• Title/Summary/Keyword: 워크?

Search Result 22,196, Processing Time 0.045 seconds

Location Service Modeling of Distributed GIS for Replication Geospatial Information Object Management (중복 지리정보 객체 관리를 위한 분산 지리정보 시스템의 위치 서비스 모델링)

  • Jeong, Chang-Won;Lee, Won-Jung;Lee, Jae-Wan;Joo, Su-Chong
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.985-996
    • /
    • 2006
  • As the internet technologies develop, the geographic information system environment is changing to the web-based service. Since geospatial information of the existing Web-GIS services were developed independently, there is no interoperability to support diverse map formats. In spite of the same geospatial information object it can be used for various proposes that is duplicated in GIS separately. It needs intelligent strategies for optimal replica selection, which is identification of replication geospatial information objects. And for management of replication objects, OMG, GLOBE and GRID computing suggested related frameworks. But these researches are not thorough going enough in case of geospatial information object. This paper presents a model of location service, which is supported for optimal selection among replication and management of replication objects. It is consist of tree main services. The first is binding service which can save names and properties of object defined by users according to service offers and enable clients to search them on the service of offers. The second is location service which can manage location information with contact records. And obtains performance information by the Load Sharing Facility on system independently with contact address. The third is intelligent selection service which can obtain basic/performance information from the binding service/location service and provide both faster access and better performance characteristics by rules as intelligent model based on rough sets. For the validity of location service model, this research presents the processes of location service execution with Graphic User Interface.

The Stock Portfolio Recommendation System based on the Correlation between the Stock Message Boards and the Stock Market (인터넷 주식 토론방 게시물과 주식시장의 상관관계 분석을 통한 투자 종목 선정 시스템)

  • Lee, Yun-Jung;Kim, Gun-Woo;Woo, Gyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.10
    • /
    • pp.441-450
    • /
    • 2014
  • The stock market is constantly changing and sometimes the stock prices unaccountably plummet or surge. So, the stock market is recognized as a complex system and the change on the stock prices is unpredictable. Recently, many researchers try to understand the stock market as the network among individual stocks and to find a clue about the change of the stock prices from big data being created in real time from Internet. We focus on the correlation between the stock prices and the human interactions in Internet especially in the stock message boards. To uncover this correlation, we collected and investigated the articles concerning with 57 target companies, members of KOSPI200. From the analysis result, we found that there is no significant correlation between the stock prices and the article volume, but the strength of correlation between the article volume and the stock prices is relevant to the stock return. We propose a new method for recommending stock portfolio base on the result of our analysis. According to the simulated investment test using the article data from the stock message boards in 'Daum' portal site, the returns of our portfolio is about 1.55% per month, which is about 0.72% and 1.21% higher than that of the Markowitz's efficient portfolio and that of the KOSPI average respectively. Also, the case using the data from 'Naver' portal site, the stock returns of our proposed portfolio is about 0.90%, which is 0.35%, 0.40%, and 0.58% higher than those of our previous portfolio, Markowitz's efficient portfolio, and KOSPI average respectively. This study presents that collective human behavior on Internet stock message board can be much helpful to understand the stock market and the correlation between the stock price and the collective human behavior can be used to invest in stocks.

A Study on the animation music video production for the viral marketing purposes A case study of project (바이럴 마케팅용 애니메이션 뮤직비디오 제작 연구 : 월드컵 응원가 <일어나라 대한민국> 사례를 중심으로)

  • Han, Sang-Gyun;Kim, Tak-Hoon;Kim, Yu-Mi
    • Cartoon and Animation Studies
    • /
    • s.22
    • /
    • pp.47-63
    • /
    • 2011
  • Recently, contemporary cultural contents have been shown its diversity changes followed by the birth of new media platforms with consumers' new needs in the global market. Also, developments of Internet and computer system networks are the main contributors of making this changes happened rapidly. This study aims to know that how to usefully use those new media platforms through the great example of stop-motion animation music video by analyzing its production and marketing process. The music video production had been focused to be completed with high quality by adjusting the production process economically in spite of the relatively short period(less than one month)from its crank-up to the deadline. Because the production was planned that main characters lead the whole story, the creative team had been tried to reduce the production hours by commonly use the same mold when they make original clay models by collecting the similarities of characters' appearances. By using CG technic, could overcome the visual monotonous from the similarities which inferred above. Also, the repeated rhythm in the music video, the similar scenes of backgrounds were commonly used by copy of the original scene. At the point of directing, the creative team considered both economical and art aspects for the quality work. In details, they divided the scenes into foreground and background, and removed unnecessary parts to save the production hours and budget but make depth of fields in the scenes. Except the viral marketing purposes, was searching for the methods to compensate the production cost. For this, the characters in the music video dressed the same T-shirts which are world-cup logo on, and those were designed for the sale after released the music video. Even the result of the sales was not enough to satisfied, it was estimated a great attempt to the domestic animation industry.

  • PDF

Analysis of Mistakes in Photosynthesis Unit in Biology II Textbooks and Survey of Biology Teachers' Recognition on them (생물 II 교과서 광합성 단원의 오류 분석 및 생물 교사의 오류 인지 조사)

  • Park, Hae-Kyung;Yoon, Ki-Soon;Kwon, Duck-Kee
    • Journal of Science Education
    • /
    • v.32 no.1
    • /
    • pp.33-46
    • /
    • 2008
  • The purpose of this study was to know whether or not any wrongful description or simple errors were in photosynthesis unit of Biology II textbook under 7th national curriculum and if so, to know whether or not high school teachers recognized and corrected properly the mistakes. The mistakes in photosynthesis unit of text books were determined by the comparison with several reference books and through examination by three plant physiologists in 8 different Biology II textbooks. After the mistakes were analysed, the survey using contents of textbook containing the mistakes was conducted on high school teachers teaching Biology II. As a result, 48 mistakes were determined in 13 subjects. As many as four mistakes were found even in one subject in a certain textbook and a same mistake was found repeatedly in several textbooks. The survey result showed that the teachers who pointed exactly the mistakes out corrected properly, however, the percentage of these ones out of 35 teachers replied to survey was less than 50%. The ratios of correction out of total number of responses were high in question #6 (43%), #4-3 (40%), and #1-2 (32%) which were containing a simple mistake in graph, a wrong word and a wrong picture, respectively. But, no one pointed out and made correction in question #5-1 and #5-2 which were containing Z scheme of light reaction without the legend of vertical axis that should be explained as electron energy or standard reduction potential. The result indicates the possibility that the mistakes in photosynthesis unit of Biology II textbook can be corrected and teached properly by teachers may be low. In order to reduce the possibility that students may have misconceptions about photosynthesis, the list of print's errors should be provided to the teachers and/or the training program and/or workshop for in-service high school biology teachers was recommended.

  • PDF

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Analysis on Efficiency of Hierarchical Structure for a Grid Transit Network (격자형 대중교통 노선망의 위계구조 효율성 분석)

  • Park, Jun-Sik;Go, Seung-Yeong;Jeon, Gyeong-Su
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.4
    • /
    • pp.123-133
    • /
    • 2007
  • This study analyzed whether a transit network with hierarchy is efficient or not, and if transit network hierarchy has cost efficiency, then which condition guarantees the efficiency of the transit network hierarchy. The authors modeled the total cost of the transit network and suggested the conditions in which the transit network hierarchy has cost efficiency through comparing the cost of the transit network with and without hierarchy. The efficiency of transit network hierarchy is guaranteed when the travel cost savings induced by using a higher hierarchy transit network is larger than the increasing non-travel cost, which is the sum of access cost, waiting cost, and operating cost, induced by the introduction of a higher hierarchy transit network. This result is consistent with common sense and with the concept of cost and benefit analysis. If a passenger traveling within the area divided by a higher hierarchy transit network uses only a lower hierarchy transit network and the passenger traveling out of the area divided by the higher hierarchy transit network uses both lower and higher hierarchy transit networks, the travel demand using the higher hierarchy transit network is inversely proportional to the square of the line spacing. This means that the transit network becomes more efficient and small increases of travel demand guarantee the efficiency of the transit network hierarchy as the connectivity of the network becomes higher. This result shows that transit networks have economies of aggregation. This study is the first analytical research on transit network hierarchy and is expected to be a basis for numerical research. However, numerical research should complement this study, since analytical research has some limitations for considering a real network.

Research on Science, Technology & Society in Korea: A Critical Review (과학기술과 사회 연구의 현황과 과제)

  • Bak, Hee-Je
    • Journal of Technology Innovation
    • /
    • v.25 no.3
    • /
    • pp.155-195
    • /
    • 2017
  • The goal of the present study is reviewing the literature on the scientific community and also on science, technology & society to increase interactions between innovation studies and social studies of science and technology. Up until now, various empirical studies on Korean scientists and engineers have been concentrated on researchers at universities, while they have paid inadequate attention to researchers at state-funded research institutes and private companies. In addition, these studies have tended to use concepts in Western academia to elucidate Korean cases. On the other hand, recent empirical researches on the effects of the evaluation systems in universities, PBS system, and the network of school ties suggest that these topics may reveal the unique characteristics of Korean scientific community. Empirical studies on the scientific community have also shown that Korean research institutes and researchers who are in charge of innovation in Korea have demonstrated a tendency to conform to the government's guidance due to long experiences of state-led R&D and nationalism. Research on science, technology and society has viewed the participation of citizens in science and technology as a way toward science and technology democracy, and tended to have a strong practical orientation. However, there has been a relatively small amount of research on how citizen participation influences the direction and content of technological innovation. Also, although, from the viewpoint of technological innovation, how participation of citizens in science and technology can contribute to knowledge production and innovation is a critical issue, relatively small numbers of case studies on this subject have been conducted. Therefore, as the scholars who have emphasized the democracy of science and technology have actually experimented with various ways of citizen participation, innovation researchers may have to design and implement citizen participation through which citizens' local knowledge can contribute to technological innovation.

Radiation Oncology Digital Image Chart 8nd Digital Radiotherapv Record System at Samsung Medical Center (디지털 화상 병력 시스템과 디지털 방사선치료 기록 시스템의 개발과 사용 경험)

  • Huh Seung Jae;Ahn Yong Chan;Lim Do Hoon;Cho Chung Keun;Kim Dae Yong;Yeo Inhwan;Kim Moon Kyung;Chang Seung Hee;Park Suk Won
    • Radiation Oncology Journal
    • /
    • v.18 no.1
    • /
    • pp.67-72
    • /
    • 2000
  • Background :The authors have developed a Digital image chart(DIC) and digital Radiotherapy Record System (DRRS). We have evaluated the DIC and DRRS for reliability, usefulness, ease of use, and efficiency. Materials and Methods :The basic design of the DIC and DRRS was to build an digital image database of radiation therapy Patient records for a more efficient and timely flow of critical image information throughout the department. This system is a submit of comprehensive radiation oncology management system (C-ROMS) and composed of a picture archiving and communication system (PACS), a radiotherapy information database, and a radiotherapy imaging database. The DIC and DRRS were programmed using Delphi under a Windows 95 environment and is capable of displaying the digital images of patients identification photos, simulation films, radiotherapy setup, diagnostic radiology images, gross lesion Photos, and radiotherapy Planning isodose charts with beam arrangements. Twenty-three clients in the department are connected by Ethernet (10 Mbps) to the central image server (Sun Ultra-sparc 1 workstation). Results :From the introduction of this system in February 1998 through December 1999, we have accumulated a total of 15,732 individual images for 2,556 patients. We can organize radiation therapy in a 'paperless' environment in 120 patients with breast cancer. Using this system, we have succeeded in the prompt, accurate, and simultaneous access to patient care information from multiple locations throughout the department. This coordination has resulted in improved operational efficiency within the department. Conclusion :The authors believe that the DIC and DRRS has contributed to the improvement of radiation oncology department efficacy as well as to time and resource savings by providing necessary visual information throughout the department conveniently and simultaneously. As a result, we can also achieve the 'paperless' and 'filmless' practice of radiation oncology with this system.

  • PDF

Semi-automated Tractography Analysis using a Allen Mouse Brain Atlas : Comparing DTI Acquisition between NEX and SNR (알렌 마우스 브레인 아틀라스를 이용한 반자동 신경섬유지도 분석 : 여기수와 신호대잡음비간의 DTI 획득 비교)

  • Im, Sang-Jin;Baek, Hyeon-Man
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.2
    • /
    • pp.157-168
    • /
    • 2020
  • Advancements in segmentation methodology has made automatic segmentation of brain structures using structural images accurate and consistent. One method of automatic segmentation, which involves registering atlas information from template space to subject space, requires a high quality atlas with accurate boundaries for consistent segmentation. The Allen Mouse Brain Atlas, which has been widely accepted as a high quality reference of the mouse brain, has been used in various segmentations and can provide accurate coordinates and boundaries of mouse brain structures for tractography. Through probabilistic tractography, diffusion tensor images can be used to map comprehensive neuronal network of white matter pathways of the brain. Comparisons between neural networks of mouse and human brains showed that various clinical tests on mouse models were able to simulate disease pathology of human brains, increasing the importance of clinical mouse brain studies. However, differences between brain size of human and mouse brain has made it difficult to achieve the necessary image quality for analysis and the conditions for sufficient image quality such as a long scan time makes using live samples unrealistic. In order to secure a mouse brain image with a sufficient scan time, an Ex-vivo experiment of a mouse brain was conducted for this study. Using FSL, a tool for analyzing tensor images, we proposed a semi-automated segmentation and tractography analysis pipeline of the mouse brain and applied it to various mouse models. Also, in order to determine the useful signal-to-noise ratio of the diffusion tensor image acquired for the tractography analysis, images with various excitation numbers were compared.

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.