• Title/Summary/Keyword: Telecommuting

Search Result 72, Processing Time 0.023 seconds

Demand Prediction of Furniture Component Order Using Deep Learning Techniques (딥러닝 기법을 활용한 가구 부자재 주문 수요예측)

  • Kim, Jae-Sung;Yang, Yeo-Jin;Oh, Min-Ji;Lee, Sung-Woong;Kwon, Sun-dong;Cho, Wan-Sup
    • The Journal of Bigdata
    • /
    • v.5 no.2
    • /
    • pp.111-120
    • /
    • 2020
  • Despite the recent economic contraction caused by the Corona 19 incident, interest in the residential environment is growing as more people live at home due to the increase in telecommuting, thereby increasing demand for remodeling. In addition, the government's real estate policy is also expected to have a visible impact on the sales of the interior and furniture industries as it shifts from regulatory policy to the expansion of housing supply. Accurate demand forecasting is a problem directly related to inventory management, and a good demand forecast can reduce logistics and inventory costs due to overproduction by eliminating the need to have unnecessary inventory. However, it is a difficult problem to predict accurate demand because external factors such as constantly changing economic trends, market trends, and social issues must be taken into account. In this study, LSTM model and 1D-CNN model were compared and analyzed by artificial intelligence-based time series analysis method to produce reliable results for manufacturers producing furniture components.

A Study on the Current Status and Improvement of Online Classes for Students with Developmental Disabilities during the COVID-19 Pandemic -in chungbuk- (코로나19 상황 속 발달 장애 학생의 온라인 학습 실태와 개선방안 -충북지역을 중심으로-)

  • Kim, Hyun-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.350-358
    • /
    • 2021
  • The purpose of this study is to analyze the status of rights for online learning of students with developmental disabilities in the COVID-19 situation and suggest plans to promote the rights focusing on parents with children with disabilities. This research conducted the mixed method, which utilizes the survey of 200 parents with children in chungbuk, who have developmental disabilities, and FGI of six parents. The survey analysis shows that 50.5% of the respondents could not support their children due to telecommuting. The most urgent support system for learning assistance was identified as support for assistive personnel. As a result of the analysis of FGI, two categories of "status of online classes in the COVID-19," "improving non-contact learning environment considering the nurturing environment," "diversifying teaching methods such as video classes," "introducing of a contextual assessment," and "enhancing health support." Based on these findings, the study proposed to review legal grounds for online classes for disabled students, expand the dispatch of learning support personnel and prepare plans to promote the online learning environment.

Co-orientation Analysis of Workers' and Managers' Perceptions on Untact Work (비대면 근무에 대한 근로자와 관리자의 인식에 관한 상호지향성 분석)

  • Kwon, Hojung;Min, Daihwan
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.83-92
    • /
    • 2021
  • Recently many organizations have adopted 'untact' work due to social distancing caused by Coronavirus-19. To clarify some controversy about the effectiveness from 'untact' work, it is necessary to examine the cognition of organizational members. This study identified issues in 'untact' work from the literature review, analyzed the content of in-depth interviews with workers and managers experiencing 'untact' work, and compared both groups' cognition by applying the co-orientation model. Both groups pointed out the communication difficulty as the top disadvantage and showed no significant differences in job satisfaction, organizational commitment, and work-life balance. However, the two groups showed significant differences in their cognition about performance evaluation (agreement and workers' congruence) and productivity enhancement (workers' accuracy). This paper has an academic contribution in that it has focused on cognitive gaps between workers and managers, urges organizations to devise ways to reduce the gaps, and suggests future studies with quantitative approaches.

Interactive Visual Analytic Approach for Anomaly Detection in BGP Network Data (BGP 네트워크 데이터 내의 이상징후 감지를 위한 인터랙티브 시각화 분석 기법)

  • Choi, So-mi;Kim, Son-yong;Lee, Jae-yeon;Kauh, Jang-hyuk;Kwon, Koo-hyung;Choo, Jae-gul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.135-143
    • /
    • 2022
  • As the world has implemented social distancing and telecommuting due to the spread of COVID-19, real-time streaming sessions based on routing protocols have increased dependence on the Internet due to the activation of video and voice-related content services and cloud computing. BGP is the most widely used routing protocol, and although many studies continue to improve security, there is a lack of visual analysis to determine the real-time nature of analysis and the mis-detection of algorithms. In this paper, we analyze BGP data, which are powdered as normal and abnormal, on a real-world basis, using an anomaly detection algorithm that combines statistical and post-processing statistical techniques with Rule-based techniques. In addition, we present an interactive spatio-temporal analysis plan as an intuitive visualization plan and analysis result of the algorithm with a map and Sankey Chart-based visualization technique.

Machine Learning-Based Malicious URL Detection Technique (머신러닝 기반 악성 URL 탐지 기법)

  • Han, Chae-rim;Yun, Su-hyun;Han, Myeong-jin;Lee, Il-Gu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.555-564
    • /
    • 2022
  • Recently, cyberattacks are using hacking techniques utilizing intelligent and advanced malicious codes for non-face-to-face environments such as telecommuting, telemedicine, and automatic industrial facilities, and the damage is increasing. Traditional information protection systems, such as anti-virus, are a method of detecting known malicious URLs based on signature patterns, so unknown malicious URLs cannot be detected. In addition, the conventional static analysis-based malicious URL detection method is vulnerable to dynamic loading and cryptographic attacks. This study proposes a technique for efficiently detecting malicious URLs by dynamically learning malicious URL data. In the proposed detection technique, malicious codes are classified using machine learning-based feature selection algorithms, and the accuracy is improved by removing obfuscation elements after preprocessing using Weighted Euclidean Distance(WED). According to the experimental results, the proposed machine learning-based malicious URL detection technique shows an accuracy of 89.17%, which is improved by 2.82% compared to the conventional method.

A Study on the Utilization of Metaverse Space in Local Governments from the Perspective of Public Design (공공디자인의 관점에서 본 지자체의 메타버스 공간 활용에 관한 연구)

  • Choi, Jae-won;Yeo, Joon-ki
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.705-712
    • /
    • 2022
  • The pandemic over the past three years has brought drastic changes in our lives, and those changes are now becoming a natural part of our daily lives. Daily life and economic activities based on online, such as video conferencing, remote classes, telecommuting, and online streaming services, have become daily routines after Corona. And the result of rapid development of communication and graphic technology is the metaverse. Therefore, the purpose of this study is to study the possibility from the perspective of public design for the correct use of the metaverse space of local governments. To this end, in this study, big data analysis was performed on 'local government', 'public design', and 'metaverse'. As a result of this study, we should actively use metaverse with high topic and potential as a space for local governments' promotion or discussion as a means to restore the reliability of local governments and overcome negative perceptions. In addition, it is necessary to actively reflect public design in order to increase the public reliability of local governments' metaverse.

The Role of Job Autonomy Influencing on Creative Behavior in the Smart Work Context (스마트워크에서 직무자율성이 창의적 행위에 미치는 영향)

  • Yong-Young Kim
    • Journal of Industrial Convergence
    • /
    • v.21 no.4
    • /
    • pp.13-22
    • /
    • 2023
  • Due to COVID-19, organizations are rapidly changing the way they work by providing telecommuting and flexible work, and by expanding Smart Work spaces. In a Smart Work situation, workers have improved their job autonomy to choose their work methods, hours, and places. However, previous studies do not reflect the Smart Work situation and there are limitations to still using the previous job autonomy concept and measurements. To overcome these problems, this study derived job autonomy types such as methods, scheduling, criteria, time, and place applicable to Smart Work environments and verified that the five types of job autonomy have a statistically significant positive effect on Smart Workers' creative behavior. This study is meaningful in that it categorized job autonomy into five types applicable to Smart Work by adding temporal and spatial flexibility to the traditional job autonomy concept such as method, scheduling, and criteria autonomy and provided the basis for subdividing and evaluating the operation performance of Smart Work through multi-dimensional job autonomy verification.

A Study on the Application of Security Reinforcement Technology Reflecting Zero Trust Principles (제로 트러스트 원리를 반영한 보안 강화 요소 기술 적용 방안 연구)

  • DA-IN Lee;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.3-11
    • /
    • 2022
  • With increasingly sophisticated cyber threats, accelerating cloud adoption, and the adoption of remote and hybrid work environments due to the COVID-19 pandemic, the traditional security model, in which many businesses implicitly trust everything within their boundaries, is changing without boundaries, allowing data and users The concept of zero trust is getting more and more attention as the fact that it is not suitable for today's increasingly decentralized environment has been highlighted. Zero Trust is a cyber security model on the premise that 'no one trusts'. In principle, there is no safe area or user in the entire system, and internal users are also verified. is a way As telecommuting becomes commonplace due to the COVID-19 pandemic, and existing cyber security measures are facing limitations, Zero Trust technology is drawing more attention. Accordingly, it is expected that the Korean government will also check the status of acceptability of the domestic public and private sectors and tasks that need improvement when introducing Zero Trust with reference to the NIST standard. In this paper, the basic principles, philosophy, and considerations of Zero Trust and Zero Trust are explained, and practical basic measures to strengthen security by combining Zero Trust technology are presented.

Research on the Zero Trust Trend Analysis and Enterprise Security Enhancement (제로트러스트 동향 분석 및 기업 보안 강화 연구)

  • Min Gyu Kim;Chanyoung Kang;Sokjoon Lee
    • Smart Media Journal
    • /
    • v.12 no.5
    • /
    • pp.46-57
    • /
    • 2023
  • As the COVID-19 pandemic and the development of IT technology have led to the gradual popularization of remote and telecommuting, cloud computing technology is advancing, and cyber attack techniques are becoming more sophisticated and advanced. In response to these trends, companies are increasingly moving away from traditional perimeter-based security and adopting Zero Trust to strengthen their security. Zero Trust, based on the core principle of doubting and not trusting everything, identifies all traffic and grants access permissions through a strict authentication process to enhance security. In this paper, we analyze the background of Zero Trust adoption and the adoption policies and trends of countries that are proactively promoting its implementation. Additionally, we propose necessary efforts from governments and organizations to strengthen corporate security and considerations for companies when applying Zero Trust.

Effects of Commuting Distance Reduction by Teleworking on Carbon Dioxide Emission: Focusing on the Seoul Metropolitan Area (지역기반 원격근무를 통한 출근 통행거리 저감이 CO2 배출에 미치는 영향: 수도권 지역을 대상으로)

  • Kang, Jihan;Oh, Kyushik
    • Spatial Information Research
    • /
    • v.22 no.4
    • /
    • pp.89-102
    • /
    • 2014
  • The establishment and operation of Region-based Teleworking Centers(RTC) in Korea is in the initial stage at the moment. Although some studies have been conducted on telecommuting at home, few studies have been performed on the effects of all-out expansion and diffusion of region-based Teleworking Centers. Therefore, this study analyzed the reduction effect of commuting distance which is possible to obtain from the establishment of Teleworking Centers, based on the network in the Seoul Metropolitan Area, Subsequently, quantitative reduction of the effects of $CO_2$ were calculated from region-based Teleworking Centers. The results of the analysis indicated that region-based Teleworking Centers could reduce a total of 911 tons of $CO_2$ per day. When applying these results to 258 working days per year (according to Statistics Korea), 235,056 tons of $CO_2$ can be reduced annually by the establishment of Teleworking Centers. With quantity on environmental utility to be obtained from the establishment of Teleworking Centers, this study can be utilized as a guideline for selecting effective locations of Teleworking Centers in the future. It can also be helpful in decisions to determine the priority of extending operations of Teleworking Centers through comparisons among administrative districts.