• Title/Summary/Keyword: Service Flow

Search Result 1,227, Processing Time 0.026 seconds

Analyzing the Projection of Physician Workforce Supply and Demand in Gyeongsangnam-Do, South Korea, through System Dynamics (시스템 다이내믹스를 활용한 경상남도 의사인력 수급추계를 통한 적정성 연구)

  • Youngsoo Kim;Beak-Geun Jeong;Gyeong-Min Lee
    • Journal of agricultural medicine and community health
    • /
    • v.49 no.3
    • /
    • pp.235-256
    • /
    • 2024
  • Background: The adequate provision of medical care relies on the availability of a suitable number of healthcare professionals. To ensure stability in healthcare delivery, it is crucial for a country to accurately estimate and address the supply of doctors. This study aims to contribute to the formulation of effective policies for securing and distributing doctor manpower, with a focus on medically underserved areas at both the national and local government levels. Methods: Employing the system dynamics methodology, this research utilizes stock and flow diagrams, including level and rate diagrams, to quantitatively analyze the cumulative structure of the doctor supply and demand system. Results: The analysis reveals a substantial shortage of clinical doctors in Gyeongsangnam-do, amounting to 15,477 as of 2021. Projections indicate a need for an additional 7,570 doctors by the year 2050 to maintain the current healthcare service level. Examination of medical treatment rights and distribution across cities and counties indicates an insufficiency in doctor supply relative to demand in the majority of regions. Alternative scenarios, such as increasing medical school enrollments and adjusting retirement ages, were explored, yet none provided a sufficient resolution to the shortage. Conclusion: The findings underscore an impending exacerbation of the doctor shortage in Gyeongsangnam-do if the existing system is perpetuated. Addressing this issue necessitates not only augmenting the number of medical school students and adapting retirement age policies but also implementing diverse strategies employed successfully in other countries. This study serves as a foundational step in informing evidence-based policies aimed at securing an ample and appropriately distributed doctor workforce for sustainable healthcare delivery.

Context Sharing Framework Based on Time Dependent Metadata for Social News Service (소셜 뉴스를 위한 시간 종속적인 메타데이터 기반의 컨텍스트 공유 프레임워크)

  • Ga, Myung-Hyun;Oh, Kyeong-Jin;Hong, Myung-Duk;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.39-53
    • /
    • 2013
  • The emergence of the internet technology and SNS has increased the information flow and has changed the way people to communicate from one-way to two-way communication. Users not only consume and share the information, they also can create and share it among their friends across the social network service. It also changes the Social Media behavior to become one of the most important communication tools which also includes Social TV. Social TV is a form which people can watch a TV program and at the same share any information or its content with friends through Social media. Social News is getting popular and also known as a Participatory Social Media. It creates influences on user interest through Internet to represent society issues and creates news credibility based on user's reputation. However, the conventional platforms in news services only focus on the news recommendation domain. Recent development in SNS has changed this landscape to allow user to share and disseminate the news. Conventional platform does not provide any special way for news to be share. Currently, Social News Service only allows user to access the entire news. Nonetheless, they cannot access partial of the contents which related to users interest. For example user only have interested to a partial of the news and share the content, it is still hard for them to do so. In worst cases users might understand the news in different context. To solve this, Social News Service must provide a method to provide additional information. For example, Yovisto known as an academic video searching service provided time dependent metadata from the video. User can search and watch partial of video content according to time dependent metadata. They also can share content with a friend in social media. Yovisto applies a method to divide or synchronize a video based whenever the slides presentation is changed to another page. However, we are not able to employs this method on news video since the news video is not incorporating with any power point slides presentation. Segmentation method is required to separate the news video and to creating time dependent metadata. In this work, In this paper, a time dependent metadata-based framework is proposed to segment news contents and to provide time dependent metadata so that user can use context information to communicate with their friends. The transcript of the news is divided by using the proposed story segmentation method. We provide a tag to represent the entire content of the news. And provide the sub tag to indicate the segmented news which includes the starting time of the news. The time dependent metadata helps user to track the news information. It also allows them to leave a comment on each segment of the news. User also may share the news based on time metadata as segmented news or as a whole. Therefore, it helps the user to understand the shared news. To demonstrate the performance, we evaluate the story segmentation accuracy and also the tag generation. For this purpose, we measured accuracy of the story segmentation through semantic similarity and compared to the benchmark algorithm. Experimental results show that the proposed method outperforms benchmark algorithms in terms of the accuracy of story segmentation. It is important to note that sub tag accuracy is the most important as a part of the proposed framework to share the specific news context with others. To extract a more accurate sub tags, we have created stop word list that is not related to the content of the news such as name of the anchor or reporter. And we applied to framework. We have analyzed the accuracy of tags and sub tags which represent the context of news. From the analysis, it seems that proposed framework is helpful to users for sharing their opinions with context information in Social media and Social news.

A Function and Weight Selection of Ecosystem Service Function for the Eco-friendly Protected Horticulture Complex in Agricultural Landscape (시설원예단지의 친환경적 조성을 위한 생태계서비스 기능 및 가중치 산정)

  • SON, Jinkwan;KONG, Minjae;SHIN, Yukung;YUN, Sungwook;KANG, Donghyeon;Park, Minjung;LEE, Siyoung
    • Journal of Wetlands Research
    • /
    • v.19 no.4
    • /
    • pp.533-541
    • /
    • 2017
  • Agricultural landscape has many ecosystem service functions. However, the development of the horticulture complex has no consideration for environmental conservation. Therefore, we analyzed the priorities of ecosystem service functions required for the composition. The study was conducted in three stages. As a result of the first survey, 17 functions were selected to be improved. In the second survey, 12 functions were selected excluding 5 functions. Finally, 1. Measures for water purification, 2. Groundwater recharge plan, 3. Surface water storage space, 4. Flood control measures, 5. Vegetation diversity space, 6. Carbon emission reduction plan, 7. Aquatic insect habitat space, 8. Amphibian reptiles 9. Landscape and Waste Management, 10. Bird Species Space, 11. Heat Island Mitigation Plan, 12. Experience / Ecological Education Plan. We proposed the structure, capacity, flow rate, arrangement and form of the water treatment facility to improve water quality by improving the function. We proposed a reservoir space of 7-10% for groundwater recharge. The development of reservoir and storage facilities suitable for the Korean situation is suggested for the surface water storage and flood control measures. And proposed to secure a green space for the climate cycle. Proposed habitat and nutrient discharge management for biodiversity. We propose green area development and wetland development to improve the landscape, and put into the facilities for experiential education. The results of the research can be utilized for the development and improvement of the horticultural complex.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Preliminary Study on Actuated Signal Control at Rural Area of Cheon-an City (천안시 외곽지역의 감응식 신호운영을 위한 기초연구)

  • Park, Soon-Yong;Kim, Dong-Nyong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.3
    • /
    • pp.52-63
    • /
    • 2009
  • Recently in Korea, in the case of metropolis, the urban signalized intersections are controlled by traffic information center or ITS center. Cheon-an City also established traffic information center through the 1st.-$\sim$3rd. ITS public construction and has managed this center that includes bus information service, traffic information collection and providing service, parking information service, and traffic responsive control system. In the Cheon-an metropolitan traffic signal operation, traffic signal controllers were grouped by the each main traffic flow axes and performed with coordinated signal timing for the signalized arterials, and also cycle and split changed by realtime traffic demands. Cheon-an urban traffic responsive control system was evaluated by intersection delay and speed, then it was verified that the delay decreased and vehicle speed improved. However, the rural signal control system to connect adjacency town was evaluated to have lower status than urban area due to the unimproved TOD (Time of day) plan. Therefore actuated signal control was examined for substitutive control system in isolated signal intersection. The aim of this article is to compare actuated signal control with TOD mode in the rural intersection of Cheon-an and to fine superiority of these two control mode, with evaluation of vehicle delay by using HCM(2000) method and by micro-simulation CORSlM. The result of field test show that actuated signal control gave better performance in delay comparison than the existing TOD signal control. And simulation outcome verified that non-optimized TOD has higher delay than optimized TOD mode, non-optimal actuated mode, and optimal actuated signal control mode. Particularly, these three modes delays had not different values according to the paired sample t-test. This is because small traffic demands were loaded in each links. This suggested actuated signal control is expected to be more effective than TOD mode in some rural isolated intersections which frequently need to survey for traffic volume.

  • PDF

Deriving adoption strategies of deep learning open source framework through case studies (딥러닝 오픈소스 프레임워크의 사례연구를 통한 도입 전략 도출)

  • Choi, Eunjoo;Lee, Junyeong;Han, Ingoo
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.27-65
    • /
    • 2020
  • Many companies on information and communication technology make public their own developed AI technology, for example, Google's TensorFlow, Facebook's PyTorch, Microsoft's CNTK. By releasing deep learning open source software to the public, the relationship with the developer community and the artificial intelligence (AI) ecosystem can be strengthened, and users can perform experiment, implementation and improvement of it. Accordingly, the field of machine learning is growing rapidly, and developers are using and reproducing various learning algorithms in each field. Although various analysis of open source software has been made, there is a lack of studies to help develop or use deep learning open source software in the industry. This study thus attempts to derive a strategy for adopting the framework through case studies of a deep learning open source framework. Based on the technology-organization-environment (TOE) framework and literature review related to the adoption of open source software, we employed the case study framework that includes technological factors as perceived relative advantage, perceived compatibility, perceived complexity, and perceived trialability, organizational factors as management support and knowledge & expertise, and environmental factors as availability of technology skills and services, and platform long term viability. We conducted a case study analysis of three companies' adoption cases (two cases of success and one case of failure) and revealed that seven out of eight TOE factors and several factors regarding company, team and resource are significant for the adoption of deep learning open source framework. By organizing the case study analysis results, we provided five important success factors for adopting deep learning framework: the knowledge and expertise of developers in the team, hardware (GPU) environment, data enterprise cooperation system, deep learning framework platform, deep learning framework work tool service. In order for an organization to successfully adopt a deep learning open source framework, at the stage of using the framework, first, the hardware (GPU) environment for AI R&D group must support the knowledge and expertise of the developers in the team. Second, it is necessary to support the use of deep learning frameworks by research developers through collecting and managing data inside and outside the company with a data enterprise cooperation system. Third, deep learning research expertise must be supplemented through cooperation with researchers from academic institutions such as universities and research institutes. Satisfying three procedures in the stage of using the deep learning framework, companies will increase the number of deep learning research developers, the ability to use the deep learning framework, and the support of GPU resource. In the proliferation stage of the deep learning framework, fourth, a company makes the deep learning framework platform that improves the research efficiency and effectiveness of the developers, for example, the optimization of the hardware (GPU) environment automatically. Fifth, the deep learning framework tool service team complements the developers' expertise through sharing the information of the external deep learning open source framework community to the in-house community and activating developer retraining and seminars. To implement the identified five success factors, a step-by-step enterprise procedure for adoption of the deep learning framework was proposed: defining the project problem, confirming whether the deep learning methodology is the right method, confirming whether the deep learning framework is the right tool, using the deep learning framework by the enterprise, spreading the framework of the enterprise. The first three steps (i.e. defining the project problem, confirming whether the deep learning methodology is the right method, and confirming whether the deep learning framework is the right tool) are pre-considerations to adopt a deep learning open source framework. After the three pre-considerations steps are clear, next two steps (i.e. using the deep learning framework by the enterprise and spreading the framework of the enterprise) can be processed. In the fourth step, the knowledge and expertise of developers in the team are important in addition to hardware (GPU) environment and data enterprise cooperation system. In final step, five important factors are realized for a successful adoption of the deep learning open source framework. This study provides strategic implications for companies adopting or using deep learning framework according to the needs of each industry and business.

A TCP-like flow control algorithm for RTP/RTCP (TCP 와 RTP/RTCP 유사한 흐름제어 알고리즘)

  • 나승구;윤성덕;안종석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.480-482
    • /
    • 1998
  • 최근, 멀티캐스트 기법을 사용하는 멀티미디어 응용 프로그램들이 인터넷에 등장하고 있다. 이들 응용 프로그램들의 성공 여부는 수신자들에게 전송되는 음성/영상의 품질에 의해 좌우된다. 인터넷은 응용프로그램의 QoS(Quality of Service) 에 대한 요구를 보장할 수 없기 때문에 멀티케스트 트래픽(multicast traffic)을 위하여 인터넷의 성능을 최대한 효율적으로 이용할 수 있도록 흐름제어에 대한 많은 연구가 진행되고 있다. 그 중 IVS(INRIA Video conferencing System)에서 제안한 멀티캐스트 트래픽 흐름제어 알고리즘은 수신자가 주기적으로 전달하는 RTCP 의 패킷손실 정보에 의해 송신자가 전송율을 조절하는 것이다. 그러나 이 알고리즘은 네트워크 상태가 무부하(unload)임에도 불구하고 느린 피드백으로 인하여 가용 네트워크 대역폭을 빠르게 파악하지 못하기 때문에, TCP트래픽과 경쟁 상태에서 네트워크 대역폭을 불공정(unfairness)하게 사용하게 되고 네트워크 상태에 알맞는 전송율을 결정하지 못한다. 본 논문에서는 더욱 공정하게 대역폭을 공유할 수 있고 전체 링크 이용율을 높이는 두 가지 기법을 제안한다. 첫째, 측정된 네트워크 혼잡상태에 따라 RTCP 피드백의 전송 빈도를 동적으로 조절하는 것이다. 둘째, TCP와 같이 전송율을 증가/감소시킴으로써 공정하게 네트워크를 공유하도록 하는 것이다. 본 논문에서는 이 두 가지 기법들이 TCP 트래픽에 영향을 주지 않고 또한 RTCP피드백의 양을 증가시키지 않으면서도 공정하게 네트워크 대역폭을 공유함으로써 링크의 이용율을 높일 수 있다는 것을 시뮬레이션을 통하여 보여준다.안 모니터링 기 능 등으로 조사되었다.도 멜-켑스트럼을 사용한 경우 67.5%, K-L계수를 사용한 경우 75.3%로 7.8%의 향상된 인식률을 보였으며 K-L계수와 회귀계수를 결합한 경우에서도 비교적 높은 인식률을 보여 숫자음에 대해서도 K-L계수의 유효성을 확인할 수 있었다..rc$ 구입할 때 중점적으로 살펴보는 사항은 신선도와 순수재래종 여부, 위생상태였다. 한편 소비자가 언제나 구입할 수 없다는 의견이 85.2%나 되어 원활한 공급과 시장조성이 아직 정착되지 않고 있었다. $\bigcirc$ 현재 유통되고 있는 재래종닭은 소비자 대부분이 잡종으로 인식하고 있었으며, 재래종과 일반육계와의 구별은 깃털색, 피부색, 정강이색등 외관상으로 구별하고 있었다. 체중에 대한 반응은 너무 작다는 의견이었고, 식품으로의 인식도는 비교적 고급식품으로 인식하고 있다. $\bigcirc$ 재래종닭고기의 브랜드화에 대한 견해는 젊고 소득이 높은 계층에서 브랜드화의 필요성을 강조하고 있다. $\bigcirc$ 재래종달걀의 소비형태는 대부분의 소비자가 좋아하였으나 아직 먹어보지 못한 응답자가 많았다. 재래종달걀의 맛에 대해서는 고소하고 독특하여 차별성을 느끼고 있었다. $\bigcirc$ 재래종달걀의 구입장소는 계란판매점(축협.농협), 슈퍼, 백화점, 재래닭 사육 농장등 다양하였으며 포장단위는 10개를 가장 선호하였고, 포장재료는 종이, 플라스틱, 짚의 순으로 좋아하였다. $\bigcirc$ 달걀의 가격은 200원정도를 적정하다고 하였으며, 크기는 (평균 52g)는 가장 적당하다고

  • PDF

Baby Food Processing and Properties by using High Pressure Processing (초고압 처리에 의한 이유식 가공 및 특성)

  • Cho, Hyoung-Yong;Cho, Eun-Kyoung;Kim, Byoung-Chul;Shin, Hae-Hun
    • The Korean Journal of Food And Nutrition
    • /
    • v.24 no.4
    • /
    • pp.746-752
    • /
    • 2011
  • In the manufacture of baby food in the form of semi-solid to give the most suitable rheological properties to select thickener, 4% of rice flour, modified starch 1 and modified starch or 0.3% pectin added to baby food. After 3 minutes at a pressure 550 MPa high pressure processing(HPP), sensory evaluation conducted to measure the viscosity results, the addition of rice flour, baby food bananas and apples all the color, texture, flow properties and high affinity for most commercial baby food as well as the most likely to show the viscosity of semi-solid state in the manufacture of baby food there were rice flower most suitable. The baby food that 4%, 6% and 8% of rice flower added as thickener were high pressure processing at 450 MPa and 550 MPa pressure and 1, 3 and 5 min conditions. In results, the higher added percentage of rice flower, the viscosity and lightness were increased, pH and sugar content were not significantly different from. In addition, ultra-high pressure processing conditions and the processing time for a change in pressure due to the increase is not significantly different. Because of high-pressure processing does not significantly affect the physical properties of the baby food, consideration of the economy and gelatinization degree, high-voltage processing conditions for the manufacture of baby food 550 MPa, 3 min was considered the most suitable processing conditions.

A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System (개방형 자동 수요 반응 시스템 보안 취약성 분석에 관한 연구)

  • Chae, Hyeon-Ho;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.333-339
    • /
    • 2016
  • Technology to optimize and utilize the use and supply of the electric power between consumer and supplier has been on the rise among the smart grid power market network in electric power demand management based on the Internet. Open Automated Demand Response system protocol, which can deliver Demand Response needed in electric power demand management to electricity supplier, system supplier and even the user is openADR 2.0b. This paper used the most credible, cosmopolitanly proliferated EPRI open source and analysed the variety of security vulnerability that developed VEN and VTN system may have. Using the simulator for attacking openADR protocol, the VEN/VTN system that has been implemented as EPRI open source was conducted to attack in a variety of ways. As a result of the analysis, we were able to get the results that the VEN/VTN system has security vulnerabilities to the parameter tampering attacks and service flow falsification attack. In conclusion, if you want to implement the openADR2.0b protocol system in the open or two-way communication environment smart grid network, considering a variety of security vulnerability should be sure to seek security technology and services.

Meta-analysis about the study related with foundation: As the center from 1998 to 2013 treatises (창업 관련 연구에 대한 메타분석: 1998년~2013년 학술지 논문을 중심으로)

  • Yoo, Jun Ho
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.1
    • /
    • pp.51-67
    • /
    • 2014
  • The study is aimed to recognize the meaning of foundation study through understanding history and flow of foundation study in Korea. The analysis period is from 1998 when there was first boom of venture foundation in Korea after IMF to 2013 September when the latest thesis was made, and the analysis intends total 382 dissertations the online. The analysis was conducted in the fields of foundation study, foundation support, foundation steps, founding company forms, founder's demographic features, and from the analysis, the following conclusion could be drawn out. First, the field actively carrying out foundation studies is the business management & economics field, but the foundation is dealt as an object of study across the all industries. It could be identified that of the all industries, especially IT industry, food service industry, and contents industry are the fields showing much interest about the foundation. Second, the field attracting most keen attention among the fields of foundation support was the field related with the founders. Third, the main problem relevant to foundation study was that the foundation was judged in comprehensive viewpoint, not being judged with strategies, in detail. Fourth, investing from the company's form aspect, it was found that during the starting period, the main foundation trend was the venture firm foundation, but recently the foundation-relevant attention is focused on the small business foundation and the most dominant founder type is the youth including college students, and the women's foundation is paid continual attention and senior foundation is being actively discussed. According to these analyzed results, future foundation studies should actively promote the general foundation studies, the specified foundation studies reflecting each industry's specialities, the fusion studies.

  • PDF