• Title/Summary/Keyword: 전략적 운영 시스템

Search Result 643, Processing Time 0.034 seconds

A Study of the Establishment of Small and Medium Sized Architectural Design Firm BIM Environment based on Virtual Desktop Infrastructure (가상 데스크톱 인프라(VDI) 기술을 활용한 중소규모 설계사의 BIM 사용자 별 데스크탑 자원 할당 전략에 관한 연구)

  • Lee, Kyuhyup;Shin, Joonghwan;Kwon, Soonwook;Park, Jaewoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.5
    • /
    • pp.78-88
    • /
    • 2016
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. In design phase, especially, collaboration based on BIM system has being a key factor for successful next generation building project. Through the analysis of current research trend about IT technologies, virtualization and BIM service, data exchange such as drawing, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. In various industrial fields, cloud computing technology is utilized as a promising solution which can reduce time and cost of hardware infrastructure. Among the cloud computing technology, VDI is receiving a great deal of attention from it market as an essential part cloud computing. VDI enables to host multiple individual virtual machines by using hypervisor. It has an advantage to easy main device management. Therefore, this study implements a step-by-step user's DaaS by analyzing the desktop resource data of the workers from Pre-design phase to Schematic design, Design develop and Construction design phase. It also develops BIM environment based on test of BIM modeler and designers in architectural design firm. The goal of the study is to enable the cloud computing BIM server. It provides cost saving, high-performance quality of working environment and cooperation's convenience and high security when doing BIM work in small and medium sized architectural design firm.

Development of Optimal Chlorination Model and Parameter Studies (최적 염소 소독 모형의 개발 및 파라미터 연구)

  • Kim, Joonhyun;Ahn, Sooyoung;Park, Minwoo
    • Journal of Environmental Impact Assessment
    • /
    • v.29 no.6
    • /
    • pp.403-413
    • /
    • 2020
  • A mathematical model comprised with eight simultaneous quasi-linear partial differential equations was suggested to provide optimal chlorination strategy. Upstream weighted finite element method was employed to construct multidimensional numerical code. The code was verified against measured concentrations in three type of reactors. Boundary conditions and reaction rate were calibrated for the sixteen cases of experimental results to regenerate the measured values. Eight reaction rate coefficients were estimated from the modeling result. The reaction rate coefficients were expressed in terms of pH and temperature. Automatic optimal algorithm was invented to estimate the reaction rate coefficients by minimizing the sum of squares of the numerical errors and combined with the model. In order to minimize the concentration of chlorine and pollutants at the final usage sites, a real-time predictive control system is imperative which can predict the water quality variables from the chlorine disinfection process at the water purification plant to the customer by means of a model and operate the disinfection process according to the influent water quality. This model can be used to build such a system in water treatment plants.

A Study on the Current State of the Library's AI Service and the Service Provision Plan (도서관의 인공지능(AI) 서비스 현황 및 서비스 제공 방안에 관한 연구)

  • Kwak, Woojung;Noh, Younghee
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.1
    • /
    • pp.155-178
    • /
    • 2021
  • In the era of the 4th industrial revolution, public libraries need a strategy for promoting intelligent library services in order to actively respond to changes in the external environment such as artificial intelligence. Therefore, in this study, based on the concept of artificial intelligence and analysis of domestic and foreign artificial intelligence related trends, policies, and cases, we proposed the future direction of introduction and development of artificial intelligence services in the library. Currently, the library operates a reference information service that automatically provides answers through the introduction of artificial intelligence technologies such as deep learning and natural language processing, and develops a big data-based AI book recommendation and automatic book inspection system to increase business utilization and provide customized services for users. Has been provided. In the field of companies and industries, regardless of domestic and overseas, we are developing and servicing technologies based on autonomous driving using artificial intelligence, personal customization, etc., and providing optimal results by self-learning information using deep learning. It is developed in the form of an equation. Accordingly, in the future, libraries will utilize artificial intelligence to recommend personalized books based on the user's usage records, recommend reading and culture programs, and introduce real-time delivery services through transport methods such as autonomous drones and cars in the case of book delivery service. Service development should be promoted.

Forecasting the Busan Container Volume Using XGBoost Approach based on Machine Learning Model (기계 학습 모델을 통해 XGBoost 기법을 활용한 부산 컨테이너 물동량 예측)

  • Nguyen Thi Phuong Thanh;Gyu Sung Cho
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.39-45
    • /
    • 2024
  • Container volume is a very important factor in accurate evaluation of port performance, and accurate prediction of effective port development and operation strategies is essential. However, it is difficult to improve the accuracy of container volume prediction due to rapid changes in the marine industry. To solve this problem, it is necessary to analyze the impact on port performance using the Internet of Things (IoT) and apply it to improve the competitiveness and efficiency of Busan Port. Therefore, this study aims to develop a prediction model for predicting the future container volume of Busan Port, and through this, focuses on improving port productivity and making improved decision-making by port management agencies. In order to predict port container volume, this study introduced the Extreme Gradient Boosting (XGBoost) technique of a machine learning model. XGBoost stands out of its higher accuracy, faster learning and prediction than other algorithms, preventing overfitting, along with providing Feature Importance. Especially, XGBoost can be used directly for regression predictive modelling, which helps improve the accuracy of the volume prediction model presented in previous studies. Through this, this study can accurately and reliably predict container volume by the proposed method with a 4.3% MAPE (Mean absolute percentage error) value, highlighting its high forecasting accuracy. It is believed that the accuracy of Busan container volume can be increased through the methodology presented in this study.

The Trend of Aviation Terrorism in the 4th Industrial Revolution Period and the Development Direction for Domestic Counter Terrorism of Aviation (제4차 산업혁명 시대의 항공 테러리즘 양상 및 국내 항공테러 대응체계 발전방향)

  • Hwang, Ho-Won;Kim, Seung-Woo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.155-188
    • /
    • 2017
  • On the one hand, the 4th Industrial Revolution provides a positive opportunity to build a new civilization paradigm for mankind. However, on the other hand, due to the 4th Industrial Revolution, artificial intelligence such as 'Goggle Alpha Go' revolutionized and even the human ability was replaced with a 'Silicon Chip' as the opportunity to communicate decreases, the existence of human beings is weakened. And there is a growing concern that the number of violent crimes, such as psychopath, which hunts humans as games, will increase. Moreover, recent international terrorism is being developed in a form similar to 'Psychopathic Violent-Crime' that indiscriminately attacks innocent people. So, the probability that terrorist organizations abuse the positive effects provided by the Fourth Industrial Revolution as means of terrorism is increasing. Therefore, the paradigm of aviation terrorism is expected to change in a way that attacks airport facilities and users rather than aircraft. Because airport facilities are crowded, and psychopathic terrorists are easily accessible. From this point of view, our counter terrorism system of aviation has many weak points in various aspects such as: (1) limitations of counter-terrorism center (2) inefficient on-site command and control system (3) separated organization for aviation security consultation (4) dispersed information collection function in government (5) vulnerable to cyber attack (6) lack of international cooperation network for aviation terrorism. Consequently, it is necessary to improve the domestic counter terrorism system of aviation so as to preemptively respond to the international terrorism. This study propose the following measures to improve the aviation security system by (1) create 'Aviation Special Judicial Police' (2) revise the anti-terrorism law and aviation security law (3) Strengthening the ability respond to terrorism in cyberspace (4) building an international cooperation network for aviation terrorism.

  • PDF

An Investigation on Core Competencies of Data Curator (데이터 큐레이터의 핵심 직무 요건 고찰에 관한 연구)

  • Lee, You-Kyoung;Chung, EunKyung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.3
    • /
    • pp.129-150
    • /
    • 2015
  • As the digital technologies and internet have advanced, data have centered in the process of meaningful scientific ramifications and policy making in a wide variety of fields. Data curator in charge of managing data plays a significant role in terms of improving the effectiveness and efficiency of data management and re-uses. The purpose of this study is to identify the core competencies for data curator. For achieving the purpose of this study, two sets of data were collected. First, a total of 255 job descriptions were collected from the web sites including ARL, Digital Curation Exchange, Code4lib, ASIS&T JobLine for the period of 2011-2014. Second, in-depth interviews with five data curators from four diverse organizations were collected. The two sets of data were analyzed into seven categories identified from the related studies. Findings of this study showed that core competencies for data curator were identified into four categories, communication skills, data management techniques, knowledge and strategies for data management, and instructions and service provisions for users. The implications of this study can be considered as integrated and professional curriculum developments for data curator with core competencies.

The Relationship between Gymnasium Selection and Training Adherence of Security Martial Arts Trainees (경호무도 수련생의 도장선택과 수련지속의 관계)

  • Song, Gyu-Geun;Lee, Ki-Se;Min, Jae-Ki
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.107-128
    • /
    • 2011
  • The purpose of this study was to determine the relationship between gymnasium selection and training adherence of security martial arts trainees. To this aim, this study selected 8 gymnasiums in Gyounggi and Incheon province and sampled 220 people above the fourth grade in elementary school. Out of these, 14 cases were dropped due to insufficient answers or incomplete answers, and 206 qualified cases were finally adopted for this study. Data were analyzed using exploratory factor analysis, reliability analysis and frequency analysis, MANOVA, correlation analysis and multiple regression analysis with SPSS 18.0. The results of this study were as follows. First, there were significant differences in gymnasium selection factors(instructor background, training program, public relations) depending upon the trainee's sex. Second, there were significant differences in gymnasium selection factors(training program, main others, public relations) depending upon the trainee's school grade. Third, there were no significant differences in training adherence factors depending upon the trainee's sex and school grade. Fourth, there were positive correlations between instructor background, training program and public relations-factors among gymnasium selection and management program, external and social relations-factors among training adherence. Fifth, the partial sub-factors of gymnasium selection have influenced training adherence. Consequently, security martial arts managers and instructors need to establish marketing strategies suitable for sex and school grade to recruit new security martial arts trainees. It may be considered that security martial arts instructors should construct the differentiated management system for trainees and the specialized training program for lasting training of new or existing security martial arts trainees.

  • PDF

A Study on Development of Customized Education and Training Model Using Online Learning Platform (온라인학습플랫폼을 활용한 맞춤형 교육훈련 모델 수립방안에 관한 연구)

  • Rim, Kyung-hwa;Shin, Jung-min;Lee, Sookyoung
    • Journal of Practical Engineering Education
    • /
    • v.11 no.1
    • /
    • pp.75-86
    • /
    • 2019
  • Globally, the change in higher education is gradually moving toward a trend that seeks a change in innovative higher education through the revitalization of digital-based education. Accordingly, this study designed a customized education model based on e-learning that can be used in undergraduate education and development of lifelong vocational skills. The use of online learning platforms and the expansion of education are major factors that change the overall higher education system as the form and content of curriculum changes around the world. In order to establish a customized education model using online learning platform, this study analyzed major overseas advanced education cases and selected the basic direction of customized learning as personalized learning, competency based learning, and training for talents leading the 4th Industrial Revolution. Then, FGI was conducted for undergraduate and lifelong vocational ability development experts. As a result, a customized education model using an online learning platform was derived from a degree-type model available in undergraduate education and a non-degree-type model available in the field of lifelong vocational ability development, and each operation strategy was suggested.

The Market Segmentation of Coffee Shops and the Difference Analysis of Consumer Behavior: A Case based on Caffe Bene (커피전문점의 시장세분화와 소비자행동 차이 분석 : 카페베네 사례를 중심으로)

  • Yu, Jong-Pil;Yoon, Nam-Soo
    • Journal of Distribution Science
    • /
    • v.9 no.4
    • /
    • pp.5-13
    • /
    • 2011
  • This study provides analysis of the effectiveness of domestic marketing strategies of the Korean coffee shop "Caffe Bene". It bases its evaluation on statistical outputs of 'choice attributes,' "market segmentation," demographic characteristics," and "satisfaction differences." The results are summarized in four points. First, five choice attributes were extracted from factor analysis: price, atmosphere, comfort, taste, and location; these are related to coffee shop selection behavior. Based on these five factors, cluster analysis was conducted, with statistical results classifying customers into three major groups: atmosphere oriented; comfort oriented; and taste oriented. Second, discriminant analysis tested cluster analysis and showed two discriminant functions: location and atmosphere. Third, cross-tabulation analysis based on demographic characteristics showed distinctive demographic characteristics within the three groups. Atmosphere oriented group, early-20s, as women of all ages was found to be 'walking down the street 'and 'through acquaintances' in many cases, as the cognitive path, and mostly found the store through 'outdoor advertising', and 'introduction'. Comfort oriented group was mainly women who are students in their early twenties or professionals, and appeared as a group to be very loyal because of high recommendation to other customers compared to other groups. Taste oriented group, unlike the other group, was mainly late-20s' college graduates, and was confirmed, as low loyalty, with lower recommendation activity. Fourth, to analyze satisfaction differences, one-way ANOVA was conducted. It shows that groups which show high satisfaction in the five main factors also show high menu satisfaction and high overall satisfaction. This results show that segmented marketing strategies are necessary because customers are considering price, atmosphere, comfort, taste, location when they choose coffee shop and demographics show different attributes based on segmented groups. For example, atmosphere oriented group is satisfied with shop interior and comfort while dissatisfied with price because most of the customers in this group are early 20s and do not have great financial capability. Thus, price discounting marketing strategies based on individual situations through CRM system is critical. Comfort oriented group shows high satisfaction level about location and shop comfort. Also, in this group, there are many early 20s female customers, students, and self-employed people. This group customers show high word of mouth tendency, hence providing positive brand image to the customers would be important. In case of taste oriented group, while the scores of taste and location are high, word of mouth score is low. This group is mainly composed of educated and professional many late 20s customers, therefore, menu differentiation, increasing quality of coffee taste and price discrimination is critical to increase customers' satisfaction. However, it is hard to generalize the results of study to other coffee shop brand, because this study have researched only one domestic coffee shop, Caffe Bene. Thus if future study expand the scope of locations, brands, and occupations, the results of the study would provide more generalizable results. Finally, research of customer satisfactions of menu, trust, loyalty, and switching cost would be critical in the future study.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF