• Title/Summary/Keyword: Post-Management System

Search Result 696, Processing Time 0.027 seconds

A Study on the Application of Block Chain Technology on EVMS (EVMS 업무의 블록체인 기술 적용 방안 연구)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.39 no.2
    • /
    • pp.39-60
    • /
    • 2020
  • Block chain technology is one of the core elements for realizing the 4th industrial revolution, and many efforts have been made by government and companies to provide services based on block chain technology. In this study we analyzed the benefits of block chain technology for EVMS and designed EVMS block chain platform with increased data security and work efficiency for project management data, which are important assets in monitoring progress, foreseeing future events, and managing post-completion. We did the case studies on the benefits of block chain technology and then conducted the survey study on security, reliability, and efficiency of block chain technology, targeting 18 block chain experts and project developers. And then, we interviewed EVMS system operator on the compatibility between block chain technology and EVM Systems. The result of the case studies showed that block chain technology can be applied to financial, logistic, medical, and public services to simplify the insurance claim process and to improve reliability by distributing transaction data storage and applying security·encryption features. Also, our research on the characteristics and necessity of block chain technology in EVMS revealed the improvability of security, reliability, and efficiency of management and distribution of EVMS data. Finally, we designed a network model, a block structure, and a consensus algorithm model and combined them to construct a conceptual block chain model for EVM system. This study has the following contribution. First, we reviewed that the block chain technology is suitable for application in the defense sector and proposed a conceptual model. Second, the effect that can be obtained by applying block chain technology to EVMS was derived, and the possibility of improving the existing business process was derived.

The Study On Quality Control of Magnetic Resonance Imaging System (자기공명영상장치의 정도관리에 관한 연구)

  • Jeong, Cheon-Soo;Lim, Cheong-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.6
    • /
    • pp.178-186
    • /
    • 2009
  • The quality control is needed to ensure the accuracy of medical information and achieved by evaluating the performance of and maintaining the system and practicing various measurements and evaluations. The Korean Institute for Accreditation of Medical Image, therefore, have held educational program for quality control of special medical equipments. The major of programs participants, however, are radiology specialists with only small number of radiological technologists from some hospitals, furthermore, the follow-up education and the share of information between participants and non-participants are insufficient in general, thus, the knowledge level of radiological technologists, regardless of their participation, is relatively low. This study carried out the questionnaire research for the 500 radiological technologists registered in Korean Society of MRI Technology, on the basis of 2008, and performed analysis for five months from May to Oct., 2008. The questionnaires were delivered by post to each radiological technologists and the response rate was 36%(n=180). The results of this revealed that the 86.7% of respondents felt the necessity of inspection on quality management, while only the 27.8% completed the educational program for manager of special medical equipment. and only the half(53.9%) had the knowledge about inspection on quality management. The completion of educational program had no correlations with sex, age, size of occupying hospital, the number of radiological technologists in occupying site and MRI laboratory, career year of general radiologist and in MRI laboratory, and the presence of biomedical engineering department in occupying hospital. The 78.0% of participants at the educational program for quality management held by the Korean Institute for Accreditation of Medical Image had the knowledge about inspection on quality management(p<.05) whereas the 43.9% of the hospitals held such program and the 54.4% of radiological technologists from those hospitals had related knowledge, which indicated that such programs held by hospitals had not effects on the knowledge level of radiological technologists. This indicates also that the contents, methods, and other conditional factors of educational programs are important for the outcome of them.

An Implementation of Dynamic Gesture Recognizer Based on WPS and Data Glove (WPS와 장갑 장치 기반의 동적 제스처 인식기의 구현)

  • Kim, Jung-Hyun;Roh, Yong-Wan;Hong, Kwang-Seok
    • The KIPS Transactions:PartB
    • /
    • v.13B no.5 s.108
    • /
    • pp.561-568
    • /
    • 2006
  • WPS(Wearable Personal Station) for next generation PC can define as a core terminal of 'Ubiquitous Computing' that include information processing and network function and overcome spatial limitation in acquisition of new information. As a way to acquire significant dynamic gesture data of user from haptic devices, traditional gesture recognizer based on desktop-PC using wire communication module has several restrictions such as conditionality on space, complexity between transmission mediums(cable elements), limitation of motion and incommodiousness on use. Accordingly, in this paper, in order to overcome these problems, we implement hand gesture recognition system using fuzzy algorithm and neural network for Post PC(the embedded-ubiquitous environment using blue-tooth module and WPS). Also, we propose most efficient and reasonable hand gesture recognition interface for Post PC through evaluation and analysis of performance about each gesture recognition system. The proposed gesture recognition system consists of three modules: 1) gesture input module that processes motion of dynamic hand to input data 2) Relational Database Management System(hereafter, RDBMS) module to segment significant gestures from input data and 3) 2 each different recognition modulo: fuzzy max-min and neural network recognition module to recognize significant gesture of continuous / dynamic gestures. Experimental result shows the average recognition rate of 98.8% in fuzzy min-nin module and 96.7% in neural network recognition module about significantly dynamic gestures.

Financial Fraud Detection using Text Mining Analysis against Municipal Cybercriminality (지자체 사이버 공간 안전을 위한 금융사기 탐지 텍스트 마이닝 방법)

  • Choi, Sukjae;Lee, Jungwon;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.119-138
    • /
    • 2017
  • Recently, SNS has become an important channel for marketing as well as personal communication. However, cybercrime has also evolved with the development of information and communication technology, and illegal advertising is distributed to SNS in large quantity. As a result, personal information is lost and even monetary damages occur more frequently. In this study, we propose a method to analyze which sentences and documents, which have been sent to the SNS, are related to financial fraud. First of all, as a conceptual framework, we developed a matrix of conceptual characteristics of cybercriminality on SNS and emergency management. We also suggested emergency management process which consists of Pre-Cybercriminality (e.g. risk identification) and Post-Cybercriminality steps. Among those we focused on risk identification in this paper. The main process consists of data collection, preprocessing and analysis. First, we selected two words 'daechul(loan)' and 'sachae(private loan)' as seed words and collected data with this word from SNS such as twitter. The collected data are given to the two researchers to decide whether they are related to the cybercriminality, particularly financial fraud, or not. Then we selected some of them as keywords if the vocabularies are related to the nominals and symbols. With the selected keywords, we searched and collected data from web materials such as twitter, news, blog, and more than 820,000 articles collected. The collected articles were refined through preprocessing and made into learning data. The preprocessing process is divided into performing morphological analysis step, removing stop words step, and selecting valid part-of-speech step. In the morphological analysis step, a complex sentence is transformed into some morpheme units to enable mechanical analysis. In the removing stop words step, non-lexical elements such as numbers, punctuation marks, and double spaces are removed from the text. In the step of selecting valid part-of-speech, only two kinds of nouns and symbols are considered. Since nouns could refer to things, the intent of message is expressed better than the other part-of-speech. Moreover, the more illegal the text is, the more frequently symbols are used. The selected data is given 'legal' or 'illegal'. To make the selected data as learning data through the preprocessing process, it is necessary to classify whether each data is legitimate or not. The processed data is then converted into Corpus type and Document-Term Matrix. Finally, the two types of 'legal' and 'illegal' files were mixed and randomly divided into learning data set and test data set. In this study, we set the learning data as 70% and the test data as 30%. SVM was used as the discrimination algorithm. Since SVM requires gamma and cost values as the main parameters, we set gamma as 0.5 and cost as 10, based on the optimal value function. The cost is set higher than general cases. To show the feasibility of the idea proposed in this paper, we compared the proposed method with MLE (Maximum Likelihood Estimation), Term Frequency, and Collective Intelligence method. Overall accuracy and was used as the metric. As a result, the overall accuracy of the proposed method was 92.41% of illegal loan advertisement and 77.75% of illegal visit sales, which is apparently superior to that of the Term Frequency, MLE, etc. Hence, the result suggests that the proposed method is valid and usable practically. In this paper, we propose a framework for crisis management caused by abnormalities of unstructured data sources such as SNS. We hope this study will contribute to the academia by identifying what to consider when applying the SVM-like discrimination algorithm to text analysis. Moreover, the study will also contribute to the practitioners in the field of brand management and opinion mining.

A Statistical Prediction Model of Speakers' Intentions in a Goal-Oriented Dialogue (목적지향 대화에서 화자 의도의 통계적 예측 모델)

  • Kim, Dong-Hyun;Kim, Hark-Soo;Seo, Jung-Yun
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.9
    • /
    • pp.554-561
    • /
    • 2008
  • Prediction technique of user's intention can be used as a post-processing method for reducing the search space of an automatic speech recognizer. Prediction technique of system's intention can be used as a pre-processing method for generating a flexible sentence. To satisfy these practical needs, we propose a statistical model to predict speakers' intentions that are generalized into pairs of a speech act and a concept sequence. Contrary to the previous model using simple n-gram statistic of speech acts, the proposed model represents a dialogue history of a current utterance to a feature set with various linguistic levels (i.e. n-grams of speech act and a concept sequence pairs, clue words, and state information of a domain frame). Then, the proposed model predicts the intention of the next utterance by using the feature set as inputs of CRFs (Conditional Random Fields). In the experiment in a schedule management domain, The proposed model showed the precision of 76.25% on prediction of user's speech act and the precision of 64.21% on prediction of user's concept sequence. The proposed model also showed the precision of 88.11% on prediction of system's speech act and the Precision of 87.19% on prediction of system's concept sequence. In addition, the proposed model showed 29.32% higher average precision than the previous model.

Pest control managements for preservation of wooden cultural properties (목조문화재의 원형보존을 위한 충해 방제방안)

  • Lee, Kyu-Sik;Jeong, So-Young;Chung, Yong-Jae
    • 보존과학연구
    • /
    • s.21
    • /
    • pp.5-55
    • /
    • 2000
  • The cultural properties are damaged by various causes according to the characteristics of material, the condition of preservation, and the period of time. Especially, biodeterioration makes lots of damages in organic properties than inorganic ones. The damages of wooden cultural properties by insects usually are caused by the three orders; Isoptera, Coleoptera, and Hymenoptera. As the result of investigation on the state of 141 buildings of wooden cultural properties in 1999, some of them were damaged by many kinds off actors; wasp, powder post beetle, cigarette beetle, termite, decay, and physical cracking. And it was found that the patterns of damages were related to species-specific habits of insects. There are several methods of pest control for the prevention of wooden cultural properties from damages caused by insects. Those are as follows; physical control, chemical control, biological control, and integrated pest management. When insects and fungi were detected at the wooden buildings, the fumigation is best treatment to stop biodeterioration. And then, wood materials also need to be treated with insecticidal and antiseptic chemicals to avoid a reinfestation, because the fumigant is volatile. The six commercial chemicals which are applied to the insecticidal and antiseptic treatment of wooden cultural properties were purchased to test their abilities. According to the comparative results of efficacy of them in laboratory, chemical D showed excellent efficacy in all items, including antiseptic and termiticidal items. The goal of these pest controls is to protect wooden buildings from insects and microorganisms. The most effective method used currently is chemical control(fumigation, insecticidal and anticeptic chemical treatment), but it has to be treated periodically to control pest effectively. Recently environmentally-friendly control methods such as bait system or biological treatments are replacing traditional barrier treatments using large amounts of chemicals. Especially, termite is a social insect which makes a colony. Although a building with fumigation treatment is safe for a while, once attacked building has a risk of damage by reinfestation of termite. Therefore, to control termites from damaged building, the entire colony including reproductives(queen and king) and larvae around buildings must beeliminated. Bait system can be used as a preventive measure in early detection of them through termites colony monitoring and baiting. It would be the most effective for termite control if bait system would be used together with the chemical controls.

  • PDF

A Study on the international case studies for SEA follow-up (전략환경평가 사후관리 해외 사례 분석)

  • Cho, Hanna;Park, Joo-Yang
    • Journal of Environmental Impact Assessment
    • /
    • v.24 no.4
    • /
    • pp.375-385
    • /
    • 2015
  • This study analyzed international case studies on Strategic Environmental Assessment (SEA) follow-up and suggested implications based on the study's findings to aid implementation of SEA follow-up in Korea. SEA requires follow-up in order to identify unforseen adverse effects and enable appropriate remedial action to be taken. Tool kits and methodological framework for effective SEA follow-up are only being researched recently. Based on the study's findings, following implications for implementing SEA follow-up in Korea were drawn. First, the system of carrying out SEA follow-up would be different depending on the PPP topic. During the scoping stage, significant impacts should be identified according to the PPP topic, and thus help determine the indicators to be developed in the later stage. Secondly, responsibility, method, time, intervals and actions from SEA follow-up may vary depending on the target SEA consultation. Thirdly, the indicators of SEA follow-up may be considered together with various environmental standards and current political, social and economic indicators which are a big issue in society. Fourthly, SEA follow-up can be used as an integration system of its target planning and environmental planning. Finally, SEA feedback system should be needed. The result of SEA follow-up should be used for target PPP. These would lead to improvements to the target PPP. If SEA follow up is successfully implemented and actively carried out for domestic PPPs, Korea can be a step closer to realization of sustainable development.

Removal Characteristics of Natural Organic Matter and Taste and Odor by Advanced Water Treatment Process around the Han River Water Supply System (한강수계 고도정수처리 공정에서의 유기물과 맛·냄새의 제거특성)

  • Jae-Lim Lim;Lee, Kyung-Hyuk;Kim, Seong-Su;Chae, Seon-Ha
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.21 no.1
    • /
    • pp.13-25
    • /
    • 2007
  • The water treatment plants in Seoul Metropolitan Area, which are under Korea Water Resources Corporation(KOWACO)'s management, take water from Paldang Reservoir in Han River System for drinking water supply. There are taste and odor (T&O) problems in the finished water because the conventional treatment processes do not effectively remove the T&O compounds. As part of countermeasures for taste and odor control, KOWACO is planning to introduce advanced water treatment process such as ozone and GAC in near future. This study evaluated the removal characteristics of T&O and dissolved organic matter (DOM) to find design and operation parameters of advanced water treatment processes in a pilot-scale treatment plant. The GAC adsorption capacity for DOC in the two GAC system (GAC and $O_3$-GAC) at an EBCT of 14min was mostly exhausted after 9months. The differency of the removal efficiency of DOC between $O_3$-GAC and GAC increased with increasing operation time because the bioactivity in $O_3$-GAC process was enhanced by post-ozone process. Removal by conventional treatment was unable to reach the target TON(threshold odor number) of 3 but GAC systems at an EBCT(empty bed contact time) of 14 min were able to archive the target with few exception. During the high T&O episodes, PAC as a pretreatment together with GAC could be useful option for T&O control. However, substantial TON removal continued for more than two year (> 90,000 bed volumes). At the spiking of less concentration 26 to 61 ng/L in the influent of GAC systems, GAC absorber and $O_3$-GAC processes could meet the treatment target. The better spike control after 12 and 19 months of operation compared to that after 7 months of operation is a strong indication of biological control. The results presented in this study had shown that $O_3$-GAC process was found to be more effective for T&O control than GAC process. And the main removal mechanism in GAC systems were adsorption capacity and biodegradation.

With Corona Era, exploring policy measures to prevent non-face-to-face lonely deaths - Focusing on Daegu Metropolitan City's AI and IOT cases of lonely death prevention (With 코로나 시대 비대면 고독사 예방정책 방안 모색 - 대구광역시 AI, IOT 고독사 예방 사례를 중심으로)

  • Ha-Yoon Kim;Tai-Hyun Ha
    • Journal of Digital Convergence
    • /
    • v.21 no.3
    • /
    • pp.49-62
    • /
    • 2023
  • Due to social and cultural changes and the growth of aging people living as a single because of aging, lonely deaths are steadily increasing, and each local government has begun to define them as a social problem. The legal basis began to be established. In order to explore policy measures to prevent lonely deaths, this study examined cases of lonely death prevention policies using smart digital information technology (AI, IOT), which is being promoted by Daegu Metropolitan City to promote non-face-to-face policies to prevent lonely deaths. Policies related to lonely deaths are divided into two axes: lonely death prevention projects and post-excavation support projects. In order to operate these businesses efficiently, the provision of non-face-to-face services through artificial intelligence and the Internet of Things is recognized as a new service delivery system, so the importance and necessity of non-face-to-face services is increasing. It is time that multifaceted changes and preparations are needed, such as establishing a system to expand the non-face-to-face industry at the national level. In order to respond to another national disaster situation in the future, the non-face-to-face smart care system is being expanded in various welfare policies such as preventing lonely deaths. It will have to be activated.

A Study on Actual Usage of Information Systems: Focusing on System Quality of Mobile Service (정보시스템의 실제 이용에 대한 연구: 모바일 서비스 시스템 품질을 중심으로)

  • Cho, Woo-Chul;Kim, Kimin;Yang, Sung-Byung
    • Asia pacific journal of information systems
    • /
    • v.24 no.4
    • /
    • pp.611-635
    • /
    • 2014
  • Information systems (IS) have become ubiquitous and changed every aspect of how people live their lives. While some IS have been successfully adopted and widely used, others have failed to be adopted and crowded out in spite of remarkable progress in technologies. Both the technology acceptance model (TAM) and the IS Success Model (ISSM), among many others, have contributed to explain the reasons of success as well as failure in IS adoption and usage. While the TAM suggests that intention to use and perceived usefulness lead to actual IS usage, the ISSM indicates that information quality, system quality, and service quality affect IS usage and user satisfaction. Upon literature review, however, we found a significant void in theoretical development and its applications that employ either of the two models, and we raise research questions. First of all, in spite of the causal relationship between intention to use and actual usage, in most previous studies, only intention to use was employed as a dependent variable without overt explaining its relationship with actual usage. Moreover, even in a few studies that employed actual IS usage as a dependent variable, the degree of actual usage was measured based on users' perceptual responses to survey questionnaires. However, the measurement of actual usage based on survey responses might not be 'actual' usage in a strict sense that responders' perception may be distorted due to their selective perceptions or stereotypes. By the same token, the degree of system quality that IS users perceive might not be 'real' quality as well. This study seeks to fill this void by measuring the variables of actual usage and system quality using 'fact' data such as system logs and specifications of users' information and communications technology (ICT) devices. More specifically, we propose an integrated research model that bring together the TAM and the ISSM. The integrated model is composed of both the variables that are to be measured using fact as well as survey data. By employing the integrated model, we expect to reveal the difference between real and perceived degree of system quality, and to investigate the relationship between the perception-based measure of intention to use and the fact-based measure of actual usage. Furthermore, we also aim to add empirical findings on the general research question: what factors influence actual IS usage and how? In order to address the research question and to examine the research model, we selected a mobile campus application (MCA). We collected both fact data and survey data. For fact data, we retrieved them from the system logs such information as menu usage counts, user's device performance, display size, and operating system revision version number. At the same time, we conducted a survey among university students who use an MCA, and collected 180 valid responses. A partial least square (PLS) method was employed to validate our research model. Among nine hypotheses developed, we found five were supported while four were not. In detail, the relationships between (1) perceived system quality and perceived usefulness, (2) perceived system quality and perceived intention to use, (3) perceived usefulness and perceived intention to use, (4) quality of device platform and actual IS usage, and (5) perceived intention to use and actual IS usage were found to be significant. In comparison, the relationships between (1) quality of device platform and perceived system quality, (2) quality of device platform and perceived usefulness, (3) quality of device platform and perceived intention to use, and (4) perceived system quality and actual IS usage were not significant. The results of the study reveal notable differences from those of previous studies. First, although perceived intention to use shows a positive effect on actual IS usage, its explanatory power is very weak ($R^2$=0.064). Second, fact-based system quality (quality of user's device platform) shows a direct impact on actual IS usage without the mediating role of intention to use. Lastly, the relationships between perceived system quality (perception-based system quality) and other constructs show completely different results from those between quality of device platform (fact-based system quality) and other constructs. In the post-hoc analysis, IS users' past behavior was additionally included in the research model to further investigate the cause of such a low explanatory power of actual IS usage. The results show that past IS usage has a strong positive effect on current IS usage while intention to use does not have, implying that IS usage has already become a habitual behavior. This study provides the following several implications. First, we verify that fact-based data (i.e., system logs of real usage records) are more likely to reflect IS users' actual usage than perception-based data. In addition, by identifying the direct impact of quality of device platform on actual IS usage (without any mediating roles of attitude or intention), this study triggers further research on other potential factors that may directly influence actual IS usage. Furthermore, the results of the study provide practical strategic implications that organizations equipped with high-quality systems may directly expect high level of system usage.