• Title/Summary/Keyword: 요구분석기법

Search Result 2,772, Processing Time 0.036 seconds

Identifying High Risk Group of Adolescent Status Delinquency and Factors Associated with the Group (청소년 지위비행의 위험군 탐색에 관한 연구)

  • Young Mi Park;Hye-Kyung Lee;Suyon Baek
    • Journal of the Korean Applied Science and Technology
    • /
    • v.39 no.6
    • /
    • pp.892-905
    • /
    • 2022
  • This study attempted to derive high-risk groups of adolescent status delinquency(ASD) and to identify related factors. This study was conducted with 1,979 adolescents enrolled in the first year of high school, data from the 7th year of the 4th grade panel of the Korean Children and Youth Panel Survey. Classification and regression tree analysis method was used. The ASD group was 264, which was 13.3% of the total. The high-risk group for ASD is that is male who has a low perception of positive parenting style. Positive parenting style was found to be the most important influencing factor in ASD, followed by gender, emotional problems, relationship with teacher, and achievement value. In order to prevent ASD, it is necessary to develop a parenting education program and an intervention program specialized for male adolescents. In addition, interventions that comprehensively deal with emotional problems such as depression and social withdrawal are required, going beyond the previous interventions that focused on aggression. In particular, it has been found that relationship with teachers is the most important influencing factor in the school environment. Through education on the causes and consequences of ASD and training on counseling techniques, the promotion of relationships with teachers will act as a protective factor to prevent ASD.

The Problems and Improvement Measures of Protection for Politician (정치인 경호제도의 문제점 및 개선방안)

  • Jo, Sung-Gu;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.169-196
    • /
    • 2010
  • Although more priority is given to politicians from the aspect that they represent people and decide the future of country, the current situation is that politicians are not free from terrorism because of insufficient guard-concerned law, negative social recognition and increased crime and terrorism. The measure for politician terrorism shall be handled from the aspect of national security rather than public peace. For the purpose, basic legal foundation shall be prepared and specialized guard technique considering specialty of politician shall be established. Basic solution shall be established by reinforcing law against politician terrorism and establishing new law from the national viewpoint. The guard for politician has two faces that both of safety of guard target and voting intention of voter shall be met at the same time. Although special guard technique is required for guarding politician, current situation is that it is not researched professionally. In relation to the measure to develop the system of protection for politician, First, the study suggested legal foundation for politician guard. Although the 17th National Assembly proposed revised legal plan to protect politician from terrorism, it is suspended, expired and abolished now. The legal plan presented by members of the National Assembly was simply restricted to the scope of public guard. The study divided establishment of legal foundation into two things. The first one is the dispatch type of effective public guard and the second one is the transfer to private guard. Second, the study suggested environmental development method of politician guard. in the environment of politician guard, the study suggested improvement and development method by analyzing social recognition, politician's mind and voter's mind psychologically. After the beginning of human society, if human race is continued, political activity won't disappear. It is obvious that the safety of political leader is very important issue for human race because he plays the role to decide the future of human. In the future, more specialized, effective law shall be prepared and deeper study of scholar shall be performed.

  • PDF

Father's Communication Style and Children's School Adjustment: Mediation Effect of Ego-Resilience (아동이 지각한 아버지의 의사소통유형과 학교생활적응과의 관계에서 자아탄력성의 매개효과)

  • Kim, Su-Jin;Kim, Hye-Sook
    • The Korean Journal of Elementary Counseling
    • /
    • v.10 no.2
    • /
    • pp.203-221
    • /
    • 2011
  • This research aims to make people realize the importance of styles of father's communication and ego-resilience in school life adaptation and, furthermore, provide necessary data for the communication between father and children by confirming the mediation effect of ego-resilience in the relationship between the styles of father's communication, which the child recognizes, and the school life adaptation. The selected research questions to achieve such research purpose are like the following. First, what is the correlation among school life adaptation, ego-resilience, and communications styles of father that child recognizes? Second, does the ego-resilience show mediation effect in the relationship between the school life adaptation and communication styles of the father that child recognizes? The subjects for this research were 345 children in 5thand 6thgrades from B elementary school in Seo-gu, Incheon. SPSS 18.0 program was used for the collected data, and correlation analysis was performed in order to discover the relationship among variables. Regression analysis was performed to verify the mediation effect of ego-resilience. The summary of this research is like the following. First, as the result of the correlation analysis of the father's communication styles, ego-resilience and the school life adaptation, which the child recognized, the three variables showed statistically significant correlation. Among the functional and dysfunctional communication styles that child recognized, the placating style showed positive correlation with ego-resilience and school life adaptation, and among dysfunctional communication styles, the intellectualizing style, distracting style, and blaming style showed negative correlation with ego-resilience and school life adaptation. Ego-resilience and school life adaptation showed positive correlation. Second, after looking at the mediation effect of ego-resilience in the relationship of the father's communication style and school life adaptation, the result showed that ego-resilience had partial mediation effect in the relationship of the father's communication style and school life adaptation. In this research, it has significance in the aspect that it confirmed the relationship and route between the father's communication styles, school life adaptation, and ego-resilience, which child recognized. Therefore, the effort is required to research and apply desirable communication method between fathers and children in order to help students to adapt well in school life, and moreover, it is also required that ego-resilience improvement program gets developed and applied at the school field.

  • PDF

Integrated Management Data Warehouse Development Process of Research Expenses in Enterprise Environment (엔터프라이즈 환경의 연구비 통합관리 데이터 웨어하우스 개발 프로세스)

  • Choi, Seong-Man;Yoo, Cheol-Jung;Chang, Ok-Bae
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.183-194
    • /
    • 2004
  • The existing management job of research expenses has been divided into three parts: budget planning, budget draw-up, and exact settlement of budget. However, it caused some problems. Under this current circumstance it is required to obtain research expenses steadily, to operate efficiently and to use them clearly to solve such problems. As a result of a study on data warehouse development process of existing system integration company (Inmon, IBM) to reflect current trend described above, data warehouse development process of Inmon uses systematic and gradual access as a classical development cycle method. It causes overlap and feedback to the previous step in the process of each step Is requested. And another problem that it is difficult to toil what function refers and corrects data because functions and data are separated during performing development process at data warehouse development process of IBM is caused. Integrated management data warehouse development process of research expenses in the enterprise environment which applies UML at planning and analysis step, design step and implement and test step is suggested in this paper. Information retrieval agent uses existing budget plan DB, budget draw-up DB and budget settlement DB to find out information that a user wants to know. Information retrieval agent collects and saves information at integration database and information integration agent extracts, transports, transforms and loads the data. Information integration agent reduces a user's efforts to access to a number of information sources and check each of them. It also screens out data that a user may not need. As a result, integrated management data warehouse development process of research expenses in the enterprise environment reflects a user's requirements as much as possible and provides various types of information to make a decision which is needed to establish the policy of research expense management. It helps an end user approach his/her desired analysis information quickly and get various data from the comprehensive viewpoint rather than the fragmentary viewpoint. Furthermore, as it integrated three systems into one, it is possible to share data, to integrate the system, to reduce operating expenses and to simplify supporting environment for the decision making.

Development and Evaluation of Traffic Conflict Criteria at an intersection (교차로 교통상충기준 개발 및 평가에 관한 연구)

  • 하태준;박형규;박제진;박찬모
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.2
    • /
    • pp.105-115
    • /
    • 2002
  • For many rears, traffic accident statistics are the most direct measure of safety for a signalized intersection. However it takes more than 2 or 3 yearn to collect certain accident data for adequate sample sizes. And the accident data itself is unreliable because of the difference between accident data recorded and accident that is actually occurred. Therefore, it is rather difficult to evaluate safety for a intersection by using accident data. For these reasons, traffic conflict technique(TCT) was developed as a buick and accurate counter-measure of safety for a intersection. However, the collected conflict data is not always reliable because there is absence of clear criteria for conflict. This study developed objective and accurate conflict criteria, which is shown below based on traffic engineering theory. Frist, the rear-end conflict is regarded, when the following vehicle takes evasive maneuver against the first vehicle within a certain distance, according to car-following theory. Second, lane-change conflict is regarded when the following vehicle takes evasive maneuver against first vehicle which is changing its lane within the minimum stopping distance of the following vehicle. Third, cross and opposing-left turn conflicts are regarded when the vehicle which receives green sign takes evasive maneuver against the vehicle which lost its right-of-way crossing a intersection. As a result of correlation analysis between conflict and accident, it is verified that the suggested conflict criteria in this study ave applicable. And it is proven that estimating safety evaluation for a intersection with conflict data is possible, according to the regression analysis preformed between accident and conflict, EPDO accident and conflict. Adopting the conflict criteria suggested in this study would be both quick and accurate method for diagnosing safety and operational deficiencies and for evaluation improvements at intersections. Further research is required to refine the suggested conflict criteria to extend its application. In addition, it is necessary to develope other types of conflict criteria, not included in this study, in later study.

Thermal Characteristics of Daegu using Land Cover Data and Satellite-derived Surface Temperature Downscaled Based on Machine Learning (기계학습 기반 상세화를 통한 위성 지표면온도와 환경부 토지피복도를 이용한 열환경 분석: 대구광역시를 중심으로)

  • Yoo, Cheolhee;Im, Jungho;Park, Seonyoung;Cho, Dongjin
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.6_2
    • /
    • pp.1101-1118
    • /
    • 2017
  • Temperatures in urban areas are steadily rising due to rapid urbanization and on-going climate change. Since the spatial distribution of heat in a city varies by region, it is crucial to investigate detailed thermal characteristics of urban areas. Recently, many studies have been conducted to identify thermal characteristics of urban areas using satellite data. However,satellite data are not sufficient for precise analysis due to the trade-off of temporal and spatial resolutions.In this study, in order to examine the thermal characteristics of Daegu Metropolitan City during the summers between 2012 and 2016, Moderate Resolution Imaging Spectroradiometer (MODIS) daytime and nighttime land surface temperature (LST) data at 1 km spatial resolution were downscaled to a spatial resolution of 250 m using a machine learning method called random forest. Compared to the original 1 km LST, the downscaled 250 m LST showed a higher correlation between the proportion of impervious areas and mean land surface temperatures in Daegu by the administrative neighborhood unit. Hot spot analysis was then conducted using downscaled daytime and nighttime 250 m LST. The clustered hot spot areas for daytime and nighttime were compared and examined based on the land cover data provided by the Ministry of Environment. The high-value hot spots were relatively more clustered in industrial and commercial areas during the daytime and in residential areas at night. The thermal characterization of urban areas using the method proposed in this study is expected to contribute to the establishment of city and national security policies.

Managing Duplicate Memberships of Websites : An Approach of Social Network Analysis (웹사이트 중복회원 관리 : 소셜 네트워크 분석 접근)

  • Kang, Eun-Young;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.153-169
    • /
    • 2011
  • Today using Internet environment is considered absolutely essential for establishing corporate marketing strategy. Companies have promoted their products and services through various ways of on-line marketing activities such as providing gifts and points to customers in exchange for participating in events, which is based on customers' membership data. Since companies can use these membership data to enhance their marketing efforts through various data analysis, appropriate website membership management may play an important role in increasing the effectiveness of on-line marketing campaign. Despite the growing interests in proper membership management, however, there have been difficulties in identifying inappropriate members who can weaken on-line marketing effectiveness. In on-line environment, customers tend to not reveal themselves clearly compared to off-line market. Customers who have malicious intent are able to create duplicate IDs by using others' names illegally or faking login information during joining membership. Since the duplicate members are likely to intercept gifts and points that should be sent to appropriate customers who deserve them, this can result in ineffective marketing efforts. Considering that the number of website members and its related marketing costs are significantly increasing, it is necessary for companies to find efficient ways to screen and exclude unfavorable troublemakers who are duplicate members. With this motivation, this study proposes an approach for managing duplicate membership based on the social network analysis and verifies its effectiveness using membership data gathered from real websites. A social network is a social structure made up of actors called nodes, which are tied by one or more specific types of interdependency. Social networks represent the relationship between the nodes and show the direction and strength of the relationship. Various analytical techniques have been proposed based on the social relationships, such as centrality analysis, structural holes analysis, structural equivalents analysis, and so on. Component analysis, one of the social network analysis techniques, deals with the sub-networks that form meaningful information in the group connection. We propose a method for managing duplicate memberships using component analysis. The procedure is as follows. First step is to identify membership attributes that will be used for analyzing relationship patterns among memberships. Membership attributes include ID, telephone number, address, posting time, IP address, and so on. Second step is to compose social matrices based on the identified membership attributes and aggregate the values of each social matrix into a combined social matrix. The combined social matrix represents how strong pairs of nodes are connected together. When a pair of nodes is strongly connected, we expect that those nodes are likely to be duplicate memberships. The combined social matrix is transformed into a binary matrix with '0' or '1' of cell values using a relationship criterion that determines whether the membership is duplicate or not. Third step is to conduct a component analysis for the combined social matrix in order to identify component nodes and isolated nodes. Fourth, identify the number of real memberships and calculate the reliability of website membership based on the component analysis results. The proposed procedure was applied to three real websites operated by a pharmaceutical company. The empirical results showed that the proposed method was superior to the traditional database approach using simple address comparison. In conclusion, this study is expected to shed some light on how social network analysis can enhance a reliable on-line marketing performance by efficiently and effectively identifying duplicate memberships of websites.

A Study on the Hull-dimension of 89 ton class Stow-net Vessel with Stern-fishing (89톤급 선미식 안강망어선의 선형치수에 관한 연구)

  • Park, Je-Ung;Lee, Hyeon-Sang
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.33 no.3
    • /
    • pp.159-165
    • /
    • 1997
  • This paper presents the optimum dimension of 89 ton class stow-net vessel with stern-fishing. The model of basic design is developed by using the optimization techniques referring to objective function and numerous constraints as follows; speed, fishing quantity, fishing days, catch per unit effort(CPUE), and weight/ratio of main dimensions, etc. Thus, the basic design of stow-net fishing vessel is built up by using the optimization of the design variables called the economic optimization criteria, and the objective function represents the criterion which is cost benefit ratio(CBR). The main conclusions are as follows. 1. S/W for decision of optimum hull size is developed in 89 ton class stow-net fishing vessel which is constructed with optimization of the design variables called the economic optimization criteria. 2. For optimum ship dimensions in 89 ton class stow-net fishing vessel, the hull dimensions can be obtained in the range of L= 27.3m, B = 6.6m, D = 2.80m, Cb = 0.695, T/D = 0.80, $\Delta$(displacement)=281.7ton with 10 knots.

  • PDF

The Evaluation of Crime Prevention Environment for Cultural Heritage using the 3D Visual Exposure Index (3D 시각노출도를 이용한 문화재 범죄예방환경의 평가)

  • Kim, Choong-Sik
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.35 no.1
    • /
    • pp.68-82
    • /
    • 2017
  • Strengthening surveillance, one of the most important factors in the crime prevention environment of cultural heritages, has difficulty in evaluating and diagnosing the site. For this reasons, surveillance enhancement has been assessed by modelling the shape of cultural heritage, topography, and trees digitally. The purpose of this study is to develop the evaluation method of crime prevention environment for cultural heritage by using the 3D visual exposure index (3DVE) which can quantitatively evaluate the surveillance enhancement in three dimensions. For the study, the evaluation factors were divided into natural, organizational, mechanical, and integrated surveillance. To conduct the analysis, the buildings, terrain, walls, and trees of the study site were modeled in three dimensions and the analysis program was developed by using the Unity 3D. Considering the working area of the person, it is possible to analyze the surveillance point by dividing it into the head and the waist position. In order to verify the feasibility of the 3DVE as the analysis program, we assessed the crime prevention environment by digitally modeling the Donam Seowon(Historic Site No. 383) located in Nonsan. As a result of the study, it was possible to figure out the problems of patrol circulation, the blind spot, and the weak point in natural, mechanical, and organizational surveillance of Donam Seowon. The results of the 3DVE were displayed in 3D drawings, so that the position and object could be identified clearly. Surveillance during the daytime is higher in the order of natural, mechanical, and organizational surveillance, while surveillance during the night is higher in the order of organizational, mechanical, and natural surveillance. The more the position of the work area becomes low, the more it is easy to be shielded, so it is necessary to evaluate the waist position. It is possible to find out and display the blind spot by calculating the surveillance range according to the specification, installation location and height of CCTV. Organizational surveillance, which has been found to be complementary to mechanical surveillance, needs to be analyzed at the vulnerable time when crime might happen. Furthermore, it is note that the analysis of integrated surveillance can be effective in examining security light, CCTV, patrol circulation, and other factors. This study was able to diagnose the crime prevention environment by simulating the actual situation. Based on this study, consecutive researches should be conducted to evaluate and compare alternatives to design the crime prevention environment.

Terrain Shadow Detection in Satellite Images of the Korean Peninsula Using a Hill-Shade Algorithm (음영기복 알고리즘을 활용한 한반도 촬영 위성영상에서의 지형그림자 탐지)

  • Hyeong-Gyu Kim;Joongbin Lim;Kyoung-Min Kim;Myoungsoo Won;Taejung Kim
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_1
    • /
    • pp.637-654
    • /
    • 2023
  • In recent years, the number of users has been increasing with the rapid development of earth observation satellites. In response, the Committee on Earth Observation Satellites (CEOS) has been striving to provide user-friendly satellite images by introducing the concept of Analysis Ready Data (ARD) and defining its requirements as CEOS ARD for Land (CARD4L). In ARD, a mask called an Unusable Data Mask (UDM), identifying unnecessary pixels for land analysis, should be provided with a satellite image. UDMs include clouds, cloud shadows, terrain shadows, etc. Terrain shadows are generated in mountainous terrain with large terrain relief, and these areas cause errors in analysis due to their low radiation intensity. previous research on terrain shadow detection focused on detecting terrain shadow pixels to correct terrain shadows. However, this should be replaced by the terrain correction method. Therefore, there is a need to expand the purpose of terrain shadow detection. In this study, to utilize CAS500-4 for forest and agriculture analysis, we extended the scope of the terrain shadow detection to shaded areas. This paper aims to analyze the potential for terrain shadow detection to make a terrain shadow mask for South and North Korea. To detect terrain shadows, we used a Hill-shade algorithm that utilizes the position of the sun and a surface's derivatives, such as slope and aspect. Using RapidEye images with a spatial resolution of 5 meters and Sentinel-2 images with a spatial resolution of 10 meters over the Korean Peninsula, the optimal threshold for shadow determination was confirmed by comparing them with the ground truth. The optimal threshold was used to perform terrain shadow detection, and the results were analyzed. As a qualitative result, it was confirmed that the shape was similar to the ground truth as a whole. In addition, it was confirmed that most of the F1 scores were between 0.8 and 0.94 for all images tested. Based on the results of this study, it was confirmed that automatic terrain shadow detection was well performed throughout the Korean Peninsula.