• Title/Summary/Keyword: 전술 정보

Search Result 357, Processing Time 0.024 seconds

Impact of climate change on extreme rainfall in Gwangju based on shared socioeconomic pathways (SSP) scenarios (SSP 시나리오를 이용한 광주지역 미래 극한강우 전망 분석)

  • Kim, Sunghun;Kim, HeeChul;Lee, Taewon;Heo, Jun-Haeng
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.386-386
    • /
    • 2021
  • 대기 중 온실가스 농도는 인간의 인위적 활동에 의해 증가하고 있으며, 이로 인하여 발생하는 기후변화는 극한 수문 사상에 상당한 영향을 미치고 있다. 특히, 기후변화로 인한 강수 특성의 변화는 홍수, 가뭄, 태풍 등과 같은 극한사상의 변화로 이어지며, 급격한 도시화와 복잡한 사회기반시설물 등과 맞물려 더욱 취약한 홍수위험 문제로 대두된다. 기후변화에 따른 미래의 불확실한 변화에 적응하기 위하여 다양한 기후모델들이 개발되었고, 기후변화와 관련된 많은 응용 연구들이 기후모델에서 모의된 자료를 기반으로 미래를 전망하고 있다. IPCC (Intergovernmental Panel on Climate Change) 제6차 평가보고서(The 6th Assessment Report: AR6)에서는 사회경제 구조의 변화를 반영한 공통사회경제경로 시나리오(Shared Socioeconomic Pathways, SSP) 개념을 도입하였다. SSP 시나리오는 사회경제 변화를 기준으로 기후변화에 대한 완화와 노력에 따라 5개의 시나리오로 구별된다. 기상청 기후정보포털(http://www.climate.go.kr/)에서는 4개 조합의 시나리오(SSP1-RCP2.6, SSP2-RCP4.5, SSP3-RCP7.0, SSP5-RCP8.5) 결과가 제공된다. 자료는 동아시아 지역에 대해 생산한 자료로 25km의 공간해상도를 가지고 있으며, 현재모의기간(1979-2014, SHIST)과 미래시나리오기간(2015-2020, SSSP)으로 구분된다. 본 연구에서는 전술한 SSP-RCP 시나리오 조합 중 SSP1-RCP2.6, SSP5-RCP8.5 조합을 이용하여 광주지역 극한강우의 미래 변화를 분석하였다. 시나리오 기반 강우자료의 통계적 특성 분석을 위해 연최대 자료를 추출하여 경향성 및 변동성 분석을 수행하였고, 광주지역 강우 자료에 내재된 특성 변화를 정량적으로 분석하였다.

  • PDF

Construction of Internet Public Library Asia (아시아 인터넷 공공 도서관(Internet Public Library Asia) 구축에 관한 연구)

  • 이원숙;일본명;일본명;일본명;일본명
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.13 no.2
    • /
    • pp.59-73
    • /
    • 2002
  • Libraries, not only research libraries but also public libraries, have been fundamentally affected by the immense spread of the Internet and the World Wide Web. Many public libraries have their Web pages, through which they are providing their new and conventional services. There are also web sites which provide library-like services. This paper shows an experimental project named Internet Public Library Asia, which provides information in multiple languages of information resources published in Chinese, Japanese and Korean languages. This paper firstly overviews how traditional public libraries have been affected by the Internet. Then, it describes a few aspects from the viewpoint of crucial library function on the Internet and also from the viewpoint of Asian resources and users. This paper secondly proposes a model to serve information about valuable resources published in multiple Asian languages, and then shows the metadata schema and a few software tools developed for IPL-Asia The name of IPL is borrowed from Internet Public Library based at University of Michigan, since it is, in part, a collaborative activity with the IPL in Michigan. The metadata schema is defined based both on Dublin Core and IEEE LOM and adapted for parallel description in the four languages, i. e. , Chinese, Japanese, Korean and English. The software tools provide functions to support collaboration among people engaged in development of metadata database and metadata editing. These tools have been developed based on the XML technologies.

  • PDF

A Study on the Efficient Utilization of Spatial Data for Heat Mapping with Remote Sensing and Simulation (원격탐사 및 시뮬레이션의 열지도 구축을 위한 공간정보 활용 효율화 연구)

  • Cho, Young-Il;Yoon, Donghyeon;Lim, Youngshin;Lee, Moung-Jin
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.6_1
    • /
    • pp.1421-1434
    • /
    • 2020
  • The frequency and intensity of heatwaves have been increasing due to climate change. Since urban areas are more severely damaged by heatwaves as they act in combination with the urban heat island phenomenon, every possible preparation for such heat threats is required. Many overseas local governments build heat maps using a variety of spatial information to prepare for and counteract heatwaves, and prepare heatwave measures suitable for each region with different spatial characteristics within a relevant city. Building a heat map is a first and important step to prepare for heatwaves. The cases of heat map construction and thermal environment analysis involve various area distributions from urban units with a large area to local units with a small area. The method of constructing a heat map varies from a method utilizing remote sensing to a method using simulation, but there is no standard for using differentiated spatial information according to spatial scale, so each researcher constructs a heat map and analyzes the thermal environment based on different methods. For the above reason, spatial information standards required for building a heat map according to the analysis scale should be established. To this end, this study examined spatial information, analysis methodology, and final findings related to Korean and oversea analysis studies of heatwaves and urban thermal environments to suggest ways to improve the utilization efficiency of spatial information used to build urban heat maps. As a result of the analysis, it was found that spatial, temporal, and spectral resolutions, as basic resolutions, are necessary to construct a heat map using remote sensing in the use of spatial information. In the use of simulations, it was found that the type of weather data and spatial resolution, which are input condition information for simulation implementation, differ according to the size of analysis target areas. Therefore, when constructing a heat map using remote sensing, spatial, spectral, and temporal resolution should be considered; and in the case of using simulations, the spatial resolution, which is an input condition for simulation implementation, and the conditions of weather information to be inputted, should be considered in advance. As a result of understanding the types of monitoring elements for heatwave analysis, 19 types of elements were identified such as land cover, urban spatial characteristics, buildings, topography, vegetation, and shadows, and it was found that there are differences in the types of the elements by spatial scale. This study is expected to help give direction to relevant studies in terms of the use of spatial information suitable for the size of target areas, and setting monitoring elements, when analyzing heatwaves.

eXtensible Rule Markup Language (XRML): Design Principles and Application (확장형 규칙 표식 언어(eXtensible Rule Markup Language) : 설계 원리 및 응용)

  • 이재규;손미애;강주영
    • Journal of Intelligence and Information Systems
    • /
    • v.8 no.1
    • /
    • pp.141-157
    • /
    • 2002
  • extensible Markup Language (XML) is a new markup language for data exchange on the Internet. In this paper, we propose a language extensible Rule Markup Language (XRML) which is an extension of XML. The implicit rules embedded in the Web pages should be identifiable, interchangeable with structured rule format, and finally accessible by various applications. It is possible to realize by using XRML. In this light, Web based Knowledge Management Systems (KMS) can be integrated with rule-based expert systems. To meet this end, we propose the six design criteria: Expressional Completeness, Relevance Linkability, Polymorphous Consistency, Applicative Universality, Knowledge Integrability and Interoperability. Furthermore, we propose three components such as RIML (Rule Identification Markup Language), RSML (Rule Structure Markup Language) and RTML (Rule Triggering Markup Language), and the Document Type Definition DTD). We have designed the XRML version 0.5 as illustrated above, and developed its prototype named Form/XRML which is an automated form processing for disbursement of the research fund in the Korea Advanced Institute of Science and Technology (KAISI). Since XRML allows both human and software agent to use the rules, there is huge application potential. We expect that XRML can contribute to the progress of Semantic Web platforms making knowledge management and e-commerce more intelligent. Since there are many emerging research groups and vendors who investigate this issue, it will not take long to see XRML commercial products. Matured XRML applications may change the way of designing information and knowledge systems in the near future.

  • PDF

Inter-EPS mobility scheme for wireless In-band backhaul in a distributed network environment (분산 네트워크 환경에서 무선 In-band backhaul을 통한 이동성 지원 방안)

  • Choi, Hong-cheol;Koo, Hyung-Il;Kim, Ki-Hun;Kim, Jae-Woo;Han, Chul-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2261-2269
    • /
    • 2017
  • The current LTE network system provides service by locally allocating eNodeB to the EPC(Evolved Packet Core). However, it is not suitable for inter-node communication based on the distributed network environment. In this paper, we propose an integrated system by configuring E-UTRAN and EPC as All-In-One type to enable service in each distributed node. M2M UE is mounted on a each node for wireless In-band backhaul link. The integrated node provides inter-node communication over the wireless in-band backhaul link. If a normal UE moves and an access node changes in the system all entities of LTE integrated into one, it is necessary to change the P-GW which is IP anchor. In order to support the inter-node mobility even if P-GW is changed, We defined UPFE(User Packet Forwarding Extension) scheme and implemented the handover procedure of EPC. Also, we analyze the cell range of the integrated LTE system with the addition of the node and compare the handover delay with the current system.

Research on the Strategy to build the Tourism Brand Image for the Inducement of Foreign Tourist in Chungnam (외국인 관광객 유치를 위한 충남관광 브랜드이미지 구축에 관한 연구)

  • You, Ho-Jong
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.121-145
    • /
    • 2012
  • This research was performed to review the marketing PR(MPR) strategy to build the brand image of Chungnam tourism for the inducement of foreign tourist. Because each local governments are looking for the industries of new growth power from the tourism industry recently, we applied the BI strategy of Chungnam tourism with expended BLC model and GRID model after we analyzed the variety of PR situation and tasks to build the Chungnam tourism's brand image in the competitive domestic and foreign tourism industry. In the result of the study, we set up the limited brand image of Chungnam tourism newly; also we derived a specific action plan. First of all, they need every possible means for Brand Awareness PR, Issue PR, Brand Loyalty PR, etc. depend on brand life cycle with the Chungnam's tourism service products. Secondly, for the each tourism service products, it is requiring to repositioning from present position (B, C, D area) to A area by MPR strategy. Finally, many additional MPR strategies should put in to support for building the brand image for the 'Tourism Chungnam'. The strategic SNS public relations are required with considerations of items that are necessarily need to have the reasons and circumstances for the new foreign tourists, so they can have experiences for the Chungnam Tourism. For the existing foreign tourists, we should keep to build relationship in order to give them trusts and to feel sympathy.

  • PDF

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.

A Study on the ITSM and CSC working together for effective business process (효과적인 업무프로세스 증대를 위한 ITSM과 CSC 연동에 관한 연구)

  • Choi Byung-Hoon;Kim Sang-Geun
    • The KIPS Transactions:PartD
    • /
    • v.13D no.3 s.106
    • /
    • pp.405-414
    • /
    • 2006
  • These days, business environments are rapidly change and companies are taking the pressure about a customer value enhance to the continuance from the market. Therefore companies propel various innovative and strategic initiatives for a customer value enhancement. Also Information Technology is rapidly becoming part of our everyday lives due to its fast development, the functions and responsibilities of CSC(Consolidated Service Center) are undergoing revolutionary change. The function of sales organization based on the manpower and human networks are gradually shrinking, and CSC is slowly establishing itself as the company's core parts as its function expands and its operations are in the spotlights. Among these, many organizations are currently introducing ITSM concept for primary processes as a means of achieving synergy in operational excellence, reducing costs and improving service quality. In this thesis, we propose an extended CSC, which is applied ITIL Process to traditional BMP. It also needs to manage more effectively business process model, to modeling rapidly changing business process, and to developing its business application programs whenever and whatever it is changed. The ITSM(IT Service Management), which is an ITIL tool, effectively managing for dynamically changing the business process.

A Possibility Analysis of Domestic Terrorism in South Korea by Focusing on Afghanistan under the Taliban Forces (탈레반의 아프가니스탄 장악에 따른 국내 테러 발생 가능성 분석)

  • Oh, Hangil;Ahn, Kyewon;Bae, Byunggul
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.848-863
    • /
    • 2021
  • Purpose: On August 16, 2021, the Taliban established the Taliban regime after conquering capital Kabul of the Afghan by using the strong alliance of international terrorist organizations. The Taliban carried out terrorism targeting the Korean people, including the kidnapping of Kim Seon-il in 2004, the abduction of a member of the Saemmul Church in 2007, and the attack on Korean Provincial Reconstruction Team in 2009. Therefore, this research has shown the possibility of Taliban terrorism in Korea. Method: Based on the statistical data on terrorism that occurred in Afghanistan, Taliban's various terrorist activities such as tactics, strategies, and weapons are examined. Consequently, the target facilities and the type of terrorist attacks are analyzed. Result: The Taliban are targeting the Afghan government as their main target of attack, and IS and the Taliban differ in their selection of targets for terrorism. Conclusion: From the result of this research, we recommend Korea need to reinforce the counter terrorism system in soft targets. Because If the Taliban, which has seized control of Afghanistan, and IS, which has established a worldwide terrorism network, cooperate to threaten domestic multi-use facilities with bombing, the Republic of Korea may face a terrorist crisis with insufficient resources and counter-terrorism related countermeasures.

A Study on Improving Performance of Software Requirements Classification Models by Handling Imbalanced Data (불균형 데이터 처리를 통한 소프트웨어 요구사항 분류 모델의 성능 개선에 관한 연구)

  • Jong-Woo Choi;Young-Jun Lee;Chae-Gyun Lim;Ho-Jin Choi
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.7
    • /
    • pp.295-302
    • /
    • 2023
  • Software requirements written in natural language may have different meanings from the stakeholders' viewpoint. When designing an architecture based on quality attributes, it is necessary to accurately classify quality attribute requirements because the efficient design is possible only when appropriate architectural tactics for each quality attribute are selected. As a result, although many natural language processing models have been studied for the classification of requirements, which is a high-cost task, few topics improve classification performance with the imbalanced quality attribute datasets. In this study, we first show that the classification model can automatically classify the Korean requirement dataset through experiments. Based on these results, we explain that data augmentation through EDA(Easy Data Augmentation) techniques and undersampling strategies can improve the imbalance of quality attribute datasets, and show that they are effective in classifying requirements. The results improved by 5.24%p on F1-score, indicating that handling imbalanced data helps classify Korean requirements of classification models. Furthermore, detailed experiments of EDA illustrate operations that help improve classification performance.