• Title/Summary/Keyword: Nature Environment

Search Result 2,232, Processing Time 0.029 seconds

Structural limitations and challenges of government-supported research institutes for post-catchup innovation: Focused on ETRI (탈추격 혁신을 위한 출연(연)의 구조적 한계와 과제: ETRI를 중심으로)

  • Seong, Ji Eun
    • Journal of Technology Innovation
    • /
    • v.20 no.2
    • /
    • pp.1-28
    • /
    • 2012
  • The government-supported research institutes' system seems to face a turning point as the country's innovation system, shaped in the industrialization process, now reveals its own limitations. This makes the transformation of the innovation system unavoidable. Korea began to emerge as a leader in several technological areas including semiconductor, TFT-LCD, and handset, in a few cases even outpacing advanced countries. This has changed the very nature of the problems and questions to be resolved. This study analysed the structural limitations and challenges of government-supported research institutes focused ETRI. In a nutshell, The innovation system of government-supported research institutes seems to face a situation where the new innovation environment is conflicting and competing with the legacy of the past: governance, planning, budget, personnel, evaluation system. There are needs for change and thus tries to achieve a innovation system transition and build a new vision and management system including a new mode of working for post-catchup innovation.

  • PDF

Studies on the current status of ecosystem and ecological parks in Anyang Stream (안양천 및 주변지역의 생태계 현황 및 생태공원 조성방안 연구)

  • Lee, Sang-Don
    • Journal of Wetlands Research
    • /
    • v.12 no.3
    • /
    • pp.145-153
    • /
    • 2010
  • An-yang stream is a branch stream connecting to Han river and regarded as a national stream. This study chose the representative stream of An-yang and identified vegetation and flora. The ecological survey aimed at identifying indicator of urban streams for measuring to protect urban areas and to promote wetland conservation. A total of 266 species were identified into 35 Orders, 78 Families. The introduced species of Sicyo angulatus need a special treatment to reduce the population. The wetland vegetation is quite various and we suggested 11 different vegetation zones depending on introduced species and amenity between human and nature, This will lead to blue-network to crease favorable environment and manage important species for this region.

Distribution of invasive alien plants on the islands of the Korean Peninsula based on flora data (식물상 자료에 기초한 한반도 도서 지역의 생태계 교란 외래식물 분포)

  • Kim, Hyun-Hee;Mizuno, Kazuharu;Kim, Da-Bin;Lee, Ho-Sang;Kong, Woo-Seok
    • Korean Journal of Environmental Biology
    • /
    • v.38 no.3
    • /
    • pp.392-403
    • /
    • 2020
  • This study analyzed the distribution characteristics of invasive alien plants on the islands of the Korean Peninsula. Ten species, Rumex acetosella, Sicyos angulatus, Solanum carolinense, Ambrosia artemisiaefolia var. elatior, Ambrosia trifida, Aster pilosus, Eupatorium rugosum, Hypochaeris radicata, Lactuca scariola, and Paspalum distichum were present on 68 islands. These ecosystem-disturbing invasive alien plants appeared extensively on the islands of Gyeonggi province and Jeollanam province. The proportion of the plants on the inhabited islands (41 places, 2.15 species on average) was higher than that on the uninhabited islands (27 places, 1.07 species on average). This means that the distribution of invasive alien plants was closely related to human activity. The distribution of Ambrosia artemisiaefolia var. elatior(32 islands) and Rumex acetosella (31 islands) was the widest, and there were distinct distribution differences according to species. In the island area, the physical environment is poor compared to the mainland, and the native space is limited. Therefore, when invasive alien species enter and settle on the island, the native island plants can be damaged more than those on the mainland. In this regard, the discussion of the distribution of invasive alien plants in the island region can contribute to the conservation of biodiversity in the region.

Construction of an Exposure Risk Map and Spatial Knowledge Base for Asbestos in Korea (석면 공간지식베이스 구축을 통한 석면 노출위험도 작성)

  • Hwang, Jae-Hong;Lee, Byung-Joo
    • The Journal of Engineering Geology
    • /
    • v.21 no.4
    • /
    • pp.393-402
    • /
    • 2011
  • Asbestos is a toxic material that can lead to lung cancer and other diseases. There is no information regarding areas in Korea that contain asbestos in nature; consequently we need to manage such areas with care. The purpose of this study was to construct a local graded map of asbestos exposure risk based on the natural occurrence of asbestos in rocks. We first developed a means of evaluating the asbestos exposure risk and produced thematic maps based on a field survey. In addition, we constructed a knowledge base for asbestos through analysis, representation and processes about asbestos data and prepare for the development of an evaluation model for asbestos exposure risk. The spatial analysis of asbestos exposure risk is based on a weighted-overlay analysis using expert opinion and the literature, and a fuzzy-overlay analysis using the uncertainty in the data. The map of asbestos exposure risk, compiled according to the weighted and fuzzy operations, is expected to be used to ensure safety and to reduce the risk of exposure to asbestos.

Research Trends for Performance, Safety, and Comfort Evaluation of Agricultural Tractors: A Review

  • Kabir, Md. Shaha Nur;Ryu, Myong-Jin;Chung, Sun-Ok;Kim, Yong-Joo;Choi, Chang-Hyun;Hong, Soon-Jung;Sung, Je-Hoon
    • Journal of Biosystems Engineering
    • /
    • v.39 no.1
    • /
    • pp.21-33
    • /
    • 2014
  • Background: Significant technological development and changes happened in the tractor industries. Contrariwise, the test procedures of the major standard development organizations (SDO's) remained unchanged or with a little modification over the years, demanding new tractor test standards or improvement of existing ones for tractor performance, safety, and comfort. Purpose: This study focuses on reviewing the research trends regarding performance, safety and comfort evaluation of agricultural tractors. Based on this review, few recommendations were proposed to revise or improve the current test standards. Review: Tractor power take-off power test using the DC electric dynamometer reduced human error in the testing process and increased the accuracy of the test results. GPS signals were used to determine acceleration and converted into torque. High capacity double extended octagonal ring dynamometer has been designed to measure drawbar forces. Numerical optimization methodology has been used to design three-point hitch. Numerous technologies, driving strategies, and transmission characteristics are being considered for reducing emissions of gaseous and particulate pollutants. Engine emission control technology standards need to be revised to meet the exhaust regulations for agricultural tractors. Finite Element Analysis (FEA) program has been used to design Roll-Over Protective Structures (ROPS). Program and methodology has been presented for testing tractor brake systems. Whole-body vibration emission levels have been found to be very dependent upon the nature of field operation performed, and the test track techniques required development/adaptation to improve their suitability during standardized assessment. Emphasizes should be given to improve visibility and thermal environment inside the cab for tractor operator. Tractors need to be evaluated under electromagnetic compatibility test conditions due to large growing of electronic devices. Research trends reviewed in this paper can be considered for possible revision or improvement of tractor performance, safety, and comfort test standards.

The Causal Relationship of Health Service Quality, Satisfaction, Intention to Revisit and Intention to Recommend Perceived by Health Center Visitors (보건소 이용자가 인지하는 보건의료서비스 질, 만족도, 재이용의사 및 타인권유 의향간의 인과관계분석)

  • Park, Jae San
    • Health Policy and Management
    • /
    • v.15 no.3
    • /
    • pp.60-78
    • /
    • 2005
  • The main objective of this study is to define the nature of the patient service quality of Health Centers, and based on that, to examine the causal relationship of Health Center visitor's perceived service quality with overall satisfaction, intention to revisit and intention to recommend. Data are collected on the basis of the second field survey of '3rd Regional Health Care Planning' operated by the Ministry of Health and Welfare(MOHW). In this study, the 24 patient satisfaction questions are used as outcome indicators. The samples are 3,091 patients who visited 68 Health Centers. The reliability and validity of patient service quality items was evaluated. Finally, the Structural Equation Modeling(SEM) analysis was conducted to find a causal relationship of service quality, patient satisfaction, intention to revisit and intention to recommend. This study shows firstly, the dimension of patient service quality was categorized into 3 dimensions, that is, facilities and environment, staff kindness, and convenience of utilization process. Secondly, the reliability and validity of patient service quality items was satisfied. Lastly, the total effect of convenience of utilization process factor on satisfaction(path coefficients=1.721), intention to revisit(0.843) and intention to recommend(0.696) is more higher than other variables. These findings imply that the quality of various services concerning convenience of utilization process at Health Centers should be improved to satisfy the health need of community people and improve the service quality of Health Centers.

A Checklist for Assessment of Risks Involved in IT Service Project Contract (IT 서비스 프로젝트 계약서 위험 요인 평가 체크리스트)

  • Jeong, Eun Joo;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.15 no.4
    • /
    • pp.57-65
    • /
    • 2014
  • Risk factors are the reason behind cost overruns and delays in long-term large-scale IT service projects. Major risks originate from the integration of complex IT system components, including software, hardware, and solutions; the competitive bidding process; the turnkey and firm-fixed price nature of contracts; and the project execution environment. We have identified several risk factors such as delay in acceptance, low quality of deliverables, delay in payment, adding and changing requirements and scope, unclear definition of roles and responsibilities of the buyer and supplier, and unclear procedures of change and quality management during the project execution phase. One needs to manage risks proactively before signing the contract. In order to weed out or lower the risk factors well in advance, we need to identify and remove risk factors contained in contract clauses and attached contract documents. We propose a checklist for assessing IT service project contracts. To validate the checklist's utility, we applied it to an IT service project in the finance industry. The results show that the checklist is effective in identifying and removing risk factors pertaining to IT service projects.

Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices (안드로이드 모바일 단말에서의 이벤트 수집을 통한 악성 앱 탐지 시스템 설계 및 구현)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.35-46
    • /
    • 2013
  • As mobile terminal environment gets matured, the use of Android platform based mobile terminals has been growing high. Recently, the number of attacks by malicious application is also increasing as Android platform is vulnerable to private information leakage in nature. Most of these malicious applications are easily distributed to general users through open market or internet and an attacker inserts malicious code into malicious app which could be harmful tool to steal private data and banking data such as SMS, contacts list, and public key certificate to a remote server. To cope with these security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile device and take an appropriate action to protect the system against malicious attacks. In this sense, this paper aggregates diverse system events from multiple mobile devices and also implements a system to detect attacks by malicious application.

Adaptive Data Hiding Techniques for Secure Communication of Images (자기유사성 네트워크에서 트래픽 제어에 의한 성능 개선)

  • 석경휴;나상동
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6B
    • /
    • pp.575-583
    • /
    • 2004
  • In this paper, we extend the multiple time scale control framework to the window-based congestion control, in particular, such as the TCP. This is performed by interfacing the TCP with a large time scale control module which adjusts the aggressiveness of the bandwidth consumption behavior exhibited by the TCP as a function of large time scale Self-Similar network state. i.e., conformation that exceeds the horizon of the feedback loop as determined by the RTT. How to effectively utilize such an information-due to its probabilistic nature, dispersion over the multiple time scales, and affection on the top of the existing window-based congestion controls-is a non-trivial problem. The evaluation performance of the multiple time scale TCP is facilitated by a simulation of the bench-mark environment which is based on the physical modeling of a self-similar traffic. We explicate our methodology for discerning and evaluating the impact of changes in transport protocols in the protocol stack under the self-similar traffic conditions. We discuss issues arising in the comparative performance evaluation under heavy-tailed workloads.

On Improving the Electrical Safety Systems based on the Systems Engineering Method (시스템 공학 기법에 의한 전기안전시스템 체계 개선에 관한 연구)

  • Shin, Heung-Sik;Lee, Jae-Chon;Lee, Byoung-Gil
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.6
    • /
    • pp.39-46
    • /
    • 2007
  • In this paper we discuss the problems related with the existing electrical safety system that is influenced by all the socio-technical factors including the electrical safety law, government organizations, and their practicing rules and regulations. Sometimes intangible practices also affect the safety issues. It is our intention to incorporate all those factors effectively and systematically in improving the electrical safety system. Since, the problem in nature is so complex, an approach based on the systems engineering (SE) method could be a good candidate. Specifically, as a first step of the SE process we performed the requirements analysis of all the factors mentioned above and some recommendations from the experts in the field. In the work environment utilizing a computer-aided SE tool, the requirements are verified and managed efficiently although the data base is complicated in general in tracking the changes. Next, by analyzing the verified requirements, a functional architecture is developed to achieve an improved electrical safety system. We also did the reverse engineering of the existing electrical safety system to explore potential problems there. The result can also help improve the existing one. Overall, a systematic approach to constructing electrical safety system based on SE is proposed for the first time in this paper. Note that the method described here can be adopted in the study of other safety systems.