• Title/Summary/Keyword: Performance Risk

Search Result 2,650, Processing Time 0.031 seconds

Exploratory Study on Enhancing Cyber Security for Busan Port Container Terminals (부산항 컨테이너 터미널 사이버 보안 강화를 위한 탐색적 연구)

  • Do-Yeon Ha;Yul-Seong Kim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.437-447
    • /
    • 2023
  • By actively adopting technologies from the Fourth Industrial Revolution, the port industry is trending toward new types of ports, such as automated and smart ports. However, behind the development of these ports, there is an increasing risk of cyber security incidents and threats within ports and container terminals, including information leakage through cargo handling equipment and ransomware attacks leading to disruptions in terminal operations. Despite the necessity of research to enhance cyber security within ports, there is a lack of such studies in the domestic context. This study focuses on Busan Port, a representative port in South Korea that actively incorporates technology from the Fourth Industrial Revolution, in order to discover variables for improving cyber security in container terminals. The research results categorized factors for enhancing cyber security in Busan Port's container terminals into network construction and policy support, standardization of education and personnel training, and legal and regulatory factors. Subsequently, multiple regression analysis was conducted based on these factors, leading to the identification of detailed factors for securing and enhancing safety, reliability, performance, and satisfaction in Busan Port's container terminals. The significance of this study lies in providing direction for enhancing cyber security in Busan Port's container terminals and addressing the increasing incidents of cyber security attacks within ports and container terminals.

Lock-up Expiration and VC Investments: Impact on Stock Prices (의무보유 종료와 VC투자가 주가에 미치는 영향)

  • Lee, Jinsuk;Hong, Min-Goo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.6
    • /
    • pp.133-145
    • /
    • 2023
  • This paper examines whether investors have adapted to the venture capital(VC) investment style. VC firms invest in privately held companies and generate returns by selling them after the lock-up period expires. We analyze the impact on stock prices before and after the lock-up period expiration, and compare the Cumulative Abnormal Return(CAR) between the past period(2015-2017) and the recent period(2020-2022) to investigate the effect of the second venture boom. The main findings are as follows. First, unlike in the past, stock price returns around the lock-up period expiration have been lower than the KOSDAQ index in recent years. Second, the impact on stock prices is significant for both 1-month and 12-month lock-up periods. Specifically, it is confirmed that stocks held by venture capital and professional investors with a 1-month lock-up period respond in advance to their information after the second venture boom. Finally, we find that there is a difference in CAR depending on whether or not the company received VC investment after the second venture boom. Based on our findings, we suggest that VC firms need to revise their exit strategies to improve performance. This includes finding ways to reduce information asymmetry and fees, as well as developing strategies to mitigate market volatility. Additionally, the current lock-up period for VCs should be reconsidered as it may increase the risk of stock price decline. We recommend that the government revise the scope and duration of lock-up periods to protect investors after IPO.

  • PDF

Research Trends in Neonatal Simulation Practice Education of Nursing Students (간호대학생의 신생아 시뮬레이션 실습교육 연구동향(2011년~2023년))

  • Sung Hee Choi;Sang Hee Kim;Sun Hui Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.215-224
    • /
    • 2024
  • The purpose of this study was to examine research trends related to neonatal simulation practice education of domestic nursing students. It was a descriptive research study. For literature collection, a total of 17 journals were selected as a result of a search using ('Newborn Simulation') AND ('Nursing Student' OR 'Nursing College Student' OR 'Student Nurse') in 6 domestic electronic databases. The research results showed that it started with 7 journals from 2011 to 2015 and decreased slightly to 5 journals from 2016 to 2020 and 5 journals from 2021 to 2023. The research design was mostly quantitative with a total of 16 journals(94%). Among them, there were 15 intervention journals(88%), 1 descriptive research journals(6%), and 1 mixed method journals(6%). The key topics in simulation practice were high-risk newborns with 9 journals(52%), respiratory distress syndrome in neonatal intensive care units appeared with 3 journals(18%), neonatal care with 3 journals(18%), normal newborn care with 1 journal(6%), and neonatal emergency airway care with 1 journals(6%). The main outcome variables were clinical performance, accounting for 5 journals(19.2%), followed by practice satisfaction 3 journals(11.5%). clinical competency and practice satisfaction were found to have significant positive effects. In conclusion, various research methods are required, such as expansion of nursing students' neonatal simulation practice education, repeated research, and qualitative research.

Evaluation method for interoperability of weapon systems applying natural language processing techniques (자연어처리 기법을 적용한 무기체계의 상호운용성 평가방법)

  • Yong-Gyun Kim;Dong-Hyen Lee
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.3
    • /
    • pp.8-17
    • /
    • 2023
  • The current weapon system is operated as a complex weapon system with various standards and protocols applied, so there is a risk of failure in smooth information exchange during combined and joint operations on the battlefield. The interoperability of weapon systems to carry out precise strikes on key targets through rapid situational judgment between weapon systems is a key element in the conduct of war. Since the Korean military went into service, there has been a need to change the configuration and improve performance of a large number of software and hardware, but there is no verification system for the impact on interoperability, and there are no related test tools and facilities. In addition, during combined and joint training, errors frequently occur during use after arbitrarily changing the detailed operation method and software of the weapon/power support system. Therefore, periodic verification of interoperability between weapon systems is necessary. To solve this problem, rather than having people schedule an evaluation period and conduct the evaluation once, AI should continuously evaluate the interoperability between weapons and power support systems 24 hours a day to advance warfighting capabilities. To solve these problems, To this end, preliminary research was conducted to improve defense interoperability capabilities by applying natural language processing techniques (①Word2Vec model, ②FastText model, ③Swivel model) (using published algorithms and source code). Based on the results of this experiment, we would like to present a methodology (automated evaluation of interoperability requirements evaluation / level measurement through natural language processing model) to implement an automated defense interoperability evaluation tool without relying on humans.

  • PDF

A Study on Selection of Bicycle Road Hazard Detection Elements For Mobile IoT Sensor Device Operation (이동형 IoT 센서 장비 운용을 위한 자전거도로 위험 감지요소 선정 연구)

  • Woochul Choi;Bong-Joo Jang;Sun-Kyum Kim;Intaek Jung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.4
    • /
    • pp.37-53
    • /
    • 2024
  • This study selected bicycle road hazard detection factors for mobile IoT sensor device operation and developed service application plans. Twelve bicycle road hazard detection factors were derived through a focused group interview, and a fuzzy AHP-based importance analysis was conducted on 30 road and transportation experts. As a result, 'damage to pavement' (1st overall) and 'environmental obstacle' (2nd) with low visibility but a high risk of accidents were selected the most. The factors in terms of facility management, such as 'disconnected route occurrence' (4th), 'artificial obstacle' (5th), 'effective width' (6th), and 'poor drainage' (7th), were selected as the upper and middle areas. Factors that are not direct accident-inducing factors, such as 'loss of road markings' (11th) and 'free space width' (12th), were selected the least. Based on this, a plan was presented to apply the bicycle road hazard detection service and a service operation strategy according to real-time performance. Nevertheless, follow-up studies, such as human behavioral analysis based on bicycle operators, analysis according to the bicycle road type, service demonstration, and pilot operation, will be needed to develop safe bicycle road management is expected.

Analysis of Drone Downwash and Droplet Deposition for Improved Aerial Spraying Efficiency in Agriculture (드론 방제 살포 효율 개선을 위한 하향풍 및 액적 퇴적 분포 분석)

  • Lee, Se-Yeon;Park, Jinseon;Lee, Chae-Rin;Choi, Lak-Yeong;Daniel Kehinde Favour;Park, Ji-Yeon;Hong, Se-Woon
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.66 no.5
    • /
    • pp.51-65
    • /
    • 2024
  • With the advancement of Unmanned Aerial Vehicles (UAV) technology, aerial spraying has been rapidly increasing in the agricultural field. Drones offer many advantages compared to traditional applicators, but they pose challenges such as spray drift risk and spray uniformity. To address these issues, it is essential to understand the characteristics of complex airflow generated by drones and its consequences for the spray performance. This study aims to identify the air velocity distribution of drone downwash and the resulting spray deposition distribution on the ground, ultimately proposing optimized spraying widths and criteria. Experiments were conducted using two agricultural drones with different propeller arrangements under various flight and measurement conditions. The results showed that during hovering, the downward airflow affected the area within a distance of the radius of the blade (R) from the center of the drone. When the drone was flying, the downward airflow was effective up to a distance of 2R. Droplet deposition was concentrated at the center of the drone during hovering. However, during flying, the droplet deposition was more evenly distributed up to the distance of R. The drone downwash and droplet deposition were significantly different during flying compared to the hovering state. At an effective spray width of 3R, the coefficient of variation (CV) was generally less than 16%, indicating a significant improvement in spray uniformity. These findings help optimize effective spraying techniques in drone-based applications.

The Causes of Conflict and the Effect of Control Mechanisms on Conflict Resolution between Manufacturer and Supplier (제조-공급자간 갈등 원인과 거래조정 방식의 갈등관리 효과)

  • Rhee, Jin Hwa
    • Journal of Distribution Research
    • /
    • v.17 no.4
    • /
    • pp.55-80
    • /
    • 2012
  • I. Introduction Developing the relationships between companies is very important issue to ensure a competitive advantage in today's business environment (Bleeke & Ernst 1991; Mohr & Spekman 1994; Powell 1990). Partnerships between companies are based on having same goals, pursuing mutual understanding, and having a professional level of interdependence. By having such a partnerships and cooperative efforts between companies, they will achieve efficiency and effectiveness of their business (Mohr and Spekman, 1994). However, it is difficult to expect these ideal results only in the B2B corporate transaction. According to agency theory which is the well-accepted theory in various fields of business strategy, organization, and marketing, the two independent companies have fundamentally different corporate purposes. Also there is a higher chance of developing opportunism and conflict due to natures of human(organization), such as self-interest, bounded rationality, risk aversion, and environment factor as imbalance of information (Eisenhardt 1989). That is, especially partnerships between principal(or buyer) and agent(or supplier) of companies within supply chain, the business contract itself will not provide competitive advantage. But managing partnership between companies is the key to success. Therefore, managing partnership between manufacturer and supplier, and finding causes of conflict are essential to improve B2B performance. In conclusion, based on prior researches and Agency theory, this study will clarify how business hazards cause conflicts on supply chain and then identify how developed conflicts have been managed by two control mechanisms. II. Research model III. Method In order to validate our research model, this study gathered questionnaires from small and medium sized enterprises(SMEs). In Korea, SMEs mean the firms whose employee is under 300 and capital is under 8 billion won(about 7.2 million dollar). We asked the manufacturer's perception about the relationship with the biggest supplier, and our key informants are denied to a person responsible for buying(ex)CEO, executives, managers of purchasing department, and so on). In detail, we contact by telephone to our initial sample(about 1,200 firms) and introduce our research motivation and send our questionnaires by e-mail, mail, and direct survey. Finally we received 361 data and eliminate 32 inappropriate questionnaires. We use 329 manufactures' data on analysis. The purpose of this study is to identify the anticipant role of business hazard (environmental dynamism, asset specificity) and investigate the moderating effect of control mechanism(formal control, social control) on conflict-performance relationship. To find out moderating effect of control methods, we need to compare the regression weight between low versus. high group(about level of exercised control methods). Therefore we choose the structural equation modeling method that is proper to do multi-group analysis. The data analysis is performed by AMOS 17.0 software, and model fits are good statically (CMIN/DF=1.982, p<.000, CFI=.936, IFI=.937, RMSEA=.056). IV. Result V. Discussion Results show that the higher environmental dynamism and asset specificity(on particular supplier) buyer(manufacturer) has, the more B2B conflict exists. And this conflict affect relationship quality and financial outcomes negatively. In addition, social control and formal control could weaken the negative effect of conflict on relationship quality significantly. However, unlikely to assure conflict resolution effect of control mechanisms on relationship quality, financial outcomes are changed by neither social control nor formal control. We could explain this results with the characteristics of our sample, SMEs(Small and Medium sized Enterprises). Financial outcomes of these SMEs(manufacturer or principal) are affected by their customer(usually major company) more easily than their supplier(or agent). And, in recent few years, most of companies have suffered from financial problems because of global economic recession. It means that it is hard to evaluate the contribution of supplier(agent). Therefore we also support the suggestion of Gladstein(1984), Poppo & Zenger(2002) that relational performance variable can capture the focal outcomes of relationship(exchange) better than financial performance variable. This study has some implications that it tests the sources of conflict and investigates the effect of resolution methods of B2B conflict empirically. And, especially, it finds out the significant moderating effect of formal control which past B2B management studies have ignored in Korea.

  • PDF

Beak Trimming Methods - Review -

  • Glatz, P.C.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.13 no.11
    • /
    • pp.1619-1637
    • /
    • 2000
  • A review was undertaken to obtain information on the range of beak-trimming methods available or under development. Beak-trimming of commercial layer replacement pullets is a common yet critical management tool that can affect the performance for the life of the flock. The most obvious advantage of beak-trimming is a reduction in cannibalism although the extent of the reduction in cannibalism depends on the strain, season, and type of housing, flock health and other factors. Beak-trimming also improves feed conversion by reducing food wastage. A further advantage of beak-trimming is a reduction in the chronic stress associated with dominance interactions in the flock. Beak-trimming of birds at 7-10 days is favoured by Industry but research over last 10 years has shown that beak-trimming at day-old causes the least stress on birds and efforts are needed to encourage Industry to adopt the practice of beak-trimming birds at day-old. Proper beak-trimming can result in greatly improved layer performance but improper beak-trimming can ruin an other wise good flock of hens. Re-trimming is practiced in most flocks, although there are some flocks that only need one trimming. Given the continuing welfare scrutiny of using a hot blade to cut the beak, attempts have been made to develop more welfare friendly methods of beak-trimming. Despite the developments in design of hot blade beak-trimmers the process has remained largely unchanged. That is, a red-hot blade cuts and cauterises the beak. The variables in the process are blade temperature, cauterisation time, operator ability, severity of trimming, age of trimming, strain of bird and beak length. This method of beak-trimming is still overwhelmingly favoured in Industry and there appears to be no other alternative procedures that are more effective. Sharp secateurs have been used trim the upper beak of both layers and turkeys. Bleeding from the upper mandible ceases shortly after the operation, and despite the regrowth of the beak a reduction of cannibalism has been reported. Very few differences have been noted between behaviour and production of the hot blade and cold blade cut chickens. This method has not been used on a large scale in Industry. There are anecdotal reports of cannibalism outbreaks in birds with regrown beaks. A robotic beak-trimming machine was developed in France, which permitted simultaneous, automated beak-trimming and vaccination of day-old chicks of up to 4,500 chickens per hour. Use of the machine was not successful because if the chicks were not loaded correctly they could drop off the line, receive excessive beak-trimming or very light trimming. Robotic beak-trimming was not effective if there was a variation in the weight or size of chickens. Capsaicin can cause degeneration of sensory nerves in mammals and decreases the rate of beak regrowth by its action on the sensory nerves. Capsaicin is a cheap, non-toxic substance that can be readily applied at the time of less severe beak-trimming. It suffers the disadvantage of causing an extreme burning sensation in operators who come in contact with the substance during its application to the bird. Methods of applying the substance to minimise the risk to operators of coming in contact with capsaicin need to be explored. A method was reported which cuts the beaks with a laser beam in day-old chickens. No details were provided on the type of laser used, or the severity of beak-trimming, but by 16 weeks the beaks of laser trimmed birds resembled the untrimmed beaks, but without the bill tip. Feather pecking and cannibalism during the laying period were highest among the laser trimmed hens. Currently laser machines are available that are transportable and research to investigate the effectiveness of beak-trimming using ablasive and coagulative lasers used in human medicine should be explored. Liquid nitrogen was used to declaw emu toes but was not effective. There was regrowth of the claws and the time and cost involved in the procedure limit the potential of using this process to beak-trim birds.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

Development and Validation of Predictive Model for Foodborne Pathogens in Preprocessed Namuls and Wild Root Vegetables (전처리 나물류 및 구근류에서 병원성 미생물의 성장예측모델 개발 및 검증)

  • Enkhjargal, Lkhagvasarnai;Min, Kyung Jin;Yoon, Ki Sun
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.42 no.10
    • /
    • pp.1690-1700
    • /
    • 2013
  • The objective of this study is to develop and validate predictive growth models for Bacillus cereus (diarrhea type) vegetative cells, spores and Staphylococcus aureus in preprocessed Namul (bracken and Chwinamul) and root vegetables (bellflower and burdock). For validation of model performance, growth data for S. aureus in preprocessed vegetables were collected at independent temperatures (18 and $30^{\circ}C$) not used in the model development. In addition, model performance of B. cereus (diarrhea type) in preprocessed vegetables was validated with an emetic type of B. cereus strain. In primary models, the specific growth rate (SGR) of the B. cereus spores was faster than that of the B. cereus vegetative cells, regardless of the kinds of vegetables at 24 and $35^{\circ}C$, while lag time (LT) of the B. cereus spores was longer than that of the B. cereus vegetative cells, except for burdock. The growth of B. cereus and S. aureus was not observed in bracken at temperatures lower than 13 and $8^{\circ}C$, respectively. The LT models for B. cereus (diarrhea type) in this study were suitable in predicting the growth of B. cereus (emetic type) on burdock and Chwinamul. On the other hand, SGR models for B. cereus (diarrhea type) were suitable for predicting the growth of B. cereus (emetic type) on all preprocessed vegetables. The developed models can be used to predict the risk of B. cereus and S. aureus in preprocessed Namul and root vegetables at the retail markets.