• Title/Summary/Keyword: Collection-Analysis-Application system

Search Result 151, Processing Time 0.025 seconds

Dynamic ontology construction algorithm from Wikipedia and its application toward real-time nation image analysis (국가이미지 분석을 위한 위키피디아 실시간 동적 온톨로지 구축 알고리즘 및 적용)

  • Lee, Youngwhan
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.4
    • /
    • pp.979-991
    • /
    • 2016
  • Measuring nation images was a challenging task when employing offline surveys was the only option. It was not only prohibitively expensive, but too much time-consuming and therefore unfitted to this rapidly changing world. Although demands for monitoring real-time nation images were ever-increasing, an affordable and reliable solution to measure nation images has not been available up to this date. The researcher in this study developed a semi-automatic ontology construction algorithm, named "double-crossing double keyword collection (or DCDKC)" to measure nation images from Wikipedia in real-time. The ontology, WikiOnto, can be used to reflect dynamic image changes. In this study, an instance of WikiOnto was constructed by applying the algorithm to the big-three exporting countries in East Asia, Korea, Japan, and China. Then, the numbers of page views for words in the instance of WikiOnto were counted. A collection of the counting for each country was compared to each other to inspect the possibility to use for dynamic nation images. As for the conclusion, the result shows how the images of the three countries have changed for the period the study was performed. It confirms that DCDKC can very well be used for a real-time nation-image monitoring system.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

A Plan for Better Productivity of Sub-Contractors through Improvements of Daily Reporting Process (작업일보 작성프로세스 개선을 통한 협력업체 생산성 향상방안에 관한 연구)

  • Kim Bong-Nyoun;Kim Chang-Duk
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.375-378
    • /
    • 2002
  • Most construction works in a building site are progressed by many work categories and sub-contractors. Therefore there are many difficult things of management of construction-information because variable occurrences are happened to manpower and material resources. For this reason, various management systems are suggested, but the application of these systems are difficult because only construction company manages these systems and sub-contractor's participation, understanding and financial ability are insufficient. In addition to that, there are other problems such as lost information when it is carried, perversion and distrust of information by hand and lots of time and labor are necessary for collection, analysis, and management of information which are offered for daily report. so the purpose of this study is for improvement of reporting process with making an analysis of productivity effects and an analysis of function and problem of daily report. I intend to suggest the direction of improved daily report system for better productivity of construction work through input information and management of cooperation enterprises.

  • PDF

A study on the admission support process and educational satisfaction of college students at beauty contract department (미용전공 계약학과 대학생의 입학지원과정과 교육만족도 연구)

  • Hong, Soo Nam
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.20 no.4
    • /
    • pp.83-94
    • /
    • 2018
  • This study surveyed 255 college students enrolled in beauty contract departments located in Seoul(5 schools) and Gyeonggido(6 schools) to investigate their admission support procedure and educational satisfaction. The study found as follows; Data collection was performed from March 25 to May 30, 2018 using SPSS WIN 21.0 for their statistical processing. With respect to data analysis, first, frequency analysis was conducted to look at the general characteristics of the subjects. Second, the admission support procedure of beauty contract department was investigated and cross analysis was performed to see if there was any change according to the subjects' general characteristics. As a result of looking at the awareness on department, 89% were found to be aware of the contract department system. As for their motivation to applying for the department, the largest reasons were found to obtain a degree and to become a hair designer within a short period of time. The most frequent route of application was a recommendation by their high school teachers. The highest priority consideration in choosing a department was the brand awareness of an associated industrial entity. With respect to the complementation education in curriculum, practical technique related to the major was found the highest. 66.7% said they would recommend the department when it comes to the intention to recommend the department. 24.0% were found satisfied with the education regarding educational satisfaction. Therefore, in order to improve the educational satisfaction of the contract department, it is necessary to acquire knowledge of the field technique and practical salon education.

Case study in application of DVR system for field data collection and analysis (DVR(Digital Video Recorder)을 활용한 현장정보 수집 및 분석에 관한 사례연구)

  • Shin Bong-Soo;Kim Chang-Duk
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.486-489
    • /
    • 2002
  • Construction management has been a target of the result and the index which were decided by whether the resourecs(time, cost and progress...etc) were used. but this has been serious problems in time and cost because of the shortage of storage space, the incident, lowering of efficiency for works, working impossible of between work categories and the demage of finished products. Therefore I noticed that more correct and more objective establish of data collecting system was necessary. it was through the diversification of information for exchange and communication between the construction site and participants. DVR(Digital Video Recorder) and internet technology were suggested for a solution to this problem. the collected information by DVR was divided to 3 steps as how long it used and how much it processed for improving efficiency of using and storage of information. and then it was verified through applying to cases at construction site.

  • PDF

A Study on the Industrial Data Processing for Control System Middle Ware and Algorithm RFID is Expected (RFID을 이용한 산업용 제어 관리시스템에 적합한 미들웨어 알고리즘에 관한 연구)

  • Kang, Jeong-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5A
    • /
    • pp.451-459
    • /
    • 2007
  • RFID it reads information which is it writes, the semiconductor chip for and the radio frequency system which uses the hazard antenna it has built-in transmission of information it talks. Formation which is transmitted like this collection and America which it filtrates wey the RFID search service back to inform the location of the server which has commodity information which relates with an object past record server. The hazard where measurement analysis result the leader for electronic interference does not occur consequently together from with verification test the power level which is received from the antenna grade where it stands must maintain minimum -55dBm and the electronic interference will not occur with the fact that, antenna and reel his recognition distance the maximum 7m until the recognition which is possible but smooth hazard it must stand and and with the fact that it will do from within and and and 3-4m it must be used Jig it is thought.

Identification and Organization of Task Complexity Factors Based on a Model Combining Task Design Aspects and Complexity Dimensions

  • Ham, Dong-Han
    • Journal of the Ergonomics Society of Korea
    • /
    • v.32 no.1
    • /
    • pp.59-68
    • /
    • 2013
  • Objective: The purpose of this paper is to introduce a task complexity model combining task design aspects and complexity dimensions and to explain an approach to identifying and organizing task complexity factors based on the model. Background: Task complexity is a critical concept in describing and predicting human performance in complex systems such as nuclear power plants(NPPs). In order to understand the nature of task complexity, task complexity factors need to be identified and organized in a systematic manner. Although several methods have been suggested for identifying and organizing task complexity factors, it is rare to find an analytical approach based on a theoretically sound model. Method: This study regarded a task as a system to be designed. Three levels of design ion, which are functional, behavioral, and structural level of a task, characterize the design aspects of a task. The behavioral aspect is further classified into five cognitive processing activity types(information collection, information analysis, decision and action selection, action implementation, and action feedback). The complexity dimensions describe a task complexity from different perspectives that are size, variety, and order/organization. Combining the design aspects and complexity dimensions of a task, we developed a model from which meaningful task complexity factors can be identified and organized in an analytic way. Results: A model consisting of two facets, each of which is respectively concerned with design aspects and complexity dimensions, were proposed. Additionally, twenty-one task complexity factors were identified and organized based on the model. Conclusion: The model and approach introduced in this paper can be effectively used for examining human performance and human-system interface design issues in NPPs. Application: The model and approach introduced in this paper could be used for several human factors problems, including task allocation and design of information aiding, in NPPs and extended to other types of complex systems such as air traffic control systems as well.

A Point of Production System for Semiconductor Wafer Dicing Process (반도체 웨이퍼 다이싱 공정을 위한 생산시점 정보관리시스템)

  • Kim, In-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.55-61
    • /
    • 2009
  • This paper describes a point of production(POP) system which collects and manages real-time shop floor machining information in a wafer dicing process. The system are composed of POP terminal, line controller and network. In the configuration of the system, LAN and RS485 network are used for connection with the upper management system and down stratum respectively. As a bridge between POP terminal and server, a line controller is used. The real-time information which is the base of production management are collected from information resources such as machine, product and worker. The collected information are used for the calculation of optimal cutting condition. The collection of the information includes cutting speed, spout of pure water, accumulated count of cut in process for blade and wafer defect. In order to manage machining information in wafer dicing process, production planning information is delivered to the shop floor, and production result information is collected from the shop floor, delivered to the server and used for managing production plan. From the result of the system application, production progress status, work and non-working hour analysis for each machine, and wafer defect analysis are available, and they are used for quality and productivity improvements in wafer dicing process. A case study is implemented to evaluate the performance of the system.

Economic Feasibility Study for Molten Carbonate Fuel Cells Fed with Biogas

  • Song, Shin-Ae;Han, Jong-Hee;Yoon, Sung-Pil;Nam, Suk-Woo;Oh, In-Hwan;Choi, Dae-Ki
    • Journal of Electrochemical Science and Technology
    • /
    • v.1 no.2
    • /
    • pp.102-111
    • /
    • 2010
  • Molten carbonate fuel cell (MCFC) power plants are one of most attractive electricity generation systems for the use of biogas to generate high-efficiency ultra-clean power. However, MCFCs are considerably more expensive than comparable conventional electricity generation systems. The commercialization of MCFCs has been delayed more than expected. After being effective in the Kyoto protocol and considerably increasing the fossil price, the attention focused on $CO_2$ regression and renewable energy sources has increased dramatically. In particular, the commercialization and application of MCFC systems fed with biogas have been revived because of the characteristics of $CO_2$ collection and fuel variety of MCFCs. Better economic results of MCFC systems fed with biogas are expected because biogas is a relatively inexpensive fuel compared to liquefied natural gas (LNG). However, the pretreatment cost is added when using anaerobic digester gas (ADG), one of the biogases, as a fuel of MCFC systems because it contains high $H_2S$ and other contaminants, which are harmful sources to the MCFC stack in ADG. Thus, an accurate economic analysis and comparison between MCFCs fed with biogas and LNG are very necessary before the installation of an MCFC system fed with biogas in a plant. In this paper, the economic analysis of an MCFC fed with ADG was carried out for various conditions of electricity and fuel price and compared with the case of an MCFC fed with LNG.

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF