• Title/Summary/Keyword: Suitability Model

Search Result 757, Processing Time 0.025 seconds

Designing an evaluation model for cyber security management system implementation for companies participating in the automobile supply chain (based on ISO/SAE 21434 standard and TISAX assessment requirements) (자동차 공급망 참여기업 대상 사이버보안 관리체계 구현 평가모델설계 (ISO/SAE 21434 표준 및 TISAX 평가 요구사항을 기반으로))

  • Baek Eun Ho
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.49-59
    • /
    • 2022
  • Cyber security in the automobile sector is a key factor in the life cycle of automobiles, and cyber security evaluation standards are being strengthened worldwide. In addition, not only manufacturers who design and produce automobiles, but also due to the nature of automobiles consisting of complex components and various parts, the safety of cybersecurity can be secured only when the implementation level of the cybersecurity management system of companies participating in the entire supply chain is evaluated and managed. In this study, I analyzed the requirements of ISO/SAE 21434 and TISAX, which are representative standards for evaluating automotive cybersecurity. Through a survey conducted on domestic/overseas company security officers and related experts, suitability and feasibility were reviewed according to priorities and industries, so 6 areas and 45 evaluation criteria were derived and presented as final evaluation items. This study is meaningful as a study in that it presented a model that allows companies participating in the automotive supply chain to evaluate the current cybersecurity management level of the company by first applying ISO/SAE 21434 and TISAX overall control processes before uniformly introducing them.

A Study on Water Demand Forecasting Methods Applicable to Developing Country (개발도상국에 적용 가능한 물수요 예측 방법 연구)

  • Sung-Uk Kim;Kye-Won Jun;Wan-Seop Pi;Jong-Ho Choi
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.4
    • /
    • pp.75-84
    • /
    • 2023
  • Many developing countries face challenges in estimating long-term discharge due to the lack of hydrological data for water supply planning, making it difficult to establish a rational water supply plan for decision-making on water distribution. The study area, the Bandung region in Indonesia, is experiencing rapid urbanization and population concentration, leading to a severe shortage of freshwater. The absence of water reservoir prediction methods has resulted in a water supply rate of approximately 20%. In this study, we aimed to propose an approach for predicting water reservoirs in developing countries by analyzing water safety and potential water supply using the MODSIM (Modified SIMYLD) network model. To assess the suitability of the MODSIM model, we applied the unit hydrograph method to calculate long-term discharge based on 19 years of discharge data (2002-2020) from the Pataruman observation station. The analysis confirmed alignment with the existing monthly optimal operation curve. The analysis of power plant capacity revealed a difference of approximately 0.30% to 0.50%, and the water intake safety at the Pataruman point showed 1.64% for Q95% flow and 0.47% for Q355 flow higher. Operational efficiency, compared to the existing reservoir optimal operation curve, was measured at around 1%, confirming the potential of using the MODSIM network model for water supply evaluation and the need for water supply facilities.

Analysis-based Pedestrian Traffic Incident Analysis Based on Logistic Regression (로지스틱 회귀분석 기반 노인 보행자 교통사고 요인 분석)

  • Siwon Kim;Jeongwon Gil;Jaekyung Kwon;Jae seong Hwang;Choul ki Lee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.2
    • /
    • pp.15-31
    • /
    • 2024
  • The characteristics of elderly traffic accidents were identified by reflecting the situation of the elderly population in Korea, which is entering an ultra-aging society, and the relationship between independent and dependent variables was analyzed by classifying traffic accidents of serious or higher and traffic accidents of minor or lower in elderly pedestrian traffic accidents using binomial variables. Data collection, processing, and variable selection were performed by acquiring data from the elderly pedestrian traffic accident analysis system (TAAS) for the past 10 years (from 13 to 22 years), and basic statistics and analysis by accident factors were performed. A total of 15 influencing variables were derived by applying the logistic regression model, and the influencing variables that have the greatest influence on the probability of a traffic accident involving severe or higher elderly pedestrians were derived. After that, statistical tests were performed to analyze the suitability of the logistic model, and a method for predicting the probability of a traffic accident according to the construction of a prediction model was presented.

Developing a Dental Unit Waterline Model Using General Laboratory Equipments (실험실 일반 장비를 이용한 치과용 유니트 수관 모델 개발)

  • Yoon, Hye Young;Lee, Si Young
    • Journal of dental hygiene science
    • /
    • v.16 no.4
    • /
    • pp.284-292
    • /
    • 2016
  • Water supplied through dental unit waterlines (DUWLs) has been shown to contain high number of bacteria. To reduce the contamination of DUWLs, it is essential to develop effective disinfectants. It is, however, difficulty to obtain proper DUWL samples for studies. The purpose of this study was to establish a simple laboratory model for reproducing DUWL biofilms. The bacteria obtained from DUWLs were cultured in R2A liquid medium for 10 days, and then stored at $-70^{\circ}C$. This stock was inoculated into R2A liquid medium and incubated in batch mode. After 5 days of culturing, it was inoculated into the biofilm formation model developed in this study. Our biofilm formation model comprised of a beaker containing R2A liquid medium and five glass rods attached to DUWL polyurethane tubing. Biofilm was allowed to form on the stir plate and the medium was replaced every 2 days. After 4 days of biofilm formation in the laboratory model, biofilm thickness, morphological characteristics and distribution of the composing bacteria were examined by confocal laser microscopy and scanning electron microscopy. The mean of biofilm accumulation was $4.68{\times}10^4$ colony forming unit/$cm^2$ and its thickness was $10{\sim}14{\mu}m$. In our laboratory model, thick bacterial lumps were observed in some parts of the tubing. To test the suitability of this biofilm model system, the effectiveness of disinfectants such as sodium hypochlorite, hydrogen peroxide, and chlorhexidine, was examined by their application to the biofilm formed in our model. Lower concentrations of disinfectants were less effective in reducing the count of bacteria constituting the biofilm. These results showed that our DUWL biofilm laboratory model was appropriate for comparison of disinfectant effects. Our laboratory model is expected to be useful for various other purposes in further studies.

Development and Application of Scientific Model Co-construction Program about Image Formation by Convex Lens (볼록렌즈가 상을 만드는 원리에 대한 과학적 모형의 사회적 구성 프로그램 개발 및 적용)

  • Park, Jeongwoo
    • Korean Journal of Optics and Photonics
    • /
    • v.28 no.5
    • /
    • pp.203-212
    • /
    • 2017
  • A scientific model refers to a conceptual system that can describe, explain, and predict a particular physical phenomenon. The co-construction of the scientific model is attracting attention as a new teaching and learning strategy in the field of science education and various studies. The evaluation and modification of models compared with the predicted models of data from the real world is the core of modeling strategy. However, there were only a limited data provided by the teacher in many studies of modeling comparing the students' predictions of their own models. Most of the students were not given the opportunity to evaluate the suitability of the model with the data in the real world. The purpose of this study was to develop a scientific model co-construction program that can evaluate the model by directly comparing the predicted models with the observed data from the real world. Through a collaborative discussion between teachers and researchers for 6 months, a 5-session scientific model co-construction program on the subject 'image formation by convex lenses' for second grade middle school students was developed. Eighty (80) students in 3 classes and a science teacher with 20 years of service from general public co-educational middle school in Gyeonggi-do participated in this 2-week program. After the class, students were asked about the helpfulness and difficulty of the class, and whether they would like to recommend this class to a friend. After the class, 95.8% of the students constructed the scientific model more than the model using the construction rule. Students had difficulties to identify principles or understand their friends, but the result showed that they could understand through model evaluation experiment. 92.5% of the students said that they would be more than willing to recommend this program to their friends. It is expected that the developed program will be applied to the school and contribute to the improvement of students' modeling ability and co-construction ability.

Development of Information Extraction System from Multi Source Unstructured Documents for Knowledge Base Expansion (지식베이스 확장을 위한 멀티소스 비정형 문서에서의 정보 추출 시스템의 개발)

  • Choi, Hyunseung;Kim, Mintae;Kim, Wooju;Shin, Dongwook;Lee, Yong Hun
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.111-136
    • /
    • 2018
  • In this paper, we propose a methodology to extract answer information about queries from various types of unstructured documents collected from multi-sources existing on web in order to expand knowledge base. The proposed methodology is divided into the following steps. 1) Collect relevant documents from Wikipedia, Naver encyclopedia, and Naver news sources for "subject-predicate" separated queries and classify the proper documents. 2) Determine whether the sentence is suitable for extracting information and derive the confidence. 3) Based on the predicate feature, extract the information in the proper sentence and derive the overall confidence of the information extraction result. In order to evaluate the performance of the information extraction system, we selected 400 queries from the artificial intelligence speaker of SK-Telecom. Compared with the baseline model, it is confirmed that it shows higher performance index than the existing model. The contribution of this study is that we develop a sequence tagging model based on bi-directional LSTM-CRF using the predicate feature of the query, with this we developed a robust model that can maintain high recall performance even in various types of unstructured documents collected from multiple sources. The problem of information extraction for knowledge base extension should take into account heterogeneous characteristics of source-specific document types. The proposed methodology proved to extract information effectively from various types of unstructured documents compared to the baseline model. There is a limitation in previous research that the performance is poor when extracting information about the document type that is different from the training data. In addition, this study can prevent unnecessary information extraction attempts from the documents that do not include the answer information through the process for predicting the suitability of information extraction of documents and sentences before the information extraction step. It is meaningful that we provided a method that precision performance can be maintained even in actual web environment. The information extraction problem for the knowledge base expansion has the characteristic that it can not guarantee whether the document includes the correct answer because it is aimed at the unstructured document existing in the real web. When the question answering is performed on a real web, previous machine reading comprehension studies has a limitation that it shows a low level of precision because it frequently attempts to extract an answer even in a document in which there is no correct answer. The policy that predicts the suitability of document and sentence information extraction is meaningful in that it contributes to maintaining the performance of information extraction even in real web environment. The limitations of this study and future research directions are as follows. First, it is a problem related to data preprocessing. In this study, the unit of knowledge extraction is classified through the morphological analysis based on the open source Konlpy python package, and the information extraction result can be improperly performed because morphological analysis is not performed properly. To enhance the performance of information extraction results, it is necessary to develop an advanced morpheme analyzer. Second, it is a problem of entity ambiguity. The information extraction system of this study can not distinguish the same name that has different intention. If several people with the same name appear in the news, the system may not extract information about the intended query. In future research, it is necessary to take measures to identify the person with the same name. Third, it is a problem of evaluation query data. In this study, we selected 400 of user queries collected from SK Telecom 's interactive artificial intelligent speaker to evaluate the performance of the information extraction system. n this study, we developed evaluation data set using 800 documents (400 questions * 7 articles per question (1 Wikipedia, 3 Naver encyclopedia, 3 Naver news) by judging whether a correct answer is included or not. To ensure the external validity of the study, it is desirable to use more queries to determine the performance of the system. This is a costly activity that must be done manually. Future research needs to evaluate the system for more queries. It is also necessary to develop a Korean benchmark data set of information extraction system for queries from multi-source web documents to build an environment that can evaluate the results more objectively.

An Analysis on Correlation of General Manager's Leadership of Hotel Employees - Based on Seoul's 2nd Deluxe Hotel - (호텔 총지배인리더십의 종사원 관리에 관한 중요도 분석 - 서울 특 2급 호텔을 중심으로 -)

  • Nam, Taeg-Yeong
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.10
    • /
    • pp.287-300
    • /
    • 2008
  • The purpose of this study is to show the optimal leadership model based on general manager management that is related to hotel employees, which may then be applied to ideal hotel management in Korea. The variables analyzed in this study are employee-management relations from the lowest ranking employee to the highest level of management, with communication and job understanding held common among the subjects. This study looks in detail at four main concepts. Firstly, the employees are encouraged to put forth their best efforts through the standardization of the requirements and regulations of the job and ensuring product suitability. Secondly, the cultivation of new hotel culture empowers the employees. The third point taken into account is the encouragement of employees to take pride in the work they do, which is done through a kind of reward system and salary. The final point considered is the empowerment of employees, which results in employee commitment to the job.

BUILDING INFORMATION MODELING (BIM)-BASED DESIGN OF ENERGY EFFICIENT BUILDINGS

  • Cho, Chung-Suk;Chen, Don;Woo, Sungkwon
    • Journal of KIBIM
    • /
    • v.2 no.1
    • /
    • pp.1-6
    • /
    • 2012
  • With the increased awareness of energy consumption as well as the environmental impact of building operations, architects, designers and planners are required to place more consideration on sustainability and energy performance of the building. To ensure most of those considerations are reflected in the building performance, critical design decisions should be made by key stakeholders early during the design development stage. The application of BIM during building energy simulations has profoundly improved the energy analysis process and thus this approach has gained momentum. However, despite rapid advances in BIM-based processes, the question still remains how ordinary building stakeholders can perform energy performance analysis, which has previously been conducted predominantly by professionals, to maximize energy efficient building performance. To address this issue, we identified two leading building performance analysis software programs, Energy Plus and IES (IES ), and compared their effectiveness and suitability as BIM-based energy simulation tools. To facilitate this study, we examined a case study on Building Performance Model (BPM) of a single story building with one door, multiple windows on each wall, a slab and a roof. We focused particularly on building energy performance by differing building orientation and window sizes and compared how effectively these two software programs analyzed the performance. We also looked at typical decision-making processes implementing building energy simulation program during the early design stages in the U.S. Finally, conclusions were drawn as to how to conduct BIM-based building energy performance evaluations more efficiently. Suggestions for further avenues of research are also made.

Determining Nursing Student Knowledge, Behavior and Beliefs for Breast Cancer and Breast Self-examination Receiving Courses with Two Different Approaches

  • Karadag, Mevlude;Iseri, Ozge;Etikan, Ilker
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.9
    • /
    • pp.3885-3890
    • /
    • 2014
  • Background: This study aimed to determine nursing student knowledge, behavior and beliefs for breast cancer and breast self-examination receiving courses with a traditional lecturing method (TLM) and the Six Thinking Hats method (STHM). Materials and Methods: The population of the study included a total of 69 second year nursing students, 34 of whom received courses with traditional lecturing and 35 of whom received training with the STHM, an active learning approach. The data of the study were collected pre-training and 15 days and 3 months post-training. The data collection tools were a questionnaire form questioning socio-demographic features, and breast cancer and breast self-examination (BSE) knowledge and the Champion's Health Belief Model Scale. The tests used in data analysis were chi-square, independent samples t-test and paired t-test. Results: The mean knowledge score following traditional lecturing method increased from $9.32{\pm}1.82$ to $14.41{\pm}1.94$ (P<0.001) and it increased from $9.20{\pm}2.33$ to $14.73{\pm}2.91$ after training with the Six Thinking Hats Method (P<0.001). It was determined that there was a significant increase in pre and post-training perceptions of perceived confidence in both groups. There was a statistically significant difference between pre-training, and 15 days and 3 months post-training frequency of BSE in the students trained according to STHM (p<0.05). On the other hand, there was a statistically significant difference between pre-training and 3 months post-training frequency of BSE in the students trained according to TLM. Conclusions: In both training groups, the knowledge of breast cancer and BSE, and the perception of confidence increased similarly. In order to raise nursing student awareness in breast cancer, either of the traditional lecturing method or the Six Thinking Hats Method can be chosen according to the suitability of the teaching material and resources.

Development of Indicators for Information Security Level Assessment of VoIP Service Providers

  • Yoon, Seokung;Park, Haeryong;Yoo, Hyeong Seon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.634-645
    • /
    • 2014
  • VoIP (Voice over Internet Protocol) is a technology of transmitting and receiving voice and data over the Internet network. As the telecommunication industry is moving toward All-IP environment with growth of broadband Internet, the technology is becoming more important. Although the early VoIP services failed to gain popularity because of problems such as low QoS (Quality of Service) and inability to receive calls as the phone number could not be assigned, they are currently established as the alternative service to the conventional wired telephone due to low costs and active marketing by carriers. However, VoIP is vulnerable to eavesdropping and DDoS (Distributed Denial of Service) attack due to its nature of using the Internet. To counter the VoIP security threats efficiently, it is necessary to develop the criterion or the model for estimating the information security level of VoIP service providers. In this study, we developed reasonable security indicators through questionnaire study and statistical approach. To achieve this, we made use of 50 items from VoIP security checklists and verified the suitability and validity of the assessed items through Multiple Regression Analysis (MRA) using SPSS 18.0. As a result, we drew 23 indicators and calculate the weight of each indicators using Analytic Hierarchy Process (AHP). The proposed indicators in this study will provide feasible and reliable data to the individual and enterprise VoIP users as well as the reference data for VoIP service providers to establish the information security policy.