• Title/Summary/Keyword: omission information

Search Result 119, Processing Time 0.02 seconds

The Experimental Study of Scale Removal Using Ultra High Water Pressure in the Old Steel Water Pipe (초고압수를 이용한 노후한 도수 강관 내 스케일 제거에 대한 실험적 연구)

  • Seo, Taewon;Kim, Jin-Dong;Seo, Hyun-Won;Kim, Taedong
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.22 no.4
    • /
    • pp.405-409
    • /
    • 2008
  • This technical paper is proposing a sound concept in the application of the rehabilitation method of the water supply steel pipe in the large diameter ranged from 1,800mm to 3,500mm. There were conducted the experimental tests for the specimens as well as the real steel pipe of diameter 2,200mm. The water pressure ejected from nozzle tip should be at least 2,500bar to have the satisfied surface profiles required in the design criterion. The most difficult thing is to keep the water pressure at the nozzle tip as 2,500bar during the consecutive work in the interval of the work site more than 1km. It is found that the method suggested in this study is adequate method to meet the specified design criteria. The results of this study provide the useful information how to setup the equipments for the successful work. This method also provides not only the omission of the blasting process but also the effect of the budget reduction.

Study on Laughter-arousing Factors of Character Designs of Kakaotalk Emoticons (카카오톡 이모티콘 캐릭터 디자인에서 웃음 유발 요인에 관한 연구)

  • Lee, Eunkoung;Choi, Myoungsik;Kim, Cheeyong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.253-259
    • /
    • 2015
  • The spread of smartphones enabled the two-way communication through the Internet, and character emoticons added fun and comfort to communication among users. To figure out laughter-arousing factors, a survey about emoticon designs of Kakaotalk Itemstore was conducted, targeting university students in their twenties. An interaction of 'user-preferred emoticons' and 'laughter-arousing emoticons' was analyzed. 90% of 'user-preferred emoticons' were 'humorous emoticons', and 84% of respondents answered that there is a relationship between 'user-preferred emoticons' and 'laughter-arousing emoticons'. Consequently, a high interaction between the 'rank of emoticons' and 'laughter-arousing emoticons' was derived. Also, factors of laughter-arousing emoticons were analyzed by studying the ranks of emoticon from 1st to 8th of Kakaotalk Itemstore. Two-divisional figures reminding pure kids, maximization of emotional expression by omission or exaggeration of mouth, and smoothness by concave curves aroused laughter. Intuitively understandable gestures were employed in terms of action. Furthermore, two-divisional figures' acting with comparably small body, hands and foot to their head, and people-mimicking motions of animals with cuteness and familiarity enabled arousal of laughter. In facial expressions, humorous articulation of sad, busy or mad expression enabled positive communion among users.

Secure and Privacy Preserving Protocol for Traffic Violation Reporting in Vehicular Cloud Environment

  • Nkenyereye, Lewis;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.7
    • /
    • pp.1159-1165
    • /
    • 2016
  • Traffic violations such as moving while the traffic lights are red have come from a simple omission to a premeditated act. The traffic control center cannot timely monitor all the cameras installed on the roads to trace and pursue those traffic violators. Modern vehicles are equipped and controlled by several sensors in order to support monitoring and reporting those kind of behaviors which some time end up in severe causalities. However, such applications within the vehicle environment need to provide security guaranties. In this paper, we address the limitation of previous work and present a secure and privacy preserving protocol for traffic violation reporting system in vehicular cloud environment which enables the vehicles to report the traffic violators, thus the roadside clouds collect those information which can be used as evidence to pursue the traffic violators. Particularly, we provide the unlinkability security property within the proposed protocol which also offers lightweight computational overhead compared to previous protocol. We consider the concept of conditional privacy preserving authentication without pairing operations to provide security and privacy for the reporting vehicles.

The Effect of Xiaohongshu Service Quality on the Stickiness Through the Emotional Responses of Users

  • Jie, Xu;Park, Chanuk;Lee, Sin-Bok
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.183-197
    • /
    • 2021
  • Xiaohongshu is called China's Instagram and is leading overseas product purchases and culture sharing. The purpose of this study is to investigate the structural relationship between Xiaohongshu service quality, emotional response perceived by users, and adhesion to confirm the impact on Xiaohongshu's adhesion at a time when non-face-to-face activities due to COVID-19 have increased. This study distributed and collected questionnaires from October 1st to October 7th, 2021, targeting 210 online shopping mall users. The research results were derived from a total of 206 questionnaires, excluding 4 questionnaires such as omission of record contents, and the causal relationship of the existing PAD model was attempted to be reported by revising and supplementing the existing PAD model. As a result of the study, first, it was confirmed that design among service quality had a positive effect only on ventilation during the user's emotional response. Second, it was confirmed that information among service quality had a positive effect on pleasure and ventilation among users' emotional responses. Third, it was found that security among service quality had a positive effect on pleasure among users' emotional responses. Finally, it was found that pleasure and ventilation had a positive effect on adhesion in the user's emotional response. Based on this result, it is expected that it will be used for operation on other online platforms than the plan for the development of Xiaohongshu.

Korean Countermeasures against the Anti-Evasion, Anti-Circumvention in US (미국의 우회덤핑방지제도와 회피방지제도에 대한 우리나라의 대응방안)

  • Oh, Byung-Seok
    • Korea Trade Review
    • /
    • v.44 no.6
    • /
    • pp.231-246
    • /
    • 2019
  • Circumvention refers to the situation in which exporters try to circumvent import restrictions by setting up factories in third countries and assembling and producing parts locally. Circumvention dumping eliminates the impacts of existing anti-dumping measures, and major countries are introducing anti-circumvention dumping laws to address this problem. If the act of the exporting country is recognized as a circumvention dumping activity, anti-dumping duties are applied retroactively to the imported goods or components. Evasion is an act of importation that results in the reduction or non-application of cash deposits, securities, or anti-dumping or countervailing duties, in a manner that is substantive or false, substantive or omission. In this article, we reviewed the contents and examples of the anti-circumvention measures by the US Department of Commerce (DOC), the International Trade Commission (ITC), and the Anti-Evasion measures by the CBP. The CBP examples show how much inference can be made about which parts of the CBP's investigations, and in what ways. The enactment of the EAPA created an environment in which the role of the CBP was directly guaranteed, and it was possible to apply adverse inferences to those who did not respond to requests for information, resulting in stronger CBP's authority. Therefore, it is advisable for Korea to examine the introduction of domestic laws, such as the bypass anti-dumping system, in order to cope with unfair trade practices that undermine and neutralize the effects of anti-dumping measures.

Development Strategies and Feasibility Evaluation of Maintenance Operation System for Railway Bridge Based on Ubiquitous-BIM Technology (Ubiquitous-BIM 기술 기반의 철도교량 유지관리 운영체계 구축 전략 및 타당성 평가)

  • Moon, Hyoun-Seok;Kim, Hyeon-Seung;Kang, Leen-Seok
    • Journal of the Korean Society for Railway
    • /
    • v.15 no.5
    • /
    • pp.459-466
    • /
    • 2012
  • Due to the issues such as omission of data, document based management, maintenance based on measurement data and wire-based network, it is difficult existing maintenance system for railway bridges to act to diverse characteristics of site and environmental changes in real time. With these reasons, there are many constraints in establishing active maintenance strategies for railway bridges. To solve these issues, this study suggests an integrated maintenance business model based on practical utilization and information management based on BIM technology to build a smart maintenance operation system based on ubiquitous computing for railway bridges. To secure its development and practical applications, a quantitative evaluation by questionnaire analysis was performed. Therefore, it is expected that the suggested model will be utilized as a framework model in order to build the smart maintenance operation system from collection of maintenance data to action for railway bridges.

Utility Analysis of Federated Learning Techniques through Comparison of Financial Data Performance (금융데이터의 성능 비교를 통한 연합학습 기법의 효용성 분석)

  • Jang, Jinhyeok;An, Yoonsoo;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.405-416
    • /
    • 2022
  • Current AI technology is improving the quality of life by using machine learning based on data. When using machine learning, transmitting distributed data and collecting it in one place goes through a de-identification process because there is a risk of privacy infringement. De-identification data causes information damage and omission, which degrades the performance of the machine learning process and complicates the preprocessing process. Accordingly, Google announced joint learning in 2016, a method of de-identifying data and learning without the process of collecting data into one server. This paper analyzed the effectiveness by comparing the difference between the learning performance of data that went through the de-identification process of K anonymity and differential privacy reproduction data using actual financial data. As a result of the experiment, the accuracy of original data learning was 79% for k=2, 76% for k=5, 52% for k=7, 50% for 𝜖=1, and 82% for 𝜖=0.1, and 86% for Federated learning.

Research about Busan Port mistake information actual conditions analysis in on-line (온라인상에서의 부산항 오류정보 실태 분석에 관한 연구)

  • 조민제;최형림;박남규;김기원;박용성
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.04a
    • /
    • pp.427-433
    • /
    • 2004
  • Information is increasing continuously in on-line, it is real condition that inaccurate informations are mass-produced but effort to keep accuracy of these informations is lacking. Already, research about government official of information in World Wide Web is consisting of various method and viewpoint, but problem for the importance of correct information offer and offer of mistake information in World Wide Web about specification target and administration way presentation are no research reward yet and system that can keep accuracy of information is not equiped properly. ss and accuracy whether mistake information in harbor and bay connection web site's administration influences how in authoritativeness security of site and present condition information of harbor and bay and operation information. In this study, we wish to present administration way about mistake informations that is required that recognize problem of mistake information and the administration's importance in on-line in this research, and supply phenomenon information in Web site. We made the right definition about mistake of information through priority literature investigation and virtued research for this, and sorted mistake information in type. And we investigated Pusan port connection information and offered present condition in on-line and research on actual state of mistake information offer and analysis. Reflecting type and special quality of examined mistake informations, We want to make people recognize the importance af freshness and accuracy whether mistake information in harbor and bay connection web site's administration influences how in authoritativeness security of site and present condition information of harbor and bay and operation information.

  • PDF

Evaluation of Usability on OntoFrame$OntoFrame^{(R)}$ System (연구개발 전주기 지원 시스템 $OntoFrame^{(R)}$에 대한 사용성 평가)

  • Jung, Han-Min;Kim, Pyung;Kang, In-Su;Lee, Seung-Woo;Lee, Mi-Kyung;Sung, Won-Kyung;Kim, Do-Wan
    • Journal of Information Management
    • /
    • v.38 no.2
    • /
    • pp.153-173
    • /
    • 2007
  • [ $OntoFrame^{(R)}$ ] system provides information dissemination service and inference service, based on Semantic Web framework to fully support R&D activities. Although it is one of state-of-the-art systems in the viewpoint of functionality, we are not able to declare whether it has satisfiable usability because of the omission of usability test in development process. Thus, this research tries to reveal the usability level of the $OntoFrame^{(R)}$, and further to find ways to achieve a user-center system. Both 'theory-based assessment' by a software ergonomics expert and 'user test' by four users are used for evaluating the usability of the $OntoFrame^{(R)}$. We look forward this research to being a basic reference for practical systems aiming at satisfiable usability.

Study on Developing the Information System for ESG Disclosure Management (ESG 정보공시 관리를 위한 정보시스템 개발에 관한 연구)

  • Kim, Seung-wook
    • Journal of Venture Innovation
    • /
    • v.7 no.1
    • /
    • pp.77-90
    • /
    • 2024
  • While discussions on ESG are actively taking place in Europe and other countries, the number of countries pushing for mandatory ESG information disclosure related to non-financial information of listed companies is rapidly increasing. However, as companies respond to mandatory global ESG information disclosure, problems are emerging such as the stringent requirements of global ESG disclosure standards, the complexity of data management, and a lack of understanding and preparation of the ESG system itself. In addition, it requires a reasonable analysis of how business management opportunities and risk factors due to climate change affect the company's financial impact, so it is expected to be quite difficult to analyze the results that meet the disclosure standards. In order to perform tasks such as ESG management activities and information disclosure, data of various types and sources is required and management through an information system is necessary to measure this transparently, collect it without error, and manage it without omission. Therefore, in this study, we designed an ESG data integrated management model to integrate and manage various related indicators and data in order to transparently and efficiently convey the company's ESG activities to various stakeholders through ESG information disclosure. A framework for implementing an information system to handle management was developed. These research results can help companies facing difficulties in ESG disclosure at a practical level to efficiently manage ESG information disclosure. In addition, the presentation of an integrated data management model through analysis of the ESG disclosure work process and the development of an information system to support ESG information disclosure were significant in the academic aspects needed to study ESG in the future.