• Title/Summary/Keyword: Personnel Computer

Search Result 227, Processing Time 0.024 seconds

User Review Selection Method using Kano Model in Application Market (어플리케이션 마켓에서 카노 모델을 이용한 사용자 리뷰 선별 방법)

  • Kim, Neunghoe
    • Journal of Industrial Convergence
    • /
    • v.18 no.2
    • /
    • pp.95-100
    • /
    • 2020
  • Among the customer-oriented data used to comprehend the customer, the user review data has received much attention as it provides insights into customer opinion in a detailed and large-scale manner; many customers have come to rely upon and trust the user reviews. Many application developers are cognizant of the importance of user reviews, so they monitor and respond to these reviews. However, due to the absence of a systematic method, developers have been investing their time and money without clear correlation to the customer satisfaction. Therefore, this paper suggests a systematic method to select user reviews from the application market using the Kano Model that deals with customer satisfaction and service quality, thereby maximizing the customer satisfaction under the given time period and budget. This method is constructed in the following phases: the user review collection and requirement elicitation phase in which the developers collect user reviews from the application market and elicit requirements, the Kano Model application and selection phase in which the Kano Model is applied to the elicited requirements and selection occurs based on the quality type, and the stakeholder review and redefinition phase in which relevant personnel gather to review and redefine requirements from an internal perspective.

Model-Based Architecture Design of the Range Safety Process for Live Fire Test with Enhanced Safety (실사격 시험 프로세스의 안전성 강화를 위한 MBSE 기반 아키텍처 연구)

  • Ye, Sung Hyuck;Lee, Jae-Chon
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.2
    • /
    • pp.43-52
    • /
    • 2014
  • In weapon systems development, live fire tests have been frequently adopted to evaluate the performance of the systems under development. Therefore, it is necessary to ensure safety in the test ranges where the live fire tests can cause serious hazards. During the tests, a special care must be taken to protect the test and evaluation (T&E) personnel and also test assets from potential danger and hazards. Thus, the development and management of the range safety process is quite important in the tests of guided missiles and artillery considering the explosive power of the destruction. Note also that with a newly evolving era of weapon systems such as laser, EMP and non-lethal weapons, the test procedure for such systems is very complex. Therefore, keeping the safety level in the test ranges is getting more difficult due to the increased unpredictability for unknown hazards. The objective of this paper is to study on how to enhance the safety in the test ranges. To do so, an approach is proposed based on model-based systems engineering (MBSE). Specifically, a functional architecture is derived utilizing the MBSE method for the design of the range safety process under the condition that the derived architecture must satisfy both the complex test situation and the safety requirements. The architecture developed in the paper has also been investigated by simulation using a computer-aided systems engineering tool. The systematic application of this study in weapon live tests is expected to reduce unexpected hazards and test design time. Our approach is intended to be a trial to get closer to the recent theme in T&E community, "Testing at the speed of stakeholder's need and rapid requirement for rapid acquisition."

THE CHARACTERISTIC OF SOLAR CELL FOR GUARD LAMP (보안등에 적용하기 위한 태양전지의 특성 분석)

  • Kang Byung-Bog;Ji Woon-Seok;Lim Jung-Yeol;Kim Seok-Jong;Yu Chang-Woo;Cha In-Su
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.1489-1491
    • /
    • 2004
  • A guard lamp system has been installed at the PV positive center, located at Gwangju in Korea. Digital environment that is represented to internet is displacing business way of industry and business achievement way with the fast speed being giving great change on life whole, improve existence business process utilizing internet and Web connection technology, information superhighway to tradition industrialist manufacture and e-transformation's propulsion that wish to maximize productivity and administration efficiency is spread vigorously. In this paper, we wish to accomplish generation equipment's heighten stability and believability through remote monitoring and control of guard lamp system. This paper describes the design of the monitoring system for the sensing data and indirect controlling of the guard lamp system. Most of the conventional monitoring systems depend on the special hardware and software. The essential design of monitoring system is to provide the convenience for the user and the portability for the system. In order for the system to fulfill its requirements, it was designed using Labview GUI facility based on the Windows 2000 environment of IBM PC compatible and Add-oncard based on the TCP/IP Protocol. Advantage of the monitoring system are a personnel expenses curtailment effect, of the place restriction and unmanned system of the generationplants, etc..

  • PDF

A Study on ICT Technology Leading Change of Unmanned Store (무인판매점 변화를 리드하는 ICT 기술에 대한 연구)

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.4
    • /
    • pp.109-114
    • /
    • 2018
  • In general, the simple items we need to live in are purchased through retail stores such as supermarkets near our home. In the store, not only the items but also the management personnel and the payment instruments for the store management are located in one space called the store. Such a general store environment is gradually changing into an 'unmanned market' as a result of the development and fusion of information and communication technology (ICT). An unmanned market is an environment in which no one runs a market as the word has. An example of a typical change is Amazon's Unofficial Amazon Store. In addition, the usage and prospects of unmanned market in China are growing very meaningfully. In this study, the present situation of the unmanned market is examined in the US and China markets, and the development prospects are described. It also describes the key milestones necessary for the unmanned market.

A Repository Utilization System to optimize maintenance of IIoT-based main point Utilities (IIoT 기반한 핵심유틸리티의 유지보수 최적화를 위한 공동 활용 시스템)

  • Lee, Byung-Ok;Lee, Kun-Woo;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.89-94
    • /
    • 2021
  • Recently, manufacturing companies are introducing many intelligent production processes that apply IIoT/ICT to improve competitiveness, and a system that maintains availability, improves productivity, and optimizes management costs is needed as a preventive measure using environmental data generated from air ejectors. Therefore, in this study, a dedicated control board was developed and LoRa communication module was applied to remotely control it to collect and manage information about compressors from cloud servers and to ensure that all operators and administrators utilize common data in real time. This dramatically reduced M/S steps, increased system operational availability, and reduced local server operational burden. It dramatically reduced maintenance latency by sharing system failure conditions and dramatically improved cost and space problems by providing real-time status detection through wired and mobile utilization by maintenance personnel.

Cyber threat Detection and Response Time Modeling (사이버 위협 탐지대응시간 모델링)

  • Han, Choong-Hee;Han, ChangHee
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.53-58
    • /
    • 2021
  • There is little research on actual business activities in the field of security control. Therefore, in this paper, we intend to present a practical research methodology that can contribute to the calculation of the size of the appropriate input personnel through the modeling of the threat information detection response time of the security control and to analyze the effectiveness of the latest security solutions. The total threat information detection response time performed by the security control center is defined as TIDRT (Total Intelligence Detection & Response Time). The total threat information detection response time (TIDRT) is composed of the sum of the internal intelligence detection & response time (IIDRT) and the external intelligence detection & response time (EIDRT). The internal threat information detection response time (IIDRT) can be calculated as the sum of the five steps required. The ultimate goal of this study is to model the major business activities of the security control center with an equation to calculate the cyber threat information detection response time calculation formula of the security control center. In Chapter 2, previous studies are examined, and in Chapter 3, the calculation formula of the total threat information detection response time is modeled. Chapter 4 concludes with a conclusion.

PDF Version 1.4-1.6 Password Cracking in CUDA GPU Environment (PDF 버전 1.4-1.6의 CUDA GPU 환경에서 암호 해독 최적 구현)

  • Hyun Jun, Kim;Si Woo, Eum;Hwa Jeong, Seo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.2
    • /
    • pp.69-76
    • /
    • 2023
  • Hundreds of thousands of passwords are lost or forgotten every year, making the necessary information unavailable to legitimate owners or authorized law enforcement personnel. In order to recover such a password, a tool for password cracking is required. Using GPUs instead of CPUs for password cracking can quickly process the large amount of computation required during the recovery process. This paper optimizes on GPUs using CUDA, with a focus on decryption of the currently most popular PDF 1.4-1.6 version. Techniques such as eliminating unnecessary operations of the MD5 algorithm, implementing 32-bit word integration of the RC4 algorithm, and using shared memory were used. In addition, autotune techniques were used to search for the number of blocks and threads that affect performance improvement. As a result, we showed throughput of 31,460 kp/s (kilo passwords per second) and 66,351 kp/s at block size 65,536, thread size 96 in RTX 3060, RTX 3090 environments, and improved throughput by 22.5% and 15.2%, respectively, compared to the cracking tool hashcat that achieves the highest throughput.

Computer Vision-based Automated Adhesive Quality Inspection Model of Exterior Insulation and Finishing System (컴퓨터 비전 기반 외단열 공사의 접착제 도포품질 감리 자동화 모델)

  • Yoon, Sebeen;Kang, Mingyun;Jang, Hyounseung;Kim, Taehoon
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.2
    • /
    • pp.165-173
    • /
    • 2023
  • This research proposed a model for automatically monitoring the quality of insulation adhesive application in external insulation construction. Upon case implementation, the area segmentation model demonstrated a 92.3% accuracy, while the area and distance calculation accuracies of the proposed model were 98.8% and 96.7%, respectively. These findings suggest that the model can effectively prevent the most common insulation defect, insulation failure, while simultaneously minimizing the need for on-site supervisory personnel during external insulation construction. This, in turn, contributes to the enhancement of the external insulation system. Moving forward, we plan to gather construction images of various external insulation methods to refine the image segmentation model's performance and develop a model capable of automatically monitoring scenarios with a considerable number of insulation materials in the image.

A Study on Determining the Optimal Amount of Labor Force for Cargo Handling in the Harbor (항만 하역 노동력의 최적 규모 결정에 관하여)

  • Lee, Cheol-Yeong;Jang, Yeong-Jun
    • Journal of Korean Port Research
    • /
    • v.3 no.1
    • /
    • pp.35-55
    • /
    • 1989
  • Today, about 99% of total import and export cargo in Korea is being transported through the port. The general trends of cargo handling show increases in capacity and speed, In order to cope with these trends, it is not only required to raise the efficiencies of port operation and function but also necessary to decide the optimal amount of the skilled labor force for cargo handling in the port. Cargo handling in the port is basically relied on the cargo handling facilities. Therefore, it is very important to reserve the amount of labor force for cargo handling system has been developed up to a certain level but the personnel management system which is the superior structure has not been followed well. In this study, therefore, we show a method to determine the required amount of labor force for cargo handling considering the amount of cargo and type of cargo handling work per each cargo, and the optimal amount labor force in cope with the fluctuation of the basic cargo handling labor force with respect to the time of in and out cargo flow in the viewpoint of minimizing the expences due to reservation of extra labor force than needed and firing employment of labor force using the Dynamic Programming. The derived algorithm is introduced into the computer simulation for Pusan port with the analyzed real data such as amount of cargo handling in the port with respect to working hour, cargo capacity, working step, the ratio of cargo handling facility and actual number of workers and we estimated the required labor force. As a result of analysis the labor force of Pusan port showed the over-employment such as maximum 21.4%, minimum 8.2% when we assumed that the averages of actual working hours and days were 8 hours in a day and 20 day in a month.

  • PDF

Python Package Production for Agricultural Researcher to Use Meteorological Data (농업연구자의 기상자료 활용을 위한 파이썬 패키지 제작)

  • Hyeon Ji Yang;Joo Hyun Park;Mun-Il Ahn;Min Gu Kang;Yong Kyu Han;Eun Woo Park
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.25 no.2
    • /
    • pp.99-107
    • /
    • 2023
  • Recently, the abnormal weather events and crop damages occurred frequently likely due to climate change. The importance of meteorological data in agricultural research is increasing. Researchers can download weather observation data by accessing the websites provided by the KMA (Korea Meteorological Administration) and the RDA (Rural Development Administration). However, there is a disadvantage that multiple inquiry work is required when a large amount of meteorological data needs to be received. It is inefficient for each researcher to store and manage the data needed for research on an independent local computer in order to avoid this work. In addition, even if all the data were downloaded, additional work is required to find and open several files for research. In this study, data collected by the KMA and RDA were uploaded to GitHub, a remote storage service, and a package was created that allows easy access to weather data using Python. Through this, we propose a method to increase the accessibility and usability of meteorological data for agricultural personnel by adopting a method that allows anyone to take data without an additional authentication process.