• Title/Summary/Keyword: Information visualization

Search Result 2,133, Processing Time 0.031 seconds

Visualized Determination for Installation Location of Monitoring Devices using CPTED (CPTED기법을 통한 모니터링 시스템 설치위치 시각화 결정법)

  • Kim, Joohwan;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.145-150
    • /
    • 2015
  • Needs about safety of residents are important in urbanized society, elderly and small-size family. People are looking for safety information system and device of CPTED. That is, Needs and Installations of CCTV increased steadily. But, scientific analysis about validity, systematic plan and location of security CCTV is nonexistent. It is simply put these devised in more demanded areas. It has limits to look for safety of residents by increasing density of CCTVs. One of the characteristics of crime is clustering and stong interconnectivity. So, exploratory spatial data of crime is geo-coded using 2 years data and carried out cluster analysis and space statistical analysis through GIS space analysis by dividing 18 variables into social economy, urban space, crime prevention facility and crime occurrence index. The result of analysis shows cluster of 5 major crimes, theft, violence and sexual violence by Nearest Neighbor distance analysis and Ripley's K function. It also shows strong crime interconnectivity through criminal correlation analysis. In case of finding criminal cluster, you can find criminal hotspot. So, in this study I found concept of hotspot and considered technique about selection of hotspot. And then, selected hotspot about 5 major crimes, theft, violence and sexual violence through Nearest Neighbor Hierarchical Spatial Clustering.

A Study on the Product differentiation Process by the Structuring of Design Factors (디자인 인자의 구조화에 의한 제품 차별화 프로세스 연구)

  • Kim, Hyun
    • Archives of design research
    • /
    • v.13 no.2
    • /
    • pp.73-80
    • /
    • 2000
  • In this study design information was separately defined form general product information and thus factors reflected in product design ion the basis of values and roles were extracted. The following is a classification of 5 different types of design factors divided according to their disposition. ·Innovation factor - element which previously did not exist or element related with explicit reformation ·Open factor - active element which not only improves current performance but also induces new functions through understanding of usage situations and new possibilities. ·Anterior factor - element which prolongs and develops the early development requirements of products through C.I. and P.I. related elements and characteristics of previous models and design strategy. Self-evidence factor - element related with function visualization through product structure which may make possible the consolidation of shape and function. Rigid factor - element, based on the human factors engineering, related with the safety and efficiency of users. This classification was obtained by defining major characteristics of products considering the target consumer and market characteristics. In this classification factor structuring design process which efficiently deducted a differentiated final product by synthesizing factors of higher importance as dominant factors was proposed. With this kind of factor structuring process, product differentiation may be achieved by bestowing individual characteristics to each product by combining design dominant factors associated with the product for a specific purpose from the stages of product concept development. Moreover, this may be used as an approach to actively correspond to the various and specific demands of the comsumer.

  • PDF

An elastic distributed parallel Hadoop system for bigdata platform and distributed inference engines (동적 분산병렬 하둡시스템 및 분산추론기에 응용한 서버가상화 빅데이터 플랫폼)

  • Song, Dong Ho;Shin, Ji Ae;In, Yean Jin;Lee, Wan Gon;Lee, Kang Se
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.5
    • /
    • pp.1129-1139
    • /
    • 2015
  • Inference process generates additional triples from knowledge represented in RDF triples of semantic web technology. Tens of million of triples as an initial big data and the additionally inferred triples become a knowledge base for applications such as QA(question&answer) system. The inference engine requires more computing resources to process the triples generated while inferencing. The additional computing resources supplied by underlying resource pool in cloud computing can shorten the execution time. This paper addresses an algorithm to allocate the number of computing nodes "elastically" at runtime on Hadoop, depending on the size of knowledge data fed. The model proposed in this paper is composed of the layered architecture: the top layer for applications, the middle layer for distributed parallel inference engine to process the triples, and lower layer for elastic Hadoop and server visualization. System algorithms and test data are analyzed and discussed in this paper. The model hast the benefit that rich legacy Hadoop applications can be run faster on this system without any modification.

Optimal Input Database Construction for 3D Dredging Quantification (3차원 준설물량 산출을 위한 최적의 입력DB 구축방안)

  • Gang, ByeungJu;Hwang, Bumsik;Park, Heonwoo;Cho, Wanjei
    • Journal of the Korean GEO-environmental Society
    • /
    • v.19 no.5
    • /
    • pp.23-31
    • /
    • 2018
  • The dredging project became more important with the recent construction of off shore structures and reclamation projects. Accordingly, more exact quantitative estimation of the dredged amount should be required. The sub-sea ground information can be obtained generally by the boring investigation and the dredged amount can be estimated based on the depth or the deeper bound of a ceratin layer via 3D visualization program. During the estimation process, the input DB should be constructed with 1D elevation information from boring investigation for the spatially approximated distribution of a deeper bound of each ground layer. The input DB can be varied with the application of the borings and the approximation targets. Therefore, the 3D visualized ground profile and dredged amounts are compared on the actively dredged sites, vicinity of Saemangeum area and outer port area in Gunsan with regard to the input DB construction methods. Conclusively, the input DB based on the spatially approximated depths show higher precision results and more reasonable 3D visualized ground profiles.

Analysis of Trends in Science and Technology using Keyword Network Analysis (키워드 네트워크 분석을 활용한 과학기술동향 분석)

  • Park, Ju Seop;Kim, Na Rang;Han, Eun Jung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.2
    • /
    • pp.63-73
    • /
    • 2018
  • Academia and research institutes mainly use qualitative methods that rely on expert judgments to understand and predict research trends and science and technology trends. Since such a technique has the disadvantage of requiring much time and money, in this study, science and technology trends were predicted using keyword network analysis. To that end, 13,618 AI (Artificial Intelligence) patent abstracts were analyzed using keyword network analysis in three separate lots based on the period of the submission of each abstract: analysis period 1 (January 1, 2002 - December 31, 2006), analysis period 2 (January 1, 2007 - December 31, 2011), and analysis period 3 (January 1, 2012 - December 31, 2016). According to the results of frequency analyses, keywords related to methods in the field of AI application appeared more frequently as time passed from analysis period 1 to analysis period 3. In keyword network analyses, the connectivity between keywords related to methods in the field of AI application and other keywords increased over time. In addition, when the connected keywords that showed increasing or decreasing trends during the entire analysis period were analyzed, it could be seen that the connectivity to methods and management in the field of AI application was strengthened while the connectivity to the field of basic science and technology was weakened. According to analysis of keyword connection centrality, the centrality value of the field of AI application increased over time. According to analysis of keyword mediation centrality during analysis period 3, keywords related to methodologies in the field of AI application showed the highest mediation value. Therefore, it is expected that methods in the field of AI application will play the role of powerful intermediaries in AI hereafter. The technique presented in this paper can be employed in the excavation of tasks related to regional innovation or in fields such as social issue visualization.

A Study on the Pattern Analysis Method using the User Log on the CMS (CMS의 사용자 로그를 이용한 패턴 분석 방법 연구)

  • Moon, Dong-Yeol;Park, Koo-Rack;Kim, Dong-Hyun;Jung, Jin-Young
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.275-281
    • /
    • 2016
  • In modern society, which boomed it became easier to obtain the necessary information to the emergence of a variety of smart devices. Due to this, the frequency of using the content based on the Web is growing rapidly. In addition, companies are turning into a production and modify the content using the CMS under the web-based. It can be a very important part to provide users with the content. Currently web services are designing a UI to the device and provided. To improve the ease of use, they are enhancing services only by survey and analysis of the patterns of all users. Most are designed without considering the UX only in the technical aspects. In this paper, to break the limits that apply to all users of the Web service pattern analysis, we propose a visualization system via the animation based on the individual user's movement patterns and usage patterns. Through this convergence is expected to be able to transform the web from the central manager to the user UX and the planning aspects researchers.

An Empirical Evaluation Scheme for Pedestrian Environment by Integrated Approach to TOD Planning Elements (TOD 계획 요소의 통합적 접근을 통한 친보행 환경의 평가 방안)

  • Joo, Yong-Jin;Ha, Eun-Ji;Jun, Chul-Min
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.15-25
    • /
    • 2012
  • In order to resolve transportation system focused on vehicles which have led to all sorts of problems such as traffic congestion, air pollution and so on, Korea recently have tended to center around Transit Oriented Development(TOD) which is capable of initiating public traffic demands. It is imperative to develop objective evaluation method which is able to measure pedestrian environment and amenity in order to facilitate green transit. The purpose of this paper is to present evaluation indices and measurement framework of pedestrian environment by analyzing effect on TOD major planning factors such as diversity, density, design, and supply etc. For this, we applied evaluation index with regard to TOD planning factors, investigating connection to pedestrian and employed AHP (Analytic Hierarchy Process) so as to quantify the result of measurement in Jongro 3ga and Hangangjin station. As a result, we presented relationship between travel patterns of pedestrian and each TOD planning factor. More importantly, the proposed framework is expected to make the best of the visualization as well as evaluation method for the pedestrian accessibility, convenience of public transportation, and the mixed land-use patterns in subway area and transit center.

Single Path Phase-only Security System using Phase-encoded XOR Operations in Fourier Plane (푸리에 영역에서의 위상 변조 Exclusive-OR 연산을 이용한 단일 경로 위상 암호화 시스템)

  • Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong;Noh, Duck-Soo
    • Korean Journal of Optics and Photonics
    • /
    • v.16 no.4
    • /
    • pp.326-333
    • /
    • 2005
  • Phase-only encryption scheme using exclusive-OR rules in Fourier plane and a single path decryption system are presented. A zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using XOR rules. A decryption is simply performed based on 2-1 setup with spatial filter by Fourier transform for multiplying phase-only encrypted data by phase-only key data, which are obtained by phase-encoding process, and spatial filtering for zero-order elimination in inverse-Fourier plane. Since the encryption process is peformed in Fourier plane, proposed encryption scheme is more tolerant to loss of key information by scratching or cutting than previous XOR encryption method in space domain. Compare with previous phase-visualization systems, due to the simple architecture without a reference wave, our system is basically robust to mechanical vibrations and fluctuations. Numerical simulations have confirmed the proposed technique as high-level encryption and simple decryption architecture.

A Study on the Presentation of Easy-Order Prototype in the Internet Shopping Mall using the Cyber Fitting Type's 3D Avatar (Cyber Fitting형 3D Avatar를 이용한 인터넷 쇼핑몰 Easy-Order Prototype 유형 제시를 위한 연구)

  • Choi, Sung-Won;Lim, Ji-Young
    • Archives of design research
    • /
    • v.19 no.2 s.64
    • /
    • pp.43-52
    • /
    • 2006
  • The most important issue the online shopping mall for clothes is facing in the rapid growth of the online shopping mali is the high rate of the return of the goods alter purchase. The high rate of the return leads to the dissatisfaction md lack of trust from the consumers in the online shopping mall for clothes, which in turn leads to the bleak prospect for the online shopping mall for clothes as a result of the consumers' dissatisfaction. Although a type of online shopping mall using the cyber-fitting technology has emerged recently, it has succeeded only in provoking a visual interest, for it is also not satisfying the demand of the consumers by falling short in providing information. Thus, this research seeks for the resolutions of the problems related to the user-oriented online shopping. First of the resolutions is the development of a new prototype which the consumers can easily access; second is the visualization of the information using the 3D virtual-reality of he prototype through interface, which will help the consumers to make more accurate judgments. In other words, this study seeks to provide a type of prototype of an online shopping mall that meets the demand of the consumers using the 3D avatars, unlike the unilateral and conventional malls out there.

  • PDF

Online Signature Verification by Visualization of Dynamic Characteristics using New Pattern Transform Technique (동적 특성의 시각화를 수행하는 새로운 패턴변환 기법에 의한 온라인 서명인식 기술)

  • Chi Suyoung;Lee Jaeyeon;Oh Weongeun;Kim Changhun
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.7
    • /
    • pp.663-673
    • /
    • 2005
  • An analysis model for the dynamics information of two-dimensional time-series patterns is described. In the proposed model, two novel transforms that visualize the dynamic characteristics are proposed. The first transform, referred to as speed equalization, reproduces a time-series pattern assuming a constant linear velocity to effectively model the temporal characteristics of the signing process. The second transform, referred to as velocity transform, maps the signal onto a horizontal vs. vertical velocity plane where the variation oi the velocities over time is represented as a visible shape. With the transforms, the dynamic characteristics in the original signing process are reflected in the shape of the transformed patterns. An analysis in the context of these shapes then naturally results in an effective analysis of the dynamic characteristics. The proposed transform technique is applied to an online signature verification problem for evaluation. Experimenting on a large signature database, the performance evaluated in EER(Equal Error Rate) was improved to 1.17$\%$ compared to 1.93$\%$ of the traditional signature verification algorithm in which no transformed patterns are utilized. In the case of skilled forgery experiments, the improvement was more outstanding; it was demonstrated that the parameter set extracted from the transformed patterns was more discriminative in rejecting forgeries