• Title/Summary/Keyword: Execution time

Search Result 1,941, Processing Time 0.042 seconds

Effect of video-based movement therapy program on panic disorder symptom relief and brain wave on patients with panic disorder (공황장애 환자의 동영상 기반 동작치료 프로그램 수행이 공황장애 증상 완화 및 뇌파에 미치는 영향)

  • Jeong, Jin-Hyup
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.453-459
    • /
    • 2019
  • This study was conducted to investigate the effects of video - based movement therapy program on emotional variables (anxiety, depression, panic disorder) and EEG on panic disorder patients. The following conclusions were obtained. The results of the 12 - week video - based behavior therapy program showed that there were statistically significant differences (p <.05) in the anxiety scale of the exercise group. There were statistically significant differences (p <.05) between the left brain L-Beta region of the exercise group and the left brain H-Beta and the right brain L-Beta regions of the control group and no significant difference was found between the groups. The results of this study suggest that the performance of the video-based behavioral therapy program for panic disorder patients did not affect the emotional variables and EEG changes. However, in the case of emotional variables, It is considered that the longer the program execution period, the more result will be obtained. In addition, it is expected that more positive study results can be expected if the program is run after having had enough familiarity and adaptation time of the operation treatment program omitted in this study.

A Scheme of Data-driven Procurement and Inventory Management through Synchronizing Production Planning in Aircraft Manufacturing Industry (항공기 제조업에서 생산계획 동기화를 통한 데이터기반 구매조달 및 재고관리 방안 연구)

  • Yu, Kyoung Yul;Choi, Hong Suk;Jeong, Dae Yul
    • The Journal of Information Systems
    • /
    • v.30 no.1
    • /
    • pp.151-177
    • /
    • 2021
  • Purpose This paper aims to improve management performance by effectively responding to production needs and reducing inventory through synchronizing production planning and procurement in the aviation industry. In this study, the differences in production planning and execution were first analyzed in terms of demand, supply, inventory, and process using the big data collected from a domestic aircraft manufacturers. This paper analyzed the problems in procurement and inventory management using legacy big data from ERP system in the company. Based on the analysis, we performed a simulation to derive an efficient procurement and inventory management plan. Through analysis and simulation of operational data, we were able to discover procurement and inventory policies to effectively respond to production needs. Design/methodology/approach This is an empirical study to analyze the cause of decrease in inventory turnover and increase in inventory cost due to dis-synchronize between production requirements and procurement. The actual operation data, a total of 21,306,611 transaction data which are 18 months data from January 2019 to June 2020, were extracted from the ERP system. All them are such as basic information on materials, material consumption and movement history, inventory/receipt/shipment status, and production orders. To perform data analysis, it went through three steps. At first, we identified the current states and problems of production process to grasp the situation of what happened, and secondly, analyzed the data to identify expected problems through cross-link analysis between transactions, and finally, defined what to do. Many analysis techniques such as correlation analysis, moving average analysis, and linear regression analysis were applied to predict the status of inventory. A simulation was performed to analyze the appropriate inventory level according to the control of fluctuations in the production planing. In the simulation, we tested four alternatives how to coordinate the synchronization between the procurement plan and the production plan. All the alternatives give us more plausible results than actual operation in the past. Findings Based on the big data extracted from the ERP system, the relationship between the level of delivery and the distribution of fluctuations was analyzed in terms of demand, supply, inventory, and process. As a result of analyzing the inventory turnover rate, the root cause of the inventory increase were identified. In addition, based on the data on delivery and receipt performance, it was possible to accurately analyze how much gap occurs between supply and demand, and to figure out how much this affects the inventory level. Moreover, we were able to obtain the more predictable and insightful results through simulation that organizational performance such as inventory cost and lead time can be improved by synchronizing the production planning and purchase procurement with supply and demand information. The results of big data analysis and simulation gave us more insights in production planning, procurement, and inventory management for smart manufacturing and performance improvement.

Comparison of Artificial Intelligence Multitask Performance using Object Detection and Foreground Image (물체탐색과 전경영상을 이용한 인공지능 멀티태스크 성능 비교)

  • Jeong, Min Hyuk;Kim, Sang-Kyun;Lee, Jin Young;Choo, Hyon-Gon;Lee, HeeKyung;Cheong, Won-Sik
    • Journal of Broadcast Engineering
    • /
    • v.27 no.3
    • /
    • pp.308-317
    • /
    • 2022
  • Researches are underway to efficiently reduce the size of video data transmitted and stored in the image analysis process using deep learning-based machine vision technology. MPEG (Moving Picture Expert Group) has newly established a standardization project called VCM (Video Coding for Machine) and is conducting research on video encoding for machines rather than video encoding for humans. We are researching a multitask that performs various tasks with one image input. The proposed pipeline does not perform all object detection of each task that should precede object detection, but precedes it only once and uses the result as an input for each task. In this paper, we propose a pipeline for efficient multitasking and perform comparative experiments on compression efficiency, execution time, and result accuracy of the input image to check the efficiency. As a result of the experiment, the capacity of the input image decreased by more than 97.5%, while the accuracy of the result decreased slightly, confirming the possibility of efficient multitasking.

The Usage of Modern Information Technologies for Conducting Effective Monitoring of Quality in Higher Education

  • Oseredchuk, Olga;Nikolenko, Lyudmyla;Dolynnyi, Serhii;Ordatii, Nataliia;Sytnik, Tetiana;Stratan-Artyshkova, Tatiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.113-120
    • /
    • 2022
  • Information technologies in higher education are the basis for solving the tasks set by monitoring the quality of higher education. The directions of aplying information technologies which are used the most nowadays have been listed. The issues that should be addressed by monitoring the quality of higher education with the use of information technology have been listed. The functional basis for building a monitoring system is the cyclical stages: Observation; Orientation; Decision; Action. The monitoring system's considered cyclicity ensures that the concept of independent functioning of the monitoring system's subsystems is implemented.. It also ensures real-time task execution and information availability for all levels of the system's hierarchy of vertical and horizontal links, with the ability to restrict access. The educational branch uses information and computer technologies to monitor research results, which are realized in: scientific, reference, and educational output; electronic resources; state standards of education; analytical materials; materials for state reports; expert inferences on current issues of education and science; normative legal documents; state and sectoral programs; conference recommendations; informational, bibliographic, abstract, review publications; digests. The quality of Ukrainian scientists' scientific work is measured using a variety of bibliographic markers. The most common is the citation index. In order to carry out high-quality systematization of information and computer monitoring technologies, the classification has been carried out on the basis of certain features: (processual support for implementation by publishing, distributing and using the results of research work). The advantages and disadvantages of using web-based resources and services as information technology tools have been discussed. A set of indicators disclosed in the article evaluates the effectiveness of any means or method of observation and control over the object of monitoring. The use of information technology for monitoring and evaluating higher education is feasible and widespread in Ukrainian education, and it encourages the adoption of e-learning. The functional elements that stand out in the information-analytical monitoring system have been disclosed.

Comparison and Improvement of Domestic and Foreign Regulations for the Prevention of Suffocation Accidents (국외 질식재해 예방규정 비교를 통한 국내 규정 개선방안)

  • Lim, Dae Sung;Lee, Seung kil;Kim, Chi-Nyon;Cho, Kee Hong;Yi, Gwang Yong
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.31 no.1
    • /
    • pp.83-93
    • /
    • 2021
  • Objectives: 'Confined space' was only defined in the Safety and Health Regulations as a place where oxygen deficiency and hydrogen sulfide must be dealt with at the time of the initial enactment (1982). The danger of fire and explosion were added in 2003. We will compare and review the regulations related to confined space work under the current safety and health rules alongside regulations in other countries and prepare a plan to improve the system through enhanced clarity and execution. Methods: In a comparison of systems for the prevention of suffocation in confined spaces in major countries (Germany, United States, Japan) different concepts of the definition of confined spaces in different countries apparently due to differences in each country's legal implementation system, accident analysis methods, the status of safety and health implementation in workplaces, the precautions against actual confined space work, and the definition of confined spaces were found to be not much different between Korea and the other foreign countries. Results: In the case of Germany and the United States, a confined space is defined as a contextual concept rather than a place, so more careful attention is needed from operators or enclosed space managers as it is often necessary to judge the actual workplace. In the case of Korea and Japan, the interior of the place is mainly defined as a place, especially in the case of Japan, which concentrates on oxygen deficiency and hydrogen sulfide poisoning. Conclusions: For measures to improve regulations on the prevention of suffocation accidents in Korea, I would like to propose three major measures to improve the system in the rules on domestic industrial safety and health standards. It is necessary to prepare and provide a guide to ensure that the 18 types of confined spaces currently defined as confined spaces are clearly understood by field management supervisors or workers.

A Study on Effective Real Estate Big Data Management Method Using Graph Database Model (그래프 데이터베이스 모델을 이용한 효율적인 부동산 빅데이터 관리 방안에 관한 연구)

  • Ju-Young, KIM;Hyun-Jung, KIM;Ki-Yun, YU
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.25 no.4
    • /
    • pp.163-180
    • /
    • 2022
  • Real estate data can be big data. Because the amount of real estate data is growing rapidly and real estate data interacts with various fields such as the economy, law, and crowd psychology, yet is structured with complex data layers. The existing Relational Database tends to show difficulty in handling various relationships for managing real estate big data, because it has a fixed schema and is only vertically extendable. In order to improve such limitations, this study constructs the real estate data in a Graph Database and verifies its usefulness. For the research method, we modeled various real estate data on MySQL, one of the most widely used Relational Databases, and Neo4j, one of the most widely used Graph Databases. Then, we collected real estate questions used in real life and selected 9 different questions to compare the query times on each Database. As a result, Neo4j showed constant performance even in queries with multiple JOIN statements with inferences to various relationships, whereas MySQL showed a rapid increase in its performance. According to this result, we have found out that a Graph Database such as Neo4j is more efficient for real estate big data with various relationships. We expect to use the real estate Graph Database in predicting real estate price factors and inquiring AI speakers for real estate.

Analysis of Threat Factors of the Chinese Maritime Militia and the Prospect of Maritime Disputes between Korea and China (중국 해상 민병대의 위협요인 분석 및 한·중 해양 분쟁 전망)

  • Park, Byeung chan
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.83-113
    • /
    • 2022
  • Although China's maritime militia has not been well known despite its long history, it is recently emerging as a serious threat to maritime security, causing neighboring countries' security concerns due to the growing number of maritime disputes with China. In this regard, it is now time to clearly define the true nature of the Chinese maritime militia. A close look at the organization and roles of the Chinese maritime militia reveals that it is an organization that is systematically managed and operated by the Chinese government and the People's Liberation Army of China. Its role is to serve the purpose of "contributing to the protection and expansion of China's marine interests." In addition, the threat factors of the Chinese maritime militia were analyzed by examining the cases of maritime disputes between the Chinese maritime militia and neighboring countries. First, the Chinese maritime militia has implemented the "Gray Zone Strategy." Second, it is a systematic organization supported by the Chinese government and the People's Liberation Army. Third, it is a maritime power that cannot be ignored as the world's largest militia organization. Fourth, it has a strategic flexibility that enables the execution of the dual mission of working for a living such as commercial fishing and serving in the maritime militia. The threats of the Chinese maritime militia are not limited to Southeast Asian countries located in the South China Sea. This is also the case in Korea as the country cannot avoid maritime disputes with China such as the Ieodo issue and the boundary delimitation of the West Sea. Accordingly, this study was focused on presenting a predictable scenario and countermeasures based on the analysis through a scenario technique with respect to the two cases that are most likely to occur in Korea-China relations. Finally, beyond identifying the nature of the Chinese maritime militia, this study takes a further step to share considerations as to how the organization may operate and develop in the future and how we can cope with its moves.

  • PDF

A Study On Artifacts Analysis In Portable Software (무 설치 프로그램에서의 사용자 행위 아티팩트 분석)

  • Taeyeong Heo;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.39-53
    • /
    • 2023
  • Non-installation program (hereinafter referred to as "portable program") is a program that can be used without an installation process, unlike general software. Since there is no separate installation process, portable programs have high mobility and are used in various ways. For example, when initial setup of multiple PCs is required, a portable program can be stored on one USB drive to perform initial setup. Alternatively, when a problem occurs with the PC and it is difficult to boot normally, Windows PE can be configured on the USB drive and portable programs can be stored for PC recovery. And the portable program does not directly affect PC settings, such as changing registry values, and does not leave a trace. This means that the portable program has high security. If a portable program is deleted after using it, it is difficult to analyze behavior in a general way. If a user used a portable program for malicious behavior, analysis in a general way has limitations in collecting evidence. Therefore, portable programs must have a new way of behavioral analysis that is different from ordinary installation software. In this paper, after installing the Windows 10 operating system on a virtual machine, we proceed with the scenario with a portable program of Opera and Notepad++. And we analyze this in various ways such as file analysis of the operating system and memory forensics, collect information such as program execution time and frequency, and conduct specific behavioral analysis of user.

  • PDF

Characteristics of Process-Focused Assessment in Science Classes from the Research Middle School Reports (연구학교 보고서에 나타난 중학교 과학과 과정중심평가의 특징)

  • Jong-Hee Kim;Jee-young Park;Nan Sook Yu;Min-Seon Joo
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.16 no.2
    • /
    • pp.182-195
    • /
    • 2023
  • The purpose of this study was to analyze reports from research middle schools based on the criteria for process-focused assessment to find out how the characteristics of process-focused assessment were being implemented in middle school science classes. The analysis criteria for the characteristics of process-focused assessment (integration of lessons and assessments, evaluation elements and methods, content and timing of feedback, and learner growth management) were extracted. Using the analysis framework, the result reports of seven research middle schools for process-focused assessment were analyzed. In terms of integration of lessons and assessments, when the process-focused assessment was operated, the class and evaluation plan were well implemented based on the curriculum achievement standards, but the process-focused assessment was recognized as a performance evaluation. In terms of evaluation elements and methods, the evaluation element for knowledge was the main component, and competency was presented in the planning stage, but competency was not dealt with in class execution. The evaluation method was biased toward teacher-centered observation evaluation and written test, and the setting of scoring criteria for each evaluation element was insufficient. In terms of the content and timing of feedback, feedback was mainly provided based on achievement confirmation, but no case was found in which scaffolding was provided at an appropriate time for insufficient parts in the learning process. In terms of the learner's growth management, the competencies cultivated through science classes were included in the detailed subject specialties of the school record. However, little was shown in the report on how to systematically manage the process of developing learners' competencies and reflect the evaluation results to teachers' class improvement.

Clustering Technique of Intelligent Distance Estimation for Mobile Ad-hoc Network (이동 Ad-hoc 통신을 위한 지능형 거리추정 클러스터방식)

  • Park, Ki-Hong;Shin, Seong-Yoon;Rhee, Yang-Won;Lee, Jong-Chan;Lee, Jin-Kwan;Jang, Hye-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.11
    • /
    • pp.105-111
    • /
    • 2009
  • The study aims to propose the intelligent clustering technique that calculates the distance by improving the problems of multi-hop clustering technique for inter-vehicular secure communications. After calculating the distance between vehicles with no connection for rapid transit and clustering it, the connection between nodes is created through a set distance vale. Header is selected by the distance value between nodes that become the identical members, and the information within a group is transmitted to the member nodes. After selecting the header, when the header is separated due to its mobility, the urgent situation may occur. At this time, the information transfer is prepared to select the new cluster header and transmit it through using the intelligent cluster provided from node by the execution of programs included in packet. The study proposes the cluster technique of the intelligent distance estimation for the mobile Ad-hoc network that calculates the cluster with the Store-Compute-Forward method that adds computing ability to the existing Store-and-Forward routing scheme. The cluster technique of intelligent distance estimation for the mobile Ad-hoc network suggested in the study is the active and intelligent multi-hop cluster routing protocol to make secure communications.