• Title/Summary/Keyword: Identification Infrastructure

Search Result 194, Processing Time 0.028 seconds

Submarket Identification in Property Markets: Focusing on a Hedonic Price Model Improvement (부동산 하부시장 구획: 헤도닉 모형의 개선을 중심으로)

  • Lee, Chang Ro;Eum, Young Seob;Park, Key Ho
    • Journal of the Korean Geographical Society
    • /
    • v.49 no.3
    • /
    • pp.405-422
    • /
    • 2014
  • Two important issues in hedonic model are to specify accurate model and delineate submarkets. While the former has experienced much improvement over recent decades, the latter has received relatively little attention. However, the accuracy of estimates from hedonic model will be necessarily reduced when the analysis does not adequately address market segmentation which can capture the spatial scale of price formation process in real estate. Placing emphasis on improvement of performance in hedonic model, this paper tried to segment real estate markets in Gangnam-gu and Jungrang-gu, which correspond to most heterogeneous and homogeneous ones respectively in 25 autonomous districts of Seoul. First, we calculated variable coefficients from mixed geographically weighted regression model (mixed GWR model) as input for clustering, since the coefficient from hedonic model can be interpreted as shadow price of attributes constituting real estate. After that, we developed a spatially constrained data-driven methodology to preserve spatial contiguity by utilizing the SKATER algorithm based on a minimum spanning tree. Finally, the performance of this method was verified by applying a multi-level model. We concluded that submarket does not exist in Jungrang-gu and five submarkets centered on arterial roads would be reasonable in Gangnam-gu. Urban infrastructure such as arterial roads has not been considered an important factor for delineating submarkets until now, but it was found empirically that they play a key role in market segmentation.

  • PDF

Using Implementation Science to Advance Cancer Prevention in India

  • Krishnan, Suneeta;Sivaram, Sudha;Anderson, Benjamin O.;Basu, Partha;Belinson, Jerome L;Bhatla, Neerja;D' Cruz, Anil;Dhillon, Preet K.;Gupta, Prakash C.;Joshi, Niranjan;Jhulka, PK;Kailash, Uma;Kapambwe, Sharon;Katoch, Vishwa Mohan;Kaur, Prabhdeep;Kaur, Tanvir;Mathur, Prashant;Prakash, Anshu;Sankaranarayanan, R;Selvam, Jerard M;Seth, Tulika;Shah, Keerti V;Shastri, Surendra;Siddiqi, Maqsood;Srivastava, Anurag;Trimble, Edward;Rajaraman, Preetha;Mehrotra, Ravi
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.9
    • /
    • pp.3639-3644
    • /
    • 2015
  • Oral, cervical and breast cancers, which are either preventable and/or amenable to early detection and treatment, are the leading causes of cancer-related morbidity and mortality in India. In this paper, we describe implementation science research priorities to catalyze the prevention and control of these cancers in India. Research priorities were organized using a framework based on the implementation science literature and the World Health Organization's definition of health systems. They addressed both community-level as well as health systems-level issues. Community-level or "pull" priorities included the need to identify effective strategies to raise public awareness and understanding of cancer prevention, monitor knowledge levels, and address fear and stigma. Health systems-level or "push" and "infrastructure" priorities included dissemination of evidence-based practices, testing of point-of-care technologies for screening and diagnosis, identification of appropriate service delivery and financing models, and assessment of strategies to enhance the health workforce. Given the extent of available evidence, it is critical that cancer prevention and treatment efforts in India are accelerated. Implementation science research can generate critical insights and evidence to inform this acceleration.

Identification of Voice for Listeners who Feel Favor Using Voice Analysis (음성 분석을 이용한 청자가 호감을 느끼는 목소리에 대한 규명)

  • Choi, Ji Hyun;Cho, Dong Uk;Jeong, Yeon Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.122-131
    • /
    • 2016
  • In the smart societies, such as the current unlike in the past, the voice that listeners will feel favor is changing through the development of ICT technologies and infrastructure. In other words, in the past, loud, intensive and fast voice is a favorite but now a new social and cultural situation that is changing them with ICT technologies. Now, this becomes one of the important things that we clarify 'Is it a voice that feels a favor?'. For this, in this paper, we identified what voice that listeners feel favor by applying ICT technologies. Studies were carried out to proceed largely divided into two categories. Firstly, as the quantified data, we extracted the impact on favorable feeling of listeners which related with emotional speech by empirical analysis work. To do this, we performed the experiment for the public. Secondly, we identified what kind of voice which listeners feel a good impression. For this, we identified voice characteristics that there are people who are influential in the real society. Also, we extracted both the voice characteristics of each influential people and common voice characteristics. In addition, we want to overcome the problems of qualitative methods that have originally limitations in objective respects which is significant to the voice analysis. For this, we performed the experiments of the voice analysis by numerical and visual approaches.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

VANET Privacy Assurance Architecture Design (VANET 프라이버시 보장 아키텍처 설계)

  • Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.81-91
    • /
    • 2016
  • VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.

A Case Study on Electronic Recognition Sensor for Underground Facility Management System (지중 매설물 이력 관리 시스템 개발을 위한 전자인식기의 현장 적용성 검증 연구)

  • Jung, YooSeok;Kim, Soullam;Kim, Byungkon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.777-785
    • /
    • 2021
  • Many utility lines are buried underground to provide various functions of the city. Because historical records are not managed systematically, damage has occurred during excavation. In addition, the demand for an underground facility management system is increasing as the aerial underground project is progressing. By attaching an electronic recognition sensor to an underground facility, such as pipelines, the management history and site conditions can be carefully managed. Therefore, in this study, electronic recognition sensors, such as BLE Beacon, UHF RFID, geomagnetic sensor, and commercial marker, were tested to analyze the strengths, weaknesses, and field applicability through a pilot project. According to the limited research results collected through two pilot projects, the installation depth is most important to demonstrate the performance of the electronic reader. In addition, because it should be used in urban areas, the influence of environmental interference should be minimized, and there should be no performance degradation over time. In the case of the geomagnetic recognizer, the effect of environmental interference was large, and performance degradation occurred over time using the BLE Beacon. In the field situation, where the installation depth can be controlled to less than 40cm, the utility of the battery-free UHF RFID was the best.

Analysis of Propagation Environment for Selecting R-Mode Reference and Integrity Station (R-Mode 보정국과 감시국 선정을 위한 전파환경 분석에 관한 연구)

  • Jeon, Joong-Sung;Jeong, Hae-Sang;Gug, Seung-Gi
    • Journal of Navigation and Port Research
    • /
    • v.45 no.1
    • /
    • pp.26-32
    • /
    • 2021
  • In ocean field, the spread of the Fourth Industrial Revolution based on information and communication technology requires high precision and stable PNT&D (Position, Navigation, Timing and Data). As the IMO (International Maritime Organization) and IALA (The International Association of Marine Aids to Navigation and Lighthouse Authorities) are requiring backup systems due to mitigate vulnerabilities and the increase of dependency on GNSS (Global Navigation Satellite System), Korea is conducting a research & development of R-Mode. An DGPS (Differentiate Global Positioning System) reference station that uses MF, an existing maritime infrastructure, and AIS (Automatic Identification System) base stations that use 34 integrity station and VHF will be utilized in this study to avoid redundant investment. Because there are radio shadow areas that display low signal levels in the west sea, the establishment of new R-Mode reference and integrity station will be intended to resolve problems regrading the radio shadow area. Because the frequency has a characteristic in that radio wave transmits well along the ground (water surface) in low frequency band, simulation and measurement were conducted therefore this paper to propose candidate sites for R-Mode reference and integrity station resulted through p wave's propagation characteristics analysis. Using this paper, R-Mode reference and integrity station can be established at appropriate locations to resolve radio shadow areas in other regions.

Appropriate Technology, Responding to the COVID-19 Pandemic - Redefined Roles in a Public Health Crisis (Part I) (COVID-19 대유행에 대응하는 적정기술 : 보건 위기에서 재정의된 역할 - 파트 1)

  • Lee, Sungwoo;Suh, Jungwoo;Kim, Jaeeun;Jang, Dongyoon;Pyun, Nayoon;Shin, Kwanwoo
    • Journal of Appropriate Technology
    • /
    • v.6 no.2
    • /
    • pp.238-255
    • /
    • 2020
  • As COVID-19, which occurred at the end of 2019, has become a global pandemic, it has emerged as an unprecedented event that quickly destroys a nation's medical and healthcare system in both developed and developing countries. In the 21st century, most of the civil society that aimed for hyperconnected society is facing a new crisis that has not been experienced so far. Indeed, lack of personal protective equipment, isolation of clustered communities, disruption of medical systems necessary for diagnosis and treatment, and disruption of educational and economic activities due to social isolation are emerging. Since the COVID-19 has occurred, many of the difficulties that have occurred in the past six months indicate the basic infrastructure a society should have particularly in a pandemic. These include personal protective equipment (PPE), decontamination and quarantine tools essential for effective response, rapid and precise large-scale diagnosis, medical devices required for patient care, and identification and fast and wide on-line networks that can be used in social isolation. In this first part, we would like to introduce some representative examples of 1) personal protective equipment, 2) prevention of personal and community health, 3) social response through big data and networks within the framework of appropriate technology.

A study to Improve the Image Quality of Low-quality Public CCTV (저화질 공공 CCTV의 영상 화질 개선 방안 연구)

  • Young-Woo Kwon;Sung-hyun Baek;Bo-Soon Kim;Sung-Hoon Oh;Young-Jun Jeon;Seok-Chan Jeong
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.125-137
    • /
    • 2021
  • The number of CCTV installed in Korea is over 1.3 million, increasing by more than 15% annually. However, due to the limited budget compared to the installation demand, the infrastructure is composed of 500,000 pixel low-quality CCTV, and there is a limits on identification of objects in the video. Public CCTV has high utility in various fields such as crime prevention, traffic information collection (control), facility management, and fire prevention. Especially, since installed in high height, it works as its role in solving diverse crime and is in increasing trend. However, the current public CCTV field is operated with potential problems such as inability to identify due to environmental factors such as fog, snow, and rain, and the low-quality of collected images due to the installation of low-quality CCTV. Therefore, in this study, in order to remove the typical low-quality elements of public CCTV, the method of attenuating scattered light in the image caused by dust, water droplets, fog, etc and algorithm application method which uses deep-learning algorithm to improve input video into videos over quality over 4K are suggested.

A Study on the Types and Determinants of Young Farmers: Focusing on Young Farmers in Muan-gun, Jeollanam-do (청년농업인 유형화 및 결정요인 분석: 전남 무안군 청년농업인 중심으로)

  • Hyangmi Yi;Jongha Kim
    • Land and Housing Review
    • /
    • v.15 no.2
    • /
    • pp.107-124
    • /
    • 2024
  • Based on Muan-gun, Jeollanam-do, this study explores how to mitigate the disappearance of rual areas. The study surveyed 95 young farmers in Muan-gun to assess their farming practices and the challenges they face. We further employ factor analysis and cluster analysis classify young farmers in Muan-gun, facilitating the identification of tailored policies or initiatives aimed at fostering and supporting young farmers. The results are summarized as follows. First, Muan County does not have any ordinances or original projects specifically designed to support young farmers. Second, the succession rate of farmland among young farmers in Muan County is 41.1%, which is comparable to the national rate of 43.7%. This indicates that approximately 40% of young farmers in Korea have inherited farmland, a critical foundation for agricultural activities. Third, despite accumulating farming experience, young farmers have not seen any improvement in local living conditions, and rather their difficulties have intensified. Fourth, this study conducted a factor analysis using 21 variables, resulting in the selection of seven common factors for cluster analysis. Consequently, young farmers in Muan County were categorized into three groups. The multinomial logit analysis revealed that the typology of young farmers is influenced by indicators such as cultivated area, farming experience, demand for smart farms, farm income, and farming type (rice cultivation or other). Therefore, to attract young farmers and prevent the decline of rural areas, policy efforts should focus on minimizing entry barriers to farming infrastructure, such as access to farmland, and improving local settlement conditions.