• Title/Summary/Keyword: Modeling and control

Search Result 4,372, Processing Time 0.036 seconds

Estimation of Long-term Effects of Harvest Interval and Intensity, and Post-harvest Residue Management on the Soil Carbon Stock of Pinus densiflora Stands using KFSC Model (한국형 산림토양탄소모델(KFSC)을 이용한 수확 주기 및 강도와 수확 후 잔재물 처리방법에 따른 소나무림 토양탄소 저장량의 장기 변화 추정 연구)

  • Park, Chan-Woo;Yi, Koong;Lee, Jongyeol;Lee, Kyeong-Hak;Yi, Myong-Jong;Kim, Choonsig;Park, Gwan-Soo;Kim, Raehyun;Son, Yowhan
    • Journal of Korean Society of Forest Science
    • /
    • v.102 no.1
    • /
    • pp.82-89
    • /
    • 2013
  • Harvest is one of the major disturbances affecting the soil carbon (C) dynamics in forests. However, researches on the long-term impact of periodic harvest on the soil C dynamics are limited since they requires rigorous control of various factors. Therefore, we adopted a modeling approach to determine the long-term impacts of harvest interval, harvest intensity and post-harvest residue management on soil C dynamics by using the Korean Forest Soil Carbon model (KFSC model). The simulation was conducted on Pinus densiflora S. et Z. stands in central Korea, and twelve harvest scenarios were tested by altering harvest intervals (50, 80, and 100-year interval), intensities (partial-cut harvest: 30% and clear-cut harvest: 100% of stand volume), and the residue managements after harvest (collection: 0% and retention: 100% of aboveground residue). We simulated the soil carbon stock for 400 years for each scenario. As a result, the soil C stocks in depth of 30 cm after 400 years range from 50.3 to 55.8 Mg C $ha^{-1}$, corresponding to 98.1 to 108.9% of the C stock at present. The soil C stock under the scenarios with residue retention was 2.5-11.0% higher than that under scenarios with residue collection. However, there was no significant impact of harvest interval and intensity on the soil C stock. The soil C dynamics depended on the dead organic matter dynamics derived from the amount of dead organic matter and growth pattern after harvest.

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

Importance of End User's Feedback Seeking Behavior for Faithful Appropriation of Information Systems in Small and Medium Enterprises (중소기업 환경에서의 합목적적 정보시스템 활용을 위한 최종사용자 피드백 탐색행위의 중요성)

  • Shin, Young-Mee;Lee, Joo-Ryang;Lee, Ho-Geun
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.61-95
    • /
    • 2007
  • Small-and-medium sized enterprises(SMEs) represent quite a large proportion of the industry as a whole in terms of the number of enterprises or employees. However researches on information system so far have focused on large companies, probably because SMEs were not so active in introducing information systems as larger enterprises. SMEs are now increasingly bringing in information systems such as ERP(Enterprise Resource Planning Systems) and some of the companies already entered the stage of ongoing use. Accordingly, researches should deal with the use of information systems by SME s operating under different conditions from large companies. This study examined factors and mechanism inducing faithful appropriation of information systems, in particular integrative systems such as ERP, in view of individuals` active feedback-seeking behavior. There are three factors expected to affect end users` feedback-seeking behavior for faithful appropriation of information systems. They are management support, peer IT champ support, and IT staff support. The main focus of the study is on how these factors affect feedback-seeking behavior and whether the feedback-seeking behavior plays the role of mediator for realizing faithful appropriation of information systems by end users. To examine the research model and the hypotheses, this study employed an empirical method based on a field survey. The survey used measurements mostly employed and verified by previous researches, while some of the measurements had gone through minor modifications for the purpose of the study. The survey respondents are individual employees of SMEs that have been using ERP for one year or longer. To prevent common method bias, Task-Technology Fit items used as the control variable were made to be answered by different respondents. In total, 127 pairs of valid questionnaires were collected and used for the analysis. The PLS(Partial Least Squares) approach to structural equation modeling(PLS-Graph v.3.0) was used as our data analysis strategy because of its ability to model both formative and reflective latent constructs under small-and medium-size samples. The analysis shows Reliability, Construct Validity and Discriminant Validity are appropriate. The path analysis results are as follows; first, the more there is peer IT champ support, the more the end user is likely to show feedback-seeking behavior(path-coefficient=0.230, t=2.28, p<0.05). In other words, if colleagues proficient in information system use recognize the importance of their help, pass on what they have found to be an effective way of using the system or correct others' misuse, ordinary end users will be able to seek feedback on the faithfulness of their appropriation of information system without hesitation, because they know the convenience of getting help. Second, management support encourages ordinary end users to seek more feedback(path-coefficient=0.271, t=3.06, p<0.01) by affecting the end users' perceived value of feedback(path-coefficient=0.401, t=6.01, p<0.01). Management support is far more influential than other factors that when the management of an SME well understands the benefit of ERP, promotes its faithful appropriation and pays attention to employees' satisfaction with the system, employees will make deliberate efforts for faithful appropriation of the system. However, the third factor, IT staff support was found not to be conducive to feedback-seeking behavior from end users(path-coefficient=0.174, t=1.83). This is partly attributable to the fundamental reason that there is little support for end users from IT staff in SMEs. Even when IT staff provides support, end users may find it less important than that from coworkers more familiar with the end users' job. Meanwhile, the more end users seek feedback and attempt to find ways of faithful appropriation of information systems, the more likely the users will be able to deploy the system according to the purpose the system was originally meant for(path-coefficient=0.35, t=2.88, p<0.01). Finally, the mediation effect analysis confirmed the mediation effect of feedback-seeking behavior. By confirming the mediation effect of feedback-seeking behavior, this study draws attention to the importance of feedback-seeking behavior that has long been overlooked in research about information system use. This study also explores the factors that promote feedback-seeking behavior which in result could affect end user`s faithful appropriation of information systems. In addition, this study provides insight about which inducements or resources SMEs should offer to promote individual users' feedback-seeking behavior when formal and sufficient support from IT staff or an outside information system provider is hardly expected. As the study results show, under the business environment of SMEs, help from skilled colleagues and the management plays a critical role. Therefore, SMEs should seriously consider how to utilize skilled peer information system users, while the management should pay keen attention to end users and support them to make the most of information systems.

Analysing the effect of impervious cover management techniques on the reduction of runoff and pollutant loads (불투수면 저감기법의 유출량 및 오염부하량 저감 효과 분석)

  • Park, Hyung Seok;Choi, Hwan Gyu;Chung, Se Woong
    • Journal of Environmental Impact Assessment
    • /
    • v.24 no.1
    • /
    • pp.16-34
    • /
    • 2015
  • Impervious covers(IC) are artificial structures, such as driveways, sidewalks, building's roofs, and parking lots, through which water cannot infiltrate into the soil. IC is an environmental concern because the pavement materials seal the soil surface, decreasing rainwater infiltration and natural groundwater recharge, and consequently disturb the hydrological cycle in a watershed. Increase of IC in a watershed can cause more frequent flooding, higher flood peaks, groundwater drawdown, dry river, and decline of water quality and ecosystem health. There has been an increased public interest in the institutional adoption of LID(Low Impact Development) and GI(Green Infrastructure) techniques to address the adverse impact of IC. The objectives of this study were to construct the modeling site for a samll urban watershed with the Storm Water Management Model(SWMM), and to evaluate the effect of various LID techniques on the control of rainfall runoff processes and non-point pollutant load. The model was calibrated and validated using the field data collected during two flood events on July 17 and August 11, 2009, respectively, and applied to a complex area, where is consist of apartments, school, roads, park, etc. The LID techniques applied to the impervious area were decentralized rainwater management measures such as pervious cover and green roof. The results showed that the increase of perviousness land cover through LID applications decreases the runoff volume and pollutants loading during flood events. In particular, applications of pervious pavement for parking lots and sidewalk, green roof, and their combinations reduced the total volume of runoff by 15~61 % and non-point pollutant loads by TSS 22~72 %, BOD 23~71 %, COD 22~71 %, TN 15~79 %, TP 9~64 % in the study site.

Development of A Material Flow Model for Predicting Nano-TiO2 Particles Removal Efficiency in a WWTP (하수처리장 내 나노 TiO2 입자 제거효율 예측을 위한 물질흐름모델 개발)

  • Ban, Min Jeong;Lee, Dong Hoon;Shin, Sangwook;Lee, Byung-Tae;Hwang, Yu Sik;Kim, Keugtae;Kang, Joo-Hyon
    • Journal of Wetlands Research
    • /
    • v.24 no.4
    • /
    • pp.345-353
    • /
    • 2022
  • A wastewater treatment plant (WWTP) is a major gateway for the engineered nano-particles (ENPs) entering the water bodies. However existing studies have reported that many WWTPs exceed the No Observed Effective Concentration (NOEC) for ENPs in the effluent and thus they need to be designed or operated to more effectively control ENPs. Understanding and predicting ENPs behaviors in the unit and \the whole process of a WWTP should be the key first step to develop strategies for controlling ENPs using a WWTP. This study aims to provide a modeling tool for predicting behaviors and removal efficiencies of ENPs in a WWTP associated with process characteristics and major operating conditions. In the developed model, four unit processes for water treatment (primary clarifier, bioreactor, secondary clarifier, and tertiary treatment unit) were considered. Additionally the model simulates the sludge treatment system as a single process that integrates multiple unit processes including thickeners, digesters, and dewatering units. The simulated ENP was nano-sized TiO2, (nano-TiO2) assuming that its behavior in a WWTP is dominated by the attachment with suspendid solids (SS), while dissolution and transformation are insignificant. The attachment mechanism of nano-TiO2 to SS was incorporated into the model equations using the apparent solid-liquid partition coefficient (Kd) under the equilibrium assumption between solid and liquid phase, and a steady state condition of nano-TiO2 was assumed. Furthermore, an MS Excel-based user interface was developed to provide user-friendly environment for the nano-TiO2 removal efficiency calculations. Using the developed model, a preliminary simulation was conducted to examine how the solid retention time (SRT), a major operating variable affects the removal efficiency of nano-TiO2 particles in a WWTP.

Research about CAVE Practical Use Way Through Culture Content's Restoration Process that Utilize CAVE (가상현실시스템(CAVE)을 활용한 문화 Content의 복원 과정을 통한 CAVE활용 방안에 대한 연구)

  • Kim, Tae-Yul;Ryu, Seuc-Ho;Hur, Yung-Ju
    • Journal of Korea Game Society
    • /
    • v.4 no.3
    • /
    • pp.11-20
    • /
    • 2004
  • Virtual reality that we have seen from the movies in 80's and 90's is hawing near based on the rapid progress of science together with a computer technology. Various virtual reality system developments (such as VRML, HMD FishTank, Wall Type, CAVE Type, and so on) and the advancement of those systems make for the embodiment of virtual reality that gives more sense of the real. Virtual reality is so immersive that makes people feel like they are in that environment and enable them to manipulate without experiencing the environment at first hand that is hard to experience in reality. Virtual reality can be applied to the spheres, such as education, high-level programming, remote control, surface exploration of the remote satellite, analysis of exploration data, scientific visualization, and so on. For some connote examples, there are training of a tank and an aeroplane operation, fumiture layout design, surgical operation practice, game, and so on. In these virtual reality systems, the actual operation of the human participant and virtual workspace are connected each other to the hardware that stimulates the five senses adequately to lend the sense of the immersion. There are still long way to go, however, before long it will be possible to have the same feeling in the virtual reality as human being can have by further study and effort. In this thesis, the basic definition, the general idea, and the kind of virtual reality were discussed. Especially, CAVE typed in reality that is highly immersive was analyzed in definition, and then the method of VR programming and modeling in the virtual reality system were suggested by showing the restoration process of Kyongbok Palace (as the content of the original form of the culture) that was made by KISTI(Korea Institute of Science and Technology Information) in 2003 through design process in virtual reality system. Through these processes, utilization of the immersive virtual reality system was discussed and how to take advantage of this CAVE typed virtual reality system at the moment was studied. In closing the problems that had been exposed in the process of the restoration of the cultural property were described and the utilization plan of the virtual reality system was suggested.

  • PDF

Investigation for Bed Stabilization Methods in the Upstream Channel of Haman Weir Using CCHE2D Model (CCHE2D 모형을 이용한 함안보 상류 하상안정화 방안 검토)

  • Jang, Eun Kyung;Ji, Un;Kwon, Yong Sung;Yeo, Woon Kwang
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.6
    • /
    • pp.2211-2221
    • /
    • 2013
  • During the four river restoration project, several weirs were constructed in the four rivers to prevent drought and flood, to improve water quality, and to manage water resources. However, due to the weir construction, bed changes are produced in the upstream channel of installed weirs because the incoming flow velocity is reduced and sediment transport capacity is also lowered. Especially, since the Haman Weir is located in the lowest downstream section among newly installed weirs in Nakdong River, bed change and sedimentation problems are expected due to the mild slope and reduced velocity. Therefore, numerical simulation was performed to analyze flow and bed changes in the upstream channel of Haman Weir and to evaluate quantitatively sediment control methods for bed stabilization using CCHE2D model. As a result of flow and bed change simulation after installation of Haman Weir, the flow velocity at the initial condition was faster than the final bed condition with the specific simulation time and it was represented that the locations where bed changes were great were identical for all modeling conditions of flow discharge. In case of 4.5 m of water level lowered from 5.0 m of the management water level at Haman Weir for bed stabilization, the flow velocity was generally faster than the case of the management water level and the continuous erosion was developed at the most narrow channel section as the applied discharge and simulation period were increased. The channel width extension at the most narrow channel section was proposed in this study to prevent and stabilize continuos bed erosion. As a result of numerical analysis, there was no bed erosion after channel width extension and it was presented that the channel geometry extension was effective for bed stabilization at Haman Weir.

Flow Resistance and Modeling Rule of Fishing Nets -2. Flow Resistance of Bag Nets- (그물어구의 유수저항과 모형수칙 -2. 자루형 그물의 유수저항-)

  • KIM Dae-An
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.28 no.2
    • /
    • pp.194-201
    • /
    • 1995
  • In order to make clear the resistance of bag nets, the resistance R of bag nets with wall area S designed in pyramid shape was measured in a circulating water tank with control of flow velocity v and the coefficient k in $R=kSv^2$ was investigated. The coefficient k showed no change In the nets designed in regular pyramid shape when their mouths were attached alternately to the circular and square frames, because their shape in water became a circular cone in the circular frame and equal to the cone with the exception of the vicinity of frame in the square one. On the other hand, a net designed in right pyramid shape and then attached to a rectangular frame showed an elliptic cone with the exception of the vicinity of frame in water, but produced no significant difference in value of k in comparison with that making a circular cone in water. In the nets making a circular cone in water, k was higher in nets with larger d/l, ratio of diameter d to length I of bars, and decreased as the ratio S/S_m$ of S to the area $S_m$ of net mouth was increased or as the attack angle 9 of net to the water flow was decreased. But the value of ks15m was almost constant in the region of S/S_m=1-4$ or $\theta=15-90^{\circ}$ and in creased linearly in S/S_m>4 or in $\theta<15^{\circ}$ However, these variation of k could be summarized by the equation obtained in the previous paper. That is, the coefficient $k(kg\;\cdot\;sec^2/m^4)$ of bag nets was expressed as $$k=160R_e\;^{-01}(\frac{S_n}{S_m})^{1.2}\;(\frac{S_m}{S})^{1.6}$$ for the condition of $R_e<100$ and $$k=100(\frac{S_n}{S_m})^{1.2}\;(\frac{S_m}{S})^{1.6}$$ for $R_e\geq100$, where $S_n$ is their total area projected to the plane perpendicular to the water flow and $R_e$ the Reynolds' number on which the representative size was taken by the value of $\lambda$ defined as $$\lambda={\frac{\pi d^2}{21\;sin\;2\varphi}$$ where If is the angle between two adjacent bars, d the diameter of bars, and 21 the mesh size. Conclusively, it is clarified that the coefficient k obtained in the previous paper agrees with the experimental results for bag nets.

  • PDF

Usefulness of Data Mining in Criminal Investigation (데이터 마이닝의 범죄수사 적용 가능성)

  • Kim, Joon-Woo;Sohn, Joong-Kweon;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.1 no.2
    • /
    • pp.5-19
    • /
    • 2006
  • Data mining is an information extraction activity to discover hidden facts contained in databases. Using a combination of machine learning, statistical analysis, modeling techniques and database technology, data mining finds patterns and subtle relationships in data and infers rules that allow the prediction of future results. Typical applications include market segmentation, customer profiling, fraud detection, evaluation of retail promotions, and credit risk analysis. Law enforcement agencies deal with mass data to investigate the crime and its amount is increasing due to the development of processing the data by using computer. Now new challenge to discover knowledge in that data is confronted to us. It can be applied in criminal investigation to find offenders by analysis of complex and relational data structures and free texts using their criminal records or statement texts. This study was aimed to evaluate possibile application of data mining and its limitation in practical criminal investigation. Clustering of the criminal cases will be possible in habitual crimes such as fraud and burglary when using data mining to identify the crime pattern. Neural network modelling, one of tools in data mining, can be applied to differentiating suspect's photograph or handwriting with that of convict or criminal profiling. A case study of in practical insurance fraud showed that data mining was useful in organized crimes such as gang, terrorism and money laundering. But the products of data mining in criminal investigation should be cautious for evaluating because data mining just offer a clue instead of conclusion. The legal regulation is needed to control the abuse of law enforcement agencies and to protect personal privacy or human rights.

  • PDF

The Intelligent Determination Model of Audience Emotion for Implementing Personalized Exhibition (개인화 전시 서비스 구현을 위한 지능형 관객 감정 판단 모형)

  • Jung, Min-Kyu;Kim, Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.39-57
    • /
    • 2012
  • Recently, due to the introduction of high-tech equipment in interactive exhibits, many people's attention has been concentrated on Interactive exhibits that can double the exhibition effect through the interaction with the audience. In addition, it is also possible to measure a variety of audience reaction in the interactive exhibition. Among various audience reactions, this research uses the change of the facial features that can be collected in an interactive exhibition space. This research develops an artificial neural network-based prediction model to predict the response of the audience by measuring the change of the facial features when the audience is given stimulation from the non-excited state. To present the emotion state of the audience, this research uses a Valence-Arousal model. So, this research suggests an overall framework composed of the following six steps. The first step is a step of collecting data for modeling. The data was collected from people participated in the 2012 Seoul DMC Culture Open, and the collected data was used for the experiments. The second step extracts 64 facial features from the collected data and compensates the facial feature values. The third step generates independent and dependent variables of an artificial neural network model. The fourth step extracts the independent variable that affects the dependent variable using the statistical technique. The fifth step builds an artificial neural network model and performs a learning process using train set and test set. Finally the last sixth step is to validate the prediction performance of artificial neural network model using the validation data set. The proposed model is compared with statistical predictive model to see whether it had better performance or not. As a result, although the data set in this experiment had much noise, the proposed model showed better results when the model was compared with multiple regression analysis model. If the prediction model of audience reaction was used in the real exhibition, it will be able to provide countermeasures and services appropriate to the audience's reaction viewing the exhibits. Specifically, if the arousal of audience about Exhibits is low, Action to increase arousal of the audience will be taken. For instance, we recommend the audience another preferred contents or using a light or sound to focus on these exhibits. In other words, when planning future exhibitions, planning the exhibition to satisfy various audience preferences would be possible. And it is expected to foster a personalized environment to concentrate on the exhibits. But, the proposed model in this research still shows the low prediction accuracy. The cause is in some parts as follows : First, the data covers diverse visitors of real exhibitions, so it was difficult to control the optimized experimental environment. So, the collected data has much noise, and it would results a lower accuracy. In further research, the data collection will be conducted in a more optimized experimental environment. The further research to increase the accuracy of the predictions of the model will be conducted. Second, using changes of facial expression only is thought to be not enough to extract audience emotions. If facial expression is combined with other responses, such as the sound, audience behavior, it would result a better result.