• Title/Summary/Keyword: Implementation loss

Search Result 700, Processing Time 0.03 seconds

The Effect of the Project Plan Variance on Customer Satisfaction: Focus on IT Project Results (프로젝트 계획의 변동이 고객만족도에 미치는 영향: IT 프로젝트 결과 중심으로)

  • Yoon, Hyeong-Seok;Lee, Seouk-Joo;Kim, Seung-Chul;Park, So-Hyun
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.51-64
    • /
    • 2022
  • Companies are planning and executing IT projects using information technology as a means to secure external competitiveness. However, IT projects have high risks and uncertainties due to the invisibility of outputs (systems, services, products), and changes in plans frequently occur during project execution. As a result, most IT projects are closed without achieving the target performance. This can lead to a waste of resources and money for the company, which in turn leads to the loss of opportunities to enter new markets. This study intends to analyze the effect of changes in the project plan on customer satisfaction, which is the project performance. Also, we want to find the importance of project planning so that the target performance of the IT project can be achieved. For the empirical analysis of this study, about 500 actual project data were collected. As for the analysis method, statistical analysis such as simple and multiple regression analysis and control effect was performed. Looking at the results of the analysis, it was found that the scope change affects the cost change and the schedule change. Also, changes in scope and cost were found to affect project performance. The theoretical performance of this study proved the theoretical fact that good project performance comes out if the IT project is executed as planned. The practical performance suggested the need for a change in project management by proving that thorough execution of the project planning stage can improve the project performance in the Korean project management culture, where the project planning stage is poorly performed for the rapid implementation of the IT project.

Effects of reforestation approaches, agroforestry and woodlot, on plant community composition, diversity and soil properties in Madhupur Sal forest, Bangladesh

  • Hasan, Mohammad Kamrul;Islam, Md. Tariqul;Akter, Rojina;Roshni, Nasima Akther
    • Journal of Ecology and Environment
    • /
    • v.46 no.3
    • /
    • pp.204-217
    • /
    • 2022
  • Background: Increasing land demands for food production have led to biodiversity loss and land degradation in the Madhupur Sal forest. Reforestation activities such as agroforestry and woodlot plantation support the conservation of diversity, restoration of forest and prevention of soil erosion in degraded natural Sal forest. Knowing about these reforestation activities, this study is needed to compare the species composition, richness, and soil nutrients of these two plantation activities to the natural Sal forest in the degraded Madhupur Sal forest in Bangladesh. Results: The analysis showed that in between the reforestation activities, the highest Shannon-Wiener index (1.79), evenness (0.60) and Simpson's index (0.79) were found in the agroforestry site compared to the woodlot plantation site. On the contrary, the highest species richness (n = 14), tree basal area (19.56 m2 ha-1), Margalef's index (1.96) were recorded in woodlot plantation than in the agroforestry site. We observed that at 0-15 cm depth, soil organic matter (2.39%), total nitrogen (0.14%), available phosphorous (62.67 ㎍ g-1) and exchangeable potassium (0.36 meq/100 g) in agroforestry plots were significantly higher compared to other forest sites. At topsoil (15-30 cm depth), soil organic matter (1.67%) and available phosphorous (21.09 ㎍ g-1) were found to be higher in agroforestry site. Conclusions: Both reforestation approaches improved soil function, although woodlot plantation had the higher species richness. Therefore, plantation activities by the sustainable implementation of these two practices are the best alternative to restore the biodiversity, richness and conserve soil fertility in the Madhupur Sal forest of Bangladesh.

A comparative study on rapid seismic risk prioritization for reinforced concrete buildings in Antalya, Türkiye

  • Engin Kepenek;Kasim A. Korkmaz;Ziya Gencel
    • Computers and Concrete
    • /
    • v.31 no.3
    • /
    • pp.185-195
    • /
    • 2023
  • Antalya is located south part of minor Asia, one of the biggest cities in Türkiye. As a result of population growth and vast migration to Antalya, many parts of the city that were not suitable for construction due to its geological conditions have become urban areas, and most of these urban areas are full of poorly engineered buildings. Poor engineering has been combined with unplanned urbanization, that causes utter vulnerability to disasters in Antalya. When an earthquake-prone city, Antalya faces with an earthquake risk, fear arises in society. To overcome this problem, it has become necessary to investigate the building stock, expressed in hundreds of thousands, in a fast and reliable way and then perform an urban transformation to create the perception of structural safety. However, the excessive building stock, labor, and economic problems made the implementation stage challenging and revealed the necessity of finding alternative solutions in the field. The present study presents a novel approach for assessment and model based on a rapid visual inspection method to transform areas under earthquake risk in Türkiye. The approach aimed to rank the interventions for decision-making mechanisms by making comparisons in the scale hierarchy. In the present study, to investigate the proposed approach, over 26,000 buildings were examined in Antalya, which is the fifth largest city in Türkiye that has a population of over 2.5 Million. In the results of the study, the risk classification was defined in the framework of building, block, street, neighborhood, and district scales.

Implementation of marine static data collection and DB storage algorithms (해양 정적 데이터 수집 및 DB 저장 알고리즘 구현)

  • Seung-Hwan Choi;Gi-Jo Park;Ki-Sook Chung;Woo-Sug Jung;Kyung-Seok Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.95-101
    • /
    • 2023
  • Globally, the importance of utilization and management of marine spatial information is being maximized, and analyzing such data is emerging as a major driving force for R&D. In Korea, it is expected that collecting marine data from the past to the present and extracting its value will play an important role in the development of science in Korea in the future. In particular, marine static data constitutes a huge big database, and it is necessary to store and store the collected data without loss as high data collection costs and high-level observation techniques are required. In addition, the Disaster Safety Intelligence Convergence Center's "Marine Digital Twin Establishment and Utilization-Based Technology Research" task requires collection and analysis of marine data, so this paper conducts a current status survey of static marine data. And we present a series of algorithms that collect and store them in a database.

Design and Implementation of Biometrics Security System Using photoplethysmogram (광용적맥파를 이용한 생체인식 보안시스템의 설계 및 구현)

  • Kim, Hyen-Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.4
    • /
    • pp.53-60
    • /
    • 2010
  • Biometrics are methods of recognizing a person based on the physiological or behavioral characteristics of his of her body. They are highly secure with little risk of loss or falsification by others. This paper has designed and implemented a security system of biometrics by precisely measuring heartbeat signals at two fingertips and using a photoplethysmogram, which is applicable to biometrics. A performance evaluation has led to the following result. The security system of biometrics for personal authentication which has been designed and implemented by this study has achieved a recognition rate of 90.5%. The security system of biometrics suggested here has merits of time saving and easy accessibility. The system is touch-based and collects the necessary biometrics information by simply touching the machine with fingers, so anyone can utilize the system without any difficulty.

A Study of the C-band Ground-based Radio Navigation System for UAM Cooperative Navigation (UAM 복합 항법을 위한 C 밴드 지상기반 전파 항법 시스템 연구)

  • Kyung-Soon Lee;Yong-Un Cho;Min-Jung Kim;Kyung Heon, Koo
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.4
    • /
    • pp.374-381
    • /
    • 2023
  • This study focuses on the implementation of C-band radio navigation in the 5.03 ~ 5.15 GHz terrestrial band to cooperate with GNSS navigation mainly used in existing UAMs. This is one of the navigation technologies that can fully satisfy the requirements of Title 14 of CFR-135.165. According to the FAA, the use of two or more independent navigation sources for aircraft is proposed for aircraft. This study proceeded with the link budget derivation through radio wave propagation path loss analysis, and antenna shape design for miniaturized Doppler VOR, and DME design with enhanced positional distance resolution compared to conventional aircraft. The ground navigation system which is the result of this study, consists of a VOR/DME ground station and a terminal that can be mounted on UAM. Significant performance was confirmed through the production and testing of each prototype.

A Study on Image Classification using Deep Learning-Based Transfer Learning (딥 러닝 기반의 전이 학습을 이용한 이미지 분류에 관한 연구)

  • Jung-Hee Seo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.413-420
    • /
    • 2023
  • For a long time, researchers have presented excellent results in the field of image retrieval due to many studies on CBIR. However, there is still a semantic gap between these search results for images and human perception. It is still a difficult problem to classify images with a level of human perception using a small number of images. Therefore, this paper proposes an image classification model using deep learning-based transfer learning to minimize the semantic gap between images of people and search systems in image retrieval. As a result of the experiment, the loss rate of the learning model was 0.2451% and the accuracy was 0.8922%. The implementation of the proposed image classification method was able to achieve the desired goal. And in deep learning, it was confirmed that the CNN's transfer learning model method was effective in creating an image database by adding new data.

A Study on the Implementation of Real-Time Marine Deposited Waste Detection AI System and Performance Improvement Method by Data Screening and Class Segmentation (데이터 선별 및 클래스 세분화를 적용한 실시간 해양 침적 쓰레기 감지 AI 시스템 구현과 성능 개선 방법 연구)

  • Wang, Tae-su;Oh, Seyeong;Lee, Hyun-seo;Choi, Donggyu;Jang, Jongwook;Kim, Minyoung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.571-580
    • /
    • 2022
  • Marine deposited waste is a major cause of problems such as a lot of damage and an increase in the estimated amount of garbage due to abandoned fishing grounds caused by ghost fishing. In this paper, we implement a real-time marine deposited waste detection artificial intelligence system to understand the actual conditions of waste fishing gear usage, distribution, loss, and recovery, and study methods for performance improvement. The system was implemented using the yolov5 model, which is an excellent performance model for real-time object detection, and the 'data screening process' and 'class segmentation' method of learning data were applied as performance improvement methods. In conclusion, the object detection results of datasets that do screen unnecessary data or do not subdivide similar items according to characteristics and uses are better than the object recognition results of unscreened datasets and datasets in which classes are subdivided.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

Development of AI-based Smart Agriculture Early Warning System

  • Hyun Sim;Hyunwook Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.67-77
    • /
    • 2023
  • This study represents an innovative research conducted in the smart farm environment, developing a deep learning-based disease and pest detection model and applying it to the Intelligent Internet of Things (IoT) platform to explore new possibilities in the implementation of digital agricultural environments. The core of the research was the integration of the latest ImageNet models such as Pseudo-Labeling, RegNet, EfficientNet, and preprocessing methods to detect various diseases and pests in complex agricultural environments with high accuracy. To this end, ensemble learning techniques were applied to maximize the accuracy and stability of the model, and the model was evaluated using various performance indicators such as mean Average Precision (mAP), precision, recall, accuracy, and box loss. Additionally, the SHAP framework was utilized to gain a deeper understanding of the model's prediction criteria, making the decision-making process more transparent. This analysis provided significant insights into how the model considers various variables to detect diseases and pests.