly.

Development Process and Methods of Audit and Certification Toolkit for Trustworthy Digital Records Management Agency (신뢰성 있는 전자기록관리기관 감사인증도구 개발에 관한 연구)

  • Rieh, Hae-young;Kim, Ik-han;Yim, Jin-Hee;Shim, Sungbo;Jo, YoonSun;Kim, Hyojin;Woo, Hyunmin
    • The Korean Journal of Archival Studies
    • /
    • no.25
    • /
    • pp.3-46
    • /
    • 2010
  • Digital records management is one whole system in which many social and technical elements are interacting. To maintain the trustworthiness, the repository needs periodical audit and certification. Thus, individual electronic records management agency needs toolkit that can be used to self-evaluate their trustworthiness continuously, and self-assess their atmosphere and system to recognize deficiencies. The purpose of this study is development of self-certification toolkit for repositories, which synthesized and analysed such four international standard and best practices as OAIS Reference Model(ISO 14721), TRAC, DRAMBORA, and the assessment report conducted and published by TNA/UKDA, as well as MoRe2 and current national laws and standards. As this paper describes and demonstrate the development process and the framework of this self-certification toolkit, other electronic records management agencies could follow the process and develop their own toolkit reflecting their situation, and utilize the self-assessment results in-house. As a result of this research, 12 areas for assessment were set, which include (organizational) operation management, classification system and master data management, acquisition, registration and description, storage and preservation, disposal, services, providing finding aids, system management, access control and security, monitoring/audit trail/statistics, and risk management. In each 12 area, the process map or functional charts were drawn and business functions were analyzed, and 54 'evaluation criteria', consisted of main business functional unit in each area were drawn. Under each 'evaluation criteria', 208 'specific evaluation criteria', which supposed to be implementable, measurable, and provable for self-evaluation in each area, were drawn. The audit and certification toolkit developed by this research could be used by digital repositories to conduct periodical self-assessment of the organization, which would be used to supplement any found deficiencies and be used to reflect the organizational development strategy.

A Development of Facility Web Program for Small and Medium-Sized PSM Workplaces (중·소규모 공정안전관리 사업장의 웹 전산시스템 개발)

  • Kim, Young Suk;Park, Dal Jae
    • Korean Chemical Engineering Research
    • /
    • v.60 no.3
    • /
    • pp.334-346
    • /
    • 2022
  • There is a lack of knowledge and information on the understanding and application of the Process Safety Management (PSM) system, recognized as a major cause of industrial accidents in small-and medium-sized workplaces. Hence, it is necessary to prepare a protocol to secure the practical and continuous levels of implementation for PSM and eliminate human errors through tracking management. However, insufficient research has been conducted on this. Therefore, this study investigated and analyzed the various violations in the administrative measures, based on the regulations announced by the Ministry of Employment and Labor, in approximately 200 small-and medium-sized PSM workplaces with fewer than 300 employees across in korea. This study intended to contribute to the prevention of major industrial accidents by developing a facility maintenance web program that removed human errors in small-and medium-sized workplaces. The major results are summarized as follows. First, It accessed the web via a QR code on a smart device to check the equipment's specification search function, cause of failure, and photos for the convenience of accessing the program, which made it possible to make requests for the it inspection and maintenance in real time. Second, it linked the identification of the targets to be changed, risk assessment, worker training, and pre-operation inspection with the program, which allowed the administrator to track all the procedures from start to finish. Third, it made it possible to predict the life of the equipment and verify its reliability based on the data accumulated through the registration of the pictures for improvements, repairs, time required, cost, etc. after the work was completed. It is suggested that these research results will be helpful in the practical and systematic operation of small-and medium-sized PSM workplaces. In addition, it can be utilized in a useful manner for the development and dissemination of a facility maintenance web program when establishing future smart factories in small-and medium-sized PSM workplaces under the direction of the government.