• Title/Summary/Keyword: address matching

Search Result 128, Processing Time 0.023 seconds

A Study on Effects of Adopting ICT in Livestock Farm Management on Farm Sales Revenue (정보화기기 활용이 국내 축산농가 총판매금액에 미치는 영향 분석)

  • Hanna Jeong;Jimin Shim;Yerin Lim;Jongwook Lee
    • Journal of Korean Society of Rural Planning
    • /
    • v.30 no.1
    • /
    • pp.81-97
    • /
    • 2024
  • This study examines the effects of adopting Information and Communication Technology (ICT) in livestock farm management on farm sales revenue. Using the 2020 Census of Agriculture, Forestry, and Fisheries, a nationally representative data set constructed by Statistics Korea, this study focuses on a sample of 9,020 livestock farms in South Korea. We employ Propensity Score Matching (PSM) methods to address the potential selection bias between 2,076 farms that used ICT for livestock farm management and 6,944 farms that did not. The findings consistently show that the use of ICT significantly increases farm revenue, taking into account the selection bias. The utilization of ICT in livestock farms leads to a higher increase in sales revenue, particularly for farms with greater sales.

Adjusting for Confounders in Outcome Studies Using the Korea National Health Insurance Claim Database: A Review of Methods and Applications

  • Seung Jin Han;Kyoung Hoon Kim
    • Journal of Preventive Medicine and Public Health
    • /
    • v.57 no.1
    • /
    • pp.1-7
    • /
    • 2024
  • Objectives: Adjusting for potential confounders is crucial for producing valuable evidence in outcome studies. Although numerous studies have been published using the Korea National Health Insurance Claim Database, no study has critically reviewed the methods used to adjust for confounders. This study aimed to review these studies and suggest methods and applications to adjust for confounders. Methods: We conducted a literature search of electronic databases, including PubMed and Embase, from January 1, 2021 to December 31, 2022. In total, 278 studies were retrieved. Eligibility criteria were published in English and outcome studies. A literature search and article screening were independently performed by 2 authors and finally, 173 of 278 studies were included. Results: Thirty-nine studies used matching at the study design stage, and 171 adjusted for confounders using regression analysis or propensity scores at the analysis stage. Of these, 125 conducted regression analyses based on the study questions. Propensity score matching was the most common method involving propensity scores. A total of 171 studies included age and/or sex as confounders. Comorbidities and healthcare utilization, including medications and procedures, were used as confounders in 146 and 82 studies, respectively. Conclusions: This is the first review to address the methods and applications used to adjust for confounders in recently published studies. Our results indicate that all studies adjusted for confounders with appropriate study designs and statistical methodologies; however, a thorough understanding and careful application of confounding variables are required to avoid erroneous results.

Addressing Mobile Agent Security through Agent Collaboration

  • Jean, Evens;Jiao, Yu;Hurson, Ali-R.
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.43-53
    • /
    • 2007
  • The use of agent paradigm in today's applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.

A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection (SIFT 기반 카피-무브 위조 검출에 대한 타켓 카운터-포렌식 기법)

  • Doyoddorj, Munkhbaatar;Rhee, Kyung-Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.5
    • /
    • pp.163-172
    • /
    • 2014
  • The Scale Invariant Feature Transform (SIFT) has been widely used in a lot of applications for image feature matching. Such a transform allows us to strong matching ability, stability in rotation, and scaling with the variety of different scales. Recently, it has been made one of the most successful algorithms in the research areas of copy-move forgery detections. Though this transform is capable of identifying copy-move forgery, it does not widely address the possibility that counter-forensics operations may be designed and used to hide the evidence of image tampering. In this paper, we propose a targeted counter-forensics method for impeding SIFT-based copy-move forgery detection by applying a semantically admissible distortion in the processing tool. The proposed method allows the attacker to delude a similarity matching process and conceal the traces left by a modification of SIFT keypoints, while maintaining a high fidelity between the processed images and original ones under the semantic constraints. The efficiency of the proposed method is supported by several experiments on the test images with various parameter settings.

A Study on the Analysis and Methods to Improve the Management System for Building Energy Database (국가 건물에너지통합관리시스템의 데이터 품질 분석 및 개선방안 연구)

  • Kim, Sung-Min;Yoon, Jong-Don;Kwon, Oh-In;Shin, Sung-Eun
    • Journal of Energy Engineering
    • /
    • v.25 no.1
    • /
    • pp.131-144
    • /
    • 2016
  • Damage occur frequently around the world on climate change and the main cause of greenhouse gas emissions regulation is growing. To this end, the government has built integrated management system for national building energy. The building energy information is total 6.8 million complex. Integrated management system for national building energy database are matched building registers information and energy information of the supply agencies. However, the matching process has its limitations so advanced work is in progress continuously. This study analyzed integrated management system for national building energy database quality and limitations and deduce improvement plan to increase system reliability and availability. The existing database matching average rate is 85.6%. 58.2% of the total non-matching data type has no building information. To ensure the ease of new database matching and the accuracy of the existing database matching, address standarization and building properties system are needed between building information and energy information. Also, The system construction is required to include information on other energy sources like petroleum energy which has high proportion of non-urban areas and small residential areas and renewable energy which has high potential in development and utilization.

An Efficient If Routing Lookup by Using Routing Interval

  • Wang, Pi-Chung;Chan, Chia-Tai;Chen, Yaw-Chung
    • Journal of Communications and Networks
    • /
    • v.3 no.4
    • /
    • pp.374-382
    • /
    • 2001
  • Nowadays, the commonly used table lookup scheme for IP routing is based on the sc-called classless interdomain routing (CIDR). With CIDR, routers must find out the best matching prefix (BMP) for IP packets forwarding, this complicates the IP lookup. Currently, this process is mainly performed in software and several schemes hale been proposed for hardware implementation. Since the IP lookup performance is a major design issue for the new generation routers, in this article we investigate the properties of the routing table and present a new approach for IP lookups, our approach is not based Gn BMP and significantly reduces the complexity, thus the computation cast of existing schemes can be significantly reduced. We also propose an efficient IP lookup algorithm, with which we improve the binary search on prefixes to 30 millions of packets per second (MPPS) and 5,000 route updates/s under the same experiment setup with an even larger routing table.

  • PDF

Architecture Support for Context-aware Adaptation of Rich Sensing Smartphone Applications

  • Meng, Zhaozong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.248-268
    • /
    • 2018
  • The performance of smartphone applications are usually constrained in user interactions due to resource limitation and it promises great opportunities to improve the performance by exploring the smartphone built-in and embedded sensing techniques. However, heterogeneity in techniques, semantic gap between sensor data and usable context, and complexity of contextual situations keep the techniques from seamless integration. Relevant studies mainly focus on feasibility demonstration of emerging sensing techniques, which rarely address both general architectures and comprehensive technical solutions. Based on a proposed functional model, this investigation provides a general architecture to deal with the dynamic context for context-aware automation and decision support. In order to take advantage of the built-in sensors to improve the performance of mobile applications, an ontology-based method is employed for context modelling, linguistic variables are used for heterogeneous context presentation, and semantic distance-based rule matching is employed to customise functions to the contextual situations. A case study on mobile application authentication is conducted with smartphone built-in hardware modules. The results demonstrate the feasibility of the proposed solutions and their effectiveness in improving operational efficiency.

An Object-Level Feature Representation Model for the Multi-target Retrieval of Remote Sensing Images

  • Zeng, Zhi;Du, Zhenhong;Liu, Renyi
    • Journal of Computing Science and Engineering
    • /
    • v.8 no.2
    • /
    • pp.65-77
    • /
    • 2014
  • To address the problem of multi-target retrieval (MTR) of remote sensing images, this study proposes a new object-level feature representation model. The model provides an enhanced application image representation that improves the efficiency of MTR. Generating the model in our scheme includes processes, such as object-oriented image segmentation, feature parameter calculation, and symbolic image database construction. The proposed model uses the spatial representation method of the extended nine-direction lower-triangular (9DLT) matrix to combine spatial relationships among objects, and organizes the image features according to MPEG-7 standards. A similarity metric method is proposed that improves the precision of similarity retrieval. Our method provides a trade-off strategy that supports flexible matching on the target features, or the spatial relationship between the query target and the image database. We implement this retrieval framework on a dataset of remote sensing images. Experimental results show that the proposed model achieves competitive and high-retrieval precision.

Call Taxi Matching Service Constructing Using Smartphone MAC Address and Location Information (스마트 폰 MAC 주소와 위치 정보를 이용한 콜택시 매칭 서비스 구축)

  • Cho, su-min;So, byung-moon;Kim, hyung-jin;Park, hong-keun;Ra, in-ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2016.05a
    • /
    • pp.135-136
    • /
    • 2016
  • 스마트 폰이 많이 보급되고 인터넷과 네트워크의 기술이 발달 하면서 많은 서비스 앱들이 개발되고 있다. 현재 스마트 폰은 컴퓨터를 대체할 정도의 수준으로 발전하고 있으며 기존의 컴퓨터로만 수행할 수 있는 서비스들도 스마트 폰을 통해 제공할 수 있도록 확장되고 있다. 본 논문에서는 위치기반의 스마트 택시 매칭 서비스 및 시스템 기법을 제안한다. 특히, 기사용 앱과 고객용 앱을 설계하고 스마트 폰이 보유한 고유 MAC 주소를 Key로 활용하고 사용자의 실시간 위치 좌표를 이용하여 고객과 기사의 매칭이 이루어지는 콜택시 서비스 시스템 구축 방법을 제안한다.

  • PDF

Making Price Index of Detached Houses in Tokyo Metropolitan Area

  • Tanaka, Hideto;Shibasaki, Ryosuke
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1115-1117
    • /
    • 2003
  • The information about transactions of real estate has tended to be not open. Therefore, it has been difficult for individuals to judge the proper price of each real estate. In the course of time several studies have been conducted on proposing criterions for judging the proper price of real estates. As to office buildings and apartments, it is proved techniques required for making criterions have been achieved to a certain extent. Therefore, this research aims to make methods that propose to consumers reliable criteria for judging the proper price of detached houses. The methods are based on hedonic price method and micro-level spatial elements peculiar to detached houses are considered.

  • PDF