• Title/Summary/Keyword: 관리 한계

Search Result 2,945, Processing Time 0.031 seconds

A Study on Efficient IPv6 Address Allocation for Future Military (미래 군을 위한 효율적인 IPv6 주소 할당에 관한 연구)

  • Hanwoo Lee;Suhwan Kim;Gunwoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.613-618
    • /
    • 2023
  • The advancement of Information and Communication Technology (ICT) is accelerating innovation across society, and the defense sector is no exception as it adopts technologies aligned with the Fourth Industrial Revolution. In particular, the Army is making efforts to establish an advanced Army TIGER 4.0 system, aiming to create highly intelligent and interconnected mobile units. To achieve this, the Army is integrating cutting-edge scientific and technological advancements from the Fourth Industrial Revolution to enhance mobility, networking, and intelligence. However, the existing addressing system, IPv4, has limitations in meeting the exponentially increasing demands for network IP addresses. Consequently, the military considers IPv6 address allocation as an essential process to ensure efficient network management and address space provisioning. This study proposes an approach for IPv6 address allocation for the future military, considering the Army TIGER system. The proposal outlines how the application networks of the Army can be differentiated, and IP addresses can be allocated to future unit structures of the Army, Navy, and Air Force, from the Ministry of National Defense and the Joint Chiefs of Staff. Through this approach, the Army's advanced ground combat system, Army TIGER 4.0, is expected to operate more efficiently in network environments, enhancing overall information exchange and mobility for the future military.

Numerical simulation of flood water level in a small mountain stream considering cross-section blocking and riverbed changes - A case study of Shingwangcheon stream in Pohang before and after Typhoon Hinnamnor flood (단면 폐색과 하상 변화를 고려한 산지 중소하천의 홍수위 수치모의 - 태풍 힌남노 전후의 포항 신광천을 사례로 -)

  • Lee, Chanjoo;Jang, Eun-kyung;Ahn, Sunggi;Kang, Woochul
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.12
    • /
    • pp.837-844
    • /
    • 2023
  • Small and medium-sized mountain rivers that flow through steep, confined valleys carry large amounts of coarse-grained sediment and woody debris during floods. It causes an increase in flood water level by aggrading the riverbed and the cross-section blockage due to driftwood accumulation during flooding. However, the existing flood level calculation in the river basic plan does not consider these changes. In this study, using the Typhoon Hinnamnor flood in September 2022 as an example, we performed numerical simulations using the HEC-RAS model, taking into account the blockage of a cross-section at the bridge and changes in riverbed elevation that occurred during floods, and analyzed the flood level to predict flood risk. This study's results show that flooding occurs if more than 30% of the cross-section is blocked. The rise of flood water levels corresponds to that of the riverbed due to sediment deposition. These results can be used as basic data to prevent and effectively manage flood damage and contribute to establishing flood defense measures that consider actual phenomena.

Analyzing the Online Game User's Game Item Transacting Behaviors by Using Fuzzy Logic Agent-Based Modeling Simulation (온라인 게임 사용자의 게임 아이템 거래 행동 특성 분석을 위한 퍼지논리 에이전트 기반 모델링 시뮬레이션)

  • Min Kyeong Kim;Kun Chang Lee
    • Information Systems Review
    • /
    • v.23 no.1
    • /
    • pp.1-22
    • /
    • 2021
  • This study aims to analyze online game user's game items transacting behaviors for the two game genres such as MMORPG and sports game. For the sake of conducting the analysis, we adopted a fuzzy logic agent-based modeling. In the online game fields, game items transactions are crucial to game company's profitability. However, there are lack of previous studies investigating the online game user's game items transacting activities. Since many factors need to be addressed in a complicated way, ABM (agent-based modeling) simulation mechanism is adopted. Besides, a fuzzy logic is also considered due to the fact that a number of uncertainties and ambiguities exist with respect to online game user's complex behaviors in transacting game items. Simulation results from applying the fuzzy logic ABM method revealed that MMORPG game users are motivated to pay expensive price for high-performance game items, while sports game users tend to transact game items within a reasonable price range. We could conclude that the proposed fuzzy logic ABM simulation mechanism proved to be very useful in organizing an effective strategy for online game items management and customers retention.

Cox Model Improvement Using Residual Blocks in Neural Networks: A Study on the Predictive Model of Cervical Cancer Mortality (신경망 내 잔여 블록을 활용한 콕스 모델 개선: 자궁경부암 사망률 예측모형 연구)

  • Nang Kyeong Lee;Joo Young Kim;Ji Soo Tak;Hyeong Rok Lee;Hyun Ji Jeon;Jee Myung Yang;Seung Won Lee
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.6
    • /
    • pp.260-268
    • /
    • 2024
  • Cervical cancer is the fourth most common cancer in women worldwide, and more than 604,000 new cases were reported in 2020 alone, resulting in approximately 341,831 deaths. The Cox regression model is a major model widely adopted in cancer research, but considering the existence of nonlinear associations, it faces limitations due to linear assumptions. To address this problem, this paper proposes ResSurvNet, a new model that improves the accuracy of cervical cancer mortality prediction using ResNet's residual learning framework. This model showed accuracy that outperforms the DNN, CPH, CoxLasso, Cox Gradient Boost, and RSF models compared in this study. As this model showed accuracy that outperformed the DNN, CPH, CoxLasso, Cox Gradient Boost, and RSF models compared in this study, this excellent predictive performance demonstrates great value in early diagnosis and treatment strategy establishment in the management of cervical cancer patients and represents significant progress in the field of survival analysis.

Analyzing Factors Affecting the Use of Landowner's Purchase Requisition Policy in Bukhansan National Park (북한산국립공원 내 토지매수 청구 제도 활용 요인 분석)

  • Chan Yong Sung;Young Jae Yi
    • Korean Journal of Environment and Ecology
    • /
    • v.37 no.6
    • /
    • pp.499-507
    • /
    • 2023
  • This study conducted an empirical analysis on a land purchase requisition policy in Bukhansan National Park to draw the efficacy, limitations and implications of this policy. A logistic regression analysis was conducted to identify factors that affected the landowners' decision on applying for land purchase requisition using the government's records on acquisition of private lands in the park since 2006 when this policy began to be implemented. Results illustrate that the probability that a landowner applied for purchase requisition increased if the land was classified as forest, if a large proportion of the land was designated as the nature conservation district, if it was located farther from park boundary, and if it had higher appraised value per square meter. These results indicate that as the landowners had less chance to utilize their lands, they more likely apply for purchase requisition. These results also imply that the government can achieve a high conservation performance level if private lands are acquire by the land acquisition requisition policy. The logistic regression model also predict that 401m2 of the private lands in Bukhansan National Park will likely be purchase-requested in future. Despites its usefulness in mitigating landowners' complaints in national parks, the land purchase requisition policy has not been widely utilized. Based on these empirical results, this study provides policy implications to facilitate the ulitization of this policy.

A Method for Extracting Equipment Specifications from Plant Documents and Cross-Validation Approach with Similar Equipment Specifications (플랜트 설비 문서로부터 설비사양 추출 및 유사설비 사양 교차 검증 접근법)

  • Jae Hyun Lee;Seungeon Choi;Hyo Won Suh
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.2
    • /
    • pp.55-68
    • /
    • 2024
  • Plant engineering companies create or refer to requirements documents for each related field, such as plant process/equipment/piping/instrumentation, in different engineering departments. The process-related requirements document includes not only a description of the process but also the requirements of the equipment or related facilities that will operate it. Since the authors and reviewers of the requirements documents are different, there is a possibility that inconsistencies may occur between equipment or parts design specifications described in different requirement documents. Ensuring consistency in these matters can increase the reliability of the overall plant design information. However, the amount of documents and the scattered nature of requirements for a same equipment and parts across different documents make it challenging for engineers to trace and manage requirements. This paper proposes a method to analyze requirement sentences and calculate the similarity of requirement sentences in order to identify semantically identical sentences. To calculate the similarity of requirement sentences, we propose a named entity recognition method to identify compound words for the parts and properties that are semantically central to the requirements. A method to calculate the similarity of the identified compound words for parts and properties is also proposed. The proposed method is explained using sentences in practical documents, and experimental results are described.

A Multi-Compartment Secret Sharing Method (다중 컴파트먼트 비밀공유 기법)

  • Cheolhoon Choi;Minsoo Ryu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.34-40
    • /
    • 2024
  • Secret sharing is a cryptographic technique that involves dividing a secret or a piece of sensitive information into multiple shares or parts, which can significantly increase the confidentiality of a secret. There has been a lot of research on secret sharing for different contexts or situations. Tassa's conjunctive secret sharing method employs polynomial derivatives to facilitate hierarchical secret sharing. However, the use of derivatives introduces several limitations in hierarchical secret sharing. Firstly, only a single group of participants can be created at each level due to the shares being generated from a sole derivative. Secondly, the method can only reconstruct a secret through conjunction, thereby restricting the specification of arbitrary secret reconstruction conditions. Thirdly, Birkhoff interpolation is required, adding complexity compared to the more accessible Lagrange interpolation used in polynomial-based secret sharing. This paper introduces the multi-compartment secret sharing method as a generalization of the conjunctive hierarchical secret sharing. Our proposed method first encrypts a secret using external groups' shares and then generates internal shares for each group by embedding the encrypted secret value in a polynomial. While the polynomial can be reconstructed with the internal shares, the polynomial just provides the encrypted secret, requiring external shares for decryption. This approach enables the creation of multiple participant groups at a single level. It supports the implementation of arbitrary secret reconstruction conditions, as well as conjunction. Furthermore, the use of polynomials allows the application of Lagrange interpolation.

Soil Residues and Absorption-translocation into Red Lettuce and Young Radish Crops of Veterinary Antibiotics According to Agricultural Water Irrigation Method (농업용수 관개방법에 따른 축산용 항생제의 토양중 잔류와 적상추와 열무 작물로의 흡수·이행)

  • Park, Young-Jae;Jeon, Hee-Su;Cho, Jae-Young
    • Korean Journal of Organic Agriculture
    • /
    • v.32 no.1
    • /
    • pp.107-125
    • /
    • 2024
  • Three types of veterinary antibiotics, including oxytetracycline (OTC) and chlortetracycline (CTC) of tetracycline class and amoxicillin (AMX) of penicilline class, were artificially introduced into the irrigation water. The residue of veterinary antibiotics in the soil, the absorption-translocation of veterinary antibiotics into the red lettuce and young radish plant, and crops yield were investigated according to the agricultural water irrigation method (surface drip irrigation, underground drip irrigation, and sprinkler irrigation). There was no significant difference in the residue and translocation of veterinary antibiotics in the soils and crops according to the irrigation method and type of veterinary antibiotics (p>0.05). For the edible parts of red lettuce and young radish, all three types of veterinary antibiotics were found to be below the detection limit, indicating that the safety of the crops was secured. The translocation factor of red lettuce and young radish were found to be less than 0.3 and 0.2, respectively. However, continuous introduction of veterinary antibiotics in agricultural arable lands may have negative effects by affecting soil microbial activity and soil microbe species diversity, so continuous management is deemed necessary.

A Fusion Sensor System for Efficient Road Surface Monitorinq on UGV (UGV에서 효율적인 노면 모니터링을 위한 퓨전 센서 시스템 )

  • Seonghwan Ryu;Seoyeon Kim;Jiwoo Shin;Taesik Kim;Jinman Jung
    • Smart Media Journal
    • /
    • v.13 no.3
    • /
    • pp.18-26
    • /
    • 2024
  • Road surface monitoring is essential for maintaining road environment safety through managing risk factors like rutting and crack detection. Using autonomous driving-based UGVs with high-performance 2D laser sensors enables more precise measurements. However, the increased energy consumption of these sensors is limited by constrained battery capacity. In this paper, we propose a fusion sensor system for efficient surface monitoring with UGVs. The proposed system combines color information from cameras and depth information from line laser sensors to accurately detect surface displacement. Furthermore, a dynamic sampling algorithm is applied to control the scanning frequency of line laser sensors based on the detection status of monitoring targets using camera sensors, reducing unnecessary energy consumption. A power consumption model of the fusion sensor system analyzes its energy efficiency considering various crack distributions and sensor characteristics in different mission environments. Performance analysis demonstrates that setting the power consumption of the line laser sensor to twice that of the saving state when in the active state increases power consumption efficiency by 13.3% compared to fixed sampling under the condition of λ=10, µ=10.

A Study on Multi-Object Data Split Technique for Deep Learning Model Efficiency (딥러닝 효율화를 위한 다중 객체 데이터 분할 학습 기법)

  • Jong-Ho Na;Jun-Ho Gong;Hyu-Soung Shin;Il-Dong Yun
    • Tunnel and Underground Space
    • /
    • v.34 no.3
    • /
    • pp.218-230
    • /
    • 2024
  • Recently, many studies have been conducted for safety management in construction sites by incorporating computer vision. Anchor box parameters are used in state-of-the-art deep learning-based object detection and segmentation, and the optimized parameters are critical in the training process to ensure consistent accuracy. Those parameters are generally tuned by fixing the shape and size by the user's heuristic method, and a single parameter controls the training rate in the model. However, the anchor box parameters are sensitive depending on the type of object and the size of the object, and as the number of training data increases. There is a limit to reflecting all the characteristics of the training data with a single parameter. Therefore, this paper suggests a method of applying multiple parameters optimized through data split to solve the above-mentioned problem. Criteria for efficiently segmenting integrated training data according to object size, number of objects, and shape of objects were established, and the effectiveness of the proposed data split method was verified through a comparative study of conventional scheme and proposed methods.