• Title/Summary/Keyword: 데이터 논문

Search Result 41,164, Processing Time 0.065 seconds

A Study of Life Safety Index Model based on AHP and Utilization of Service (AHP 기반의 생활안전지수 모델 및 서비스 활용방안 연구)

  • Oh, Hye-Su;Lee, Dong-Hoon;Jeong, Jong-Woon;Jang, Jae-Min;Yang, Sang-Woon
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.864-881
    • /
    • 2021
  • Purpose: This study aims is to provide a total care solution preventing disaster based on Big Data and AI technology and to service safety considered by individual situations and various risk characteristics. The purpose is to suggest a method that customized comprehensive index services to prevent and respond to safety accidents for calculating the living safety index that quantitatively represent individual safety levels in relation to daily life safety. Method: In this study, we use method of mixing AHP(Analysis Hierarchy Process) and Likert Scale that extracted from consensus formation model of the expert group. We organize evaluation items that can evaluate life safety prevention services into risk indicators, vulnerability indicators, and prevention indicators. And We made up AHP hierarchical structure according to the AHP decision methodology and proposed a method to calculate relative weights between evaluation criteria through pairwise comparison of each level item. In addition, in consideration of the expansion of life safety prevention services in the future, the Likert scale is used instead of the AHP pair comparison and the weights between individual services are calculated. Result: We obtain result that is weights for life safety prevention services and reflected them in the individual risk index calculated through the artificial intelligence prediction model of life safety prevention services, so the comprehensive index was calculated. Conclusion: In order to apply the implemented model, a test environment consisting of a life safety prevention service app and platform was built, and the efficacy of the function was evaluated based on the user scenario. Through this, the life safety index presented in this study was confirmed to support the golden time for diagnosis, response and prevention of safety risks by comprehensively indication the user's current safety level.

A Study on Image-Based Mobile Robot Driving on Ship Deck (선박 갑판에서 이미지 기반 이동로봇 주행에 관한 연구)

  • Seon-Deok Kim;Kyung-Min Park;Seung-Yeol Wang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.7
    • /
    • pp.1216-1221
    • /
    • 2022
  • Ships tend to be larger to increase the efficiency of cargo transportation. Larger ships lead to increased travel time for ship workers, increased work intensity, and reduced work efficiency. Problems such as increased work intensity are reducing the influx of young people into labor, along with the phenomenon of avoidance of high intensity labor by the younger generation. In addition, the rapid aging of the population and decrease in the young labor force aggravate the labor shortage problem in the maritime industry. To overcome this, the maritime industry has recently introduced technologies such as an intelligent production design platform and a smart production operation management system, and a smart autonomous logistics system in one of these technologies. The smart autonomous logistics system is a technology that delivers various goods using intelligent mobile robots, and enables the robot to drive itself by using sensors such as lidar and camera. Therefore, in this paper, it was checked whether the mobile robot could autonomously drive to the stop sign by detecting the passage way of the ship deck. The autonomous driving was performed by detecting the passage way of the ship deck through the camera mounted on the mobile robot based on the data learned through Nvidia's End-to-end learning. The mobile robot was stopped by checking the stop sign using SSD MobileNetV2. The experiment was repeated five times in which the mobile robot autonomously drives to the stop sign without deviation from the ship deck passage way at a distance of about 70m. As a result of the experiment, it was confirmed that the mobile robot was driven without deviation from passage way. If the smart autonomous logistics system to which this result is applied is used in the marine industry, it is thought that the stability, reduction of labor force, and work efficiency will be improved when workers work.

Comparison of Image Quality among Different Computed Tomography Algorithms for Metal Artifact Reduction (금속 인공물 감소를 위한 CT 알고리즘 적용에 따른 영상 화질 비교)

  • Gui-Chul Lee;Young-Joon Park;Joo-Wan Hong
    • Journal of the Korean Society of Radiology
    • /
    • v.17 no.4
    • /
    • pp.541-549
    • /
    • 2023
  • The aim of this study wasto conduct a quantitative analysis of CT image quality according to an algorithm designed to reduce metal artifacts induced by metal components. Ten baseline images were obtained with the standard filtered back-projection algorithm using spectral detector-based CT and CT ACR 464 phantom, and ten images were also obtained on the identical phantom with the standard filtered back-projection algorithm after inducing metal artifacts. After applying the to raw data from images with metal artifacts, ten additional images for each were obtained by applying the virtual monoenergetic algorithm. Regions of interest were set for polyethylene, bone, acrylic, air, and water located in the CT ACR 464 phantom module 1 to conduct compare the Hounsfield units for each algorithm. The algorithms were individually analyzed using root mean square error, mean absolute error, signal-to-noise ratio, peak signal-to-noise ratio, and structural similarity index to assess the overall image quality. When the Hounsfield units of each algorithm were compared, a significant difference was found between the images with different algorithms (p < .05), and large changes were observed in images using the virtual monoenergetic algorithm in all regions of interest except acrylic. Image quality analysis indices revealed that images with the metal artifact reduction algorithm had the highest resolution, but the structural similarity index was highest for images with the metal artifact reduction algorithm followed by an additional virtual monoenergetic algorithm. In terms of CT images, the metal artifact reduction algorithm was shown to be more effective than the monoenergetic algorithm at reducing metal artifacts, but to obtain quality CT images, it will be important to ascertain the advantages and differences in image qualities of the algorithms, and to apply them effectively.

Evaluation and Verification of the Attenuation Rate of Lead Sheets by Tube Voltage for Reference to Radiation Shielding Facilities (방사선 방어시설 구축 시 활용 가능한 관전압별 납 시트 차폐율 성능평가 및 실측 검증)

  • Ki-Yoon Lee;Kyung-Hwan Jung;Dong-Hee Han;Jang-Oh Kim;Man-Seok Han;Jong-Won Gil;Cheol-Ha Baek
    • Journal of the Korean Society of Radiology
    • /
    • v.17 no.4
    • /
    • pp.489-495
    • /
    • 2023
  • Radiation shielding facilities are constructed in locations where diagnostic radiation generators are installed, with the aim of preventing exposure for patients and radiation workers. The purpose of this study is seek to compare and validate the trend of attenuation thickness of lead, the primary material in these radiation shielding facilities, at different maximum tube voltages by Monte Carlo simulations and measurement. We employed the Monte Carlo N-Particle 6 simulation code. Within this simulation, we set a lead shielding arrangement, where the distance between the source and the lead sheet was set at 100 cm and the field of view was set at 10 × 10 cm2. Additionally, we varied the tube voltages to encompass 80, 100, 120, and 140 kVp. We calculated energy spectra for each respective tube voltage and applied them in the simulations. Lead thicknesses corresponding to attenuation rates of 50, 70, 90, and 95% were determined for tube voltages of 80, 100, 120, and 140 kVp. For 80 kVp, the calculated thicknesses for these attenuation rates were 0.03, 0.08, 0.21, and 0.33 mm, respectively. For 100 kVp, the values were 0.05, 0.12, 0.30, and 0.50 mm. Similarly, for 120 kVp, they were 0.06, 0.14, 0.38, and 0.56 mm. Lastly, at 140 kVp, the corresponding thicknesses were 0.08, 0.16, 0.42, and 0.61 mm. Measurements were conducted to validate the calculated lead thicknesses. The radiation generator employed was the GE Healthcare Discovery XR 656, and the dosimeter used was the IBA MagicMax. The experimental results showed that at 80 kVp, the attenuation rates for different thicknesses were 43.56, 70.33, 89.85, and 93.05%, respectively. Similarly, at 100 kVp, the rates were 52.49, 72.26, 86.31, and 92.17%. For 120 kVp, the attenuation rates were 48.26, 71.18, 87.30, and 91.56%. Lastly, at 140 kVp, they were measured 50.45, 68.75, 89.95, and 91.65%. Upon comparing the simulation and experimental results, it was confirmed that the differences between the two values were within an average of approximately 3%. These research findings serve to validate the reliability of Monte Carlo simulations and could be employed as fundamental data for future radiation shielding facility construction.

Success Factor in the K-Pop Music Industry: focusing on the mediated effect of Internet Memes (대중음악 흥행 요인에 대한 연구: 인터넷 밈(Internet Meme)의 매개효과를 중심으로)

  • YuJeong Sim;Minsoo Shin
    • Journal of Service Research and Studies
    • /
    • v.13 no.1
    • /
    • pp.48-62
    • /
    • 2023
  • As seen in the recent K-pop craze, the size and influence of the Korean music industry is growing even bigger. At least 6,000 songs are released a year in the Korean music market, but not many can be said to have been successful. Many studies and attempts are being made to identify the factors that make the hit music. Commercial factors such as media exposure and promotion as well as the quality of music play an important role in the commercial success of music. Recently, there have been many marketing campaigns using Internet memes in the pop music industry, and Internet memes are activities or trends that spread in various forms, such as images and videos, as cultural units that spread among people. Depending on the Internet environment and the characteristics of digital communication, contents are expanded and reproduced in the form of various memes, which causes a greater response to consumers. Previously, the phenomenon of Internet memes has occurred naturally, but artists who are aware of the marketing effects have recently used it as an element of marketing. In this paper, the mediated effect of Internet memes in relation to the success factors of popular music was analyzed, and a prediction model reflecting them was proposed. As a result of the analysis, the factors with the mediated effect of 'cover effect' and 'challenge effect' were the same. Among the internal success factors, there were mediated effects in "Singer Recognition," the genres of "POP, Dance, Ballad, Trot and Electronica," and among the external success factors, mediated effects in "Planning Company Capacity," "The Number of Music Broadcasting Programs," and "The Number of News Articles." Predictive models reflecting cover effects and challenge effects showed F1-score at 0.6889 and 0.7692, respectively. This study is meaningful in that it has collected and analyzed actual chart data and presented commercial directions that can be used in practice, and found that there are many success factors of popular music and the mediating effects of Internet memes.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

Operation Measures of Sea Fog Observation Network for Inshore Route Marine Traffic Safety (연안항로 해상교통안전을 위한 해무관측망 운영방안에 관한 연구)

  • Joo-Young Lee;Kuk-Jin Kim;Yeong-Tae Son
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.2
    • /
    • pp.188-196
    • /
    • 2023
  • Among marine accidents caused by bad weather, visibility restrictions caused by sea fog occurrence cause accidents such as ship strand and ship bottom damage, and at the same time involve casualties caused by accidents, which continue to occur every year. In addition, low visibility at sea is emerging as a social problem such as causing considerable inconvenience to islanders in using transportation as passenger ships are collectively delayed and controlled even if there are local differences between regions. Moreover, such measures are becoming more problematic as they cannot objectively quantify them due to regional deviations or different criteria for judging observations from person to person. Currently, the VTS of each port controls the operation of the ship if the visibility distance is less than 1km, and in this case, there is a limit to the evaluation of objective data collection to the extent that the visibility of sea fog depends on the visibility meter or visual observation. The government is building a marine weather signal sign and sea fog observation networks for sea fog detection and prediction as part of solving these obstacles to marine traffic safety, but the system for observing locally occurring sea fog is in a very insufficient practical situation. Accordingly, this paper examines domestic and foreign policy trends to solve social problems caused by low visibility at sea and provides basic data on the need for government support to ensure maritime traffic safety due to sea fog by factually investigating and analyzing social problems. Also, this aims to establish a more stable maritime traffic operation system by blocking marine safety risks that may ultimately arise from sea fog in advance.

Usefulness of Deep Learning Image Reconstruction in Pediatric Chest CT (소아 흉부 CT 검사 시 딥러닝 영상 재구성의 유용성)

  • Do-Hun Kim;Hyo-Yeong Lee
    • Journal of the Korean Society of Radiology
    • /
    • v.17 no.3
    • /
    • pp.297-303
    • /
    • 2023
  • Pediatric Computed Tomography (CT) examinations can often result in exam failures or the need for frequent retests due to the difficulty of cooperation from young patients. Deep Learning Image Reconstruction (DLIR) methods offer the potential to obtain diagnostically valuable images while reducing the retest rate in CT examinations of pediatric patients with high radiation sensitivity. In this study, we investigated the possibility of applying DLIR to reduce artifacts caused by respiration or motion and obtain clinically useful images in pediatric chest CT examinations. Retrospective analysis was conducted on chest CT examination data of 43 children under the age of 7 from P Hospital in Gyeongsangnam-do. The images reconstructed using Filtered Back Projection (FBP), Adaptive Statistical Iterative Reconstruction (ASIR-50), and the deep learning algorithm TrueFidelity-Middle (TF-M) were compared. Regions of interest (ROI) were drawn on the right ascending aorta (AA) and back muscle (BM) in contrast-enhanced chest images, and noise (standard deviation, SD) was measured using Hounsfield units (HU) in each image. Statistical analysis was performed using SPSS (ver. 22.0), analyzing the mean values of the three measurements with one-way analysis of variance (ANOVA). The results showed that the SD values for AA were FBP=25.65±3.75, ASIR-50=19.08±3.93, and TF-M=17.05±4.45 (F=66.72, p=0.00), while the SD values for BM were FBP=26.64±3.81, ASIR-50=19.19±3.37, and TF-M=19.87±4.25 (F=49.54, p=0.00). Post-hoc tests revealed significant differences among the three groups. DLIR using TF-M demonstrated significantly lower noise values compared to conventional reconstruction methods. Therefore, the application of the deep learning algorithm TrueFidelity-Middle (TF-M) is expected to be clinically valuable in pediatric chest CT examinations by reducing the degradation of image quality caused by respiration or motion.

Conjunction Assessments of the Satellites Transported by KSLV-II and Preparation of the Countermeasure for Possible Events in Timeline (누리호 탑재 위성들의 충돌위험의 예측 및 향후 상황의 대응을 위한 분석)

  • Shawn Seunghwan Choi;Peter Joonghyung Ryu;John Kim;Lowell Kim;Chris Sheen;Yongil Kim;Jaejin Lee;Sunghwan Choi;Jae Wook Song;Hae-Dong Kim;Misoon Mah;Douglas Deok-Soo Kim
    • Journal of Space Technology and Applications
    • /
    • v.3 no.2
    • /
    • pp.118-143
    • /
    • 2023
  • Space is becoming more commercialized. Despite of its delayed start-up, space activities in Korea are attracting more nation-wide supports from both investors and government. May 25, 2023, KSLV II, also called Nuri, successfully transported, and inserted seven satellites to a sun-synchronous orbit of 550 km altitude. However, Starlink has over 4,000 satellites around this altitude for its commercial activities. Hence, it is necessary for us to constantly monitor the collision risks of these satellites against resident space objects including Starlink. Here we report a quantitative research output regarding the conjunctions, particularly between the Nuri satellites and Starlink. Our calculation shows that, on average, three times everyday, the Nuri satellites encounter Starlink within 1 km distance with the probability of collision higher than 1.0E-5. A comparative study with KOMPSAT-5, also called Arirang-5, shows that its distance of closest approach distribution significantly differs from those of Nuri satellites. We also report a quantitative analysis of collision-avoiding maneuver cost of Starlink satellites and a strategy for Korea, being a delayed starter, to speed up to position itself in the space leading countries. We used the AstroOne program for analyses and compared its output with that of Socrates Plus of Celestrak. The two line element data was used for computation.

Research on Archive Opening and Sharing Projects of Korean Terrestrial Broadcasters and External Users of Shared Archives : Focusing on the Case of the 5.18 Footage Video Sharing Project 〈May Story(Owol-Iyagi)〉 Contest Organized by KBS (국내 지상파 방송사의 아카이브 개방·공유 사업과 아카이브 이용자 연구 KBS 5.18 아카이브 시민공유 프로젝트 <5월이야기> 공모전 사례를 중심으로)

  • Choi, Hyojin
    • The Korean Journal of Archival Studies
    • /
    • no.78
    • /
    • pp.197-249
    • /
    • 2023
  • This paper focus on the demand for broadcast and video archive contents by users outside broadcasters as the archive openness and sharing projects of terrestrial broadcasters have become more active in recent years. In the process of creating works using broadcasters' released video footage, the study examined the criteria by which video footage is selected and the methods and processes utilized for editing. To this end, the study analyzed the the case of the 5.18 footage video sharing project 〈May Story(Owol-Iyagi)〉 contest organized by KBS in 2022, in which KBS released its footage about the May 18 Democratic Uprising and invited external users to create new content using them. Analyzing the works that were selected as the winners of the contest, the research conducts in-depth interviews with the creators of each work. As a result, the following points are identified. Among the submitted works, many works deal with the direct or indirect experience of the May 18 Democratic Uprising and focus on the impact of this historical event on individuals and our current society. The study also examined the ways in which broadcasters' footage is used in secondary works. We found ways to use video as a means to share historical events, or to present video as evidence or metaphor. It is found that the need for broadcasters to provide a wider range of public video materials such as the May 18 Democratic Uprising, describing more metadata including copyright information before releasing selected footage, ensuring high-definition and high-fidelity videos that can be used for editing, and strengthening streaming or downloading functions for user friendliness. Through this, the study explores the future direction of broadcasters' video data openness and sharing business, and confirms that broadcasters' archival projects can be an alternative to fulfill public responsibilities such as strengthening social integration between regions, generations, and classes through moving images.

  • PDF