• Title/Summary/Keyword: Massive Contents

Search Result 186, Processing Time 0.034 seconds

Physical and Chemical Characteristics of Pinkish Granite Core in the Mungyeong Area (문경지역 담홍색 화강암 코아의 물리적 및 화학적 특성)

  • 윤현수
    • The Journal of the Petrological Society of Korea
    • /
    • v.3 no.3
    • /
    • pp.234-240
    • /
    • 1994
  • The Wongyeong site, one of massive pinkish granite quarries in the Mungyeong area, was drilled to study the physical and chemical properties following the rock classification from fresh rock to highly, moderately and slightly weathered one. The physical properties such as specific gravity, absorption ratio, porosity and compressive strength were tested from the core samples. Specific gravity and absorption ratio are 2.37-2.64 and 0.27-1.87% respectively, while porosity and compressive strength are 0.70-4.38% and 110- 1, 695 kg/$cm^2$. With increased weathering, absorption ratio vs. porosity shows a positive correlation. The absorption ratio is in reverse proportion to compressive strength. Toward the surface in the drilled core, the $SiO_2$, CaO and $K_2O$ contents slightly decrease, but the $Al_2O_3$+FeO(t) contents increase by the enrichment of residual clay in the weathered rock.

  • PDF

A Study on Application Method of Crypto-module for Industrial Control System (산업제어시스템(ICS) 암호모듈 적용방안 연구)

  • Seok, Byoungjin;Kim, Yeog;Lee, Changhoon
    • Journal of Digital Contents Society
    • /
    • v.18 no.5
    • /
    • pp.1001-1008
    • /
    • 2017
  • Because cyber attacks on industrial control systems can lead to massive financial loss or loss of lives, the standardization and the research on cyber security of industrial control systems are actively under way. As a related system, the industrial control system of social infrastructures must be equipped with the verified cryptographic module according to the e-government law and appropriate security control should be implemented in accordance with the security requirements of the industrial control system. However, the industrial control system consisting of the operation layer, the control layer, and the field device layer may cause a problem in performing the main function in each layer due to the security control implementation. In this paper, we propose things to check when performing security control in accordance with the security control requirements for each layer of the industrial control system and proper application.

A Novel D2D Communication Scheme for Location-Based OTT Service in Cellular Networks (셀룰러 통신망에서 위치기반 OTT 서비스 지원을 위한 D2D 통신 방안)

  • Han, Kyeong-Il;Min, Sang-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.6
    • /
    • pp.195-207
    • /
    • 2017
  • Since the smart phone was first introduced, the amount of mobile traffic has increased explosively. The OTT service with personal broadcasting and TV contents and the number of users have been increased in wired network, and there are needs to expand the OTT service to mobile network. In the case of the OTT service in mobile network, the relative small and finite resource may cause the overload of the network due to the massive and high transfer rate. In this paper, we consider a future situation of the OTT user services in the cellular network and propose a novel D2D communication scheme for location-based OTT service, which can reduce and distribute the amount of video traffics. To effectively handle the traffic of OTT services, we propose D2DS and LCS functional blocks in EPC network, which can provide location-based service and D2D management. And, we suggest additional procedures for the location-based service of both content provider and contents receiver UEs with the operation of the proposed D2DS and LCS function block.

Evaluation of Collaborative Filtering Methods for Developing Online Music Contents Recommendation System (온라인 음악 콘텐츠 추천 시스템 구현을 위한 협업 필터링 기법들의 비교 평가)

  • Yoo, Youngseok;Kim, Jiyeon;Sohn, Bangyong;Jung, Jongjin
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.7
    • /
    • pp.1083-1091
    • /
    • 2017
  • As big data technologies have been developed and massive data have exploded from users through various channels, CEO of global IT enterprise mentioned core importance of data in next generation business. Therefore various machine learning technologies have been necessary to apply data driven services but especially recommendation has been core technique in viewpoint of directly providing summarized information or exact choice of items to users in information flooding environment. Recently evolved recommendation techniques have been proposed by many researchers and most of service companies with big data tried to apply refined recommendation method on their online business. For example, Amazon used item to item collaborative filtering method on its sales distribution platform. In this paper, we develop a commercial web service for suggesting music contents and implement three representative collaborative filtering methods on the service. We also produce recommendation lists with three methods based on real world sample data and evaluate the usefulness of them by comparison among the produced result. This study is meaningful in terms of suggesting the right direction and practicality when companies and developers want to develop web services by applying big data based recommendation techniques in practical environment.

A Study on the Development Strategy and Utilization of Big Data Related to Employment (고용관련 빅데이터 구축 전략 및 활용방안 연구)

  • Choi, Ki-Sung
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.184-197
    • /
    • 2021
  • Prior to the establishment of 'Employment-Related Big Data Center (tentative name)' to support the development of customized employment services. This Paper examines the current status and limitation of employment-related data in korea. Then, the implications were derived through foreign employment-related big data construction cases. Through the above analysis, I proposed measures to build and utilize employment-related big data at the individual level, focusing on the Transitional Labour Markets theory that emphasizes the implementation of individual labor force states. Finally, we presented future challenges such as massive maintenance of employment-related DB, increased representation of big data to be built around employment insurance DB, and increased reliability of DB presented.

Personalized Recommendation Considering Item Confidence in E-Commerce (온라인 쇼핑몰에서 상품 신뢰도를 고려한 개인화 추천)

  • Choi, Do-Jin;Park, Jae-Yeol;Park, Soo-Bin;Lim, Jong-Tae;Song, Je-O;Bok, Kyoung-Soo;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.3
    • /
    • pp.171-182
    • /
    • 2019
  • As online shopping malls continue to grow in popularity, various chances of consumption are provided to customers. Customers decide the purchase by exploiting information provided by shopping malls such as the reviews of actual purchasing users, the detailed information of items, and so on. It is required to provide objective and reliable information because customers have to decide on their own whether the massive information is credible. In this paper, we propose a personalized recommendation method considering an item confidence to recommend reliable items. The proposed method determines user preferences based on various behaviors for personalized recommendation. We also propose an user preference measurement that considers time weights to apply the latest propensity to consume. Finally, we predict the preference score of items that have not been used or purchased before, and we recommend items that have highest scores in terms of both the predicted preference score and the item confidence score.

Study on Earthquake Hazard Response Process by 'Pohang Earthquake' Case Analysis (포항지진사례 분석을 통한 지진재난 대응 프로세스에 관한 연구)

  • Kang, Hyeong Gu;Park, Ki-Jong;Kim, HyeWon
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.561-571
    • /
    • 2021
  • The 2017 Pohang earthquake left us with issues related to long-term repair and restoration from massive earthquake damage. The existing Earthquake response manual was insufficient to consider the flow of earthquake disaster work and the characteristics of long-lasting earthquake disaster. Accordingly, It is important to analyze and record how to earthquake response work was carried out during the Pohang earthquake. The functions that require the most work and manpower in the event of an earthquake disaster were emergency life stabilization support, facility emergency recovery, and energy functional restoration. As a result of analyzing the difficulties and problems of disaster response by function, it was found that the prevention and preparation for damage in advance was insufficient for each function. In conclusion, we subdivided the response step applied with the concept of time and presented the overall work flow process for thirteen collaboration functions. It is expected that this result will help disaster managers to work effectively in the event of a large scale earthquake.

Predicting Preventive Behavior Intention in COVID-19 Pandemic Context: Application of Social Variables to Health Belief Model (코로나19 팬데믹 상황에서의 감염 예방행동 의도에 관한 연구: 건강신념모델에 사회적 변인 적용을 중심으로)

  • Hong, Da-Ye;Jeon, Min-A;Cho, Chang-Hoan
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.22-35
    • /
    • 2021
  • The unprecedented pandemic caused by the COVID-19 has led to a massive global public health campaign to slow the spread of the virus. Thus, this study examines the importance of individual's prevention behavior intention by adapting health belief model(HBM). In addition, we added social variables to understand the prevention behavior better considering the situation in which collective behaviors are important. The online survey results(N=298) showed that higher level of perceived severity, perceived susceptibility, perceived benefits, perceived peril, perceived social norms and lower level of perceived responsibility led to higher prevention behavior intention. Peril was the most influential factor among all the variables. In addition, perceived severity and social norms followed after that. Additional analysis also implied that socio-HBM model we proposed better explained the prevention behavior intention than traditional HBM.

A MMORPG Quest Reward Design Technique By Considering Optimal Quest Play Paths (최적 동선을 고려한 MMORPG 퀘스트 보상 설계 기법)

  • Kang, Shin-Jin;Shin, Seung-Ho;Cho, Sung-Hyun
    • Journal of Korea Game Society
    • /
    • v.9 no.4
    • /
    • pp.57-66
    • /
    • 2009
  • A quest system is one of the important parts in the MMORPG (Massive Multiplayer Online Role Playing Game) contents. Because of its complexity in combining various content components, quest reward design belongs to a complicated work in estimating quest reward levels correctly in the initial development stage. In this paper, we suggest a new quest reward design technique by considering optimal quest play paths. We model a quest reward problem as the TSP (Traveling Salesman Problem) and solve that by adopting genetic algorithms. With our system, game designers easily estimate the optimal quest play path and it can be useful in reducing the trial-errors in the initial quest design process.

  • PDF

A Video Shot Verification System (비디오 샷 검증 시스템)

  • Chung, Ji-Moon
    • Journal of Digital Convergence
    • /
    • v.7 no.2
    • /
    • pp.93-102
    • /
    • 2009
  • Since video is composed of unstructured data with massive storage and linear forms, it is essential to conduct various research studies to provide the required contents for users who are accustomed to dealing with standardized data such as documents and images. Previous studies have shown the occurrence of undetected and false detected shots. This thesis suggested shot verification and video retrieval system using visual rhythm to reduce these kinds of errors. First, the system suggested in this paper is designed to detect the parts easily and quickly, which are assumed as shot boundaries, just by changing the visual rhythm without playing the image. Therefore, this enables to delete the false detected shot and to generate the unidentified shot and key frame. The following are the summaries of the research results of this study. Second, during the retrieving process, a thumbnail and keyword method of inquiry is possible and the user is able to put some more priorities on one part than the other between the color and shape. As a result, the corresponding shot or scene is displayed. However, in the case of not finding the preferred shot, the key picture frame of similar shot is supplied and can be used in the further inquiry of the next scene.

  • PDF