• Title/Summary/Keyword: Anticipative

Search Result 7, Processing Time 0.024 seconds

Study of Prevention System against Second-Convictions of Sexual Violence Offenders by Using Smart Electronic Monitoring Anklet

  • Oh, Sei-Youen;Lee, Aeri
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.8 no.2
    • /
    • pp.69-77
    • /
    • 2018
  • The study, recognizing the seriousness of such second-convictions of sexual violence offenders and supplementing the problems noticed from an integral electronic monitoring anklet, which only offers simple location information, would like to propose a Prevention System against Second-Convictions of Sexual Violence Offenders by using Smart Electronic Monitoring Anklet. Proposed System is anticipated to be able to prevent second-convictions of sexual violence offenders as the data of offenders from Smart Electronic Monitoring Anklet with various sensors and the data from Integrated DB of Judicial Authorities is comparatively analyzed, allowing anticipative actions at each stage based on the analyzed data regarding sexual violence.

What are the Risks of using Smart Technology in the Construction Phase?

  • Lee, Baul;Park, Seung-Kook
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.103-110
    • /
    • 2022
  • In the era of the 4th Industrial Revolution, smart technology being considered to improve productivity breakthroughs is in the spotlight as a means to replace traditional construction technology in the construction industry. However, various problems are occurring in construction sites using smart technology and causing negative impacts on construction projects. Therefore, the objective of this study is to identify risk factors that occur when smart technologies are used in construction projects. To achieve this purpose, this study investigated the difficulties at construction projects using smart technology, and risk factors were derived based on site surveys and literature. The risk factors were measured by experts, and then a total of 19 risk factors was derived by exploratory factor analysis. As a result, risks were classified as 5 factors, the institutional factor is the most difficult response, and the government needs anticipative system improvement and a long-term plan. The research findings provide practical implications for construction experts trying to apply smart technology in construction sites and construction policy-makers to revitalize smart technology.

  • PDF

Effects of Gratitude and Anticipation on Satisfaction: A Case Study in Indonesia

  • NOEGROHO, Gatoet Gembiro;SUHARYONO, Suharyono;SOLIMUN, Solimun;YULIANTO, Edy
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.1215-1224
    • /
    • 2021
  • This research aims to discuss the relationship between the courage, anticipation, and satisfaction comprehensively. This study will be complemented by gratitude as a variable that moderates the relationship between courage and anticipation, as well as the relationship between the courage and satisfaction. The large area as survey location is the reason for sampling conducted in 2 stages: (1) taking 15 districts through judgement sampling, (2) allocated sub-districts sample through proportional random sampling. The sample used in this study were 155 sub-districts in East Java. Respondents in each sub-district consisted of 1 farmer and 1 field extension officer to get a total of 310 respondents. The analysis method used to test the hypothesis was Structural Equation Modeling (SEM). The findings of this research are: (1) The courage of field extension officers' have a positive but non-significant direct effect on farmers' anticipation, however, the effect significantly strengthen with religiosity as moderation; (2) The courage of field extension officers' and farmers' anticipation have a significant and positive effect on satisfaction. This study will be complemented by gratitude as a variable that moderates the relationship between the courage and anticipation, as well as the relationship between courage and satisfaction.

Why were National Welfare Pension Act of 1973 and the National Pension Act of 1986 Legislated?: From the Viewpoint of Response to the Demographic Bonus (1973년 국민복지연금법과 1986년 국민연금법은 왜 제정되었는가?: 인구학적 보너스에 대한 대응이라는 시점)

  • Park, Yitaek;Lee, Hun-Chang
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.4
    • /
    • pp.781-805
    • /
    • 2015
  • The National Welfare Pension Act of 1973 and the National Pension Act of 1986 were legislated for an anticipative response to future population ageing. But the enforcement of these acts gained momentum as they became effective tools to realize the present potential demographic bonus. This article investigates the history related to the enactment of these two acts, focusing on these acts' role in raising funds managed by the government (National Investment Fund and National Housing Fund). This article shows the historical origin of full-dress debates on the sustainability of the National Pension Fund.

A Study on the Development of Regional Risk Mapping Program for Marine Oil Spills (해역별 기름유출사고 위험도 매핑 프로그램 개발에 관한 연구)

  • Moon, Jung-Hwan;Yun, Jong-Hwui
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.5
    • /
    • pp.423-429
    • /
    • 2016
  • A study was conducted to analyze the oil spill dynamic state using system dynamics method, and to developed regional risk program based on oil spill history for better judgement of the situation at the early stage of oil spill. Results were obtained as follows: Firstly, various variables were calculated by a score based on raw data of oil spill history in Korea. Regional oil spill risk was also calculated in a quantitative way. Secondly, calculated regional oil spill risk was analyzed and programmed with a help of smart-device for better use. Thirdly, comparison of oil spill risk between regions became possible and regional oil spill risk program proved to be useful in prompt decision under urgent situation in response to oil spill at sea. Convenient and quick oil spill risk without special restrictions have been able to determine. and it can help in anticipative preparation (strategy) for oil spills.

An Approach to Managing Requirements as a Core Asset in Software Product-Line (소프트웨어 프로덕트 라인에서 핵심 자산으로서 요구사항을 관리하는 방법)

  • 문미경;염근혁
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.8
    • /
    • pp.1010-1026
    • /
    • 2004
  • The goal of product line engineering is to support the systematic development of a set of similar software systems by understanding and controlling their common and distinguishing characteristics. The product line engineering is a process that develops reusable core assets and develops a set of software-intensive systems from a common set of core assets in a prescribed way. Currently, many software development technologies are accomplished in context of product line. However, much of the product line engineering research have focused on the reuse of work products relating to the software's architecture, detail design, and code. The product lines fulfill the promise of tailor-made systems built specifically for the needs of particular customers or customer groups. In particular, commonality and variability play central roles in the all product line development processes. These must be treated already during the requirement analysis phase. Requirements in product line engineering are basis of software development just like as traditional system development engineering, and basis of deciding other core assets' property - commonalities and variabilities. However, it is difficult to elicit, analyze and manage correct requirements. Therefore, it is necessary to develop systematic methods which can develop and manage requirement as core asset, which can be stable in anticipative change and can be well adapted to unpredictable change. In this paper, we suggest a method of managing requirements as core asset in product line. Through this method, the reuse of domain requirements can be enhanced. As a result, the cost and time of software development can be reduced and the productivity can be increased.

A Study for Hybrid Honeypot Systems (하이브리드 허니팟 시스템에 대한 연구)

  • Lee, Moon-Goo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.11
    • /
    • pp.127-133
    • /
    • 2014
  • In order to protect information asset from various malicious code, Honeypot system is implemented. Honeypot system is designed to elicit attacks so that internal system is not attacked or it is designed to collect malicious code information. However, existing honeypot system is designed for the purpose of collecting information, so it is designed to induce inflows of attackers positively by establishing disguised server or disguised client server and by providing disguised contents. In case of establishing disguised server, it should reinstall hardware in a cycle of one year because of frequent disk input and output. In case of establishing disguised client server, it has operating problem such as procuring professional labor force because it has a limit to automize the analysis of acquired information. To solve and supplement operating problem and previous problem of honeypot's hardware, this thesis suggested hybrid honeypot. Suggested hybrid honeypot has honeywall, analyzed server and combined console and it processes by categorizing attacking types into two types. It is designed that disguise (inducement) and false response (emulation) are connected to common switch area to operate high level interaction server, which is type 1 and low level interaction server, which is type 2. This hybrid honeypot operates low level honeypot and high level honeypot. Analysis server converts hacking types into hash value and separates it into correlation analysis algorithm and sends it to honeywall. Integrated monitoring console implements continuous monitoring, so it is expected that not only analyzing information about recent hacking method and attacking tool but also it provides effects of anticipative security response.