• Title/Summary/Keyword: information priority

Search Result 2,401, Processing Time 0.027 seconds

A study on the policy about regulation improvement for vitalization of technology based startup (벤처·업 활성화를 위한 규제개선 추진방안의 효과성 분석)

  • Sim, Yong-ho;Gil, Wun-gyu;Kim, Seo-kyun
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.121-130
    • /
    • 2015
  • Technology based start-up is actively encouraged for job creation and economic performance in Korea. The Korean government has implemented a variety of policy for regulatory improvement to vitalize technology based start-up. In order to maximize the effectiveness of the policy for regulatory improvement should be actively reflect the opinions of policy beneficiaries. In this study, The importance of "The progress plan for regulation improvement about vitalization of start-up(25 contents)" published by the government was analyzed using AHP method. The object of study is the beneficiary of the policy(CEO of ICT sector). Analysis showed that the 25 contents were classified into four(1 - expectation of effect, 2 - urgency of system enforcement, 3 - complement of deficiencies, 4 - after careful consideration). This study has a academic significance to quantitative analysis about importance of policy for regulatory improvement. Also, It can be utilized when policy making and practice about technology based start-up.

Flexible Disjoint Multipath Routing Protocol Using Local Decision in Wireless Sensor Networks (무선 센서 네트워크에서 지역 결정을 통한 유연한 분리형 다중경로 라우팅 프로토콜)

  • Jung, Kwansoo;Yeom, Heegyun;Park, Hosung;Lee, Jeongcheol;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.911-923
    • /
    • 2013
  • Multipath routing is one of challenging issues for improving the reliability of end-to-end data delivery in wireless sensor networks. Recently, a disjointedness and management of path have been studying to enhance the robustness and efficiency of the multipath routing. However, previous multipath routing protocols exploit the disjointed multipath construction method that is not to consider the wireless communication environment. In addition, if a path failures is occurred due to the node or link failures in the irregular network environment, they maintain the multipath through the simple method that to construct a new extra path. Even some of them have no a method. In order to cope with the insufficiency of path management, a hole detouring scheme, to bypass the failures area and construct the new paths, was proposed. However, it also has the problem that requires a heavy cost and a delivery suspension to the some or all paths in the hole detouring process due to the centralized and inflexible path management. Due to these limitations and problems, the previous protocols may lead to the degradation of data delivery reliability and the long delay of emergency data delivery. Thus, we propose a flexible disjoint multipath routing protocol which constructs the radio disjoint multipath by considering irregular and constrained wireless sensor networks. It also exploits a localized management based on the path priority in order to efficiently maintain the flexible disjoint multipath. We perform the simulation to evaluate the performance of the proposed method.

An Algorithm for Stable Video Conference System (안정적인 화상회의 시스템을 위한 알고리즘)

  • Lee Moon-Ku
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.2 s.302
    • /
    • pp.11-20
    • /
    • 2005
  • In previous video conference system, when the number of participants in video conference increases by n, the bandwidth and memory of n2 is required. And also, it brings about increase in traffic and problem of a say during a conference in aspect of transmission of voice data. In this paper, we propose an algorithm of remote video conference using silence detection algerian to resolve the questions such as buffering method of video data in server and heavy traffic detection algorithm to the increase in participants. Video data buffering algorithm is not a method of broadcasting to other client in the server, but this algorithm uses two other methods; the buffering method of receiving compressed video data from clients and the indexing method for acquiring the video data of other participants in clients according to clients' bandwidth and network transmission speed. We apply a voice transmission algerian and a channel management algorithm to the remote video conference system. The method used in the voice transmission algorithm is a silence detection algorithm which does not send silent participants' voice data to the server. The channel management algorithm is a method allocating a say to the participants who have priority. In consideration of average 20 frames and 30ms regardless of a number of participants, we can safely conclude that the transmission of video and voice data is stable.

Effects of Commuting Distance Reduction by Teleworking on Carbon Dioxide Emission: Focusing on the Seoul Metropolitan Area (지역기반 원격근무를 통한 출근 통행거리 저감이 CO2 배출에 미치는 영향: 수도권 지역을 대상으로)

  • Kang, Jihan;Oh, Kyushik
    • Spatial Information Research
    • /
    • v.22 no.4
    • /
    • pp.89-102
    • /
    • 2014
  • The establishment and operation of Region-based Teleworking Centers(RTC) in Korea is in the initial stage at the moment. Although some studies have been conducted on telecommuting at home, few studies have been performed on the effects of all-out expansion and diffusion of region-based Teleworking Centers. Therefore, this study analyzed the reduction effect of commuting distance which is possible to obtain from the establishment of Teleworking Centers, based on the network in the Seoul Metropolitan Area, Subsequently, quantitative reduction of the effects of $CO_2$ were calculated from region-based Teleworking Centers. The results of the analysis indicated that region-based Teleworking Centers could reduce a total of 911 tons of $CO_2$ per day. When applying these results to 258 working days per year (according to Statistics Korea), 235,056 tons of $CO_2$ can be reduced annually by the establishment of Teleworking Centers. With quantity on environmental utility to be obtained from the establishment of Teleworking Centers, this study can be utilized as a guideline for selecting effective locations of Teleworking Centers in the future. It can also be helpful in decisions to determine the priority of extending operations of Teleworking Centers through comparisons among administrative districts.

Analysis of Daily Internet·Gaming·Smartphone Habit and Preference Factors of Moral Machine (인터넷·게임·스마트폰생활 습관과 모랄머신 선호도 요인 분석)

  • Park, SunJu
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.1
    • /
    • pp.21-28
    • /
    • 2020
  • Technological advancements such as artificial intelligence, robots, and big data are revolutionizing the entire society. In this paper, we analyzed preliminary teachers' daily internet/gaming/smartphone habit and the difference between preference factors in gender and diagnosis group in the situation of ethical dilemma in driverless cars. The result shows most of the male students are in high risk group of daily internet/gaming usage, and male students tend to be more immersed in games compared to female students, which negatively affects their daily lives. Students who have at least one of the daily internet/gaming/smartphone habits are more likely to be classified as high-risk group in all three of daily internet/gaming/smartphone habit. Fortunately, the students perceived themselves addicted and wanted change their habits. An analysis by a moral machine of these students tells that there is no significant difference in preference between male and female students and among diagnosis groups. However, specifically in the ethical dilemma of driverless cars, all the groups of male, female, normal, high-risk showed they have priority in pedestrians over drivers, a large number of people over small, and people who obey traffic rules over who do not. The tendency was pronounced in female group and high-risk students prioritized people who are older and in lower social status.

Fault Tolerant Design of Universal Soft Controller for Advanced Power Reactor (신형원전(APR+)을 위한 범용소프트제어기의 내고장성 설계)

  • Ye, Song-Hae;Lyou, Joon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.279-286
    • /
    • 2012
  • Recently, design of Universal Soft Controller(USC) has been applied to the advanced control room for nuclear power plant. USC is software-based manual control means to control safety components as well as non-safety components in the highly-integrated control room. Therefore, design feature of USC is essential for the implementation of a single workstation in the advanced control room. The traditional control room is replaced by computer-driven consolidated operator interfaces. Considering our design has further reduced the probability of USC spurious signals by requiring two distinct operator control actions to generate any control signal. The reality of USC does not increase the probability of reactor trip because the probability of spurious USC signal is negligible. Universal Soft Control represents a significant evolution in nuclear I&C/HSI System. USC integrates the indicators and controls from multiple divisions into a single integrated visual display unit(VDU) based HSI(Human System Interface). In order to prevent adverse influence on safety function performance from USC failure, ESFAS signals are applied to safety components or functions. In addition, safety manual switches have priority over USC's signals. Therefore, spurious USC signals can be momentarily blocked by selecting a soft control command from the safety VDU.

An Analysis on the Perception of Public Librarians about Lifelong Education Tasks: Focus on Incheon Metropolitan City (공공도서관 사서의 평생교육업무에 대한 인식 연구 - 인천지역을 중심으로 -)

  • Kim, NamJi;Cho, Jane
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.3
    • /
    • pp.51-73
    • /
    • 2016
  • This study analyzes on the perception of public librarians about lifelong education tasks in public library using Mann Whitney U-test, Spearman rank-order correlation coefficient, Multiple regression analysis. At the same time, analysis about re-education needs using Analytic Hierarchy Process is conducted. As result, at first, 87% of respondents feel moderate or difficult about lifelong education tasks, especially on planning task. At second, librarians who have qualification about lifelong educator feel easier (P=0.04) than others, in detail, task about lecturer liaison (P=0.04) and planning (P=0.05). Adding that, the career experience and the job difficulty of librarians has negative relationship (R=-0.217). Especially scheduling (R=-0.33) and progressing (R=-0.22) tasks show statistically meaningful. At third, as the result of Multiple regression analysis, tasks about planning (P=0.04) and library marketing (P=0.05) are selected as meaningful elements which effect overall difficulty of life long education job. As final, 91% of librarian need retraining for life long education function, as result of spearman (R=-0.210), the more librarians feels difficult about life long education jobs, the more they need retraining. Anyway, as the result of priority of retraining subjects through AHP technique, user communication (CU P=0.310), planning (PL P=0.246), library marketing (LM P=0.173) are in weight order. CR ratio shows 0.146 with permissible degree.

A Method for Measuring and Evaluating for Block-based Programming Code (블록기반 프로그래밍 코드의 수준 및 취약수준 측정방안)

  • Sohn, Wonsung
    • Journal of The Korean Association of Information Education
    • /
    • v.20 no.3
    • /
    • pp.293-302
    • /
    • 2016
  • It is the latest fashion of interesting with software education in public school environment and also consider as high priority issue of curriculum for college freshman with programming 101 courses. The block-based programming tool is used widely for the beginner and provides several positive features compare than text-based programming language tools. To measure quality of programming code elaborately which is based script language, it is need to very tough manual process. As a result the previously research related with evaluation of block-based script code has been focused very simple methods in which normalize the number of blocks used which is related with programming concept. In such cases in this, it is difficult to measure structural vulnerability of script code and implicit programming concept which does not expose. In this research, the framework is proposed which enable to measure and evaluate quality of code script of block-based programming tools and also provides method to find of vulnerability of script code. In this framework, the quality metrics is constructed to structuralize implicit programming concept and then developed the quality measure and vulnerability model of script to improve level of programming. Consequently, the proposed methods enable to check of level of programming and predict the heuristic target level.

A Study on the Analysis of Importance-Performance on the Use factor of Complex Cultural Space in Library (도서관 복합문화공간 이용요인에 대한 중요도-만족도 분석에 관한 연구)

  • Ro, Ji-Yoon;Noh, Younghee
    • Journal of Korean Library and Information Science Society
    • /
    • v.50 no.4
    • /
    • pp.511-537
    • /
    • 2019
  • At a time when trend called complex cultural space has recently been taking place in public libraries, this study analyzed the importance-performance of users regarding the use factors of public library's complex cultural space. Based on the results of the analysis, this study attempted to broaden the understanding of the library users' use of this space, and to suggest directions on which factors should be improved. The results of the study were as follows: First, only 5 of 41 factors for library complex cultural space have higher satisfaction than importance, so it is necessary to promote balanced development with focus on priority improvements rather than a specific sector. Second, it is necessary to provide various programs and services in consideration of visit characteristics, such as the users of the library complex cultural space are mainly used by themselves (42%) or with their families (18.2%), also more people (50.5%) use weekday afternoons than 35%, including weekend mornings and afternoons. Third, among the five use factors related to space, the remaining items except for 'Compatibility of Computer / Equipment Use' are located in the first quadrant where both importance and satisfaction are high or in the fourth quadrant which shows higher satisfaction than importance. This is a result that shows that the library is fully performing the diversification and complexion of the space basically aimed as a complex cultural space. Fourth, it is necessary to improve the public library's complex cultural space in the future based on the analysis results of the result of analysis of the importance-satisfaction the use of factors using the IPA analysis.

Service Differentiation in Ad Hoc Networks by a Modified Backoff Algorithm (애드혹 네트워크 상에서 backoff 알고리즘 수정에 의한 서비스 차별화)

  • Seoung-Seok Kang;Jin Kim
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.414-428
    • /
    • 2004
  • Many portable devices are coming to be commercially successful and provide useful services to mobile users. Mobile devices may request a variety of data types, including text and multimedia data, thanks to the rich content of the Internet. Different types of data and/or different classes of users may need to be treated with different qualities of service. The implementation of service differentiation in wireless networks is very difficult because of device mobility and wireless channel contention when the backoff algorithm is used to resolve contention. Modification of the t)mary exponential backoff algorithm is one possibility to allow the design of several classes of data traffic flows. We present a study of modifications to the backoff algorithm to support three classes of flows: sold, silver, and bronze. For example, the gold c]ass flows are the highest priority and should satisfy their required target bandwidth, whereas the silver class flows should receive reasonably high bandwidth compared to the bronze class flows. The mixture of the two different transport protocols, UDP and TCP, in ad hoc networks raises significant challenges when defining backoff algorithm modifications. Due to the different characteristics of UDP and TCP, different backoff algorithm modifications are applied to each class of packets from the two transport protocols. Nevertheless, we show by means of simulation that our approach of backoff algorithm modification clearly differentiates service between different flows of classes regardless of the type of transport protocol.