• Title/Summary/Keyword: information collection system

Search Result 1,598, Processing Time 0.044 seconds

An Ethnographic Study about Taegyo Practice in Korea (태교 실천에 대한 일상생활 기술적 연구)

  • 김현옥
    • Journal of Korean Academy of Nursing
    • /
    • v.27 no.2
    • /
    • pp.411-422
    • /
    • 1997
  • The purpose of this study is twofold : (i) to investigate how much effort the married couples are making for the good health of both the pregnant woman and her unborn child from the time of their marriage to and during the period of conception : and (ii) to comprehensive investigate socio-cultural back-grounds which affect prenatal effort. Result of this study provide a basis for the prenatal care program which will be appropriate to our culture. This study has been done by the ethnographic research method. The subjects of this study are 53 people in all consisting of 33 pregnant women and 20 husbands. In order to investigate socio-cultural factors which influence Taegyo, producers of Taegyo music were interviewed. In addition the researcher surveyed the markets of Taegyo music, participated in special courses of prenatal education, analyzed the content of the books and periodicals dealing with Taegyo, and collected the concept of Taegyo distributed by the mass media. The full-fledged study continued for eight months from February to August.1996. The data were analyzed as soon as they were collected. Spradly's(1979, 1980) developmental, sequential method of domain analysis. taxonomic analysis, componential analysis, and theme analysis in this order was adopted as the procedure of analyzing the data. To obtain the exactness of study, Sandelowski's (1986) four criteria, that is, Credibility, Fittingness, Auditability, and Confirmability were applied to all stages of data collection, data analysis, the interpretation of the result, and the description of the result. The following are the result : 1. The couples' Taegyo at the stage of preconception was related to their physical, psychological, spiritual conditions under which a healthy baby will be born. Specific methods they prefer are : "the choice of one's spouse." "physical check-up," "physical good health, " "praying, " and so on. 2. When the marriod couple have sex in order to conceive, their Taegyo was related to the imposition of their physical, psychological, and environmental conditions. Specific methods they prefer are : "having sex at specific time, " "having sex in nice place." "to purify their minds while having sex," and so on. 3. The married couples' Taegyo while they are in pregnancy was related to the imposition of their physical. psychological, emotionmental. environmental, social and spiritual conditions. Specific methods they prefer are : "listening to music. " "reading," "looking at beautiful things only," "to avoid looking at or listening to bad things." "to eat food in good shape, " "to avoid drugs," "eating Korean herbal medicine." "sexual abstinence," "to avoid dangerous places," "to keep emotional tranquility," "moderate exercises and rest." "leading a pure life." "praying." "being aware of their words and behavior." "for the couple to keep a good relationship." "interaction with their unborn child," "to support Taegyo for pregnant women," and so on. 4. The married couple put Taegyo into practice on the basis of the following principles : the principle of respecting an unborn child, the principle of forming a good disposition. the principle of top-down parental love, the principle of synergy between a pregnant woman and her unborn child, the principle of expecting a good child, the principle of forming a good habit, and the principle of acquiring a parental role. 5. The practice of Taegyo is influenced by such factors as the married couple, the supporting system, and the mass media. As the husband -and-wife factor, their information of Taegyo, the degree of importance is assigned to their characters, their time to spare, their healthiness, the age of pregnant woman, their conception plan, their religion, their belief of the Taegyo effects, and the birth of a baby in this order. The factor of the supporting system consists of her husband's support, her family support, and her neighbor's support. The mass media factors include the broadcasting media, books specialized in Taegyo, periodicals for pregnant women, booklets for advertizing powdered milk, Taegyo music of record manufacturing companies, and the teaching materials for gifted children. Among these the mass media is especially taking advantage of Taegyo as its main source of economic profits are leading the public behavior pattern to a prodigal one. Taegyo is a self-control behavior which requires practice for the following : the physical and psychological good health of the pregnant woman and her unborn child, the development of the unborn child's good character, the development of the unborn child's intelligence and talents, the expectation of the unborn child's good features. shape a good habit, the expectation of the unborn child's bright future, and the learning of a parental role, the expectation of male birth. Above all it is a type of our good cultural tradition which pursues a value higher than the one that the prenatal care does. The principles of pregnancy care inherent in the habit of Taegyo will provide us a guideline for the development of the prenatal care.

  • PDF

Evaluation of the Utilization Potential of High-Resolution Optical Satellite Images in Port Ship Management: A Case Study on Berth Utilization in Busan New Port (고해상도 광학 위성영상의 항만선박관리 활용 가능성 평가: 부산 신항의 선석 활용을 대상으로)

  • Hyunsoo Kim ;Soyeong Jang ;Tae-Ho Kim
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_4
    • /
    • pp.1173-1183
    • /
    • 2023
  • Over the past 20 years, Korea's overall import and export cargo volume has increased at an average annual rate of approximately 5.3%. About 99% of the cargo is still being transported by sea. Due to recent increases in maritime cargo volume, congestion in maritime logistics has become challenging due to factors such as the COVID-19 pandemic and conflicts. Continuous monitoring of ports has become crucial. Various ground observation systems and Automatic Identification System (AIS) data have been utilized for monitoring ports and conducting numerous preliminary studies for the efficient operation of container terminals and cargo volume prediction. However, small and developing countries' ports face difficulties in monitoring due to environmental issues and aging infrastructure compared to large ports. Recently, with the increasing utility of artificial satellites, preliminary studies have been conducted using satellite imagery for continuous maritime cargo data collection and establishing ocean monitoring systems in vast and hard-to-reach areas. This study aims to visually detect ships docked at berths in the Busan New Port using high-resolution satellite imagery and quantitatively evaluate berth utilization rates. By utilizing high-resolution satellite imagery from Compact Advanced Satellite 500-1 (CAS500-1), Korea Multi-Purpose satellite-3 (KOMPSAT-3), PlanetScope, and Sentinel-2A, ships docked within the port berths were visually detected. The berth utilization rate was calculated using the total number of ships that could be docked at the berths. The results showed variations in berth utilization rates on June 2, 2022, with values of 0.67, 0.7, and 0.59, indicating fluctuations based on the time of satellite image capture. On June 3, 2022, the value remained at 0.7, signifying a consistent berth utilization rate despite changes in ship types. A higher berth utilization rate indicates active operations at the berth. This information can assist in basic planning for new ship operation schedules, as congested berths can lead to longer waiting times for ships in anchorages, potentially resulting in increased freight rates. The duration of operations at berths can vary from several hours to several days. The results of calculating changes in ships at berths based on differences in satellite image capture times, even with a time difference of 4 minutes and 49 seconds, demonstrated variations in ship presence. With short observation intervals and the utilization of high-resolution satellite imagery, continuous monitoring within ports can be achieved. Additionally, utilizing satellite imagery to monitor changes in ships at berths in minute increments could prove useful for small and developing country ports where harbor management is not well-established, offering valuable insights and solutions.

Effects of Customers' Relationship Networks on Organizational Performance: Focusing on Facebook Fan Page (고객 간 관계 네트워크가 조직성과에 미치는 영향: 페이스북 기업 팬페이지를 중심으로)

  • Jeon, Su-Hyeon;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.2
    • /
    • pp.57-79
    • /
    • 2016
  • It is a rising trend that the number of users using one of the social media channels, the Social Network Service, so called the SNS, is getting increased. As per to this social trend, more companies have interest in this networking platform and start to invest their funds in it. It has received much attention as a tool spreading and expanding the message that a company wants to deliver to its customers and has been recognized as an important channel in terms of the relationship marketing with them. The environment of media that is radically changing these days makes possible for companies to approach their customers in various ways. Particularly, the social network service, which has been developed rapidly, provides the environment that customers can freely talk about products. For companies, it also works as a channel that gives customized information to customers. To succeed in the online environment, companies need to not only build the relationship between companies and customers but focus on the relationship between customers as well. In response to the online environment with the continuous development of technology, companies have tirelessly made the novel marketing strategy. Especially, as the one-to-one marketing to customers become available, it is more important for companies to maintain the relationship marketing with their customers. Among many SNS, Facebook, which many companies use as a communication channel, provides a fan page service for each company that supports its business. Facebook fan page is the platform that the event, information and announcement can be shared with customers using texts, videos, and pictures. Companies open their own fan pages in order to inform their companies and businesses. Such page functions as the websites of companies and has a characteristic of their brand communities such as blogs as well. As Facebook has become the major communication medium with customers, companies recognize its importance as the effective marketing channel, but they still need to investigate their business performances by using Facebook. Although there are infinite potentials in Facebook fan page that even has a function as a community between users, which other platforms do not, it is incomplete to regard companies' Facebook fan pages as communities and analyze them. In this study, it explores the relationship among customers through the network of the Facebook fan page users. The previous studies on a company's Facebook fan page were focused on finding out the effective operational direction by analyzing the use state of the company. However, in this study, it draws out the structural variable of the network, which customer committment can be measured by applying the social network analysis methodology and investigates the influence of the structural characteristics of network on the business performance of companies in an empirical way. Through each company's Facebook fan page, the network of users who engaged in the communication with each company is exploited and it is the one-mode undirected binary network that respectively regards users and the relationship of them in terms of their marketing activities as the node and link. In this network, it draws out the structural variable of network that can explain the customer commitment, who pressed "like," made comments and shared the Facebook marketing message, of each company by calculating density, global clustering coefficient, mean geodesic distance, diameter. By exploiting companies' historical performance such as net income and Tobin's Q indicator as the result variables, this study investigates influence on companies' business performances. For this purpose, it collects the network data on the subjects of 54 companies among KOSPI-listed companies, which have posted more than 100 articles on their Facebook fan pages during the data collection period. Then it draws out the network indicator of each company. The indicator related to companies' performances is calculated, based on the posted value on DART website of the Financial Supervisory Service. From the academic perspective, this study suggests a new approach through the social network analysis methodology to researchers who attempt to study the business-purpose utilization of the social media channel. From the practical perspective, this study proposes the more substantive marketing performance measurements to companies performing marketing activities through the social media and it is expected that it will bring a foundation of establishing smart business strategies by using the network indicators.

Extension Method of Association Rules Using Social Network Analysis (사회연결망 분석을 활용한 연관규칙 확장기법)

  • Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.111-126
    • /
    • 2017
  • Recommender systems based on association rule mining significantly contribute to seller's sales by reducing consumers' time to search for products that they want. Recommendations based on the frequency of transactions such as orders can effectively screen out the products that are statistically marketable among multiple products. A product with a high possibility of sales, however, can be omitted from the recommendation if it records insufficient number of transactions at the beginning of the sale. Products missing from the associated recommendations may lose the chance of exposure to consumers, which leads to a decline in the number of transactions. In turn, diminished transactions may create a vicious circle of lost opportunity to be recommended. Thus, initial sales are likely to remain stagnant for a certain period of time. Products that are susceptible to fashion or seasonality, such as clothing, may be greatly affected. This study was aimed at expanding association rules to include into the list of recommendations those products whose initial trading frequency of transactions is low despite the possibility of high sales. The particular purpose is to predict the strength of the direct connection of two unconnected items through the properties of the paths located between them. An association between two items revealed in transactions can be interpreted as the interaction between them, which can be expressed as a link in a social network whose nodes are items. The first step calculates the centralities of the nodes in the middle of the paths that indirectly connect the two nodes without direct connection. The next step identifies the number of the paths and the shortest among them. These extracts are used as independent variables in the regression analysis to predict future connection strength between the nodes. The strength of the connection between the two nodes of the model, which is defined by the number of nodes between the two nodes, is measured after a certain period of time. The regression analysis results confirm that the number of paths between the two products, the distance of the shortest path, and the number of neighboring items connected to the products are significantly related to their potential strength. This study used actual order transaction data collected for three months from February to April in 2016 from an online commerce company. To reduce the complexity of analytics as the scale of the network grows, the analysis was performed only on miscellaneous goods. Two consecutively purchased items were chosen from each customer's transactions to obtain a pair of antecedent and consequent, which secures a link needed for constituting a social network. The direction of the link was determined in the order in which the goods were purchased. Except for the last ten days of the data collection period, the social network of associated items was built for the extraction of independent variables. The model predicts the number of links to be connected in the next ten days from the explanatory variables. Of the 5,711 previously unconnected links, 611 were newly connected for the last ten days. Through experiments, the proposed model demonstrated excellent predictions. Of the 571 links that the proposed model predicts, 269 were confirmed to have been connected. This is 4.4 times more than the average of 61, which can be found without any prediction model. This study is expected to be useful regarding industries whose new products launch quickly with short life cycles, since their exposure time is critical. Also, it can be used to detect diseases that are rarely found in the early stages of medical treatment because of the low incidence of outbreaks. Since the complexity of the social networking analysis is sensitive to the number of nodes and links that make up the network, this study was conducted in a particular category of miscellaneous goods. Future research should consider that this condition may limit the opportunity to detect unexpected associations between products belonging to different categories of classification.

Germination Characteristics of Chinese Milk Vetch(Astragalus sinicus L.) Seeds Produced in China and Korea (수입 및 국내 채종 자운영 종자의 발아 특성)

  • Kim, Sang-Yeol;Oh, Seong-Hwan;Choi, Kyung-Jin;Park, Sung-Tae;Kim, Jeong-Il;Yeo, Un-Sang;Kang, Hang-Won
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.54 no.4
    • /
    • pp.384-389
    • /
    • 2009
  • Germination characteristics of Chinese milk vetch(CMV) seeds produced from Hanam Province, China and Milyang, Korea were investigated to give basic information on the stability of seedling establishment in the CMV cultivation. The germination percentage of the imported CMV seed from China varied according to importation year and seed collection site ranging from 79~95%. The germination of black colored seed coat was lower than the light green colored ones and germination by seed weight was not significantly different. Although the seed germination was lower under dark than in the presence of light, it was not significantly different. The germination of the imported CMV seed slightly declined to only less than 6% after one-year of storage under natural environment conditions but it significantly decreased after two years. However, when the seed was stored at the $5^{\circ}C$, the seed germination was the same as after two years of storage. On the other hand, fresh CMV seed produced in Milyang, Korea had only 8% germination due to seed coat dormancy but the germination increased to 73~85% after breaking seed dormancy after a year of storage. The high germination percentage of 72~82% was still maintained even after 27 months of seed storage unlike the CMV seed produced from China. These results indicate that CMV seeds do not require light for germination and the seed from China should be used within one-year after importation while the seeds produced from Korea can be used even after two years from harvest for stable CMV seedling establishment in the CMV-rice cropping system.

Distribution of Microorganisms in Perilla Leaf and Cultivation Area (들깻잎과 생산환경의 미생물 분포)

  • Kim, Se-Ri;Lee, Ji-Young;Lee, Seo-Hyun;Ko, Hyeon-Seok;Yoon, Yo-Han;Kwon, Se-Hyeok;Ryu, Kyoung-Yul;Yun, Hye-Jeong;Kim, Won-Il;Yun, Jong-Chul;Kim, Doo-Ho;Chung, Duck-Hwa
    • Korean Journal of Food Science and Technology
    • /
    • v.43 no.2
    • /
    • pp.243-248
    • /
    • 2011
  • The prevalence and distribution of hazardous microorganisms were investigated from the major perilla cultivation area at Milyang, Gyeongnam province, Korea. Aerobic plate count (APC) and coliform count of perilla leaves were 4.82 log CFU/g and 3.85 log CFU/g, respectively. E. coli, S. aureus and B. cereus were detected in 3.0% (4/114), 7.9% (9/114) and 46.5% (53/114) of examined perilla leaves. However, E. coli O157:H7, Salmonella spp, and L. monocytogenes were not detected. The distribution of hazardous microorganisms in perilla leaf cultivation environment were compared and the concentration of APC and coliform counts were more than 3.0 log CFU/(mL, g, $100cm^2$, hand) from most of the samples. S. aureus were detected from irrigation water, packing table, packing vinyl, hand, and clothes. Also, B. cereus was frequently detected from the examined samples. Especially, packing table and collection container were contaminated with maximum 5.5 log $CFU/100cm^2$ of B. cereus. Good Agricultural Practice (GAP) system should be introduced to farms to enhance the safety of perilla leaves.

End-use analysis of household water by metering (가정용수의 용도별 사용량 조사 및 원단위 분석)

  • Kim, Hwa-Soo;Lee, Doo-Jin;Kim, Ju-Whan;Kim, Jung-Hyun;Jung, Kwan-Soo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2008.05a
    • /
    • pp.869-877
    • /
    • 2008
  • The purpose of this study is to investigate the trends and patterns of variou kind of water uses in a household by metering in Korea. Water use components are classified by toilet, washbowl, bathing, laundry, kitchen, etc. Flow meters are installed in 146 household selected by sampling in all around Korea. The data are gathered by web-based data collection system from the year 2002 to 2006, considering pre-investigated data such as occupation, revenue, family members, housing types, age, floor area, water saving devices, education, etc. Reliable data are selected by upper fence method for each observed water use component and statistical characteristics are estimated for each residential type to determine liter per capita per day. Estimated domestic per capita day show an indoor water use with the range from $150{\ell}pcd$ to $169{\ell}pcd$ for each housing type as the order of high rise apartment, multi-house, and single house. As the order of consuming amount among water use components, it is investigated that toilet($38.5{\ell}pcd$) is the first, and the second is laundry water($30.8{\ell}pcd$), the third is kitchen($28.4{\ell}pcd$), the fourth is bathtub($24.7{\ell}pcd$), the next is washbowl($15.4{\ell}pcd$). The results are compared with water uses in U.K. and U.S. As life style has been changed into western style, pattern of water use in Korea is tend to be similar with the U.S. water use pattern. Compared with the surveying results by Bradley, on 1985. Thirty liter of total use increased with the advancement of economic level, and a little change of water use pattern can be found. Especially, toilet water take almost half part of total water use and laundry water shows lowest as 11% in surveying at the year of 1985. But, this study shows that 39 liter, 28% of toilet water, has been decreased by the spread of saving devices and campaign. It is supposed that the spread large sized laundry machine make by-hand laundry has been decreased and water use increased. Unit water amount of each end-use in household can be applied to design factor for water and wastewater facilities, and it play a role as information in establishing water demand forecasting and conservation policy.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

RPC Correction of KOMPSAT-3A Satellite Image through Automatic Matching Point Extraction Using Unmanned AerialVehicle Imagery (무인항공기 영상 활용 자동 정합점 추출을 통한 KOMPSAT-3A 위성영상의 RPC 보정)

  • Park, Jueon;Kim, Taeheon;Lee, Changhui;Han, Youkyung
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_1
    • /
    • pp.1135-1147
    • /
    • 2021
  • In order to geometrically correct high-resolution satellite imagery, the sensor modeling process that restores the geometric relationship between the satellite sensor and the ground surface at the image acquisition time is required. In general, high-resolution satellites provide RPC (Rational Polynomial Coefficient) information, but the vendor-provided RPC includes geometric distortion caused by the position and orientation of the satellite sensor. GCP (Ground Control Point) is generally used to correct the RPC errors. The representative method of acquiring GCP is field survey to obtain accurate ground coordinates. However, it is difficult to find the GCP in the satellite image due to the quality of the image, land cover change, relief displacement, etc. By using image maps acquired from various sensors as reference data, it is possible to automate the collection of GCP through the image matching algorithm. In this study, the RPC of KOMPSAT-3A satellite image was corrected through the extracted matching point using the UAV (Unmanned Aerial Vehichle) imagery. We propose a pre-porocessing method for the extraction of matching points between the UAV imagery and KOMPSAT-3A satellite image. To this end, the characteristics of matching points extracted by independently applying the SURF (Speeded-Up Robust Features) and the phase correlation, which are representative feature-based matching method and area-based matching method, respectively, were compared. The RPC adjustment parameters were calculated using the matching points extracted through each algorithm. In order to verify the performance and usability of the proposed method, it was compared with the GCP-based RPC correction result. The GCP-based method showed an improvement of correction accuracy by 2.14 pixels for the sample and 5.43 pixelsfor the line compared to the vendor-provided RPC. In the proposed method using SURF and phase correlation methods, the accuracy of sample was improved by 0.83 pixels and 1.49 pixels, and that of line wasimproved by 4.81 pixels and 5.19 pixels, respectively, compared to the vendor-provided RPC. Through the experimental results, the proposed method using the UAV imagery presented the possibility as an alternative to the GCP-based method for the RPC correction.

A study on the impact and activation plan of unmanned aerial vehicle service (무인항공기 서비스 영향성과 활성화 방안 연구)

  • Yoo, Soonduck
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.2
    • /
    • pp.1-7
    • /
    • 2022
  • The purpose of this study is to discuss the impact of unmanned aerial vehicle service and how to activate it. The discussion on the impact of the introduction of the unmanned aerial vehicle service was examined in terms of economic, environmental, and social acceptance, and a plan to revitalize the industry was presented. In terms of economic impact, if transportation services are increased using unmanned aerial vehicles in the future, road-based transportation cargo may decrease and road movement speed may increase due to reduced road congestion. This can have a positive effect on the increase in the value of land or real estate assets, and it also provides an impact on smart city design. In terms of environmental impact, unmanned aerial vehicles (UAVs) generally move through electricity, so they emit less exhaust gas compared to other existing devices, such as vehicles and railroads, and thus have less environmental impact. However, noise can have a negative impact on the habitat in the presence of wild animals along their migration routes. In terms of social acceptability of unmanned aerial vehicles (UAV) technology, areas that are declining due to the emergence of new services may appear, and at the same time, organizations that create profits may appear, causing conflicts between industries. Therefore, it is essential to form a social consensus on the acceptance of emerging industries. The government should come up with various countermeasures to minimize the negative impact that reflects the characteristics of the unmanned aerial vehicle use service. Just as various systems such as road signs were introduced so that vehicles can be operated on the ground to secure air routes in the mid- to long-term for revitalization of unmanned-based industries, development and establishment of services that should be introduced and applied prior to constructing air routes I need this. In addition, the design and implementation of information collection and operation plans for unmanned air traffic management in Korea and a plan to secure a control system for each region should also be made. This study can contribute to providing ideas for mid- to long-term research on new areas with the development of the unmanned aerial vehicle industry.