• Title/Summary/Keyword: Location정보

Search Result 5,606, Processing Time 0.039 seconds

Evaluation of Compaction Quality Control applied the Dynamic Cone Penetrometer Test based on IoT (다짐품질관리를 위한 IoT 기반 DCPT 적용 평가)

  • Jisun, Kim;Jinyoung, Kim;Namgyu, Kim;Sungha, Baek;Jinwoo, Cho
    • Journal of the Korean Geosynthetics Society
    • /
    • v.21 no.4
    • /
    • pp.1-12
    • /
    • 2022
  • Generally, the plate load test and the field density test are conducted for compaction quality control in earthwork, and then additional analysis. Recently developed that the DCPT (Dynamic Cone Penetration Test) equipment for smart compaction quality control its the system are able to get location and real-time information about worker history management. The IoT-based the DCPT system improved the time-cost in the field compared traditional test, and the functions recording and storage of the DPI (Dynamic Cone Penetration Index) were automated. This paper describes using these DCPT equipment on in-situ and compared to the standards of the DCPT, and the compaction trend had be confirmed with DPI as the field test data. As a result, the DPI of the final compaction decreased by 1.4 times compared to the initial compaction, confirming the increase in the compaction strength of the subgrade compaction layer 10 to 14 cm deep from the surface. A trend of increasing compaction strength was observed. This showed a tendency to increase the compaction strength of the target DPI proposed by MnDOT and the results of the existing plate load test, but there was a difference in the increase rate. Therefore, additional studies are needed on domestic compaction materials and laboratory conditions for target DPI and correlation studies with the plate load tests. If this is reflected, it is suggested that DCPT will be widely used as smart construction equipment in earthworks.

A Study on the Acceptance and Controversy of Word Library in Korea: Focusing on the Busan Library of the Nihon Kodo-kai (한국의 도서관 명칭 수용 및 쟁점 연구 - 일본홍도회 부산포지회 도서실을 중심으로 -)

  • Hee-Yoon Yoon
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.1
    • /
    • pp.1-24
    • /
    • 2023
  • The history of modern libraries in Korea is less than 150 years. Nevertheless, there are various issues about when the word library appeared, how it was transformed, and the name and overall appearance of the library opened by the Busanpo branch of the Nihon Kodo-kai during the enlightenment period. Therefore, this study analyzed and argued many issues. As a result, it was found that the word library appeared in poetry collections, tombstones, and diaries from the early Joseon dynasty. Although it was widely held that the library was first introduced by Yu Gil-jun's 「Seoyugyeonmun, 1895」, it appeared in Lee Hun-young's 「Iisajipryak」 and was also introduced in 「Hanseongsunbo, 1884」. And the first name given to the facility was Kodo library, which was opened by the Busanpo branch on October 10, 1901. Book club, reading club (library), Busan(Busan district) library, Kodo bookstore, Kodo-kai library, etc. which are described in many documents are all errors. The location of the library was a temporary house on a leased site in Seosanhajeong of Yongdusan mountain. And it is presumed that it has secured about one room and 1,000 Japanese and Western books, and provided fee-based services to Japanese residents. Although the Kodo library is not the first public library established by a Korean, it is undeniable that it was the first public library to exist in Korea. Therefore, when defining the character of the Kodo library, it is necessary to have a coolness and discernment beyond national emotions, historical conflicts, and ideological frames.

A Study on the Method of Creating a Safety Vulnerable Class Distribution Diagram for Non-Structural Countermeasures in the Comprehensive Natural Disaster Reduction Plan (자연재해저감종합계획 비구조적 대책의 안전취약계층도 작성방안에 관한 연구)

  • Doo Hee Kim;In Jae Song;Byung-Sik Kim
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.1
    • /
    • pp.1-11
    • /
    • 2023
  • The comprehensive natural disaster reduction plan, the highest plan in the disaster prevention field, was implemented by local governments. second plan is currently being formulated. In order to minimize human and property damage, structural and non-structural measures for each of the nine disaster types are established and implemented for 10 years. Structural measures are based on engineering and quantitative analysis, and the criteria for setting reduction measures are clear. Non-structural measures, however, currently lack the set criteria. the basic disaster and safety management law included the safety vulnerable class in 2018. Currently, the safety vulnerable class of the detailed establishment criteria of the comprehensive natural disaster reduction plan is being established, including children, the elderly, and the disabled. However, due to the lack of data securing and database construction by local governments, it is difficult to prepare a location map for establishing reduction measures for the safety vulnerable. Therefore, in this study, OPEN API data of the safety vulnerable class were collected and statistical information and GIS of SGIS information services were used. The distribution diagram of the safety vulnerable class in Samcheok, Gangwon-do, which is a sample area, and the distribution diagram of the safety vulnerable class in units of the output area (OA) in Geundeok-myeon were prepared.

Development and Evaluation of Safe Route Service of Electric Personal Assistive Mobility Devices for the Mobility Impaired People (교통약자를 위한 전동 이동 보조기기 안전 경로 서비스의 개발과 평가)

  • Je-Seung WOO;Sun-Gi HONG;Sang-Kyoung YOO;Hoe Kyoung KIM
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.26 no.3
    • /
    • pp.85-96
    • /
    • 2023
  • This study developed and evaluated a safe route guidance service for electric personal assistive mobility device used mainly by the mobility impaired people to improve their mobility. Thirteen underlying factors affecting the mobility of electric personal assistive mobility device have been derived through a survey with the mobility impaired people and employees in related organizations in Busan Metropolitan City. After assigning safety scores to individual factors and identifying the relevant factors along routes of interest with an object detection AI model, the safe route for electric personal assistive mobility device was provided through an optimal path-finding algorithm. As a result of comparing the general route of T-map and the recommended route of this study for the identical routes, the latter had relatively fewer obstacles and the gentler slope than the former, implicating that the recommended route is safer than the general one. As future works, it is necessary to enhance the function of a route guidance service based on the real-time location of users and to conduct spot investigations to evaluate and verify its social acceptability.

Positional Accuracy Analysis According to the Exterior Orientation Parameters of a Low-Cost Drone (저가형 드론의 외부표정요소에 따른 위치결정 정확도 분석)

  • Kim, Doo Pyo;Lee, Jae One
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.2
    • /
    • pp.291-298
    • /
    • 2022
  • Recently developed drones are inexpensive and very convenient to operate. As a result, the production and utilization of spatial information using drones are increasing. However, most drones acquire images with a low-cost global navigation satellite system (GNSS) and an inertial measurement unit (IMU). Accordingly, the accuracy of the initial location and rotation angle elements of the image is low. In addition, because these drones are small and light, they can be greatly affected by wind, making it difficult to maintain a certain overlap, which degrades the positioning accuracy. Therefore, in this study, images are taken at different times in order to analyze the positioning accuracy according to changes in certain exterior orientation parameters. To do this, image processing was performed with Pix4D Mapper and the accuracy of the results was analyzed. In order to analyze the variation of the accuracy according to the exterior orientation parameters in detail, the exterior orientation parameters of the first processing result were used as meta-data for the second processing. Subsequently, the amount of change in the exterior orientation parameters was analyzed by in a strip-by-strip manner. As a result, it was proved that the changes of the Omega and Phi values among the rotation elements were related to a decrease in the height accuracy, while changes in Kappa were linked to the horizontal accuracy.

Study on security method for scenario-based smartphone vulnerability (시나리오 기반의 스마트폰 취약점에 대한 보안방안 연구)

  • Lee, Jaeho;Son, Minwoo;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.835-844
    • /
    • 2018
  • Recently, as the number of smartphone users has been increasing worldwide, various services such as electronic payment, internet use, and financial settlement are being used as a smartphone. In addition, researches for home appliance control and automobile control using smartphone are conducted. As such, smartphone users can enjoy a more convenient life, but by hacking smartphones, tapping texts and conversations on smartphones, tracking location through spy apps, DDoS attacks using smartphones, and malicious apps When a message is received at a specific telephone number when using a micropayment, the corresponding text message is transmitted to a remote server, thereby increasing the risk of leakage of personal information and the like. Therefore, in this paper, we define the risk factors of the smartphone that are caused by the internal and external environmental, physical, contents (apps) of the smartphone through the smartphone that we use in real life, We propose a method to check vulnerability of smartphone security solution such as CC evaluation and the most effective response technique for each risk of smartphone by defining the technique.

Context-Dependent Video Data Augmentation for Human Instance Segmentation (인물 개체 분할을 위한 맥락-의존적 비디오 데이터 보강)

  • HyunJin Chun;JongHun Lee;InCheol Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.5
    • /
    • pp.217-228
    • /
    • 2023
  • Video instance segmentation is an intelligent visual task with high complexity because it not only requires object instance segmentation for each image frame constituting a video, but also requires accurate tracking of instances throughout the frame sequence of the video. In special, human instance segmentation in drama videos has an unique characteristic that requires accurate tracking of several main characters interacting in various places and times. Also, it is also characterized by a kind of the class imbalance problem because there is a significant difference between the frequency of main characters and that of supporting or auxiliary characters in drama videos. In this paper, we introduce a new human instance datatset called MHIS, which is built upon drama videos, Miseang, and then propose a novel video data augmentation method, CDVA, in order to overcome the data imbalance problem between character classes. Different from the previous video data augmentation methods, the proposed CDVA generates more realistic augmented videos by deciding the optimal location within the background clip for a target human instance to be inserted with taking rich spatio-temporal context embedded in videos into account. Therefore, the proposed augmentation method, CDVA, can improve the performance of a deep neural network model for video instance segmentation. Conducting both quantitative and qualitative experiments using the MHIS dataset, we prove the usefulness and effectiveness of the proposed video data augmentation method.

An Analysis of the Ripple Effect of Congestion in a Specific Section Using the Robustness Sensitivity of the Traffic Network

  • Chi-Geun Han;Sung-Geun Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.4
    • /
    • pp.83-91
    • /
    • 2023
  • In this paper, we propose a robustness sensitivity index (RSI) of highway networks to analyze the effect of congestion in a specific section on the entire highway. The newly proposed RSI is defined as the change in the total mileage of the transportation network per extended unit length when the length of a particular section is extended. When the RSI value is large, traffic congestion in the section has a worse effect on the entire network than in other sections. The existing network robustness index (NRI) simply observes changes in transportation networks with and without specific sections, but the RSI proposed in this study is a kind of performance indicator that allows quantitative analysis of the ripple effect of the entire network according to the degree of congestion in a specific section. While changing the degree of congestion in a particular section, it is possible to calculate how the traffic volume increases, decreases, and the size and location of the congestion section change. This analysis proves the superiority of RSI as it cannot be analyzed with NRI. Various properties of RSI are analyzed using data from the domestic highway network. In addition, using the RSI concept, it is shown that the ripple effect on other sections in which a change in the degree of congestion of a specific section occurs can be analyzed.

Analysis for Circumstance of Maritime Transport in the Chinese northeastern three provinces towards Sustainable New Northern Policy

  • Junghwan Choi;Sangseop Lim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.4
    • /
    • pp.121-131
    • /
    • 2023
  • The Chinese three northeastern three provinces - Heilongjiang, Liaoning, and Jilin - hold significant geographical, geopolitical, and commercial importance due to their location allowing for cross-border trade and transportation with North Korea. These provinces are crucial for establishing a complex Eurasian logistics network in line with South Korea's new northern policy. The Chinese three northeastern three provinces, as this region is known, boasts excellent maritime transportation links between South Korea, China, and North Korea, making it an logistics hub for transporting goods to Eurasia and Europe through multimodal transport. This study highlights the importance of securing a logistics hub area by fostering cooperation and friendly relations with China's three northeastern three provinces, which are crucial to the success of the New Northern Policy. In particular, the study aims to analyze current status of trade with these region and freight volume transported by ships and recommend political advice for securing logistics hub and revitalizing maritime transport. As the policy suggestion, this study is to establish a logistics hub by implementing joint port operations, constructing port infrastructure jointly, and operating shipping companies together. Additionally, we propose ways to revitalize the maritime passenger transport business between Korea and China, which involves expanding cultural exchanges and developing content.

Elevator Algorithm Design Using Time Table Data (시간표 데이터를 이용한 엘리베이터 알고리즘 설계)

  • Park, Jun-hyuk;Kyoung, Min-jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.122-124
    • /
    • 2022
  • Handling Passenger Traffic is the main challenge for designing an elevator group-control algorithm. Advanced control systems such as Hyundai's Destination Selection System(DSS) lets passengers select the destination by pressing on a selecting screen, and the systems have shown great efficiency. However, the algorithm cannot be applied to the general elevator control system due to the expensive cost of the technology. Often many elevator systems use Nearest Car(NC) algorithms based on the SCAN algorithm, which results in time efficiency problems. In this paper, we designed an elevator group-control algorithm for specific buildings that have approximate timetable data for most of the passengers in the building. In that way, it is possible to predict the destination and the location of passenger calls. The algorithm consists of two parts; the waiting function and the assignment function. They evaluate elevators' actions with respect to the calls and the overall situation. 10 different timetables are created in reference to a real timetable following midday traffic and interfloor traffic. The specific coefficients in the function are set by going through the genetic algorithm process that represents the best algorithm. As result, the average waiting time has shortened by a noticeable amount and the efficiency was close to the known DSS result. Finally, we analyzed the algorithm by evaluating the meaning of each coefficient result from the genetic algorithm.

  • PDF