• Title/Summary/Keyword: 분석네트워크 프로세스

Search Result 249, Processing Time 0.024 seconds

A Study of Air Cargo Logistic System Process (항공물류 시스템 프로세스의 개선에 관한 연구)

  • Lee, Hwi-Young;Lee, Jae-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.9
    • /
    • pp.179-187
    • /
    • 2009
  • The national boundary's meanings turn to weak according to advent of Global enterprises. The place for design a product and marketing are separated to actual market. R&D is to the area where the knowledge activity is well, and low skilful product assembling is to the place the low wage is acceptable. It shows that the importance of net work structure. From early 90's, production system is diversified to markets where with the consumer as the central as multifarious items and creation new demands through consumer's participation into manufacturing process. This phenomenon show that logistics structures adapt to demand of technical variation, and the development of e-business with VAN(:value added network) and EDI(:Electronic data interchange) prove it. This study tried to analyze utilitarian assay about systems those land, sea, air logistics through documents research, and this study also present the direction of logistics system of airline company and goal of development on the based to the model of domestic airline company accordingly.

Planning of Oral History of Korean Astronomy (한국천문학 구술사연구 기획론)

  • Choi, Youngsil;Kim, Sang Hyuk;Mihn, Byeong-Hee;Seo, Yoon Kyung;Ahn, Young Sook;Yang, Hong-Jin;Choi, Go-Eun
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.44 no.2
    • /
    • pp.66.2-66.2
    • /
    • 2019
  • 구술채록은 특정 주제의 연구사 기록화 작업에 있어 후대에 생생한 역사체험을 전승할 수 있는 최적의 연구사업이다. 특히 국내 천문우주과학 분야의 원로들이 대부분 연로하다는 점에서 한국천문학 발전사에 대한 구술채록은 시급성이 더욱 요구되고 있다. 이에 한국천문연구원 고천문연구센터는 그간 기관에서 자체적으로 수행해 온 사료분류체계 수립작업과 단발적인 구술채록 경험을 기반으로 본격적인 구술채록 연구사업을 수행할 계획이다. 이 연구는 한국천문학 발전사 구술채록 사업의 절차적 방법에 대한 기획론이다. 크게 (1)구술채록 로드맵 수립, (2) 구술기록 생산 프로세스, (3) 산출물 관리 및 활용으로 제시하고자 한다. 먼저 구술채록 로드맵 수립에 있어서는 현대 한국천문학 발전의 태동기 1950년대 중반을 기점으로 역사연구 및 주제분류를 중심으로 천문학 구술기록 특성화를 기한다. 이를 기반으로 구술대상자를 선정하고 큰 맥락의 역사와 개인 생애사를 교차하는 분석 틀을 중심으로 인터뷰 질문지를 추출한다. 이 과정에서 구술대상자의 소장 사료를 도출하여 미리 잠재적 사료 수집을 도모하도록 한다. 둘째, 본격적 구술기록 생산 프로세스에서는 전 단계에서 이행한 수집정보를 바탕으로 구술 산출물을 제작한다. 면담일지, 상세녹취록, 요약본, 이용동의서 등 기타 필요한 구술 제반 서식을 바탕으로 구술 동영상을 산출하고 라벨링한다. 이 산출물에 대한 사실관계 검증 후 최종 산출물 완성 및 기타 행정 처리로 제작은 종료된다. 마지막으로 산출물 관리 및 활용에 있어서는 사료 수집 전략의 기반 자료와 다양한 지식정보콘텐츠의 활용체계를 수립한다. 더 나아가 향후 이 연구사업은 구술DB화와 서비스 체계화를 위하여 구술아카이브 시스템을 설계하는 데 성과물을 활용한다. 이 연구기획론은 한국천문학이라는 특정 주제에 대한 것이므로 큰 틀에서의 방법은 기록학적 전개방식을 차용하지만, 역사연구와 기록의 특성화에 있어서는 한국천문학 연구사에 대한 깊은 이해가 동반되어야 한다. 따라서 광범위한 한국천문학 네트워크에 해당하는 다양한 학회, 교육기관, 연구기관 및 각종 사단법인 등의 역사와도 긴밀히 연결되어야 성과물은 비로소 가치 있고 풍부할 것이다. 이 연구를 시발점으로 향후 한국천문학 발전사 구술채록 사업에 대한 다양한 관학연구의 인식 공감대가 마련되기를 기대한다.

  • PDF

A Study on the Factors Influencing Semantic Relation in Building a Structured Glossary (구조적 학술용어사전 데이터베이스 구축에 있어서 용어의 의미관계 형성에 영향을 미치는 요인에 관한 연구)

  • Kwon, Sun-Young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.2
    • /
    • pp.353-378
    • /
    • 2014
  • The purpose of this study is to find factors to affect on the formation of semantic relation from terminology and what is to be affected by these factors to build the database scheme of terminology dictionary by a structural definition. In this research, 826,905 keywords of 88,874 social science articles and 985,580 keywords of 125,046 humanities science articles in the KCI journals from 2007 to 2011 were collected. From collected data, subject complexity, structural hole, term frequency, occurrence pattern and an effect between the number of nodes and the number of patterns which were derived from the semantic relation of linked terms of established 'STNet' System were analyzed. The summarized results from analyzed data and network patterns are as follows. Betweenness Centrality, term frequency, and effective size affect the numbers of semantic relation node. Among these factors, betweenness centrality was the most effective and effective size. But term frequency was the least effective. Betweenness Centrality, term frequency, and effective size affect the numbers of semantic relation type. Term frequency is the most effective. Therefore, when building a terminology dictionary, factors of betweenness centrality, term frequency, effective size, and complexity of subject are needed to select term. As a result, these factors can be expected to improve the quality of terminology dictionary.

A Study of Quality Metrics Process Design Methodology for Field Application Encryption under Network Security Environment (네트워크 보안 환경에서의 현장적용 중심 암호품질 만족도 평가 메트릭스 설계 프로세스)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.29-35
    • /
    • 2015
  • The network security encryption type is divided into two, one is point-to-point, second method is link type. The level of security quality attributes are a system security quality requirements in a networked environment. Quality attributes can be observed and should be able to be measured. If the quality requirements can be presented as exact figures, quality requirements are defined specifically setting quality objectives. Functional requirements in the quality attribute is a requirement for a service function which can be obtained through the encryption. Non-functional requirements are requirements of the service quality that can be obtained through the encryption. Encryption quality evaluation system proposed in this study is to derive functional requirements and non-functional requirements 2 groups. Of the calculating measure of the evaluation index in the same category, the associated indication of the quality measure of each surface should be created. The quality matrix uses 2-factor analysis of the evaluation for the associated surface quality measurements. The quality requirements are calculated based on two different functional requirements and non-functional requirements. The results are calculated by analyzing the trend of the average value assessment. When used this way, it is possible to configure the network security encryption based on quality management.

Trends in disaster safety research in Korea: Focusing on the journal papers of the departments related to disaster prevention and safety engineering

  • Kim, Byungkyu;You, Beom-Jong;Shim, Hyoung-Seop
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.43-57
    • /
    • 2022
  • In this paper, we propose a method of analyzing research papers published by researchers belonging to university departments in the field of disaster & safety for the scientometric analysis of the research status in the field of disaster safety. In order to conduct analysis research, the dataset constructed in previous studies was newly improved and utilized. In detail, for research papers of authors belonging to the disaster prevention and safety engineering type department of domestic universities, institution identification, cited journal identification of references, department type classification, disaster safety type classification, researcher major information, KSIC(Korean Standard Industrial Classification) mapping information was reflected in the experimental data. The proposed method has a difference from previous studies in the field of disaster & safety and data set based on related keyword searches. As a result of the analysis, the type and regional distribution of organizations belonging to the department of disaster prevention and safety engineering, the composition of co-authored department types, the researchers' majors, the status of disaster safety types and standard industry classification, the status of citations in academic journals, and major keywords were identified in detail. In addition, various co-occurrence networks were created and visualized for each analysis unit to identify key connections. The research results will be used to identify and recommend major organizations and information by disaster type for the establishment of an intelligent crisis warning system. In order to provide comprehensive and constant analysis information in the future, it is necessary to expand the analysis scope and automate the identification and classification process for data set construction.

An Analysis of Transshipment Competitiveness of Container Cargoes in Incheon New Port (인천신항의 환적경쟁력 분석에 대한 연구)

  • Ahn, Woo-Chul;Yeo, Gi-Tae;Yang, Chang-Ho
    • Journal of Korea Port Economic Association
    • /
    • v.26 no.1
    • /
    • pp.20-42
    • /
    • 2010
  • This study is aimed at evaluating transshipment competitiveness of Incheon New Port which will open in 2013. For this reason, we used Conjoint Analysis(CA) for a methodology of this research as CA had been frequently adopted for empirical analysis of new container terminal in previous studies. We have provided the questionnaires to the stake holders of the port such as experts in Port Authority(PA), logistics companies, and terminal operators. The result showed that transshipment competitiveness of Incheon New Port was subordinate to transshipment costs and port costs of Busan and Shanghai. Overall, we hope this study could help draw up the policies on a New Port that will attract transshipment cargoes and set up marketing plan for an early settlement.

Study of Information Security Management Model in Public Institution (공공기관의 정보보안 관리 모델 연구)

  • Kim, JaeKyeong;Jeong, Yoon-Su;Oh, ChungShick;Kim, JaeSung
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.43-50
    • /
    • 2013
  • Recently, Cyber threats that is doing intelligence and sophistication from the organization's information assets to secure order technical disciplines, as well as managerial and environmental sectors, such as mind-response system is must established. In this paper, possible to analyze the case for the theory in network security, such as the logical network and physical network separation suitable for the corporate environment and constantly respond and manage the Information Security Management Model A secure network design is proposed. In particular, the proposed model improvements derived from the existing network, network improvements have been made in order to design improved ability to respond to real-time security and central manageability, security threats, pre-emptive detection and proactive coping, critical equipment in the event of a dual hwalreu through applied features such as high-availability, high-performance, high-reliability, ensuring separation of individual network security policy integrated management of individual network, network security directional.

A Study on Encouragement Strategy of Electronic Commerce through Clothing Industry (의류산업을 통한 전자상거래 활성화 전략 방안 연구)

  • Lee, Hyun-Chang;Jin, Chan-Young;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2359-2364
    • /
    • 2011
  • E-commerce is a kind of trade type between buyers and sellers rely on computer networks. Carried out according to certain standards of various business activities. e-commerce is based on modern information technology and network technology, financial electronic collection, management, information technology, business and trade information networks into one, aimed at logistics, capital flow and information flow of harmony and unity of the new trade, trade activities of the entire process, electronic, networking and digital. E-commerce has brought to the traditional ways of trading a huge impact, led to changes in economic structures, is a business revolution in the way and is recognized internationally as the 21st century is an important driver of economic development compared to current traditional companies. In this material, we first consider the current problem, analyze particular characteristics of clothing shopping mall to increase the purchasing power of customer. For these reasons, we describe the process for building the clothing site.

Dynamic Full-Scalability-Conversion in SVC (스케일러블 비디오 코딩에서의 실시간 스케일러빌리티 변환)

  • Lee, Dong-Su;Bae, Tae-Meon;Ro, Yong-Man
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.6 s.312
    • /
    • pp.60-70
    • /
    • 2006
  • Currently, Scalable Video Coding (SVC) is being standardized. By using scalability of SVC, QoS managed video streaming service is enabled in heterogeneous networks even with only one original bitstream. But current SVC is insufficient to dynamic video conversion for the scalability, thereby the adaptation of bitrate to meet a fluctuating network condition is limited. In this paper, we propose dynamic full-scalability conversion method for QoS adaptive video streaming in H.264/AVC SVC. To accomplish full scalability dynamic conversion, we propose corresponding bitstream extraction, encoding and decoding schemes. On the encoder, we newly insert the IDR NAL to solve the problems of spatial scalability conversion. On the extractor, we analyze the SVC bitstream to get the information which enable dynamic extraction. By using this information, real time extraction is achieved. Finally, we develop the decoder so that it can manage changing bitrate to support real time full-scalability. The experimental results showed that dynamic full-scalability conversion was verified and it was necessary for time varying network condition.

Ambiguity Determination Technique for Multiple GPS Reference Stations using the Combination of L1/L2 Carrier Phase (L1/L2 측정치 조합을 이용한 GPS 기준국간 반송파 미지정수 결정 기법)

  • Park, Byung-Woon;Song, June-Sol;Kee, Chang-Don
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.705-713
    • /
    • 2011
  • In this paper, we introduce two techniques for resolving integer ambiguities between reference stations, which is one of the most important processes in Network RTK correction generation process. Each techniques uses Hatch filter and combination of L1/L2 measurements and we used simulation data and real data to evaluate performance of the techniques. For evaluating performance of each technique, we compared corrections generated from user site and Network RTK. As a result, Network RTK with the technique which uses Hatch filter improves user performance much more than single baseline RTK does. Residual of user is smaller than a half size of wavelength so it does not affect user integer ambiguity resolution, however, it contains significant bias error. On the other hand, when we used the technique which uses combination of L1/L2 measurements, residual error of user is largely reduced compared to the technique using Hatch filter.