• Title/Summary/Keyword: 사용자 검증

Search Result 3,188, Processing Time 0.03 seconds

A Study of Improvement on Estimation Methodology of Carbon Storage amount by Damaged Trees for Environmental Impact Assessment (환경영향평가 온실가스 항목 내 훼손수목의 탄소저장량 평가 개선을 위한 제언)

  • Heon Mo Jeong;Hae Ran Kim;Dukyeop Kim;Inyoung Jang;Sung-Ryong Kang
    • Korean Journal of Ecology and Environment
    • /
    • v.55 no.4
    • /
    • pp.330-340
    • /
    • 2022
  • We deduced the proper estimation methodology for the amount of carbon sequestration by damaged trees for Environmental Impact Assessment (EIA). The nine development projects related to renewable energy, damaged trees occur, assessment status and used method of evaluating the carbon storage of damaged trees were summarized. And after re-calculating the carbon storage of damaged trees through allometric equations, the difference between the two groups, re-calculated the damaged trees carbon storage and the damaged trees carbon storage in the report, was validated. As a result, damaged trees carbon storage in words was more than the re-calculated damaged trees carbon storage, and it was statistically significant (p<0.005). This result means that the existing method for calculating damaged tree carbon storage is overcalculated. It was judged that it was necessary to improve the calculation method. Therefore, allometric equations suitable for each dominated-tree species should be used when calculating the damaged tree carbon storage. Furthermore, we propose to establish a carbon storage calculation system based on actual data from the ecosystem so that researchers can efficiently and accurately the damaged trees carbon storage.

The Differential Impacts of Positive and Negative Emotions on Travel-Related YouTube Video Engagement (유튜브 여행 동영상의 긍정적 감정과 부정적 감정이 사용자 참여에 미치는 영향)

  • Heejin Kim;Hayeon Song;Jinyoung Yoo;Sungchul Choi
    • Journal of Service Research and Studies
    • /
    • v.13 no.3
    • /
    • pp.1-19
    • /
    • 2023
  • Despite the growing importance of video-based social media content, such as vlogs, as a marketing tool in the travel industry, there is limited research on the characteristics that enhance engagement among potential travelers. This study explores the influence of emotional valence in YouTube travel content on viewer engagement, specifically likes and comments. We analyzed 4,619 travel-related YouTube videos from eight popular tourist cities. Using negative binomial regression analysis, we found that both positive and negative emotions significantly influence the number of likes received. Videos with higher positive emotions as well as negative emotions receive more likes. However, when it comes to the number of comments, only negative emotions showed a significant positive influence, while positive emotions had no significant impact. These findings offer valuable insights for marketers seeking to optimize engagement strategies on YouTube, considering the unique nature of travel products. Further research into the effects of specific emotions on engagement is warranted to improve marketing strategies. This study highlights the powerful impact of emotions on viewer engagement in the context of social media, particularly on YouTube.

Design and Implementation of a Data-Driven Defect and Linearity Assessment Monitoring System for Electric Power Steering (전동식 파워 스티어링을 위한 데이터 기반 결함 및 선형성 평가 모니터링 시스템의 설계 구현)

  • Lawal Alabe Wale;Kimleang Kea;Youngsun Han;Tea-Kyung Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.61-69
    • /
    • 2023
  • In recent years, due to heightened environmental awareness, Electric Power Steering (EPS) has been increasingly adopted as the steering control unit in manufactured vehicles. This has had numerous benefits, such as improved steering power, elimination of hydraulic hose leaks and reduced fuel consumption. However, for EPS systems to respond to actions, sensors must be employed; this means that the consistency of the sensor's linear variation is integral to the stability of the steering response. To ensure quality control, a reliable method for detecting defects and assessing linearity is required to assess the sensitivity of the EPS sensor to changes in the internal design characters. This paper proposes a data-driven defect and linearity assessment monitoring system, which can be used to analyze EPS component defects and linearity based on vehicle speed interval division. The approach is validated experimentally using data collected from an EPS test jig and is further enhanced by the inclusion of a Graphical User Interface (GUI). Based on the design, the developed system effectively performs defect detection with an accuracy of 0.99 percent and obtains a linearity assessment score at varying vehicle speeds.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.

An Improvement of Kubernetes Auto-Scaling Based on Multivariate Time Series Analysis (다변량 시계열 분석에 기반한 쿠버네티스 오토-스케일링 개선)

  • Kim, Yong Hae;Kim, Young Han
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.3
    • /
    • pp.73-82
    • /
    • 2022
  • Auto-scaling is one of the most important functions for cloud computing technology. Even if the number of users or service requests is explosively increased or decreased, system resources and service instances can be appropriately expanded or reduced to provide services suitable for the situation and it can improves stability and cost-effectiveness. However, since the policy is performed based on a single metric data at the time of monitoring a specific system resource, there is a problem that the service is already affected or the service instance that is actually needed cannot be managed in detail. To solve this problem, in this paper, we propose a method to predict system resource and service response time using a multivariate time series analysis model and establish an auto-scaling policy based on this. To verify this, implement it as a custom scheduler in the Kubernetes environment and compare it with the Kubernetes default auto-scaling method through experiments. The proposed method utilizes predictive data based on the impact between system resources and response time to preemptively execute auto-scaling for expected situations, thereby securing system stability and providing as much as necessary within the scope of not degrading service quality. It shows results that allow you to manage instances in detail.

A Study on the Effects of O2O Commerce Characteristics and Consumer Characteristics on Trust, Desire and Intention to Use in China (중국 O2O 커머스 특성과 소비자 특성이 신뢰, 욕구 및 이용의도에 미치는 영향)

  • Zhang, Ping;Moon, Hee-Cheol
    • Korea Trade Review
    • /
    • v.42 no.1
    • /
    • pp.141-163
    • /
    • 2017
  • The purpose of this study to analyze the relationship among three characteristics of O2O commerce and extended goal-directed behavior(EGB) model(trust, desire and intention to use). From June to July in 2015, the questionnaires were sent to Chinese customers using O2O commerce. Among 494 questionnaires gathered, 433 valid ones are analyzed using SPSS and AMOS. Among ten research hypotheses derived from prior research and the research model, eight hypotheses are tenable, while the rest hypotheses are untenable. Online features of mobility and Offline features of service quality. The Online features of mobility bring consumers convenience but also has some latent customer privacy issue. On other hand, because of the untenable hypothesis, there is inconformity between online service and offline service, and customer have distrust on the O2O commerce. To achieve continuous online consumption, offline businesses need to improve their service. The perceived quality of selling company exerts a significant effect on the customers' reliability for the brand equity of open market company and selling company, such as the brand awareness of the open market, open market image, brand awareness of selling company, and the perceived quality of selling company. Thus, selling company should improve self-brand service and quality in order to improve customers' reliability. In addition, the consumer characteristics of attitude, subjective norm, and perceived behavioral control are all tenable. These results mean that O2O commerce is a favorite way of consumption by Chinese consumers.

  • PDF

The Construction Method for Virtual Drone System (가상 드론 시뮬레이터 구축을 위한 시스템 구성)

  • Lee, Taek Hee
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.6
    • /
    • pp.124-131
    • /
    • 2017
  • Recently, drone is extending its range of usability. For example, the delivery, agriculture, industry, and entertainment area take advantage of drone mobilities. To control real drones, it needs huge amount of drone control training steps. However, it is risky; falling down, missing, destroying. The virtual drone system can avoid such risks. We reason that what kinds of technologies are required for building the virtual drone system. First, it needs that the virtual drone authoring tool that can assemble drones with the physical restriction in the virtual environment. We suggest that the drone assembly method that can fulfill physical restrictions in the virtual environment. Next, we introduce the virtual drone simulator that can simulate the assembled drone moves physically right in the virtual environment. The simulator produces a high quality rendering results more than 60 frames per second. In addition, we develop the physics engine based on SILS(Software in the loop simulation) framework to perform more realistic drone movement. Last, we suggest the virtual drone controller that can interact with real drone controllers which are commonly used to control real drones. Our virtual drone system earns 7.64/10.0 user satisfaction points on human test: the test is done by one hundred persons.

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

A Study on the Application of the Price Prediction of Construction Materials through the Improvement of Data Refactor Techniques (Data Refactor 기법의 개선을 통한 건설원자재 가격 예측 적용성 연구)

  • Lee, Woo-Yang;Lee, Dong-Eun;Kim, Byung-Soo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.24 no.6
    • /
    • pp.66-73
    • /
    • 2023
  • The construction industry suffers losses due to failures in demand forecasting due to price fluctuations in construction raw materials, increased user costs due to project cost changes, and lack of forecasting system. Accordingly, it is necessary to improve the accuracy of construction raw material price forecasting. This study aims to predict the price of construction raw materials and verify applicability through the improvement of the Data Refactor technique. In order to improve the accuracy of price prediction of construction raw materials, the existing data refactor classification of low and high frequency and ARIMAX utilization method was improved to frequency-oriented and ARIMA method utilization, so that short-term (3 months in the future) six items such as construction raw materials lumber and cement were improved. ), mid-term (6 months in the future), and long-term (12 months in the future) price forecasts. As a result of the analysis, the predicted value based on the improved Data Refactor technique reduced the error and expanded the variability. Therefore, it is expected that the budget can be managed effectively by predicting the price of construction raw materials more accurately through the Data Refactor technique proposed in this study.

Deep Learning-Based Motion Reconstruction Using Tracker Sensors (트래커를 활용한 딥러닝 기반 실시간 전신 동작 복원 )

  • Hyunseok Kim;Kyungwon Kang;Gangrae Park;Taesoo Kwon
    • Journal of the Korea Computer Graphics Society
    • /
    • v.29 no.5
    • /
    • pp.11-20
    • /
    • 2023
  • In this paper, we propose a novel deep learning-based motion reconstruction approach that facilitates the generation of full-body motions, including finger motions, while also enabling the online adjustment of motion generation delays. The proposed method combines the Vive Tracker with a deep learning method to achieve more accurate motion reconstruction while effectively mitigating foot skating issues through the use of an Inverse Kinematics (IK) solver. The proposed method utilizes a trained AutoEncoder to reconstruct character body motions using tracker data in real-time while offering the flexibility to adjust motion generation delays as needed. To generate hand motions suitable for the reconstructed body motion, we employ a Fully Connected Network (FCN). By combining the reconstructed body motion from the AutoEncoder with the hand motions generated by the FCN, we can generate full-body motions of characters that include hand movements. In order to alleviate foot skating issues in motions generated by deep learning-based methods, we use an IK solver. By setting the trackers located near the character's feet as end-effectors for the IK solver, our method precisely controls and corrects the character's foot movements, thereby enhancing the overall accuracy of the generated motions. Through experiments, we validate the accuracy of motion generation in the proposed deep learning-based motion reconstruction scheme, as well as the ability to adjust latency based on user input. Additionally, we assess the correction performance by comparing motions with the IK solver applied to those without it, focusing particularly on how it addresses the foot skating issue in the generated full-body motions.