• Title/Summary/Keyword: 웹 신뢰성

Search Result 439, Processing Time 0.029 seconds

A Study on the Development of Intelligent Markup Indicator (IMI) Technology for Underground Facilities Management Using IoT (IoT를 이용한 지하매설물관리용 지능형표지기(IMI) 기술개발에 관한 연구)

  • Kim, Tai-Dal
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.129-136
    • /
    • 2017
  • Geographic Information System The geographic information system (GIS) has been limited to the government and some public sectors. Recently, the market has been diversified by combining with other areas such as mobile and CRM (Customer Relationship Management). The development direction of GIS technology in the 21st century is Web GIS, 3D GIS, mobile GIS, LBS, etc. as general technology for GIS application system development and spatial information service. In this study, we developed a new concept marking nail (a marking nail with built - in intelligent storage memory device) from the function of simple positioning of a marking nail related to a previously used underground item,, Burial depth, pipe thickness, piping material, management agency, contractor, contact, etc.) and store it in DB server, if necessary.Make it available in the right place. Through this research, it is possible to prevent and minimize various accidents caused by irregular excavation works, etc., and to provide information for establishing countermeasures related to sink holes. In order to provide systematic and reliable information on underground burial management, it was proposed to input information conveniently in the field, and the purpose was to reduce the incidence of buried underground pipes absolutely.

Air Quality Monitoring System Using NDIR-CO$_2$ Sensor for Underground Space based on Wireless Sensor Network (비분산적의선 CO$_2$센서를 이용한 무선 센서 네트워크 기반의 지하 공기질 모니터링 시스템)

  • Kwon, Jong-Won;Kim, Jo-Chun;Kim, Gyu-Sik;Kim, Hie-Sik
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.46 no.4
    • /
    • pp.28-38
    • /
    • 2009
  • In this study, a remote air quality monitoring system for underground spaces was developed by using NDIR-based CO$_2$ sensor. And the remote monitoring system based on wireless sensor networks was installed practically on the subway station platform. More than 6.5 million citizens commutate everyday by the Seoul subway transportation that is the most typical public transportation. They concern about air quality with increasing interest on public health or many workers in subway stations or underground shopping centers. Recently, the Korean Ministry of Environment has operated the air quality monitoring system in some subway stations for testing phase. However, it showed many defects which are large-scale, high-cost and maintenance of precision sensors imported from abroad. Therefore this research includes the reliability test and a theoretical study about the inexpensive commercialized CO$_2$ sensor for reliable measurement of air quality which changes rapidly by the surrounding environments. And then we develop the wireless sensor nodes and the gateway applied for remote air quality monitoring. In addition, web server program was realized to manage air quality in the subway platform. This result will be valuable for a basic research for air quality management in underground spaces for future study.

A Robustness Test Method and Test Framework for the Services Composition in the Service Oriented Architecture (SOA에서 서비스 조합의 강건성 테스트 방법 및 테스트 프레임워크)

  • Kuk, Seung-Hak;Kim, Hyeon-Soo
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.10
    • /
    • pp.800-815
    • /
    • 2009
  • Recently, Web services based service-oriented architecture is widely used to integrate effectively various applications distributed on the networks. In the service-oriented architecture BPEL as a standard modeling language for the business processes provides the way to integrate various services provided by applications. Over the past few years, some types of studies have been made on testing compatibility of services and on discriminating and tracing of the business processes in the services composition. Now a lot of studies about the services composition with BPEL are going on. However there were few efforts to solve the problems caused by the services composition. Especially, there is no effort to evaluate whether a composite service is reliable and whether it is robust against to exceptional situations. In this paper, we suggest a test framework and a testing method for robustness of the composite service written in WS-BPEL. For this, firstly we extract some information from the BPEL process and the participant services. Next, with the extracted information we construct the virtual testing environment that generates various faults and exceptional cases which may be raised within the real services. Finally the testing work for robustness of a composite service is performed on the test framework.

A Validation Study of Suicidal Ideation Attributes Scale (SIDAS) Measuring Suicidal Severity (자살사고 속성 척도(Suicidal Ideation Attributes Scale; SIDAS) 타당화 연구)

  • DeokHee Lee;Sung Hyun Kim;DaSong Jung;DongHun Lee
    • Korean Journal of Culture and Social Issue
    • /
    • v.29 no.1
    • /
    • pp.1-23
    • /
    • 2023
  • The purpose of this study was to validate the Suicidal Ideation Attributes Scale(SIDAS) which can measure the severity of suicidal ideation in a sample of 399 Korean adults. For this purpose, an online survey was conducted for two weeks from July 2020 to August 2020. First, there were differences in SIDAS scores among groups divided by gender, residence status, depression and anxiety symptoms, suicidal ideation, suicidal plan, suicidal preparation, and suicidal attempt. Second, correlations between SIDAS, C-SSRS suicidal ideation intensity question(3 items), and the Rosenberg Self-efficacy (RSE) were examined to confirm the validity of SIDAS. As a result, correlations between the SIDAS and suicidal ideation intesity items of C-SSRS were significant in all items, while correlations between the SIDAS and RSE items were negative or insignificant. Third, as a result of the confirmatory factor analysis of SIDAS on all respondents and respondents with suicidal ideation, a single factor structure was appropriate for both groups. Internal consistency of SIDAS was also good. Lastly, as a result of identifying the variables affecting the suicidal plan over the past year, controllability and age were identified as significant predictive variables. SIDAS which was designed to be administered through web, can be appropriately used in Korea. It was confirmed that SIDAS is a reliable and valid suicidal ideation scale which is applicable to adults in Korea.

Change Acceptable In-Depth Searching in LOD Cloud for Efficient Knowledge Expansion (효과적인 지식확장을 위한 LOD 클라우드에서의 변화수용적 심층검색)

  • Kim, Kwangmin;Sohn, Yonglak
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.171-193
    • /
    • 2018
  • LOD(Linked Open Data) cloud is a practical implementation of semantic web. We suggested a new method that provides identity links conveniently in LOD cloud. It also allows changes in LOD to be reflected to searching results without any omissions. LOD provides detail descriptions of entities to public in RDF triple form. RDF triple is composed of subject, predicates, and objects and presents detail description for an entity. Links in LOD cloud, named identity links, are realized by asserting entities of different RDF triples to be identical. Currently, the identity link is provided with creating a link triple explicitly in which associates its subject and object with source and target entities. Link triples are appended to LOD. With identity links, a knowledge achieves from an LOD can be expanded with different knowledge from different LODs. The goal of LOD cloud is providing opportunity of knowledge expansion to users. Appending link triples to LOD, however, has serious difficulties in discovering identity links between entities one by one notwithstanding the enormous scale of LOD. Newly added entities cannot be reflected to searching results until identity links heading for them are serialized and published to LOD cloud. Instead of creating enormous identity links, we propose LOD to prepare its own link policy. The link policy specifies a set of target LODs to link and constraints necessary to discover identity links to entities on target LODs. On searching, it becomes possible to access newly added entities and reflect them to searching results without any omissions by referencing the link policies. Link policy specifies a set of predicate pairs for discovering identity between associated entities in source and target LODs. For the link policy specification, we have suggested a set of vocabularies that conform to RDFS and OWL. Identity between entities is evaluated in accordance with a similarity of the source and the target entities' objects which have been associated with the predicates' pair in the link policy. We implemented a system "Change Acceptable In-Depth Searching System(CAIDS)". With CAIDS, user's searching request starts from depth_0 LOD, i.e. surface searching. Referencing the link policies of LODs, CAIDS proceeds in-depth searching, next LODs of next depths. To supplement identity links derived from the link policies, CAIDS uses explicit link triples as well. Following the identity links, CAIDS's in-depth searching progresses. Content of an entity obtained from depth_0 LOD expands with the contents of entities of other LODs which have been discovered to be identical to depth_0 LOD entity. Expanding content of depth_0 LOD entity without user's cognition of such other LODs is the implementation of knowledge expansion. It is the goal of LOD cloud. The more identity links in LOD cloud, the wider content expansions in LOD cloud. We have suggested a new way to create identity links abundantly and supply them to LOD cloud. Experiments on CAIDS performed against DBpedia LODs of Korea, France, Italy, Spain, and Portugal. They present that CAIDS provides appropriate expansion ratio and inclusion ratio as long as degree of similarity between source and target objects is 0.8 ~ 0.9. Expansion ratio, for each depth, depicts the ratio of the entities discovered at the depth to the entities of depth_0 LOD. For each depth, inclusion ratio illustrates the ratio of the entities discovered only with explicit links to the entities discovered only with link policies. In cases of similarity degrees with under 0.8, expansion becomes excessive and thus contents become distorted. Similarity degree of 0.8 ~ 0.9 provides appropriate amount of RDF triples searched as well. Experiments have evaluated confidence degree of contents which have been expanded in accordance with in-depth searching. Confidence degree of content is directly coupled with identity ratio of an entity, which means the degree of identity to the entity of depth_0 LOD. Identity ratio of an entity is obtained by multiplying source LOD's confidence and source entity's identity ratio. By tracing the identity links in advance, LOD's confidence is evaluated in accordance with the amount of identity links incoming to the entities in the LOD. While evaluating the identity ratio, concept of identity agreement, which means that multiple identity links head to a common entity, has been considered. With the identity agreement concept, experimental results present that identity ratio decreases as depth deepens, but rebounds as the depth deepens more. For each entity, as the number of identity links increases, identity ratio rebounds early and reaches at 1 finally. We found out that more than 8 identity links for each entity would lead users to give their confidence to the contents expanded. Link policy based in-depth searching method, we proposed, is expected to contribute to abundant identity links provisions to LOD cloud.

An Efficient Estimation of Place Brand Image Power Based on Text Mining Technology (텍스트마이닝 기반의 효율적인 장소 브랜드 이미지 강도 측정 방법)

  • Choi, Sukjae;Jeon, Jongshik;Subrata, Biswas;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.113-129
    • /
    • 2015
  • Location branding is a very important income making activity, by giving special meanings to a specific location while producing identity and communal value which are based around the understanding of a place's location branding concept methodology. Many other areas, such as marketing, architecture, and city construction, exert an influence creating an impressive brand image. A place brand which shows great recognition to both native people of S. Korea and foreigners creates significant economic effects. There has been research on creating a strategically and detailed place brand image, and the representative research has been carried out by Anholt who surveyed two million people from 50 different countries. However, the investigation, including survey research, required a great deal of effort from the workforce and required significant expense. As a result, there is a need to make more affordable, objective and effective research methods. The purpose of this paper is to find a way to measure the intensity of the image of the brand objective and at a low cost through text mining purposes. The proposed method extracts the keyword and the factors constructing the location brand image from the related web documents. In this way, we can measure the brand image intensity of the specific location. The performance of the proposed methodology was verified through comparison with Anholt's 50 city image consistency index ranking around the world. Four methods are applied to the test. First, RNADOM method artificially ranks the cities included in the experiment. HUMAN method firstly makes a questionnaire and selects 9 volunteers who are well acquainted with brand management and at the same time cities to evaluate. Then they are requested to rank the cities and compared with the Anholt's evaluation results. TM method applies the proposed method to evaluate the cities with all evaluation criteria. TM-LEARN, which is the extended method of TM, selects significant evaluation items from the items in every criterion. Then the method evaluates the cities with all selected evaluation criteria. RMSE is used to as a metric to compare the evaluation results. Experimental results suggested by this paper's methodology are as follows: Firstly, compared to the evaluation method that targets ordinary people, this method appeared to be more accurate. Secondly, compared to the traditional survey method, the time and the cost are much less because in this research we used automated means. Thirdly, this proposed methodology is very timely because it can be evaluated from time to time. Fourthly, compared to Anholt's method which evaluated only for an already specified city, this proposed methodology is applicable to any location. Finally, this proposed methodology has a relatively high objectivity because our research was conducted based on open source data. As a result, our city image evaluation text mining approach has found validity in terms of accuracy, cost-effectiveness, timeliness, scalability, and reliability. The proposed method provides managers with clear guidelines regarding brand management in public and private sectors. As public sectors such as local officers, the proposed method could be used to formulate strategies and enhance the image of their places in an efficient manner. Rather than conducting heavy questionnaires, the local officers could monitor the current place image very shortly a priori, than may make decisions to go over the formal place image test only if the evaluation results from the proposed method are not ordinary no matter what the results indicate opportunity or threat to the place. Moreover, with co-using the morphological analysis, extracting meaningful facets of place brand from text, sentiment analysis and more with the proposed method, marketing strategy planners or civil engineering professionals may obtain deeper and more abundant insights for better place rand images. In the future, a prototype system will be implemented to show the feasibility of the idea proposed in this paper.

A Novel QoS Provisoning Scheme Based on User Mobility Patterns in IP-based Next-Generation Mobile Networks (IP기반 차세대 모바일 네트워크에서 사용자 이동패턴에 기반한 QoS 보장기법)

  • Yang, Seungbo;Jeong, Jongpil
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.25-38
    • /
    • 2013
  • Future wireless systems will be required to support the increasingly nomadic lifestyle of people. This support will be provided through the use of multiple overlaid networks which have very different characteristics. Moreover, these networks will be required to support the seamless delivery of today's popular desktop services, such as web browsing, interactive multimedia and video conferencing to the mobile devices. Thus one of the major challenges in the design of these mobile systems will be the provision of the quality of service (QoS) guarantees that the applications demand under this diverse networking infrastructure. We believe that it is necessary to use resource reservation and adaptation techniques to deliver these QoS guarantee to applications. However, reservation and pre-configuration in the entire service region is overly aggressive, and results in schemes that are extremely inefficient and unreliable. To overcome this, the mobility pattern of a user can be exploited. If the movement of a user is known, the reservation and configuration procedure can be limited to the regions of the network a user is likely to visit. Our proposed Proxy-UMP is not sensitive to increase of the search cost than other schemes and shows that the increasing rate of total cost is low as the SMR increases.

Managing Duplicate Memberships of Websites : An Approach of Social Network Analysis (웹사이트 중복회원 관리 : 소셜 네트워크 분석 접근)

  • Kang, Eun-Young;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.153-169
    • /
    • 2011
  • Today using Internet environment is considered absolutely essential for establishing corporate marketing strategy. Companies have promoted their products and services through various ways of on-line marketing activities such as providing gifts and points to customers in exchange for participating in events, which is based on customers' membership data. Since companies can use these membership data to enhance their marketing efforts through various data analysis, appropriate website membership management may play an important role in increasing the effectiveness of on-line marketing campaign. Despite the growing interests in proper membership management, however, there have been difficulties in identifying inappropriate members who can weaken on-line marketing effectiveness. In on-line environment, customers tend to not reveal themselves clearly compared to off-line market. Customers who have malicious intent are able to create duplicate IDs by using others' names illegally or faking login information during joining membership. Since the duplicate members are likely to intercept gifts and points that should be sent to appropriate customers who deserve them, this can result in ineffective marketing efforts. Considering that the number of website members and its related marketing costs are significantly increasing, it is necessary for companies to find efficient ways to screen and exclude unfavorable troublemakers who are duplicate members. With this motivation, this study proposes an approach for managing duplicate membership based on the social network analysis and verifies its effectiveness using membership data gathered from real websites. A social network is a social structure made up of actors called nodes, which are tied by one or more specific types of interdependency. Social networks represent the relationship between the nodes and show the direction and strength of the relationship. Various analytical techniques have been proposed based on the social relationships, such as centrality analysis, structural holes analysis, structural equivalents analysis, and so on. Component analysis, one of the social network analysis techniques, deals with the sub-networks that form meaningful information in the group connection. We propose a method for managing duplicate memberships using component analysis. The procedure is as follows. First step is to identify membership attributes that will be used for analyzing relationship patterns among memberships. Membership attributes include ID, telephone number, address, posting time, IP address, and so on. Second step is to compose social matrices based on the identified membership attributes and aggregate the values of each social matrix into a combined social matrix. The combined social matrix represents how strong pairs of nodes are connected together. When a pair of nodes is strongly connected, we expect that those nodes are likely to be duplicate memberships. The combined social matrix is transformed into a binary matrix with '0' or '1' of cell values using a relationship criterion that determines whether the membership is duplicate or not. Third step is to conduct a component analysis for the combined social matrix in order to identify component nodes and isolated nodes. Fourth, identify the number of real memberships and calculate the reliability of website membership based on the component analysis results. The proposed procedure was applied to three real websites operated by a pharmaceutical company. The empirical results showed that the proposed method was superior to the traditional database approach using simple address comparison. In conclusion, this study is expected to shed some light on how social network analysis can enhance a reliable on-line marketing performance by efficiently and effectively identifying duplicate memberships of websites.

A Study on Simulation based Manufacturing in Shipyards : Focused on a Long-term Plan Verification (조선소에서의 시뮬레이션 기반 생산에 관한 연구 : 선표 계획 검증을 중심으로)

  • Lee, Dong-Kun;Oh, Dae-Kyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.1
    • /
    • pp.86-95
    • /
    • 2014
  • Productivity improvement of a shipbuilding company depends on how efficiently its limited resources are managed and utilized. Recently, research on modeling and simulation (M&S) to support shipyard production management system has been being under study. The production management based on M&S rejects decision making on experience, and it can establish productivity improvement method based on quantitative and specific data. In this paper, M&S is applied to the long-term plan as a part of the production planning in shipyards. To this end, the long-term plan processes and related management systems are analyzed. Based on the analysis, a simulation model and an application system using commercial simulation software are suggested. And basic structure of the suggested system is based on web technology such as Rich Internet Application, web services protocol for compatibility with existing shipyard enterprise systems. Utilizing the results of this study, it is expected that shipyard production planners can settle down work flow, in which one can establishes the production plan, simulates the plan, and analyzes the results, enabling a more reliable production plans.

Influencing Factors for Compliance Intention of Information Security Policy (정보보안 정책 준수 의도에 대한 영향요인)

  • Kim, Sang-Hoon;Park, Sun-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.33-51
    • /
    • 2011
  • This research derived the influencing factors for employees' compliance with the information security policy in organizations on the basis of Neutralization Theory, Theory of Planned Behavior and Protection Motivation Theory. To empirically analyze the research model and the hypotheses, data were collected by conducting web survey, 194 of 207 questionnaires were available. The test of causal model was conducted by PLS. Reliability, validity and model fit were found to be statistically significant. the results of hypotheses tests showed that seven ones of eight hypotheses could be accepted. The theoretical implications of this study are as follows : 1) this study is expected to play a role of baseline for future research about employee compliance with the information security policy, 2) this study attempted interdisciplinary approach through combining psychology and information system security research, and 3) it suggested concrete operational definitions of influencing factors for information security policy compliance through comprehensive theoretical review. Also, this study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for implement of information system security policies in organizations. Second, it is proved that the need for conducting education and training program suppressing employees. neutralization psychology to violate information security policy should be emphasized in the organizations.