• 제목/요약/키워드: bridge management systems

Search Result 141, Processing Time 0.024 seconds

Analysis of the Runoff Characteristics of Small Mountain Basins Using Rainfall-Runoff Model_Danyang1gyo in Chungbuk (강우-유출모형을 활용한 소규모 산지 유역의 유출특성 분석_충북 단양1교)

  • Hyungjoon Chang;Hojin Lee;Kisoon Park;Seonggoo Kim
    • Journal of the Korean GEO-environmental Society
    • /
    • v.24 no.12
    • /
    • pp.31-38
    • /
    • 2023
  • In this study, runoff characteristics analysis was conducted as a basic research to establish a forecasting and warning system for flood risk areas in small mountainous basins in South Korea. The Danyang 1 Bridge basin located in Danyang-gun, Chungcheongbuk-do was selected as the study basin, and the watershed characteristic factors were calculated using Q-GIS based on the digital elevation model (DEM) of the basin. In addition, nine heavy rainfall events were selected from 2020 to 2023 using hydrometeorological data provided by the National Water Resources Management Comprehensive Information System. HEC-HMS rainfall-runoff model was used to analyze the runoff characteristics of small mountainous basins, and rainfall-runoff model simulation was performed by reflecting 9 heavy rainfall events and calculated basin characteristic factors. Based on the rainfall-runoff model, parameter optimization was performed for six heavy rain events with large error rates among the simulated events, and the appropriate parameter range for the Danyang 1 Bridge basin, a small mountainous basin, was calculated to be 0.8 to 3.4. The results of this study will be utilized as foundational data for establishing flood forecasting and warning systems in small mountainous basin, and further research will be conducted to derive the range of parameters according to basin characteristics.

User Perception of Personal Information Security: An Analytic Hierarch Process (AHP) Approach and Cross-Industry Analysis (기업의 개인정보 보호에 대한 사용자 인식 연구: 다차원 접근법(Analytic Hierarch Process)을 활용한 정보보안 속성 평가 및 업종별 비교)

  • Jonghwa Park;Seoungmin Han;Yoonhyuk Jung
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.233-248
    • /
    • 2023
  • The increasing integration of intelligent information technologies within organizational systems has amplified the risk to personal information security. This escalation, in turn, has fueled growing apprehension about an organization's capabilities in safeguarding user data. While Internet users adopt a multifaceted approach in assessing a company's information security, existing research on the multiple dimensions of information security is decidedly sparse. Moreover, there is a conspicuous gap in investigations exploring whether users' evaluations of organizational information security differ across industry types. With an aim to bridge these gaps, our study strives to identify which information security attributes users perceive as most critical and to delve deeper into potential variations in these attributes across different industry sectors. To this end, we conducted a structured survey involving 498 users and utilized the analytic hierarchy process (AHP) to determine the relative significance of various information security attributes. Our results indicate that users place the greatest importance on the technological dimension of information security, followed closely by transparency. In the technological arena, banks and domestic portal providers earned high ratings, while for transparency, banks and governmental agencies stood out. Contrarily, social media providers received the lowest evaluations in both domains. By introducing a multidimensional model of information security attributes and highlighting the relative importance of each in the realm of information security research, this study provides a significant theoretical contribution. Moreover, the practical implications are noteworthy: our findings serve as a foundational resource for Internet service companies to discern the security attributes that demand their attention, thereby facilitating an enhancement of their information security measures.

Secure Scheme Between Nodes in Cloud Robotics Platform (Cloud Robotics Platform 환경에서 Node간 안전한 통신 기법)

  • Kim, Hyungjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.12
    • /
    • pp.595-602
    • /
    • 2021
  • The robot is developing into a software-oriented shape that recognizes the surrounding situation and is given a task. Cloud Robotics Platform is a method to support Service Oriented Architecture shape for robots, and it is a cloud-based method to provide necessary tasks and motion controllers depending on the situation. As it evolves into a humanoid robot, the robot will be used to help humans in generalized daily life according to the three robot principles. Therefore, in addition to robots for specific individuals, robots as public goods that can help all humans depending on the situation will be universal. Therefore, the importance of information security in the Cloud Robotics Computing environment is analyzed to be composed of people, robots, service applications on the cloud that give intelligence to robots, and a cloud bridge that connects robots and clouds. It will become an indispensable element for In this paper, we propose a Security Scheme that can provide security for communication between people, robots, cloud bridges, and cloud systems in the Cloud Robotics Computing environment for intelligent robots, enabling robot services that are safe from hacking and protect personal information.

Corroded and loosened bolt detection of steel bolted joints based on improved you only look once network and line segment detector

  • Youhao Ni;Jianxiao Mao;Hao Wang;Yuguang Fu;Zhuo Xi
    • Smart Structures and Systems
    • /
    • v.32 no.1
    • /
    • pp.23-35
    • /
    • 2023
  • Steel bolted joint is an important part of steel structure, and its damage directly affects the bearing capacity and durability of steel structure. Currently, the existing research mainly focuses on the identification of corroded bolts and corroded bolts respectively, and there are few studies on multiple states. A detection framework of corroded and loosened bolts is proposed in this study, and the innovations can be summarized as follows: (i) Vision Transformer (ViT) is introduced to replace the third and fourth C3 module of you-only-look-once version 5s (YOLOv5s) algorithm, which increases the attention weights of feature channels and the feature extraction capability. (ii) Three states of the steel bolts are considered, including corroded bolt, bolt missing and clean bolt. (iii) Line segment detector (LSD) is introduced for bolt rotation angle calculation, which realizes bolt looseness detection. The improved YOLOv5s model was validated on the dataset, and the mean average precision (mAP) was increased from 0.902 to 0.952. In terms of a lab-scale joint, the performance of the LSD algorithm and the Hough transform was compared from different perspective angles. The error value of bolt loosening angle of the LSD algorithm is controlled within 1.09%, less than 8.91% of the Hough transform. Furthermore, the proposed framework was applied to fullscale joints of a steel bridge in China. Synthetic images of loosened bolts were successfully identified and the multiple states were well detected. Therefore, the proposed framework can be alternative of monitoring steel bolted joints for management department.

A Review of Service Innovation Research: A Comparison of Domestic and International Research Papers (서비스혁신 연구 동향: 국내 및 해외 주요 학술지를 중심으로)

  • Ryu, Hyun-Sun
    • Asia pacific journal of information systems
    • /
    • v.24 no.4
    • /
    • pp.577-610
    • /
    • 2014
  • Although service innovation is not a new concept, innovation research in general tends to focus on technological innovation by manufacturing firms. With this view, innovation studies focus on product(e.g., goods) and process(e.g., product systems) innovation, ignoring service innovation and its inherent opportunities. Since major economy has been transformed to service economy, service innovation is considered a new effective way to sustain and gain a competitive advantage. Service innovation is no longer regarded merely as a side activity to product innovation; it has become a main research topic in its own right, accompanied by an increasing focus on services. While the number of service innovation studies has increased dramatically in the past 30 years in international research, few studies have been performed in domestic studies because domestic service innovation research began from the middle of 2000. In addition, there are no comprehensive literature reviews describing the evolution of service innovation research in both international and domestic studies because of the heterogeneities of service industry and multidiscipline characteristics of service innovation studies. To bridge this research gap, the purpose of this paper is to perform an extensive literature review and synthesis to enable a critical review of extant research on service innovation and trace its evolution, which will establish a foundation for further studies. By reviewing 169 articles (136 international papers; 33 domestic papers) published between 2000 and 2014 (in past 15 years), primarily in leading service, innovation and management information systems journals, this study analyzes the progression of service innovation research according to the four aspects such as number of studies, topics, methodologies and target industries. Overall, the view of service innovation has evolved, from a complement of traditional product innovation to a multidimensional, all-encompassing concept that entails several functions, both within and outside the firms. The results showed that domestic research still stays at the formation phase of service innovation studies although international research is in the maturity or multidimensional phase. We found increasing recent activities pertaining to service innovation, resulting from the increasing interest in services innovation across various industries and the links of new topics to the service innovation concept in both international and domestic studies. However, the main focus of service innovation research showed a different propensity between international and domestic studies: the former mainly focuses on a much more diversified pattern, emphasizing the linkages between service innovation and business strategy while the latter mainly focuses on the service innovation process(system) and service design. In addition, there are many case studies in domestic studies while many empirical studies in international studies. Domestic studies should increases the understanding of the interplay between service innovation and product innovation within manufacturing firms. Furthermore, rather than focusing on intrinsic distinctions between service innovation and product innovation, researchers should strive to develop and conceptualize service innovation in domestics studies. The present research also provides useful implications for practitioners. First, this study contributes to expand the current understanding of service innovation research by performing an extensive literature review. Second, tracing and comparing the progression and trends of service innovation research between international and domestic studies, this study showed the similarities and differences between them, which provide practical guidance on future research directions and research agenda. Third, this study performed literature review establishing the analysis system in the initial stage and using them to analyze articles, which is leading to explain the research review of service innovation more systematically and objectively. Finally, this study suggests the domestic researchers their future interests and topics of service innovation research.

Bridging Gaps in College Students' Source Perception and Use (대학생들의 정보원에 대한 인식과 이용간의 차이에 대한 분석연구)

  • Kim, Kyung-Sun;Yoo-Lee, EunYoung;Kwon, Nahyun
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.3
    • /
    • pp.7-21
    • /
    • 2013
  • The study examines two aspects that relate to undergraduates' selection and use of information sources for their academic assignments: (1) sources perceived useful vs. sources frequently used, and (2) source characteristics considered important as selection criteria vs. selection criteria used as reflected in characteristics of frequently used sources. A survey of 251 undergraduate students attempted to address the gaps between what students think they should do and what they actually do with regard to source selection. Characteristics of frequently used sources were analyzed to find out the criteria used for source selection. Friends/family were among the frequently used sources although they were not perceived as useful. Unlike other sources suffering gaps between the perceived usefulness and the use behavior, Web sources were the ones not only perceived most useful but also used most frequently. When the important selection criteria were compared with the characteristic of sources used often, students did not seem to actually use the selection criteria they thought important. While students considered some characteristics related to information quality (e.g., accuracy, comprehensiveness) as important criteria for source selection, the actual criteria they applied for choosing information sources could be described as 'convenient' or 'accessible' (e.g., efficient/time saving, easy to use, familiar, accessible). Based on the findings, suggestions were made to help bridge such gaps through information literacy programs and information systems design.

Design of an Integrated Monitoring System for Constructional Structures Based on Mobile Cloud in Traditional Towns with Local Heritage

  • Min, Byung-Won;Oh, Sang-Hoon;Oh, Yong-Sun;Okazaki, Yasuhisa;Yoo, Jae-Soo;Park, Sun-Gyu;Noh, Hwang-Woo
    • International Journal of Contents
    • /
    • v.11 no.2
    • /
    • pp.37-49
    • /
    • 2015
  • Sensors, equipment, ICT facilities and their corresponding software have a relatively short lifetime relative to that of constructional structure, so these devices have to be continuously fixed or exchanged during maintenance and management. Furthermore, software or analysis tools should be periodically upgraded according to advances in ICT and analysis technology. Conventional monitoring systems have serious problems in that it is difficult for site engineers to modify or upgrade hardware and analysis algorithms. Moreover, we depend on the original system developer when we want to modify or upgrade inner program structures. In this paper, we propose a novel design for integrated maintenance and management of a monitoring system by applying the mobile cloud concept. The system is intended for use in disaster prevention of constructional structures, including bridges, tunnels, and in traditional buildings in a local heritage village, we analyze the status of these structures over a long term or a short-term period as well as in disaster situations. Data are collected over a mobile cloud and future expectations are analyzed according to probabilistic and statistical techniques. We implement our integrated monitoring system to solve the existing problems mentioned above. The final goal of this study is to design and implement a monitoring system for more than 10,000 structures spread within Korea. Furthermore, we can specifically apply the monitoring system presented here to a bridge made from timber in Asan Oeam Village and a traditional house in Andong Hahoe Village to monitor for possible disasters. The entire system design and implementation can be developed on the LinkSaaS platform and the monitoring services can also be implemented on the platform. We prove that the proposed system has good performance by performing a TTA authentication test, web accommodation test, and operation test using emulated data.

A Study on Applying Information Framework for BIM Based WBS -Focusing on Civil Construction- (BIM기반의 WBS 구축을 위한 정보프레임워크 도입방안 연구 -토목사업의 적용을 중심으로-)

  • Nam, Jeong-Yong;Jo, Chan-Won;Park, So-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.770-777
    • /
    • 2017
  • Building information modeling (BIM) has been receiving attention as an integrated information model instead of CAD since the 2000s. BIM technology was first used in the architectural field and was later introduced to the civil engineering field. However, the government announced a plan for the application of BIM to 20% of all SOC projects from 2020, so the adoption of BIM technology is expected to accelerate. In order to successfully adopt BIM, a systematic structure should be supported for integrated design information and implementation technology. Also, it is important to establish the relationship between information systems because many complicated factors are intertwined in the construction industry. In this study, we propose a framework for constructing integrated information through identifying the information relations for introducing BIM in the civil engineering industry. We applied this framework to a bridge project to confirm its effectiveness. This study can be applied to the integrated management of the construction process and costs by introduction of a work breakdown structure (WBS) to BIM. In addition, this study is expected to contribute to the adoption of BIM in the civil engineering field through the proposal of information system standardization in this field.

The Reinforcing Mechanism of Sustaining Participations in Open Source Software Developers: Based on Social Identity Theory and Organizational Citizenship Behavior Theory (오픈 소스 개발자들의 참여 의도 강화 기제 및 참여 지속 의도에 관한 연구: 사회 정체성 이론과 조직시민행동 이론에 기반하여)

  • Choi, Junghong;Choi, Joohee;Lee, Hye Sun;Hwangbo, Hwan;Lee, Inseong;Kim, Jinwoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.3
    • /
    • pp.1-23
    • /
    • 2013
  • Open Source Software Development (OSSD) differentiates itself from traditional closed software development in that it reveals its source codes online and allows anyone to participate in projects. Even though its success was in doubt, many of the open collaborative working models produced successful results. Academia started to get interested in how developers are willing to participate even when there are no extrinsic rewards for their efforts. Many studies tried to explain developers' motivations, and the pursuit of ideology, reputation, and altruism are found to be the answers. Those studies, however, focused mostly on how the first contribution is made out of a certain motivation. Nowadays, OSSD reaches at its maturity and 70% of professional developers have used or utilized open source software or code in their works. As the proportion of people experiencing OSS, the accounts from previous studies are expected to be weakened. Also, extant literature fails to explain how the motivation of participating in OSS evolves over time and experiences. Given that changing over time or over experiences is the natural in the perception of motivation, studies in an attempt to understand how the motivation changes or evolves are in need. In this study, we aimed to explain how the perception about OSS from past usage or related experiences leads to the intention to sustain OSS participations. By doing so, we try to bridge the gap between previous studies and the actual phenomenon. We argued that perceived instrumentality about OSS learned from past experiences will first affect the formation of organizational identity towards general OSS community. And once the organizational identity is formed, it will affect the one's following behaviors related to OSS development, most likely to sustain the favoring stance toward OSS community. Our research distinguishes itself from previous one in that it divides the paths from organizational identity formed to the intention to sustain the voluntary helping behaviors, by altruistic and conforming intentions. Drawing on this structural model, we could explain how organizational identity engages in forming the sustaining intention from past experiences, and that the intention to help at individual level and organizational level works at different level in OSS community. We grounded our arguments on Social identity theory and Organizational Citizenship theory. We examined our assumption by constructing a structural equation model (SEM) and had 88 developers to answer our online surveys. The result is analyzed by PLS (partial least square) method. Consequently, all paths but one in our model are supported, the one which assumed the association between perceived instrumentality and altruistic intention. Our results provide directions in designing online collaborative platforms where open access collaboration is meant to occur. Theoretically, our study suggests that organizational citizenship behavior can occur from organizational identity, even in bottom-up organizational settings. More specifically, we also argue to consider both organizational level and individual level of motivation in inducing sustained participations within the platforms. Our result can be interpreted to indicate the importance of forming organizational identity in sustaining the participatory behaviors. It is because there was no direct association between perceived instrumentality from past experiences and altruistic behavior, but the perception of organizational identity bridges the two constructs. This means that people with no organizational identity can sustain their participations through conforming intention from only the perception of instrumentality, but it needs little more than that for the people to feel the intention to directly help someone in the community-first to form the self-identity as a member of the given community.

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF