• 제목/요약/키워드: 평가사례

Search Result 5,925, Processing Time 0.038 seconds

Review of Erosion and Piping in Compacted Bentonite Buffers Considering Buffer-Rock Interactions and Deduction of Influencing Factors (완충재-근계암반 상호작용을 고려한 압축 벤토나이트 완충재 침식 및 파이핑 연구 현황 및 주요 영향인자 도출)

  • Hong, Chang-Ho;Kim, Ji-Won;Kim, Jin-Seop;Lee, Changsoo
    • Tunnel and Underground Space
    • /
    • v.32 no.1
    • /
    • pp.30-58
    • /
    • 2022
  • The deep geological repository for high-level radioactive waste disposal is a multi barrier system comprised of engineered barriers and a natural barrier. The long-term integrity of the deep geological repository is affected by the coupled interactions between the individual barrier components. Erosion and piping phenomena in the compacted bentonite buffer due to buffer-rock interactions results in the removal of bentonite particles via groundwater flow and can negatively impact the integrity and performance of the buffer. Rapid groundwater inflow at the early stages of disposal can lead to piping in the bentonite buffer due to the buildup of pore water pressure. The physiochemical processes between the bentonite buffer and groundwater lead to bentonite swelling and gelation, resulting in bentonite erosion from the buffer surface. Hence, the evaluation of erosion and piping occurrence and its effects on the integrity of the bentonite buffer is crucial in determining the long-term integrity of the deep geological repository. Previous studies on bentonite erosion and piping failed to consider the complex coupled thermo-hydro-mechanical-chemical behavior of bentonite-groundwater interactions and lacked a comprehensive model that can consider the complex phenomena observed from the experimental tests. In this technical note, previous studies on the mechanisms, lab-scale experiments and numerical modeling of bentonite buffer erosion and piping are introduced, and the future expected challenges in the investigation of bentonite buffer erosion and piping are summarized.

A Study on Major Safety Problems and Improvement Measures of Personal Mobility (개인형 이동장치의 안전 주요 문제점 및 개선방안 연구)

  • Kang, Seung Shik;Kang, Seong Kyung
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.1
    • /
    • pp.202-217
    • /
    • 2022
  • Purpose: The recent increased use of Personal Mobility (PM) has been accompanied by a rise in the annual number of accidents. Accordingly, the safety requirements for PM use are being strengthened, but the laws/systems, infrastructure, and management systems remain insufficient for fostering a safe environment. Therefore, this study comprehensively searches the main problems and improvement methods through a review of previous studies that are related to PM. Then the priorities according to the importance of the improvement methods are presented through the Delphi survey. Method: The research method is mainly composed of a literature study and an expert survey (Delphi survey). Prior research and improvement cases (local governments, government departments, companies, etc.) are reviewed to derive problems and improvements, and a problem/improvement classification table is created based on keywords. Based on the classification contents, an expert survey is conducted to derive a priority improvement plan. Result: The PM-related problems were in 'non-compliance with traffic laws, lack of knowledge, inexperienced operation, and lack of safety awareness' in relation to human factors, and 'device characteristics, road-drivable space, road facilities, parking facilities' in relation to physical factors. 'Management/supervision, product management, user management, education/training' as administrative factors and legal factors are divided into 'absence/sufficiency of law, confusion/duplication, reduced effectiveness'. Improvement tasks related to this include 'PM education/public relations, parking/return, road improvement, PM registration/management, insurance, safety standards, traffic standards, PM device safety, PM supplementary facilities, enforcement/management, dedicated organization, service providers, management system, and related laws/institutional improvement', and 42 detailed tasks are derived for these 14 core tasks. The results for the importance evaluation of detailed tasks show that the tasks with a high overall average for the evaluation items of cost, time, effect, urgency, and feasibility were 'strengthening crackdown/instruction activities, education publicity/campaign, truancy PM management, and clarification of traffic rules'. Conclusion: The PM market is experiencing gradual growth based on shared services and a safe environment for PM use must be ensured along with industrial revitalization. In this respect, this study seeks out the major problems and improvement plans related to PM from a comprehensive point of view and prioritizes the necessary improvement measures. Therefore, it can serve as a basis of data for future policy establishment. In the future, in-depth data supplementation will be required for each key improvement area for practical policy application.

The Private-Initiated Park Development Project in Terms of Securing Publicity Operation Characteristics Analysis - Busan Metropolitan City as a Case - (공공성 확보측면에서 민간공원특례사업 운영특성분석 - "부산광역시를 사례로" -)

  • Gweon, Young-Dal;Park, Hyun-Bin;Kim, Dong-Pil
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.51 no.1
    • /
    • pp.13-28
    • /
    • 2023
  • This study examines the process of project promotion in Busan, which introduced the private participation-type consultative body for the first time in the country in the promotion stage of the private-initiated park development project, and introduced flexible application of the system and differentiated policy elements in the implementation process, and examines the operational characteristics and we tried to analyze performance, etc. As a result of the analysis, first, the preferred bidder was selected by introducing a mixed method in the project method, which is an independent project method that cannot be seen in other local governments. Second, by specifying guidelines considering the characteristics of each park and detailed guidelines such as the location, area, and maximum height of non-park facilities, criteria for establishing a rational development plan utilizing regional identity and the basis of evaluation standards were laid. Third, in the project process, transparency was secured through the delegation-type roundtable, in which the private sector performs the functions and roles of key actors, thereby preventing disputes such as suspicion of preferential treatment. Fourth, in order to improve the quality of park facilities to be donated and to secure design adequacy, after approval of the implementation plan, a general planner was introduced and construction project management (design stage) services were performed to promote efficient implementation and specialization of luxury parks in the region. As a result, the city of Busan carried out the project efficiently by conserving 5 parks from sunset, a park area of 2.25km2, and reducing land compensation and park construction costs by KRW 740 billion. Reinforcement of the public nature of the private-initiated park development project was suggested. However, due to the application of these systems and verification procedures, the project period is prolonged, and park services are delayed along with the financial burden on private operators.

A Study on the Adaptation Process of North Korean Immigrant Youth Discontinuing Formal Education (학업중단 북한이탈 청소년의 적응과정에 관한 질적연구)

  • Yang, Young Eun;Bae, Imho
    • Korean Journal of Social Welfare Studies
    • /
    • v.41 no.4
    • /
    • pp.189-224
    • /
    • 2010
  • Nowadays Korean society has a fast growing population of North Korean immigrant youth. Especially, North Korean immigrant youth, who are discontinuing formal education, experience difficulties in social exclusion and adaptation. Therefore, the purpose of this study was to understand the experiences of adaptation and social support of North Korean immigrant youth discontinuing formal education, and to seek affirmative supporting plans and solutions for their adaptation. The methodology utilized for this study was a case study research. On the basis of the results and categorization, 'a network between overall categories and of early adaptation' was derived. The major findings of this study are summarized as follows. First, the participants of this study experienced major difficulties during 'economical adaptation', and their economical adaptation was strongly interrelated with their 'educational adaptation'. The discontinuing of their education resulting from their fleeing period caused 'academic differential and age disparity.' Thus they could not enroll in the formal education system, and their insufficient educational background resulted in low wages and overwork due to manual labor jobs. Second, participants recognized 'interpersonal relations' as the most essential factor in adaptation, and 'social support' from the interpersonal relations played an important role in adaptation to and comfort in Korean society. 'Interactions with South Koreans' was recognized as a significant resource for gaining informational and appraisal support, but was not activated satisfactorily. On the other hand, interaction with North Korean immigrants was avoided by the reason that 'there's nothing to learn', however emotional support from North Korean immigrants of close relationship played an important role in participants' adaptation, especially in all aspects of psychological adaptation. Third, participants experienced a lot of difficulties and stresses in their 'physical health and psychological adaptation'. Their chronic diseases worsened by remaining untreated, and female perceived symptoms were observed more often than in male. Meanwhile, excessive 'stresses' from the unfamiliar environment of South Korea negatively affected their psychological adaptation. However, they were satisfied with sense of liberty and security from living in a democratic society.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.

Implementation Strategy for the Elderly Care Solution Based on Usage Log Analysis: Focusing on the Case of Hyodol Product (사용자 로그 분석에 기반한 노인 돌봄 솔루션 구축 전략: 효돌 제품의 사례를 중심으로)

  • Lee, Junsik;Yoo, In-Jin;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.117-140
    • /
    • 2019
  • As the aging phenomenon accelerates and various social problems related to the elderly of the vulnerable are raised, the need for effective elderly care solutions to protect the health and safety of the elderly generation is growing. Recently, more and more people are using Smart Toys equipped with ICT technology for care for elderly. In particular, log data collected through smart toys is highly valuable to be used as a quantitative and objective indicator in areas such as policy-making and service planning. However, research related to smart toys is limited, such as the development of smart toys and the validation of smart toy effectiveness. In other words, there is a dearth of research to derive insights based on log data collected through smart toys and to use them for decision making. This study will analyze log data collected from smart toy and derive effective insights to improve the quality of life for elderly users. Specifically, the user profiling-based analysis and elicitation of a change in quality of life mechanism based on behavior were performed. First, in the user profiling analysis, two important dimensions of classifying the type of elderly group from five factors of elderly user's living management were derived: 'Routine Activities' and 'Work-out Activities'. Based on the dimensions derived, a hierarchical cluster analysis and K-Means clustering were performed to classify the entire elderly user into three groups. Through a profiling analysis, the demographic characteristics of each group of elderlies and the behavior of using smart toy were identified. Second, stepwise regression was performed in eliciting the mechanism of change in quality of life. The effects of interaction, content usage, and indoor activity have been identified on the improvement of depression and lifestyle for the elderly. In addition, it identified the role of user performance evaluation and satisfaction with smart toy as a parameter that mediated the relationship between usage behavior and quality of life change. Specific mechanisms are as follows. First, the interaction between smart toy and elderly was found to have an effect of improving the depression by mediating attitudes to smart toy. The 'Satisfaction toward Smart Toy,' a variable that affects the improvement of the elderly's depression, changes how users evaluate smart toy performance. At this time, it has been identified that it is the interaction with smart toy that has a positive effect on smart toy These results can be interpreted as an elderly with a desire to meet emotional stability interact actively with smart toy, and a positive assessment of smart toy, greatly appreciating the effectiveness of smart toy. Second, the content usage has been confirmed to have a direct effect on improving lifestyle without going through other variables. Elderly who use a lot of the content provided by smart toy have improved their lifestyle. However, this effect has occurred regardless of the attitude the user has toward smart toy. Third, log data show that a high degree of indoor activity improves both the lifestyle and depression of the elderly. The more indoor activity, the better the lifestyle of the elderly, and these effects occur regardless of the user's attitude toward smart toy. In addition, elderly with a high degree of indoor activity are satisfied with smart toys, which cause improvement in the elderly's depression. However, it can be interpreted that elderly who prefer outdoor activities than indoor activities, or those who are less active due to health problems, are hard to satisfied with smart toys, and are not able to get the effects of improving depression. In summary, based on the activities of the elderly, three groups of elderly were identified and the important characteristics of each type were identified. In addition, this study sought to identify the mechanism by which the behavior of the elderly on smart toy affects the lives of the actual elderly, and to derive user needs and insights.

Historical Studies on the Characteristics of Buyongjeong in the Rear Garden of Changdeok Palace (창덕궁 후원 부용정(芙蓉亭)의 조영사적 특성)

  • Song, Suk-ho;Sim, Woo-kyung
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.34 no.1
    • /
    • pp.40-52
    • /
    • 2016
  • Buyongjeong, a pavilion in the Rear Garden of Changdeok Palace, was appointed as Treasure No. 1763 on March 2, 2012, by the South Korea government since it shows significant symmetry and proportion on its unique planar shape, spatial configuration, building decoration, and so forth. However, the designation of Treasure selection was mainly evaluated by concrete science, in that the selection has not clearly articulated how and why Buoungjeong was constructed as a present unique form. Therefore, this study aims to clarify the identity of Buyongjeong at the time of construction by considering its historical, ideological, philosophical background and building intention. Summary are as follows: First, Construction backgrounds and characters of Buyongjeong: Right after the enthronement, King Jeongjo had founded Kyujanggak(奎章閣), and sponsored civil ministers who were elected by the national examination, as a part of political reform. In addition, he established his own political system by respecting "Kaksin(閣臣)", Kyujanggak's officials as much as "Kain(家人)", internal family members. King Jeongjo's aggressive political reform finally enabled King's lieges to visit King's Rear Garden. In the reign of King Jeongjo's 16th year(1792), Naekaksangjohoe(內閣賞釣會) based on "Kaksin" was officially launched and the Rear Garden visitation became a regular meeting. The Rear Garden visitation consisted of "Sanghwajoeoyeon(賞花釣魚宴)" - enjoying flowers and fishing, and activities of "Nanjeongsugye". Afterward, it eventually became a huge national event since high rank government officials participated the event. King Jeongjo shared the cultural activities with government officials together to Buyongjeong as a place to fulfill his royal politics. Second, The geographical location and spatial characteristics of Buyongjeong: On the enthronement of King Jeongjo(1776), he renovated Taeksujae. Above all, aligning and linking Gaeyuwa - Taeksujae - a cicular island - Eosumun - Kyujangkak along with the construction axis is an evidence for King Jeongjo to determine how the current Kyujangkak zone was prepared and designed to fulfill King Jeonjo's political ideals. In 17th year(1793) of the reign of King Jeongjo, Taeksujae, originally a square shaped pavilion, was modified and expanded with ranks to provide a place to get along with the King and officials. The northern part of Buyongjeong, placed on pond, was designed for the King's place and constructed one rank higher than others. Discernment on windows and doors were made with "Ajasal" - a special pattern for the King. The western and eastern parts were for government officials. The center part was prepared for a place where government officials were granted an audience with the King, who was located in the nortern part of Buyongjeong. Government officials from the western and eastern parts of Buyongjeong, could enter the central part of the Buyongjeong from the southern part by detouring the corner of Buyongjeong. After all, Buyongjeong is a specially designed garden building, which was constructed to be a royal palace utilizing its minimal space. Third, Cultural Values of Buyongjeong: The Buyongjeong area exhibits a trait that it had been continuously developed and it had reflected complex King's private garden cultures from King Sejo, Injo, Hyunjong, Sukjong, Jeongjo and so forth. In particular, King Jeongjo had succeded physical, social and imaginary environments established by former kings and invited their government officials for his royal politics. As a central place for his royal politics, King Jeongjo completed Buyongjeong. Therefore, the value of Buyongjeong, as a garden building reflecting permanency of the Joseon Dynasty, can be highly evaluated. In addition, as it reflects Confucianism in the pavilion - represented by distinguishing hierarchical ranks, it is a unique example to exhibit its distinctiveness in a royal garden.

Developmental Plans and Research on Private Security in Korea (한국 민간경비 실태 및 발전방안)

  • Kim, Tea-Hwan;Park, Ok-Cheol
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.69-98
    • /
    • 2005
  • The security industry for civilians (Private Security), was first introduced to Korea via the US army's security system in the early 1960's. Shortly after then, official police laws were enforced in 1973, and private security finally started to develop with the passing of the 'service security industry' law in 1976. Korea's Private Security industry grew rapidly in the 1980's with the support of foreign funds and products, and now there are thought to be approximately 2000 private security enterprises currently running in Korea. However, nowadays the majority of these enterprises are experiencing difficulties such as lack of funds, insufficient management, and lack of control over employees, as a result, it seems difficult for some enterprises to avoid the low production output and bankruptcy. As a result of this these enterprises often settle these matters illegally, such as excessive dumping or avoiding problems by hiring inappropriate employees who don't have the right skills or qualifications for the jobs. The main problem with the establishment of this kind of security service is that it is so easy to make inroads into this private service market. All these hindering factors inhibit the market growth and impede qualitative development. Based on these main reasons, I researched this area, and will analyze and criticize the present condition of Korea's private security. I will present a possible development plan for the private security of Korea by referring to cases from the US and Japan. My method of researching was to investigate any related documentary records and articles and to interview people for necessary evidence. The theoretical study, involves investigation books and dissertations which are published from inside and outside of the country, and studying the complete collection of laws and regulations, internet data, various study reports, and the documentary records and the statistical data of many institutions such as the National Police Office, judicial training institute, and the enterprises of private security. Also, in addition, the contents of professionals who are in charge of practical affairs on the spot in order to overcomes the critical points of documentary records when investigating dissertation. I tried to get a firm grasp of the problems and difficulties which people in these work enterprises experience, this I thought would be most effective by interviewing the workers, for example: how they feel in the work places and what are the elements which inpede development? And I also interviewed policemen who are in charge of supervising the private escort enterprises, in an effort to figure out the problems and differences in opinion between domestic private security service and the police. From this investigation and research I will try to pin point the major problems of the private security and present a developmental plan. Firstly-Companies should unify the private police law and private security service law. Secondly-It is essential to introduce the 'specialty certificate' system for the quality improvement of private security service. Thirdly-must open up a new private security market by improving old system. Fourth-must build up the competitive power of the security service enterprises which is based on an efficient management. Fifth-needs special marketing strategy to hold customers Sixth-needs positive research based on theoretical studies. Seventh-needs the consistent and even training according to effective market demand. Eighth-Must maintain interrelationship with the police department. Ninth-must reinforce the system of Korean private security service association. Tenth-must establish private security laboratory. Based on these suggestions there should be improvement of private security service.

  • PDF

Evaluating Reverse Logistics Networks with Centralized Centers : Hybrid Genetic Algorithm Approach (집중형센터를 가진 역물류네트워크 평가 : 혼합형 유전알고리즘 접근법)

  • Yun, YoungSu
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.55-79
    • /
    • 2013
  • In this paper, we propose a hybrid genetic algorithm (HGA) approach to effectively solve the reverse logistics network with centralized centers (RLNCC). For the proposed HGA approach, genetic algorithm (GA) is used as a main algorithm. For implementing GA, a new bit-string representation scheme using 0 and 1 values is suggested, which can easily make initial population of GA. As genetic operators, the elitist strategy in enlarged sampling space developed by Gen and Chang (1997), a new two-point crossover operator, and a new random mutation operator are used for selection, crossover and mutation, respectively. For hybrid concept of GA, an iterative hill climbing method (IHCM) developed by Michalewicz (1994) is inserted into HGA search loop. The IHCM is one of local search techniques and precisely explores the space converged by GA search. The RLNCC is composed of collection centers, remanufacturing centers, redistribution centers, and secondary markets in reverse logistics networks. Of the centers and secondary markets, only one collection center, remanufacturing center, redistribution center, and secondary market should be opened in reverse logistics networks. Some assumptions are considered for effectively implementing the RLNCC The RLNCC is represented by a mixed integer programming (MIP) model using indexes, parameters and decision variables. The objective function of the MIP model is to minimize the total cost which is consisted of transportation cost, fixed cost, and handling cost. The transportation cost is obtained by transporting the returned products between each centers and secondary markets. The fixed cost is calculated by opening or closing decision at each center and secondary markets. That is, if there are three collection centers (the opening costs of collection center 1 2, and 3 are 10.5, 12.1, 8.9, respectively), and the collection center 1 is opened and the remainders are all closed, then the fixed cost is 10.5. The handling cost means the cost of treating the products returned from customers at each center and secondary markets which are opened at each RLNCC stage. The RLNCC is solved by the proposed HGA approach. In numerical experiment, the proposed HGA and a conventional competing approach is compared with each other using various measures of performance. For the conventional competing approach, the GA approach by Yun (2013) is used. The GA approach has not any local search technique such as the IHCM proposed the HGA approach. As measures of performance, CPU time, optimal solution, and optimal setting are used. Two types of the RLNCC with different numbers of customers, collection centers, remanufacturing centers, redistribution centers and secondary markets are presented for comparing the performances of the HGA and GA approaches. The MIP models using the two types of the RLNCC are programmed by Visual Basic Version 6.0, and the computer implementing environment is the IBM compatible PC with 3.06Ghz CPU speed and 1GB RAM on Windows XP. The parameters used in the HGA and GA approaches are that the total number of generations is 10,000, population size 20, crossover rate 0.5, mutation rate 0.1, and the search range for the IHCM is 2.0. Total 20 iterations are made for eliminating the randomness of the searches of the HGA and GA approaches. With performance comparisons, network representations by opening/closing decision, and convergence processes using two types of the RLNCCs, the experimental result shows that the HGA has significantly better performance in terms of the optimal solution than the GA, though the GA is slightly quicker than the HGA in terms of the CPU time. Finally, it has been proved that the proposed HGA approach is more efficient than conventional GA approach in two types of the RLNCC since the former has a GA search process as well as a local search process for additional search scheme, while the latter has a GA search process alone. For a future study, much more large-sized RLNCCs will be tested for robustness of our approach.

The Prediction of Export Credit Guarantee Accident using Machine Learning (기계학습을 이용한 수출신용보증 사고예측)

  • Cho, Jaeyoung;Joo, Jihwan;Han, Ingoo
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.83-102
    • /
    • 2021
  • The government recently announced various policies for developing big-data and artificial intelligence fields to provide a great opportunity to the public with respect to disclosure of high-quality data within public institutions. KSURE(Korea Trade Insurance Corporation) is a major public institution for financial policy in Korea, and thus the company is strongly committed to backing export companies with various systems. Nevertheless, there are still fewer cases of realized business model based on big-data analyses. In this situation, this paper aims to develop a new business model which can be applied to an ex-ante prediction for the likelihood of the insurance accident of credit guarantee. We utilize internal data from KSURE which supports export companies in Korea and apply machine learning models. Then, we conduct performance comparison among the predictive models including Logistic Regression, Random Forest, XGBoost, LightGBM, and DNN(Deep Neural Network). For decades, many researchers have tried to find better models which can help to predict bankruptcy since the ex-ante prediction is crucial for corporate managers, investors, creditors, and other stakeholders. The development of the prediction for financial distress or bankruptcy was originated from Smith(1930), Fitzpatrick(1932), or Merwin(1942). One of the most famous models is the Altman's Z-score model(Altman, 1968) which was based on the multiple discriminant analysis. This model is widely used in both research and practice by this time. The author suggests the score model that utilizes five key financial ratios to predict the probability of bankruptcy in the next two years. Ohlson(1980) introduces logit model to complement some limitations of previous models. Furthermore, Elmer and Borowski(1988) develop and examine a rule-based, automated system which conducts the financial analysis of savings and loans. Since the 1980s, researchers in Korea have started to examine analyses on the prediction of financial distress or bankruptcy. Kim(1987) analyzes financial ratios and develops the prediction model. Also, Han et al.(1995, 1996, 1997, 2003, 2005, 2006) construct the prediction model using various techniques including artificial neural network. Yang(1996) introduces multiple discriminant analysis and logit model. Besides, Kim and Kim(2001) utilize artificial neural network techniques for ex-ante prediction of insolvent enterprises. After that, many scholars have been trying to predict financial distress or bankruptcy more precisely based on diverse models such as Random Forest or SVM. One major distinction of our research from the previous research is that we focus on examining the predicted probability of default for each sample case, not only on investigating the classification accuracy of each model for the entire sample. Most predictive models in this paper show that the level of the accuracy of classification is about 70% based on the entire sample. To be specific, LightGBM model shows the highest accuracy of 71.1% and Logit model indicates the lowest accuracy of 69%. However, we confirm that there are open to multiple interpretations. In the context of the business, we have to put more emphasis on efforts to minimize type 2 error which causes more harmful operating losses for the guaranty company. Thus, we also compare the classification accuracy by splitting predicted probability of the default into ten equal intervals. When we examine the classification accuracy for each interval, Logit model has the highest accuracy of 100% for 0~10% of the predicted probability of the default, however, Logit model has a relatively lower accuracy of 61.5% for 90~100% of the predicted probability of the default. On the other hand, Random Forest, XGBoost, LightGBM, and DNN indicate more desirable results since they indicate a higher level of accuracy for both 0~10% and 90~100% of the predicted probability of the default but have a lower level of accuracy around 50% of the predicted probability of the default. When it comes to the distribution of samples for each predicted probability of the default, both LightGBM and XGBoost models have a relatively large number of samples for both 0~10% and 90~100% of the predicted probability of the default. Although Random Forest model has an advantage with regard to the perspective of classification accuracy with small number of cases, LightGBM or XGBoost could become a more desirable model since they classify large number of cases into the two extreme intervals of the predicted probability of the default, even allowing for their relatively low classification accuracy. Considering the importance of type 2 error and total prediction accuracy, XGBoost and DNN show superior performance. Next, Random Forest and LightGBM show good results, but logistic regression shows the worst performance. However, each predictive model has a comparative advantage in terms of various evaluation standards. For instance, Random Forest model shows almost 100% accuracy for samples which are expected to have a high level of the probability of default. Collectively, we can construct more comprehensive ensemble models which contain multiple classification machine learning models and conduct majority voting for maximizing its overall performance.