• Title/Summary/Keyword: Individual Portal

Search Result 59, Processing Time 0.021 seconds

Research on cold-formed steel connections: A state-of-the-art review

  • Qin, Ying;Chen, Zhihua
    • Steel and Composite Structures
    • /
    • v.20 no.1
    • /
    • pp.21-41
    • /
    • 2016
  • Cold-formed steel structures are increasingly attractive due to their benefits of good mechanical performance and constructional advantages. However, this type of construction is still not fully exploited as a result of the acknowledged difficulties involved in forming construction-efficient and cost-effective connections. Furthermore, there is a lack of information on the structural behavior of the cold-formed steel connections. In this study, the research on various cold-formed steel connections was comprehensively reviewed from both fundamental and structural points of view, based on the available experimental and analytical data. It reveals that the current design codes and guidelines for cold-formed steel connections tend to focus more on the individual bearing capacity of the fasteners rather than the overall structural behavior of the connections. Significant future work remains to be conducted on the structural performance of cold-formed steel connection. In addition, extensive previous research has been carried out to propose and evaluate an economical and efficient connection system that is obtained from the conventional connecting techniques used in the hot-rolled industry. These connecting techniques may not be suitable, however, as they have been adopted from hot-rolled steel portal frames due to the thinness of the sheet in cold-formed steels. The review demonstrates that with the increasing demand for cold-formed steel constructions throughout the world, it is crucial to develop an efficient connection system that can be prefabricated and easily assembled on site.

A Study on the Establishment of Standard Elements of Infrastructure Master Data: Focused on Infrastructure Standard Dataset (기반시설 마스터데이터 표준요소 구축에 관한 연구 - 기반시설 표준데이터를 중심으로 -)

  • Sohn, Hyein;Nam, Young Joon
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.28 no.4
    • /
    • pp.35-55
    • /
    • 2017
  • The Master Data is constructed for the wide use within the institution, and it is mainly used in the enterprise. In this research, we have conducted research for the purpose of building master data on infrastructure that can be used by public institutions in the country. To do this, we analyzed individual attributes of the standard data set provided by the public data portal. Among these, we extracted standard elements that match the characteristics of the Master Data. Finally, the standardized elements are verified through the standardization system that is utilized in the country.

Analysis of the supportive care needs of the parents of preterm children in South Korea using big data text-mining: Topic modeling

  • Park, Ji Hyeon;Lee, Hanna;Cho, Haeryun
    • Child Health Nursing Research
    • /
    • v.27 no.1
    • /
    • pp.34-42
    • /
    • 2021
  • Purpose: The purpose of this study was to identify the supportive care needs of parents of preterm children in South Korea using text data from a portal site. Methods: In total, 628 online newspaper articles and 1,966 social network service posts published between January 1 and December 31, 2019 were analyzed. The procedures in this study were conducted in the following order: keyword selection, data collection, morpheme analysis, keyword analysis, and topic modeling. Results: The term "yirundung-yi", which is a native Korean word referring to premature infants, was confirmed to be a useful term for parents. The following four topics were identified as the supportive care needs of parents of preterm children: 1) a vague fear of caring for a baby upon imminent neonatal intensive care unit discharge, 2) real-world difficulties encountered while caring for preterm children, 3) concerns about growth and development problems, and 4) anxiety about possible complications. Conclusion: Supportive care interventions for parents of preterm children should include general parenting methods for babies. A team composed of multidisciplinary experts must support the individual growth and development of preterm children and manage the complications of prematurity using highly accessible media.

Comparison of Personalized Ad Methods on the Internet and Smart Phone Platforms (인터넷과 스마트폰 환경에서의 개인화된 광고 방법론의 비교 분석)

  • Kim, Jun San;Lee, Jae Kyu
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.125-149
    • /
    • 2012
  • As the smart phone is propagating rapidly, the importance of mobile advertisement has also grown. One of the main characteristics of the Internet and smart phone advertising is that they can deliver personalized advertisements to each customer. The smart phone enables the identification of additional personalized information such as the customer's location and the accessibility to the site at any place any time. As the Internet platform becomes richer, firms that offer the ad services via the wired PC Internet and wireless smart phone are seeking various types of personalized ads. However, their service platform and Information and Communication Technology (ICT) platform should be suitable to the characteristics of personalized ads. This research explores various types of personalized ad methods and evaluates their adequacy encompassing four types of ad service platforms (such as search portal, news portal, e-mall servers, and SNS) and two types of ICT platforms (PC Internet and smart phone). To this end, we classified the personalized ads into seven types: three basic types and four composite types. The basic types of ad methods are identified by considering the current activity that the customer is engaged, the individual profile and log history, and the customer's current location or planning location. Four composite types of ad methods are constructed as the combination of these basic types. For those types of ad methods, we evaluate whether each ad method adequately maps with four types of ad service platforms and two types of ICT platforms. We proposed a metric of evaluation and demonstrated the concept with illustrative numbers. Specifically, we analyze and compare personalized ad methods in three ways. Firstly, the possibility of implementing a personalized ad method on the platform is analyzed to confirm the degree of suitability. Secondly, the value of personalized ad method is analyzed based on the customer accessibility. Lastly, expected effectiveness for each personalized ad method is computed by multiplying the possibility and the value. Through this kind of analysis, the ad service providers as well as advertising companies can evaluate what kinds of personalized ad methods and platforms are possible and suitable to maximize their ad effectiveness on the Internet and smart phone platforms.

  • PDF

Development of Image-map Generation and Visualization System Based on UAV for Real-time Disaster Monitoring (실시간 재난 모니터링을 위한 무인항공기 기반 지도생성 및 가시화 시스템 구축)

  • Cheon, Jangwoo;Choi, Kyoungah;Lee, Impyeong
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.2_2
    • /
    • pp.407-418
    • /
    • 2018
  • The frequency and risk of disasters are increasing due to environmental and social factors. In order to respond effectively to disasters that occur unexpectedly, it is very important to quickly obtain up-to-date information about target area. It is possible to intuitively judge the situation about the area through the image-map generated at high speed, so that it can cope with disaster quickly and effectively. In this study, we propose an image-map generation and visualization system from UAV images for real-time disaster monitoring. The proposed system consists of aerial segment and ground segment. In the aerial segment, the UAV system acquires the sensory data from digital camera and GPS/IMU sensor. Communication module transmits it to the ground server in real time. In the ground segment, the transmitted sensor data are processed to generate image-maps and the image-maps are visualized on the geo-portal. We conducted experiment to check the accuracy of the image-map using the system. Check points were obtained through ground survey in the data acquisition area. When calculating the difference between adjacent image maps, the relative accuracy was 1.58 m. We confirmed the absolute accuracy of the image map for the position measured from the individual image map. It is confirmed that the map is matched to the existing map with an absolute accuracy of 0.75 m. We confirmed the processing time of each step until the visualization of the image-map. When the image-map was generated with GSD 10 cm, it took 1.67 seconds to visualize. It is expected that the proposed system can be applied to real - time monitoring for disaster response.

Design and Implementation of Crime Prevention System Targeting Women by Using Public BigData (공공 빅데이터를 이용한 여성 대상 범죄 예방 시스템의 설계 및 구현)

  • Ko, Sung-Wook;Oh, Su-Bin;Baek, Se-In;Park, Hyeok-Ju;Park, Mee-Hwa;Lee, Kang-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.561-564
    • /
    • 2016
  • If using crime map which represents criminal section that violent crimes targeting women frequently happened, the police could prevent additional crimes by positioning themselves intensively in expected crime zones and each individual could avoid being damaged by referring information of criminal zones. In this paper, by analyzing crimes targeting women and offender information which is provided in public-opened datum portal, we suppose a system which prevents crimes that calculates locational danger and, by considering location and age group of users, provides user-customized information of danger. By crawling the criminals datum which is provided in public-opened datum portal, It collects them. About the areas which happened sexual crimes, calculating danger of crime based on statistical crime information including criminal information, residence of offenders, areas which happened sexual crimes, sentences and the number of crime, this system is able to visualize the areas which sexual crimes happened based on information of danger grade representing on user's location. The score of danger calculated in location unit can provide criminal information according to location and ages of users by interacting GIS.

  • PDF

National Agenda Service Model Development Research of Policy Information Portal of National Sejong Library (국립세종도서관 정책정보포털 국정과제 서비스 모형개발 연구)

  • Younghee, Noh;Inho, Chang;Hyojung, Sim
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.4
    • /
    • pp.73-92
    • /
    • 2022
  • This study intends to design a model that can effectively service policy data necessary for the implementation of new national agenda in order to provide high-quality policy information services that go beyond those of the existing Policy Information Portal (POINT) of National Sejong Library. To this end, it was determined that providing an integrated search environment, in lieu of data search through individual access, was necessary. Subsequently, four possible models for a national agenda service model were presented. First, designing a computerized system for both interface and electronic information source aspects was proposed for the national agenda service system operation. Second, designing the Linked Open Data system and the time-series service system for national policy information, providing the translation service of overseas original data, and securing the researcher's desired data were presented for the national agenda service information source operation. Third, strengthening public relations for policy users, building and promoting the site brand, operating SNS channels, and reinforcing the activation of auxiliary materials and the accessibility of external services were proposed for public relations of national agenda service. Fourth, expanding the information network with Open API, cloud service, and overseas libraries was proposed for collaborating and cooperating with the agenda service.

Prediction Model of Real Estate ROI with the LSTM Model based on AI and Bigdata

  • Lee, Jeong-hyun;Kim, Hoo-bin;Shim, Gyo-eon
    • International journal of advanced smart convergence
    • /
    • v.11 no.1
    • /
    • pp.19-27
    • /
    • 2022
  • Across the world, 'housing' comprises a significant portion of wealth and assets. For this reason, fluctuations in real estate prices are highly sensitive issues to individual households. In Korea, housing prices have steadily increased over the years, and thus many Koreans view the real estate market as an effective channel for their investments. However, if one purchases a real estate property for the purpose of investing, then there are several risks involved when prices begin to fluctuate. The purpose of this study is to design a real estate price 'return rate' prediction model to help mitigate the risks involved with real estate investments and promote reasonable real estate purchases. Various approaches are explored to develop a model capable of predicting real estate prices based on an understanding of the immovability of the real estate market. This study employs the LSTM method, which is based on artificial intelligence and deep learning, to predict real estate prices and validate the model. LSTM networks are based on recurrent neural networks (RNN) but add cell states (which act as a type of conveyer belt) to the hidden states. LSTM networks are able to obtain cell states and hidden states in a recursive manner. Data on the actual trading prices of apartments in autonomous districts between January 2006 and December 2019 are collected from the Actual Trading Price Disclosure System of the Ministry of Land, Infrastructure and Transport (MOLIT). Additionally, basic data on apartments and commercial buildings are collected from the Public Data Portal and Seoul Metropolitan Government's data portal. The collected actual trading price data are scaled to monthly average trading amounts, and each data entry is pre-processed according to address to produce 168 data entries. An LSTM model for return rate prediction is prepared based on a time series dataset where the training period is set as April 2015~August 2017 (29 months), the validation period is set as September 2017~September 2018 (13 months), and the test period is set as December 2018~December 2019 (13 months). The results of the return rate prediction study are as follows. First, the model achieved a prediction similarity level of almost 76%. After collecting time series data and preparing the final prediction model, it was confirmed that 76% of models could be achieved. All in all, the results demonstrate the reliability of the LSTM-based model for return rate prediction.

Protective Way Improvement of a Crime Victim's Rights of Portrait (범죄 피해자의 초상권보호 개선방안)

  • Joen, Chan-Hui
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.286-298
    • /
    • 2009
  • Became large a problem we were productive movement of information became large and occurring to diffusions of development of public media and Internet use. While the Internet became a generalization, public media had more influences and risks, and a crime to abuse anonymity became large in cyber space. In addition, damage is becoming expanded reproduction that infringe of ' crime victim's rights of portrait'. The point that is most important in order to improve these points is recognition regarding the special situation of crime victim, and the ethic consciousness and independent operation regulation and regulation system that these point was taken into consideration in the public media and Internet operation that are an information producer is necessary, and Internet portal shall be included like Internet newspapers to the arbitration object of the Press Arbitration Commission. Also, a legal system regarding personal responsibility shall have for protection of a crime victim's rights of portrait by personal information activity for protection in cyber space. Suggest to a portrait of a crime victim, and an individual and social rights security effort are required for activation regarding an infringement relief system.

App-based 2-channel User Authentication Scheme for Multiple Application Systems (다중 응용시스템용 앱기반 2-채널 사용자 인증방안)

  • Song, Tae-Gi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.141-148
    • /
    • 2018
  • Currently, the user authentication technology used by users to access multiple applications within an organization is being applied with ID/PW-based SSO technology. These user authentication methods have the fundamental disadvantages of ID/PW and SSO. This means that security vulnerabilities in ID/PW can lead to periodic changes in PWs and limits on the number of incorrect PW inputs, and SSO adds high cost of the SSO server, which centrally stores the authentication information, etc. There is also a fundamental vulnerability that allows others to freely use other people's applications when they leave the portal application screen with SSO. In this paper, we proposed an app-based 2-channel authentication scheme to fundamentally eliminate problems with existing ID/PW-based SSO user authentication technologies. To this end, it distributed centralized user authentication information that is stored on SSO server to each individual's smartphone. In addition, when users access a particular application, they are required to be authenticated through their own smartphone apps.