• Title/Summary/Keyword: Information Capability

Search Result 3,393, Processing Time 0.028 seconds

Agricultural Technology Dissemination System in Africa and the ODA Implications for Korea (아프리카의 농업기술보급체계와 농업기술협력 전략 -에티오피아와 우간다를 중심으로-)

  • Hwang, Jae Hee;Woo, Soo Gon;Lee, Seong Woo
    • Journal of Agricultural Extension & Community Development
    • /
    • v.20 no.4
    • /
    • pp.1045-1078
    • /
    • 2013
  • The purpose of the present study is to improve the effectiveness of Korea's ODA projects on agricultural technology transfer to Africa. This study investigates agricultural extension system of African countries and provides a direction of the systematic strategies of the Korean ODAs on agricultural technology. This study pays particular attention on Africanization of agricultural technology transfer of the Korean ODA strategies. Unlike the previous studies focusing mainly on micro level investigation on the ODA strategy development, the present study incorporates the agricultural technology dissemination system of Ethiopia and Uganda in a macro perspective to develop a desirable form of the ODA strategy. The findings illustrate that the technology dissemination systems of the case countries have different characteristics depending on the function and organization of extension agency. And their functional capability and role segmentation by the extension agency are differently configured, too. In case of Ethiopia, top-down structure for the agricultural extension system has been built. Farmers' group and field agent of the information delivery system has expanded their participation into the system. However, we also find that the system of Ethiopia still lacks effective use of its existing technology, since it puts more emphasis on management aspects than improvement of agricultural productivity for farmers. On the other hand, even though Uganda has established participatory extension system that encompasses the entire agencies of the extension system, government efforts to enhance the extension system are still concentrated on expanding research functions rather than technical dissemination. The results imply that promoting and strengthening localization of the ODA strategy has to be developed to make localization policy of the Korean ODA. The present study concludes with some specific policy implications for necessary conditions of the agricultural development in African countries.

A preliminary study for development of an automatic incident detection system on CCTV in tunnels based on a machine learning algorithm (기계학습(machine learning) 기반 터널 영상유고 자동 감지 시스템 개발을 위한 사전검토 연구)

  • Shin, Hyu-Soung;Kim, Dong-Gyou;Yim, Min-Jin;Lee, Kyu-Beom;Oh, Young-Sup
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.19 no.1
    • /
    • pp.95-107
    • /
    • 2017
  • In this study, a preliminary study was undertaken for development of a tunnel incident automatic detection system based on a machine learning algorithm which is to detect a number of incidents taking place in tunnel in real time and also to be able to identify the type of incident. Two road sites where CCTVs are operating have been selected and a part of CCTV images are treated to produce sets of training data. The data sets are composed of position and time information of moving objects on CCTV screen which are extracted by initially detecting and tracking of incoming objects into CCTV screen by using a conventional image processing technique available in this study. And the data sets are matched with 6 categories of events such as lane change, stoping, etc which are also involved in the training data sets. The training data are learnt by a resilience neural network where two hidden layers are applied and 9 architectural models are set up for parametric studies, from which the architectural model, 300(first hidden layer)-150(second hidden layer) is found to be optimum in highest accuracy with respect to training data as well as testing data not used for training. From this study, it was shown that the highly variable and complex traffic and incident features could be well identified without any definition of feature regulation by using a concept of machine learning. In addition, detection capability and accuracy of the machine learning based system will be automatically enhanced as much as big data of CCTV images in tunnel becomes rich.

A Study of Design Education for the Public and its Development Direction (대중의 디자인교육문제와 발전방향에 관한 연구)

  • Cho, Kyu-Myung;Kim, Tae-Chul;Kim, Kyung-Sook
    • Archives of design research
    • /
    • v.18 no.1 s.59
    • /
    • pp.91-104
    • /
    • 2005
  • In the past, the design education focused on the technique and skill to satisfy the production and consumption activities of a corporation based on beauty and practicality in the industrial age. Now, it's time to switchover to a life-quality enhancing education by harmonizing and meeting the public's physical and mental needs because design education is a character education which enhances the quality of life by uplifting people's aesthetic sense. This paper has emphasized on the importance of public education of design through the theoretical investigation on social environmental changes caused by the emergence of information society,,education problems, public education, and the necessity of design education. The reason why this study should be done has been suggested by investigating the necessity of this research and bringing up the issue. Furthermore, the current status and problems of public education on design have been analyzed. Then, based on the result, the development direction of design education has been suggested. This study can be concluded as follows: First, the design education should change from its vertical structure to a horizontal one. It should be widely spread to the public, getting off from its privatization for a certain group. Second, designers and the public should correct their way of thinking about design. The ordinary people as well as the designers should cultivate their capability to find and take care of design related issues in their everyday lives. Third, all people should be the subject of design education for the public. As a part of cultural education on the public's aesthetic sense, design education should be reborn as a field of study in which a sound public culture can be developed by the integration of human life and culture, exceeding the limit of school curriculum.

  • PDF

A Study of Tasseled Cap Transformation Coefficient for the Geostationary Ocean Color Imager (GOCI) (정지궤도 천리안위성 해양관측센서 GOCI의 Tasseled Cap 변환계수 산출연구)

  • Shin, Ji-Sun;Park, Wook;Won, Joong-Sun
    • Korean Journal of Remote Sensing
    • /
    • v.30 no.2
    • /
    • pp.275-292
    • /
    • 2014
  • The objective of this study is to determine Tasseled Cap Transformation (TCT) coefficients for the Geostationary Ocean Color Imager (GOCI). TCT is traditional method of analyzing the characteristics of the land area from multi spectral sensor data. TCT coefficients for a new sensor must be estimated individually because of different sensor characteristics of each sensor. Although the primary objective of the GOCI is for ocean color study, one half of the scene covers land area with typical land observing channels in Visible-Near InfraRed (VNIR). The GOCI has a unique capability to acquire eight scenes per day. This advantage of high temporal resolution can be utilized for detecting daily variation of land surface. The GOCI TCT offers a great potential for application in near-real time analysis and interpretation of land cover characteristics. TCT generally represents information of "Brightness", "Greenness" and "Wetness". However, in the case of the GOCI is not able to provide "Wetness" due to lack of ShortWave InfraRed (SWIR) band. To maximize the utilization of high temporal resolution, "Wetness" should be provided. In order to obtain "Wetness", the linear regression method was used to align the GOCI Principal Component Analysis (PCA) space with the MODIS TCT space. The GOCI TCT coefficients obtained by this method have different values according to observation time due to the characteristics of geostationary earth orbit. To examine these differences, the correlation between the GOCI TCT and the MODIS TCT were compared. As a result, while the GOCI TCT coefficients of "Brightness" and "Greenness" were selected at 4h, the GOCI TCT coefficient of "Wetness" was selected at 2h. To assess the adequacy of the resulting GOCI TCT coefficients, the GOCI TCT data were compared to the MODIS TCT image and several land parameters. The land cover classification of the GOCI TCT image was expressed more precisely than the MODIS TCT image. The distribution of land cover classification of the GOCI TCT space showed meaningful results. Also, "Brightness", "Greenness", and "Wetness" of the GOCI TCT data showed a relatively high correlation with Albedo ($R^2$ = 0.75), Normalized Difference Vegetation Index (NDVI) ($R^2$ = 0.97), and Normalized Difference Moisture Index (NDMI) ($R^2$ = 0.77), respectively. These results indicate the suitability of the GOCI TCT coefficients.

A Study on Korea Coast Guard Intelligence Centered on legal and Institutional comparison to other organizations, domestic and international (해양경비안전본부 정보활동의 법적·제도적 측면의 문제점 분석 및 개선방안 연구)

  • Soon, Gil-Tae
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.85-116
    • /
    • 2015
  • Found in 23 Dec 1953 to cope with illegal fishing of foreign ships and coastal guard duty, Korea Coast Guard was re-organized as an office under Ministry of Public Safety since the outbreak of sinking of passenger ship "Sewolho". In the course of re-organization, intelligence and investigation duty were transferred to Police Department except "Cases happened on the sea". But the definition of intelligence duty is vague and there are lots of disputes over the jurisdiction and range of activities. With this situation in consideration, the object of this study is to analyse legal and institutional characteristic of KCG Intelligence, to compare them to that of Police Department, foreign agencies like Japan Coast Guard and US Coast Guard, to expose the limit and to suggest solution. To summarize the conclusion, firstly, in the legal side, there is no legal basis on intelligence in [The Government Organization Act], no regulation for mission, weak basis in application act. Secondly, in the institutional side, stated in the minor chapter of [The Government Organization Act], 'the cases happened on sea' is a quite vague definition, while guard, safety, maritime pollution duty falls under 'on the sea' category, intelligence fell to 'Cases happened on the sea' causing coast guard duty and intelligence have different range. In addition, reduced organization and it's manpower led to ineffective intelligence activities. In the case of Police Department, there is definite lines on 'administration concerning public security' in [The Government Organization Act], specified the range of intelligence activities as 'collect, make and distribute information concerning public security' which made the range of main duty and intelligence identical. Japanese and US coast guards also have intelligence branch and performing activities appropriate for the main missions of the organizations. To have superiority in the regional sea, neighboring countries Japan and China are strengthening on maritime power, China has launched new coast guard bureau, Japan has given the coast guard officers to have police authority in the regional islands, and to support the objectives, specialized intelligence is organized and under development. To secure maritime sovereignty and enhance mission capability in maritime safety duty, it is strongly recommended that the KCG intelligence should have concrete legal basis, strengthen the organization and mission, reinforce manpower, and ensure specialized training administrative system.

  • PDF

Structural Behavior of Mixed $LiMn_2O_4-LiNi_{1/3}Co_{1/3}Mn_{1/3}O_2$ Cathode in Li-ion Cells during Electrochemical Cycling

  • Yun, Won-Seop;Lee, Sang-U
    • Proceedings of the Materials Research Society of Korea Conference
    • /
    • 2011.05a
    • /
    • pp.5-5
    • /
    • 2011
  • The research and development of hybrid electric vehicle (HEV), plug-in hybrid electric vehicle (PHEV) and electric vehicle (EV) are intensified due to the energy crisis and environmental concerns. In order to meet the challenging requirements of powering HEV, PHEV and EV, the current lithium battery technology needs to be significantly improved in terms of the cost, safety, power and energy density, as well as the calendar and cycle life. One new technology being developed is the utilization of composite cathode by mixing two different types of insertion compounds [e.g., spinel $LiMn_2O_4$ and layered $LiMO_2$ (M=Ni, Co, and Mn)]. Recently, some studies on mixing two different types of cathode materials to make a composite cathode have been reported, which were aimed at reducing cost and improving self-discharge. Numata et al. reported that when stored in a sealed can together with electrolyte at $80^{\circ}C$ for 10 days, the concentrations of both HF and $Mn^{2+}$ were lower in the can containing $LiMn_2O_4$ blended with $LiNi_{0.8}Co_{0.2}O_2$ than that containing $LiMn_2O_4$ only. That reports clearly showed that this blending technique can prevent the decline in capacity caused by cycling or storage at elevated temperatures. However, not much work has been reported on the charge-discharge characteristics and related structural phase transitions for these composite cathodes. In this presentation, we will report our in situ x-ray diffraction studies on this mixed composite cathode material during charge-discharge cycling. The mixed cathodes were incorporated into in situ XRD cells with a Li foil anode, a Celgard separator, and a 1M $LiPF_6$ electrolyte in a 1 : 1 EC : DMC solvent (LP 30 from EM Industries, Inc.). For in situ XRD cell, Mylar windows were used as has been described in detail elsewhere. All of these in situ XRD spectra were collected on beam line X18A at National Synchrotron Light Source (NSLS) at Brookhaven National Laboratory using two different detectors. One is a conventional scintillation detector with data collection at 0.02 degree in two theta angle for each step. The other is a wide angle position sensitive detector (PSD). The wavelengths used were 1.1950 ${\AA}$ for the scintillation detector and 0.9999 A for the PSD. The newly installed PSD at beam line X18A of NSLS can collect XRD patterns as short as a few minutes covering $90^{\circ}$ of two theta angles simultaneously with good signal to noise ratio. It significantly reduced the data collection time for each scan, giving us a great advantage in studying the phase transition in real time. The two theta angles of all the XRD spectra presented in this paper have been recalculated and converted to corresponding angles for ${\lambda}=1.54\;{\AA}$, which is the wavelength of conventional x-ray tube source with Cu-$k{\alpha}$ radiation, for easy comparison with data in other literatures. The structural changes of the composite cathode made by mixing spinel $LiMn_2O_4$ and layered $Li-Ni_{1/3}Co_{1/3}Mn_{1/3}O_2$ in 1 : 1 wt% in both Li-half and Li-ion cells during charge/discharge are studied by in situ XRD. During the first charge up to ~5.2 V vs. $Li/Li^+$, the in situ XRD spectra for the composite cathode in the Li-half cell track the structural changes of each component. At the early stage of charge, the lithium extraction takes place in the $LiNi_{1/3}Co_{1/3}Mn_{1/3}O_2$ component only. When the cell voltage reaches at ~4.0 V vs. $Li/Li^+$, lithium extraction from the spinel $LiMn_2O_4$ component starts and becomes the major contributor for the cell capacity due to the higher rate capability of $LiMn_2O_4$. When the voltage passed 4.3 V, the major structural changes are from the $LiNi_{1/3}Co_{1/3}Mn_{1/3}O_2$ component, while the $LiMn_2O_4$ component is almost unchanged. In the Li-ion cell using a MCMB anode and a composite cathode cycled between 2.5 V and 4.2 V, the structural changes are dominated by the spinel $LiMn_2O_4$ component, with much less changes in the layered $LiNi_{1/3}Co_{1/3}Mn_{1/3}O_2$ component, comparing with the Li-half cell results. These results give us valuable information about the structural changes relating to the contributions of each individual component to the cell capacity at certain charge/discharge state, which are helpful in designing and optimizing the composite cathode using spinel- and layered-type materials for Li-ion battery research. More detailed discussion will be presented at the meeting.

  • PDF

Private Income Transfers and Old-Age Income Security (사적소득이전과 노후소득보장)

  • Kim, Hisam
    • KDI Journal of Economic Policy
    • /
    • v.30 no.1
    • /
    • pp.71-130
    • /
    • 2008
  • Using data from the Korean Labor & Income Panel Study (KLIPS), this study investigates private income transfers in Korea, where adult children have undertaken the most responsibility of supporting their elderly parents without well-established social safety net for the elderly. According to the KLIPS data, three out of five households provided some type of support for their aged parents and two out of five households of the elderly received financial support from their adult children on a regular base. However, the private income transfers in Korea are not enough to alleviate the impact of the fall in the earned income of those who retired and are approaching an age of needing financial assistance from external source. The monthly income of those at least the age of 75, even with the earning of their spouses, is below the staggering amount of 450,000 won, which indicates that the elderly in Korea are at high risk of poverty. In order to analyze microeconomic factors affecting the private income transfers to the elderly parents, the following three samples extracted from the KLIPS data are used: a sample of respondents of age 50 or older with detailed information on their financial status; a five-year household panel sample in which their unobserved family-specific and time-invariant characteristics can be controlled by the fixed-effects model; and a sample of the younger split-off household in which characteristics of both the elderly household and their adult children household can be controlled simultaneously. The results of estimating private income transfer models using these samples can be summarized as follows. First, the dominant motive lies on the children-to-parent altruistic relationship. Additionally, another is based on exchange motive, which is paid to the elderly parents who take care of their grandchildren. Second, the amount of private income transfers has negative correlation with the income of the elderly parents, while being positively correlated with the income of the adult children. However, its income elasticity is not that high. Third, the amount of private income transfers shows a pattern of reaching the highest level when the elderly parents are in the age of 75 years old, following a decreasing pattern thereafter. Fourth, public assistance, such as the National Basic Livelihood Security benefit, appears to crowd out private transfers. Private transfers have fared better than public transfers in alleviating elderly poverty, but the role of public transfers has been increasing rapidly since the welfare expansion after the financial crisis in the late 1990s, so that one of four elderly people depends on public transfers as their main income source in 2003. As of the same year, however, there existed and occupied 12% of the elderly households those who seemed eligible for the National Basic Livelihood benefit but did not receive any public assistance. To remove elderly poverty, government may need to improve welfare delivery system as well as to increase welfare budget for the poor. In the face of persistent elderly poverty and increasing demand for public support for the elderly, which will lead to increasing government debt, welfare policy needs targeting toward the neediest rather than expanding universal benefits that have less effect of income redistribution and heavier cost. Identifying every disadvantaged elderly in dire need for economic support and providing them with the basic livelihood security would be the most important and imminent responsibility that we all should assume to prepare for the growing aged population, and this also should accompany measures to utilize the elderly workforce with enough capability and strong will to work.

A METHOD OF CAPABILITY EVALUATION FOR KOREAN PADDY SOILS -Part 2. The rice yield prediction by soil fertility constituents and other characters (한국(韓國) 답토양(畓土壤)의 생산력(生産力) 평가방법에 관한 연구 -2 보(報)·비옥도(肥沃度) 구성인자(構成因子) 및 기타(其他) 특성(特性)에 의(依)한 쌀수확량(收穫量)의 추정(推定))

  • Hong, Ki-Chang;Maeng, Do-Won;Kazutake, Kyuma;Hisao, Furukawa;Suh, Yoon-Soo
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.12 no.1
    • /
    • pp.15-23
    • /
    • 1979
  • In the first paper of the series the five soil fertility factors were evaluated by means of principal component analysis and varimax method. They are interpreted as representing, 1) skeletal available phosporus status, 2) organnic matter status, 3) salt status 4) base status, and 5) free oxide status. In order to resynthesize such fragmented information for the overall soil fertility evaluation, the method of multiple regression analysis was adopted, using the five factor scores and yield data for Korean paddy soils as independent and dependent variables respectively. As test of linear models with different combinations of independent variables the results of t-test of regression coefficient were revealed that the organic matter status (FII) has no relevance to the yield of paddy and that the free oxides and salt supply has by it self only an insignificant contribution to the yield. The multiple correlation coefficient (R) revealed its multiple regression analysis was as low as 0.43. Introduction of quadratic terms to the linear model bettered the result. Thus multiple correlation coefficient (R) was increased as 0.59. Therefore, a coefficient of determination 0.35 was obtained by a quadratic model with interaction terms among the five fertility constituents. Generally we think that the fertility factor has more contribution to raise the rice yield in paddy and that the failure of yield prediction by fertility factor scores was caused by one of follows; 1) the roughness of the yield inspection, and 2) missextraction of fertility constituents. The second step in this study, assuming that the residuals by multiple regression analysis were due to factors other than soil fertility, we can now proceed to predicting the yield from the field characters with the classified fertility groups by means of Hayashi's theory of quantification No. 1. Such variables as fertility groups (FTYG), water availability (WATER), soil drainage (DRNG), climatic zone (CLIZ), surface soil's stickiness (STCKT), surface soil's dry consistence (DCNST), and surface soil's texture (FTEXT) are taken up as the explanatory variables. The quantification appears reasonable; the well to extremely well in soil drainage, very sticky of surface soil, inefficiency in water availability, coarse texture, and very hard to extremely hard dry consistence in soil are detrimental to the rice yield. The R was as high as 0.90 for the set of variables. But the given explanatory variables in this study were not quite effective in explaining rice yield. The method developed seems to be promising only if properly collected data are available. Conditions that should be satisfied in the yield inspection obtained from common cultivator for the purpose of deriving a prediction equation were put forward.

  • PDF

A Design and Implementation of Multimedia Retrieval System based on MAF(Multimedia Application File Format) (MAF(Multimedia Application File Format) 기반 멀티미디어 검색 시스템의 설계 및 구현)

  • Gang Young-Mo;Park Joo-Hyoun;Bang Hyung-Gin;Nang Jong-Ho;Kim Hyung-Chul
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.9
    • /
    • pp.574-584
    • /
    • 2006
  • Recently, ISO/IEC 23000 (also known as 'MPEG-A') has proposed a new file format called 'MAF(Multimedia Application File Format)[1]' which provides a capability of integrating/storing the widely-used compression standards for audio and video and the metadata in MPEG-7 form into a single file format. However, it is still very hard to verify the usefulness of MPEG-A in the real applications because there is still no real system that fully implements this standard. In this thesis, a design and implementation of a multimedia retrieval system based on MPEG-A standard on PC and mobile device is presented. Furthermore, an extension of MPEG-A for describing the metadata for video is also proposed. It is selected and defined as a subset of MPEG-7 MDS[4] and TV-anytime[5] for video that is useful and manageable in the mobile environments. In order to design the multimedia retrieval system based on MPEG-A, we define the system requirements in terms of portability, extensibility, compatibility, adaptability, efficiency. Based on these requirements, we design the system which composed of 3 layers: Application Layer, Middleware Layer, Platform Layer. The proposed system consists of two sub-parts, client-part and server-part. The client-part consists of MAF authoring tool, MAP player tool and MAF searching tool which allow users to create, play and search the MAF files, respectively. The server-part is composed of modules to store and manage the MAF files and metadata extracted from MAF files. We show the usefulness of the proposed system by implementing the client system both on MS-Windows platform on desk-top computer and WIPI platform on mobile phone, and validate whether it to satisfy all the system requirements. The proposed system can be used to verify the specification in the MPEG-A, and to proves the usefulness of MPEG-A in the real application.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF