• Title/Summary/Keyword: Cloud collection

Search Result 135, Processing Time 0.022 seconds

Cost Management Optimization Based on RPA for Management Accounting (관리회계실행을 위한 RPA기반 원가관리 최적화 방안)

  • Kim, Kyung-ihl
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.8-15
    • /
    • 2020
  • Due to the advance of artificial intelligence, wide use of RPA(Robotic Process Automation) became inevitable. The purpose of this study is to seek cost management optimization based on RPA which has automatic collection of cost information, timeliness and flexibility. The cost management system based on RPA will be able to optimize and improve the cost management process through the cross-system of cost information recognition and the cloud platform. Following the review of previous researches on the benefit of the RPA-related technology along with the investigation on the problems of current cost management system, this study will suggest a way to adopt RPA to optimize cost management system for the implement of strategic management accounting to support management decision making.

A Study on a Symmetric Collared Jackets in Early Joseon Dynasty -Based on the Excavated Costumes of Seok-nam-dong, Incheon- (조선전기 여성용 대금형(對襟形) 상의류에 관한 연구 -인천 석남동 출토복식을 중심으로-)

  • Song, Mi-Kyung
    • Journal of the Korean Society of Costume
    • /
    • v.57 no.6 s.115
    • /
    • pp.135-144
    • /
    • 2007
  • This study is about the three pieces of jackets with a symmetric collar that was used to fill in the empty spaces in coffin excavated in 2004, from Seok-nam-dong, Nam-gu, Incheon. The similarities of these three jackets are that the collars are symmetric, there are seops(the outer bodies to overlap the front sides of a jacket) with pleats, and openings on the side seam. The No.2, and No.6 seem to be jegori to wear over others, and the fabrics used for No.2 is damask with cloud pattern, and damask with lotus flower pattern. For the No.4, satin was used and there is peacock pattern weaved on satin using golden thread. No.41 is unlined clothes made with Suk-cho, and the distinctive feature about this clothes is that the collar, and the neckline are very narrow. The three jackets are similar with the recently reported clothes of Kim clan of Gang-leung (deducted to be buried in 1520), the collection of Seok Joo-sun Memorial Museum. Through this report, it provides information about some aspects of upper class women's clothes.

Study for Plans to Reduce Restaurant Food Waste at Source Based on an Example of Reduction Operation -Y-city's Reform Team of Reduction- (레스토랑 음식물 쓰레기 감량 방안에 관한 연구 -Y시티 저감 활동 프로그램을 중심으로-)

  • Na, Young-Sun;Seo, Min-Suk
    • Culinary science and hospitality research
    • /
    • v.11 no.3 s.26
    • /
    • pp.121-137
    • /
    • 2005
  • Today's rapid industrialization and population concentration in cities lead to a vast economic growth, and consequently, people's increased desire of spending demands abundant and diverse food. As a result in Korea, annual food waste is 4.1 million tons (24.6% of household waste) and daily food waste amount to 11,397 tons which is equivalent to 1,400 loads of 8-ton truck. It is best to recycle toed waste as manure, forage, and fuel than reclamation but separate collection of food waste is very difficult by reason of water content. So only a little portion of food waste from large-scaled restaurants and cafeterias that handle food waste relatively well. requirement for recycling food wastes into forage and manure needless to say, reduction activity is best way. Therefore, large-scaled restaurants and cafeterias need to seek plans to minimize food resource waste thus reducing the cost and waste processing cost by implementing appropriate reduction program.

  • PDF

Smart Safety Belt for High Rise Worker at Industrial Field

  • Lee, Se-Hoon;Moon, Hyo-Jae;Tak, Jin-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.2
    • /
    • pp.63-70
    • /
    • 2018
  • Safety management agent manages the risk behavior of the worker with the naked eye, but there is a real difficulty for one the agent to manage all the workers. In this paper, IoT device is attached to a harness safety belt that a worker wears to solve this problem, and behavior data is upload to the cloud in real time. We analyze the upload data through the deep learning and analyze the risk behavior of the worker. When the analysis result is judged to be dangerous behavior, we designed and implemented a system that informs the manager through monitoring application. In order to confirm that the risk behavior analysis through the deep learning is normally performed, the data values of 4 behaviors (walking, running, standing and sitting) were collected from IMU sensor for 60 minutes and learned through Tensorflow, Inception model. In order to verify the accuracy of the proposed system, we conducted inference experiments five times for each of the four behaviors, and confirmed the accuracy of the inference result to be 96.0%.

A Study on Managing Dataset Records in Government Information Systems (행정정보 데이터세트 기록의 관리방안)

  • Wang, Ho-sung;Seol, Moon-won
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.17 no.3
    • /
    • pp.23-47
    • /
    • 2017
  • According to a recent survey, over 18,000 government information systems have numerous different functions and characteristics. Although every dataset that is created and maintained in government information systems is declared as a collection of records according to the Public Records Management Act, current electronic records management policies cannot cover dataset records management. This study suggests the policy directions for dataset records management at the national level. It emphasizes the necessity to preserve the appearance and behavior (function) of database systems to ensure the authenticity of dataset records. In addition, this study investigates "emulation" as a representation and long-term preservation methodology for dataset-type records. It also suggests a dataset records model.

Phishing Attack Detection Using Deep Learning

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.213-218
    • /
    • 2021
  • This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.

Accuracy Analysis of Road Surveying and Construction Inspection of Underpass Section using Mobile Mapping System

  • Park, Joon Kyu;Um, Dae Yong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.2
    • /
    • pp.103-111
    • /
    • 2021
  • MMS (Mobile Mapping System) is being used for HD (High Definition) map construction because it enables fast and accurate data construction, and it is receiving a lot of attention. However, research on the use of MMS in the construction field is insufficient. In this study, road surveying and inspection of construction structures were performed using MMS. Through data acquisition and processing using MMS, point cloud data for the study site was created, and the accuracy was evaluated by comparing with traditional surveying methods. The accuracy analysis results showed a maximum of 0.096m, 0.091m, and 0.093m in the X, Y, and H directions, respectively. Each RMSE was 0.012m, 0.015m, and 0.006m. These result satisfy the accuracy of topographic surveying in the general survey work regulation, indicating that construction surveying using MMS is possible. In addition, a 3D model was created using the design data for the underpass road, and the inspection was performed by comparing it with the MMS data. Through inspection results, deviations in construction can be visually confirmed for the entire underground roadway. The traditional method takes 6 hours for the 4.5km section of the target area, but MMS can significantly shorten the data acquisition time to 0.5 hours. Accurate 3D data is essential data as basic data for future smart construction. With MMS, you can increase the efficiency of construction sites with fast data collection and accuracy.

Service Platform Based on User Exercise Information Collection and Analysis (사용자 운동 정보 수집 및 분석 기반의 서비스 플랫폼)

  • Lee, Hyun-Sup;Kim, Jindeog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.624-626
    • /
    • 2022
  • It is possible to manage individual exercise information using a smartphone application that may be attached to exercise equipment. We propose a service platform that provides effective exercise techniques and management information to athletes by establishing an AI module to analyze and present the current user's exercise volume and exercise intensity direction through analysis of exercise data. To this end, it can be effectively managed by establishing a system based on a cloud environment and builds a hybrid health model that utilizes air and magnetic technologies at the same time.

  • PDF

Indoor Location Data Construction Technique using GAN (GAN을 이용한 실내 위치 데이터 구성 기법)

  • Yoon, Chang-Pyo;Hwang, Chi-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.490-491
    • /
    • 2021
  • Recently, technologies using Wi-Fi fingerprints and deep learning are being studied to provide accurate location-based services in an indoor environment. At this time, the composition of learning data is very important, and it is essential to collect sufficient data necessary for learning. However, the number of specific points for the collection of radio signal data within the area requiring positioning is infinite, and it is impossible to collect all of these data. Therefore, there is a need for a way to make up for insufficient learning data. This study proposes a method of constructing a sufficient number of location data necessary for learning based on insufficiently collected location data.

  • PDF

Systematic Literature Review on Zakat Distribution Studies as Islamic Social Fund

  • Azhar ALAM;Ririn Tri RATNASARI;Ari PRASETYO;Muhamad Nafik Hadi RYANDONO;Umniyati SHOLIHAH
    • Journal of Distribution Science
    • /
    • v.22 no.2
    • /
    • pp.21-30
    • /
    • 2024
  • Purpose: This study explores the development of zakat distribution studies and the integration of existing studies. This study is expected to complement a systematic literature review in the field of zakat distribution to inspire further research directions. Research design, data, and methodology: This research method uses a systematic literature review assisted by the Nvivo application and the PRISMA system, which selects from 427 articles to 53 articles to be analyzed based on publication and classification of the theme of its findings. This study describes publications, authors, themes, cited articles, and research themes. Results: This study shows the dominance of Malaysian writers and significant developments in 2020. In addition, the study shows the most popular articles based on the most citations and word cloud analysis. The primary topics of zakat distribution publications are management strategy, development, the zakat institution, and the recipient. Conclusions: The study advises that Future research could focus on zakat distribution's asnaf characteristics. Next, a study on administration expenses and scalability concerns in zakat collection and distribution planning can avoid wasting cash. This topic hinders zakat institutions' distribution services.