• Title/Summary/Keyword: Multi Project

Search Result 789, Processing Time 0.03 seconds

The Role of Job Autonomy Influencing on Creative Behavior in the Smart Work Context (스마트워크에서 직무자율성이 창의적 행위에 미치는 영향)

  • Yong-Young Kim
    • Journal of Industrial Convergence
    • /
    • v.21 no.4
    • /
    • pp.13-22
    • /
    • 2023
  • Due to COVID-19, organizations are rapidly changing the way they work by providing telecommuting and flexible work, and by expanding Smart Work spaces. In a Smart Work situation, workers have improved their job autonomy to choose their work methods, hours, and places. However, previous studies do not reflect the Smart Work situation and there are limitations to still using the previous job autonomy concept and measurements. To overcome these problems, this study derived job autonomy types such as methods, scheduling, criteria, time, and place applicable to Smart Work environments and verified that the five types of job autonomy have a statistically significant positive effect on Smart Workers' creative behavior. This study is meaningful in that it categorized job autonomy into five types applicable to Smart Work by adding temporal and spatial flexibility to the traditional job autonomy concept such as method, scheduling, and criteria autonomy and provided the basis for subdividing and evaluating the operation performance of Smart Work through multi-dimensional job autonomy verification.

Future changes in runoff characteristics of an estuarine reservoir watershed using CMIP6 multi-GCMs (CMIP6 다중 GCMs을 적용한 담수호 유역의 미래 유출특성 변화)

  • Sinae Kim;Seokhyeon Kim;Hyunji Lee;Jihye Kwak;Jihye Kim;Moon-Seong Kang
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.419-419
    • /
    • 2023
  • 하천의 최종 유출부와 해양이 만나는 지점을 하구라고 하며, 우리나라는 주로 서해안 지역에 하구 방조제 건설에 따른 담수호가 조성되어 다양한 목적으로 수자원이 활용되고 있다. 이러한 하구 담수호는 바다로 유입되기 직전의 물을 저류시켜 수자원 확보에 긍정적이나, 일반적으로 유역의 최하류에 위치해 있어 오염물질 유입, 부영양화, 염분 침출로 인한 오염물질 용출 등에 취약하다. 따라서 담수호의 회복탄력성 향상과 지속가능한 수자원 관리를 위해서는 미래 기후변화에 따른 영향 분석이 필수적이다. 특히 기후변화는 거대규모의 홍수과 같은 자연재난, 농업가뭄 및 식생가뭄 등의 증가로 이어질 수 있으므로, 이에 효과적으로 대비하기 위해서는 미래 기후조건에 따른 하천의 미래 유출량 변화 예측이 수행되어야 한다. 본 연구에서는 불확실한 미래 수문변화를 예측하기 위해 CMIP6(Coupled Model Intercomparison Project Phase 6) GCMs(Global Climate Models)의 SSP(Shared Socioeconomic Pathways) 시나리오를 유역 유출모델에 적용하여 기후변화에 따른 미래 유출특성의 변화를 예측하였다. 충청남도 서산시에 위치한 간월호 유역을 대상유역으로 선정하고, HSPF(Hydrological Simulation Program-FORTRAN) 모형을 적용하여 상류유역의 과거 및 미래 장기유출량 모의를 수행하였다. 모의된 시나리오별 유출량을 기반으로 최빈유량곡선법을 적용하여 미래의 기준유량 발생시점 및 지속기간의 변화를 분석하였으며, CVDs(Center-of-volume dates)의 변화를 통해 기후변화에 따른 홍수기의 시기적 변화 양상을 파악하고자 하였다. 본 연구의 결과는 미래 유역 환경변화를 고려한 담수호의 수자원 보전관리계획 수립에 있어 기초자료로 활용될 수 있을 것으로 기대된다.

  • PDF

Assessment of Historical and Future Climatic Trends in Seti-Gandaki Basin of Nepal. A study based on CMIP6 Projections

  • Bastola Shiksha;Cho Jaepil;Jung Younghun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.162-162
    • /
    • 2023
  • Climate change is a complex phenomenon having its impact on diverse sectors. Temperature and precipitation are two of the most fundamental variables used to characterize climate, and changes in these variables can have significant impacts on ecosystems, agriculture, and human societies. This study evaluated the historical (1981-2010) and future (2011-2100) climatic trends in the Seti-Gandaki basin of Nepal based on 5 km resolution Multi Model Ensemble (MME) of 18 Global Climate Models (GCMs) from the Coupled Model Intercomparison Project Phase 6 (CMIP6) for SSP1-2.6, SSP2-4.5 and SSP5-85 scenarios. For this study, ERA5 reanalysis dataset is used for historical reference dataset instead of observation dataset due to a lack of good observation data in the study area. Results show that the basin has experienced continuous warming and an increased precipitation pattern in the historical period, and this rising trend is projected to be more prominent in the future. The Seti basin hosts 13 operational hydropower projects of different sizes, with 10 more planned by the government. Consequently, the findings of this study could be leveraged to design adaptation measures for existing hydropower schemes and provide a framework for policymakers to formulate climate change policies in the region. Furthermore, the methodology employed in this research could be replicated in other parts of the country to generate precise climate projections and offer guidance to policymakers in devising sustainable development plans for sectors like irrigation and hydropower.

  • PDF

Multi-camera-based 3D Human Pose Estimation for Close-Proximity Human-robot Collaboration in Construction

  • Sarkar, Sajib;Jang, Youjin;Jeong, Inbae
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.328-335
    • /
    • 2022
  • With the advance of robot capabilities and functionalities, construction robots assisting construction workers have been increasingly deployed on construction sites to improve safety, efficiency and productivity. For close-proximity human-robot collaboration in construction sites, robots need to be aware of the context, especially construction worker's behavior, in real-time to avoid collision with workers. To recognize human behavior, most previous studies obtained 3D human poses using a single camera or an RGB-depth (RGB-D) camera. However, single-camera detection has limitations such as occlusions, detection failure, and sensor malfunction, and an RGB-D camera may suffer from interference from lighting conditions and surface material. To address these issues, this study proposes a novel method of 3D human pose estimation by extracting 2D location of each joint from multiple images captured at the same time from different viewpoints, fusing each joint's 2D locations, and estimating the 3D joint location. For higher accuracy, the probabilistic representation is used to extract the 2D location of the joints, considering each joint location extracted from images as a noisy partial observation. Then, this study estimates the 3D human pose by fusing the probabilistic 2D joint locations to maximize the likelihood. The proposed method was evaluated in both simulation and laboratory settings, and the results demonstrated the accuracy of estimation and the feasibility in practice. This study contributes to ensuring human safety in close-proximity human-robot collaboration by providing a novel method of 3D human pose estimation.

  • PDF

Key Technology for Food-Safety Traceability Based on a Combined Two-Dimensional Code

  • Zhonghua Li;Xinghua Sun;Ting Yan;Dong Yang;Guiliang Feng
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.139-148
    • /
    • 2023
  • Current food-traceability platforms suffer from problems such as inconsistent traceability standards, a lack of public credibility, and slow access to data. In this work, a combined code and identification method was designed that can achieve more secure product traceability using the dual anti-counterfeiting technology of a QR code and a hidden code. When the QR code is blurry, the hidden code can still be used to effectively identify food information. Based on this combined code, a food-safety traceability platform was developed. The platform follows unified encoding standards and provides standardized interfaces. Based on this innovation, the platform not only can serve individual food-traceability systems development, but also connect existing traceability systems. These will help to solve the problems such as non-standard traceability content, inconsistent processes, and incompatible system software. The experimental results show that the combined code has higher accuracy. The food-safety traceability platform based on the combined code improves the safety of the traceability process and the integrity of the traceability information. The innovation of this paper is invoking the combined code united the QR code's rapidity and the hidden code's reliability, developing a platform that uses a unified coding standard and provides a standardized interface to resolve the differences between multi-food-traceability systems. Among similar systems, it is the only one that has been connected to the national QR code identification platform. The project has made profits and has significant economic and social benefits.

Low beta superconducting cavity system design for HIAF iLinac

  • Mengxin Xu;Yuan He;Shengxue Zhang;Lubei Liu;Tiancai Jiang;Zehua Liang;Tong Liu;Yue Tao;Chunlong Li;Qitong Huang;Fengfeng Wang;Hao Guo;Feng Bai;Xianbo Xu;Shichun Huang;Xiaoli Li;Zhijun Wang;Shenghu Zhang;Jiancheng Yang;Evgeny Zaplatin
    • Nuclear Engineering and Technology
    • /
    • v.55 no.7
    • /
    • pp.2466-2473
    • /
    • 2023
  • A superconducting ion-Linac (iLinac), which is supposed to work as the injector in the High Intensity heavy-ion Accelerator Facility project, is under development at the Institute of Modern Physics (IMP), Chinese Academy of Sciences. The iLinac is a superconducting heavy ion linear accelerator approximately 100 meters long and contains 96 superconducting cavities in two types of 17 cyromodules. Two types of superconducting resonators (quarter-wave resonators with a frequency of 81.25 MHz and an optimal beta β = v/c = 0.07 called QWR007 and half-wave resonators with a frequency of 162.5 MHz and an optimal beta β = 0.15 called HWR015) have been investigated. The cavity design included extensive multi-parameter electromagnetic simulations and mechanical analysis, and its results are described in details. The fundamental power coupler and cavity dynamic tuner designs are also presented in this article. The prototypes are under manufacturing and expected to be ready in 2023.

The Function of the Author and the Poetic Experiments in Lyrical Ballads of 1798 (1798년 『서정민요집』의 저자의 기능과 시적 실험)

  • Joo, Hyeuk Kyu
    • Journal of English Language & Literature
    • /
    • v.56 no.5
    • /
    • pp.973-998
    • /
    • 2010
  • This paper aims at assessing the significance of Lyrical Ballads of 1798, the agreed inaugurator of English Romanticism, in terms of such key concepts as poetic "experiments," "conversation," and the authorial function. The 1798 volume marks an interesting incidence in which an author with no tangible substantiality can wield his authorial function over his works. The volume is signed without the named proper noun-its author is neither William Wordsworth nor Samuel Taylor Coleridge. The figure of the author in this case is realized by the poems he writes; he produces, and is produced by, his works-a fact that constitutes part of the poetic experiments manifested in the Advertisement. Working under this reciprocal production, the Author of the 1798 volume and his poems are collectively aiming at establishing a new class of poetry and an interpretive community. The notion of "conversation" is a key element in the thematic, stylistic ties among individual poems. Poems of the 1798 volume effect multi-layered, "blended" voices. Readers are expected to draw out the topological interweaving among poems through the practices of dialogic reading. In this light, the sequential necessity of "The Rime" and "Tintern Abbey" should be emphasized. They are stitched together in a logic of textual placement and the transition from one to the other is never arbitrary. Most of all, they are working under the same authorial function, complementing each other, and addressing the same poetic project in different textual locations. As an inaugural work of English Romanticism, Lyrical Ballads of 1798 in fact makes so many things happen and yet again anticipates something yet to come with elusiveness. The value of this poetic experiments should be judged not only by what is claimed in it, but what it sets out to do and "how far" it will be performed, as implied in the Advertisement. The efficacy of the volume, more than anything else, is dependent upon the performative power of words.

EPAR V2.0: AUTOMATED MONITORING AND VISUALIZATION OF POTENTIAL AREAS FOR BUILDING RETROFIT USING THERMAL CAMERAS AND COMPUTATIONAL FLUID DYNAMICS (CFD) MODELS

  • Youngjib Ham;Mani Golparvar-Fard
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.279-286
    • /
    • 2013
  • This paper introduces a new method for identification of building energy performance problems. The presented method is based on automated analysis and visualization of deviations between actual and expected energy performance of the building using EPAR (Energy Performance Augmented Reality) models. For generating EPAR models, during building inspections, energy auditors collect a large number of digital and thermal imagery using a consumer-level single thermal camera that has a built-in digital lens. Based on a pipeline of image-based 3D reconstruction algorithms built on GPU and multi-core CPU architecture, 3D geometrical and thermal point cloud models of the building under inspection are automatically generated and integrated. Then, the resulting actual 3D spatio-thermal model and the expected energy performance model simulated using computational fluid dynamics (CFD) analysis are superimposed within an augmented reality environment. Based on the resulting EPAR models which jointly visualize the actual and expected energy performance of the building under inspection, two new algorithms are introduced for quick and reliable identification of potential performance problems: 1) 3D thermal mesh modeling using k-d trees and nearest neighbor searching to automate calculation of temperature deviations; and 2) automated visualization of performance deviations using a metaphor based on traffic light colors. The proposed EPAR v2.0 modeling method is validated on several interior locations of a residential building and an instructional facility. Our empirical observations show that the automated energy performance analysis using EPAR models enables performance deviations to be rapidly and accurately identified. The visualization of performance deviations in 3D enables auditors to easily identify potential building performance problems. Rather than manually analyzing thermal imagery, auditors can focus on other important tasks such as evaluating possible remedial alternatives.

  • PDF

An analysis of field experts' perceptions of the content and format of school safety standards (학교안전기준 내용 및 형식에 대한 현장 전문가의 인식 분석)

  • Cho, Yong;Lee, Byoung-Ho;Han, Jong-Guk;Park, Youn-Ju
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.22 no.3
    • /
    • pp.14-29
    • /
    • 2023
  • This study aims to elucidate the content and format of school safety standards to clarify the roles and responsibilities of schools in realizing school safety. Toward this end, difficulties in operating school safety standards at various sites were classified into four small groups with a total of 26 educational administrators, superintendents, and researchers to listen to the opinions of experts in the field and analyze related data. As a result, we comprehensively analyzed in-depth interviews with the respondents who are working at provincial offices of education regarding the proposed school safety standards. We also analyzed the necessity of developing these standards and examining the appropriateness of their content and format. Results were derived from four aspects, including the field applicability of such standards. The study draws the following conclusions. First, it focuses on setting the direction for the development of school safety standards. Second, it highlights the exploration of the system and content of these standards. Third, it pertains to the preparation of a draft of these standards.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.