• Title/Summary/Keyword: 계층적 분석방법

Search Result 1,210, Processing Time 0.027 seconds

A study on Operation factors the Used automobile logistics complex using Fuzzy-AHP (Fuzzy-AHP를 활용한 인천항 중고자동차 물류단지 운영 성공요인에 대한 연구)

  • Kim, Byung-Hwa;Cha, Young-Doo;Ma, Hye-Min;Yeo, Gi-Tae
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.97-109
    • /
    • 2017
  • Domestic vehicle penetration rate is growing at 3% per year, but consumers are increasingly buying used cars due to steady price hikes Nevertheless, the used car export market is expected to decline due to import regulations of major countries and the low grade environment of Used car export complex. Therefore, this study using Fuzzy-AHP was aimed to find operational factors of Used car logistics complex and establish a practical management plan of Used car logistic complex in incheon port. Fuzzy-AHP is the method that can be calculated weight of multi-level criteria and change linguistic ambiguity of human to Fuzzy Number. So it's able to propose the realistic decision making alternatives. As a result of the literacture reviews, present study focused on the analysis of the present situation of the logistics of the used car and the activation of the complex, suggested the activation plan and activation of the logistics complex. In the analysis of operational factors, logistic complex cost factors were found to be the most important factors by recording the weighted value of 0.306 in the above factors. The detailed factors were as follows: rent, accessibility, and logistics site size. It is necessary to compute competitive rent for the highly-advanced used car logistics complex, and to realize the rental support policy and to consider designating the free trade zone. In addition, it is necessary to expand the access infrastructure and secure the scale of the company for overseas buyers, and it is necessary to improve the overall government laws and introduce IT system for the future.

A Study on the Development Strategy of Smart Learning for Public Education (스마트러닝의 공교육 정착을 위한 성공전략 연구)

  • Kim, Taisiya;Cho, Ji Yeon;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.16 no.6
    • /
    • pp.123-131
    • /
    • 2015
  • Recently the development of ICT has a big impact on education field, and diffusion of smart devices has brought new education paradigm. Since people has an opportunity to use various contents anytime and communicate in an interactive way, the method of learning has changing. In 2011, Korean government has established the smart education promotion plan to be a first mover in the paradigm shift from e-learning to smart learning. Especially, government aimed to improve the quality of learning materials and method in public schools, and also to decrease the high expenditure on private education. However, the achievement of smart education policy has not emerged yet, and the refinement of smart learning policy and strategy is essential at this moment. Therefore, the purpose of this study is to propose the successful strategies for smart learning in public education. First, this study explores the status of public education and smart learning environment in Korea. Then, it derives the key success factors through SWOT(Strength, Weakness, Opportunity, Threat) analysis, and suggests strategic priorities through AHP(Analytic Hierarchy Priority) method. The interview and survey were conducted with total 20 teachers, who works in public schools. As a results, focusing on weakness-threat(WT) strategy is the most prior goal for public education, to activate the smart learning. As sub-factors, promoting the education programs for teachers($W_2$), which is still a weakness, appeared as the most important factor to be improved. The second sub-factor with high priority was an efficient optimizing the capability of new learning method($S_4$), which is a strength of systematic public education environment. The third sub-factor with high priority was the extension of limited government support($T_4$), which could be a threat to other public schools with no financial support. In other words, the results implicate that government institution factors should be considered with high priority to make invisible achievement in smart learning. This study is significant as an initial approach with strategic perspective for public education. While the limitation of this study is that survey and interview were conducted with only teachers. Accordingly, the future study needs to be analyzed in effectiveness and feasibility, by considering perspectives from field experts and policy makers.

A Study on the Qualitative Evaluation Factors for Mobile Game Company (모바일게임 기업의 정성적 평가요인에 관한 연구)

  • Choi, Seok Kyun;Hwangbo, Yun;Rhee, Do Yun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.3
    • /
    • pp.125-146
    • /
    • 2013
  • Nowadays, the performance of the mobile game sales is influencing the ranking of game companies listed on KOSDAQ. In the meantime, venture capital companies had focused on online game. Recently, however, they have great interest in mobile games and mobile game companies. In addition, angel investors and accelerators are increasing investment for the mobile game companies. The most important issues for mobile game investor is how to evaluate the mobile game companies and their contents. Therefore, this study derived the evaluation factors for the mobile game company. And research method converged of the opinions of both supply side and demand side of the game industry. Ten professionals who are responsible for the supply of the game industry and CEO group & development experts of game development company were selected for survey in this study. Also ten professionals who are responsible for the demand of the game industry and the investment company were selected for survey in this study. And Delphi technique was performed according to the survey. Management skills, development capabilities, game play, feasibility, operational capabilities has emerged as five evaluation factors to evaluate the mobile game company. And the 20 sub-factors including CEO's reliability were derived. AHP(Analytic Hierarchy Process) theory is applied to analyze the importance of the qualitative elements which were derived by Delphi technique. As a result, the analysis hierarchy of evaluation factors for the mobile game company was created. Pair-wise comparison for each element was performed to analyze the importance. As a result, 'Core fun of the game' (12,2%), 'Involvement of the game' (10.3%), 'Security Reliability' (8.9%), 'Core developers' ability' (7.6%) appeared in order of importance. The significance of this study is offering more objective methodology for realistic assessment and importance of elements to evaluate mobile game company.

  • PDF

Literature Analysis of Radiotherapy in Uterine Cervix Cancer for the Processing of the Patterns of Care Study in Korea (한국에서 자궁경부알 방사선치료의 Patterns of Care Study 진행을 위한 문헌 비교 연구)

  • Choi Doo Ho;Kim Eun Seog;Kim Yong Ho;Kim Jin Hee;Yang Dae Sik;Kang Seung Hee;Wu Hong Gyun;Kim Il Han
    • Radiation Oncology Journal
    • /
    • v.23 no.2
    • /
    • pp.61-70
    • /
    • 2005
  • Purpose: Uterine cervix cancer is one of the most prevalent women cancer in Korea. We analysed published papers in Korea with comparing Patterns of Care Study (PCS) articles of United States and Japan for the purpose of developing and processing Korean PCS. Materials and Methods: We searched PCS related foreign-produced papers in the PCS homepage (212 articles and abstracts) and from the Pub Med to find Structure and Process of the PCS. To compare their study with Korean papers, we used the internet site 'Korean Pub Med' to search 99 articles regarding uterine cervix cancer and radiation therapy. We analysed Korean paper by comparing them with selected PCS papers regarding Structure, Process and Outcome and compared their items between the period of before 1980's and 1990's. Results: Evaluable papers were 28 from United States, 10 from the Japan and 73 from the Korea which treated cervix PCS items. PCS papers for United States and Japan commonly stratified into $3\~4$ categories on the bases of the scales characteristics of the facilities, numbers of the patients, doctors, Researchers restricted eligible patients strictly. For the process of the study, they analysed factors regarding pretreatment staging in chronological order, treatment related factors, factors in addition to FIGO staging and treatment machine. Papers in United States dealt with racial characteristics, socioeconomic characteristics of the patients, tumor size (6), and bilaterality of parametrial or pelvic side wail invasion (5), whereas papers from Japan treated of the tumor markers. The common trend in the process of staging work-up was decreased use of lymphangiogram, barium enema and increased use of CT and MRI over the times. The recent subject from the Korean papers dealt with concurrent chemoradiotherapy (9 papers), treatment duration (4), tumor markers (B) and unconventional fractionation. Conclusion: By comparing papers among 3 nations, we collected items for Korean uterine cervix cancer PCS. By consensus meeting and close communication, survey items for cervix cancer PCS were developed to measure structure, process and outcome of the radiation treatment of the cervix cancer. Subsequent future research will focus on the use of brachytherapy and its impact on outcome including complications. These finding and future PCS studies will direct the development of educational programs aimed at correcting identified deficits in care.

Effective Design Pattern and Enterprise Architecture Design Techniques in EJB Environment (EJB기반의 효율적인 설계 패턴 및 엔터프라이즈 아키텍처 설계 기법)

  • 민현기;김수동
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.11
    • /
    • pp.1025-1036
    • /
    • 2003
  • In industry, it is a current trend that systems are developed by using Enterprise JavaBeans(EJB) technology for reducing the cost and the time. Thus, the architecture of EJB is getting more essential to enhance reusability, extensibility and portability of system. However little has been studied in the realm of the practical software architectures for EJB. The architecture has just bean studied in abstract level, but not in concrete level providing the method to substantiate it using the practical J2EE techniques. Just using the EJB technology doesn't guarantee the reusability of the artifacts because EJB specification provides the characteristics and architecture for only fine grained components as session and entity bean. In this paper, we propose the enterprise software architecture for the systems based on EJB and the concrete techniques for implementing that. Also, design patterns of modeling efficient enterprise architecture are represented. By analyzing both the strengths and the weaknesses of suggested design patterns, EJB design patterns which are suitable for each layer of enterprise architecture will be identified. Through the component which design patterns are applied, the architecture can support the optimized relationship between the components. Five techniques for designing components from fine grained to coarse grained based on EJB technology, and architecture design techniques including transaction and assembling techniques are proposed.

The Effect of Wireless Channel Models on the Performance of Sensor Networks (채널 모델링 방법에 따른 센서 네트워크 성능 변화)

  • 안종석;한상섭;김지훈
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.375-383
    • /
    • 2004
  • As wireless mobile networks have been widely adopted due to their convenience for deployment, the research for improving their performance has been actively conducted. Since their throughput is restrained by the packet corruption rate not by congestion as in wired networks, however, network simulations for performance evaluation need to select the appropriate wireless channel model representing the behavior of propagation errors for the evaluated channel. The selection of the right model should depend on various factors such as the adopted frequency band, the level of signal power, the existence of obstacles against signal propagation, the sensitivity of protocols to bit errors, and etc. This paper analyzes 10-day bit traces collected from real sensor channels exhibiting the high bit error rate to determine a suitable sensor channel model. For selection, it also evaluates the performance of two error recovery algorithms such as a link layer FEC algorithm and three TCPs (Tahoe, Reno, and Vegas) over several channel models. The comparison analysis shows that CM(Chaotic Map) model predicts 3-time less BER variance and 10-time larger PER(Packet Error Rate) than traces while these differences between the other models and traces are larger than 10-time. The simulation experiments, furthermore, prove that CM model evaluates the performance of these algorithms over sensor channels with the precision at least 10-time more accurate than any other models.

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.

Development of a complex failure prediction system using Hierarchical Attention Network (Hierarchical Attention Network를 이용한 복합 장애 발생 예측 시스템 개발)

  • Park, Youngchan;An, Sangjun;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.127-148
    • /
    • 2020
  • The data center is a physical environment facility for accommodating computer systems and related components, and is an essential foundation technology for next-generation core industries such as big data, smart factories, wearables, and smart homes. In particular, with the growth of cloud computing, the proportional expansion of the data center infrastructure is inevitable. Monitoring the health of these data center facilities is a way to maintain and manage the system and prevent failure. If a failure occurs in some elements of the facility, it may affect not only the relevant equipment but also other connected equipment, and may cause enormous damage. In particular, IT facilities are irregular due to interdependence and it is difficult to know the cause. In the previous study predicting failure in data center, failure was predicted by looking at a single server as a single state without assuming that the devices were mixed. Therefore, in this study, data center failures were classified into failures occurring inside the server (Outage A) and failures occurring outside the server (Outage B), and focused on analyzing complex failures occurring within the server. Server external failures include power, cooling, user errors, etc. Since such failures can be prevented in the early stages of data center facility construction, various solutions are being developed. On the other hand, the cause of the failure occurring in the server is difficult to determine, and adequate prevention has not yet been achieved. In particular, this is the reason why server failures do not occur singularly, cause other server failures, or receive something that causes failures from other servers. In other words, while the existing studies assumed that it was a single server that did not affect the servers and analyzed the failure, in this study, the failure occurred on the assumption that it had an effect between servers. In order to define the complex failure situation in the data center, failure history data for each equipment existing in the data center was used. There are four major failures considered in this study: Network Node Down, Server Down, Windows Activation Services Down, and Database Management System Service Down. The failures that occur for each device are sorted in chronological order, and when a failure occurs in a specific equipment, if a failure occurs in a specific equipment within 5 minutes from the time of occurrence, it is defined that the failure occurs simultaneously. After configuring the sequence for the devices that have failed at the same time, 5 devices that frequently occur simultaneously within the configured sequence were selected, and the case where the selected devices failed at the same time was confirmed through visualization. Since the server resource information collected for failure analysis is in units of time series and has flow, we used Long Short-term Memory (LSTM), a deep learning algorithm that can predict the next state through the previous state. In addition, unlike a single server, the Hierarchical Attention Network deep learning model structure was used in consideration of the fact that the level of multiple failures for each server is different. This algorithm is a method of increasing the prediction accuracy by giving weight to the server as the impact on the failure increases. The study began with defining the type of failure and selecting the analysis target. In the first experiment, the same collected data was assumed as a single server state and a multiple server state, and compared and analyzed. The second experiment improved the prediction accuracy in the case of a complex server by optimizing each server threshold. In the first experiment, which assumed each of a single server and multiple servers, in the case of a single server, it was predicted that three of the five servers did not have a failure even though the actual failure occurred. However, assuming multiple servers, all five servers were predicted to have failed. As a result of the experiment, the hypothesis that there is an effect between servers is proven. As a result of this study, it was confirmed that the prediction performance was superior when the multiple servers were assumed than when the single server was assumed. In particular, applying the Hierarchical Attention Network algorithm, assuming that the effects of each server will be different, played a role in improving the analysis effect. In addition, by applying a different threshold for each server, the prediction accuracy could be improved. This study showed that failures that are difficult to determine the cause can be predicted through historical data, and a model that can predict failures occurring in servers in data centers is presented. It is expected that the occurrence of disability can be prevented in advance using the results of this study.

Dental Hygienist-Led Dental Hygiene Process of Care for Self-Support Program Participants in Gangneung (강릉시 자활근로사업 참여자 대상 치위생 과정 사례보고)

  • Yoo, Sang-Hee;Kwak, Seon-Hui;Lee, Sue-Hyang;Song, Ga-In;Bae, Soo-Myoung;Shin, Sun-Jung;Shin, Bo-Mi
    • Journal of dental hygiene science
    • /
    • v.18 no.6
    • /
    • pp.327-339
    • /
    • 2018
  • This study aimed to provide basic data for establishing the clinical basis for dental hygienist-led dental hygiene process of care by identifying multiple risk factors for self-support program participants in Gangneung city; we also compared oral health status and behavioral changes through customized oral health care. Four dental hygienists who were evaluated for degree of conformity provided dental hygiene process of care to eight self-support program participants who were selected as having an oral health risk among people in the self-support center. The clinical indicators measured during dental hygiene assessment and evaluation and behavioral changes due to dental hygiene intervention were compared and analyzed. With respect to clinical indicators, at the time of probe, the retention rate of patients with gingival bleeding decreased from 61.4% to 14.7% after intervention (p=0.004). Furthermore, the retention rate of patients with a periodontal pocket >4 mm decreased from 15.6% to 5.8% (p=0.001). The average modified O'Leary index of the patients improved from 23 to 40 (p=0.002). Previously, all eight subjects used the vertical or horizontal method of brushing; after dental hygiene care interventions regarding method and frequency of toothbrushing, use of oral care products, and individual interventions, they started using the rolling or Bass method of toothbrushing. Four of eight subjects reported using interdental toothbrushes after intervention. As a result of applying the change model to the transtheoretical behavior change of the subject, the result of strengthening the health behavior was confirmed. For promotion of oral health by the prevention-centered incremental oral health care system, dental hygienist-led dental hygiene management and maintenance is essential. It is thought that continuous research, such as for feasibility evaluation, cost benefit analysis, and preparation of legal systems, is needed to establish and activate dental hygiene management.

A Study on Perception Change in Bicycle users' Outdoor Activity by Particulate Matter: Based on the Social Network Analysis (미세먼지로 인한 자전거 이용객의 야외활동 인식변화에 관한 연구: 사회네트워크분석을 중심으로)

  • Kim, Bomi;Lee, Dong Kun
    • Journal of Environmental Impact Assessment
    • /
    • v.28 no.5
    • /
    • pp.440-456
    • /
    • 2019
  • The controversy of the risk perception related to particulate matters becomes significant. Therefore, in order to understand the nature of the particulate matters, we gathered articles and comments in on-line community related to bicycling which is affected by exposure of the particulate matters. As a result, firstly, the government - led particulate matter policy was strengthened and segmented every period, butthe risk perception related to particulate matters in the bicycle community has become active and serious. Second, as a result of analyzing the perception change of outdoor activities related to particulate matters, bicycle users in community showed a tendency of outdoor activity depending on the degree of particulate matters ratherthan the weather. In addition, the level of the risk perception related to particulate matters has been moved from fears of serious threat in daily life and health, combined with the disregard of domestic particulate matter levels or mask performance. Ultimately, these risk perception related to particulate matters have led some of the bicycling that were mainly enjoyed outdoors to the indoor space. However, in comparison with outdoor bicycling enjoyed by various factors such as scenery, people, and weather, the monotonous indoor bicycling was converted into another type of indoor exercise such as fitness and yoga. In summary, it was derived from mistrust of excessive information or policy provided by the government or local governments. It is considered that environmental policy should be implemented after discussion of risk communication that can reduce the gap between public anxiety and concern so as to cope with the risk perception related to particulate matters. Therefore,this study should be provided as an academic basis for the effective communication direction when decision makers establish the policy related to particulate matters.