• Title/Summary/Keyword: Demand for Research Information

Search Result 1,699, Processing Time 0.037 seconds

A Study on the Selection of Core Services for Geo-Spatial Big Data (공간 빅데이터 핵심서비스 선정에 관한 연구)

  • Lee, Myeong Ho;Park, Joon Min;Shin, Dong bin;Ahn, Jong Wook
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.33 no.5
    • /
    • pp.385-396
    • /
    • 2015
  • The purpose of this study are in selecting a core service and drawing an analysis functions and service sector, based on contents of geo-spatial big data. For the study, the demand survey in the methodology has to be done by reviewing of preceding geo-spatial big data service. The survey has conducted by targeting on those experts in Industry-Academy-Research cooperation. From the survey, we could draw out requirements for the analysis function and the geo-spatial big data service sector. Also, order of priorities in service of four fields(Society, Environment, Economy, Humanities) has been utilized by a QFD(Quality Function Deployment). With the data, the first two priorities and required sectors for each field were selected for the analysis functions. From the result, we could suggest the core service model(plan), and also expect developments following each sectoral core service in the future.

Big Data Architecture Design for the Development of Hyper Live Map (HLM)

  • Moon, Sujung;Pyeon, Muwook;Bae, Sangwon;Lee, Dorim;Han, Sangwon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.34 no.2
    • /
    • pp.207-215
    • /
    • 2016
  • The demand for spatial data service technologies is increasing lately with the development of realistic 3D spatial information services and ICT (Information and Communication Technology). Research is being conducted on the real-time provision of spatial data services through a variety of mobile and Web-based contents. Big data or cloud computing can be presented as alternatives to the construction of spatial data for the effective use of large volumes of data. In this paper, the process of building HLM (Hyper Live Map) using multi-source data to acquire stereo CCTV and other various data is presented and a big data service architecture design is proposed for the use of flexible and scalable cloud computing to handle big data created by users through such media as social network services and black boxes. The provision of spatial data services in real time using big data and cloud computing will enable us to implement navigation systems, vehicle augmented reality, real-time 3D spatial information, and single picture based positioning above the single GPS level using low-cost image-based position recognition technology in the future. Furthermore, Big Data and Cloud Computing are also used for data collection and provision in U-City and Smart-City environment as well, and the big data service architecture will provide users with information in real time.

Geometric and structural assessment and reverse engineering of a steel-framed building using 3D laser scanning

  • Arum Jang;Sanggi Jeong;Hunhee Cho;Donghwi Jung;Young K. Ju;Ji-sang Kim;Donghyuk Jung
    • Computers and Concrete
    • /
    • v.33 no.5
    • /
    • pp.595-603
    • /
    • 2024
  • In the construction industry, there has been a surge in the implementation of high-tech equipment in recent years. Various technologies are being considered as potential solutions for future construction projects. Building information modeling (BIM), which utilizes advanced equipment, is a promising solution among these technologies. The need for safety inspection has also increased with the aging structures. Nevertheless, traditional safety inspection technology falls short of meeting this demand as it heavily relies on the subjective opinions of workers. This inadequacy highlights the need for advancements in existing maintenance technology. Research on building safety inspection using 3D laser scanners has notably increased. Laser scanners that use light detection and ranging (LiDAR) can quickly and accurately acquire producing information, which can be realized through reverse engineering by modeling point cloud data. This study introduces an innovative evaluation system for building safety using a 3D laser scanner. The system was used to assess the safety of an existing three-story building by implementing a reverse engineering technique. The 3D digital data are obtained from the scanner to detect defects and deflections in and outside the building and to create an as-built BIM. Subsequently, the as-built structural model of the building was generated using the reverse engineering approach and used for structural analysis. The acquired information, including deformations and dimensions, is compared with the expected values to evaluate the effectiveness of the proposed technique.

Impact of Leadership, Empowerment, and Organizational Effectiveness on Turnover Intention for Employees of Korean Dental Clinics

  • Kim, Yong Tea;Lee, Jee Hyung;Moon, Jae Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.8
    • /
    • pp.115-121
    • /
    • 2018
  • This study inquires into employee's intent to leave in South Korean dental clinics. A systematic research was undertaken on theories of leadership types, job satisfaction, organizational commitment and empowerment, and then interaction between these variables was verified based on quantitative data by using Structural Equation Model (SEM). The findings suggest that making improvements of empowerment, job satisfaction, and organizational commitment demand individualized consideration and charisma, the components of transformational leadership. As a way to reduce turnover intention, the role of job satisfaction and organizational commitment was more influential than that of empowerment. Also, a combination of charisma of transformational leadership and contingent reward of transactional leadership turned out to be the ideal leadership type to reduce turnover intention. Lastly, the harmony of individual goal with that of organization, apparent documentation of reward system, and stress control were recommended as practical solutions to improve organizational profitability and effectiveness and to reduce turnover rate in dental clinics.

Enhancement in the Performance of Capacitive Sensor for Oily Water Separator (유수분리기용 정전용량형 센서의 성능향상에 관한 연구)

  • Che, Woo-Seong;Kim, Kyong-Woo;Kwon, Hyu-Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.10
    • /
    • pp.1835-1841
    • /
    • 2006
  • Demand of enhanced bilge separation sensor system has been recently increased due to the severe regulation reinforcement of MEPC(Marine Environment Production Committee). Up to date bilge separation sensor has to be extremely accurate and highly reliable. To design and build such a bilge separator. a precise oily water separation level sensor that distinguishes oil from water is critical. Three dimensional simulations have been carried out to figure out the characteristics of capacitive level sensors, which grounds the finding of the parameters required to design the sensors. The parasitic capacitance problem which is inherent to capacitive level sensors has been taken care of. This paper concludes with the future research direction that can be pursued with the newly defined parameters of the capacitive level sensors.

A Study of Security Method against Attack in TCP/IP (TCP/IP 공격에 대한 보안 방법 연구)

  • Park Dea-Woo;Seo Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.217-226
    • /
    • 2005
  • In today's cyberworld, network performance is affected not only by an increased demand for legitimate content request, but also by an increase in malicious activity. In this Paper, we research that network performance was affected by an increase in malicious Hacker who make DoS Attack, DDoS Attack, SYN Flooding, IP Spoofing, etc. in using TCP/IP. We suggest that Packet filtering in Network Level, Gateway Level, Application Level against to Protect by Hacker's attack. Also, we suggest that content distribution in Web Server approaches to mitigate Hacker's activity using Cache Sever, Mirror Sever, CDN. These suggests are going to use useful Protection methode of Hacker's attack.

  • PDF

Genetic Algorithm-Based Coordinated Replenishment in Multi-Item Inventory Control

  • Nagasawa, Keisuke;Irohara, Takashi;Matoba, Yosuke;Liu, Shuling
    • Industrial Engineering and Management Systems
    • /
    • v.12 no.3
    • /
    • pp.172-180
    • /
    • 2013
  • We herein consider a stochastic multi-item inventory management problem in which a warehouse sells multiple items with stochastic demand and periodic replenishment from a supplier. Inventory management requires the timing and amounts of orders to be determined. For inventory replenishment, trucks of finite capacity are available. Most inventory management models consider either a single item or assume that multiple items are ordered independently, and whether there is sufficient space in trucks. The order cost is commonly calculated based on the number of carriers and the usage fees of carriers. In this situation, we can reduce future shipments by supplementing items to an order, even if the item is not scheduled to be ordered. On the other hand, we can reduce the average number of items in storage by reducing the order volume and at the risk of running out of stock. The primary variables of interest in the present research are the average number of items in storage, the stock-out volume, and the number of carriers used. We formulate this problem as a multi-objective optimization problem. In a numerical experiment based on actual shipment data, we consider the item shipping characteristics and simulate the warehouse replenishing items coordinately. The results of the simulation indicate that applying a conventional ordering policy individually will not provide effective inventory management.

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet

  • Lee, Jeong Kyu;Moon, Seo Yeon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.12 no.3
    • /
    • pp.489-501
    • /
    • 2016
  • As interest in the Internet increases, related technologies are also quickly progressing. As smart devices become more widely used, interest is growing in words are missing here like "improving the" or "figuring out how to use the" future Internet to resolve the fundamental issues of transmission quality and security. The future Internet is being studied to improve the limits of existing Internet structures and to reflect new requirements. In particular, research on words are missing here like "finding new forms of" or "applying new forms of" or "studying various types of" or "finding ways to provide more" reliable communication to connect the Internet to various services is in demand. In this paper, we analyze the security threats caused by malicious activities in the future Internet and propose a human behavior analysis-based security service model for malware detection and intrusion prevention to provide more reliable communication. Our proposed service model provides high reliability services by responding to security threats by detecting various malware intrusions and protocol authentications based on human behavior.

Real-time Networked 2K Video Transfer with Light-weight Software CODEC (Light-weight 소프트웨어 CODEC을 이용한 2K 영상의 실시간 네트워크 전송에 관한 연구)

  • Jo, Jin-Yong;Park, Jong-Churl;Moon, Jeong-Hoon;Kwak, Jai-Seung;Kim, Jong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10B
    • /
    • pp.919-927
    • /
    • 2008
  • The growing availability of broadband multimedia applications are providing strict real-time services and enabling users to feel much interactivity as well as 'sense of presence'. In that sense, there would be increased demand for what network and system have to do to fulfill the user expectations. In this paper, we implement a real-time multimedia application which make use of real-time DXT CODEC and investigate what the challenges of networking and system are. We carry out various experiments over a research network test-bed to evaluate the performance of our proposals.

Quality Evaluation of e-Government Services: A Systematic Literature Sudan as a Case Study

  • Elmouez Samir Abd Elhameed Mohamed;Amgad Atta Abedelmageed Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.95-108
    • /
    • 2023
  • The technological revolution, also referred to as the Fourth Industrial Revolution, it embraced by government should transform the way governments serve their citizens. The growth of broadband in Africa is leapfrogging its technological development. And thus, many African governments will soon be able to offer quality e-Government services to their citizens. These technologically driven governments will be able to provide decision-makers with timeous information to make judgments that could influence policies. Proponents of e-Government believe that in the digital age, governments can use this information to reduce corruption and increase, accountability, transparency, efficiency, and public participation. e-Government service quality should ensure customer satisfaction. Although many studies have examined the role of e-Government and the quality of its services, few studies have examined the quality of e-Government services in terms of both supply and demand. This paper examines and reviews the academic-state-of-the-art on the factors that affect the quality of e-Government services from both perspectives. Utilizing both qualitative and quantitative methods for data gathering and analysis, a mixed methods research methodology was used.