• Title/Summary/Keyword: 패턴 지도 방안

Search Result 375, Processing Time 0.026 seconds

An Analysis of the Spatial Structure Changes according to the Reorganization of Metropolitan City Using Population Potential : Focused on Busan Metropolitan City (인구잠재력을 이용한 광역도시 개편에 따른 공간구조변화 분석 : 부산광역시를 중심으로)

  • KIM, Ho-Yong;BAE, Eun-Sol
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.23 no.2
    • /
    • pp.83-94
    • /
    • 2020
  • Busan Metropolitan City, a research site of this study, was promoted to a metropolitan city in 1995 with the implementation of the local autonomy system, and the overall change was made as it absorbed the surrounding areas to address the shortage of population and space. Twenty-five years after the introduction of the local autonomy system, it is necessary to diagnose whether balanced development of the entire city is being made in accordance with the reorganization of the metropolitan city in terms of spatial structure. In this study, changes in spatial structure and regional characteristics were analyzed by applying population potential, which means potential for future spatial interaction, in time and space. According to the analysis, the development was taking place around the center area and the sub-center established by the urban master plan, but Gangseo-gu and Gijang-gun, which were incorporated in the past, remained stagnant. In addition, it was shown that the spatial expansion of the city was suppressed by the green belt surrounding the city. However, in other regions where the green belt is located, the city has been expanded, which is different from Gijang-gun or Gangseo-gu, which was incorporated into the metropolitan city. Therefore, the cause of the decline in incorporated areas should not be limited to the institutional dimension of land use regulation. Growth management and balanced development plans will be necessary for the development of declining old downtowns and underdeveloped incorporated areas.

Conjoint Analysis of the Korean Floriculture Market for the Main Cut Flowers to Predict the Demand for Floriculture Plants (Conjoint 분석을 통한 주요 절화류의 소비 예측 분석)

  • Lim, Jin Hee;Shim, Myung Syun;Seo, Ji Yeon;Baek, Yi Hwa
    • Horticultural Science & Technology
    • /
    • v.32 no.5
    • /
    • pp.721-729
    • /
    • 2014
  • This study was conducted to improve the consumption of floriculture plants by researching preferences of consumers for the main types of cut flowers. We analyzed the results of surveys, carried out by a company, that were largely about roses, chrysanthemums, and lilies. After departmentalizing consumers into groups and analyzing the results through conjoint and cluster analysis, we found that consumers showed a higher rate of use based on price and vase life than on flower color and flower shape in roses. The groups of rose consumers preferred a price of 1000 won, spray type flower shape, vase life of 7-8 days, and red flower color. In chrysanthemums, consumers showed higher rate of use for flower color than for vase life, flower shape, and price. The groups of chrysanthemum consumers preferred a price of 1000 won, standard flower shape, 16-20 days vase life, and yellow flower color. In lilies, consumers showed higher use rate for flower shape than vase life, price, and flower color. Lily consumers preferred a price of 2000 won, large flower shape, 4-7 days vase life, and yellow flower color. Thus, the major cut flowers (rose, chrysanthemum, and lily) all showed highest use rates in for vase life. These results highlight the importance of understanding the characteristics of consumer interests. They also emphasize that we should plan and create market-oriented and consumer-oriented products to improve the consumption of floriculture plants.

A Pedestrian Network Assignment Model Considering Space Syntax (공간구문론(Space Syntax)을 고려한 통합보행네트워크 통행배정모형)

  • Lee, Mee Young;Kim, Jong Hyung;Kim, Eun Jung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.14 no.6
    • /
    • pp.37-49
    • /
    • 2015
  • In Space Syntax, the greater the degree of integration between separate links, the greater the links' accessibility from the target network. As such, planning pedestrian walks so that links with high degrees of integration are connected, or else inducing high integration value land use are both valid options. The travel distribution model reflects how walking demand, or more specifically, the pedestrian, partakes in route choosing behavior that minimizes select criteria, notably level of discomfort, as measured using travel distance and time. The model thus demonstrates travel patterns associated with demand pertaining to minimization of discomfort experienced by the pedestrian. This research introduces a method that integrates Space Syntax and the pedestrian travel distribution model. The integrated model will determine whether regions with high degrees of integration are actually being used as pivots for pedestrian demand movement, as well as to explain whether the degree of integration is sustained at an appropriate level while considering actual movement demand. As a means to develop the integrated model, a method that combines display of the visibility of the space syntax network and road-divided links is proposed. The pedestrian travel distribution model also includes an alternative path finding mechanism between origin and destination, which allows for uniform allocation of demand.

Counter Measures by using Execution Plan Analysis against SQL Injection Attacks (실행계획 분석을 이용한 SQL Injection 공격 대응방안)

  • Ha, Man-Seok;Namgung, Jung-Il;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.2
    • /
    • pp.76-86
    • /
    • 2016
  • SQL Injection attacks are the most widely used and also they are considered one of the oldest traditional hacking techniques. SQL Injection attacks are getting quite complicated and they perform a high portion among web hacking. The big data environments in the future will be widely used resulting in many devices and sensors will be connected to the internet and the amount of data that flows among devices will be highly increased. The scale of damage caused by SQL Injection attacks would be even greater in the future. Besides, creating security solutions against SQL Injection attacks are high costs and time-consuming. In order to prevent SQL Injection attacks, we have to operate quickly and accurately according to this data analysis techniques. We utilized data analytics and machine learning techniques to defend against SQL Injection attacks and analyzed the execution plan of the SQL command input if there are abnormal patterns through checking the web log files. Herein, we propose a way to distinguish between normal and abnormal SQL commands. We have analyzed the value entered by the user in real time using the automated SQL Injection attacks tools. We have proved that it is possible to ensure an effective defense through analyzing the execution plan of the SQL command.

Optimal Server Allocation to Parallel Queueing Systems by Computer Simulation (컴퓨터 시뮬레이션을 이용한 병렬 대기행렬 시스템의 최적 서버 배치 방안)

  • Park, Jin-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.3
    • /
    • pp.37-44
    • /
    • 2015
  • A queueing system with 2 parallel workstations is common in the field. Typically, the workstations have different features in terms of the inter arrival times of customers and the service times for the customers. Computer simulation study on the optimal server allocation for parallel heterogeneous queueing systems with fixed number of identical servers is presented in this paper. The queueing system is optimized with respect to minimizing the weighted system time of the customers served by 2 parallel workstations. The system time formula for the M/M/c systems in Kendall's notation is known. Thus, we first compute the optimal allocation for parallel M/M/c systems, comparing the results with those from the computer simulation experiments, and have the same results. The CETI rule is devised through optimizing M/M/c cases, which allocates the servers based on Close or Equal Traffic Intensities between workstations. Traffic intensity is defined as the arrival rate divided by the service rate times the number of servers. The CETI rule is shown to work for M/G/c, G/M/c queueing systems by numerous computer simulation experiments, even if the rule cannot be proven analytically. However, the CETI rule is shown not to work for some of G/G/c systems.

A Theoretical Review on the Untact Marketing of the COVID-19 Period Hospitality Industry Services (코로나 시대 환대산업 서비스의 언택트 마케팅에 관한 고찰)

  • Kang, Hee-Seog;Lee, Youn-Oak
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.7
    • /
    • pp.161-173
    • /
    • 2020
  • In-depth interview in the field of hospitality industry services was conducted in COVID- 19. Introduction of kiosks for non-face-to-face services using untact technology, reservation, pay systems, self-service, service improvement using room service should be carried out. It is also necessary to implement Instagram, Facebook, YouTube, P-blogs, online broadcasting and live commerce through the establishment of m-channel system through untact marketing sales channels in the hospitality industry now that the product composition to solve the pro -blem of untact marketing is drawing attention due to diversification of online sales channe -ls. Now, the recognition of important elements of service education and a establishment of differentiated system of untact marketing, expansion of untact sale channel, implementation of non-face-to-face counseling service and introduction of pre-booking, telecommuting were recognized as urgent parts. In particular, a service differentiation and importance of human services, which were recognized free of charge, have re-recognized as premium, and quality service aspect of the hospitality industry in untact and the direction to diversify marketing channels are presented.

A Study on the Supply of First/Last Mile Transportation Methods Based on ABATA Travel Patterns Analysis for the Provision of MaaS (MaaS 제공을 위한 ABATA 통행 분석 기반의 First/Last Mile 이동 수단 공급 방안 연구)

  • Choi, Jaeon;Song, Jaein;Kang, Min Hee;Eom, Jinki;Hwang, Kee Yeon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.1
    • /
    • pp.159-181
    • /
    • 2022
  • Today, people in cities use differentthe types of transportation that rangepeople use in cities have diversified from existing public transportation, cars, taxis to shared bicycles and shared electric kickboards. In addition, with the development of mobile platform -based search, order, and payment services, and transportation services have also begun to change into platform-based integrated services. In particular, MaaS, which has emerged as an integrated mobile service and, is currently being studied and operated worldwide., However, MaaS but remains at the level of the integrated provision of the existing public transportation. As a result of Specifically, the results of a literature review on this issue reveal that, the First/Last Mile problem raised at the current level of MaaS is likely to be solved by establishing an improved policy incorporating new means of transportation. Therefore, this study aims to establish a First/Last Mile transportation supply plan for successful MaaS provision. This establishment is realized by analyzing the traffic patterns of urban populations usingbased on the ABATA system,, an activity-based traffic analysis model withevaluated as having higher analysis power on people's traffic.

An Effective Similarity Search Technique supporting Time Warping in Sequence Databases (시퀀스 데이타베이스에서 타임 워핑을 지원하는 효과적인 유살 검색 기법)

  • Kim, Sang-Wook;Park, Sang-Hyun
    • Journal of KIISE:Databases
    • /
    • v.28 no.4
    • /
    • pp.643-654
    • /
    • 2001
  • This paper discusses an effective processing of similarity search that supports time warping in large sequence database. Time warping enables finding sequences with similar patterns even when they are of different length, Previous methods fail to employ multi-dimensional indexes without false dismissal since the time warping distance does not satisfy the triangular inequality. They have to scan all the database, thus suffer from serious performance degradation in large database. Another method that hires the suffix tree also shows poor performance due to the large tree size. In this paper we propose a new novel method for similarity search that supports time warping Our primary goal is to innovate on search performance in large database without false dismissal. to attain this goal ,we devise a new distance function $D_{tw-Ib}$ consistently underestimates the time warping distance and also satisfies the triangular inequality, $D_{tw-Ib}$ uses a 4-tuple feature vector extracted from each sequence and is invariant to time warping, For efficient processing, we employ a distance function, We prove that our method does not incur false dismissal. To verify the superiority of our method, we perform extensive experiments . The results reveal that our method achieves significant speedup up to 43 times with real-world S&P 500 stock data and up to 720 times with very large synthetic data.

  • PDF

Vehicle Detection and Ship Stability Calculation using Image Processing Technique (영상처리기법을 활용한 차량 검출 및 선박복원성 계산)

  • Kim, Deug-Bong;Heo, Jun-Hyeog;Kim, Ga-Lam;Seo, Chang-Beom;Lee, Woo-Jun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.7
    • /
    • pp.1044-1050
    • /
    • 2021
  • After the occurrence of several passenger ship accidents in Korea, various systems are being developed for passenger ship safety management. A total of 162 passenger ships operate along the coast of Korea, of which 105 (65 %) are car-ferries with open vehicle decks. The car-ferry has a navigation pattern that passes through 2 to 4 islands. Safety inspections at the departure point(home port) are carried out by the crew, the operation supervisor of the operation management office, and the maritime safety supervisor. In some cases, self-inspections are carried out for safety inspections at layovers. As with any system, there are institutional and practical limitations. To this end, this study was conducted to suggest a method of detecting a vehicle using image processing and linking it to the calculations for ship stability. For vehicle detection, a method using a difference image and one using machine learning were used. However, a limitation was observed in these methods that the vehicle could not be identified due to strong background lighting from the pier and the ship in the cases where the camera was backlit such as during sunset or at night. It appears necessary to secure sufficient image data and upgrade the program for stable image processing.

Estimating Willingness to Switch to MVNO for Activation of Mobile Data Services (무선데이터서비스 활성화를 위한 MVNO 전환의사비용 추정)

  • Lee, Sang Woo;Ko, Chang Youl
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.1-11
    • /
    • 2015
  • This study uses the contingent valuation method to estimate the switching cost for adopting the MVNO service. The findings are as follows.: First, Willingness To Switch(WTS) increases as users' using pattern and perceived degree of MVNO service, but satisfaction with current service provider does not play a significant role in predicting Switching Cost. This means that as amount of money users can save exceeds a certain level, users decide to willingly change their service provider to MVNO regardless of their level of satisfaction with current service provider. Second, there are differences in WTS among service subscribers in SKT, KT and LGU+. It means that there will be a difference in the tendency to switch to MVNO among subscribers of service providers. This study suggest the following mangerial perspective to effectively promote the MVNO and boost the MVNO market for activation of mobile data services.: First, MVNOs are better off applying differentiated pricing scheme at attractive rates than using a differentiation of service product and quality. Second, regulators should consider how to implement an MVNO regulatory policy when there is an asymmetric customer loyalty among MNOs. This research will be used to set the MVNO's pricing strategy and to build up a successful regulatory policies.