• Title/Summary/Keyword: information collection system

Search Result 1,610, Processing Time 0.03 seconds

Effect of the Type of Apartment Management on Long-Term Repair Allowances and Common Management Fees : For Apartment Houses Subject to Mandatory Management Located in Busan (공동주택 관리형태가 장기수선충당금과 공용관리비에 미치는 영향 : 부산시 의무관리대상 공동주택을 대상으로)

  • Kim, Hong-Chul;Lee, Chan-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.1
    • /
    • pp.349-355
    • /
    • 2022
  • Today, apartment houses account for a very high proportion of the types of residence. This study aims to present basic data for preparing a reasonable distribution plan by identifying factors considered in calculating the amount of collection of management fees. After reviewing previous studies on common management fees and long-term repair allowances, various data on apartment houses subject to mandatory management in Busan in 2020 were collected from the Apartment Management Information System to analyze the differences in influencing factors according to type of apartment management(self-governing management, consignment management). As a result of statistical analysis, the number of households and many construction elapsed periods had a negative(-) effect on long-term repair allowances, and many construction elapsed periods had a negative(-) effect on common management fees. In addition, the degree to which many construction elapsed periods had a negative(-) effect on long-term repair allowances and common management fees had less impact on consignment management than on self-governing management. And the long-term repair allowances were imposed less by consignment management, common management fees were charged less by self-governing management. The results of this study will serve as basic data for rational distribution of long-term repair allowances and common management fees to residents and managers of apartment houses subject to mandatory management in Busan.

The Role of Safety Management Professional Organizations through Industrial Accident Analysis (산업재해분석을 통한 안전관리전문기관의 역할)

  • Deuk-Hwan Kim;Sun-Jae Hwang;Dae-Jin Jo;Jun-Won Lee
    • Journal of the Korea Safety Management & Science
    • /
    • v.25 no.2
    • /
    • pp.71-83
    • /
    • 2023
  • Since last year, the government has enforced the 'Act on the Punishment of Severe Accidents, Etc.' (hereafter referred to as the 'Serious Accident Punishment Act'), which punishes business owners and business managers who fail to fulfill their duty of safety measures with 'imprisonment of one year or more' and the Occupational Safety and Health Act. Based on this, various occupational safety and health policies were developed, including the operation of a system related to entrusting the work of safety managers. Despite these efforts, the effect of implementing the Severe Accident Punishment Act is a groundbreaking change in the current disaster prevention policy, which has increased by 0.02%P and 0.03‱P, respectively, from the previous year to 0.65% of the total accident rate and 1.10‱ of the death rate per 10,000 people as of 2022. As the need emerged, attention was paid to 'collaboration and governance with safety management institutions' in the 'Severe Disaster Reduction Roadmap' announced by the Ministry of Employment and Labor in November 2022. In this study, a meaningful result was derived by comparing and analyzing the industrial accident status of workplaces entrusted by "A" safety management institutions with the national average based on the industrial accident survey table, and the types of industrial accidents that occurred in consigned workplaces were selected as intensive management targets. The policy direction for industrial accident prevention was established. It is necessary to develop safety management work manuals based on the results of this study, expertise, discover best cases of risk assessment and develop guides, and educate and train consigned workers. In addition, it suggests that the government's guidance and supervision are needed to advance the professionalism of safety management entrusted tasks, and that safety management institutions should strengthen their roles and functions for preventing and reducing industrial accidents. However, due to difficulties in disclosing information of specialized safety management institutions, the limitation of the provision, collection, and viewing of research-related data to "A" specialized safety management institutions remains a limitation of the research. It seems likely that more thorough research will be conducted.

Multidimensional data generation of water distribution systems using adversarially trained autoencoder (적대적 학습 기반 오토인코더(ATAE)를 이용한 다차원 상수도관망 데이터 생성)

  • Kim, Sehyeong;Jun, Sanghoon;Jung, Donghwi
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.7
    • /
    • pp.439-449
    • /
    • 2023
  • Recent advancements in data measuring technology have facilitated the installation of various sensors, such as pressure meters and flow meters, to effectively assess the real-time conditions of water distribution systems (WDSs). However, as cities expand extensively, the factors that impact the reliability of measurements have become increasingly diverse. In particular, demand data, one of the most significant hydraulic variable in WDS, is challenging to be measured directly and is prone to missing values, making the development of accurate data generation models more important. Therefore, this paper proposes an adversarially trained autoencoder (ATAE) model based on generative deep learning techniques to accurately estimate demand data in WDSs. The proposed model utilizes two neural networks: a generative network and a discriminative network. The generative network generates demand data using the information provided from the measured pressure data, while the discriminative network evaluates the generated demand outputs and provides feedback to the generator to learn the distinctive features of the data. To validate its performance, the ATAE model is applied to a real distribution system in Austin, Texas, USA. The study analyzes the impact of data uncertainty by calculating the accuracy of ATAE's prediction results for varying levels of uncertainty in the demand and the pressure time series data. Additionally, the model's performance is evaluated by comparing the results for different data collection periods (low, average, and high demand hours) to assess its ability to generate demand data based on water consumption levels.

A Case Study of Improving Instruction by Utilizing Online Instruction Diagnosis Item Pool

  • SHIM, Mi-Ja
    • Educational Technology International
    • /
    • v.6 no.2
    • /
    • pp.23-41
    • /
    • 2005
  • One of the main factors that determine the quality of instruction is the teaching ability of the instructor administering the class. To evaluate teaching ability, methods such as peer review, student feedback, and teaching portfolio can be used. Among these, because feedback from the students is directly associated with how well the students feel they have learned, it is essential to improving instruction and teaching ability. The principal aim of instruction evaluation lies in the evaluation of instructor's qualification and the improvement of instruction quality by enhancing professionalism. However, the mandatory instruction evaluations currently being carried out at the term's end in universities today have limitations in improving instruction in terms of its evaluation items and times. To improve the quality of instruction and raise teaching abilities, instruction evaluations should not stop at simply being carried out but also be utilized as useful data for students and teachers. In other words, they need to be used to develop teaching and improve instruction for teachers, and consequently, should also exert a positive influence on students' scholastic achievements and learning ability. The most important thing in evaluation is the acquisition of accurate information and how to utilize it to improve instruction. The online instruction diagnosis item pool is a more realistic feedback device developed to improve instruction quality. The instruction diagnosis item pool is a cafeteria-like collection of hundreds of feedback questions provided to enable instructors to diagnose their instruction through self-diagnosis or students' feedback, and the instructors can directly select the questions that are appropriate to the special characteristics of their instruction voluntarily make use of them whenever they are needed. The current study, in order to find out if the online instruction diagnosis item pool is truly useful in reforming and improving instruction, conducted pre and post tests using 256 undergraduate students from Y university as subjects, and studied the effects of student feedback on instructions. Results showed that the implementation of instruction diagnosis improved students' responsibility regarding their classes, and students had positive opinions regarding the usefulness of online instruction diagnosis item pool in instruction evaluation. Also, after instruction diagnosis, analyzing the results through consultations with education development specialists, and then establishing and carrying out instruction reforms were shown to be more effective. In order to utilize the instruction diagnostic system more effectively, from planning the execution of instruction diagnosis to analyzing the results, consulting, and deciding how those results could be utilized to instruction, a systematic strategy is needed. In addition, professors and students need to develop a more active sense of ownership in order to elevate the level of their instruction.

A Study on Measures to Improve the Production and Service of Records of Presidential Overseas Trips: Focusing on "Records Collection" of the Presidential Archives Website (대통령 해외순방 기록의 생산과 서비스 개선방안 연구 대통령기록관 웹사이트 '기록컬렉션'을 중심으로)

  • Jeon, Na Hyeong
    • The Korean Journal of Archival Studies
    • /
    • no.78
    • /
    • pp.5-42
    • /
    • 2023
  • Since presidential overseas trips are carried out as the head of state representing the Republic of Korea, the resulting records of such trips have high academic and historical significance and value both in contemporary times and for future generations. This study analyzes the status of production and service of overseas trip records, focusing on whether the records of the president's overseas trips are being produced properly and provided sufficiently to the public, and examines development plans for improvement. Currently, as a result of examining a total of 282 overseas trips provided by the Presidential Archives website, it is difficult for users to understand which records are being produced for even the basic records regarding the trips are not posted. In addition, the website is provider-centered, making users feel alienated rather than being considered in terms of search and provided records. In this study, for the production of high-quality overseas travel records, the "Presidential Overseas Trip Records Production Guidelines" established during the 'Participatory Government' will be supplemented, improved and applied. This archive policy will not be subject to any external variables, including changes in the government, and is suggested that it be consistent and unaffected. In addition, in order to improve the service provided, the following is proposed: first, provision of 'comprehensive information' that allows users to understand the overall context of the trip; second, use of the "file-record" layer and hyperlink function; third, a system that allows the stages of production and service of overseas trip records to be interconnected. In order to carry out these tasks, it would be essential to establish and operate an organization dedicated to records, such as the Secretariat of Archives and Records Management during the 'Participatory Government' period.

A Study on the Development of an Integrated Implementation Model for Digital Transformation and ESG Management (디지털 트랜스포메이션과 ESG 경영의 통합 추진을 위한 모델 개발에 관한 연구 )

  • Kim, Seung-wook
    • Journal of Venture Innovation
    • /
    • v.7 no.3
    • /
    • pp.85-100
    • /
    • 2024
  • ESG management refers to corporate management that takes into account environmental, social, and governance factors, while digital transformation goes beyond the mere automation or digitization of existing tasks to drive an innovative change in the essence of work and the way value is created. Therefore, digital transformation can help companies achieve ESG goals and implement sustainable business practices, establishing a complementary relationship between digital transformation and ESG management for corporate sustainability and growth. This relationship maximizes the synergy of integrating digital transformation with ESG management, enabling companies to utilize resources efficiently and prevent redundant investments, ultimately enhancing sustainable management performance. In this study, we propose the simultaneous promotion of business process reengineering (BPR), in which both digital transformation and ESG management are integrated. This is because the collection, analysis, and decision-making processes related to various data for promoting ESG management must be organically integrated with digital transformation technologies. Therefore, we analyzed each ESG management objective presented in the K-ESG guidelines and identified the corresponding digital transformation technologies through expert interviews and a review of prior research. The K-ESG guidelines serve as a useful ESG diagnostic system that enables companies to identify improvement tasks and manage performance based on goals through self-assessment of ESG levels. By developing a model based on the K-ESG guidelines for the integrated promotion of digital transformation and ESG management, companies can simultaneously improve ESG performance and drive digital innovation, reducing redundant investments and trial-and-error while utilizing diverse resources efficiently. This study provides practical and academic implications by developing a concrete and actionable new research model for researchers and businesses.

A Study on the Improvement of Port Security Function in Busan Port - Target of Port facility security costs collection - (부산항 항만보안 기능 개선 연구 -항만시설보안료 징수대상을 중심으로-)

  • Kim, Seong-Hwan;Lee, Jeong-Min;Kim, Yul-Seong
    • Journal of Korea Port Economic Association
    • /
    • v.39 no.4
    • /
    • pp.127-145
    • /
    • 2023
  • As the importance of strengthening port security is increasing, it is necessary to conduct a perceptual study on port facility users who pay for port security services first. This study aims to identify improvements in the port security function of Busan Port and contribute to the future development of port security in Korea. A total of 125 questionnaires were collected from port facility security fee collectors at Busan Port. Based on the collected data, exploratory factor analysis, traditional IPA, and modified IPA were conducted. In conclusion, first, the physical function of port security is the most important and should be continuously maintained and strengthened. Second, improving the professionalism of port security personnel is most urgent, and the port security education system needs to be improved. Finally, it is necessary to gradually develop the port security information service function in consideration of future development possibilities.

A Ranking Algorithm for Semantic Web Resources: A Class-oriented Approach (시맨틱 웹 자원의 랭킹을 위한 알고리즘: 클래스중심 접근방법)

  • Rho, Sang-Kyu;Park, Hyun-Jung;Park, Jin-Soo
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.31-59
    • /
    • 2007
  • We frequently use search engines to find relevant information in the Web but still end up with too much information. In order to solve this problem of information overload, ranking algorithms have been applied to various domains. As more information will be available in the future, effectively and efficiently ranking search results will become more critical. In this paper, we propose a ranking algorithm for the Semantic Web resources, specifically RDF resources. Traditionally, the importance of a particular Web page is estimated based on the number of key words found in the page, which is subject to manipulation. In contrast, link analysis methods such as Google's PageRank capitalize on the information which is inherent in the link structure of the Web graph. PageRank considers a certain page highly important if it is referred to by many other pages. The degree of the importance also increases if the importance of the referring pages is high. Kleinberg's algorithm is another link-structure based ranking algorithm for Web pages. Unlike PageRank, Kleinberg's algorithm utilizes two kinds of scores: the authority score and the hub score. If a page has a high authority score, it is an authority on a given topic and many pages refer to it. A page with a high hub score links to many authoritative pages. As mentioned above, the link-structure based ranking method has been playing an essential role in World Wide Web(WWW), and nowadays, many people recognize the effectiveness and efficiency of it. On the other hand, as Resource Description Framework(RDF) data model forms the foundation of the Semantic Web, any information in the Semantic Web can be expressed with RDF graph, making the ranking algorithm for RDF knowledge bases greatly important. The RDF graph consists of nodes and directional links similar to the Web graph. As a result, the link-structure based ranking method seems to be highly applicable to ranking the Semantic Web resources. However, the information space of the Semantic Web is more complex than that of WWW. For instance, WWW can be considered as one huge class, i.e., a collection of Web pages, which has only a recursive property, i.e., a 'refers to' property corresponding to the hyperlinks. However, the Semantic Web encompasses various kinds of classes and properties, and consequently, ranking methods used in WWW should be modified to reflect the complexity of the information space in the Semantic Web. Previous research addressed the ranking problem of query results retrieved from RDF knowledge bases. Mukherjea and Bamba modified Kleinberg's algorithm in order to apply their algorithm to rank the Semantic Web resources. They defined the objectivity score and the subjectivity score of a resource, which correspond to the authority score and the hub score of Kleinberg's, respectively. They concentrated on the diversity of properties and introduced property weights to control the influence of a resource on another resource depending on the characteristic of the property linking the two resources. A node with a high objectivity score becomes the object of many RDF triples, and a node with a high subjectivity score becomes the subject of many RDF triples. They developed several kinds of Semantic Web systems in order to validate their technique and showed some experimental results verifying the applicability of their method to the Semantic Web. Despite their efforts, however, there remained some limitations which they reported in their paper. First, their algorithm is useful only when a Semantic Web system represents most of the knowledge pertaining to a certain domain. In other words, the ratio of links to nodes should be high, or overall resources should be described in detail, to a certain degree for their algorithm to properly work. Second, a Tightly-Knit Community(TKC) effect, the phenomenon that pages which are less important but yet densely connected have higher scores than the ones that are more important but sparsely connected, remains as problematic. Third, a resource may have a high score, not because it is actually important, but simply because it is very common and as a consequence it has many links pointing to it. In this paper, we examine such ranking problems from a novel perspective and propose a new algorithm which can solve the problems under the previous studies. Our proposed method is based on a class-oriented approach. In contrast to the predicate-oriented approach entertained by the previous research, a user, under our approach, determines the weights of a property by comparing its relative significance to the other properties when evaluating the importance of resources in a specific class. This approach stems from the idea that most queries are supposed to find resources belonging to the same class in the Semantic Web, which consists of many heterogeneous classes in RDF Schema. This approach closely reflects the way that people, in the real world, evaluate something, and will turn out to be superior to the predicate-oriented approach for the Semantic Web. Our proposed algorithm can resolve the TKC(Tightly Knit Community) effect, and further can shed lights on other limitations posed by the previous research. In addition, we propose two ways to incorporate data-type properties which have not been employed even in the case when they have some significance on the resource importance. We designed an experiment to show the effectiveness of our proposed algorithm and the validity of ranking results, which was not tried ever in previous research. We also conducted a comprehensive mathematical analysis, which was overlooked in previous research. The mathematical analysis enabled us to simplify the calculation procedure. Finally, we summarize our experimental results and discuss further research issues.

The Preventive Measures On Terrorism Against Overseas Korean Businessmen(A view of recent ethnic minority separation movement) (해외근무(海外覲務) 기업체(企業體)에 대(對)한 테러 방지책(防止策) - 최근(最近) 소수민족분리주의운동지역(小數民族分離主義運動地域)을 중심(中心)으로 -)

  • Choi, Yoon-Soo
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.351-370
    • /
    • 1997
  • This study concerns possible measures to prevent separatists' terrorist acts against overseas Korean businessmen. Of late, many Korean enterprises are helping a number of foreign countries develop their economy, by building factories and manning regional offices in those countries. But recent development of terrorism especially against Korean businessmen is alarming. This report discusses the need for Korean enterprises heading overseas to prepare themselves with awareness of terrorism and possible protective measures against it, besides their routine pursuance of profits; and for the government and prospective enterprises to refrain from investing in those countries having active separatist movements. If an investment has become inevitable, a careful survey of the region in conflict should be conducted and self-protective measures should be put in place through security information exchange, emergency coordination and training of personnel, etc. This study will first review the past terrorist incidents involving employees of overseas Korean enterprises, and then will focuss on seeking effective measures on the basis of the reported incidents. In carrying out the study, related literature from both home and abroad have been used along with the preliminary materials reported and known on the Internet from recent incidents. 1. The separatist movements of minority groups Lately, minority separatist groups are increasingly resorting to terrorism to draw international attention with the political aim of gaining extended self rule or independence. 2. The state of terrorism against overseas Korean enterprises and Koreans Korean enterprises are now operating businesses, and having their own personnel stationed, in 85 countries including those in South East Asia and Middle East regions. In Sri Lanka, where a Korean enterprise recently became a target of terrorist bombing, there are 75 business firms from Korea and some 700 Korean employees are stationed as of August 1996. A total of 19 different terrorist incidents have taken place against Koreans abroad since 1990. 3. Terrorism preventive measures Terrorism preventive measures are discussed in two ways: measures by the government and by the enterprises. ${\blacktriangleleft}$ Measures by the government - Possible measures at governmental level can include collection and dissemination of terrorist activity information. Emphasis should be given to the information on North Korean activities in particular. ${\blacktriangleleft}$ Measures by individual enterprises - Organizational security plan must be established by individual enterprises and there should also be an increase of security budget. A reason for reluctant effort toward positive security plan is the perception that the security budget is not immediately linked to an increment of profit gain. Ensuring safety for overseas personnel is a fundamental obligation of an enterprise. Consultation and information exchange on security plan, and an emergency support system at a threat to security must be sought after and implemented. 4. Conclusion Today's terrorism varies widely depending on reasons and causes, and its means has become increasingly informationalized and scientific as well while its method is becoming more clandestine and violent. Terrorist organizations are increasingly aiming at enterprises for acquisition of budgets needed for their activities. Korean enterprises have extended their business realm to foreign countries since 1970, exposing themselves to terrorism. Enterprises and their employees, therefore, should establish their own security measures on the one hand while the government must provide general measures, on the other, for the protection of the life and property of Korean residents abroad from terrorist attacks. In this regard, set-up of a counter terrorist organization that coordinates the efforts of government authorities in various levels in planning and executing counter terrorist measures is desired. Since 1965, when the hostile North Korea began to step up its terrorist activities against South Koreans, there have been 7 different occasions of assassination attempt on South Korean presidents and some 500 cases of various kidnappings and attempted kidnappings. North Korea, nervous over the continued economic growth and social stabilization of South Korea, is now concentrating its efforts in the destruction and deterioration of the national power of South Korea for its earlier realization of reunification by force. The possibility of North Korean terrorism can be divided into external terrorist acts and internal terrorist acts depending on the nationality of the terrorists it uses. The external terrorist acts include those committed directly by North Korean agents in South Korea and abroad and those committed by dissident Koreans, hired Korean residents, or international professionals or independent international terrorists bought or instigated by North Korea. To protect the life and property of Korean enterprises and their employees abroad from the threat of terrorism, the government's administrative support and the organizational efforts of enterprises should necessarily be directed toward the planning of proper security measures and training of employees. Also, proper actions should be taken against possible terrorist acts toward Korean business employees abroad as long as there are ongoing hostilities from minority groups against their governments.

  • PDF

Financial Fraud Detection using Text Mining Analysis against Municipal Cybercriminality (지자체 사이버 공간 안전을 위한 금융사기 탐지 텍스트 마이닝 방법)

  • Choi, Sukjae;Lee, Jungwon;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.119-138
    • /
    • 2017
  • Recently, SNS has become an important channel for marketing as well as personal communication. However, cybercrime has also evolved with the development of information and communication technology, and illegal advertising is distributed to SNS in large quantity. As a result, personal information is lost and even monetary damages occur more frequently. In this study, we propose a method to analyze which sentences and documents, which have been sent to the SNS, are related to financial fraud. First of all, as a conceptual framework, we developed a matrix of conceptual characteristics of cybercriminality on SNS and emergency management. We also suggested emergency management process which consists of Pre-Cybercriminality (e.g. risk identification) and Post-Cybercriminality steps. Among those we focused on risk identification in this paper. The main process consists of data collection, preprocessing and analysis. First, we selected two words 'daechul(loan)' and 'sachae(private loan)' as seed words and collected data with this word from SNS such as twitter. The collected data are given to the two researchers to decide whether they are related to the cybercriminality, particularly financial fraud, or not. Then we selected some of them as keywords if the vocabularies are related to the nominals and symbols. With the selected keywords, we searched and collected data from web materials such as twitter, news, blog, and more than 820,000 articles collected. The collected articles were refined through preprocessing and made into learning data. The preprocessing process is divided into performing morphological analysis step, removing stop words step, and selecting valid part-of-speech step. In the morphological analysis step, a complex sentence is transformed into some morpheme units to enable mechanical analysis. In the removing stop words step, non-lexical elements such as numbers, punctuation marks, and double spaces are removed from the text. In the step of selecting valid part-of-speech, only two kinds of nouns and symbols are considered. Since nouns could refer to things, the intent of message is expressed better than the other part-of-speech. Moreover, the more illegal the text is, the more frequently symbols are used. The selected data is given 'legal' or 'illegal'. To make the selected data as learning data through the preprocessing process, it is necessary to classify whether each data is legitimate or not. The processed data is then converted into Corpus type and Document-Term Matrix. Finally, the two types of 'legal' and 'illegal' files were mixed and randomly divided into learning data set and test data set. In this study, we set the learning data as 70% and the test data as 30%. SVM was used as the discrimination algorithm. Since SVM requires gamma and cost values as the main parameters, we set gamma as 0.5 and cost as 10, based on the optimal value function. The cost is set higher than general cases. To show the feasibility of the idea proposed in this paper, we compared the proposed method with MLE (Maximum Likelihood Estimation), Term Frequency, and Collective Intelligence method. Overall accuracy and was used as the metric. As a result, the overall accuracy of the proposed method was 92.41% of illegal loan advertisement and 77.75% of illegal visit sales, which is apparently superior to that of the Term Frequency, MLE, etc. Hence, the result suggests that the proposed method is valid and usable practically. In this paper, we propose a framework for crisis management caused by abnormalities of unstructured data sources such as SNS. We hope this study will contribute to the academia by identifying what to consider when applying the SVM-like discrimination algorithm to text analysis. Moreover, the study will also contribute to the practitioners in the field of brand management and opinion mining.