• Title/Summary/Keyword: 정보시스템 도입방법

Search Result 1,125, Processing Time 0.032 seconds

A study on the honeycomb entry and exit counting system for measuring the amount of movement of honeybees inside the beehive (벌통 내부 꿀벌 이동량 측정을 위한 벌집 입·출입 계수 시스템 연구)

  • Kim, Joon Ho;Seo, Hee;Han, Wook;Chung, Wonki
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.857-862
    • /
    • 2021
  • Recently, rapid climate change has had a significant impact on the bee ecosystem. The decrease in the number of bees and the change in the flowering period have a huge impact on the harvesting of beekeepers. Accordingly, attention is focused on smart beekeeping, which introduces IoT technology to beekeeping. According to the characteristics of beekeeping, it is impossible to continuously observe the beehive in the hive with the naked eye, and the condition of the hive is mostly dependent on knowledge from experience. Although a system that can measure partly through sensors such as temperature/humidity change inside the hive and measurement of the amount of CO2 is applied, there is no research on measuring the movement path and amount of movement of bees inside the beehive. Part of the migration of honeybees inside the hive can provide basic information to predict the most important cleavage time in beekeeping. In this study, we propose a device that detects the movement path of bees and measures and records data entering and exiting the hive in real time. The device proposed in this study was developed according to the honeycomb standard of the existing beehive so that beekeeping farms could use it. The development method used a photodetector that can detect the movement of bees to configure 16 movement paths and to detect the movement of bees in real time. If the measured honeybee movement status is utilized, the problem of directly observing the colony with the naked eye in order not to miss the swarming time can be solved.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

Elicitation of Collective Intelligence by Fuzzy Relational Methodology (퍼지관계 이론에 의한 집단지성의 도출)

  • Joo, Young-Do
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.17-35
    • /
    • 2011
  • The collective intelligence is a common-based production by the collaboration and competition of many peer individuals. In other words, it is the aggregation of individual intelligence to lead the wisdom of crowd. Recently, the utilization of the collective intelligence has become one of the emerging research areas, since it has been adopted as an important principle of web 2.0 to aim openness, sharing and participation. This paper introduces an approach to seek the collective intelligence by cognition of the relation and interaction among individual participants. It describes a methodology well-suited to evaluate individual intelligence in information retrieval and classification as an application field. The research investigates how to derive and represent such cognitive intelligence from individuals through the application of fuzzy relational theory to personal construct theory and knowledge grid technique. Crucial to this research is to implement formally and process interpretatively the cognitive knowledge of participants who makes the mutual relation and social interaction. What is needed is a technique to analyze cognitive intelligence structure in the form of Hasse diagram, which is an instantiation of this perceptive intelligence of human beings. The search for the collective intelligence requires a theory of similarity to deal with underlying problems; clustering of social subgroups of individuals through identification of individual intelligence and commonality among intelligence and then elicitation of collective intelligence to aggregate the congruence or sharing of all the participants of the entire group. Unlike standard approaches to similarity based on statistical techniques, the method presented employs a theory of fuzzy relational products with the related computational procedures to cover issues of similarity and dissimilarity.

A study of Modeling and Simulation for Analyzing DDoS Attack Damage Scale and Defence Mechanism Expense (DDoS 공격 피해 규모 및 대응기법 비용분석을 위한 모델링 및 시뮬레이션 기술연구)

  • Kim, Ji-Yeon;Lee, Ju-Li;Park, Eun-Ji;Jang, Eun-Young;Kim, Hyung-Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.39-47
    • /
    • 2009
  • Recently, the threat of DDoS attacks is increasing and many companies are planned to deploy the DDoS defense solutions in their networks. The DDoS attack usually transmits heavy traffic data to networks or servers and they cannot handle the normal service requests because of running out of resources. Since it is very hard to prevent the DDoS attack beforehand, the strategic plan is very important. In this work, we have conducted modeling and simulation of the DDoS attack by changing the number of servers and estimated the duration that services are available. In this work, the modeling and simulation is conducted using OPNET Modeler. The simulation result can be used as a parameter of trade-off analysis of DDoS defense cost and the service's value. In addition, we have presented a way of estimating the cost effectiveness in deployment of the DDoS defense system.

A New Bias Scheduling Method for Improving Both Classification Performance and Precision on the Classification and Regression Problems (분류 및 회귀문제에서의 분류 성능과 정확도를 동시에 향상시키기 위한 새로운 바이어스 스케줄링 방법)

  • Kim Eun-Mi;Park Seong-Mi;Kim Kwang-Hee;Lee Bae-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.11
    • /
    • pp.1021-1028
    • /
    • 2005
  • The general solution for classification and regression problems can be found by matching and modifying matrices with the information in real world and then these matrices are teaming in neural networks. This paper treats primary space as a real world, and dual space that Primary space matches matrices using kernel. In practical study, there are two kinds of problems, complete system which can get an answer using inverse matrix and ill-posed system or singular system which cannot get an answer directly from inverse of the given matrix. Further more the problems are often given by the latter condition; therefore, it is necessary to find regularization parameter to change ill-posed or singular problems into complete system. This paper compares each performance under both classification and regression problems among GCV, L-Curve, which are well known for getting regularization parameter, and kernel methods. Both GCV and L-Curve have excellent performance to get regularization parameters, and the performances are similar although they show little bit different results from the different condition of problems. However, these methods are two-step solution because both have to calculate the regularization parameters to solve given problems, and then those problems can be applied to other solving methods. Compared with UV and L-Curve, kernel methods are one-step solution which is simultaneously teaming a regularization parameter within the teaming process of pattern weights. This paper also suggests dynamic momentum which is leaning under the limited proportional condition between learning epoch and the performance of given problems to increase performance and precision for regularization. Finally, this paper shows the results that suggested solution can get better or equivalent results compared with GCV and L-Curve through the experiments using Iris data which are used to consider standard data in classification, Gaussian data which are typical data for singular system, and Shaw data which is an one-dimension image restoration problems.

An Online Review Mining Approach to a Recommendation System (고객 온라인 구매후기를 활용한 추천시스템 개발 및 적용)

  • Cho, Seung-Yean;Choi, Jee-Eun;Lee, Kyu-Hyun;Kim, Hee-Woong
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.95-111
    • /
    • 2015
  • The recommendation system automatically provides the predicted items which are expected to be purchased by analyzing the previous customer behaviors. This recommendation system has been applied to many e-commerce businesses, and it is generating positive effects on user convenience as well as the company's revenue. However, there are several limitations of the existing recommendation systems. They do not reflect specific criteria for evaluating products or the factors that affect customer buying decisions. Thus, our research proposes a collaborative recommendation model algorithm that utilizes each customer's online product reviews. This study deploys topic modeling method for customer opinion mining. Also, it adopts a kernel-based machine learning concept by selecting kernels explaining individual similarities in accordance with customers' purchase history and online reviews. Our study further applies a multiple kernel learning algorithm to integrate the kernelsinto a combined model for predicting the product ratings, and it verifies its validity with a data set (including purchased item, product rating, and online review) of BestBuy, an online consumer electronics store. This study theoretically implicates by suggesting a new method for the online recommendation system, i.e., a collaborative recommendation method using topic modeling and kernel-based learning.

Edge based Interactive Segmentation (경계선 기반의 대화형 영상분할 시스템)

  • Yun, Hyun Joo;Lee, Sang Wook
    • Journal of the Korea Computer Graphics Society
    • /
    • v.8 no.2
    • /
    • pp.15-22
    • /
    • 2002
  • Image segmentation methods partition an image into meaningful regions. For image composition and analysis, it is desirable for the partitioned regions to represent meaningful objects in terms of human perception and manipulation. Despite the recent progress in image understanding, however, most of the segmentation methods mainly employ low-level image features and it is still highly challenging to automatically segment an image based on high-level meaning suitable for human interpretation. The concept of HCI (Human Computer Interaction) can be applied to operator-assisted image segmentation in a manner that a human operator provides guidance to automatic image processing by interactively supplying critical information about object boundaries. Intelligent Scissors and Snakes have demonstrated the effectiveness of human-assisted segmentation [2] [1]. This paper presents a method for interactive image segmentation for more efficient and effective detection and tracking of object boundaries. The presented method is partly based on the concept of Intelligent Scissors, but employs the well-established Canny edge detector for stable edge detection. It also uses "sewing method" for including weak edges in object boundaries, and 5-direction search to promote more efficient and stable linking of neighboring edges than the previous methods.

  • PDF

Development of GIS based Water Quality Simulation System for Han River and Kyeonggi Bay Area (한강과 경기만 지역 GIS 기반 통합수질모의 시스템 개발)

  • Lee, Chol-Young;Kim, Kye-Hyun
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.4
    • /
    • pp.77-88
    • /
    • 2008
  • There has been growing demands to manage the water quality of west coastal region due to the large scale urbanization along the coastal zone, the possibility of application of TMDL(Total Maximum Daily Loadings) to Han river, and the natural disaster such as oil spill incident in Taean, Chungnam. However, no system has been developed for such purposes. In this background, the demand of GIS based effective water quality management has been increased to monitor water quality environment and propose best management alternatives for Han river and Kyeonggi bay. This study mainly focused on the development of integrated water quality management system for Han river bas in and its estuary are a connected to Kyeonggi bay to support integrated water quality management and its plan. Integration was made based on GIS by spatial linking between water quality attributes and location information. A GIS DB was built to estimate the amount of generated and discharged water pollutants according to TMDL technical guide and it included input data to use two different water quality models--W ASP7 for Han river and EFDC for coastal area--to forecast water quality and to suggest BMP(Best management Practices). The results of BOD, TN, and TP from WASP7 were used as the input to run EFDC. Based on the study results, some critical areas which have relatively higher pollutant loadings were identified, and it was also identified that the locations discharging water pollutant loadings to river and seasonal factor affected water quality. And the relationship of water quality between river and its estuary area was quantitatively verified. The results showed that GIS based integrated system could be used as a tool for estimating status-quo of water quality and proposing economically effective BMPs to mitigate water pollution. Further studies need to be made for improving system's capabilities such as adding decision making function as well as cost-benefit analysis, etc. Also, the concrete methodology for water quality management using the system need to be developed.

  • PDF

A Study of the Major Courses Operation on National Competence Standards(NCS) at Department of Library and Information Science: Focusing on Educational Experience of Instructor (문헌정보학 전공에서의 국가직무능력표준(NCS)을 활용한 교과목 운영에 관한 연구 - 교수자의 교육경험을 중심으로 -)

  • Kwon, Sun-Young;Cha, Sung-Jong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.3
    • /
    • pp.129-149
    • /
    • 2016
  • The purpose of this study is to examine in depth the personal experience of Instructor during National Competence Standards (NCS) Curriculum at Department of Library and Information Science. We conducted in depth interview (FGI) with participants who had recently experienced and data analysis was undertaken. We hope this study that an application of NCS would be activated fully in Library, educational institutes and qualifying examination institutes and that diverse feedbacks from related parties would makes leading to a better updated version of NCS development. As a result, First, The instructor had generally familiar with the background and purpose of the NCS. and they issued the inadequacies of job elements, non-reflection of the opinion on field education, the problems of classification of NCS. second, In the experience of NCS curriculum operating, There were the paperwork burden, Problems of methods of evaluation, evaluation period discrimination, the need to well communication with students. Third, In the problems on the NCS Curriculum operating, we found that there were The need on the proper Class size/hour, additional education, re-evaluation, Support system for NCS Curriculum operation, tools for practice, discrimination between relative evaluation and NCS evaluation, Enhancement for Competence/Standards. Fourth, On The ways of improving for NCS curriculum, We found that There were Class size, Support tools for practice, The improvement Competence/elements/standards based on LIS characteristic. The result of this study may contribute for improving the overall environment Based upon FGI analysis, several new directions for NCS education in the filed LIS curriculum are suggested.

Derivation of Building Fire Safety Assessment Factors for Generating 3D Safety Status Map (3D 안전상태지도 제작을 위한 건물 화재안전 평가항목 도출)

  • Youn, Junhee;Kim, Taehoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.40-47
    • /
    • 2020
  • Various technologies, systems, and legal systems are applied to prevent and quickly respond to fire disaster; nevertheless, the damages to life and property caused by fires are not reduced every year. For managing fire disaster, generating spatial information-based safety status map and procuring suitability of attribute information for each position information are essential. The safety status map is generated by deriving the fire safety status assessment factors, indexing, and locating the surveying results through various methods. In this paper, we deal with derivation of building fire safety assessment factors for 3D safety status map. At first, we survey the foreign and domestic fire assessment model cases and its factors, and analyze the applicability of Korean 3D fire safety status map. Next, assessment factors for fire safety assessment model are derived. Assessment factors are derived and categorized by their information collecting activity; factors that can be accessed through basic building information and factors that can be accessed through field survey. As a derivation result, 14 assessment factors were derived over five categories(Industry Risk, Structural Risk, Fire Fighting Facility, Fire Dangerousness, Fire Response Status).