• Title/Summary/Keyword: 코드화

Search Result 1,692, Processing Time 0.026 seconds

Development of component modules and linkage methods for flood and inundation simulation in agricultural watersheds (농촌유역 홍수·침수 모의 요소별 모듈 및 연계 기술 개발)

  • Kim, Jihye;Lee, Sunghack;Cho, Jaepil;Jun, Sang-Min;Kwak, Jihye;Kang, Moon Seong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.329-329
    • /
    • 2021
  • 우리나라의 농촌유역은 일반적으로 상류의 농업용저수지와 하류의 배수장을 통해 홍수조절이 이루어지며, 각 농업수리구조물의 운영이 유역의 홍수 및 침수 발생에 큰 영향을 끼친다. 농촌유역의 홍수 대응 능력을 향상시키기 위해서는 농업수리구조물의 통합적 운영이 필요하나 현실에서 이를 시험 운영하기 위해서는 시간적·경제적으로 한계가 있다. 따라서 농촌유역 내 농업수리구조물을 연계한 통합 해석 시스템을 활용하여 다양한 구조물 운영 시나리오에 따른 홍수 위험을 예측하고 효율적인 대응 방안을 마련할 필요가 있다. 본 연구에서는 농업수리구조물을 연계한 홍수·침수 모의 시스템을 구축하기 위하여, 농촌유역에서 홍수·침수 모의를 위한 요소별 모듈을 구성하고, 각 모듈의 연계 기술을 개발하였다. 홍수·침수 해석 모듈은 농업용저수지 상류 유역에서부터 하류 하천 및 농경지까지 통합적으로 분석할 수 있도록 강우 분석 모듈, 강우-유출 모듈, 저수지 운영 모듈, 하천 수위 모듈, 농경지 배수 모듈의 5가지로 구성하였으며, 데이터베이스 모듈을 통해 기초자료를 저장하고 모듈 간의 입출력 과정을 처리하였다. 강우 분석, 강우-유출, 농경지 배수 모듈은 python 코드를 기반으로 자체적으로 구축하였으며, 기존의 모형 (FARD, HEC-HMS, GATE2018)들과 비교한 결과 거의 동일한 모의 결과를 나타냈다. 저수지 운영 모듈과 하천 수위 모듈은 각각 미 공병단의 HEC-5, HEC-RAS 모형을 CLI (Command Line Interface) 방식으로 외부 구동하도록 구성하였다. 전체 모듈 간의 연계에는 python 라이브러리인 Dask를 적용하여 대량의 데이터에 대한 병렬 처리 구조를 갖춤으로써 다양한 기상자료와 운영 시나리오에 따른 반복 작업을 효율적으로 수행하도록 구성하였다. 본 연구에서 개발한 홍수·침수 모의 요소별 모듈과 연계 기술을 기반으로, 농업수리구조물의 연계 운영을 통합적으로 모의함으로써 홍수 대비를 위한 효율적인 구조물 운영안을 도출할 수 있을 것으로 기대된다.

  • PDF

ChatGPT-based Software Requirements Engineering (ChatGPT 기반 소프트웨어 요구공학)

  • Jongmyung Choi
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.45-50
    • /
    • 2023
  • In software development, the elicitation and analysis of requirements is a crucial phase, and it involves considerable time and effort due to the involvement of various stakeholders. ChatGPT, having been trained on a diverse array of documents, is a large language model that possesses not only the ability to generate code and perform debugging but also the capability to be utilized in the domain of software analysis and design. This paper proposes a method of requirements engineering that leverages ChatGPT's capabilities for eliciting software requirements, analyzing them to align with system goals, and documenting them in the form of use cases. In software requirements engineering, it suggests that stakeholders, analysts, and ChatGPT should engage in a collaborative model. The process should involve using the outputs of ChatGPT as initial requirements, which are then reviewed and augmented by analysts and stakeholders. As ChatGPT's capability improves, it is anticipated that the accuracy of requirements elicitation and analysis will increase, leading to time and cost savings in the field of software requirements engineering.

Manufacturing and Characteristic Evaluation of Free space Optical Communication Devices in 5G Mobile Base Stations for Emergency Disaster Response (긴급재난 대응용 5G 이동 기지국을 위한 대기공간 광통신 장치의 제작과 특성평가)

  • Jin-Hyeon Chang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.131-138
    • /
    • 2023
  • In this paper, a free space optical communication device that can be used in a mobile base station of several km or less was fabricated and its characteristics were investigated. To overcome the loss due to atmospheric transmission, an optical fiber amplifier (EDFA) with an output of 23 dBm or more was used. In order to increase the focusing speed and miniaturization of the laser beam, an optical lens was manufactured, and a transmission lens was designed to have beam divergence within the range of 1.5 to 1.8 [mrad]. A PT module that controls PAN/TILT was fabricated in order to reduce pointing errors and effective automatic alignment between transceiver devices. In this study, Reed-Solomon (RS) code was used to maintain the transmission quality above a certain level. It was manufactured to be able to communicate at a wireless distance of 300m in a weather situation with visibility of 300m. For performance measurement, it was measured using BERT and eye pattern analyzer, and it was confirmed that BER can be maintained at 2.5Gbps.

A Study on the Crime Investigation of Anonymity-Driven Blockchain Forensics (익명 네트워크 기반 블록체인 범죄 수사방안 연구)

  • Han, Chae-Rim;Kim, Hak-Kyong
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.45-55
    • /
    • 2023
  • With the widespread use of digital devices, anonymous communication technologies such as the dark web and deep web are becoming increasingly popular for criminal activity. Because these technologies leave little local data on the device, they are difficult to track using conventional crime investigation techniques. The United States and the United Kingdom have enacted laws and developed systems to address this issue, but South Korea has not yet taken any significant steps. This paper proposes a new blockchain-based crime investigation method that uses physical memory data analysis to track the behavior of anonymous network users. The proposed method minimizes infringement of basic rights by only collecting physical memory data from the device of the suspected user and storing the tracking information on a blockchain, which is tamper-proof and transparent. The paper evaluates the effectiveness of the proposed method using a simulation environment and finds that it can track the behavior of dark website users with a residual rate of 77.2%.

Distributed Identity Authentication System based on DID Technology (DID 기술에 기반 한 분산 신원 인증 시스템)

  • Chai Ting;Seung-Soon Shin;Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.17-22
    • /
    • 2023
  • Traditional authentication systems typically involve users entering their username and password into a centralized identity management system. To address the inconvenience of such authentication methods, a decentralized identity authentication system based on Distributed Identifiers(DID) is proposed, utilizing decentralized identity technology. The proposed system employs QR code scanning for login, enhancing security through the use of blockchain technology to ensure the uniqueness and safety of user identities during the login process. This system utilizes DIDs and integrates the InterPlanetary File System(IPFS) to securely manage organizational members' identity information while keeping it private. Using the distributed identity authentication system proposed in this study, it is possible to effectively manage the security and personal identity of organization members. To improve the usability of the system proposed in this study, research is needed to expand it into a solution.

Potential Effects of Gaming Disorder Classification on Gamers' Attitude and Gaming Intention (게임이용장애 질병분류가 게임이용자의 태도와 게임의향에 미치는 효과)

  • Kim, Suk Hwan;Han, Sang Hoon;Kim, Bora;Kang, Hyoung Goo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.15 no.4
    • /
    • pp.277-301
    • /
    • 2020
  • This study surveyed 503 adults to examine the effect of gaming disorder classification, recently announced by World Health Organization(WHO), when it is applied to Korean game market. Considering the difference in respondents' background knowledge on gaming disorder, half of the respondents were randomly assigned to read an informative news article describing WHO's decision and its expected effect on domestic game industry. Based on previous literature of gaming disorder, we categorized respondents into a normal-use group and a potentially problematic-use group. As a result of analyses, it was found that the gaming disorder classification would yield overall reduction of game-related consumption in terms of gaming time(24%), game cost(28%), the number of games(22%), etc. The potentially problematic group showed higher willingness to pay for gaming than the normal group did, even if the game cost presumably increases due to the gaming disorder classification. A similar outcome was observed in those with high stress levels. This implies that the policy to solve game addiction problems may ironically lead to unexpected cost increases to the target group of the policy. Hence, problematic groups, especially, highly stressful people and the people with the lack of self-control, need to be considered when the gaming disorder classification policy is established. Furthermore, the informative news article had the preventive effect on the attitude and the intention of the people with moderate or high self-control capacity, but not to the people with gaming-additive tendencies, Again, this finding confirms the necessity of the tweezers policy to refine target groups by their characteristics and prepare for differentiated policies. When the gaming disorder classification is simply adopted with no consideration of domestic circumstances, irreversible loss could affect Korean game users, game industries, and related companies. This calls for urgent cooperation between academia, government, and industry to set up appropriate measures to deal with the gaming disorder classification.

A Study on Multi-modal Near-IR Face and Iris Recognition on Mobile Phones (휴대폰 환경에서의 근적외선 얼굴 및 홍채 다중 인식 연구)

  • Park, Kang-Ryoung;Han, Song-Yi;Kang, Byung-Jun;Park, So-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.2
    • /
    • pp.1-9
    • /
    • 2008
  • As the security requirements of mobile phones have been increasing, there have been extensive researches using one biometric feature (e.g., an iris, a fingerprint, or a face image) for authentication. Due to the limitation of uni-modal biometrics, we propose a method that combines face and iris images in order to improve accuracy in mobile environments. This paper presents four advantages and contributions over previous research. First, in order to capture both face and iris image at fast speed and simultaneously, we use a built-in conventional mega pixel camera in mobile phone, which is revised to capture the NIR (Near-InfraRed) face and iris image. Second, in order to increase the authentication accuracy of face and iris, we propose a score level fusion method based on SVM (Support Vector Machine). Third, to reduce the classification complexities of SVM and intra-variation of face and iris data, we normalize the input face and iris data, respectively. For face, a NIR illuminator and NIR passing filter on camera are used to reduce the illumination variance caused by environmental visible lighting and the consequent saturated region in face by the NIR illuminator is normalized by low processing logarithmic algorithm considering mobile phone. For iris, image transform into polar coordinate and iris code shifting are used for obtaining robust identification accuracy irrespective of image capturing condition. Fourth, to increase the processing speed on mobile phone, we use integer based face and iris authentication algorithms. Experimental results were tested with face and iris images by mega-pixel camera of mobile phone. It showed that the authentication accuracy using SVM was better than those of uni-modal (face or iris), SUM, MAX, NIN and weighted SUM rules.

Approach to the possibility of Multimedia Art in the Digital Media World (디지털 미디어 환경에서의 멀티미디어 아트의 가능성에 대한 접근)

  • 장용훈
    • Archives of design research
    • /
    • v.16 no.3
    • /
    • pp.309-318
    • /
    • 2003
  • A work of Art is not supposed to be isolated from the world, but it should be influenced by its cultural background and situations of the times. Therefore, Art itself reflects its era. In other words, it is created being based on the thought of its artist and simultaneously interacting with external conditions or circumstances of the era, so it would also affect the cultural code of its society. This is why modern art made by the individual living in this complicated and diversified society is quite avant-garde. Various demands from its society and diversified senses have been influencing diversification of works of Art. Now we can say that a mode of art is also dose to current stream of the times. A lot of artists have been trying to get out of traditional way of presentation techniques and classification of genres. In that point, the emergence of Multimedia Alt is inevitable in this digital era. The terms of Internet or multimedia are now familiar with everybody in the world, and a lot of works like Technology Art, Information Art, Computer Art, Digital Art, New Media Art, and so on have been coming into the world by using multimedia. Unlike other works of Art, these works from multimedia are practically used by being combined with technologies. Hereupon, in this paper I would like to find out a concept of Multimedia Art, its social function, and the future prospect of this brand-new form of art.

  • PDF

Increased mRNA Related Ovarian Maturation during Induction of Maturational Competence in Red Seabream, Pagrus major (참돔, Pagrus major의 성숙능력 유도시 증가된 난성숙 관련 mRNA)

  • Choi, Cheol-Young;Chang, Young-Jin;Takashima, Fumio
    • Development and Reproduction
    • /
    • v.4 no.1
    • /
    • pp.125-131
    • /
    • 2000
  • This study has used differential display-PCR, to amplify genes transcribed during the ovarian maturation induced by human chorionic gonadotropin (hCG). The cDNA expressed at the times of acquisition of oocyte maturational competence in red seabream (Pagrus major) following treatment with hCG was amplified and cloned. A full-length of cDNA for p. major was isolated using differential display-PCR and 5'RACE. This cDNA clone contained 2,662 nucleotides including the open reading frame that encoded 434 amino acids. Homology analyses, using the GenBank and EMBL general database searches, indicated that the nucleotides sequence of the cDNA does not have high homology with any other genes. This cDNA was judged to be a gene, which induction of maturational competence coincides with increase of mRNA related ovarian maturation. Consensus sequences which were consistent with protein kinase C phosphorylation sites and casein kinase II phosphorylation sites were identified. in vitro, the transcription level of mRNA related ovarian maturation increased between 9hr and 24hr following treatment of ovarian follicles with hCG. It was also increased after GtH-II (300 ng/ml) stimulation. Furthermore, in vivo, mRNA related ovarian maturation was rarely expressed prior to the acquisition of oocyte maturational competence, but was strongly expressed after the acquisition of oocyte maturational competence, suggesting that the hCG induction of maturational competence is brought about by the de novo synthesis of the mRNA related ovarian maturation in p. major.

  • PDF

A study on the application of redundancy in information design (정보디자인의 잉여성적용 연구)

  • Oh, Byung-Keun;Hong, Suk-Il
    • Archives of design research
    • /
    • v.18 no.1 s.59
    • /
    • pp.49-58
    • /
    • 2005
  • Focusing on the information sender, message, channel, and receiver, the existing information theory deals with the noise, information contents, and probability of choice, which involve in the process of information transmission. In the current digital environment, besides simply conveying information itself through media, the important issue is how to efficiently convey information. Therefore, we need to analyze the theory in different perspective, and to research the Information redundancy for the methodology of information design. The redundancy causes the receiver to have attraction to the information and to reduce its contents due to its supplement and repetition. So it can play a role of efficient communication method. The concept of redundancy is applied to the communication of art such as literature, architecture, painting, and design to accomplish efficient communication. In order to get persuasive information design for the receiver's perspective we need to make use of this concept. The redundancy can be applied with the technical aspect of multimedia and Interaction, which add supplemental expression, or sort of event for the receiver's experience and memory. In the process of constructing information it can be applied with the structure of gaming redundancy, entropy, the accumulating communication code using entertaining feature, and storytelling methodology. The noise and entropy could be used for the means of making redundancy, not the obstacle to information. The redundancy gives the receiver attraction on the information and makes them have strong will of interpreting it so that the purpose of conveying information will be accomplished efficiently.

  • PDF