• Title/Summary/Keyword: 인지도 관리기법

Search Result 169, Processing Time 0.05 seconds

Library Risk Management and Insurance (도서관 리스크관리와 보험)

  • Chung, Hye-Kyoung
    • Journal of Information Management
    • /
    • v.31 no.4
    • /
    • pp.1-12
    • /
    • 2000
  • The potential risks, involved with the management of a library, may cause a tremendous economic loss, so require a systematic management. The rist management process, consisting of risk identification, risk measurement selection of risk treatment methods, implementation, and monitoring and evaluation, suggests the use of insurance to deal with property risks, liability risks and personnel risks. For the systematic risk management of a library, risk manager should be appointed to be responsible for program development and insurance purchase. The limited coverage of library risks, provided by the school cooperative society, should be supplemented through development of insurance products. Further study is required to improve the library risk management and the application of insurance in a systematic and realistic way.

  • PDF

Stakeholder's Valuation of Public PMO System Using Laddering (래더링 기법을 이용한 전자정부사업관리 위탁(공공 PMO)제도의 이해관계자 별 가치체계)

  • Back, Hyung-Chung;Park, Chan-Hyuk;Jang, Seong-Yong;Kim, Ja-Hee
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.4
    • /
    • pp.127-136
    • /
    • 2015
  • The e-government project management consignment system to allow the public PMO has been introduced to resolve the quality management issue and the business risk, pointed out by the reorganized Software Industry Promotion Act. The additional regulation improvements are demanded because the public PMO system cannot settle down due to the different opinions among related parties: owner, operator and PMO. Therefore, to make balanced regulation improvements, the in-depth studies are necessary to analyze the fundamental causes of the disagreement between the related parties. This study analyses the each related party's cognitive structure to perform public PMO successfully and the fundamental reasons that cause the different opinions by applying the cognitive psychological Means-end chain theory, the laddering technique and the HVM, Hierarchical Value Map. In addition, this study analyses the regulations required for the related parties to obtain the expected benefits.

An Effective Frequency Sharing Method using Cognitive Radio in GSO Satellite Network (인지무선 라디오 기술을 이용한 효율적인 GSO 위성망 주파수 공유방법)

  • Jung, Won-Sik;Jang, Sung-Jeen;Cho, Jae-Bum;Kim, Jae-Moung
    • Journal of Satellite, Information and Communications
    • /
    • v.5 no.2
    • /
    • pp.57-63
    • /
    • 2010
  • Many efficient frequency sharing methods are issued in present because of increasing users with various wireless communication terminals. In the satellite communications, the service coverage is generally very wide so frequency sharing with terrestrial system is essentially needed, and the research is progressing dynamically related on this frequency sharing method. But if we adopt the terrestrial system which is commonly used, it can't avoid the interference from terrestrial service to satellite service. Therefore, this paper will introduce methods for reducing the interference from terrestrial station to earth station using cognitive radio system Satellite system is guaranteed with decreasing interference from terrestrial stations using Genetic Algorithm based power control method. Furthermore, terrestrial systems can have increased QoS because the frequency reuse factor in proposed method is higher than existing methods.

Model Development of Event Detection System Software in Water Distribution Networks (상수관망 수리이상감지시스템 SW(K-EDS) 모델 개발)

  • Noh, Joon Woo;Shin, Eun Her;Yoo, Do Guen
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.270-270
    • /
    • 2017
  • 스마트워터그리드와 같은 첨단 정보통신기술을 활용한 물 관리 기술의 도입으로 수도운영사업에서도 누수와 같은 이상사건인지 목적의 효율적 빅 데이터 분석기법의 중요성이 증대되고 있다. 국내외적으로 누수인지를 위한 다양한 연구기법, 범위, 계측항목, 샘플링 주기 등이 제시된 바 있으나, 이상감지시스템(Event Detection System, EDS)은 대상지역 특정적 특성을 가지고 있어 범용적인 모델을 구축하는 데는 어려움이 있다. 본 연구에서는 소블럭 단위의 유량자료 분석을 통한 이상감지시스템의 적용가능여부를 판별하고 적합 모델구축자료 방안을 제시하는 K-EDS 모델을 개발하였다. 모델분석의 절차는 자료획득, 자료 전처리, 탐색적 자료해석, 그리고 각 기법 평가로 진행된다. 개발된 모델을 다양한 특성을 가지는 실제 지방상수도시스템에 적용하여 분석하였으며, 최종적으로 모델적용 가능성과 영향인자 등을 도출하였다. 개발된 모델은 소블럭별 현장계측자료 기반의 이상감지모델 적용 적합도 판별에 활용될 수 있으며, 향후 누수 인지 및 누수지속시간 감소를 위한 SW로 개발이 가능하다.

  • PDF

Idle Cache Exploiting Techniques for Shared Bus-based Chip Multi-processors (칩 멀티 프로세서의 공유 버스를 이용한 유휴 캐시 활용 기법)

  • Kang, Seok-bin;Kim, Ju-hwan;Kwak, Jong Wook;Jhang, Seong Tae;Jhon, Chu-shik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.877-880
    • /
    • 2009
  • 반도체 집적도의 향상과 제한된 프로세서 설계 능력으로 인한 칩 멀티 프로세서의 도입은 최근 수 년 동안 급속히 이루어졌으나, 다수의 프로세싱 코어를 효율적으로 사용하기 위한 기법은 부족한 실정이다. 칩 멀티 프로세서 상에서 실제 작업을 수행하지 않는 유휴 코어의 발생은 불가피하며, 이 때 코어가 소유한 자원들은 낭비될 수 밖에 없다. 기존의 연구들은 이렇게 낭비되는 자원 중에서 캐시의 효율적 관리를 위해 공유 캐시 형태로 캐시를 구성하였으나, 전체 캐시 관리에 따른 많은 오버헤드를 수반하였다. 본 논문에서는 이러한 유휴 캐시의 발생이 불가피함을 인지하고 그것을 칩 내 메모리 공간으로써 활용하여 칩 멀티 프로세서 전체의 성능을 향상시키는 기법을 제안한다. 이를 위해 ARM 코어 기반의 칩 멀티프로세서 시뮬레이터 환경을 구성하여 제안된 기법을 검증한다. 실험 결과 본 논문에서 소개된 기법은 4-코어 및 16 코어 기반 칩 멀티 프로세서 환경에서 각각 17%와 8%의 IPC 향상을 가져왔다.

Development of Evaluation Indicators for a Children's Dietary Life Safety Index in Korea (한국 어린이 식생활 안전지수의 평가 지표 개발)

  • Chung, Hae-Rang;Kwak, Tong-Kyung;Choi, Young-Sun;Kim, Hye-Young P.;Lee, Jung-Sug;Choi, Jung-Hwa;Yi, Na-Young;Kwon, Se-Hyug;Choi, Youn-Ju;Lee, Soon-Kyu;Kang, Myung-Hee
    • Journal of Nutrition and Health
    • /
    • v.44 no.1
    • /
    • pp.49-60
    • /
    • 2011
  • This study was performed to develop a children's dietary life safety index required by the Special Act on Safety Management of Children's Dietary Life enacted in 2009. An analytical hierarchy process was used to obtain initial weights of dietary life safety evaluation indicators. The Delphi method was applied to develop the weights along with 98 food and nutrition professionals. Three representative policy indicators, nine strategy indicators, 11 main evaluation indicators, and 20 detailed evaluation indicators were selected for the children's dietary life safety assessment. Three policy indicators and nine strategy indicators were the following: children's food safety indicator (support level of children' safety, safety management level of children's favorite foods, and safety management level of institutional food service), children's nutrition safety indicator (management level of missing meals and obesity, nutrition management level of children's favorite foods, and nutrition management level of institutional food service), and children's perception and practice level indicator ("Dietary Life Law" perception level, perception, and practice level for dietary life safety management, perception, and practice level for nutrition management). Weights of 40%, 40%, and 20% were given for the three representative policy indicators. The relative importance of nine strategic indicators, which were determined by the Delphi method is as follows: For children’s food safety, support level of children's safety, safety management level of children's favorite foods, and safety management level of institutional food service were given weights of 12%, 9%, and 19%, respectively. For children's nutrition safety, the missing meals and obesity management level, nutrition management level of children's favorite foods, and the nutrition management level of institutional food service were given weights of 13%, 11%, and 16%, respectively. The "Dietary Life Law" perception level, perception and practice level of dietary life safety management, and perception and practice level of nutrition management were given weights of 4%, 7%, and 9%, respectively.

A Study on the Cognition Distance of Separately Shelved Items by Multi-dimensional Scaling Analysis in Children's Libraries (다차원척도법을 이용한 어린이도서관 별치 자료에 대한 인지 거리 연구)

  • Kim, Hyoyoon;Cho, Jane
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.1
    • /
    • pp.51-71
    • /
    • 2017
  • This study conducted a survey to measure recognition distance between the materials which are located separately in a children's library targeting 200 elementary school lower grade students, higher grade students, and school parents(adults). And compared recognition distance between the elements of materials of individual visitor group with multidimensional scaling and K-mean group analysis. Multidimensional Scaling (MDS) is a technique for projecting the cognitive state in space by evaluating the similarity or attribute of the analysis target. Even though it is mainly used for market diagnosis in marketing, It can also be applied to present an ideal physical layout plan by analyzing the distance. As a result of analysis, the main discoveries are as follows. First, elementary school students cognize child, baby and computer materials should be adjacent as a same group. But recognition of adults(school parents) is reflected by differing from elementary school students vastly. They cognize that computer materials should be formed as a special group separated from child and baby's materials. Second, elementary school higher graders and adults(school parents) groups also want to separate their main reading materials from baby's book, therefore They both want to secure silent reading space separating from baby. Third, as a result to confirming how this recognition distance system of materials is reflected in a real children's library through three children's libraries in Y-gu, Incheon, there is no library with structure according perfectly with a recognition system of a particular class, but a recognition system of adults and elementary school students is partially reflected because baby, child and computer materials, and baby and child materials are commonly separated and placed. It is difficult to insist that a recognition system of a visitor group, especially a recognition system of children is absolute consideration conditions in material placement of a children's library. However, understanding cognition of the user groups can be an important evidentiary factors to offer differentiated service space according to visitors and effective placement of the elements of library resources.

Document Clustering Using Reference Titles (인용문헌 표제를 이용한 문헌 클러스터링에 관한 연구)

  • Choi, Sang-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.2
    • /
    • pp.241-252
    • /
    • 2010
  • Titles have been regarded as having effective clustering features, but they sometimes fail to represent the topic of a document and result in poorly generated document clusters. This study aims to improve the performance of document clustering with titles by suggesting titles in the citation bibliography as a clustering feature. Titles of original literature, titles in the citation bibliography, and an aggregation of both titles were adapted to measure the performance of clustering. Each feature was combined with three hierarchical clustering methods, within group average linkage, complete linkage, and Ward's method in the clustering experiment. The best practice case of this experiment was clustering document with features from both titles by within-groups average method.

Location-based Frequency Interference Management Scheme Using Fingerprinting Localization Algorithms (Fingerprinting 무선측위 알고리즘을 이용한 영역 기반의 주파수 간섭 관리 기법)

  • Hong, Aeran;Kim, Kwangyul;Yang, Mochan;Oh, Sunae;Jung, Hongkyu;Shin, Yoan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.901-908
    • /
    • 2012
  • In an intelligent automated manufacturing environment, an administrator may use M2M (Machine-to-Machine) communication to recognize machine movement and the environment, as well as to respond to any potential dangers. However, commonly used wireless protocols for this purpose such WLAN (Wireless Local Area Network), ZigBee, and Bluetooth use the same ISM (Industrial Science Medical) band, and this may cause frequency interference among different devices. Moreover, an administrator is frequently exposed to dangerous conditions as a result of being surrounded by densely distributed moving machines. To address this issue, we propose in this paper to employ a location-based frequency interference management using fingerprinting scheme in industrial environments and its advanced localization schemes based on k-NN (Nearest Neighbor) algorithms. Simulation results indicate that the proposed schemes reduce distance error, frequency interference, and any potential danger may be responded immediately by continuous tracing of the locations.

An Anomaly Detection based on Probabilistic Behavior of Hidden Markov Models (은닉마코프모델을 이용한 이상징후 탐지 기법)

  • Lee, Eun-Young;Han, Chan-Kyu;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1139-1142
    • /
    • 2008
  • 인터넷의 이용이 증가함에 따라 네트워크를 통한 다양한 공격 역시 증가 추세에 있다. 따라서 네트워크 이상징후를 사전에 탐지하고 상황에 따라 유연하게 대처할 수 있도록 하기 위한 연구가 절실하다. 본 연구는 은닉마코프모델을 이용해 트래픽에서 이상징후를 탐지하는 기법을 제안한다. 제안하는 기법은 시계열 예측 기법을 이용해 트래픽에서 징후를 추출한다. 징후추출 과정의 결과를 은닉마코프모델을 활용한 징후판단과정을 통해 네트워크 이상징후인지를 판단하고 결정한다. 일련의 과정을 perl로 구현하고, 실제 공격이 포함된 트래픽을 사용하여 검증한다. 하지만 결과가 확연히 증명되지는 않는데, 이는 학습과정의 부족과 실제에 가까운 트래픽의 사용으로 인해 나타나는 현상으로 연구의 본질을 흐리지는 않는다고 판단된다. 오히려 실제 상황을 가정했을 때 접근이나 적용을 판단함에 관리자의 의견을 반영할 수 있으므로 공격의 탐지와 판단에 유연성을 증대시킬 수 있다. 본 연구는 실시간 네트워크의 상황 파악이나 네트워크에서의 신종 공격 탐지 및 분류에 응용가능할 것으로 기대된다.