• Title/Summary/Keyword: DEA기법

Search Result 196, Processing Time 0.025 seconds

Analysis on Consumption Efficiency of IT and Electronic Products (정보통신 및 전력 제품에 대한 소비자 효율성 연구)

  • Son, Sung-Yong;Lee, Misuk;Kim, Chang Seob
    • Environmental and Resource Economics Review
    • /
    • v.18 no.2
    • /
    • pp.191-215
    • /
    • 2009
  • In the real world, there exist various products in terms of price and quality, and it can be expected that a product with lower price and higher quality than others is better. Hence efficiency of consumption behaviour can be measured by the level of goodness in terms of price and quality attributes of that product. The purpose of this research is to define consumption efficiency in terms of price and quality, and to measure consumption efficiency of IT and electronic products in South Korea. From the results, many consumers have purchased inefficient products m air-conditioner, TV, digital camera, MP3 player, computer markets. On the other hand, consumers have purchase efficient products in refrigerator and washing machine markets relatively. In addition, we analyze the relationship of consumption efficiency, information channel, and electric power consumption. This research may provide meaningful information for consumer's behaviour by measuring consumption efficiency quantitatively.

  • PDF

A Study of Information Leakage Prevention through Certified Authentication in Phishing, Vishing, SMiShing Attacks (Phishing, Vishing, SMiShing 공격에서 공인인증을 통한 정보침해 방지 연구)

  • Park, Dea-Woo;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.171-180
    • /
    • 2007
  • The financial crime that used morale anger Phishing, Pharming, Vishing, SMiSing etc. will gain during recent cyber crimes. We are study systematically whether or not leakage of information and infringement can how easily occur to Phishing, Vishing, SMiSing using a social engineering technique and VoIP at these papers through experiment. A hacker makes Phishing, Vishing site, and test an information infringement process of a user through PiSing mail and a virus, a nasty code, Vishing, a SMiSing character, disarmament of Keylogger prevention S/W etc. as establish server. Information by Phishing, Vishing, SMiSing is infringed with leakage in the experiment results, and confirm, and test certified certificate and White List and a certified authentication mark, plug-in program installation etc. to prevention, and security becomes, and demonstrate. Technical experiment and prevention regarding Phishing of this paper and Vishing attack reduce the damage of information infringement, and be education for Ubiquitous information security will contribute in technical development.

  • PDF

Study on Constraints Analysis Classification for PPC Improvement (작업계획달성률 향상을 위한 작업제반요건 분류에 관한 연구)

  • Han, Jung-Hun;Kim, Dea-Young;Lee, Hak-Ki
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.252-255
    • /
    • 2008
  • The purpose of construction project management is to achieve planned quality by adequate cost and schedule of the project, thus the effective time management is a critical factor to actualize the object. But the traditional time management by using milestone has several limitations which are not sufficiently considered mutual relation and variated from the task. On this wise, applying the concept and principles of lean construction to the project will be the best way not only reduce waste and variation, but also improve the productivity and ability to overcome limitation as mentioned above. Thus the study, Last Planner System, specially focuses on constraint analysis which is used in lookahead planning system. The results of this research will provide the constraints classification that is able to improve work reliable and percent plan complete when time planning by controlling constraints of project.

  • PDF

A Study of Network Forensics related to Internet Criminal at UCC (UCC와 관련된 인터넷 범죄에 대한 네트워크 포렌식 연구)

  • Lee, Gyu-An;Park, Dea-Woo;Shin, Young-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.143-151
    • /
    • 2008
  • 74% of Internet users use the UCC, and You Tube using firearms in a crime occurred. Internet crime occurred in the online, non-face transaction, anonymous, encapsulation. In this paper, we are studied a Network Forensic Way and a technique analyze an aspect criminal the Internet haying appeared at Internet UCC, and to chase. Study ID, IP back-tracking and position chase through corroborative facts collections of the UCC which used UCC search way study of the police and a public prosecutor and storage way and network forensic related to crimes of Internet UCC. Proof data encrypt, and store, and study through approach control and user authentication so that they are adopted to legal proof data through integrity verification after transmission and storages. This research via the Internet and criminal conspiracy to block the advance promotion, and for the criminal investigative agencies of the Internet will contribute to the advancement forensics research.

  • PDF

Prediction of ORFs in Metagenome by Using Cis-acting Transcriptional and Translational Factors (메타게놈 서열에 존재하는 보존적인 전사와 번역 인자를 이용한 ORF 예측)

  • Cheong, Dea-Eun;Kim, Geun-Joong
    • KSBB Journal
    • /
    • v.25 no.5
    • /
    • pp.490-496
    • /
    • 2010
  • As sequencing technologies are steadily improving, massive sequence data have been accumulated in public databases. Thereby, programs based on various algorithms are developed to mine useful information, such as genes, operons and regulatory factors,from these sequences. However, despite its usefulness in a wide range of applications, comprehensive analyses of metagenome using these programs have some drawbacks, thereby yielding inaccurate or complex results. We here provide a possibility of signature sequences (cis-acting transcriptional and translational factors of metagenome) as a hallmark of ORFs finding from metagenome.

A Study on the VR Simulation Program for the Sport of Realistic Trees (운동경기 VR Simulation을 위한 나무 사실감 연구 "가상현실 나무의 그림자와 거리감을 중심으로")

  • Shin, Hwa-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.378-382
    • /
    • 2010
  • Horseback riding, shooting, golf and other sports that make up the visuals, the background graphics in the game is an important factor influencing the outcome. But they need to play directly from the site is limited, and sports simulation games and the realistic representation of real-time operation since the fall of the background. In this paper, to overcome the limitations in the field for the game by converting pictures 3d graphic modeling. z-depth by using a special technique for expressing the perspective of the analysis of the sport and VR (virtual reality) simulation to study the background to the development. In this study, background realistic VR implementation of sport Journal of Sports Science and will contribute to the development.

  • PDF

Efficiency in Express highway operation agency in Korea (한국의 고속국도 운영기관의 효율성 분석)

  • Kim, Jong-Heun;Kang, Kyung-Woo
    • International Journal of Highway Engineering
    • /
    • v.11 no.4
    • /
    • pp.117-126
    • /
    • 2009
  • Korea Highway Corporation has played a role of the construction and operation of the highway for the past for 40 years. The private sector since the 90s has made highway construction and operation. Central government and local governments were paid at subsidy in least operating income to 1.5896 trillion won for private operators from 2001 to 2008. Thus, Korea Highway Corporation will have important implications for understanding the cost structure. Korea Highway Corporation, a general analysis of the input element is used efficiently. And the operation of labor and capital estimated highly of the substitution elasticities. Korea Highway Corporation are judged to need financial separation of a strategic outsourcing(business) enabled and the construction(maintenance and management) and business institutions. In addition, currently running at highway the operation of institutions combined to configure a new institution, if that institution invigorate the hi-pass, more of the country's highway believe to be increase operational efficiency.

  • PDF

Development of Laboratory hazard discovery and management techniques (연구실 유해인자 발굴 및 관리기법 개발에 관한 연구)

  • Lee, Hyung-Kyu;Lee, In-Bok;Sin, Young-Te;Moon, Jin-Young;Lee, Ik-Mo
    • Journal of the Korea Safety Management & Science
    • /
    • v.18 no.4
    • /
    • pp.81-90
    • /
    • 2016
  • Research and development activities have been actively conducted at universities, research institutions and research laboratories which belong to corporations. Because of blooming research and development activities in various fields, safety accidents in the laboratories happen consistently. The government office established Act on the establishment of safe laboratory environment to decrease safety accident rates and make environment of laboratories better, and it is effective slowly. However, in the case of laboratory safety management of the laboratory where various research and development activities are carried out. So it is difficult to closely monitor them. Even though safety inspections and periodic inspections is regularly conducted, these are focused on facilities and environment. According to a study of Dea-deok science town safety council, accidents in laboratories of 73% have arisen out of careless actions. Therefore, it is important for researchers to know to potential harmful factors in research. there is necessary to make a system to prevent laboratory accidents. The purpose of this study is that the researchers discovered potential hazard factors in laboratories. For that, foreign laboratory safety management systems has applied to domestic laboratories. Four laboratories in targeted institution has been selected to apply the appropriate personal protection equipments, job safety assessment and standard operating procedures. And I found the limitations of the process according to the excavations harmful factors in the research process. To overcome these limitations, Suggest a laboratory safety management system. This study discovered current laboratory safety system limitations and provides alternatives so that effective safety management can be achieved.

A study on the application of LSMS object-oriented classification based on GIS (GIS 기반 LSMS 객체지향 분류 적용 연구)

  • Han Yong Lee;Jong Woo Jung;Hye Won Jeong;Chung Dea Lee
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.408-408
    • /
    • 2023
  • 하천공간은 하도, 사주, 식생, 하천구조물 등에 대한 특성을 지니고 있으며, 현장조사를 통해 하천공간에 대한 자료를 분석하여 기초자료를 생산한다. 기존에는 현장에서 육안조사나 지상에서 사진촬영, 스케치방법으로 하천공간특성에 대한 조사를 수행하였으나, 지상에서 조사한 자료은 하천특성에 대한 물리적·공간적 특성을 파악하기 어렵고 자료의 활용성이 낮은 한계점이 존재한다. 이와 같은 한계를 극복하기 위해 GIS 및 RS 기술을 활용한 고도화된 첨단조사 기술 및 장비가 도입되어 활용되고 있다. 본 연구에서는 하천공간특성을 GIS 기반으로 객체지향 분류 적용 연구와 분류 항목에 따른 공간분석 연구를 수행하였다. 연구를 위한 대상지역은 섬진강권역의 지석천 유역 하류부에 위치하고 있는 지석천 친수공원을 대상으로 선정하였다. 대상지역의 고해상도 항공영상을 수집 및 정합한 후 QGIS에서 제공하는 Orfeo ToolBox(OTB)의 LSMS(Large Scale Mean-Shift) 기법으로 정합한 항공영상의 객체지향 영상분할을 실시하여 벡터 레이어를 생성하였고, 하천공간특성에 따른 항목을 선정하여 각 항목의 영역에 대한 선별을 통해 훈련데이터를 생성하였다. 훈련데이터는 랜덤 포레스트를 이용하여 각 항목에 대한 자동 분류를 확인하였으며, 하천공간특성의 정량적 평가를 위해 분류된 각 항목별 공간분석을 통해 면적, 위치정보(위도, 경도, 표고)를 산정하였다. 분석 결과, 하천공간특성을 GIS 기반의 벡터 레이어와 각 항목에 대한 정량적 분석을 통해 하천공간의 DB를 구축하였다. 이와 같이 하천공간 DB 구축을 통해 전국 하천관리체계를 위한 기초자료를 구축하고자 하였다.

  • PDF

A Study on DB Security Problem Improvement of DB Masking by Security Grade (DB 보안의 문제점 개선을 위한 보안등급별 Masking 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.101-109
    • /
    • 2009
  • An encryption module is equipped basically at 8i version ideal of Oracle DBMS, encryption module, but a performance decrease is caused, and users are restrictive. We analyze problem of DB security by technology by circles at this paper whether or not there is an index search, object management disorder, a serious DB performance decrease by encryption, real-time data encryption beauty whether or not there is data approach control beauty circular-based IP. And presentation does the comprehensive security Frame Work which utilized the DB Masking technique that is an alternative means technical encryption in order to improve availability of DB security. We use a virtual account, and set up a DB Masking basis by security grades as alternatives, we check advance user authentication and SQL inquiry approvals and integrity after the fact through virtual accounts, utilize to method as collect by an auditing log that an officer was able to do safely DB.