• Title/Summary/Keyword: Management Evaluation System

Search Result 4,033, Processing Time 0.032 seconds

3D Track Models Generation and Applications Based on LiDAR Data for Railway Route Management (철도노선관리에서의 LIDAR 데이터 기반의 3차원 궤적 모델 생성 및 적용)

  • Yeon, Sang-Ho;Lee, Young-Dae
    • Proceedings of the KSR Conference
    • /
    • 2007.11a
    • /
    • pp.1099-1104
    • /
    • 2007
  • The visual implementation of 3-dimensional national environment is focused by the requirement and importance in the fields such as, national development plan, telecommunication facility deployment plan, railway construction, construction engineering, spatial city development, safety and disaster prevention engineering. The currently used DEM system using contour lines, which embodies national geographic information based on the 2-D digital maps and facility information has limitation in implementation in reproducing the 3-D spatial city. Moreover, this method often neglects the altitude of the rail way infrastructure which has narrow width and long length. There it is needed to apply laser measurement technique in the spatial target object to obtain accuracy. Currently, the LiDAR data which combines the laser measurement skill and GPS has been introduced to obtain high resolution accuracy in the altitude measurement. In this paper, we first investigate the LiDAR based researches in advanced foreign countries, then we propose data a generation scheme and an algorithm for the optimal manage and synthesis of railway facility system in our 3-D spatial terrain information. For this object, LiDAR based height data transformed to DEM, and the realtime unification of the vector via digital image mapping and raster via exactness evaluation is transformed to make it possible to trace the model of generated 3-dimensional railway model with long distance for 3D tract model generation.

  • PDF

Interactive content development of voice pattern recognition (음성패턴인식 인터랙티브 콘텐츠 개발)

  • Na, Jong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.5
    • /
    • pp.864-870
    • /
    • 2012
  • Voice pattern recognition technology to solve the problems of the existing problems and common issues that you may have in language learning content analysis. This is the first problem of language-learning content, online learning posture. Game open another web page through the lesson, but the concentration of the students fell. Have not been able to determine the second issue according Speaking has made the learning process actually reads. Third got a problem with the mechanical process by a learning management system, as well by the teacher in the evaluation of students and students who are learning progress between the difference in the two. Finally, the biggest problem, while maintaining their existing content made to be able to solve the above problem. Speaking learning dedicated learning programs under this background, voice pattern recognition technology learning process for speech recognition and voice recognition capabilities for learning itself has been used in the recognition process the data of the learner's utterance as an audio file of the desired change to a transfer to a specific location of the server or SQL server may be easily inserted into any system or program, any and all applicable content that has already been created without damaging the entire component because the new features were available. Contributed to this paper, active participation in class more interactive teaching methods to change.

An Evaluation of N.Korean SEZs through Comparing with China's and Vietnam's Initial Cases (중국과 베트남 초기 경제특구와 비교를 통한 북한 경제특구 평가)

  • Kim, Mi-Suk;Choi, Dae-Sik;Kim, Doo-Whan
    • Land and Housing Review
    • /
    • v.7 no.4
    • /
    • pp.191-205
    • /
    • 2016
  • North Korea(NK) has designated the special economic zones(SEZs) since the first one in Rason. But, why have the SEZs in NK still not been developed successfully? This study comparatively evaluated the SEZs in China, Vietnam and NK, with respect to 'context/purpose', 'development/management system', and 'location/infrastructure.' NK's strategies for the SEZs were different from those of China and Vietnam in terms of historical context and development purpose. China and Vietnam chose the market opening policy aiming to reform their national economy, while NK tried the opening policy without the economic reform. This difference made NK's decentralization and location strategies marginal. In spite of the positive land system and tax benefit of NK, the strategies couldn't make a successful result. The implications of this comparative study are as follows. Firstly, NK needs to establish a strategy for the SEZs in accord with the comprehensive and long-term plan for economic development and 'trustworthy and substantial market-systems' being compatible with outside world. For that, NK has to secure the regime stability in political and diplomatic dimensions. Secondly, NK has to carry out policies of decentralization and location of the SEZs more positively. Thirdly, in order to solve the problem related to lack of infrastructure capital, NK needs to utilize a BOT scheme.

Cost Efficient Virtual Machine Brokering in Cloud Computing (가격 효율적인 클라우드 가상 자원 중개 기법에 대한 연구)

  • Kang, Dong-Ki;Kim, Seong-Hwan;Youn, Chan-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.7
    • /
    • pp.219-230
    • /
    • 2014
  • In the cloud computing environment, cloud service users purchase and use the virtualized resources from cloud resource providers on a pay as you go manner. Typically, there are two billing plans for computing resource allocation adopted by large cloud resource providers such as Amazon, Gogrid, and Microsoft, on-demand and reserved plans. Reserved Virtual Machine(VM) instance is provided to users based on the lengthy allocation with the cheaper price than the one of on-demand VM instance which is based on shortly allocation. With the proper mixture allocation of reserved and on-demand VM corresponding to users' requests, cloud service providers are able to reduce the resource allocation cost. To do this, prior researches about VM allocation scheme have been focused on the optimization approach with the users' request prediction techniques. However, it is difficult to predict the expected demands exactly because there are various cloud service users and the their request patterns are heavily fluctuated in reality. Moreover, the previous optimization processing techniques might require unacceptable huge time so it is hard to apply them to the current cloud computing system. In this paper, we propose the cloud brokering system with the adaptive VM allocation schemes called A3R(Adaptive 3 Resource allocation schemes) that do not need any optimization processes and kinds of prediction techniques. By using A3R, the VM instances are allocated to users in response to their service demands adaptively. We demonstrate that our proposed schemes are able to reduce the resource use cost significantly while maintaining the acceptable Quality of Service(QoS) of cloud service users through the evaluation results.

A Study on the Performance Evaluation of Standard Gamma Irradiation System Using Monte Carlo Code (몬테카를로 코드를 활용한 표준 감마선 조사장치의 성능평가에 관한 연구)

  • Park, Won-Seok;Heo, Seung-Uk;Kim, Jang-Oh;Min, Byung-In
    • Journal of the Korean Society of Radiology
    • /
    • v.12 no.2
    • /
    • pp.179-184
    • /
    • 2018
  • In this study, we compared the measured values of the effective beam size of standard gamma irradiator with the simulation results to provide a useful means to the effective beam area determination. Results of the simulation and measured using ion chamber was distributed in a relative error of 4.5 ~ 7.3% of the case of air kerma rate. The size of the effective beam area is when the simulation was implemented in the horizontal direction 27cm, 21.6cm vertical direction, the measured result using a film was obtained similar results with the horizontal direction 26.5cm, 21.9cm vertical direction. The relative error in the horizontal direction is 1.85% and 1.38% vertical effective beam area was also similarly distributed around the field gamma rays. As a result of the study, it was confirmed that the effectiveness of the simulation was sufficient for the gamma irradiation system. In particular, it is small relative errors in the effective beam size than the air kerma rate is considered to be due to the size of the beam is determined by geometric factors rather than the capacity of the standard source. A further study is needed to improve the reliability of the photon energy distribution diagram using simulation.

Establishment of rapid discrimination system of leguminous plants at metabolic level using FT-IR spectroscopy with multivariate analysis (FT-IR 스펙트럼 기반 다변량통계분석기법에 의한 두과작물의 대사체 수준 식별체계 확립)

  • Song, Seung-Yeob;Ha, Tae-Joung;Jang, Ki-Chang;Kim, In-Jung;Kim, Suk-Weon
    • Journal of Plant Biotechnology
    • /
    • v.39 no.3
    • /
    • pp.121-126
    • /
    • 2012
  • To determine whether FT-IR spectroscopy combined with multivariate analysis for whole cell extracts can be used to discriminate major leguminous plant at metabolic level, seed extracts of six leguminous plants were subjected to Fourier transform infrared spectroscopy (FT-IR). FT-IR spectral data from seed extracts were analyzed by principal component analysis (PCA), partial least square discriminant analysis (PLS-DA) and hierarchical clustering analysis (HCA). The PCA could not fully discriminate six leguminous plants, however PLS-DA could successfully discriminate six leguminous plants. The hierarchical dendrogram based on PLS-DA separated the six leguminous plants into four branches. The first branch was consisted of all three Vigna species including Vigna radiata var. radiate, Vigna angularis var. angularis and Vigna unguiculata subsp. Unguiculata. Whereas Pisum sativum var. sativum, Glycine max L and Phaseolus vulgaris var. vulgaris were clustered into a separate branch respectively. The overall results showed that metabolic discrimination system were in accordance with known phylogenic taxonomy. Thus we suggested that the hierarchical dendrogram based on PLS-DA of FT-IR spectral data from seed extracts represented the most probable chemotaxonomical relationship between six leguminous plants.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

An Empirical Analysis about the usefulness of Internal Control Information on Corporate Soundness Assessment (기업건전성평가에 미치는 내부통제정보의 유용성에 관한 실증분석 연구)

  • Yoo, Kil-Hyun;Kim, Dae-Lyong
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.163-175
    • /
    • 2016
  • The purpose of this study is to provide an efficient internal control system formation incentives for company and to confirm empirically usefulness of the internal accounting control system for financial institutions by analyzing whether the internal control vulnerabilities of companies related significantly to the classification and assessment of soundness of financial institutions. Empirical analysis covered KOSPI, KOSDAQ listed companies and unlisted companies with more than 100 billion won of assets which have trading performance with "K" financial institution from 2008 until 2013. Whereas non-internal control vulnerability reporting companies by the internal control of financial reporting received average credit rating of BBB on average, reporting companies received CCC rating. And statistically significantly, non-reporting companies are classified as "normal" and reporting companies are classified as "precautionary loan" when it comes to asset quality classification rating. Therefore, reported information of internal control vulnerability reduced the credibility of the financial data, which causes low credit ratings for companies and suggests financial institutions save additional allowance for asset insolvency prevention and require high interest rates. It is a major contribution of this study that vulnerability reporting of internal control in accordance with the internal control of financial reporting can be used as information significant for the evaluation of financial institutions on corporate soundness.

A Linear Change of Leakage Current and Insulation Resistance of 22 kV Cables (22 kV 케이블의 누설전류 및 절연저항의 선형적 변화)

  • Um, Kee-Hong;Lee, Kwan-Woo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.169-173
    • /
    • 2015
  • This study is to predict the life exponent by measuring, over 7 years, the insulation resistance of high-voltage cables in 22 kV operation for 13 years. We found out the lifetime index in order to determine the time-dependent trend of deteriorating performance of power cables. The insulation resistances decreased according to elapsed time. We found that: the initial measurements of the cable systems were in agreement with the deterioration properties of the Arrhenius Law. By analyzing the life curve of the cable system, we also verified that the value of the life exponent (n) in the v-t characteristics defined by Weibull distribution has values from 10 to 11. When designing the cable system, the initial value of life exponent was chosen as 9 without any grounding. We have verified that the theoretical grounding based on the design safety of n=9 was actually the best one available. In the short term, we apply our research result to the diagnosis and evaluation of the power cables. In the long run, however, we plan to reduce the cost of the installation and management of cable systems in operation at power stations.

A Quantitative Risk Analysis of Related to Tower Crane Using the FMEA (타워크레인의 정량적 위험성 평가가법에 관한 연구(FMEA 기법 위주))

  • Shim, Kyu-Hyung;Rie, Dong-Ho
    • Journal of the Korean Society of Safety
    • /
    • v.25 no.6
    • /
    • pp.34-39
    • /
    • 2010
  • The purpose of this study is to suggest objective evaluation model as a plan to utilize as opportunity in establishing judgment standard of mutual inspection criteria and to upgrade inspection ability by reviewing and analyzing level of danger and importance in advance based on inspection results of inspection institutions regarding tower cranes used in construction fields. Tower crane is a mechanical device transporting construction supplies and heavy materials to places over 20~150M high from the ground for the period ranging from a short time of 2~3 months to two years after being installed in construction sites in vicinity of buildings or structures and is an important facility indispensable for construction sites. However, since use period after installation is short and professional technical ability of technicians working on-site about of tower crane is poor, systematic and quantitative safety management is not carried out As a part of researches on procedure of RBI(Risk Based Inspection) possible to apply to Knowledge Based System based on knowledge and experiences of experts as well as to tower cranes for solving these problems, quantitative RPN(Risk Priority Number) was applied to RPN utilizing technique of FMEA(Failure Mode and Effect Analyses). When general RBI 80/20 Rule was applied parts with high level of risks were found out as wire rope, hoist up/down safety device, reduction gear, and etc. However, since there are still many insufficient parts as risk analyses of tower crane were not established, it is necessary for experts with sufficient experiences and knowledge to supplement active RBI techniques and continuous researches on tower cranes by sharing and setting up data base of important information with this study as a starting point.