• Title/Summary/Keyword: 데이터통합기법

Search Result 722, Processing Time 0.021 seconds

An Exploratory Study of Platform Government in Korea : Topic Modeling and Network Analysis of Public Agency Reports (한국 플랫폼 정부의 방향성 모색 : 공공기관 연구보고서에 대한 토픽 모델링과 네트워크 분석)

  • Nam, Hyun-Dong;Nam, Taewoo
    • Journal of Digital Convergence
    • /
    • v.18 no.2
    • /
    • pp.139-149
    • /
    • 2020
  • New platform governments will play a role to pull intelligent information technology to drive new ecological government innovation and sustainable development in which the government and people work together. On this, in order to establish the platform of the platform government, we will look at recent research trends and lay the foundation for future policy directions and research bases. using Text Mining method, and went through Topic modeling for the collected text data and network analysis was conducted. According to the result, based on latent topic, the stronger the connection center, the weaker the relationship. Through this study, we hope that discussions will take place in a variety of ways to improve the understanding of the supply and demand approach of Korea's platform government and implement appropriate change management methods such as service public base and service provision in accordance with the value and potential topics of platform government.

Evaluation and Analysis of Scheduling Algorithms for Peak Power Reduction (전력 피크 감소를 위한 스케줄링 알고리즘의 성능 평가 및 분석)

  • Sung, Minyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.4
    • /
    • pp.2777-2783
    • /
    • 2015
  • Peak power reduction is becoming increasingly important not only for grid operators but also for residential users. The scheduling of electric loads tries to reduce the power peak by splitting the power-on period of an electric device into multiple smaller ones and by interleaving the on-periods of every device in a holistic way. This paper analyzes the performance of EDF, LSF, TCBM, and lazy scheduling algorithms and proposes the enhancement schemes. For analysis, we have implemented the scheduling policies in a simulation environment for distributed control systems. Through extensive experiments using real power traces, we discuss their performance characteristics in terms of power deviation, switch count, and temperature violation ratio. To prevent excessive switching, we propose to employ the concept of limited preemptibility and evaluate its effect on performance. It is found that the best performance is achieved when the scheduler capacity is dynamically adjusted to the actual power demand. The experiment results show that, by load scheduling, the probability of having a power deviation greater than 150W is reduced from 21.5% down to 3.2%.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.80-85
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

Generation of Triangular Mesh of Coronary Artery Using Mesh Merging (메쉬 병합을 통한 관상동맥의 삼각 표면 메쉬 모델 생성)

  • Jang, Yeonggul;Kim, Dong Hwan;Jeon, Byunghwan;Han, Dongjin;Shim, Hackjoon;Chang, Hyuk-jae
    • Journal of KIISE
    • /
    • v.43 no.4
    • /
    • pp.419-429
    • /
    • 2016
  • Generating a 3D surface model from coronary artery segmentation helps to not only improve the rendering efficiency but also the diagnostic accuracy by providing physiological informations such as fractional flow reserve using computational fluid dynamics (CFD). This paper proposes a method to generate a triangular surface mesh using vessel structure information acquired with coronary artery segmentation. The marching cube algorithm is a typical method for generating a triangular surface mesh from a segmentation result as bit mask. But it is difficult for methods based on marching cube algorithm to express the lumen of thin, small and winding vessels because the algorithm only works in a three-dimensional (3D) discrete space. The proposed method generates a more accurate triangular surface mesh for each singular vessel using vessel centerlines, normal vectors and lumen diameters estimated during the process of coronary artery segmentation as the input. Then, the meshes that are overlapped due to branching are processed by mesh merging and merged into a coronary mesh.

The Federation Development for Underwater Warfare Simulation (수중 교전 시뮬레이션을 위한 페더레이션 개발)

  • Shin, Ji-Hwan
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.3
    • /
    • pp.11-18
    • /
    • 2007
  • Recently, as weapon systems have been more diverse and complicated, the factors of risk increase in development. Consequently, demanding reduction of acquired costs and period increase. Under the acquisition environment, more efficiently to develop weapon system, the necessity of application of defense M&S from requirement phase is on the rise. As the importance of M&S is stressed under distributed environment, so the standard of M&S(HLA, SEDRIS, etc.) and the system engineering process, namely FEDEP(Federation Development & Execution Process) have been developed. In this paper using the 5 phase expression, we constructed underwater engagement simulation(UNES) that prototype to develop naval weapon system test bed which take up integrated architecture in HLA. we developed simulators according to FEDEP for expandability and described process applying FEDEP fur UNES development.

  • PDF

Distribution fitting for the rate of return and value at risk (수익률 분포의 적합과 리스크값 추정)

  • Hong, Chong-Sun;Kwon, Tae-Wan
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.2
    • /
    • pp.219-229
    • /
    • 2010
  • There have been many researches on the risk management due to rapid increase of various risk factors for financial assets. Aa a method for comprehensive risk management, Value at Risk (VaR) is developed. For estimation of VaR, it is important task to solve the problem of asymmetric distribution of the return rate with heavy tail. Most real distributions of the return rate have high positive kurtosis and low negative skewness. In this paper, some alternative distributions are used to be fitted to real distributions of the return rate of financial asset. And estimates of VaR obtained by using these fitting distributions are compared with those obtained from real distribution. It is found that normal mixture distribution is the most fitted where its skewness and kurtosis of practical distribution are close to real ones, and the VaR estimation using normal mixture distribution is more accurate than any others using other distributions including normal distribution.

A Business Service Identification Techniques Based on XL-BPMN Model (XL-BPMN 모델 기반 비즈니스 서비스 식별 기법)

  • Song, Chee-Yang;Cho, Eun-Sook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.3
    • /
    • pp.125-138
    • /
    • 2016
  • The service identification in service-oriented developments has been conducted by based on workflow, goals, scenarios, usecases, components, features, and patterns. However, the identification of service by semantic approach at the business value view was not detailed yet. In order to enhance accuracy of identifying business service, this paper proposes a method for identifying business service by analyzing syntax and semantics in XL-BPMN model. The business processes based on business scenario are identified, and they are designed in a XL-BPMN business process model. In this business process model, an unit business service is identified through binding closely related activities by the integrated analysis result of syntax patterns and properties-based semantic similarities between activities. The method through XL-BPMN model at upper business levels can identify the reusable unit business service with high accuracy and modularity. It also can accelerate more service-oriented developments by reusing identified services.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.313-319
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

Design and Implementation of Object Storage Engine for Large Multimedia Objects (대용량 멀티미디어 객체를 위한 객체저장엔진의 설계 및 구현)

  • Jin, Ki-Sung;Chang, Jae-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.4
    • /
    • pp.376-388
    • /
    • 2002
  • Recently, although there are strong requirements to manage multimedia data, there are a few researches on efficient storage and retrieval of multimedia data. In this paper, we design an object storage engine which can store and retrieve various multimedia objects efficiently. For this, we design an object manager for storing a variety of multimedia data and an inverted file manager for indexing unformatted text objects. In addition, we implement the objects storage engine which can support concurrency control and recovery schemes of DBMS by integrating the object manager and the inverted file manager with the SHORE low-level storage system. Finally, we develope a TIROS(Thesis Information Retrieval using Object Storage engine) system in order to verify the usefulness of our object storage engine.

Design and Implementation of Local Forest Fire Monitoring and Situational Response Platform Using UAV with Multi-Sensor (무인기 탑재 다중 센서 기반 국지 산불 감시 및 상황 대응 플랫폼 설계 및 구현)

  • Shin, Won-Jae;Lee, Yong-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.626-632
    • /
    • 2017
  • Since natural disaster occurs increasingly and becomes complicated, it causes deaths, disappearances, and damage to property. As a result, there is a growing interest in the development of ICT-based natural disaster response technology which can minimize economic and social losses. In this letter, we introduce the main functions of the forest fire management platform by using images from an UAV. In addition, we propose a disaster image analysis technology based on the deep learning which is a key element technology for disaster detection. The proposed deep learning based disaster image analysis learns repeatedly generated images from the past, then it is possible to detect the disaster situation of forest-fire similar to a person. The validity of the proposed method is verified through the experimental performance of the proposed disaster image analysis technique.