• Title/Summary/Keyword: 사이트 관리

Search Result 624, Processing Time 0.027 seconds

Development of Overseas Construction Big Issues based on Analysis of Big Data (빅 데이터 분석을 통한 해외건설 빅 이슈 개발)

  • Park, Hwanpyo;Han, Jaegoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.19 no.3
    • /
    • pp.89-96
    • /
    • 2018
  • This study derived big issues in overseas construction through big data analysis. To derive big issues in overseas construction, candidate groups of big issues were identified through big data analysis targeting 53,759 issues including 39,436 issues from major portal sites, 10,387 issues from daily newspapers, and 336 issues in construction magazines from Oct. 1, 2016 to Sep. 30, 2017. The main results are as follows: First, the main issues of overseas construction for the past one year showed that markets were concentrated in Middle East Asia and most of them were low-price order plant projects, which revealed the limitations. Although orders of overseas construction were slightly upward in the first half of 2017 compared to previous year, overseas construction orders are still unstable due to uncertainties in the international affairs and drops in oil prices. Second, the interest topics based on the 8th core keywords of overseas construction among the overseas construction issues for the past one year showed that region (29.9%), corporation environment (22.0%), profitability (17.0%), organizations (15.1%), projects (5.2%), market environment (3.6%), policy and system (3.6%), and education (3.5%) in the order of interest. Third, 10 core issues that have expandability and persistence of discourse were extracted out of 30 issue candidates with regard to eight keywords. Based on the extracted issues, detailed analysis on each of the core issues in overseas construction and correlation analysis between 10 core issues were conducted.

Passports Recognition using ART2 Algorithm and Face Verification (ART2 알고리즘과 얼굴 인증을 이용한 여권 인식)

  • Jang, Do-Won;Kim, Kwang-Baek
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.05a
    • /
    • pp.190-197
    • /
    • 2005
  • 본 논문에서는 출입국자 관리의 효율성과 체계적인 출입국 관리를 위하여 여권 코드를 자동으로 인식하고 위조 여권을 판별할 수 있는 여권 인식 및 얼굴 인증 방법을 제안한다. 여권 이미지는 기울어진 상태로 스캔되어 획득되어질 수도 있으므로 기울기 보정은 문자 분할 및 인식, 얼굴 인증에 있어 매우 중요하다. 따라서 본 논문에서는 여권 영상을 스미어링한 후, 추출된 문자열 중에서 가장 긴 문자열을 선택하고 이 문자열의 좌측과 우측 부분의 두께 중심을 연결하는 직선과 수평선과의 기울기를 이용하여 여권 여상에 대한 각도 보정을 수행한다. 여권 코드 추출은 소벨 연산자와 수평 스미어링, 8방향 윤곽선 추적 알고리즘을 적용하여 여권 코드의 문자열 영역을 추출하고, 추출된 여권 코드 문자열 영역에 대해 반복 이지화 방법을 적용하여 코드의 문자열 영역을 이진화한다. 이진화된 문자열 영역에 대해 CDM 마스크를 적용하여 문자열의 코드들을 복원하고 8방향 윤곽선 추적 알고리즘을 적용하여 개별 코드를 추출한다. 추출된 개별 코드는 ART2 알고리즘을 적용하여 인식한다. 얼굴 인증을 위해 템플릿 매칭 알고리즘을 이용하여 얼굴 템플릿 데이터베이스를 구축하고 여권에서 추출된 얼굴 영역과의 유사도 측정을 통하여 여권 얼굴 영역의 위조 여부를 판별한다. 얼굴 인증을 위해서 Hue, YIQ-I, YCbCr-Cb 특징들의 유사도를 종합적으로 분석하여 얼굴 인증에 적용한다. 제안된 여권 인식 및 얼굴 인증 방법의 성능을 평가를 위하여 원본 여권에 얼굴 부분을 위조한 여권과 노이즈, 대비 증가 및 감소, 밝기 증가 및 감소 및 여권 영상을 흐리게 하여 실험한 결과, 제안된 방법이 여권 코드 인식 및 얼굴 인증에 있어서 우수한 성능이 있음을 확인하였다.권 영상에서 획득되어진 얼굴 영상의 특징벡터와 데이터베이스에 있는 얼굴 영상의 특징벡터와의 거리 값을 계산하여 사진 위조 여부를 판별한다. 제안된 여권 인식 및 얼굴 인증 방법의 성능을 평가를 위하여 원본 여권에서 얼굴 부분을 위조한 여권과 기울어진 여권 영상을 대상으로 실험한 결과, 제안된 방법이 여권의 코드 인식 및 얼굴 인증에 있어서 우수한 성능이 있음을 확인하였다.진행하고 있다.태도와 유아의 창의성간에는 상관이 없는 것으로 나타났고, 일반 유아의 아버지 양육태도와 유아의 창의성간의 상관에서는 아버지 양육태도의 성취-비성취 요인에서와 창의성제목의 추상성요인에서 상관이 있는 것으로 나타났다. 따라서 창의성이 높은 아동의 아버지의 양육태도는 일반 유아의 아버지와 보다 더 애정적이며 자율성이 높지만 창의성이 높은 아동의 집단내에서 창의성에 특별한 영향을 더 미치는 아버지의 양육방식은 발견되지 않았다. 반면 일반 유아의 경우 아버지의 성취지향성이 낮을 때 자녀의 창의성을 향상시킬 수 있는 것으로 나타났다. 이상에서 자녀의 창의성을 향상시키는 중요한 양육차원은 애정성이나 비성취지향성으로 나타나고 있어 정서적인 측면의 지원인 것으로 밝혀졌다.징에서 나타나는 AD-SR맥락의 반성적 탐구가 자주 나타났다. 반성적 탐구 척도 두 그룹을 비교 했을 때 CON 상호작용의 특징이 낮게 나타나는 N그룹이 양적으로 그리고 내용적으로 더 의미 있는 반성적 탐구를 했다용을 지원하는 홈페이지를 만들어 자료 제공 사이트에 대한 메타 자료를 데이터베이스화했으며 이를 통해 학생들이 원하는 실시간 자료를 검색하여 찾을 수 있고 홈페이지를 방분했을 때 이해하기 어려운 그래프나 각 홈페이지가 제공하는 자료들에 대한 처리 방법을 도움말로 제공받을 수 있게 했다. 실

  • PDF

The Role of Clients in Software Projects with Agile Methods (애자일 방법론을 사용한 소프트웨어 프로젝트에서의 사용자 역할 분석)

  • Kim, Vladimir;Cho, Wooje;Jung, Yoonhyuk
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.141-160
    • /
    • 2019
  • Agile methodologies in software development, including the development of artificial intelligence software, have been widespread over the past several years. In spite of the popularity of agile methodologies in practice, there is a lack of empirical evidence to identify determinants of success of software projects in which agile methods are used. To understand the role of clients in software project where agile methods are used, we examine the effect of client-side factors, including lack of user involvement, unrealistic client expectations, and constant changes of requirements on project success from practitioners' perspective. Survey methods are used in this study. Data were collected by means of online survey to IT professionals who have experience with software development methodologies, and ordered logit regression is used to analyze the survey data. Results of our study imply the following managerial findings. First, user involvement is critical to project success to take advantage of agile methods. Second, it is interesting that, with an agile method, constant changes of client's requirements is not a negative factor but a positive factor of project success. Third, unrealistic client expectations do negatively affect project success even with agile methods.

Improvement on the System of Information to the Public for Chemical Accident Emergency Response (화학사고 응급정보에 대한 주민제공 체계 개선 방안)

  • Park, Hyesong;Song, Chi-sun;Shin, Chang-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.571-579
    • /
    • 2019
  • To minimize the damage from chemical accidents, a risk management plan (RMP) has been implemented since 2015. According to this regulation, operators who handle more than the designated quantity of the accident preparedness chemicals should provide emergency response information to the public within the affected areas of accidents. The information, including chemicals, affected areas and evacuation instructions should be provided to the public in advance so that they can evacuate immediately in the event of a chemical accident. Currently, the information notification can be provided in various methods by being registered in the notification system, sent with written documents or delivered directly to the public. To examine the status of the operation method, this study analyzed similar cases overseas, investigated the degree of awareness of providing information through the number of the annual visitor of the Information Provision System, and obtained survey results from some residents. This current operation method are problems because the public, who do not have sufficient information about chemicals, do not understand the emergency information properly or it is difficult to recognize where the residents should find this information because of the convenient operation based on the information provider. In this study, measures were proposed to minimize the damage by making it easier for the public to understand the emergency information and the information communicated appropriately in advance by dividing them into an information providing method and post management.

Effective Defense Mechanism Against New Vulnerability Attacks (신규 취약점 공격에 대한 효율적인 방어 메커니즘)

  • Kwak, Young-Ok;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.499-506
    • /
    • 2021
  • Hackers' cyber attack techniques are becoming more sophisticated and diversified, with a form of attack that has never been seen before. In terms of information security vulnerability standard code (CVE), about 90,000 new codes were registered from 2015 to 2020. This indicates that security threats are increasing rapidly. When new security vulnerabilities occur, damage should be minimized by preparing countermeasures for them, but in many cases, companies are insufficient to cover the security management level and response system with a limited security IT budget. The reason is that it takes about a month for analysts to discover vulnerabilities through manual analysis, prepare countermeasures through security equipment, and patch security vulnerabilities. In the case of the public sector, the National Cyber Safety Center distributes and manages security operation policies in a batch. However, it is not easy to accept the security policy according to the characteristics of the manufacturer, and it takes about 3 weeks or more to verify the traffic for each section. In addition, when abnormal traffic inflow occurs, countermeasures such as detection and detection of infringement attacks through vulnerability analysis must be prepared, but there are limitations in response due to the absence of specialized security experts. In this paper, we proposed a method of using the security policy information sharing site "snort.org" to prepare effective countermeasures against new security vulnerability attacks.

A Study on Systematic Firmware Security Analysis Method for IoT Devices (체계적인 IoT 기기의 펌웨어 보안 분석 방법에 관한 연구)

  • Kim, Yejun;Gim, Jeonghyeon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.31-49
    • /
    • 2021
  • IoT devices refer to embedded devices that can communicate with networks. Since there are various types of IoT devices and they are widely used around us, in the event of an attack, damages such as personal information leakage can occur depending on the type of device. While the security team analyzes IoT devices, they should target firmware as well as software interfaces since IoT devices are operated by both of them. However, the problem is that it is not easy to extract and analyze firmware and that it is not easy to manage product quality at a certain level even if the same target is analyzed according to the analyst's expertise within the security team. Therefore, in this paper, we intend to establish a vulnerability analysis process for the firmware of IoT devices and present available tools for each step. Besides, we organized the process from firmware acquisition to analysis of IoT devices produced by various commercial manufacturers, and we wanted to prove their validity by applying it directly to drone analysis by various manufacturers.

The Current Status of the Companion Animal products and Pet Cosmetics industry (반려동물 용품 및 화장품 산업 현황)

  • Lee, Jung Min;Jang, Min Ah
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.833-844
    • /
    • 2021
  • In the era of Corona, companion animals provide a lot of comfort to people, and the Pet Pam group, who thinks of companion animals as family members, has appeared. There is also the Pet Pour phenomenon, in which young consumers spend less on their pets and spend on their companion animals. Despite these changes in the times, pet products, including pet food, are still highly dependent on imports. In addition, since domestic standards for cosmetics and supplies for companion animals have not been established, they rely only on cosmetic safety standards and regulations. In addition, the terminology for domestic pet cosmetics has not been established yet. Currently, only the Animal Protection Act related to companion animals has been amended in the domestic law, but in the case of Japan, the Companion Animal Feed Safety Act came into effect in June 2009. In the United States, the federal Food, Drug, and Cosmetic Control Act covers pet cosmetics and supplies. Germany, which has strong animal protection laws, has various national regulations on food and feed, and detailed national regulations are also provided on the website of the Food Safety Administration. National policies and environments should be established to manage and develop the companion animal industry in Korea as in such a country, and it is considered essential for the development of companion animal cosmetics and various companion animal industries.

Liaohe National Park based on big data visualization Visitor Perception Study

  • Qi-Wei Jing;Zi-Yang Liu;Cheng-Kang Zheng
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.4
    • /
    • pp.133-142
    • /
    • 2023
  • National parks are one of the important types of protected area management systems established by IUCN and a management model for implementing effective conservation and sustainable use of natural and cultural heritage in countries around the world, and they assume important roles in conservation, scientific research, education, recreation and driving community development. In the context of big data, this study takes China's Liaohe National Park, a typical representative of global coastal wetlands, as a case study, and using Python technology to collect tourists' travelogues and reviews from major OTA websites in China as a source. The text spans from 2015 to 2022 and contains 2998 reviews with 166,588 words in total. The results show that wildlife resources, natural landscape, wetland ecology and the fishing and hunting culture of northern China are fully reflected in the perceptions of visitors to Liaohe National Park; visitors have strong positive feelings toward Liaohe National Park, but there is still much room for improvement in supporting services and facilities, public education and visitor experience and participation.

A Study on the Hull-dimension of 89 ton class Stow-net Vessel with Stern-fishing (89톤급 선미식 안강망어선의 선형치수에 관한 연구)

  • Park, Je-Ung;Lee, Hyeon-Sang
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.33 no.3
    • /
    • pp.159-165
    • /
    • 1997
  • This paper presents the optimum dimension of 89 ton class stow-net vessel with stern-fishing. The model of basic design is developed by using the optimization techniques referring to objective function and numerous constraints as follows; speed, fishing quantity, fishing days, catch per unit effort(CPUE), and weight/ratio of main dimensions, etc. Thus, the basic design of stow-net fishing vessel is built up by using the optimization of the design variables called the economic optimization criteria, and the objective function represents the criterion which is cost benefit ratio(CBR). The main conclusions are as follows. 1. S/W for decision of optimum hull size is developed in 89 ton class stow-net fishing vessel which is constructed with optimization of the design variables called the economic optimization criteria. 2. For optimum ship dimensions in 89 ton class stow-net fishing vessel, the hull dimensions can be obtained in the range of L= 27.3m, B = 6.6m, D = 2.80m, Cb = 0.695, T/D = 0.80, $\Delta$(displacement)=281.7ton with 10 knots.

  • PDF

NFC-based Smartwork Service Model Design (NFC 기반의 스마트워크 서비스 모델 설계)

  • Park, Arum;Kang, Min Su;Jun, Jungho;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.157-175
    • /
    • 2013
  • Since Korean government announced 'Smartwork promotion strategy' in 2010, Korean firms and government organizations have started to adopt smartwork. However, the smartwork has been implemented only in a few of large enterprises and government organizations rather than SMEs (small and medium enterprises). In USA, both Yahoo! and Best Buy have stopped their flexible work because of its reported low productivity and job loafing problems. In addition, according to the literature on smartwork, we could draw obstacles of smartwork adoption and categorize them into the three types: institutional, organizational, and technological. The first category of smartwork adoption obstacles, institutional, include the difficulties of smartwork performance evaluation metrics, the lack of readiness of organizational processes, limitation of smartwork types and models, lack of employee participation in smartwork adoption procedure, high cost of building smartwork system, and insufficiency of government support. The second category, organizational, includes limitation of the organization hierarchy, wrong perception of employees and employers, a difficulty in close collaboration, low productivity with remote coworkers, insufficient understanding on remote working, and lack of training about smartwork. The third category, technological, obstacles include security concern of mobile work, lack of specialized solution, and lack of adoption and operation know-how. To overcome the current problems of smartwork in reality and the reported obstacles in literature, we suggest a novel smartwork service model based on NFC(Near Field Communication). This paper suggests NFC-based Smartwork Service Model composed of NFC-based Smartworker networking service and NFC-based Smartwork space management service. NFC-based smartworker networking service is comprised of NFC-based communication/SNS service and NFC-based recruiting/job seeking service. NFC-based communication/SNS Service Model supplements the key shortcomings that existing smartwork service model has. By connecting to existing legacy system of a company through NFC tags and systems, the low productivity and the difficulty of collaboration and attendance management can be overcome since managers can get work processing information, work time information and work space information of employees and employees can do real-time communication with coworkers and get location information of coworkers. Shortly, this service model has features such as affordable system cost, provision of location-based information, and possibility of knowledge accumulation. NFC-based recruiting/job-seeking service provides new value by linking NFC tag service and sharing economy sites. This service model has features such as easiness of service attachment and removal, efficient space-based work provision, easy search of location-based recruiting/job-seeking information, and system flexibility. This service model combines advantages of sharing economy sites with the advantages of NFC. By cooperation with sharing economy sites, the model can provide recruiters with human resource who finds not only long-term works but also short-term works. Additionally, SMEs (Small Medium-sized Enterprises) can easily find job seeker by attaching NFC tags to any spaces at which human resource with qualification may be located. In short, this service model helps efficient human resource distribution by providing location of job hunters and job applicants. NFC-based smartwork space management service can promote smartwork by linking NFC tags attached to the work space and existing smartwork system. This service has features such as low cost, provision of indoor and outdoor location information, and customized service. In particular, this model can help small company adopt smartwork system because it is light-weight system and cost-effective compared to existing smartwork system. This paper proposes the scenarios of the service models, the roles and incentives of the participants, and the comparative analysis. The superiority of NFC-based smartwork service model is shown by comparing and analyzing the new service models and the existing service models. The service model can expand scope of enterprises and organizations that adopt smartwork and expand the scope of employees that take advantages of smartwork.