• Title/Summary/Keyword: logistics technology

Search Result 1,115, Processing Time 0.023 seconds

Relationship Between Soil Properties and Tip Burn of Chinese Chive Cultivated in Plastic Film House (시설재배 부추 잎끝마름증 발생에 영향을 미치는 토양특성)

  • Seo, Young-Jin;Choi, Young-Seub;Park, Jun-Hong;Kweon, Tae-Young;Choi, Seong-Yong;Kim, Chan-Yong;Kim, Jong-Su;Park, So-Deuk;Park, Man;Jeon, Sang-Ho;Jang, Yong-Sun;Ha, Sang-Keun
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.44 no.3
    • /
    • pp.380-386
    • /
    • 2011
  • Tip burn has been reported as one of the most serious physiological disorder in Chinese chives (Allium tuberosum Rottl.) cultivated in plastic film house. In this study, a physiography and chemical properties of 132 plastic film house soils were investigated to elucidate factors affecting tip burn symptom. Also influence of soil properties on tip burn was statistically determined by path analysis and association analysis including a chi-square test or logistics analysis. Probability distribution of inorganic aqueous species, such as ammonia (g) was calculated using MINTEQ program. Soil order and chemical properties, especially pH, exchangeable calcium and inorganic nitrogen, showed a significant relationship with tip burn of Chinese chives. Tip burn symptoms occur mainly in an alkaline soil classified as Alfisols. Result of linear regression and path analysis exhibited that formation of ammonia (g) from soil solution depend upon soil pH and were associated with ammonium resulting from soil organic matter or nitrate. These results indicate that tip burn symptom of Chinese chives is directly affected by ammonia gas originated from alkaline soil condition.

Forest Fire Monitoring System Using Satellite (위성활용 산불감시 시스템 구축)

  • Park, Beom-Sun;Cho, In-Je;Lim, Jae-Hwan;Kim, In-Bae
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.143-150
    • /
    • 2021
  • It introduces the contents of establishing a geostationary satellite-based forest fire monitoring system that can monitor areas of the Korean Peninsula 24 hours a day for forest fire monitoring, and describes how to establish a forest fire monitoring system and use it in various ways. In order to establish a satellite-utilized forest fire monitoring system, we will describe and draw conclusions on literature research, technical principles, forest fire monitoring means, and satellite forest fire monitoring system. The satellite-utilized forest fire monitoring system can consist of one geostationary satellite equipped with infrared detection optical sensors and a ground processing station that processes data received from satellites to spread surveillance information. Forest fire monitoring satellites are located in the country's geostationary orbit and should be operated 24 hours a day, 365 days a day. Forest fire monitoring technology is an infrared detection technology that can be used in national public interests such as forest fire monitoring and national security. It should be operated 24 hours a day, and to satisfy this, it is efficient to establish a geostationary satellite-based forest fire monitoring satellite system.

Quality of 'Fuji' Apple Packed with Functional MA Film to the Films Thickness (두께별 기능성 MA 필름으로 포장하여 저장한 사과의 품질)

  • Hong, Sang Tai;Park, HyungWoo;Park, Yang-Kyun
    • KOREAN JOURNAL OF PACKAGING SCIENCE & TECHNOLOGY
    • /
    • v.25 no.2
    • /
    • pp.51-56
    • /
    • 2019
  • The quality of 'Fuji' apple was analyzed the film thickness conditions and packed with functional MA film during 24 weeks storage at $0^{\circ}C$ to weight loss, hardness, acidity and SSC, decay ratio, and vitamin C. The weight loss of apple packed functional MA film was higher than that of contro.Value of the weight loss of apple packed in the control and functional MA filmswere 8.2% and 0.4-0.5%, respectively. The change of hardness and titratable acidity was also lower than that of control. The decay ratio of apple packed with functional MA films were 2.4~4.7%, but that of control was 6.8%. The decay ratio of apple was the lowest at 0.025mm functional MA film. Changes of vitamin C also was lower than that of control. Based on the results, we suggested that the functional MA film with 0.025mm thickness is desirable for keeping the quality of the 'Fuji' apple produced at Geochang, Korea.

A Study on Revitalizing Innovative Startup Ecosystems Using Public Technologies (공공기술을 활용한 혁신 창업생태계 활성화 방안 연구)

  • Tae-Uk Ahn;Tae-Won Kang
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.19 no.4
    • /
    • pp.231-241
    • /
    • 2024
  • Discovering innovative startups that use public technologies from universities and government-funded research institutes is crucial for maintaining national competitiveness. Advancing public R&D technology, discovering entrepreneurs from research institutes, and fostering and investing in deep-tech startups are very important at the national level. However, there is a lack of research on activating startups using public technologies, and research analyzing each governance entity is needed to activate the innovation startup ecosystem. Therefore, this study conducted an empirical analysis of the priorities for revitalizing the innovation startup ecosystem among researchers, research institutes, innovative startups, and the government, which constitute the public technology governance. The results of this study revealed that the sustainability of innovative startups (0.308), government innovation startup activation (0.298), research institutions discovering and fostering startups (0.221), and researcher's characteristics (0.173) were the most significant factors in the public R&D technology innovation startup ecosystem. And the sub-factors of researcher's characteristics, seizing business opportunities (0.305) was most important, and creating a startup-friendly culture (0.293) was most important among the sub-factors of research institutions discovering and fostering startups. Investment funds and procurement (0.373) was the most critical sub-factor for the sustainability of innovative startups, while a dedicated fund for public technology (0.305) was the most important among the sub-factors of government schemes for promoting innovative startups. A total of 20 factors were analyzed sequentially according to their importance in the weights for evaluation factors and sub-factors. By sub-factor, investment and financing for innovative startups (0.115), dedicated government fund for public technology (0.091), securing high-quality human resources for innovative startups (0.078), improving government regulations and permits related to innovative technologies (0.074), and creating a startup-friendly culture in research institutions (0.065) were the most important. This result emphasizes the significance of securing competitiveness to become a sustainable public technology startup. In addition, based on entrepreneurship experience, 'dedicated funding for public technology' was most important for the group with startup experience, while the group with no experience needed more 'investment and funding'. Furthermore, By region, 'improving government regulations and permits' was the highest priority in the Seoul metropolitan area, while 'attracting investment and financing' was the most important in Daejeon. Therefore, the results of this research, it is important to give policy priority to innovative startup companies in order to activate the innovation startup ecosystem in the public technology sector. The political and practical implications were derived that long-term (10 years or more) investment and funding for deep tech companies and the establishment of public technology-only funds are the most urgent and important.

  • PDF

A New Approach to Automatic Keyword Generation Using Inverse Vector Space Model (키워드 자동 생성에 대한 새로운 접근법: 역 벡터공간모델을 이용한 키워드 할당 방법)

  • Cho, Won-Chin;Rho, Sang-Kyu;Yun, Ji-Young Agnes;Park, Jin-Soo
    • Asia pacific journal of information systems
    • /
    • v.21 no.1
    • /
    • pp.103-122
    • /
    • 2011
  • Recently, numerous documents have been made available electronically. Internet search engines and digital libraries commonly return query results containing hundreds or even thousands of documents. In this situation, it is virtually impossible for users to examine complete documents to determine whether they might be useful for them. For this reason, some on-line documents are accompanied by a list of keywords specified by the authors in an effort to guide the users by facilitating the filtering process. In this way, a set of keywords is often considered a condensed version of the whole document and therefore plays an important role for document retrieval, Web page retrieval, document clustering, summarization, text mining, and so on. Since many academic journals ask the authors to provide a list of five or six keywords on the first page of an article, keywords are most familiar in the context of journal articles. However, many other types of documents could not benefit from the use of keywords, including Web pages, email messages, news reports, magazine articles, and business papers. Although the potential benefit is large, the implementation itself is the obstacle; manually assigning keywords to all documents is a daunting task, or even impractical in that it is extremely tedious and time-consuming requiring a certain level of domain knowledge. Therefore, it is highly desirable to automate the keyword generation process. There are mainly two approaches to achieving this aim: keyword assignment approach and keyword extraction approach. Both approaches use machine learning methods and require, for training purposes, a set of documents with keywords already attached. In the former approach, there is a given set of vocabulary, and the aim is to match them to the texts. In other words, the keywords assignment approach seeks to select the words from a controlled vocabulary that best describes a document. Although this approach is domain dependent and is not easy to transfer and expand, it can generate implicit keywords that do not appear in a document. On the other hand, in the latter approach, the aim is to extract keywords with respect to their relevance in the text without prior vocabulary. In this approach, automatic keyword generation is treated as a classification task, and keywords are commonly extracted based on supervised learning techniques. Thus, keyword extraction algorithms classify candidate keywords in a document into positive or negative examples. Several systems such as Extractor and Kea were developed using keyword extraction approach. Most indicative words in a document are selected as keywords for that document and as a result, keywords extraction is limited to terms that appear in the document. Therefore, keywords extraction cannot generate implicit keywords that are not included in a document. According to the experiment results of Turney, about 64% to 90% of keywords assigned by the authors can be found in the full text of an article. Inversely, it also means that 10% to 36% of the keywords assigned by the authors do not appear in the article, which cannot be generated through keyword extraction algorithms. Our preliminary experiment result also shows that 37% of keywords assigned by the authors are not included in the full text. This is the reason why we have decided to adopt the keyword assignment approach. In this paper, we propose a new approach for automatic keyword assignment namely IVSM(Inverse Vector Space Model). The model is based on a vector space model. which is a conventional information retrieval model that represents documents and queries by vectors in a multidimensional space. IVSM generates an appropriate keyword set for a specific document by measuring the distance between the document and the keyword sets. The keyword assignment process of IVSM is as follows: (1) calculating the vector length of each keyword set based on each keyword weight; (2) preprocessing and parsing a target document that does not have keywords; (3) calculating the vector length of the target document based on the term frequency; (4) measuring the cosine similarity between each keyword set and the target document; and (5) generating keywords that have high similarity scores. Two keyword generation systems were implemented applying IVSM: IVSM system for Web-based community service and stand-alone IVSM system. Firstly, the IVSM system is implemented in a community service for sharing knowledge and opinions on current trends such as fashion, movies, social problems, and health information. The stand-alone IVSM system is dedicated to generating keywords for academic papers, and, indeed, it has been tested through a number of academic papers including those published by the Korean Association of Shipping and Logistics, the Korea Research Academy of Distribution Information, the Korea Logistics Society, the Korea Logistics Research Association, and the Korea Port Economic Association. We measured the performance of IVSM by the number of matches between the IVSM-generated keywords and the author-assigned keywords. According to our experiment, the precisions of IVSM applied to Web-based community service and academic journals were 0.75 and 0.71, respectively. The performance of both systems is much better than that of baseline systems that generate keywords based on simple probability. Also, IVSM shows comparable performance to Extractor that is a representative system of keyword extraction approach developed by Turney. As electronic documents increase, we expect that IVSM proposed in this paper can be applied to many electronic documents in Web-based community and digital library.

A Study on the Efficiency of Strategy of Korean Companies in India (한국기업의 인도진출 전략의 효율성에 관한 연구)

  • Kim, Changbong;Shim, Seop
    • International Commerce and Information Review
    • /
    • v.19 no.3
    • /
    • pp.45-61
    • /
    • 2017
  • The purpose of this study is to examine the efficiency of Korean companies' entry strategy in India through the DEA model and to review the current status and competitiveness of Korean companies in India. To analyze 112 companies that entered India in analyzing the common variables among the major variables related to Korean companies' entry strategy into India. To measure efficiency, 'DEAR 2.1' An output - oriented CCR model and BBC model were used for the analysis to minimize the input and maximize the output factor. The results of the study on the relative efficiency analysis of the investment strategy of the companies in India are as follows. First, six firm was analyzed efficiently in the CCR model and most firms showed inefficiency in management. Second, even with the BCC model, which represents pure technology efficiency, 103 companies were analyzed efficiently as well. Unlike the CCR, overall technology efficiency of firms was high. Third, as a result of analyzing the efficiency of the scale, it was found that six company showed efficient efficiency, and most of the companies showed inefficiency overall. Companies with inefficiencies should increase efficiency by expanding their scale. Based on the above analysis, it is expected that the companies that will enter India in the future should secure the human and material resources to realize economies of scale considering the number of employees, investment scale, investment type and industry.

  • PDF

A Methodology for Evaluating Vehicle Driving Safety based on the Analysis of Interactions With Roads and Adjacent Vehicles (도로 및 인접차량과의 상호작용분석을 통한 차량의 주행안전성 평가기법 개발 연구)

  • PARK, Jaehong;OH, Cheol;YUN, Dukgeun
    • Journal of Korean Society of Transportation
    • /
    • v.35 no.2
    • /
    • pp.116-128
    • /
    • 2017
  • Traffic accidents can be defined as a physical collision event of vehicles occurred instantaneously when drivers do not perceive the surrounding vehicles and roadway environments properly. Therefore, detecting the high potential events that cause traffic accidents with monitoring the interactions among the surroundings continuously by driver is the prerequisite for prevention the traffic accidents. For the analysis, basic data were collected to analyze interactions using a test vehicle which is equipped the GPS(Global Positioning System)-IMU(Inertial Measurement Unit), camera, radar and RiDAR. From the collected data, highway geometric information and the surrounding traffic situation were analyzed and then safety evaluation algorithm for driving vehicle was developed. In order to detect a dangerous event of interaction with surrounding vehicles, locations and speed data of surrounding vehicles acquired from the radar sensor were used. Using the collected data, the tangent and curve section were divided and the driving safety evaluation algorithm which is considered the highway geometric characteristic were developed. This study also proposed an algorithm that can assess the possibility of collision against surrounding vehicles considering the characteristics of geometric road structure. The methodology proposed in this study is expected to be utilized in the fields of autonomous vehicles in the future since this methodology can assess the driving safety using collectible data from vehicle's sensors.

Implementation of Pattern Recognition Algorithm Using Line Scan Camera for Recognition of Path and Location of AGV (무인운반차(AGV)의 주행경로 및 위치인식을 위한 라인스캔카메라를 이용한 패턴인식 알고리즘 구현)

  • Kim, Soo Hyun;Lee, Hyung Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.1
    • /
    • pp.13-21
    • /
    • 2018
  • AGVS (Automated Guided Vehicle System) is a core technology of logistics automation which automatically moves specific objects or goods within a certain work space. Conventional AGVS generally requires the in-door localization system and each AGV equips expensive sensors such as laser, magnetic, inertial sensors for the route recognition and automatic navigation. thus the high installation cost is inevitable and there are many restrictions on route(path) modification or expansion. To address this issue, in this paper, we propose a cost-effective and scalable AGV based on a light-weight pattern recognition technique. The proposed pattern recognition technology not only enables autonomous driving by recognizing the route(path), but also provides a technique for figuring out the loc ation of AGV itself by recognizing the simple patterns(bar-code like) installed on the route. This significantly reduces the cost of implementing AGVS as well as benefiting from route modification and expansion. In order to verify the effectiveness of the proposed technique, we first implement a pattern recognition algorithm on a light-weight MCU(Micro Control Unit), and then verify the results by implementing an MCU_controlled AGV prototype.

Improvement of Port Entrance System using RFID (RFID를 활용한 항만출입체계 개선방안)

  • Choi, Hyung-Rim;Kim, Hyun-Soo;Hong, Soon-Gu;Park, Yong-Sung;Kim, Hee-Yoon;Shin, Joong-Jo;Choi, Sung-Pill;Lee, Byung-Ha;Choi, Ki-Nam;Ha, Jeong-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.2
    • /
    • pp.709-719
    • /
    • 2010
  • As the world has had a high recognition of security since 9/11 attacks in 2001, many countries and international organizations around the world are making strenuous efforts in establishing stronger security, centering on areas with high possibility of terrorist attacks. In particular, harbor facilities where a great deal of trade take place between countries, have high possibilities of becoming the objects of terrorist attacks and also of becoming places of trading objects and illegal items which might be leveraged for terror attacks. In this study, I have explained the current status of the harbor entrance system through existing documents, interviews and field trips to harbors and have also introduced improvement measures using RFID technology from the viewpoint of BP(Business Process). I expect that this study will be used as basic materials because I have studied the number of people entering harbors and working procedures for vehicle entrance, which have not been studied so far and also laid out various factors to be considered to introduce RFID technology.

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.