• Title/Summary/Keyword: integrated management tool

Search Result 322, Processing Time 0.027 seconds

Occurrence and Control Method of Riptortus pedestris (Hemiptera: Alydidae): Korean Perspectives (국내 톱다리개미허리노린재의 발생과 방제법)

  • Lim, Un Taek
    • Korean journal of applied entomology
    • /
    • v.52 no.4
    • /
    • pp.437-448
    • /
    • 2013
  • Hemipteran bugs, which were previously considered as secondary pests, have currently become important pests of numerous crops. Among them, Riptortus pedestris (Fabricius) is a major species that occurs in Korea, Japan, China, and South Asian countries. Riptortus pedestris infests leguminous crops like soybean, vetches, and red clover; fruit trees like persimmon and yuju; and grains like barley, foxtail millet, broomcorn, and sorghum. Riptortus pedestris causes the greatest damage to soybean, as it is the most suitable host for the bug. Feeding damage during pod formation significantly reduces the yield of soybean. Currently, 17 insecticides, including diazinon and etofenprox, are registered for the control of hemipteran bugs in Korea, and growers apply insecticides two to three times on a regular basis. Aggregation pheromone traps are widely used as a monitoring tool and partial control measure. The aggregation pheromone of R. pedestris attracts conspecific adults and nymphs and is used for food exploitation rather than sexual attraction. In addition, the pheromone serves as a kairomone for egg parasitoids such as Gryon japonicum (Ashmead) and Ooencyrtus nezarae Ishii. As a new method of pest management, nonviable host eggs were included in the pheromone trap to catch R. pedestris and propagate parasitoids. As a part of cultural practices, resistant soybean varieties with specific color and size of pod and control of flowering time through the alteration of planting date can be used. For the effective management of R. pedestris in the near future, development of cultural practices that can support natural control factors and the use of multiple control tactics are needed.

A Study on the Necessity and Applicability of Interactive Electronic Technical Manual(IETM) for Construction Projects (건설분야 전자매뉴얼의 필요성 및 특성분석을 통한 실무적용성 연구)

  • Kang, Leen-Seok;Jung, Won-Myung;Kwak, Joong-Min
    • Korean Journal of Construction Engineering and Management
    • /
    • v.6 no.1 s.23
    • /
    • pp.99-108
    • /
    • 2005
  • Interactive electronic technical manual(IETM) for construction projects means an electronic tool that regulations and specifications related to construction method or maintenance process ale described by electronic book type. It has a meaning of integrated information system that includes virtual reality(VR), 3D animation and image contents for representing real construction information so that user can easily understand the construction situation and maintenance process. The basic information and technical manuals of construction facilities are being written as paper documents in our construction industry. As the result, the information management in the maintenance phase of construction projects is inefficient, and maintenance cost is being increased. This study attempts to improve the lack of understanding about construction IETM through the analysis of necessity and unique function of construction IETM comparing with the IETMS in other industry, Finally, this study shows a scenario of construction IErM for mitigating natural disaster of construction facilities to verify applicability of IETM.

Empirical Research on Search model of Web Service Repository (웹서비스 저장소의 검색기법에 관한 실증적 연구)

  • Hwang, You-Sub
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.173-193
    • /
    • 2010
  • The World Wide Web is transitioning from being a mere collection of documents that contain useful information toward providing a collection of services that perform useful tasks. The emerging Web service technology has been envisioned as the next technological wave and is expected to play an important role in this recent transformation of the Web. By providing interoperable interface standards for application-to-application communication, Web services can be combined with component-based software development to promote application interaction and integration within and across enterprises. To make Web services for service-oriented computing operational, it is important that Web services repositories not only be well-structured but also provide efficient tools for an environment supporting reusable software components for both service providers and consumers. As the potential of Web services for service-oriented computing is becoming widely recognized, the demand for an integrated framework that facilitates service discovery and publishing is concomitantly growing. In our research, we propose a framework that facilitates Web service discovery and publishing by combining clustering techniques and leveraging the semantics of the XML-based service specification in WSDL files. We believe that this is one of the first attempts at applying unsupervised artificial neural network-based machine-learning techniques in the Web service domain. We have developed a Web service discovery tool based on the proposed approach using an unsupervised artificial neural network and empirically evaluated the proposed approach and tool using real Web service descriptions drawn from operational Web services repositories. We believe that both service providers and consumers in a service-oriented computing environment can benefit from our Web service discovery approach.

The State of the Art of Preventive Medicine in North Korea With Reference to the Content Analysis of a Medical Textbook (의학교과서를 통해 본 북한예방의학 내용분석에 관한 연구)

  • Moon, Ok-Ryun;Lee, Sin-Jae;Kim, Jung-Chul;Wen, Yong;Piao, Song-Lin;Yi, Sang-Gu
    • Journal of Preventive Medicine and Public Health
    • /
    • v.33 no.3
    • /
    • pp.373-382
    • /
    • 2000
  • Objectives : The most frequently cited health related slogan in North Korea is that socialistic medicine is preventive medicine. It implies that North Korea puts preventive medicine at the operational center of its national health care system. This study aimed at examining and comparing preventive medicine practices in North Korea with those of South Korea. Methods : Efforts have been made to obtain a textbook for analysis its contents. Many people have iassisted in the study by joining the interview. Some of these people are as follows : a former professor of PyongYang Medical School, NK physicians living in South Korea, WHO staffs, diplomatic officials, etc. The major items of analysis consisted of industrial medicine and hygiene, nutrition, school health, epidemiology, health statistics and heath policy & management. Results : Public health philosophy is finely noted and well integrated in the operation of the North Korean national health care system, particularly in the area of industrial medicine and hygiene. Preventive medicine with a strong health surveillance system spanning a number of broad social organizations is a major tool to improve the health of the people in North Korea. The emphasis on preventive medicine has a close relationship with the 'Juche Philosophy' and the shortage of pharmaceuticals and medical equipment. To cope with the shortage problem, North Korean health workers are encouraged to grow medicinal herbs. We have found that they put little effort into teaching newly emerging diseases, such as AIDS, VDT syndrome, hazards of EMF, and agricultural chemical poisonings. Of the subjects of the preventive medicine text, 78.9% coincide with those of South Korean industrial health manuals and 34.2% with South Korean epidemiology texts. However, an absolute difference was found to exist between the health policies and management systems. Conclusion : In North Korea, the concept of preventive medicine functions as the basic philosophic strategy of the national health care system. It differs greatly from the South Korean system in both practice and educational content. Its contribution to society is simply incomparable to that of South Korea. More communication and further study is called for in order to improve the preventive medicine practices in the future.

  • PDF

Developing Maker Competency Model and Exploring Maker Education Plan in the Field of Elementary and Secondary Education (메이커 역량 모델 개발 및 초·중등 교육 현장에서의 메이커 교육 방안 탐색)

  • Yoon, Jihyun;Kim, Kyung;Kang, Seong-Joo
    • Journal of The Korean Association For Science Education
    • /
    • v.38 no.5
    • /
    • pp.649-665
    • /
    • 2018
  • In this study, we extracted the core competencies of makers through the analysis of critical incident technique and behavioral event interview to explore the nature and attributes of maker education, and then we developed a maker competency model based on these core competencies. As a result, six competency groups and 23 sub-competencies were extracted. In other words, we were able to confirm the existence of integrated thinking competency group consisting of four competencies made up of 'analytic thinking', 'intuitive thinking', 'visual thinking', and 'empirical thinking' and that of collaborative competency group with four competencies of 'sharing', 'communication', 'conflict management', and 'scrupulosity'. In addition, we could also confirm the existence of making mind competency group, which is composed of four competencies namely 'interest in various areas', 'challenge consciousness', 'failure management', and 'pleasure of the making process'. We could also confirm that human-centered competence group consisting of two competencies of 'humanity' and 'user-oriented' and the problem-finding competence group consisting of two competencies of 'observation' and 'recognition of discomfort in daily life'. Lastly, the making practice competency group is composed of seven competencies: 'understanding making tool', 'understanding electricity', 'understanding programming', 'planning', 'hand knowledge', 'information search', and 'direct execution'. We discussed educational implications of these findings.

Sustainable Water Resources Planning to Prevent Streamflow Depletion in an Urban Watershed: 1. Methodology (도시유역의 건천화 방지를 위한 지속가능한 수자원 계획: 1. 방법론)

  • Lee, Kil-Seong;Cung, Eun-Sung;Kim, Young-Oh;Cho, Tak-Gun
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.11 s.172
    • /
    • pp.935-946
    • /
    • 2006
  • This study proposed a new procedure of sustainable water resources planning to prevent the urban streamflow depletion, based on the Heathcote's study in 1998: (1) to understand the watershed component and processes, (2) to identify and quantify problems within the watershed, (3) to set clear and specific goals, (4) to develop a list of management options, (5) to eliminate infeasible options, (6) to test the effectiveness of remaining feasible options, and (7) to develop the final options. PSR(Presure-State-Response) concept was used for the determination of indicators of PSD(Potential Streamflow Depletion; step 2) and effect equation (step 7) and composite programming for the calculation of PSD. The instreamflow requirement was proposed as clear and specific goal (step 3) and was determined by the larger of the PHABSIM's environmental flow and the drought flow. A continuous rainfall-runoff model is necessary to test the effectiveness of alternatives. It should estimate not only the exact runoff but also the effect of landuse change, reservoir, infiltration facility and so on like SWAT(Soil and Water Assessment Tool). The proposed procedure will be applied on the corresponding paper.

A Study on the Build of Equipment Predictive Maintenance Solutions Based on On-device Edge Computer

  • Lee, Yong-Hwan;Suh, Jin-Hyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.165-172
    • /
    • 2020
  • In this paper we propose an uses on-device-based edge computing technology and big data analysis methods through the use of on-device-based edge computing technology and analysis of big data, which are distributed computing paradigms that introduce computations and storage devices where necessary to solve problems such as transmission delays that occur when data is transmitted to central centers and processed in current general smart factories. However, even if edge computing-based technology is applied in practice, the increase in devices on the network edge will result in large amounts of data being transferred to the data center, resulting in the network band reaching its limits, which, despite the improvement of network technology, does not guarantee acceptable transfer speeds and response times, which are critical requirements for many applications. It provides the basis for developing into an AI-based facility prediction conservation analysis tool that can apply deep learning suitable for big data in the future by supporting intelligent facility management that can support productivity growth through research that can be applied to the field of facility preservation and smart factory industry with integrated hardware technology that can accommodate these requirements and factory management and control technology.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.

Management Strategy of Indoor Hazardous Chemicals (실내.외 통합 모델링 및 인체 위해성 평가를 통한 실내 유해화학물질의 관리 전략)

  • Shin, Yong-Seung;Lim, Hye-Sook
    • Journal of Environmental Policy
    • /
    • v.7 no.2
    • /
    • pp.67-90
    • /
    • 2008
  • The purpose of this study is to develop indoor air quality management strategies regarding indoor air pollutants while considering various factors affecting indoor pollutants concentration. The Integrated Indoor Air Quality model(IIAQ) developed by Seoul National University is used for this study. The IIAQ model is a tool that can provide an integrated view to indoor environmental pollution by simulating suggested scenarios. The results of the modeling are used to assess health risk. The concentrations that are used for the risk characterization are weighted concentrations based on the period of time in each place and existing Indoor Air Quality(IAQ) standards. The estimated concentration of toluene and formaldehyde for 10 years through the IIAQ model was 207.3 $ug/m^3$ and 36.4 $ug/m^3$ in indoors, and 55.9 $ug/m^3$ and 8.62 $ug/m^3$ in outdoors. These concentrations are lower than the existing IAQ standards. The estimated carcinogenic risk of formaldehyde is up to 1.05E-03 for the adult male group and exceeds 1E-06 for all receptor groups. This value means that cancer could affect one person out of 1000. The estimated non-carcinogenic risk of toluene was lower than 1, which means that there was no serious non- carcinogenic risk. The result of modeling shows that using low emitting indoor sources is the most effective strategy for both formaldehyde and toluene. This risk assessment suggests that the total exposure levels of existing IAQ standards may cause serious carcinogenic risk. In order to avoid uncontrolled risk, it is suggested that the current IAQ standards should be adjusted by taking into account the total amount of exposure from all exposure pathways from indoor and outdoor sources.

  • PDF

A Study on Improving of Access to School Library Collection through High School Students' DLS Search Behavior Analysis (고등학생의 DLS 검색행태 분석을 통한 학교도서관 자료 접근성 향상 방안 고찰)

  • Jung, Youngmi;Kang, Bong-Suk
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.2
    • /
    • pp.355-379
    • /
    • 2020
  • Digital Library System(DLS) for the school library is a key access tool for school library materials. The purpose of this study was to find ways to improve the accessibility of materials through analysis of students' information search behavior in DLS. Data were collected through recording of 42 participants' DLS search process, and questionnaire. As a result, the search success rate and search satisfaction were found to be lower when the main purpose of DLS is simple leisure reading, information needs are relatively ambiguous, and when user experiences the complicated situations in the search process. The satisfaction level of search time sufficiency was the highest, and the search result satisfaction was the lowest. Besides, there was a need to improve DLS, such as integrated search of other library collection information, the recommendation of related materials, the print output of collection location, voice recognition through mobile apps, and automatic correction of search errors. Through this, the following can be suggested. First, DLS should complement the function of providing career information by reflecting the demand of education consumers. Second, improvements to DLS functionality to the general information retrieval system level must be made. Third, an infrastructure must be established for close cooperation between school library field personnel and DLS management authorities.