• Title/Summary/Keyword: Service System

Search Result 18,891, Processing Time 0.087 seconds

Analysis of Behavior due to Tendon Damage for Maintenance of PSC I Girder Bridge (PSC I 거더교 유지관리를 위한 긴장재 손상에 따른 거동 분석)

  • Jongho Park;Jinwoong Choi
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.28 no.2
    • /
    • pp.53-60
    • /
    • 2024
  • Prestressed concrete (PSC) bridges are vulnerable to corrosion and fracture of tendons, and in particular, structures using the internal post-tensioned with grouted system have difficulties in maintenance due to limitations of inspection. In this study, the actual behavior of PSC I girder bridge was analyzed according to tendon damage. The target PSC I girder bridge, an decommissioned highway bridge of upper and lower bridges, had the service period of 33 years and 20 years, respectively. Deflection and concrete strain were measured according to the location of damaged tendon and loading method. Regardless of the age of the bridge, its structural performance decreased when the damaged tendon was closer to the center of the girder. The change in behavior increased as the truck load approached to the girder where the tendon cut. If the load was applied to the adjacent girder where the tendon was cut, the structural performance was likely to be maintained due to the influence of the entire structural system. The change in deflection was difficult to observe visually, while the concrete strain exceeded the cracking strain. Therefore, it is recommended that future monitoring and inspection of PSC I girder bridges should focus on concrete strain or cracking.

Study of Korea Import and Export networks and Cohesion Analysis (SNA를 이용한 국내 수출입 네트워크 구조와 응집성 분석)

  • Joo-Hye Kim;Jeong-Min Lee;Kim Yul-Seong
    • Journal of Navigation and Port Research
    • /
    • v.48 no.3
    • /
    • pp.181-191
    • /
    • 2024
  • Ports play a crucial role in the complex global supply chain. While many researchers have used social network analysis (SNA) to study active networks, there is a lack of SNA cohesion analysis specifically related to logistics and trade. Therefore, this study aims to identify time-series structural changes in all domestic import and export logistics networks, including regions, ports, and airports, by utilizing techniques such as k-core and community analysis. To carry out this analysis, we rely on data from the Korea Customs Service's Import and Export Logistics Statistical Yearbook spanning from 2004 to 2022. The findings from the k-core and community analysis indicate that the cohesion of the domestic import and export logistics network has continuously strengthened over time. Moreover, it reveals that regions, ports, and airports are becoming more cohesive and homogeneous, with Busan Port emerging as the central hub of a large community. These insights are expected to enhance our understanding of global logistics dynamics and contribute to the development of policies and sustainable import and export logistics processes.

A study on smart inspection technologies and maintenance system for tunnel (터널 스마트 점검기술 및 유지관리 제도 분석에 관한 연구)

  • Jee-Hee Jung;Kang-Hyun Lee;Sangrae Lee;Bumsik Hwang;Nag-Young Kim
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.25 no.6
    • /
    • pp.569-582
    • /
    • 2023
  • In recent years, the service life of major SOC facilities in south korea has exceeded 30 years, and rapid aging is expected within the next 10 years. This has led to a growing recognition of the need for proactive maintenance of these facilities. Consequently, there have been numerous research efforts to introduce smart inspection technologies into maintenance. However, the current system relies primarily on manpower for safety inspections and diagnostics, and on-site surveys rely on visual inspections. Manpower inspections can be time-consuming, and subjective errors may occur during result analysis. In the case of tunnels, there are disadvantages, such as the loss of social overhead capital due to partial closures during inspections. Therefore, institutionalizing smart safety inspections is essential, considering specific measures like using advanced equipment and updating qualifications for experts. Furthermore, it is necessary to verify and validate safety inspection results using advanced equipment before instituting changes. This could be achieved through national-level official research programs and the operation of verification and validation institutions. If smart inspection technology is introduced into maintenance, routine inspections of SOC facilities, such as tunnels, will become feasible. As a result, maintenance technology capable of early detection and proactive response to safety incidents caused by changes in facility conditions is anticipated.

Research on Training and Implementation of Deep Learning Models for Web Page Analysis (웹페이지 분석을 위한 딥러닝 모델 학습과 구현에 관한 연구)

  • Jung Hwan Kim;Jae Won Cho;Jin San Kim;Han Jin Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.517-524
    • /
    • 2024
  • This study aims to train and implement a deep learning model for the fusion of website creation and artificial intelligence, in the era known as the AI revolution following the launch of the ChatGPT service. The deep learning model was trained using 3,000 collected web page images, processed based on a system of component and layout classification. This process was divided into three stages. First, prior research on AI models was reviewed to select the most appropriate algorithm for the model we intended to implement. Second, suitable web page and paragraph images were collected, categorized, and processed. Third, the deep learning model was trained, and a serving interface was integrated to verify the actual outcomes of the model. This implemented model will be used to detect multiple paragraphs on a web page, analyzing the number of lines, elements, and features in each paragraph, and deriving meaningful data based on the classification system. This process is expected to evolve, enabling more precise analysis of web pages. Furthermore, it is anticipated that the development of precise analysis techniques will lay the groundwork for research into AI's capability to automatically generate perfect web pages.

An Expert System for the Estimation of the Growth Curve Parameters of New Markets (신규시장 성장모형의 모수 추정을 위한 전문가 시스템)

  • Lee, Dongwon;Jung, Yeojin;Jung, Jaekwon;Park, Dohyung
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.4
    • /
    • pp.17-35
    • /
    • 2015
  • Demand forecasting is the activity of estimating the quantity of a product or service that consumers will purchase for a certain period of time. Developing precise forecasting models are considered important since corporates can make strategic decisions on new markets based on future demand estimated by the models. Many studies have developed market growth curve models, such as Bass, Logistic, Gompertz models, which estimate future demand when a market is in its early stage. Among the models, Bass model, which explains the demand from two types of adopters, innovators and imitators, has been widely used in forecasting. Such models require sufficient demand observations to ensure qualified results. In the beginning of a new market, however, observations are not sufficient for the models to precisely estimate the market's future demand. For this reason, as an alternative, demands guessed from those of most adjacent markets are often used as references in such cases. Reference markets can be those whose products are developed with the same categorical technologies. A market's demand may be expected to have the similar pattern with that of a reference market in case the adoption pattern of a product in the market is determined mainly by the technology related to the product. However, such processes may not always ensure pleasing results because the similarity between markets depends on intuition and/or experience. There are two major drawbacks that human experts cannot effectively handle in this approach. One is the abundance of candidate reference markets to consider, and the other is the difficulty in calculating the similarity between markets. First, there can be too many markets to consider in selecting reference markets. Mostly, markets in the same category in an industrial hierarchy can be reference markets because they are usually based on the similar technologies. However, markets can be classified into different categories even if they are based on the same generic technologies. Therefore, markets in other categories also need to be considered as potential candidates. Next, even domain experts cannot consistently calculate the similarity between markets with their own qualitative standards. The inconsistency implies missing adjacent reference markets, which may lead to the imprecise estimation of future demand. Even though there are no missing reference markets, the new market's parameters can be hardly estimated from the reference markets without quantitative standards. For this reason, this study proposes a case-based expert system that helps experts overcome the drawbacks in discovering referential markets. First, this study proposes the use of Euclidean distance measure to calculate the similarity between markets. Based on their similarities, markets are grouped into clusters. Then, missing markets with the characteristics of the cluster are searched for. Potential candidate reference markets are extracted and recommended to users. After the iteration of these steps, definite reference markets are determined according to the user's selection among those candidates. Then, finally, the new market's parameters are estimated from the reference markets. For this procedure, two techniques are used in the model. One is clustering data mining technique, and the other content-based filtering of recommender systems. The proposed system implemented with those techniques can determine the most adjacent markets based on whether a user accepts candidate markets. Experiments were conducted to validate the usefulness of the system with five ICT experts involved. In the experiments, the experts were given the list of 16 ICT markets whose parameters to be estimated. For each of the markets, the experts estimated its parameters of growth curve models with intuition at first, and then with the system. The comparison of the experiments results show that the estimated parameters are closer when they use the system in comparison with the results when they guessed them without the system.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

An Empirical Study on the Influencing Factors for Big Data Intented Adoption: Focusing on the Strategic Value Recognition and TOE Framework (빅데이터 도입의도에 미치는 영향요인에 관한 연구: 전략적 가치인식과 TOE(Technology Organizational Environment) Framework을 중심으로)

  • Ka, Hoi-Kwang;Kim, Jin-soo
    • Asia pacific journal of information systems
    • /
    • v.24 no.4
    • /
    • pp.443-472
    • /
    • 2014
  • To survive in the global competitive environment, enterprise should be able to solve various problems and find the optimal solution effectively. The big-data is being perceived as a tool for solving enterprise problems effectively and improve competitiveness with its' various problem solving and advanced predictive capabilities. Due to its remarkable performance, the implementation of big data systems has been increased through many enterprises around the world. Currently the big-data is called the 'crude oil' of the 21st century and is expected to provide competitive superiority. The reason why the big data is in the limelight is because while the conventional IT technology has been falling behind much in its possibility level, the big data has gone beyond the technological possibility and has the advantage of being utilized to create new values such as business optimization and new business creation through analysis of big data. Since the big data has been introduced too hastily without considering the strategic value deduction and achievement obtained through the big data, however, there are difficulties in the strategic value deduction and data utilization that can be gained through big data. According to the survey result of 1,800 IT professionals from 18 countries world wide, the percentage of the corporation where the big data is being utilized well was only 28%, and many of them responded that they are having difficulties in strategic value deduction and operation through big data. The strategic value should be deducted and environment phases like corporate internal and external related regulations and systems should be considered in order to introduce big data, but these factors were not well being reflected. The cause of the failure turned out to be that the big data was introduced by way of the IT trend and surrounding environment, but it was introduced hastily in the situation where the introduction condition was not well arranged. The strategic value which can be obtained through big data should be clearly comprehended and systematic environment analysis is very important about applicability in order to introduce successful big data, but since the corporations are considering only partial achievements and technological phases that can be obtained through big data, the successful introduction is not being made. Previous study shows that most of big data researches are focused on big data concept, cases, and practical suggestions without empirical study. The purpose of this study is provide the theoretically and practically useful implementation framework and strategies of big data systems with conducting comprehensive literature review, finding influencing factors for successful big data systems implementation, and analysing empirical models. To do this, the elements which can affect the introduction intention of big data were deducted by reviewing the information system's successful factors, strategic value perception factors, considering factors for the information system introduction environment and big data related literature in order to comprehend the effect factors when the corporations introduce big data and structured questionnaire was developed. After that, the questionnaire and the statistical analysis were performed with the people in charge of the big data inside the corporations as objects. According to the statistical analysis, it was shown that the strategic value perception factor and the inside-industry environmental factors affected positively the introduction intention of big data. The theoretical, practical and political implications deducted from the study result is as follows. The frist theoretical implication is that this study has proposed theoretically effect factors which affect the introduction intention of big data by reviewing the strategic value perception and environmental factors and big data related precedent studies and proposed the variables and measurement items which were analyzed empirically and verified. This study has meaning in that it has measured the influence of each variable on the introduction intention by verifying the relationship between the independent variables and the dependent variables through structural equation model. Second, this study has defined the independent variable(strategic value perception, environment), dependent variable(introduction intention) and regulatory variable(type of business and corporate size) about big data introduction intention and has arranged theoretical base in studying big data related field empirically afterwards by developing measurement items which has obtained credibility and validity. Third, by verifying the strategic value perception factors and the significance about environmental factors proposed in the conventional precedent studies, this study will be able to give aid to the afterwards empirical study about effect factors on big data introduction. The operational implications are as follows. First, this study has arranged the empirical study base about big data field by investigating the cause and effect relationship about the influence of the strategic value perception factor and environmental factor on the introduction intention and proposing the measurement items which has obtained the justice, credibility and validity etc. Second, this study has proposed the study result that the strategic value perception factor affects positively the big data introduction intention and it has meaning in that the importance of the strategic value perception has been presented. Third, the study has proposed that the corporation which introduces big data should consider the big data introduction through precise analysis about industry's internal environment. Fourth, this study has proposed the point that the size and type of business of the corresponding corporation should be considered in introducing the big data by presenting the difference of the effect factors of big data introduction depending on the size and type of business of the corporation. The political implications are as follows. First, variety of utilization of big data is needed. The strategic value that big data has can be accessed in various ways in the product, service field, productivity field, decision making field etc and can be utilized in all the business fields based on that, but the parts that main domestic corporations are considering are limited to some parts of the products and service fields. Accordingly, in introducing big data, reviewing the phase about utilization in detail and design the big data system in a form which can maximize the utilization rate will be necessary. Second, the study is proposing the burden of the cost of the system introduction, difficulty in utilization in the system and lack of credibility in the supply corporations etc in the big data introduction phase by corporations. Since the world IT corporations are predominating the big data market, the big data introduction of domestic corporations can not but to be dependent on the foreign corporations. When considering that fact, that our country does not have global IT corporations even though it is world powerful IT country, the big data can be thought to be the chance to rear world level corporations. Accordingly, the government shall need to rear star corporations through active political support. Third, the corporations' internal and external professional manpower for the big data introduction and operation lacks. Big data is a system where how valuable data can be deducted utilizing data is more important than the system construction itself. For this, talent who are equipped with academic knowledge and experience in various fields like IT, statistics, strategy and management etc and manpower training should be implemented through systematic education for these talents. This study has arranged theoretical base for empirical studies about big data related fields by comprehending the main variables which affect the big data introduction intention and verifying them and is expected to be able to propose useful guidelines for the corporations and policy developers who are considering big data implementationby analyzing empirically that theoretical base.

A Comparison of the Characteristics of Maritally Violent Men in a Community Sample and Batterers in the Criminal Justice System (지역사회의 폭력남편과 가정폭력범죄 행위자들의 특성 비교)

  • Chang, Hee-Suk
    • Korean Journal of Social Welfare
    • /
    • v.58 no.4
    • /
    • pp.141-168
    • /
    • 2006
  • The present study explored and compared the risk factors of two subtypes of maritally violent men with those of a nonviolent comparison group. One type of batterers consisted of a community sample, and the other was sought from the criminal justice system. The identities of the male community batterers were not exposed to the society since their victims did not contact any of the social service agents related to domestic violence. To identify the different characteristics associated with two subtypes of woman abusers, a total of 152 nonviolent men, 82 male community batterers, and 336 offenders in a criminal justice system were considered. The results of the descriptive analysis showed that the level of physical violence of the community batterers was two times lower than that of the batterers who received legal punishments. The results of the multinominal logistic regression were as follows: (1) The variables that distinguished the male community batterers from the nonviolent men were the use of physical violence towards children, marital decision power, and income. (2) Four factors had been found to distinguish batterers in the criminal justice system from nonbatterers, namely: attitudes towards woman battering, education, violence towards children, and level of jealousy. (3) The community batterers showed a higher level of education and of stress as well as a longer period of marital relationship compared to the batterers in the criminal justice system. On the other hand, the batterers who received legal punishments had more severe alcohol problems and had an accepting attitude towards the use of violence. This study also investigated psychopathology among batterers using MCMI-III, based on 333 subjects. In terms of the mean scores, there were no subscales associated with personality pathology in all the male groups. Based on the logit model, the community batterers showed a stronger tendency towards having a passive-aggressive personality than did their counterparts, and they recorded a higher level of narcissism compared to the court-referred battering men. Post-traumatic stress was the only symptom that distinguished the batterers who received legal punishments from the other groups. The theoretical and practical implications of these results were pointed out and discussed in the paper.

  • PDF

Isolation of Polysaccharides Modulating Mouse’s Intestinal Immune System from Peels of Citrus unshiu (귤피로부터 분리한 마우스의 장관면역 활성 다당류의 검색)

  • Yang, Hyun-Seuk;Yu, Kwang-Won;Choi, Yang-Mun
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.33 no.9
    • /
    • pp.1476-1485
    • /
    • 2004
  • Of solvent-extracts prepared from the 90 kinds of Korean traditional tea and rice gruel plants, cold-water extract from peels of Citrus unshiu (CUI-0) showed the most potent intestinal immune system modulating activity through Peyer’s patch whereas other extracts did not have the activity except for cold-water extracts of Laminaria japonica, Polygonatum japonicum, Poncirus trifoliata, and hot-water extracts of Gardenia jasminoides, Lycium chinense having intermediate activity. CUI-0 was further fractionated into MeOH-soluble fraction (CUI-1), MeOH insoluble and EtOH-soluble fraction (CUI-2), and crude polysaccharide fraction (CUI-3). Among these fractions, CUI-3 showed the most potent stimulating activity for the proliferation of bone marrow cells mediated by Peyer’s patch cells, and contained arabinose, galacturonic acid, galactose, glucose, glucuronic acid and rhamnose (molar ratio; 1.00:0.53:0.45:0.28:0.28:0.19) as the major sugars, and a small quantity of protein (9.4%). In treatments of CUI-3 with pronase and periodate (NaIO₄), the intestinal immune system modulating activity of CUI-3 was significantly reduced, and the activity of CUI-3 was affected by periodate oxidation particularly. The potently active carbohydrate-rich fraction, CUI-3IIb-3-2 was further purified by anion-exchange chromatography on DEAE-Sepharose FF, Sepharose CL-6B and Sephacryl S-200. CUI-3IIb-3-2 was eluted as a single peak on HPLC and its molecular weight was estimated to be 18,000 Da. CUI-3IIb-3-2 was consisted mainly of arabinose, galactose, rhamnose, galacturonic acid and glucuronic acid (molar ratio;1.00:0.54:0.28:1.45:0.63) in addition to a small amount of proteins (3.2%). In addition, CUI-3IIb-3-2 showed the activity only through Peyer’s patch cells, but this fraction did not directly stimulate proliferation of bone marrow cells. It may be concluded that intestinal immune system modulating activity of peels from C. unshiu is caused by pectic polysaccharides having a polygalacturonan moiety with neutral sugars such as arabinose and galactose.

A Collaborative Video Annotation and Browsing System using Linked Data (링크드 데이터를 이용한 협업적 비디오 어노테이션 및 브라우징 시스템)

  • Lee, Yeon-Ho;Oh, Kyeong-Jin;Sean, Vi-Sal;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.3
    • /
    • pp.203-219
    • /
    • 2011
  • Previously common users just want to watch the video contents without any specific requirements or purposes. However, in today's life while watching video user attempts to know and discover more about things that appear on the video. Therefore, the requirements for finding multimedia or browsing information of objects that users want, are spreading with the increasing use of multimedia such as videos which are not only available on the internet-capable devices such as computers but also on smart TV and smart phone. In order to meet the users. requirements, labor-intensive annotation of objects in video contents is inevitable. For this reason, many researchers have actively studied about methods of annotating the object that appear on the video. In keyword-based annotation related information of the object that appeared on the video content is immediately added and annotation data including all related information about the object must be individually managed. Users will have to directly input all related information to the object. Consequently, when a user browses for information that related to the object, user can only find and get limited resources that solely exists in annotated data. Also, in order to place annotation for objects user's huge workload is required. To cope with reducing user's workload and to minimize the work involved in annotation, in existing object-based annotation automatic annotation is being attempted using computer vision techniques like object detection, recognition and tracking. By using such computer vision techniques a wide variety of objects that appears on the video content must be all detected and recognized. But until now it is still a problem facing some difficulties which have to deal with automated annotation. To overcome these difficulties, we propose a system which consists of two modules. The first module is the annotation module that enables many annotators to collaboratively annotate the objects in the video content in order to access the semantic data using Linked Data. Annotation data managed by annotation server is represented using ontology so that the information can easily be shared and extended. Since annotation data does not include all the relevant information of the object, existing objects in Linked Data and objects that appear in the video content simply connect with each other to get all the related information of the object. In other words, annotation data which contains only URI and metadata like position, time and size are stored on the annotation sever. So when user needs other related information about the object, all of that information is retrieved from Linked Data through its relevant URI. The second module enables viewers to browse interesting information about the object using annotation data which is collaboratively generated by many users while watching video. With this system, through simple user interaction the query is automatically generated and all the related information is retrieved from Linked Data and finally all the additional information of the object is offered to the user. With this study, in the future of Semantic Web environment our proposed system is expected to establish a better video content service environment by offering users relevant information about the objects that appear on the screen of any internet-capable devices such as PC, smart TV or smart phone.