• Title/Summary/Keyword: Software-as-a-service

Search Result 1,363, Processing Time 0.029 seconds

Effects of the Social Capital of individual Civil Servants on the Efficiency of Public Service - Focus of civil servants in Jeju province (공무원 개인의 사회적자본이 공직업무효율성에 미치는 영향 - 제주특별자치도 공무원을 대상으로)

  • Kim, Il-Soon;Hwang, Kyung-Soo;Ko, Kwan-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6036-6045
    • /
    • 2014
  • This survey research was performed to determine the social capital that public officials generate within the relationship of the community at the individual level by performing their public office work as an administrative duty. To this end, a survey was conducted on 500 civil servants in Jeju province. The survey period was May 19-23, 2014. 476 subjects were analyzed using a T-test, One way ANOVA, and multiple regression analysis to on SPSS 19.0Win software. As a result of the analysis, 1. The norms of the community cultural, male staff participation and cooperation, and social capital level of civil servants, showed a significantly higher association than female civil servants. There was a difference between the populations of registration to an association to the work location type. In addition, the social capital increases generally as the level of the officers increases. 2. The sub-category in the social capital of a personal level on civil servants family & associates trust, participation & cooperation and neighbor trust had a positive impact on the efficiency of public services. On the other hand, community cultural associations (network) did not have an influence on efficiency.

A Study on Satisfaction of Supplementary Education for Radiological Technologist (방사선사 보수교육에 대한 만족도 연구)

  • Jeong, Bong-Jae;Park, Ji-Koon;Kang, Sang-Sik;Noh, Si-Cheol
    • Journal of the Korean Society of Radiology
    • /
    • v.11 no.6
    • /
    • pp.475-481
    • /
    • 2017
  • As the research about supplementary education of radiological technologist who works in Gyoungsangnam province, this study was conducted to draw the improvements by analyzing the satisfaction level and problems of the supplementary education. During November 01, 2016 to December 15, 2016, after we sent out a total of 250 questionnaires for the survey to radiological technologists working at medical institution located in Gyoungsangnam province, 200 questionnaires suitable for research were analysis by using SPSS 18.0 statistical analysis software. As the satisfaction factors, 21 items such as system, subject, help, appropriateness of lecturer selection, professionalism were used. And as the problem factors, 18 items such as place, transportation, diversity, administrative treatment, education promotion, proceed method were used. Consequentially, the satisfaction level(3.12 point) and problems(3.01 point) of the supplementary education were confirmed as normal level. The supplementary education is an essential education that any health and medical service personnel must complete. In order to improve the effectiveness and efficaciousness of the education, the diverse opinions and efforts to improve the education levels must be supported. Futhermore, through the realistic educational program, the continuous education for radiological technologist with excellent qualities and competence should be done.

A Study of Factors Associated with Software Developers Job Turnover (데이터마이닝을 활용한 소프트웨어 개발인력의 업무 지속수행의도 결정요인 분석)

  • Jeon, In-Ho;Park, Sun W.;Park, Yoon-Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.191-204
    • /
    • 2015
  • According to the '2013 Performance Assessment Report on the Financial Program' from the National Assembly Budget Office, the unfilled recruitment ratio of Software(SW) Developers in South Korea was 25% in the 2012 fiscal year. Moreover, the unfilled recruitment ratio of highly-qualified SW developers reaches almost 80%. This phenomenon is intensified in small and medium enterprises consisting of less than 300 employees. Young job-seekers in South Korea are increasingly avoiding becoming a SW developer and even the current SW developers want to change careers, which hinders the national development of IT industries. The Korean government has recently realized the problem and implemented policies to foster young SW developers. Due to this effort, it has become easier to find young SW developers at the beginning-level. However, it is still hard to recruit highly-qualified SW developers for many IT companies. This is because in order to become a SW developing expert, having a long term experiences are important. Thus, improving job continuity intentions of current SW developers is more important than fostering new SW developers. Therefore, this study surveyed the job continuity intentions of SW developers and analyzed the factors associated with them. As a method, we carried out a survey from September 2014 to October 2014, which was targeted on 130 SW developers who were working in IT industries in South Korea. We gathered the demographic information and characteristics of the respondents, work environments of a SW industry, and social positions for SW developers. Afterward, a regression analysis and a decision tree method were performed to analyze the data. These two methods are widely used data mining techniques, which have explanation ability and are mutually complementary. We first performed a linear regression method to find the important factors assaociated with a job continuity intension of SW developers. The result showed that an 'expected age' to work as a SW developer were the most significant factor associated with the job continuity intention. We supposed that the major cause of this phenomenon is the structural problem of IT industries in South Korea, which requires SW developers to change the work field from developing area to management as they are promoted. Also, a 'motivation' to become a SW developer and a 'personality (introverted tendency)' of a SW developer are highly importantly factors associated with the job continuity intention. Next, the decision tree method was performed to extract the characteristics of highly motivated developers and the low motivated ones. We used well-known C4.5 algorithm for decision tree analysis. The results showed that 'motivation', 'personality', and 'expected age' were also important factors influencing the job continuity intentions, which was similar to the results of the regression analysis. In addition to that, the 'ability to learn' new technology was a crucial factor for the decision rules of job continuity. In other words, a person with high ability to learn new technology tends to work as a SW developer for a longer period of time. The decision rule also showed that a 'social position' of SW developers and a 'prospect' of SW industry were minor factors influencing job continuity intensions. On the other hand, 'type of an employment (regular position/ non-regular position)' and 'type of company (ordering company/ service providing company)' did not affect the job continuity intension in both methods. In this research, we demonstrated the job continuity intentions of SW developers, who were actually working at IT companies in South Korea, and we analyzed the factors associated with them. These results can be used for human resource management in many IT companies when recruiting or fostering highly-qualified SW experts. It can also help to build SW developer fostering policy and to solve the problem of unfilled recruitment of SW Developers in South Korea.

Development of a Remotely Sensed Image Processing/Analysis System : GeoPixel Ver. 1.0 (JAVA를 이용한 위성영상처리/분석 시스템 개발 : GeoPixel Ver. 1.0)

  • 안충현;신대혁
    • Korean Journal of Remote Sensing
    • /
    • v.13 no.1
    • /
    • pp.13-30
    • /
    • 1997
  • Recent improvements of satellite remote sensing sensors which are represented by hyperspectral imaging sensors and high spatial resolution sensors provide a large amount of data, typically several hundred megabytes per one scene. Moreover, increasing information exchange via internet and information super-highway requires the developments of more active service systems for processing and analysing of remote sensing data in order to provide value-added products. In this sense, an advanced satellite data processing system is being developed to achive high performance in computing speed and efficieney in processing a huge volume of data, and to make possible network computing and easy improving, upgrading and managing of systems. JAVA internet programming language provides several advantages for developing software such as object-oriented programming, multi-threading and robust memory managent. Using these features, a satellite data processing system named as GeoPixel has been developing using JAVA language. The GeoPixel adopted newly developed techniques including object-pipe connect method between each process and multi-threading structure. In other words, this system has characteristics such as independent operating platform and efficient data processing by handling a huge volume of remote sensing data with robustness. In the evaluation of data processing capability, the satisfactory results were shown in utilizing computer resources(CPU and Memory) and processing speeds.

A Study on the Vulnerability Management of Internet Connection Devices based on Internet-Wide Scan (인터넷 와이드 스캔 기술 기반 인터넷 연결 디바이스의 취약점 관리 구조 연구)

  • Kim, Taeeun;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.504-509
    • /
    • 2019
  • Recently, both wireless communications technology and the performance of small devices have developed exponentially, while the number of services using various types of Internet of Things (IoT) devices has also massively increased in line with the ongoing technological and environmental changes. Furthermore, ever more devices that were previously used in the offline environment-including small-size sensors and CCTV-are being connected to the Internet due to the huge increase in IoT services. However, many IoT devices are not equipped with security functions, and use vulnerable open source software as it is. In addition, conventional network equipment, such as switches and gateways, operates with vulnerabilities, because users tend not to update the equipment on a regular basis. Recently, the simple vulnerability of IoT devices has been exploited through the distributed denial of service (DDoS) from attackers creating a large number of botnets. This paper proposes a system that is capable of identifying Internet-connected devices quickly, analyzing and managing the vulnerability of such devices using Internet-wide scan technology. In addition, the vulnerability analysis rate of the proposed technology was verified through collected banner information. In the future, the company plans to automate and upgrade the proposed system so that it can be used as a technology to prevent cyber attacks.

Factors Influencing Users' Payment Decisions Regarding Knowledge Products on the Short-Form Video Platform: A Case of Knowledge-Sharing on TikTok (짧은 영상 플랫폼에서 지식상품에 대한 사용자의 구매결정에 영향을 미치는 요인: TikTok의 지식 공유 사례)

  • Huimin Shi;Joon Koh;Sangcheol Park
    • Knowledge Management Research
    • /
    • v.24 no.1
    • /
    • pp.31-49
    • /
    • 2023
  • TikTok, as a leading short video platform, has attracted many users, and the resulting attention generates immense business value as a platform to diffuse knowledge. As a qualitative and explorative approach, this study reviews the knowledge payment industry and discusses the influential factors of users' payment decisions regarding knowledge products on TikTok. By conducting in-depth interviews with ten participants and observing 95 knowledge providers' videos, we find that TikTok has significant business potential in the knowledge payment industry. By using the ATLAS. ti software to code the data collected from these interviews, this study finds that demander characteristics (personal needs), product characteristics (product quality), provider characteristics (the key opinion leader effect), and platform characteristics (platform management) are the four core categories that influence users' payment decisions regarding knowledge products on TikTok. A theoretical model consisting of the ten variables of emotional needs, professional needs, quality, price, helpfulness, value, charisma, user trust, service guarantee, and scarcity is proposed based on the grounded theory. The theoretical and practical implications of the study findings are also discussed.

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

Proposed Test Method for Verification of Survivability Improvement of KASS Augmented Navigation of a Beam-formed GPS Receiver (빔포밍 GPS 위성항법장치의 KASS 보정항법 생존성 향상을 검증하기 위한 시험평가 방법 제안)

  • Junwoo Jung;Hyunhee Won;Daeyoung Park;Seungmin Kang;Jonggyu Go;Seungbok Kwon;Kwi Woo Park;Bongwoo Jo;Woogeun Ahn;Sung Wook Yun
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.13 no.3
    • /
    • pp.257-268
    • /
    • 2024
  • The Korea Augmentation Satellite System (KASS) satellite was successfully launched and service is being started. By receiving messages transmitted from the KASS satellite, users can employ the messages to improve positioning accuracy or to verify the integrity of Global Positioning System (GPS). In this paper, we propose a test method for a beam-formed GPS receiver developed to improve the survivability of KASS augmented messages that can enhance positioning accuracy even in an environment with jamming or interfering signals. Through the test method proposed in this paper, quantitative verification is performed for a beam-formed GPS receiver aimed at maintaining the augmented navigation solution to which KASS augmented messages are applied by tracking the KASS signal as much as possible under conditions where the jamming signal strength is gradually increasing. In addition, the proposed test method includes three conditions; first, a static lab test method for repeated verification of functions under the same conditions; second, a static outdoor test method for performance verification in an operating environment of a platform equipped with the beam-formed GPS receiver; and finally, a dynamic lab test method for performance verification of a moving platform equipped with the beam-formed GPS receiver toward a jammer. In this paper, we propose a method for simulating the jamming signal incident direction through the phase delay of an RF cable designed to prevent unintentional jamming signal emission in both lab and outdoor tests, and a method of applying test software for injecting a jamming signal to compare the survivability performance consistently according to the presence or absence of beamforming signal processing. Through the proposed test method, it was verified that the augmented navigation solution could be output for a longer time period when the beamforming signal processing was applied to the KASS satellite signal in the beam-formed GPS receiver.

Video Analysis System for Action and Emotion Detection by Object with Hierarchical Clustering based Re-ID (계층적 군집화 기반 Re-ID를 활용한 객체별 행동 및 표정 검출용 영상 분석 시스템)

  • Lee, Sang-Hyun;Yang, Seong-Hun;Oh, Seung-Jin;Kang, Jinbeom
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.89-106
    • /
    • 2022
  • Recently, the amount of video data collected from smartphones, CCTVs, black boxes, and high-definition cameras has increased rapidly. According to the increasing video data, the requirements for analysis and utilization are increasing. Due to the lack of skilled manpower to analyze videos in many industries, machine learning and artificial intelligence are actively used to assist manpower. In this situation, the demand for various computer vision technologies such as object detection and tracking, action detection, emotion detection, and Re-ID also increased rapidly. However, the object detection and tracking technology has many difficulties that degrade performance, such as re-appearance after the object's departure from the video recording location, and occlusion. Accordingly, action and emotion detection models based on object detection and tracking models also have difficulties in extracting data for each object. In addition, deep learning architectures consist of various models suffer from performance degradation due to bottlenects and lack of optimization. In this study, we propose an video analysis system consists of YOLOv5 based DeepSORT object tracking model, SlowFast based action recognition model, Torchreid based Re-ID model, and AWS Rekognition which is emotion recognition service. Proposed model uses single-linkage hierarchical clustering based Re-ID and some processing method which maximize hardware throughput. It has higher accuracy than the performance of the re-identification model using simple metrics, near real-time processing performance, and prevents tracking failure due to object departure and re-emergence, occlusion, etc. By continuously linking the action and facial emotion detection results of each object to the same object, it is possible to efficiently analyze videos. The re-identification model extracts a feature vector from the bounding box of object image detected by the object tracking model for each frame, and applies the single-linkage hierarchical clustering from the past frame using the extracted feature vectors to identify the same object that failed to track. Through the above process, it is possible to re-track the same object that has failed to tracking in the case of re-appearance or occlusion after leaving the video location. As a result, action and facial emotion detection results of the newly recognized object due to the tracking fails can be linked to those of the object that appeared in the past. On the other hand, as a way to improve processing performance, we introduce Bounding Box Queue by Object and Feature Queue method that can reduce RAM memory requirements while maximizing GPU memory throughput. Also we introduce the IoF(Intersection over Face) algorithm that allows facial emotion recognized through AWS Rekognition to be linked with object tracking information. The academic significance of this study is that the two-stage re-identification model can have real-time performance even in a high-cost environment that performs action and facial emotion detection according to processing techniques without reducing the accuracy by using simple metrics to achieve real-time performance. The practical implication of this study is that in various industrial fields that require action and facial emotion detection but have many difficulties due to the fails in object tracking can analyze videos effectively through proposed model. Proposed model which has high accuracy of retrace and processing performance can be used in various fields such as intelligent monitoring, observation services and behavioral or psychological analysis services where the integration of tracking information and extracted metadata creates greate industrial and business value. In the future, in order to measure the object tracking performance more precisely, there is a need to conduct an experiment using the MOT Challenge dataset, which is data used by many international conferences. We will investigate the problem that the IoF algorithm cannot solve to develop an additional complementary algorithm. In addition, we plan to conduct additional research to apply this model to various fields' dataset related to intelligent video analysis.

Development of an Verification System for Enhancing BIM Design Base on Usability (활용성을 고려한 BIM 설계 오류 검증시스템 개발)

  • Yang, Dong-Suk
    • Land and Housing Review
    • /
    • v.8 no.1
    • /
    • pp.23-29
    • /
    • 2017
  • The BIM design is expected to expand to the domestic and overseas construction industries, depending on the effect of construction productivity and quality improvement. However, with the obligation of Public Procurement Service to design the BIM design, it includes a design error and the problem of utilization of 3D design by choosing a simple 2D to 3D remodelling method that can not be modelled in 3D modeling or use of the construction and maintenance phases. The results reviewed by BIM design results were largely underutilized and were not even performed with the verification of the error. In order to resolve this, one must develop the check system that secures the quality of BIM design and ensure that the reliability of BIM results are available. In this study, it is designed to develop a program that can automatically verify the design of the BIM design results such as violation of the rules of the BIM design, design flaws, and improve the usability of the BIM design. In particular, this programs were developed not only to identify programmes that were not commercially available, but also to validate drawings in low-light computer environments. The developed program(LH-BIM) store the information of attribute extracted from the Revit file(ArchiCAD, IFC file included) in the integrated DB. This provides the ability to freely lookup the features and properties of drawings delivered exclusively by the LH-BIM Program without using the Revit tools. By doing so, it was possible to resolve the difficulties of using traditional commercial programs and to ensure that they operate only with traditional PC performance. Further, the results of the various BIM software can be readily validated, which can be solved the conversion process error of IFC in the case of SMC. Additionally, the developed program has the ability to automatically check the error and design criteria of the drawings, as well as the ability to calculate the area estimation. These functions allow businesses to apply simple and easy tasks to operate tasks of BIM modelling. The developed system(LH-BIM) carried out a verification test by reviewing the review of the BIM Design model of the Korea Land & Housing Corporation. It is hoped that the verification system will not only be able to achieve the Quality of BIM design, but also contribute to the expansion of BIM and future construction BIM.