• Title/Summary/Keyword: Set2

Search Result 15,813, Processing Time 0.048 seconds

A Structural Relationship among Job Requirements, Job Resources and Job Burnout, and Organizational Effectiveness of Private Security Guards (민간경비원의 직무요구 직무자원과 소진, 조직유효성의 구조적 관계)

  • Kim, Sung-Cheol;Kim, Young-Hyun
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.9-33
    • /
    • 2016
  • The purpose of the present study was to find out cause-and-effect relationship between job requirements and job resources, with job burnout as a mediator variable, and the effects of these variables on organizational effectiveness. The population in the present study was private security guards employed by 13 private security companies in Seoul and Gyeonggi-do areas, and a survey was conducted on 500 security guards selected using purposive sampling technique. Out of 460 questionnaires distributed, 429 responses, excluding 31 outliers or insincere responses, were used for data analysis. For analysis, data were coded and entered into SPSS 18.0 and AMOS 18.0, which were used to analyze the data. Descriptive analyses were performed to find out sociodemographic characteristics of the respondents. The exploratory factor analysis (EFA) and confirmatory factor analysis (CFA) were used to test the validity of the measurement tool, and the Cronbach's Alpha coefficients were calculated to test the reliability. To find out the significance of relationships among variables, Pearson's correlation analysis was performed. Covariance Structure Analysis (CSA) was performed to test the relationship among latent factors of a model for job requirements, job resources, job burnout, and organizational effectiveness of the private security guards, and the fitness of the model analyzed with CSA was determined by the goodness-of-fit index ($x^2$, df, p, RMR, GFI, CFI, TLI, RMSEA). The level of significance was set at .05, and the following results were obtained. First, even though the effect of job requirements on job burnout was not statistically significant, it had a positive influence overall, and this result can be considered such that the higher the perception of job requirements by the member of the organization, the higher the perception of job burnout. Second, the influence of job resources on job burnout was negative, which can be considered that the higher the perception of job resources, the lower the perception of job burnout. Third, even though the influence of job requirements on organizational effectiveness was statistically nonsignificant, it had a negative influence overall, and this result can be considered that the higher the perception of job requirements, the lower the perception of organizational effectiveness. Fourth, job resources had a positive influence on organizational effectiveness, and it can be considered that the higher the perception of job resources, the higher the perception of organizational effectiveness. Fifth, the results of the analysis between job burnout and organizational effectiveness revealed that, even though the influence of job burnout on organizational effectiveness was statistically nonsignificant, it had partial negative influences on sublevels of organizational effectiveness, and this may suggest that the higher the perception of job burnout by the organization members, the lower the organizational effectiveness. Sixth, the analysis of mediating role in the relationship between job requirements and organizational effectiveness, job burnout was taking partial mediating role between job requirements and organizational effectiveness. These results suggest that reducing job burnout by managing job requirements, organizational effectiveness that leads to job satisfaction, organizational commitment, and turnover intention can be maximized. Seventh, the analysis of mediating role in the relationship among job requirements, job resources, and organizational effectiveness, job burnout was assuming a partial mediating role in the relationships among job requirements, job resources, and organizational effectiveness. These results suggest that organizational effectiveness can be maximized by either lowering job requirements or burnout management through reorganizing job resources.

  • PDF

One-stop Evaluation Protocol of Ischemic Heart Disease: Myocardial Fusion PET Study (허혈성 심장 질환의 One-stop Evaluation Protocol: Myocardial Fusion PET Study)

  • Kim, Kyong-Mok;Lee, Byung-Wook;Lee, Dong-Wook;Kim, Jeong-Su;Jang, Yeong-Do;Bang, Chan-Seok;Baek, Jong-Hun;Lee, In-Su
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.14 no.2
    • /
    • pp.33-37
    • /
    • 2010
  • Purpose: In the early stage of using PET/CT, it was used to damper revision but recently shows that CT with MDCT is commonly used and works well for an anatomical diagnosis. This hospital makes the accuracy and convenience more higher in the diagnosis and evaluate of coronary heart disease through concurrently running myocardial perfusion SPECT examination, myocardial PET examination with FDG, and CT coronary artery CT angiography(coronary CTA) used PET/CT with 64-slice. This report shows protocol and image based on results from about 400 coronary heart disease examinations since having 64 channels PET/CT in July 2007. Materials and Methods: An Equipment for this examination is 64-slice CT and Discovery VCT (DVCT) that is consisted of PET with BGO ($Bi_4Ge_3O_{12}$) scintillation crystal by GE health care. First myocardial perfusion SPECT with pharmacologic stress test to reduce waiting time of a patient and get a quick diagnosis and evaluation, and right after it, myocardial FDG PET examination and coronary CTA run without a break. One-stop evaluation protocol of ischemic heart disease is as follows. 1)Myocardial perfusion SPECT with pharmacologic stress: A patient is injected with $^{99m}Tc$-MIBI 10 mCi and does not have any fatty food for myocardial PET examination and drink natural water with ursodeoxcholic acid 100 mg and we get SPECT image in an hour. 2)Myocardial FDG PET: To reduce blood fatty content and to increase uptake of FDG, we used creative oral glucose load using insulin and Acipimox to according to blood acid content. A patient is injected with $^{18}F$-FDG 5 mCi for reduction of his radiation exposure and we get a gated image an hour later and get delay image when we need. 3) Coronary CTA: The most important point is to control heart rate and to get cooperation of patient's breath. In order to reduce a heart rate of him or her below 65 beats, let him or her take beta blocker 50 mg ~ 200 mg after a consultation with a doctor about it and have breath-practices then have the examination. Right before the examination, we spray isosorbide dinitrate 3 to 5 times to lower tension of bessel wall and to extension a blood wall of a patient. It makes to get better the shape of an anatomy. At filming, a patient is injected CT contrast with high pressure and have enough practices before the examination in order to have no problem. For reduction of his radiation exposure, we have to do ECG-triggered X-ray tube modulation exposure. Results: We evaluate coronary artery stenosis through coronary CTA and study correlation (culprit vessel check) of a decline between stenosis and perfusion from the myocardial perfusion SPECT with pharmacologic stress, coronary CTA, and can check viability of infarction or hibernating myocardium by FDG PET. Conclusion: The examination makes us to set up a direction of remedy (drug treatment, PCI, CABG) because we can estimate of effect from remedy, lesion site and severity. In addition, we have an advantage that it takes just 3 hours and one-stop in that all of process of examinations run in succession and at the same time. Therefore it shows that the method is useful in one stop evaluation of ischemic heart disease.

  • PDF

The Role of Control Transparency and Outcome Feedback on Security Protection in Online Banking (계좌 이용 과정과 결과의 투명성이 온라인 뱅킹 이용자의 보안 인식에 미치는 영향)

  • Lee, Un-Kon;Choi, Ji Eun;Lee, Ho Geun
    • Information Systems Review
    • /
    • v.14 no.3
    • /
    • pp.75-97
    • /
    • 2012
  • Fostering trusting belief in financial transactions is a challenging task in Internet banking services. Authenticated Certificate had been regarded as an effective method to guarantee the trusting belief for online transactions. However, previous research claimed that this method has some loopholes for such abusers as hackers, who intend to attack the financial accounts of innocent transactors in Internet. Two types of methods have been suggested as alternatives for securing user identification and activity in online financial services. Control transparency uses information over the transaction process to verify and to control the transactions. Outcome feedback, which refers to the specific information about exchange outcomes, provides information over final transaction results. By using these two methods, financial service providers can send signals to involved parties about the robustness of their security mechanisms. These two methods-control transparency and outcome feedback-have been widely used in the IS field to enhance the quality of IS services. In this research, we intend to verify that these two methods can also be used to reduce risks and to increase the security protections in online banking services. The purpose of this paper is to empirically test the effects of the control transparency and the outcome feedback on the risk perceptions in Internet banking services. Our assumption is that these two methods-control transparency and outcome feedback-can reduce perceived risks involved with online financial transactions, while increasing perceived trust over financial service providers. These changes in user attitudes can increase the level of user satisfactions, which may lead to the increased user loyalty as well as users' willingness to pay for the financial transactions. Previous research in IS suggested that the increased level of transparency on the process and the result of transactions can enhance the information quality and decision quality of IS users. Transparency helps IS users to acquire the information needed to control the transaction counterpart and thus to complete transaction successfully. It is also argued that transparency can reduce the perceived transaction risks in IS usage. Many IS researchers also argued that the trust can be generated by the institutional mechanisms. Trusting belief refers to the truster's belief for the trustee to have attributes for being beneficial to the truster. Institution-based trust plays an important role to enhance the probability of achieving a successful outcome. When a transactor regards the conditions crucial for the transaction success, he or she considers the condition providers as trustful, and thus eventually trust the others involved with such condition providers. In this process, transparency helps the transactor complete the transaction successfully. Through the investigation of these studies, we expect that the control transparency and outcome feedback can reduce the risk perception on transaction and enhance the trust with the service provider. Based on a theoretical framework of transparency and institution-based trust, we propose and test a research model by evaluating research hypotheses. We have conducted a laboratory experiment in order to validate our research model. Since the transparency artifact(control transparency and outcome feedback) is not yet adopted in online banking services, the general survey method could not be employed to verify our research model. We collected data from 138 experiment subjects who had experiences with online banking services. PLS is used to analyze the experiment data. The measurement model confirms that our data set has appropriate convergent and discriminant validity. The results of testing the structural model indicate that control transparency significantly enhances the trust and significantly reduces the risk perception of online banking users. The result also suggested that the outcome feedback significantly enhances the trust of users. We have found that the reduced risk and the increased trust level significantly improve the level of service satisfaction. The increased satisfaction finally leads to the increased loyalty and willingness to pay for the financial services.

  • PDF

The Effect of PET/CT Images on SUV with the Correction of CT Image by Using Contrast Media (PET/CT 영상에서 조영제를 이용한 CT 영상의 보정(Correction)에 따른 표준화섭취계수(SUV)의 영향)

  • Ahn, Sha-Ron;Park, Hoon-Hee;Park, Min-Soo;Lee, Seung-Jae;Oh, Shin-Hyun;Lim, Han-Sang;Kim, Jae-Sam;Lee, Chang-Ho
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.13 no.1
    • /
    • pp.77-81
    • /
    • 2009
  • Purpose: The PET of the PET/CT (Positron Emission Tomography/Computed Tomography) quantitatively shows the biological and chemical information of the body, but has limitation of presenting the clear anatomic structure. Thus combining the PET with CT, it is not only possible to offer the higher resolution but also effectively shorten the scanning time and reduce the noises by using CT data in attenuation correction. And because, at the CT scanning, the contrast media makes it easy to determine a exact range of the lesion and distinguish the normal organs, there is a certain increase in the use of it. However, in the case of using the contrast media, it affects semi-quantitative measures of the PET/CT images. In this study, therefore, we will be to establish the reliability of the SUV (Standardized Uptake Value) with CT data correction so that it can help more accurate diagnosis. Materials and Methods: In this experiment, a total of 30 people are targeted - age range: from 27 to 72, average age : 49.6 - and DSTe (General Electric Healthcare, Milwaukee, MI, USA) is used for equipment. $^{18}F$- FDG 370~555 MBq is injected into the subjects depending on their weight and, after about 60 minutes of their stable position, a whole-body scan is taken. The CT scan is set to 140 kV and 210 mA, and the injected amount of the contrast media is 2 cc per 1 kg of the patients' weight. With the raw data from the scan, we obtain a image showing the effect of the contrast media through the attenuation correction by both of the corrected and uncorrected CT data. Then we mark out ROI (Region of Interest) in each area to measure SUV and analyze the difference. Results: According to the analysis, the SUV is decreased in the liver and heart which have more bloodstream than the others, because of the contrast media correction. On the other hand, there is no difference in the lungs. Conclusions: Whereas the CT scan images with the contrast media from the PET/CT increase the contrast of the targeted region for the test so that it can improve efficiency of diagnosis, there occurred an increase of SUV, a semi-quantitative analytical method. In this research, we measure the variation of SUV through the correction of the influence of contrast media and compare the differences. As we revise the SUV which is increasing in the image with attenuation correction by using contrast media, we can expect anatomical images of high-resolution. Furthermore, it is considered that through this trusted semi-quantitative method, it will definitely enhance the diagnostic value.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

Assessment of Estimated Daily Intakes of Artificial Sweeteners from Non-alcoholic Beverages in Children and Adolescents (어린이와 청소년의 비알콜성음료 섭취에 따른 인공감미료 섭취량 평가)

  • Kim, Sung-Dan;Moon, Hyun-Kyung;Lee, Jib-Ho;Chang, Min-Su;Shin, Young;Jung, Sun-Ok;Yun, Eun-Sun;Jo, Han-Bin;Kim, Jung-Hun
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.43 no.8
    • /
    • pp.1304-1316
    • /
    • 2014
  • The aims of this study were to estimate daily intakes of artificial sweeteners from beverages and liquid teas as well as evaluate their potential health risks in Korean children and adolescents (1 to 19 years old). Dietary intake assessment was conducted using actual levels of aspartame, acesulfame-K, and sucralose in non-alcoholic beverages (651 beverages and 87 liquid teas), and food consumption amounts were drawn from "The Fourth Korea National Health and Nutrition Examination Survey (2007~2009)". To estimate dietary intake of non-alcoholic beverages, a total of 6,082 children and adolescents (Scenario I) were compared to 1,704 non-alcoholic beverage consumption subjects (Scenario II). The estimated daily intake of artificial sweeteners was calculated based on point estimates and probabilistic estimates. The values of probabilistic artificial sweeteners intakes were presented by a Monte Carlo approach considering probabilistic density functions of variables. The level of safety for artificial sweeteners was evaluated by comparisons with acceptable daily intakes (ADI) of aspartame (0~40 mg/kg bw/day), acesulfame-K (0~15 mg/kg bw/day), and sucralose (0~15 mg/kg bw/day) set by the World Health Organization. For total children and adolescents (Scenario I), mean daily intakes of aspartame, acesulfame-K, and sucralose estimated by probabilistic estimates using Monte Carlo simulation were 0.09, 0.01, and 0.04 mg/kg bw/day, respectively, and 95th percentile daily intakes were 0.30, 0.02, and 0.13 mg/kg bw/day, respectively. For consumers-only (Scenario II), mean daily intakes of aspartame, acesulfame-K, and sucralose estimated by probabilistic estimates using Monte Carlo simulation were 0.52, 0.03, and 0.22 mg/kg bw/day, respectively, and 95th percentile daily intakes were 1.80, 0.12, and 0.75 mg/kg bw/day, respectively. For scenarios I and II, neither aspartame, acesulfame-K, nor sucralose had a mean and 95th percentile intake that exceeded 5.06% of ADI.

A Study on Aviation Safety and Third Country Operator of EU Regulation in light of the Convention on international Civil Aviation (시카고협약체계에서의 EU의 항공법규체계 연구 - TCO 규정을 중심으로 -)

  • Lee, Koo-Hee
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.1
    • /
    • pp.67-95
    • /
    • 2014
  • Some Contracting States of the Chicago Convention issue FAOC(Foreign Air Operator Certificate) and conduct various safety assessments for the safety of the foreign operators which operate to their state. These FAOC and safety audits on the foreign operators are being expanded to other parts of the world. While this trend is the strengthening measure of aviation safety resulting in the reduction of aircraft accident. FAOC also burdens the other contracting States to the Chicago Convention due to additional requirements and late permission. EASA(European Aviation Safety Agency) is a body governed by European Basic Regulation. EASA was set up in 2003 and conduct specific regulatory and executive tasks in the field of civil aviation safety and environmental protection. EASA's mission is to promote the highest common standards of safety and environmental protection in civil aviation. The task of the EASA has been expanded from airworthiness to air operations and currently includes the rulemaking and standardization of airworthiness, air crew, air operations, TCO, ATM/ANS safety oversight, aerodromes, etc. According to Implementing Rule, Commission Regulation(EU) No 452/2014, EASA has the mandate to issue safety authorizations to commercial air carriers from outside the EU as from 26 May 2014. Third country operators (TCO) flying to any of the 28 EU Member States and/or to 4 EFTA States (Iceland, Norway, Liechtenstein, Switzerland) must apply to EASA for a so called TCO authorization. EASA will only take over the safety-related part of foreign operator assessment. Operating permits will continue to be issued by the national authorities. A 30-month transition period ensures smooth implementation without interrupting international air operations of foreign air carriers to the EU/EASA. Operators who are currently flying to Europe can continue to do so, but must submit an application for a TCO authorization before 26 November 2014. After the transition period, which lasts until 26 November 2016, a valid TCO authorization will be a mandatory prerequisite, in the absence of which an operating permit cannot be issued by a Member State. The European TCO authorization regime does not differentiate between scheduled and non-scheduled commercial air transport operations in principle. All TCO with commercial air transport need to apply for a TCO authorization. Operators with a potential need of operating to the EU at some time in the near future are advised to apply for a TCO authorization in due course, even when the date of operations is unknown. For all the issue mentioned above, I have studied the function of EASA and EU Regulation including TCO Implementing Rule newly introduced, and suggested some proposals. I hope that this paper is 1) to help preparation of TCO authorization, 2) to help understanding about the international issue, 3) to help the improvement of korean aviation regulations and government organizations, 4) to help compliance with international standards and to contribute to the promotion of aviation safety, in addition.

Analysis on Factors Influencing Welfare Spending of Local Authority : Implementing the Detailed Data Extracted from the Social Security Information System (지방자치단체 자체 복지사업 지출 영향요인 분석 : 사회보장정보시스템을 통한 접근)

  • Kim, Kyoung-June;Ham, Young-Jin;Lee, Ki-Dong
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.141-156
    • /
    • 2013
  • Researchers in welfare services of local government in Korea have rather been on isolated issues as disables, childcare, aging phenomenon, etc. (Kang, 2004; Jung et al., 2009). Lately, local officials, yet, realize that they need more comprehensive welfare services for all residents, not just for above-mentioned focused groups. Still cases dealt with focused group approach have been a main research stream due to various reason(Jung et al., 2009; Lee, 2009; Jang, 2011). Social Security Information System is an information system that comprehensively manages 292 welfare benefits provided by 17 ministries and 40 thousand welfare services provided by 230 local authorities in Korea. The purpose of the system is to improve efficiency of social welfare delivery process. The study of local government expenditure has been on the rise over the last few decades after the restarting the local autonomy, but these studies have limitations on data collection. Measurement of a local government's welfare efforts(spending) has been primarily on expenditures or budget for an individual, set aside for welfare. This practice of using monetary value for an individual as a "proxy value" for welfare effort(spending) is based on the assumption that expenditure is directly linked to welfare efforts(Lee et al., 2007). This expenditure/budget approach commonly uses total welfare amount or percentage figure as dependent variables (Wildavsky, 1985; Lee et al., 2007; Kang, 2000). However, current practice of using actual amount being used or percentage figure as a dependent variable may have some limitation; since budget or expenditure is greatly influenced by the total budget of a local government, relying on such monetary value may create inflate or deflate the true "welfare effort" (Jang, 2012). In addition, government budget usually contain a large amount of administrative cost, i.e., salary, for local officials, which is highly unrelated to the actual welfare expenditure (Jang, 2011). This paper used local government welfare service data from the detailed data sets linked to the Social Security Information System. The purpose of this paper is to analyze the factors that affect social welfare spending of 230 local authorities in 2012. The paper applied multiple regression based model to analyze the pooled financial data from the system. Based on the regression analysis, the following factors affecting self-funded welfare spending were identified. In our research model, we use the welfare budget/total budget(%) of a local government as a true measurement for a local government's welfare effort(spending). Doing so, we exclude central government subsidies or support being used for local welfare service. It is because central government welfare support does not truly reflect the welfare efforts(spending) of a local. The dependent variable of this paper is the volume of the welfare spending and the independent variables of the model are comprised of three categories, in terms of socio-demographic perspectives, the local economy and the financial capacity of local government. This paper categorized local authorities into 3 groups, districts, and cities and suburb areas. The model used a dummy variable as the control variable (local political factor). This paper demonstrated that the volume of the welfare spending for the welfare services is commonly influenced by the ratio of welfare budget to total local budget, the population of infants, self-reliance ratio and the level of unemployment factor. Interestingly, the influential factors are different by the size of local government. Analysis of determinants of local government self-welfare spending, we found a significant effect of local Gov. Finance characteristic in degree of the local government's financial independence, financial independence rate, rate of social welfare budget, and regional economic in opening-to-application ratio, and sociology of population in rate of infants. The result means that local authorities should have differentiated welfare strategies according to their conditions and circumstances. There is a meaning that this paper has successfully proven the significant factors influencing welfare spending of local government in Korea.

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

A Study on the Usage of Miào(廟) and Gōng(宮) in Zhou Dynasty through the Mentions to Them in the Scripture Sentences of 『Chūn-qiū(春秋)』 - In the Process of Investigating the Existence of Zhou Dynasty's System to Regulate the Number of Zōng-miào(宗廟) 【1/2】 (『춘추』 경문에서의 묘(廟)·궁(宮) 언급을 통한 주대(周代)의 그 쓰임 사례 일고찰 - 주대의 묘수제(廟數制) 실재 여부에 대한 궁구 과정에서 【1/2】-)

  • Seo, Jeong-Hwa
    • The Journal of Korean Philosophical History
    • /
    • no.57
    • /
    • pp.57-90
    • /
    • 2018
  • In this discussion, as a way to verify the existence of the system to regulate Zhou dynasty's $z{\bar{o}}ng-mi{\grave{a}}o$(宗廟) numbers, the discussion was focused on '$mi{\grave{a}}o$ (廟)' and '$g{\bar{o}}ng$(宮)' in the records of "$Ch{\bar{u}}n-qi{\bar{u}}$(春秋)". As for the parts where the contents of scripture sentences were not specific, the context of the case was investigated through the writings in "$Zu{\breve{o}}-zhu{\grave{a}}n$(左傳)" and other materials. In the cases of the usage of the letter, '$mi{\grave{a}}o$(廟 : a ruler's house, a nation's royal court)', in the scripture sentences in "$Ch{\bar{u}}n-qi{\bar{u}}$(春秋)", the followings need to be noticed. In $t{\grave{a}}i-mi{\grave{a}}o$(太廟) of State $L{\check{u}}$(魯), nationwide events and a ruler's political ancestral rite, $d{\grave{i}}$(?) ritual, were performed, and fancy tools for ancestral rites used in those rituals were equipped. As for the $z{\bar{o}}ng-mi{\grave{a}}o$(宗廟) of a ruler of those times, a ritual of royal court, $ch{\acute{a}}o$(朝) rite, was performed. The usage case of the letter, '$g{\bar{o}}ng$(宮 : house)', is as the following. In $g{\bar{o}}ng$(宮) where a ruler's personal family lived was a family ancestral rite for them carried out. The record about the ornate decorating for the $hu{\acute{a}}n-g{\bar{o}}ng$ house(桓宮), which can be said to have been the political base of $s{\bar{a}}n-hu{\acute{a}}n-sh{\grave{i}}$(三桓氏), three politically noble families of State $L{\check{u}}$(魯), is outstanding. The $x{\bar{i}}-g{\bar{o}}ng$ house(西宮) during $X{\bar{i}}-g{\bar{o}}ng$(魯 僖公)'s reign and a $x{\bar{i}}n-g{\bar{o}}ng$ house(新宮 : a newly built house) destroyed by fire at the third year of $Ch{\acute{e}}ng-g{\bar{o}}ng$(魯 成公), are assumed to have been a ruler's another house, such as the $ch{\check{u}}-g{\bar{o}}ng$ house(楚宮) in which $Xi{\bar{a}}ng-g{\bar{o}}ng$(魯 襄公) used to enjoy staying, which is different from the viewpoint that it might be a $m{\acute{i}}-g{\bar{o}}ng$ shrine(?宮 : a house constructed as a shrine for the deceased father or the deceased grand father) that had been formed since Han dynasty. It has been discussed that, regarding the records that the '$w{\check{u}}-g{\bar{o}}ng$ house(武宮) was built' and that the '$y{\acute{a}}ng-g{\bar{o}}ng$ house(煬宮) was built', certain buildings were established with the symbols of '$w{\check{u}}$(武 : martial arts and force of arms)' and '$y{\acute{a}}ng$(煬 : to burn and get rid of everything)', and the events that a lord stood as its lord continued. Therefore, its main goal was not the performance of a dutiful ancestral rite by a ruler of those times for deceased rulers, for instance, $W{\check{u}}-g{\bar{o}}ng$(魯 武公) or $Y{\acute{a}}ng-g{\bar{o}}ng$(魯 煬公), but display of certain political symbolism through the ritual. This symbolism is most obvious with the $hu{\acute{a}}n-g{\bar{o}}ng$ house(桓宮) and the $x{\bar{i}}-g{\bar{o}}ng$ house(僖宮). As a consequence, all $mi{\grave{a}}os$(廟) and $g{\bar{o}}ngs$(宮) in scripture sentences had the functions of a shrine in some part, but it has been verified that they were not the buildings set up as a shrine to follow '$z{\bar{o}}ng-mi{\grave{a}}o$(宗廟)'s number regulation system' of '$ti{\bar{a}}nz{\check{i}}-7-mi{\grave{a}}o$(天子七廟 : an emperor owns seven $mi{\grave{a}}os$(廟))' or '$zh{\bar{u}}h{\acute{o}}u-5-mi{\grave{a}}o$(諸侯五廟 : a lord owns five $mi{\grave{a}}os$(廟))'.