• Title/Summary/Keyword: Open network

Search Result 1,733, Processing Time 0.025 seconds

Integrated Waterfront Cultural Planning through Regeneration of Former Industrial Harborfront (산업항만지역의 재생을 통한 워터프론트 문화도시 통합계획)

  • Lee, Kum-Jin
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.2
    • /
    • pp.175-185
    • /
    • 2019
  • Purpose: The purpose of this study is to propose a direction planning integrated waterfront cultural city in terms of urban economic revitalization through regeneration of former industrial harborfront and the creation of cultural living spaces based on regional history in order to pursue urban activities. Method: Analyzing planning waterfront and historical cultural space based on MM21's development policy and strategy under the growth process and development of Yokohama. Results: MM21 is the core public project out of the six major projects promoted by Yokohama, which is on the brink of satellite cities for the expansion of Tokyo with a goal of qualitative transformation of former harbor. It is planned to be developed as a creative cultural waterfront city for an integrated urban development. Conclusion: Planning waterfront cultural city, which takes advantage of the former harbor city derived through MM21 analysis, provides the cityscape towards the sea and the port via the viewing point and opens the waterfront open to the port and the sea Space and Esplanade landscape development, preservation of historic buildings and cultural assets, recycling as cultural art space, waterfront space planning that cooperates with public culture art and pedestrian network.

Vulnerable Analysis of Emergency Medical Facilities based on Accessibility to Emergency Room and 119 Emergency Center (응급실과 119 안전센터의 접근성을 고려한 응급의료 취약지 분석)

  • Jeon, Jeongbae;Park, Meejeong;Jang, Dodam;Lim, Changsu;Kim, Eunja
    • Journal of Korean Society of Rural Planning
    • /
    • v.24 no.4
    • /
    • pp.147-155
    • /
    • 2018
  • The purpose of this study was to identify vulnerable area of emergency medical care. In the existing method, the emergency medical vulnerable area is set as an area that can not reach the emergency room within 30 minutes. In this study, we set up an area that can not reach within 30 minutes including the accessibility of 119 emergency center. To accomplish this, we obtained information on emergency room and 119 emergency center through Open API and constructed road network using digital map to perform accessibility analysis. As a result, 509 emergency room are located nationwide, 78.0% of them are concentrated in the region, 1,820 emergency center are located, and 61.0% of them are located in rural areas. The average access time from the center of the village to the emergency room was analyzed as 15.3 minutes, and the average access time considering the 119 emergency center was 21.8 minutes, 6.5 minutes more. As a result of considering the accessibility of 119 emergency center, vulnerable areas increased by 2.5 times, vulnerable population increased by 2.0 times, and calculating emergency medical care vulnerable areas, which account for more than 30% of the urban unit population, it was analyzed that it increased from 17 to 34 cities As a further study, it will be necessary to continuously monitor and research the real-time traffic information, medical personnel, medical field, and ambulance information to reflect the reality and to diagnose emergency medical care in the future.

A Study on the Vulnerability Management of Internet Connection Devices based on Internet-Wide Scan (인터넷 와이드 스캔 기술 기반 인터넷 연결 디바이스의 취약점 관리 구조 연구)

  • Kim, Taeeun;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.504-509
    • /
    • 2019
  • Recently, both wireless communications technology and the performance of small devices have developed exponentially, while the number of services using various types of Internet of Things (IoT) devices has also massively increased in line with the ongoing technological and environmental changes. Furthermore, ever more devices that were previously used in the offline environment-including small-size sensors and CCTV-are being connected to the Internet due to the huge increase in IoT services. However, many IoT devices are not equipped with security functions, and use vulnerable open source software as it is. In addition, conventional network equipment, such as switches and gateways, operates with vulnerabilities, because users tend not to update the equipment on a regular basis. Recently, the simple vulnerability of IoT devices has been exploited through the distributed denial of service (DDoS) from attackers creating a large number of botnets. This paper proposes a system that is capable of identifying Internet-connected devices quickly, analyzing and managing the vulnerability of such devices using Internet-wide scan technology. In addition, the vulnerability analysis rate of the proposed technology was verified through collected banner information. In the future, the company plans to automate and upgrade the proposed system so that it can be used as a technology to prevent cyber attacks.

Analysis of Technology Association Rules Between CPC Codes of the 'Internet of Things(IoT)' Patent (CPC 코드 기반 사물인터넷(IoT) 특허의 기술 연관성 규칙 분석)

  • Shim, Jaeruen
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.5
    • /
    • pp.493-498
    • /
    • 2019
  • This study deals with the analysis of the technology association rules between CPC codes of the Internet of Things(IoT) patent, the core of the Fourth Industrial Revolution ICT-based technology. The association rules between CPC codes were extracted using R, an open source for data mining. To this end, we analyzed 369 of the 605 patents related to the Internet of Things filed with the Patent Office until July 2019, with a complex CPC code, up to the subclass-level. As a result of the technology association rules, CPC codes with high support were [H04W ${\rightarrow}$ H04L](18.2%), [H04L ${\rightarrow}$ H04W](18.2%), [G06Q ${\rightarrow}$ H04L](17.3%), [H04L ${\rightarrow}$ G06Q](17.3%), [H04W ${\rightarrow}$ G06Q](9.8%), [G06Q ${\rightarrow}$ H04W](9.8%), [G06F ${\rightarrow}$ H04L](7.9%), [H04L ${\rightarrow}$ G06F](7.9%), [G06F ${\rightarrow}$ G06Q](6.2%), [G06Q ${\rightarrow}$ G06F](6.2%). After analyzing the technology interconnection network, the core CPC codes related to technology association rules are G06Q and H04L. The results of this study can be used to predict future patent trends.

User's Evaluation on the Supdari in Jeonju-River through Importance-Performance Analysis (전주천 섶다리의 주민의식 및 이용성취도 평가 - 중요도-성취도분석을 중심으로 -)

  • Kim, Sang-Wook
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.29 no.3
    • /
    • pp.78-84
    • /
    • 2011
  • This study investigated the user's attitude to the supdari(a traditional wooden bridge) itself and the supdari project, and evaluated the quality of user's satisfaction of the bridge in Jeonju-River by importance-performance analysis(IPA). User's evaluation was achieved through questionnaire survey, and total 267 pieces of subjects were used for the analysis. The supdari users didn't realize the supdari construction was performed as a governance project, and didn't consider the supdari as one of landmarks of Jeonju-River. But local people thought that the supdari is one of the traditional and cultural facilities to reminds their hometown's landscapes and the supdari project can make the community network vitalize. Through the IPA, attributes with relative dissatisfaction were 'landscape facilities like small squares and rest area', 'safety facilities like handrails and guardrails' and width of the supdari. To make the supdari as a traditional landmark in Jeonju-River, an open space based on the tradition and ecological education has to be constructed near the bridge. And in the supdari design, especially handrails system and the bridge width has to be improved to enhance the user's safety.

The Solidarity Networking between Labor and Civil Society Movements: the Case Study of Hope Bus (시민사회의 연대운동 네트워킹 사례연구: 희망버스를 중심으로)

  • Lee, Byoung-Hoon;Kim, Jindu
    • Korean Journal of Labor Studies
    • /
    • v.23 no.2
    • /
    • pp.109-139
    • /
    • 2017
  • In light that solidarity movements become significant under the situation of 'labor and labor movement' crisis, our study pays attention to the fact that the Hope Bus campaigns made remarkable achievements, and aims to figure out how those campaigns were successful, by focusing on their solidarity networking. The successful operating conditions of solidarity networking in the Hope Bus campaigns are examined in three aspects - the conditions of triggering, forming, and activating. The solidarity networking of Hope Bus campaigns were mainly triggered by the injustice of layoffs by Hanjin Heavy Industry, aerial protest by Jin-sook Kim, and the tragic symbol of the protest site (Crane no. 85). The solidarity movement of Hope Bus could be formed by the mutual trust and cohesive team-building of key network brokers, their utilization and expansion of social movement networks, and massive ripple effect of SNS-mediated communication. The solidarity networking of Hope Bus was effectively activated by open and de-hierarchical operations of the central planning group, active solidarity activities of participant groups, and the provision of 'heuristic experience' for developing the sensibility to labor solidarity. The virtuous combination of those three operating conditions leads to the building of unified forces among social movements, massive civil participation, and meaningful movement outcomes, through the solidarity networking of Hope Bus campaigns.

3D Mesh Reconstruction Technique from Single Image using Deep Learning and Sphere Shape Transformation Method (딥러닝과 구체의 형태 변형 방법을 이용한 단일 이미지에서의 3D Mesh 재구축 기법)

  • Kim, Jeong-Yoon;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.26 no.2
    • /
    • pp.160-168
    • /
    • 2022
  • In this paper, we propose a 3D mesh reconstruction method from a single image using deep learning and a sphere shape transformation method. The proposed method has the following originality that is different from the existing method. First, the position of the vertex of the sphere is modified to be very similar to the 3D point cloud of an object through a deep learning network, unlike the existing method of building edges or faces by connecting nearby points. Because 3D point cloud is used, less memory is required and faster operation is possible because only addition operation is performed between offset value at the vertices of the sphere. Second, the 3D mesh is reconstructed by covering the surface information of the sphere on the modified vertices. Even when the distance between the points of the 3D point cloud created by correcting the position of the vertices of the sphere is not constant, it already has the face information of the sphere called face information of the sphere, which indicates whether the points are connected or not, thereby preventing simplification or loss of expression. can do. In order to evaluate the objective reliability of the proposed method, the experiment was conducted in the same way as in the comparative papers using the ShapeNet dataset, which is an open standard dataset. As a result, the IoU value of the method proposed in this paper was 0.581, and the chamfer distance value was It was calculated as 0.212. The higher the IoU value and the lower the chamfer distance value, the better the results. Therefore, the efficiency of the 3D mesh reconstruction was demonstrated compared to the methods published in other papers.

A research on the Construction and Sharing of Authority Record-focusing on the Case of Social Networks and Archival Context Project (전거레코드 구축 및 공유에 관한 연구 SNAC 프로젝트 사례를 중심으로)

  • Lee, Eun Yeong
    • The Korean Journal of Archival Studies
    • /
    • no.71
    • /
    • pp.49-89
    • /
    • 2022
  • This study suggests the necessity and domestic application plan a national authority database that promotes an integrated access, richer search, and understanding of historical information sources and archival resources distributed among cultural heritage institutions through the "Social Networks and Archive Context" project case. As the SNAC project was transformed into an international cooperative organization led by NARA, it was possible to secure a sustainable operating system and realize cooperative authority control. In addition, SNAC authority records have the characteristics of providing richer contextual information about life and history and social and intellectual network information compared to libraries. Through case analysis, First, like SNAC, a cooperative body led by the National Archives and having joint ownership of the National Library of Korea should lead the development and expand the scope of participating institutions. Second, in the cooperative method, take a structure in which divisions are made for each field with special strengths, but the main decision-making is made through the administrative team in which the two organizations participate. Third, development of scalable open source software that can collect technical information in various formats when constructing authority data, designing with the structure and elements of archival authority records, designing functions to control the quality of authority records, and building user-friendly interfaces and the need for a platform design reflecting content elements.

Improvements in Patch-Based Machine Learning for Analyzing Three-Dimensional Seismic Sequence Data (3차원 탄성파자료의 층서구분을 위한 패치기반 기계학습 방법의 개선)

  • Lee, Donguk;Moon, Hye-Jin;Kim, Chung-Ho;Moon, Seonghoon;Lee, Su Hwan;Jou, Hyeong-Tae
    • Geophysics and Geophysical Exploration
    • /
    • v.25 no.2
    • /
    • pp.59-70
    • /
    • 2022
  • Recent studies demonstrate that machine learning has expanded in the field of seismic interpretation. Many convolutional neural networks have been developed for seismic sequence identification, which is important for seismic interpretation. However, expense and time limitations indicate that there is insufficient data available to provide a sufficient dataset to train supervised machine learning programs to identify seismic sequences. In this study, patch division and data augmentation are applied to mitigate this lack of data. Furthermore, to obtain spatial information that could be lost during patch division, an artificial channel is added to the original data to indicate depth. Seismic sequence identification is performed using a U-Net network and the Netherlands F3 block dataset from the dGB Open Seismic Repository, which offers datasets for machine learning, and the predicted results are evaluated. The results show that patch-based U-Net seismic sequence identification is improved by data augmentation and the addition of an artificial channel.

Trends in disaster safety research in Korea: Focusing on the journal papers of the departments related to disaster prevention and safety engineering

  • Kim, Byungkyu;You, Beom-Jong;Shim, Hyoung-Seop
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.43-57
    • /
    • 2022
  • In this paper, we propose a method of analyzing research papers published by researchers belonging to university departments in the field of disaster & safety for the scientometric analysis of the research status in the field of disaster safety. In order to conduct analysis research, the dataset constructed in previous studies was newly improved and utilized. In detail, for research papers of authors belonging to the disaster prevention and safety engineering type department of domestic universities, institution identification, cited journal identification of references, department type classification, disaster safety type classification, researcher major information, KSIC(Korean Standard Industrial Classification) mapping information was reflected in the experimental data. The proposed method has a difference from previous studies in the field of disaster & safety and data set based on related keyword searches. As a result of the analysis, the type and regional distribution of organizations belonging to the department of disaster prevention and safety engineering, the composition of co-authored department types, the researchers' majors, the status of disaster safety types and standard industry classification, the status of citations in academic journals, and major keywords were identified in detail. In addition, various co-occurrence networks were created and visualized for each analysis unit to identify key connections. The research results will be used to identify and recommend major organizations and information by disaster type for the establishment of an intelligent crisis warning system. In order to provide comprehensive and constant analysis information in the future, it is necessary to expand the analysis scope and automate the identification and classification process for data set construction.