• Title/Summary/Keyword: Technology-oriented

Search Result 2,622, Processing Time 0.031 seconds

Implementation of Facility Movement Recognition Accuracy Analysis and Utilization Service using Drone Image (드론 영상 활용 시설물 이동 인식 정확도 분석 및 활용 서비스 구현)

  • Kim, Gwang-Seok;Oh, Ah-Ra;Choi, Yun-Soo
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.5
    • /
    • pp.88-96
    • /
    • 2021
  • Advanced Internet of Things (IoT) technology is being used in various ways for the safety of the energy industry. At the center of safety measures, drones play various roles on behalf of humans. Drones are playing a role in reaching places that are difficult to reach due to large-scale facilities and space restrictions that are difficult for humans to inspect. In this study, the accuracy and completeness of movement of dangerous facilities were tested using drone images, and it was confirmed that the movement recognition accuracy was 100%, the average data analysis accuracy was 95.8699%, and the average completeness was 100%. Based on the experimental results, a future-oriented facility risk analysis system combined with ICT technology was implemented and presented. Additional experiments with diversified conditions are required in the future, and ICT convergence analysis system implementation is required.

Design and Implementation of Method Generation based Watermarking Technique for Android Copyright Protection (안드로이드 저작권 보호를 위한 메소드 생성 기반 워터마킹 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.61-69
    • /
    • 2019
  • As smartphones become widespread, numerous applications are developed and social issues related to software copyright are emerging. Software watermarking is digital watermarking technology applied to software and is a technology that can be used to recognize copyright owners. Generally, Java language is used to develop applications on the Android environment. The Java is an object-oriented language that supports method overloading and overriding. In this paper, we propose and implement a method generation based watermarking technique. As a result of evaluating the overhead due to the watermark, it was confirmed that the increase of the executable file size and the decrease of the execution speed are not large. Using the watermarking technique proposed in this paper, it is expected that copyright information can be verified when illegal copying is suspected or actual program is stolen, and piracy attempts will be prevented in advance.

A Prediction System for Server Performance Management (서버 성능 관리를 위한 장애 예측 시스템)

  • Lim, Bock-Chool;Kim, Soon-Gohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.684-690
    • /
    • 2018
  • In society of the big data is being recognized as one of the core technologies witch is analysis of the collected information, the intelligent evolution of society seems to be more oriented society through an optimized value creation based on a prediction technique. If we take advantage of technologies based on big data about various data and a large amount of data generated during system operation, it will be possible to support stable operation and prevention of faults and failures. In this paper, we suggested an environment using the collection and analysis of big data, and proposed an derive time series prediction model for predicting failure through server performance monitoring for data collected and analyzed. It can be capable of supporting stable operation of the IT systems through failure prediction model for the server operator.

Image Denoising Via Structure-Aware Deep Convolutional Neural Networks (구조 인식 심층 합성곱 신경망 기반의 영상 잡음 제거)

  • Park, Gi-Tae;Son, Chang-Hwan
    • The Journal of Korean Institute of Information Technology
    • /
    • v.16 no.11
    • /
    • pp.85-95
    • /
    • 2018
  • With the popularity of smartphones, most peoples have been using mobile cameras to capture photographs. However, due to insufficient amount of lights in a low lighting condition, unwanted noises can be generated during image acquisition. To remove the noise, a method of using deep convolutional neural networks is introduced. However, this method still lacks the ability to describe textures and edges, even though it has made significant progress in terms of visual quality performance. Therefore, in this paper, the HOG (Histogram of Oriented Gradients) images that contain information about edge orientations are used. More specifically, a method of learning deep convolutional neural networks is proposed by stacking noise and HOG images into an input tensor. Experiment results confirm that the proposed method not only can obtain excellent result in visual quality evaluations, compared to conventional methods, but also enable textures and edges to be improved visually.

The Characteristic of Social Problem: Solving Research of Public Research Institute (사례연구를 통해 본 공공연구기관의 사회문제 해결형 연구개발: 자원순환형 음식물 쓰레기 처리 시스템 개발)

  • Song, Wichin;Kim, Sueun;Sung, Jieun
    • Journal of Science and Technology Studies
    • /
    • v.19 no.1
    • /
    • pp.53-90
    • /
    • 2019
  • The purpose of this study is to analyze a case of social problem- solving R&D project. The case is about a food waste disposer system built in housing complex The characteristics revealed through the case study are as follows. It has been performed by the 'Connect and Solution Development (C&SD)' strategy that could shorten the whole innovation process. In order to increase the economic and social acceptability of the system, researchers formed a dense network with citizens, firms and local governments and tried to improve existing law to make new markets for the system. Instead of developing a new system in a top-down approach, they chose to use existing technologies and entities to address social problems quicker and easier.

Roles of Regional Innovation Agencies and their Performance in Dortmund, Germany (지역혁신 지원기관의 역할과 성과: 독일 도르트문트시를 사례로)

  • Shin, Dong-Ho
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.21 no.4
    • /
    • pp.409-424
    • /
    • 2018
  • Since the 1950s, many of the traditional industrial cities of advanced economies in Europe and North America were affected by a series of de-industrialization. The de-industrialization process, characterized by company shut-downs and massive lay-offs, has resulted in high unemployment rates and massive redundancies in physical infrastructure. Since the 1980s, many of the old industrial cities have attempted to overcome such problems. However, it has been found that not many of the cities are found to be successful. The City of Dortmund, one of the core cities of the large German industrial conurbation of the past, the Ruhr, is found to be an exceptional case demonstrating a clear success in overcoming deindustrialization problems. The City in fact strategically pursued transforming backbone of its economy from steel-making, coal-mining and beer-brewery to high-technology and future-oriented industries, based on microsystems, biomedical, electronic logistics and information technology. This paper attempts to analyse the processes and outcomes of transforming Dortmund beginning from the 1980s to articulate the roles of the agencies contributing to the success.

Cyber Attacks and Appropriateness of Self-Defense (사이버 공격과 정당방위의 당위성)

  • Shin, Kyeong-Su
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.21-28
    • /
    • 2019
  • The emergence of a hyper-connected-super-intelligence society, called the era of the Fourth Industrial Revolution, brought about a new change in the security environment. With ICT (Information Communication Technology) convergence and high-tech technologies introduced across the board, the person-centered driving force that moved the real space is replaced by the code-oriented cyberspace, and its dependency is constantly increasing. Paradoxically, however, these technological changes serve as another security vulnerability that threatens our society, and have brought about the justification for building a cyber defense system while simultaneously facing the opportunities and challenges brought by technology. In this study, the theory of self-defense was put forward on the basis of the theoretical basis for actively responding to the increasingly intelligent and mass-evolving cyberattacks, and firstly, the need to enact a cybersecurity law, secondly, and thirdly, the need to develop a response cooperation system with the U.S. and other cyber powers.

Expectations and Anxieties Affecting Attitudes toward Artificial Intelligence Revolution (인공지능 혁신에 대한 기대와 불안 요인 및 영향 연구)

  • Rhee, Chang Seop;Rhee, Hyunjung
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.37-46
    • /
    • 2019
  • Humans have anxieties as well as expectations for artificial intelligence. This study attempted to identify the expectation and anxiety factors affecting the attitude toward artificial intelligence innovation and to ascertain how much influence they have on current artificial intelligence innovation. This study considered that attitudes toward artificial intelligence may be different for each generation sharing a similar technology change culture. Therefore, the researchers limited the research subjects to I generation, which is the main users of artificial intelligence in the future. As a main result, the factors of expectiation of 'performance gain', 'positive social impact', and the factor of anxiety of 'threat to human-oriented social value' were drawn, and these factors influenced weak and strong artificial intelligence respectively. The results of this study suggests that artificial intelligence should develop into a pleasant relationship with humankind.

Factors Influencing Overall Satisfaction of Middle Eastern Arab Patients in South Korea

  • Al-Farajat, Loai;Jung, Seong-Hoon;Gu, Gil-hwan;Seo, Young-Joon
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.216-224
    • /
    • 2019
  • The number of patients from Middle Eastern Arabic countries is steadily increasing in respect to the South Korean government's medical tourism strategies. Word of mouth is one of the main determinants concerning the Middle Eastern Arab patients' medical tourism destination. Further, patients' satisfaction affects repurchase and revisit intention. This study aimed to measure the level of Middle Eastern Arab patients' satisfaction, and to measure the effect of different medical factors on satisfaction in such patients who are seeking medical attention in South Korea. A 110 Middle Eastern Arab patients who visited South Korea for medical purposes participated in our survey between November, 2016 and April, 2017. All factors had a high mean (${\geq}4.24$; ${\geq}84.8/100$) except for one factor (hospital halal meals (3.82; 76.4)). To identify factors influencing participants' overall satisfaction we used multiple regression analysis. Physicians, interpreters, and halal meals were the main factors influencing overall Middle Eastern Arab patients' satisfaction. Physicians and interpreters in Korea are recommended to be oriented to basic Islamic beliefs and Middle Eastern Arab patients' behavior. Daily communication, such as speaking directly to the patient, limiting important issues to two or three at a time, and translating sentence by sentence, could help to improve Middle Eastern Arab patients' satisfaction. Enlisting Middle Eastern nutrition specialists in medical institutions in South Korea may substantially improve non-medical services satisfaction such as halal food and dietary restrictions.

Light and Shadow of Microservice Architecture (마이크로서비스 아키텍처의 빛과 그림자 마이크로서비스 아키텍처 적용 시 고려사항)

  • Yang, In-ho
    • The Korean Journal of Archival Studies
    • /
    • no.60
    • /
    • pp.283-315
    • /
    • 2019
  • The emergence of new business models software industry is demanding a change to technology that can cope quickly and flexibly. In this regard, microservices, which is being addressed as the architecture of the next-generation record management system, has emerged as an agile and convenient architecture. If record-management system with micro-service is developed, agility and expandability with basement of innovation can be ensured. The purpose of study is to suggest efficient ways when record-management system with micro-service is built. For this, tranditional architecture has been checked and main features of micro-service have been explained. Also, it was summarized that three points : 'Short history of micro-service', 'Maturity of technology' and 'Techical level of project team' have to be reviewed when record-management system with micro-service architecture is built. And we suggested some issues to consider when constructing the records management system applying microservices according to the domestic environment.