• Title/Summary/Keyword: 정보기술관리자

Search Result 1,998, Processing Time 0.035 seconds

A Study on the Hull-dimension of 89 ton class Stow-net Vessel with Stern-fishing (89톤급 선미식 안강망어선의 선형치수에 관한 연구)

  • Park, Je-Ung;Lee, Hyeon-Sang
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.33 no.3
    • /
    • pp.159-165
    • /
    • 1997
  • This paper presents the optimum dimension of 89 ton class stow-net vessel with stern-fishing. The model of basic design is developed by using the optimization techniques referring to objective function and numerous constraints as follows; speed, fishing quantity, fishing days, catch per unit effort(CPUE), and weight/ratio of main dimensions, etc. Thus, the basic design of stow-net fishing vessel is built up by using the optimization of the design variables called the economic optimization criteria, and the objective function represents the criterion which is cost benefit ratio(CBR). The main conclusions are as follows. 1. S/W for decision of optimum hull size is developed in 89 ton class stow-net fishing vessel which is constructed with optimization of the design variables called the economic optimization criteria. 2. For optimum ship dimensions in 89 ton class stow-net fishing vessel, the hull dimensions can be obtained in the range of L= 27.3m, B = 6.6m, D = 2.80m, Cb = 0.695, T/D = 0.80, $\Delta$(displacement)=281.7ton with 10 knots.

  • PDF

Verification of the Theory of Planned Behavior that Predicts the Intention for Gambling Abstinence of Problem Gamblers (문제도박자의 단도박 의도를 예측하는 계획된 행동 이론 검증)

  • Park, Keun-Woo;Seo, Mi-kyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.232-238
    • /
    • 2019
  • The purpose of this study is to verify the feasibility of a model, based on the Theory of Planned Behavior (TPB), that predicts the intention of a problem gambler to abstain from gambling. In order to investigate attitudes toward gambling abstinence, subjective norms, perceived behavior control, and intentions to abstain from gambling, we surveyed 100 problem gamblers who used community-based service centers. Furthermore, we analyzed by the structural equation model whether attitude toward gambling abstinence, subjective norms, and perceived behavior control can influence the intention to abstain from gambling. The analysis of the study model revealed that the most powerful predictor of the gambling abstinence intention is perceived behavior control, followed by a positive attitude toward gambling abstinence. In contrast, subjective norms did not show a significant influence on intentions for gambling abstinence. Based on these results, we propose cognitive-behavioral interventions to improve attitudes and self-efficacy toward gambling abstinence in order to help problem gamblers recover. In other words, continuous support and coping-skills training are needed to reinforce the belief that people can recover from a gambling problem, and information and education on problem gambling to improve positive attitudes can also be helpful. Therefore, it is possible to consider not only the treatment of gambling problems, but also to provide preventive interventions centering on the addiction management institution.

Cache-Answerability of XML Queries in Regular Path Expressions on the Web (웹에서 정규경로 표현식을 포함한 XML 질의의 캐쉬를 이용한 처리)

  • 박정기;강현철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.58-60
    • /
    • 2004
  • 웹의 확산과 더불어 웹 페이지 검색의 성능 즉, 빠른 응답시간과 확장성(scalability)은 각 웹 사이트의 절대적 평가 기준이 되었다. 웹 옹용은 일반적으로 불특정 다수를 대상으로 하기 때문에 확장성 또한 주요 성능의 척도가 된다. 이와 같은 웹 사이트 성능을 담보하기 위한 대표적 요소기술이 웹 캐슁이다. 본 논문은 웹 상에서 XML 데이터베이스 기반의 웹 응용(XML database-backed web application)을 위한 응용서버의 XML 캐쉬를 이용하여 주어진 XML 질의를 변환, 처리하는 기법과 구현에 관한 것으로 XPath의 경로표현식 중 가장 중요한 세 가지 기능인 조건을 명시하는 필터 연산자, 부모-자식 관계를 나타내는 경로 연산자(/), 그리고 조상-후손 관계를 나타내는 경로 연산자(//)를 연구 범위로 하였다. [2]에서는 조상-후손 관계를 나타내는 경로 연산자(//)가 없는 경우에 경로표현식으로 주어진 XML 질의를 캐쉬를 이용하여 변환, 처리하는 알고리즘을 제시하였는데 본 논문에서는 [2]의 알고리즘을 확장하여 경로 연간자(//)가 지원되도록 하였다. 조상-후손 경로 연산자(//)로는 정규경로 표현식(regular path expression)을 나타낼 수 있는데 이는 스키마가 불확실한 반구조적 데이터인 XML 데이터에 대한 질의 표현에 유용하다. 제시된 알고리즘에서는 DTD를 이용하여 경로 정보를 얻어 처리함으로써 주어진 질의를 캐쉬와 하부 XML 소스에 대한 질의로 변환하였다. 이 알고리즘을 바탕으로 관계 DBMS를 이용하여 구현된 시스템으로 실제 웹 상에서 성능 실험을 수행하였다. 성능 실험 결과 정규 경로 표현식을 포함하는 XML 질의에 대해서도 웹에서 캐쉬를 이용한 처리가 효율적임을 확인하였다.키는데 목적이 있다.RED에 비해 향상된 성능을 보여주었다.웍스 네트워크상의 다양한 디바이스들간의 네트워크 다양화와 분산화 기능을 얻을 수 있었고, 기존의 고가의 해외 솔루션인 Echelon사의 LonMaker 소프트웨어를 사용하지 않고도 국내의 순수 솔루션인 리눅스 기반의 LonWare 3.0 다중 바인딩 기능을 통해 저 비용으로 홈 네트워크 구성 관리 서버 시스템 개발에 대한 비용을 줄일 수 있다. 기대된다.e 함량이 대체로 높게 나타났다. 점미가 수가용성분에서 goucose대비 용출함량이 고르게 나타나는 경향을 보였고 흑미는 알칼리가용분에서 glucose가 상당량(0.68%) 포함되고 있음을 보여주었고 arabinose(0.68%), xylose(0.05%)도 다른 종류에 비해서 다량 함유한 것으로 나타났다. 흑미는 총식이섬유 함량이 높고 pectic substances, hemicellulose, uronic acid 함량이 높아서 콜레스테롤 저하 등의 효과가 기대되며 고섬유식품으로서 조리 특성 연구가 필요한 것으로 사료된다.리하였다. 얻어진 소견(所見)은 다음과 같았다. 1. 모년령(母年齡), 임신회수(姙娠回數), 임신기간(姙娠其間), 출산시체중등(出産時體重等)의 제요인(諸要因)은 주산기사망(周産基死亡)에 대(對)하여 통계적(統計的)으로 유의(有意)한 영향을 미치고 있어 $25{\sim}29$세(歲)의 연령군에서, 2번째 임신과 2번째의 출산에서 그리고 만삭의 임신 기간에, 출산시체중(出産時體重) $3.50{\sim}3.99kg$사이의 아이에서 그 주산기사망률(周産基死亡率)이 각각 가장 낮았다. 2. 사산(死産)과 초생아사망(初生兒死亡)을 구분(區分)하여 고려해 볼때 사산(死産)은 모성(母性)의 임신력(

  • PDF

A Study on the User Acceptance Model of Artificial Intelligence Music Based on UTAUT

  • Zhang, Weiwei
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.25-33
    • /
    • 2020
  • In this paper, the purpose is to verify the impact of performance expectations, effort expectations, social impact, individual innovation and perceived value on the intent of use and the behavior of use. Used Unified Theory of Acceptance and Use of Technology (UTAUT) to verify the applicability of this model in China, and established the research model by adding two new variables to UTAUT according to the situation of the Chinese market. To achieve this goal, 345 questionnaires were collected for experienced music creators using artificial intelligence nuggets in China by means of Internet research. The collected data were analyzed through frequency analysis, factor analysis, reliability analysis, and structural equation analysis through SPSS V. 22.0 and AMOS V 22.0. The verification of the hypotheses presented in the research model identified the decisive influence factors on the use of artificial intelligence music acceptance by Chinese users. The study is innovative in that it attempts to verify the applicability of UTAUT in the Chinese context. In the construction of the user acceptance model of AI music, three influencing factors will have an effect on users' intentions, and according to the degree of effect, from largest to smallest, they are respectively Perceived Innovativeness, Performance Expectancy and Effort Expectancy. This paper will also provide some management advices, i.e. improving the utility and usability of AI music, encouraging users with individual innovativeness, developing competitive and attractive pricing policies, increasing publicity, and prioritizing word-of-mouth advertising.

A Study on the Measurement Method of Cold Chain Service Quality Using Smart Contract of Blockchain (블록체인의 스마트계약을 이용한 콜드체인 서비스 품질 측정 방안에 대한 연구)

  • Kim, ChangHyun;Shin, KwangSup
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.3
    • /
    • pp.1-18
    • /
    • 2019
  • Due to the great advances in e-Marketplace and changes in type of items purchased from the online market, it has been dramatically increased the demand of the storage and transportation under the special conditions such as restricted temperature. Especially, the cold chain needs the way to transparently measure and monitor the entire network in realtime because it has a very complicated structure and requires totally different criteria at the every different steps and items. In this research, it has been presented the performance evaluation metrics to make contract using service level agreement (SLA), the way to apply the smart contract based on blockchain, the structure of blocks, service platform and application in order to build cold chain which can prevent the risk factors by measuring and sharing information in realtime using block chain technology. In addition, we have proposed the way to store the measured performance and reputation of each player in the block using smart contract based on SLA. With the presented framework, all players including service providers as well as users can secure the information for making the rational decisions. When the service platform is actually built and operated, it seems possible to secure the information in transparently and realtime. Also, it is possible to prevent the risk factors or prepare the preemptive plans to react on them.

Key Exchange Protocols for Domestic Broadband Satellite Access Network (광대역 위성 엑세스 방을 위한 키 교환 프로토콜 제안)

  • 오흥룡;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.13-25
    • /
    • 2004
  • The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the guideline of security functions in BSAN(Broadband Satellite Access Network), and analyze the specification of the security primitives and the hey exchange Protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(fretwork Control Centre). In addition, we propose the security specification for a domestic broad satellite network based on the analysis on the analysis profile of ETSI(European Telecommunications Standards Institute) standards. The key exchange protocols proposed in ETSI standard are vulnerable to man-in-the-middle attack and they don't provide key confirmation. To overcome this shortcoming, we propose the 4 types of the key exchange protocols which have the resistant to man-in-the-middle-attack, key freshness, and key confirmation, These proposed protocols can be used as a key exchange protocol between RCST and NCC in domestic BSAN. These proposed protocols are based on DH key exchange protocol, MTI(Matsumoto, Takashima, Imai) key exchange protocol, and ECDH(Elliptic Curve Diffie-Hellman).

Need Assessment of Online Dementia Family Caregiver Education Program (치매환자 가족의 온라인 교육프로그램 요구도 조사)

  • Park, Myonghwa;Go, Younghye;Lee, Song Ja;Kim, Seon Hwa;Kim, Jinha;Lee, Dong Young
    • Journal of Digital Convergence
    • /
    • v.15 no.9
    • /
    • pp.301-309
    • /
    • 2017
  • The purpose of this study was to explore family caregiver's need for online education for dementia caregiving. Participants in this study were 220 family caregivers from district dementia centers in Seoul. Family caregiver's usability and needs of online education program were assessed using self-administered questionnaires. Descriptive statistics and t-test comparisons were conducted. About 50% of family caregivers answered they could use and have intention to use online education. The results showed that there were the highest demand for the video lectures which give information about dementia and case video about caregiving skills. There were differences in needs of online program according to the gender and age. The use of online program offers users the opportunity to participate support program at their own time and pace. In order to maximize the effects of online support programs, it is important to establish the strategies of the customized programs considering the characteristics of the caregivers.

Development of Stand-Alone Risk Assessment Software for Optimized Maintenance Planning of Power Plant Facilities (발전설비 최적 정비를 위한 독립형 위험도 평가 소프트웨어 개발)

  • Choi, Woo Sung;Song, Gee Wook;Kim, Bum Shin;Chang, Sung Ho;Lee, Sang Min
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.39 no.11
    • /
    • pp.1169-1174
    • /
    • 2015
  • Risk-Risk-based inspection (RBI) has been developed in order to identify risky equipments that can cause major accidents or damages in large-scale plants. This assessment evaluates the equipment's risk, categorizes their priorities based on risk level, and then determines the urgency of their maintenance or allocates maintenance resources. An earlier version of the risk-based assessment software is already installed within the equipment management system; however, the assessment is based on examination by an inspector, and the results can be influenced by his subjective judgment, rather than assessment being based on failure probability. Moreover, the system is housed within a server, which limits the inspector's work space and time, and such a system can be used only on site. In this paper, the development of independent risk-based assessment software is introduced; this software calculates the failure probability by an analytical method, and analyzes the field inspection results, as well as inspection effectiveness. It can also operate on site, since it can be installed on an independent platform, and has the ability to generate an I/O function for the field inspection results regarding the period for an optimum maintenance cycle. This program will provide useful information not only to the field users who are participating in maintenance, but also to the engineers who need to decide whether to extend the lifecycle of the power machinery or replace only specific components.

A Study on Image Copyright Archive Model for Museums (미술관 이미지저작권 아카이브 모델 연구)

  • Nam, Hyun Woo;Jeong, Seong In
    • Korea Science and Art Forum
    • /
    • v.23
    • /
    • pp.111-122
    • /
    • 2016
  • The purpose of this multi-disciplinary convergent study is to establish Image Copyright Archive Model for Museums to protect image copyright and vitalize the use of images out of necessity of research and development on copyright services over the life cycle of art contents created by the museums and out of the necessity to vitalize distribution market of image copyright contents in creative industry and to formulate management system of copyright services. This study made various suggestions for enhancement of transparency and efficiency of art contents ecosystem through vitalization of use and recycling of image copyright materials by proposing standard system for calculation, distribution, settlement and monitoring of copyright royalty of 1,000 domestic museums, galleries and exhibit halls. First, this study proposed contents and structure design of image copyright archive model and, by proposing art contents distribution service platform for prototype simulation, execution simulation and model operation simulation, established art contents copyright royalty process model. As billing system and technological development for image contents are still in incipient stage, this study used the existing contents billing framework as basic model for the development of billing technology for distribution of museum collections and artworks and automatic division and calculation engine for copyright royalty. Ultimately, study suggested image copyright archive model which can be used by artists, curators and distributors. In business strategy, study suggested niche market penetration of museum image copyright archive model. In sales expansion strategy, study established a business model in which effective process of image transaction can be conducted in the form of B2B, B2G, B2C and C2B through flexible connection of museum archive system and controllable management of image copyright materials can be possible. This study is expected to minimize disputes between copyright holder of artwork images and their owners and enhance manageability of copyrighted artworks through prevention of such disputes and provision of information on distribution and utilization of art contents (of collections and new creations) owned by the museums. In addition, by providing a guideline for archives of collections of museums and new creations, this study is expected to increase registration of image copyright and to make various convergent businesses possible such as billing, division and settlement of copyright royalty for image copyright distribution service.

Laying the Siting of High-Level Radioactive Waste in Public Opinion (고준위 방폐장 입지 선정의 공론화 기초 연구)

  • Lee, Soo-Jang
    • Journal of Environmental Policy
    • /
    • v.7 no.4
    • /
    • pp.105-134
    • /
    • 2008
  • Local opposition and protest constitute single greatest hurdle to the siting of locally unwanted land uses(LULUs), especially siting of high-level radioactive disposal not only throughout Korea but also throughout the industrialized world. It can be attributed mainly to the NIMBYism, equity problem, and lack of participation. These problems are arisen from rational planning process which emphasizes instrumental rationality. But planning is a value-laden political activity, in which substantive rationality is central. To achieve this goals, we need a sound planning process for siting LULUs, which should improve the ability of citizens to influence the decisions that affects them. By a sound planning process, we mean one that is open to citizen input and contains accurate and complete information. In other word, the public is also part of the goal setting process and, as the information and analyses developed by the planners are evaluated by the public, strategies for solutions can be developed through consensus-building. This method is called as a co-operative siting process, and must be structured in order to arrive at publicly acceptable decisions. The followings are decided by consensus-building method. 1. Negotiation will be held? 2. What is the benefits and risks of negotiation? 3. What are solutions when collisions between national interests and local ones come into? 4. What are the agendas? 5. What is the community' role in site selection? 6. Are there incentives to negotiation. 7. Who are the parties to the negotiation? 8. Who will represent the community? 9. What groundwork of negotiation is set up? 10. How do we assure that the community access to information and expert? 11. What happens if negotiation is failed? 12. Is it necessary to trust each other in negotiations? 13. Is a mediator needed in negotiations?

  • PDF