• Title/Summary/Keyword: 과업집중

Search Result 27, Processing Time 0.027 seconds

Hydraulic Impact Analysis of Geum River with the Operation of Diversion Tunnel for Low Flow Augmentation of Boryong Dam (금강-보령댐 도수터널 운영에 따른 수리영향 분석)

  • JANG, Suk-Hwan;OH, Kyung-Doo;OH, Ji-Hwan
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.359-359
    • /
    • 2016
  • 본 연구에서는 최근 기후변화에 따른 가뭄으로 어려움을 겪고 있는 충청남도 서부권의 물 부족을 해결하기 위하여 금강 본류로부터 보령댐으로 일정 유량을 도수(diversion)하는 계획이 금강 본류에 미치는 수리적 영향을 검토하였으며 특히 금강 본류의 농공용수 취수에 제한을 초래할 수 도 있는 수위에 미치는 영향을 중심으로 분석하였다. 본 연구의 공간적 범위는 금강 하굿둑으로부터 하류 외해 방향으로 약 9km 지점에 위치한 금강 하구로부터 상류 방향으로는 금강 하굿둑으로부터 약 76km 지점에 위치한 공주시 반포면 검상동의 검상천 합류지점까지 총 85km에 이르는 구간에 대한 1차원 수리 모형을 구축하였으며, 시간적 범위는 보령댐으로의 도수가 갈수기에 이루어지는 것으로 가정하여 2015년 2월 1일부터 5월 31일까지 진두수위표의 시간별 유량과 8개 지천의 유입 유량, 장항검조소의 시간별 조위, 농공용수 취수시설 취수량 및 회귀수, 금강 배수갑문 운영 등을 고려하여 모형의 보정을 실시하였고, 유황분석에 따른 2016년 갈수기 예측 유량을 추정하여 보령댐으로의 도수에 따라 금강 본류 내 주요 구간의 수위에 미치는 영향을 분석하고자 하였으며, 서해안 조위에 따른 금강하굿둑 배수갑문의 운영에 직접적인 영향을 받는 배수위 구간임을 감안하여 비정상류 해석(unsteady flow analysis)을 수행하였다. 갈수기 예측 유량 추정 결과 2015년과 같은 가뭄이 지속될 경우, 2016년의 유황은 2015년 대비 21%로 분석되었으며 이는 보령댐 도수 여부에 관계없이 물 부족이 발생할 수 있는 상태인 것으로 분석되었고, 하천유지유량 정도의 유황이 유지되는 상태에서 보령댐으로 도수를 실시할 경우, 도수시 금강호 최저 수위는 각각 EL(+)0.94m와 EL(+)0.72m로 모의되어 농업용수를 비롯한 기존 취수시설 뿐만 아니라 보령댐 도수시설의 운영에도 어려움이 생길 것으로 예상되었다. 2016년 갈수기 동안 과업 대상 구간인 금강 하류부의 유황은 농업용수 취수가 본격화되기 이전인 2월에는 하천유지유량 정도의 유황을 유지하는데 별 어려움이 없지만 3월 이후농업용수 취수가 본격화되면 농업용수 취수시설이 집중된 입포수위표 ~ 금강 하굿둑 사이 구간은 하천유지유량 이하로 유량이 크게 감소할 것으로 예상되었다.

  • PDF

Effects of Interactivity and Usage Mode on User Experience in Chatbot Interface (챗봇 기반 인터페이스의 상호작용성과 사용 모드가 사용자 경험에 미치는 영향)

  • Baek, Hyunji;Kim, Sangyeon;Lee, Sangwon
    • Journal of the HCI Society of Korea
    • /
    • v.14 no.1
    • /
    • pp.35-43
    • /
    • 2019
  • This study examines how interactivity and usage mode of a chatbot interface affects user experience. Chatbot has rapidly been commercialized in accordance with improvements in artificial intelligence and natural language processing. However, most of the researches have focused on the technical aspect to improve the performance of chatbots, and it is necessary to study user experience on a chatbot interface. In this article, we investigated how 'interactivity' of an interface and the 'usage mode' referring to situations of a user affect the satisfaction, flow, and perceived usefulness of a chatbot for exploring user experience. As the result, first, the higher level of interactivity, the higher user experience. Second, usage mode showed interaction effect with interactivity on flow, although it didn't show the main effect. In specific, when interactivity is high in usage mode, flow was the highest rather than other conditions. Thus, for designing better chatbot interfaces, it should be considered to increase the degree of interactivity, and for users to achieve a goal easily through various functions with high interactivity.

Issues and Improvements of Secure Coding for Preventing Cyber Crime: Focus on the Private Company Systems (사이버범죄예방을 위한 시큐어 코딩 적용 문제점과 시사점: 민간기업 시스템을 중심으로)

  • Choi, Kwan
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.69-76
    • /
    • 2018
  • The purpose of this study is to prevent cyber crime in private company systems by applying secure coding and identify its problems. Three experiments were conducted. In Experiment 1, a security manager was participated and gave advise to the developer to follow secure coding guidelines. In Experiment 2, a security manager did not participate, but let the developer himself committed on secure coding. In Experiment 3, a security manager provided reports on weaknesses of each package source to the developer and the developer was only focused on source development. The research results showed that the participation of a security manager on development raised secure coding compliance rate and finished the project within a given periods. Furthermore, it was better to entrust a security manager with the task of following the secure coding guide than the developer, which raised secure coding compliance rate and achieved project objectives faster. Further implications were discussed.

  • PDF

How to set up and implement a presidential archives system in Korea? : Examples and lessons from U.S. experiences (대통령기록관의 설립과 운영 방향 : 미국 대통령기록관의 사례와 교훈)

  • See, Sang-Min
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.1 no.2
    • /
    • pp.31-55
    • /
    • 2001
  • I examined the U.S. presidential library system and suggested some directions of establishment and management presidential library in Korea. To promote the preservation and use of presidential records, it is very important to establish an workable presidential archives system in Korea. Following is my observations and lessons from the study of U.S. presidential library system It is legitimate and reasonable to establish a presidential archives system in Korea under the authority of GARS for professional and neutral management. The presidential archives should be managed professionally and neutrally, free of political interventions and parti san considerations. For accountability and transparency of the government, the neutrality of the presidential archives is a must. The presidential records should be protected for a certain period to encourage their production and preservation. A legal apparatus to protect them is necessary. Archivists should make a comprehensive catalog of the presidential archives available to public, especially provide an online search system. Online catalog system of Ford and Carter Presidential Libraries are examined to help understanding of the issue. Finally, GARS should proceed to make a workable laws and regulations Lo provide the legal foundations for the establishment of the presidential archives. Public awareness and supports will only malle it possible. In sum, the presidential archives should be established as an attached archives of the GARS to guarantee a professional and neutral management.

Development and Application of Modified SWMM to Simulate Permeable Pavement and Infiltration Trench (투수성 포장과 침투 트렌치를 고려한 수정 SWMM의 개발 및 적용)

  • Lee, Jung-Min;Lee, Sang-Ho;Park, Jae-Hyeon;Lee, Kil-Seong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.326-330
    • /
    • 2007
  • 도시화 면적이 증가하면 불투수 면적이 증가하고 그에 따라 도시 하천의 평상시 유출이 감소한다. 도시유역의 평상시 수량을 회복시키는 방법으로는 침투 증진시설(투수성 포장, 침투 트렌치, 침투 측구 등)의 설치, 하수의 고도처리 후 방류 저수지에 의한 유황 개선, 지하철 용출수 활용 등이 있다. 우리나라의 경우에 일부 도시하천의 수량 감소가 심각한 상황에 이르고 있으며 이를 해결하고자 하는 노력이 최근에 나타나고 있다. 수량을 회복하려면 유량 평가를 위한 현장조사, 수량회복 계획, 재원의 반영, 수량회복 시설의 설치 및 관리의 순서로 단계별 사업이 수행되어야 한다. 계획 단계의 과업에서 필요한 사항은 여러 가지 수량 회복 방법의 영향을 정량 평가하는 것이다. 이에 핵심이 되는 것은 수량 회복 요소를 포함하거나 추가한 수문순환 평가 도구이다. 침투시설 중 투수성 포장과 침투 트렌치를 모의하도록 기존의 SWMM 모형을 수정하였다. 그 과정에서 증발량 처리와 지하수 출력기능에 대한 오류도 수정되었다. 수정 개발된 SWMM을 침투시설 모형실험 결과와 비교하여 수정된 프로그램의 적합성을 검증하였다. 투수성 포장과 침투 트렌치를 고려하여 수정된 프로그램을 안양천의 지류인 학의천 유역에 적용하여 침투시설의 효과를 분석하였다. 만일 학의천 불투수 면적의 10%를 투수성 포장으로 교체하면 하류 비산교 지점의 저수량$(Q_{275})$이 3 %, 갈수량$(Q_{355})$이 17 % 증가하는 것으로 분석되었다. 침투 트렌치의 경우 학의천 소유역 별로 100m 트렌치를 $5{\sim}10$개 시공할 경우 저수량은 약 1 %, 갈수량은 약9 %가 증가하였다. 수정 개발된 SWMM을 사용하면 침투 트렌치와 투수성 포장 이 도시 유역의 건기 수량회복에 미치는 영향을 분석할 수 있다.해 경보발령 이전에 한계수위를 넘어서는 경우(case_3)로서 분석되었다. 이러한 실패한 경보발령의 경우에 대한 원인분석 결과, 기존의 모형화를 통해 고려되지 못하였던 해안도시 홍수의 특성 중 총강우량에 대한 고려, 선행강우 여부 및 강우 지속시간, 지속시간 내 강우집중도 그리고 선정지점 내 조위의 영향과 유역내 합류식 하수관거 시스템의 영향 등 자연유역과는 다른 다소 복잡한 요소를 고려한 해안도시홍수 경보발령 기준에 대한 개선이 필요함을 확인할 수 있었다.이 좋다고 고찰된다. 6. 우리 나라의 현행 수도작기로 본 기온 및 일조조건은 수도의 분얼전기에 대해서는 호조건하에 놓여 있으나, 분얼후기인 7월 중ㆍ하순 경의 일조부족과 고온다습조건은 병해, 특히 도열병의 유발원인이 되고 있다. 7. 우리 나라의 현행수도작기로 본 전국각지의 수도의 출수기는 모두 일조시간이 적은 부적당한 시기에 처해 있다. 8. 출수후 40일간의 평균기온에 의한 적산온도 88$0^{\circ}C$의 출현기일은 수원에서 8월 23일이었고, 년간편차를 고려한 안전출수기일은 8월 19일로서 적산온도면에서는 관행 출수기일은 약간 늦다고 보았다. 9. 등열기의 평균기온에 의한 적산온도는 현행 수도작기로서는 최종한계시기에 놓여 있으며, 평균기온의 년간편차와 우리 나라의 최저기온이 낮은 점을 고려할 때, 현행출수기는 다소 늦은 것으로 보았다. 10. 생육단계별의 수도체내의 질소함량은 영양생장기의 질소함량이 과다하였으며, 출수 이후에 영양조락을 여하히 방지하느냐가 문제된다고 보았다. 11. 수리불안전답 및 천수답이 차지하는 전답면적의 비율은 차차 감소되고 있는데, 이와 전체 10a당 수량의 증가율과의 상관계수를 산출하였는데, 수리불안전답과의 상관계수 (4)는 +0.525였으며, 천수답과는 r=+0.832, 그리고 수리불안전답과 천수답을 합계한 것과의

  • PDF

The Effect of Meta-Features of Multiclass Datasets on the Performance of Classification Algorithms (다중 클래스 데이터셋의 메타특징이 판별 알고리즘의 성능에 미치는 영향 연구)

  • Kim, Jeonghun;Kim, Min Yong;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.1
    • /
    • pp.23-45
    • /
    • 2020
  • Big data is creating in a wide variety of fields such as medical care, manufacturing, logistics, sales site, SNS, and the dataset characteristics are also diverse. In order to secure the competitiveness of companies, it is necessary to improve decision-making capacity using a classification algorithm. However, most of them do not have sufficient knowledge on what kind of classification algorithm is appropriate for a specific problem area. In other words, determining which classification algorithm is appropriate depending on the characteristics of the dataset was has been a task that required expertise and effort. This is because the relationship between the characteristics of datasets (called meta-features) and the performance of classification algorithms has not been fully understood. Moreover, there has been little research on meta-features reflecting the characteristics of multi-class. Therefore, the purpose of this study is to empirically analyze whether meta-features of multi-class datasets have a significant effect on the performance of classification algorithms. In this study, meta-features of multi-class datasets were identified into two factors, (the data structure and the data complexity,) and seven representative meta-features were selected. Among those, we included the Herfindahl-Hirschman Index (HHI), originally a market concentration measurement index, in the meta-features to replace IR(Imbalanced Ratio). Also, we developed a new index called Reverse ReLU Silhouette Score into the meta-feature set. Among the UCI Machine Learning Repository data, six representative datasets (Balance Scale, PageBlocks, Car Evaluation, User Knowledge-Modeling, Wine Quality(red), Contraceptive Method Choice) were selected. The class of each dataset was classified by using the classification algorithms (KNN, Logistic Regression, Nave Bayes, Random Forest, and SVM) selected in the study. For each dataset, we applied 10-fold cross validation method. 10% to 100% oversampling method is applied for each fold and meta-features of the dataset is measured. The meta-features selected are HHI, Number of Classes, Number of Features, Entropy, Reverse ReLU Silhouette Score, Nonlinearity of Linear Classifier, Hub Score. F1-score was selected as the dependent variable. As a result, the results of this study showed that the six meta-features including Reverse ReLU Silhouette Score and HHI proposed in this study have a significant effect on the classification performance. (1) The meta-features HHI proposed in this study was significant in the classification performance. (2) The number of variables has a significant effect on the classification performance, unlike the number of classes, but it has a positive effect. (3) The number of classes has a negative effect on the performance of classification. (4) Entropy has a significant effect on the performance of classification. (5) The Reverse ReLU Silhouette Score also significantly affects the classification performance at a significant level of 0.01. (6) The nonlinearity of linear classifiers has a significant negative effect on classification performance. In addition, the results of the analysis by the classification algorithms were also consistent. In the regression analysis by classification algorithm, Naïve Bayes algorithm does not have a significant effect on the number of variables unlike other classification algorithms. This study has two theoretical contributions: (1) two new meta-features (HHI, Reverse ReLU Silhouette score) was proved to be significant. (2) The effects of data characteristics on the performance of classification were investigated using meta-features. The practical contribution points (1) can be utilized in the development of classification algorithm recommendation system according to the characteristics of datasets. (2) Many data scientists are often testing by adjusting the parameters of the algorithm to find the optimal algorithm for the situation because the characteristics of the data are different. In this process, excessive waste of resources occurs due to hardware, cost, time, and manpower. This study is expected to be useful for machine learning, data mining researchers, practitioners, and machine learning-based system developers. The composition of this study consists of introduction, related research, research model, experiment, conclusion and discussion.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.