• Title/Summary/Keyword: Value of Data

Search Result 16,834, Processing Time 0.048 seconds

Adsorption Characteristics of Brilliant Green by Coconut Based Activated Carbon : Equilibrium, Kinetic and Thermodynamic Parameter Studies (야자계 입상 활성탄에 의한 brilliant green의 흡착 특성 : 평형, 동력학 및 열역학 파라미터에 관한 연구)

  • Lee, Jong-Jib
    • Clean Technology
    • /
    • v.25 no.3
    • /
    • pp.198-205
    • /
    • 2019
  • The adsorption equilibrium, kinetic, and thermodynamic parameters of brilliant green adsorbed by coconut based granular activated carbon were determined from various initial concentrations ($300{\sim}500mg\;L^{-1}$), contact time (1 ~ 12 h), and adsorption temperature (303 ~ 323 K) through batch experiments. The equilibrium adsorption data were analyzed by Langmuir, Freundlich, Temkin, Harkins-Jura, and Elovich isotherm models. The estimated Langmuir dimensionless separation factor ($R_L=0.018{\sim}0.040$) and Freundlich constant ($n^{-1}=0.176{\sim}0.206$) show that adsorption of brilliant green by activated carbon is an effective treatment process. Adsorption heat constants ($B=12.43{\sim}17.15J\;mol^{-1}$) estimated by the Temkin equation corresponded to physical adsorption. The isothermal parameter ($A_{HJ}$) by the Harkins-Jura equation showed that the heterogeneous pore distribution increased with increasing temperature. The maximum adsorption capacity by the Elovich equation was found to be much smaller than the experimental value. The adsorption process was best described by the pseudo second order model, and intraparticle diffusion was a rate limiting step in the adsorption process. The intraparticle diffusion rate constant increased because the dye activity increased with increases in the initial concentration. Also, as the initial concentration increased, the influence of the boundary layer also increased. Negative Gibbs free energy ($-10.3{\sim}-11.4kJ\;mol^{-1}$), positive enthalpy change ($18.63kJ\;mol^{-1}$), and activation energy ($26.28kJ\;mol^{-1}$) indicate respectively that the adsorption process is spontaneous, endothermic, and physical adsorption.

A Study on the Development of Human Resource Factors in the Service Economy Era (서비스경제시대 인재상요소 개발에 관한 연구)

  • Baek, Kyeonghui;Kim, Hyunsoo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.572-586
    • /
    • 2021
  • With the advent of the 4th Industrial Revolution, the modern economy is transforming into a service-oriented economic society, and there is a growing need for companies to reorganize organizational culture, values, and human resources to suit the changing environment. Especially, even when times change, human capital is the most important factor in maintaining sustainable development and Corporate value, since all work is done by people. Therefore, in this study, in order to recognize the importance of human resources and verify the appropriate human resources for the changing service economy era, we reviewed the literature and that drew the human resources suitable for the recent service economy era Based on this, an empirical study was conducted on whether the suggested human resources factors were useful. To this end, a feasibility analysis, reliability analysis, correlation analysis, confirmatory factor analysis, and reference validity were conducted by dividing into a preliminary survey and a main survey. As a result, it was finally drawn with 30 items, 7 factors. The results of this study are expected to be used as basic data in various fields of research on human resources in the service economy era, and in-depth empirical studies are needed in the future.

Estimation of Multi-Route Exposure and Aggregated Risk Assessment for Cadmium and Lead (카드뮴과 납의 다경로 노출량 추정 및 통합 위해성 평가)

  • Yu, Changwoo;Kwon, Hoonjeong
    • Journal of Food Hygiene and Safety
    • /
    • v.35 no.6
    • /
    • pp.587-601
    • /
    • 2020
  • Exposure to hazardous substances occurs through multiple pathways. Aggregated risk assessment, which includes all potential exposure pathways to a single toxicant, is necessary to prevent exposure to harmful substances. We aimed to estimate cadmium and lead exposure through various media, such as food, water, air, smoking, cosmetics, and female hygiene products. This study covered 10,733 subjects from the Seventh Korea National Health and Nutrition Examination Survey(2016, 2017). Dietary exposure was estimated using 24-hour recall data. For water and inhalational exposure, regional variations were considered. Water was classified as tap, bottled, and public water. Inhalational exposure was estimated using the '2014 Time Use Survey' based on daily lifestyle and social status. The frequency and volume of cosmetic usage were randomly approximated by sex and age. Post-menarcheal and premenopausal women were assumed to use feminine hygiene products. Non-carcinogenic aggregated risks were estimated using the Aggregate Risk Index from EPAs and the Total Exposure Hazard Index from Korean government guidelines. For carcinogenic risk assessment, excessive cancer risk was estimated. Ingestion, especially food, was the major route for both cadmium and lead exposure. Smoking was also associated with high cadmium exposure. Exposure to lead from cosmetics was remarkable but not critical. In aggregate risk assessments, median cadmium and lead exposure did not exceed the reference value. Sex, age, smoking status, and income affected exposure levels, unlike to regional variations.

Design and implementation of smart card-based multi-authentication mechanism for digital contents delivery (디지털콘텐츠 유통을 위한 스마트카드기반의 다중인증처리방법설계 및 구현)

  • Kim, Yong;Lee, Tae-Young
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.1
    • /
    • pp.23-46
    • /
    • 2002
  • With explosively increasing digital contents, library and Information center should have a new role between knowledge providers and knowledge users as information brokering organization. Electronic transaction system should be required for performing this brokering service since economic value is added to information and knowledge in information society. The developments and changes around library are keeping up with increasing building digital library and digitalizing printed sources. With the rapidly changing circumstances, the Internet is currently witnessing an explosive growth. By serving as a virtual information resource. the Internet can dramatically change the way business is conducted and Information is provided. However because of features o( the Internet like openness and information sharing, it has fundamental vulnerabilities in security issues. For Instance, disclosure of private information and line eavesdropping such as password, banking account, transaction data on network and so on are primary obstruction factors to activation of digital contents delivery on network. For high network security and authentication, this paper looks at smart card technologies and proposes multi-authentication protocol based on smart card on open network, implements and analyzes it.

Mutual Authentication Mechanism for Secure Group Communications in Sensor Network (센서 네트워크에서의 안전한 그룹통신을 위한 상호 인증 기법)

  • Ko, Hye-Young;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.6
    • /
    • pp.441-450
    • /
    • 2010
  • Recently, a lot of interest is increased in sensor network which gathers various data through many sensor nodes deployed in wired and wireless network environment. However, because of the limitation in memory, computation, and energy of the sensor nodes, security problem is very important issue. In sensor network, not only the security problem, but also computing power should be seriously considered. In this paper, considering these characteristics, we make the sensor network consist of normal sensor nodes and clusterheaders with enough space and computing power, and propose a group key rekeying scheme adopting PCGR(Predistribution and local Collaborationbased Group Rekeying) for secure group communication. In our proposal, we enhance the security by minimizing the risk to safety of the entire network through verifying the new key value from clusterheader by sensor nodes. That is, to update the group keys, clusterheaders confirm sensor nodes through verifying the information from sensor nodes and send the new group keys back to authentic member nodes. The group keys sent back by the clusterheaders are verified again by sensor nodes. Through this mutual authentication, we can check if clusterheaders are compromised or not. Qualnet simulation result shows that our scheme not only guarantees secure group key rekeying but also decreasesstorage and communication overhead.

An Access Control Method Based on a Synthesized Metric from Trust and Risk Factors for Online Social Networks (신뢰도와 위험도로부터 합성된 지표에 기반을 둔 온라인 소셜 네트워크를 위한 접근 제어 방법)

  • Seo, Yang-Jin;Han, Sang-Yong
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.15-26
    • /
    • 2010
  • Social Networks such as 'Facebook' and 'Myspace' are regarded as useful tools for people to share interests and maintain or expand relationships with other people. However, they pose the risk that personal information can be exposed to other people without explicit permission from the information owner. Therefore, we need a solution for this problem. Although existing social network sites allow users to specify the exposing range or users who can access their personal information, this cannot be a practical solution because the information can still be revealed to third parties through the permitted users albeit unintentionally. Usually, people allow the access of unknown person to personal data in online social networks and this implies the possibility of information leakage. We could use an access control method based on trust value, but this has the limitation that it cannot reflect the quantitative risk of information leakage. As a solution to this problem, this paper proposes an access control method based on a synthesized metric from trust and risk factors. Our various experiments show that the risk of information leakage can play an important role in the access control of online social networks.

Gesture Spotting by Web-Camera in Arbitrary Two Positions and Fuzzy Garbage Model (임의 두 지점의 웹 카메라와 퍼지 가비지 모델을 이용한 사용자의 의미 있는 동작 검출)

  • Yang, Seung-Eun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.2
    • /
    • pp.127-136
    • /
    • 2012
  • Many research of hand gesture recognition based on vision system have been conducted which enable user operate various electronic devices more easily. 3D position calculation and meaningful gesture classification from similar gestures should be executed to recognize hand gesture accurately. A simple and cost effective method of 3D position calculation and gesture spotting (a task to recognize meaningful gesture from other similar meaningless gestures) is described in this paper. 3D position is achieved by calculation of two cameras relative position through pan/tilt module and a marker regardless with the placed position. Fuzzy garbage model is proposed to provide a variable reference value to decide whether the user gesture is the command gesture or not. The reference is achieved from fuzzy command gesture model and fuzzy garbage model which returns the score that shows the degree of belonging to command gesture and garbage gesture respectively. Two-stage user adaptation is proposed that off-line (batch) adaptation for inter-personal difference and on-line (incremental) adaptation for intra-difference to enhance the performance. Experiment is conducted for 5 different users. The recognition rate of command (discriminate command gesture) is more than 95% when only one command like meaningless gesture exists and more than 85% when the command is mixed with many other similar gestures.

Enhancing Throughput and Reducing Network Load in Central Bank Digital Currency Systems using Reinforcement Learning (강화학습 기반의 CBDC 처리량 및 네트워크 부하 문제 해결 기술)

  • Yeon Joo Lee;Hobin Jang;Sujung Jo;GyeHyun Jang;Geontae Noh;Ik Rae Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.129-141
    • /
    • 2024
  • Amidst the acceleration of digital transformation across various sectors, the financial market is increasingly focusing on the development of digital and electronic payment methods, including currency. Among these, Central Bank Digital Currencies (CBDC) are emerging as future digital currencies that could replace physical cash. They are stable, not subject to value fluctuation, and can be exchanged one-to-one with existing physical currencies. Recently, both domestic and international efforts are underway in researching and developing CBDCs. However, current CBDC systems face scalability issues such as delays in processing large transactions, response times, and network congestion. To build a universal CBDC system, it is crucial to resolve these scalability issues, including the low throughput and network overload problems inherent in existing blockchain technologies. Therefore, this study proposes a solution based on reinforcement learning for handling large-scale data in a CBDC environment, aiming to improve throughput and reduce network congestion. The proposed technology can increase throughput by more than 64 times and reduce network congestion by over 20% compared to existing systems.

Influence of the Job Performance upon the Hair beautician's Job Satisfaction (헤어미용인의 직무만족이 직무성과에 미치는 영향)

  • Bang, Hee-Bong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.12
    • /
    • pp.8585-8595
    • /
    • 2015
  • This study was implemented to amass and analyze the data from 500 Seoul district beauty shop workers, which came from the use of the SPSS18.0. The statistical analysis was conducted through frequency for demographic characteristics, validity for factors analysis by using Varimax rotation, and reliability for Cronbach's alpha coefficient.. Also, the analysis was once again analyzed through the Pearson correlation coefficient, where our hypothesis was proven through regression analysis. Our research results have shown that, first, job satisfaction and job performance differed over matters like gender, age, education level, employment conditions, job category, overall work experience, daily work hours, and monthly income. Second, job satisfaction was shown to have a significant influence on job performance, where higher job satisfaction levels led to higher job performance. Thus, job satisfaction was a great factor to increase job performance by fulfilling their needs level. Also, they would act more positive and future-oriented when they have special needs like motivate achievement, wage, promotion, and reward. Therefore, managerial staff should continually develop any programs in order to upgrade beautician's job performance through their job satisfaction.

Implementation on SVM based Step Detection Analyzer (SVM 기반의 걸음 검출 분석기의 구현)

  • An, Kyung Ho;Kim, En Tae;Ryu, Uk Jae;Chang, Yun Seok
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.10
    • /
    • pp.1147-1155
    • /
    • 2013
  • In this study, we designed and implemented a step detection analyzer that can compare and analyze the step detection rates and results among the step detection algorithms. The step detection analyzer converts 3-axes accelerometer data into continuous energy stream through SVM operation, shows the horizontal comparison among the step detection results for each step detection algorithms, and can make elemental detection analyses. For these processes, the step detection analyzer presents the continuous energy stream as energy waveform, checks the peak values and time location of the detected steps with step detection algorithms, and gives visual interface to get some possible causes in cases of step detection miss. It can also give the threshold graph for each algorithm to check the threshold value on missed cases directly and can help to get more appropriate threshold values or other adjustable parameters in step detection algorithm. This step detection analyzer can be applied efficiently on performance enhancement of step detection algorithm, on deciding an appropriate algorithm for a specific step counter system in the various step counter filed operations.