• Title/Summary/Keyword: execution methods

Search Result 653, Processing Time 0.025 seconds

A Study on the Psychological State of the Security Subjects of National Guard (공경호원의 경호대상자 심리상태 인지)

  • Kim, Haw-Su;Kang, Min-Wan;Jo, Sung-Gu
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.73-100
    • /
    • 2012
  • Republic of Korea for the last 2012 nuclear security summit in Seoul in three days from March 26, has held great success. This industry watchers at home and abroad through professional meetings and private organizations to promote global nuclear security was intended to draw, for the preparation of this event the most important one of the things that should be addressed at the meeting was over the top guard. The national guard of heads of state and nationally significant as the important issues should be dealt with. So who is responsible for national security summit national guard for a successful guard against participants should have a higher understanding, these stories ever to be dealt with important security subjects is the psychological state of cognition. This study is currently a source of honor to escort the psychological state of subjects, and whether the search as I looked at cognition. Qualitative research methods to conduct research in-depth interview technique was used for one of the transcribed data analysis program, a non-quantitative data were analyzed using NVivo 8. As a result of this study, analysis of the problem compared with the usual methods 39 (72.2%), fine-grained observation and 15 (27.7%), through the media how cognition 41 (73.2%), marginal help of 15 (26.7%) were. The usual comparison with how honored Issue sources to detect security of those words and actions and facial expressions, etc. Security of subjects over the state of mind cognition that he, detailed observation of the national guard to security subjects the psychological state of cognition which are pre-Thorough Information subjects that can have all the information about security and the state can be obtained by saying that. Media coverage through a cognitive approach national guard of the media coverage to understand the security subjects of the political situation to understand the prerequisite that were marginal for help through the cognitive approach of security subjects surrounding the execution of security workers, Secretary in charge of protocol and security, and be propagated through the selection techniques to be utilized was that.

  • PDF

A Study on Management of Records of Art Archives (미술 아카이브의 미술기록관리 방안 연구)

  • Jeong, Hye-Rin;Kim, Ik-Han
    • The Korean Journal of Archival Studies
    • /
    • no.20
    • /
    • pp.151-212
    • /
    • 2009
  • Museums are producing new value and being redefined as places that reproduce context, as the process of globalization are being reflected in museum activities. The new additional functions and roles to the traditional mission of museums allow artworks to find potential functions of art archive and meseum. At the same time, the public has faced originality and aura of an artwork by viewing the physical subject. However, with the appearance of a new digital object, the initiative of viewing has moved over from the artwork to the hands of the public. Now, the public does not go to the museum to see an artwork, but has started to adopt to an opposite paradigm of bringing the artwork forward to the screen. Therefore, they are not satisfied any longer with just seeing an artwork, but demand more information about the artworks and reproduce it as knowledge. Therefore, this study aimed to find types and characteristics through definition and range selection of art archive at this point where the value of art archive is enhanced and systematic management is required, and to present record management methods according to art archive structure and core execution function. It especially stressed that the basis of overall art archive definition was in an 'approach' paradigm rather than a 'preservation' paradigm, and embodied various application methods of digitalized art records. The digital object of an artwork was recognized as the first materialization of an actual artwork, and the digital original of an artwork was presented as the core record. Art archive managed under physical and intellectual control were organically restructured focusing on digital original copies of artworks, which are the core record in a digital technology environment, and could be provided to users in forms of various services that meet their demands. The beginning of systematic management of such art records will become a first step to enhance historical value, establish art cultural identity, and truly possess art culture.

Analysis of Skin Color Pigments from Camera RGB Signal Using Skin Pigment Absorption Spectrum (피부색소 흡수 스펙트럼을 이용한 카메라 RGB 신호의 피부색 성분 분석)

  • Kim, Jeong Yeop
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.1
    • /
    • pp.41-50
    • /
    • 2022
  • In this paper, a method to directly calculate the major elements of skin color such as melanin and hemoglobin from the RGB signal of the camera is proposed. The main elements of skin color typically measure spectral reflectance using specific equipment, and reconfigure the values at some wavelengths of the measured light. The values calculated by this method include such things as melanin index and erythema index, and require special equipment such as a spectral reflectance measuring device or a multi-spectral camera. It is difficult to find a direct calculation method for such component elements from a general digital camera, and a method of indirectly calculating the concentration of melanin and hemoglobin using independent component analysis has been proposed. This method targets a region of a certain RGB image, extracts characteristic vectors of melanin and hemoglobin, and calculates the concentration in a manner similar to that of Principal Component Analysis. The disadvantage of this method is that it is difficult to directly calculate the pixel unit because a group of pixels in a certain area is used as an input, and since the extracted feature vector is implemented by an optimization method, it tends to be calculated with a different value each time it is executed. The final calculation is determined in the form of an image representing the components of melanin and hemoglobin by converting it back to the RGB coordinate system without using the feature vector itself. In order to improve the disadvantages of this method, the proposed method is to calculate the component values of melanin and hemoglobin in a feature space rather than an RGB coordinate system using a feature vector, and calculate the spectral reflectance corresponding to the skin color using a general digital camera. Methods and methods of calculating detailed components constituting skin pigments such as melanin, oxidized hemoglobin, deoxidized hemoglobin, and carotenoid using spectral reflectance. The proposed method does not require special equipment such as a spectral reflectance measuring device or a multi-spectral camera, and unlike the existing method, direct calculation of the pixel unit is possible, and the same characteristics can be obtained even in repeated execution. The standard diviation of density for melanin and hemoglobin of proposed method was 15% compared to conventional and therefore gives 6 times stable.

A Case Study on Center of Gravity Analysis when Performing Uchimata by Posture and Voluntary Resistance Levels of Uke in Judo[ll] (유도 허벅다리걸기 기술발휘 시 받기의 자세와 저항수준에 따른 중심변인 분석 사례연구[II])

  • Kim, Eui-Hwan;Kim, Sung-Sup;Chung, Chae-Wook
    • Korean Journal of Applied Biomechanics
    • /
    • v.15 no.1
    • /
    • pp.237-257
    • /
    • 2005
  • It was to study as a following-research of "A Case Study on Center of Gravity(COG) Analysis when Performing Uchimata(inner thigh reaping throw) by Posture and Voluntary Resistance Levels(VRL) of Uke in Judo[I]". The purpose of this study was to analyze the COG variables when performing uchimata(inner thigh reaping throw) by two postures and voluntary resistance levels(VRL) of uke(reciver) in Judo. The subjects, who were one male judoka(YH) for 1992 Barcelona Olympic Games Olympian(silver medalist), and one male trainee; Y.I.University representative member (SDK), and were filmed on two S-VHS 16mm video cameras(60fields/sec.) through 3-dimensional motion analysis methods, that postures of uke were shizenhontai (straight natural posture) and jigohontai(straight defensive posture), VRL of uke were 0% and 100%, respectively. The kinematical variable was COG variable, distance of COG, and distance of resultant COG between uke and tori(the thrower), velocity and acceleration of COG. The data of this study collection were digitized by SIMI Motion Program computed the mean values and the standard deviation calculated for each variables. When performing uchinmata according to each posture and VRL of uke and classifying. From the data analysis and discussion, the conclusions were as follows : 1. Displacement of COG Subject YH, COG was the highest in kuzushi(balance -breaking), vertical COG was low when following in tsukuri(positioning; set-up), kake(application; execution), and COG was pattern of same character each postures and resistance, respectively. Subject SDK, COG was low from kumikata(engagement positioning) to kake, and COG was that each postures and resistance were same patterns, respectively. Subject YH, SDK, each individual, postures and resistance, vertical COG was the lowest in kake phase, when performing. 2. Distance of COG between uke and tori The distance of COG between uke and tori when performing, subject YH was $0.64{\sim}0.70cm$ in kumikata, $0.19{\sim}0.28cm$ in kake, and SDK was $0.68{\sim}0.72cm$ in kumikata, $0.30{\sim}0.42\;cm$ in kake. SDK was wider than YH. 3. Distance of resultant COG between uke and tori The distance of resultant COG between uke and tori when performing, subject YH was $0.27{\sim}0.73cm$ from kumikata to kake. and SDK was $0.14{\sim}0.34cm$ in kumikata, $0.28{\sim}0.65cm$ in kake. Jigohontai(YH:$0.43{\sim}0.73cm$,SDK:$0.59{\sim}0.65cm$) was more moved than shizenhontai(YH:$0.27{\sim}0.53cm$, SDK: $0.28{\sim}\;0.34cm$). 4. Velocity of COG The velocity of COG when performing uchimata, subject YH was fast anterior-posterior direction in kuzushi, ant.-post. and vertical direction fast in tsukuri and kake. SDK was lateral, ant.-post. and vertical direction in kuzushi, ant.-post. and vertical direction in tsukuri and ant.-post. direction in take, respectively. 5. Acceleration of COG The acceleration of COG when performing uchimata, The trend of subject YH was showed fast vertical direction in kuzushi and tsukuri, ant.-post. and vertical direction fast in kake. The trends of SDK showed lateral direction in kuzushi, lateral and ant.-post. direction in tsukuri and ant.-post. direction in kake, respectively.

Relationships of Achievement Goal Orientation with Academic Self-efficacy of Specialized High School Students (특성화고등학교 학생의 성취목표지향성과 학업적 자기효능감의 관계)

  • Yang, Jin-Sik;Song, Nak-Hyun;Lee, Chang-Hoon
    • 대한공업교육학회지
    • /
    • v.43 no.2
    • /
    • pp.79-96
    • /
    • 2018
  • In this study, we look at the effect that the achievement goal of specialized high school students has on academic self-efficacy and the difference in academic self-efficacy depending on achievement goal orientation. The purpose of this research is to help students to efficiently increase their academic self-efficacy, develop research and study life guidance measures to improve negative factors, and select professors and learning methods. To achieve the purpose, survey was conducted with achievement goal orientation measurement tools(26 questions) and academic self-efficacy measurement tools(28 questions) for 745 students of 18 specialized technical high school students in 5 districts. The results of this study are as follows. First, preference to task difficulty and self-controlling efficacy have highly positive correlations with mastery goal orientation and confidence and mastery avoidance goal orientation have highly negative correlations each other. Second, achievement goal orientation form of specialized high school students were divided into 5 forms; 'execution avoidance(34.8%)', 'mastery orientation(20.8%)', 'approach(17%)', 'avoidance competition(14.9%)', and'mastery avoidance(12.5%)'. In preference to task difficulty, 'approach'group showed the highest average point and 'mastery avoidance'showed the lowest average point. The average point of 'approach' group was higher than other groups in confidence, but 'mastery orientation' group showed the highest average point. Through the results of this study, academic self-efficacy makes an effect by a certain direction in accordance with achievement goal orientation and it's necessary to access academic problems differently according to student's goal directivity. Therefore, it's necessary to provide educational method by student type based on explanation about academic self-efficacy of achievement goal orientation of specialized high school students and analysis on achievement goal orientation form.

A Study on the Intelligent Quick Response System for Fast Fashion(IQRS-FF) (패스트 패션을 위한 지능형 신속대응시스템(IQRS-FF)에 관한 연구)

  • Park, Hyun-Sung;Park, Kwang-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.3
    • /
    • pp.163-179
    • /
    • 2010
  • Recentlythe concept of fast fashion is drawing attention as customer needs are diversified and supply lead time is getting shorter in fashion industry. It is emphasized as one of the critical success factors in the fashion industry how quickly and efficiently to satisfy the customer needs as the competition has intensified. Because the fast fashion is inherently susceptible to trend, it is very important for fashion retailers to make quick decisions regarding items to launch, quantity based on demand prediction, and the time to respond. Also the planning decisions must be executed through the business processes of procurement, production, and logistics in real time. In order to adapt to this trend, the fashion industry urgently needs supports from intelligent quick response(QR) system. However, the traditional functions of QR systems have not been able to completely satisfy such demands of the fast fashion industry. This paper proposes an intelligent quick response system for the fast fashion(IQRS-FF). Presented are models for QR process, QR principles and execution, and QR quantity and timing computation. IQRS-FF models support the decision makers by providing useful information with automated and rule-based algorithms. If the predefined conditions of a rule are satisfied, the actions defined in the rule are automatically taken or informed to the decision makers. In IQRS-FF, QRdecisions are made in two stages: pre-season and in-season. In pre-season, firstly master demand prediction is performed based on the macro level analysis such as local and global economy, fashion trends and competitors. The prediction proceeds to the master production and procurement planning. Checking availability and delivery of materials for production, decision makers must make reservations or request procurements. For the outsourcing materials, they must check the availability and capacity of partners. By the master plans, the performance of the QR during the in-season is greatly enhanced and the decision to select the QR items is made fully considering the availability of materials in warehouse as well as partners' capacity. During in-season, the decision makers must find the right time to QR as the actual sales occur in stores. Then they are to decide items to QRbased not only on the qualitative criteria such as opinions from sales persons but also on the quantitative criteria such as sales volume, the recent sales trend, inventory level, the remaining period, the forecast for the remaining period, and competitors' performance. To calculate QR quantity in IQRS-FF, two calculation methods are designed: QR Index based calculation and attribute similarity based calculation using demographic cluster. In the early period of a new season, the attribute similarity based QR amount calculation is better used because there are not enough historical sales data. By analyzing sales trends of the categories or items that have similar attributes, QR quantity can be computed. On the other hand, in case of having enough information to analyze the sales trends or forecasting, the QR Index based calculation method can be used. Having defined the models for decision making for QR, we design KPIs(Key Performance Indicators) to test the reliability of the models in critical decision makings: the difference of sales volumebetween QR items and non-QR items; the accuracy rate of QR the lead-time spent on QR decision-making. To verify the effectiveness and practicality of the proposed models, a case study has been performed for a representative fashion company which recently developed and launched the IQRS-FF. The case study shows that the average sales rateof QR items increased by 15%, the differences in sales rate between QR items and non-QR items increased by 10%, the QR accuracy was 70%, the lead time for QR dramatically decreased from 120 hours to 8 hours.

Comparison of the wall clock time for extracting remote sensing data in Hierarchical Data Format using Geospatial Data Abstraction Library by operating system and compiler (운영 체제와 컴파일러에 따른 Geospatial Data Abstraction Library의 Hierarchical Data Format 형식 원격 탐사 자료 추출 속도 비교)

  • Yoo, Byoung Hyun;Kim, Kwang Soo;Lee, Jihye
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.1
    • /
    • pp.65-73
    • /
    • 2019
  • The MODIS (Moderate Resolution Imaging Spectroradiometer) data in Hierarchical Data Format (HDF) have been processed using the Geospatial Data Abstraction Library (GDAL). Because of a relatively large data size, it would be preferable to build and install the data analysis tool with greater computing performance, which would differ by operating system and the form of distribution, e.g., source code or binary package. The objective of this study was to examine the performance of the GDAL for processing the HDF files, which would guide construction of a computer system for remote sensing data analysis. The differences in execution time were compared between environments under which the GDAL was installed. The wall clock time was measured after extracting data for each variable in the MODIS data file using a tool built lining against GDAL under a combination of operating systems (Ubuntu and openSUSE), compilers (GNU and Intel), and distribution forms. The MOD07 product, which contains atmosphere data, were processed for eight 2-D variables and two 3-D variables. The GDAL compiled with Intel compiler under Ubuntu had the shortest computation time. For openSUSE, the GDAL compiled using GNU and intel compilers had greater performance for 2-D and 3-D variables, respectively. It was found that the wall clock time was considerably long for the GDAL complied with "--with-hdf4=no" configuration option or RPM package manager under openSUSE. These results indicated that the choice of the environments under which the GDAL is installed, e.g., operation system or compiler, would have a considerable impact on the performance of a system for processing remote sensing data. Application of parallel computing approaches would improve the performance of the data processing for the HDF files, which merits further evaluation of these computational methods.

Implementing RPA for Digital to Intelligent(D2I) (디지털에서 인텔리전트(D2I)달성을 위한 RPA의 구현)

  • Dong-Jin Choi
    • Information Systems Review
    • /
    • v.21 no.4
    • /
    • pp.143-156
    • /
    • 2019
  • Types of innovation can be categorized into simplification, information, automation, and intelligence. Intelligence is the highest level of innovation, and RPA can be seen as one of intelligence. Robotic Process Automation(RPA), a software robot with artificial intelligence, is an example of intelligence that is suited for simple, repetitive, large-scale transaction processing tasks. The RPA, which is already in operation in many companies in Korea, shows what needs to be done to naturally focus on the core tasks in a situation where the need for a strong organizational culture is increasing and the emphasis is on voluntary leadership, strong teamwork and execution, and a professional working culture. The introduction was considered naturally according to the need to find. Robotic Process Automation, or RPA, is a technology that replaces human tasks with the goal of quickly and efficiently handling structural tasks. RPA is implemented through software robots that mimic humans using software such as ERP systems or productivity tools. RPA robots are software installed on a computer and are called robots by the principle of operation. RPA is integrated throughout the IT system through the front end, unlike traditional software that communicates with other IT systems through the back end. In practice, this means that software robots use IT systems in the same way as humans, repeat the correct steps, and respond to events on the computer screen instead of communicating with the system's application programming interface(API). Designing software that mimics humans to communicate with other software can be less intuitive, but there are many advantages to this approach. First, you can integrate RPA with virtually any software you use, regardless of your openness to third-party applications. Many enterprise IT systems are proprietary because they do not have many common APIs, and their ability to communicate with other systems is severely limited, but RPA solves this problem. Second, RPA can be implemented in a very short time. Traditional software development methods, such as enterprise software integration, are relatively time consuming, but RPAs can be implemented in a relatively short period of two to four weeks. Third, automated processes through software robots can be easily modified by system users. While traditional approaches require advanced coding techniques to drastically modify how they work, RPA can be instructed by modifying relatively simple logical statements, or by modifying screen captures or graphical process charts of human-run processes. This makes RPA very versatile and flexible. This RPA is a good example of the application of digital to intelligence(D2I).

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.