• Title/Summary/Keyword: location-based-Service

Search Result 1,651, Processing Time 0.025 seconds

Visual Specificity of the Pyongyang Landscape - Perspectives of North Korea Tourism - (서구권의 북한 관광을 통해 본 평양 경관의 시각적 특수성)

  • Ahn, Jin-hee;Pae, Jeong-Hann
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.44 no.4
    • /
    • pp.66-74
    • /
    • 2016
  • In what way is the urban landscape of North Korea used today, and what features do people prefer in the North Korean landscape? This study analyzed the characteristics of Pyongyang landscapes and their effects, based on an analysis of Western tourists motivation for tourism in North Korea and preferred enjoyment-seeking experiences. Using data from the tourist agency specializing in Western tourism in North Korea and a location based photo-sharing service, the study interprets the visual distinctiveness of Pyongyang landscape. The study concluded that widely known risk to travelers in North Korea is in fact an attraction, making people want to visit directly. However, this risk was mitigated in practical experience by the overall intermediation of the tourism agency and locals' conscious behavior to keep their distance from foreigners. Next, the scope of National ritual attributes was expanded to the locals' daily life as well as large-scale events such as mass games and military parades only if for national holidays. Also, the most preferred factors contributing to North Korean tourism were based on departure from routine through mobilization of the residents. This indicates the extension that the nature of North Korea as a theater state. The Pyongyang landscape represents a world politically isolated, people's congregated motion to display to the world, and people's lives hidden beneath a veil. These visualities fulfill the fantasy of Westerners regarding North Korea. Furthermore, these are superficial images that help create a basis to maintain the North Korea regime.

Designing the Record Management Functions for Record Content Using Advantages of Cloud Storage (클라우드 저장소 장점을 활용한 기록 콘텐츠 관리기능 설계)

  • Yim, Jin-Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.3
    • /
    • pp.271-292
    • /
    • 2019
  • Recently, the central administrative agency changed its business management system to cloud-based On-nara 2.0. To transfer and manage the records of the cloud business management system, the National Archives Service has developed and distributed a cloud-based records management system. It serves as an opportunity to maximize the benefits of cloud computing and redesign the records management to be more effective and efficient. The process and method of electronic record management can be transformed through digital technologies. First, we can change the transfer method for electronic records. When the business and the records management systems share the same cloud storage, it is possible to transfer the content files between the two systems without moving the contents files physically, thus copying only the metadata and reducing the cost and the risk of integrity damage. Second, the strategy for allocating storage space for contents can be conceived. Assuming that the cloud storage is shared by the business and the record management systems, it is advantageous to distinguish the storage location based on the retention period of the content files. Third, systems that access content files, such as records creation, records management, and information disclosure systems, can share the cloud storage and minimize the duplication of content files.

A Study on the Development of Traffic Accident Information System Based on WebGIS (WebGIS 기반 교통사고정보관리 시스템 개발에 관한 연구)

  • Jeong, Su-Jin;Lim, Seung-Hyeon;Cho, Gi-Sung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.6D
    • /
    • pp.1003-1010
    • /
    • 2006
  • This study developed a traffic accident information management system based on WebGIS that can process a lot of data for giving effectively diagnosis of traffic accidents in serious damage circumstances by traffic accident. Also, this study presents a way to compose and to convey traffic accident information. In addition, non-spatial attributes as well as spatial attributes about traffic accidents information be integrated and managed by the system. To provide Web service, we developed modules that can supply visually spatial information and traffic accidents data through ASP, Javascript, ArcIMS based on Web and constructed a server. And constructed system include a function that offer the now situation of traffic accident in real time, which supply the statistical data of traffic accident through Web as soon as user entry data in comparison with previous way that preparatory period until traffic accidents data is supplied to peoples had been long. Traffic accidents are analyzed with only nonspatial attribute by simply collecting in the past. However, system constructed by this study offer new function that can grasp visually accident spot circumstance and use detailed content and accurate location data as well as statistical data of traffic accidents. Also, it offer interface that can connect directly with accident charge policeman.

Evaluation of Data-based Expansion Joint-gap for Digital Maintenance (디지털 유지관리를 위한 데이터 기반 교량 신축이음 유간 평가 )

  • Jongho Park;Yooseong Shin
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.28 no.2
    • /
    • pp.1-8
    • /
    • 2024
  • The expansion joint is installed to offset the expansion of the superstructure and must ensure sufficient gap during its service life. In detailed guideline of safety inspection and precise safety diagnosis for bridge, damage due to lack or excessive gap is specified, but there are insufficient standards for determining the abnormal behavior of superstructures. In this study, a data-based maintenance was proposed by continuously monitoring the expansion-gap data of the same expansion joint. A total of 2,756 data were collected from 689 expansion joint, taking into account the effects of season. We have developed a method to evaluate changes in the expansion joint-gap that can analyze the thermal movement through four or more data at the same location, and classified the factors that affect the superstructure behavior and analyze the influence of each factor through deep learning and explainable artificial intelligence(AI). Abnormal behavior of the superstructure was classified into narrowing and functional failure through the expansion joint-gap evaluation graph. The influence factor analysis using deep learning and explainable AI is considered to be reliable because the results can be explained by the existing expansion gap calculation formula and bridge design.

Analyses of the Efficiency in Hospital Management (병원 단위비용 결정요인에 관한 연구)

  • Ro, Kong-Kyun;Lee, Seon
    • Korea Journal of Hospital Management
    • /
    • v.9 no.1
    • /
    • pp.66-94
    • /
    • 2004
  • The objective of this study is to examine how to maximize the efficiency of hospital management by minimizing the unit cost of hospital operation. For this purpose, this paper proposes to develop a model of the profit maximization based on the cost minimization dictum using the statistical tools of arriving at the maximum likelihood values. The preliminary survey data are collected from the annual statistics and their analyses published by Korea Health Industry Development Institute and Korean Hospital Association. The maximum likelihood value statistical analyses are conducted from the information on the cost (function) of each of 36 hospitals selected by the random stratified sampling method according to the size and location (urban or rural) of hospitals. We believe that, although the size of sample is relatively small, because of the sampling method used and the high response rate, the power of estimation of the results of the statistical analyses of the sample hospitals is acceptable. The conceptual framework of analyses is adopted from the various models of the determinants of hospital costs used by the previous studies. According to this framework, the study postulates that the unit cost of hospital operation is determined by the size, scope of service, technology (production function) as measured by capacity utilization, labor capital ratio and labor input-mix variables, and by exogeneous variables. The variables to represent the above cost determinants are selected by using the step-wise regression so that only the statistically significant variables may be utilized in analyzing how these variables impact on the hospital unit cost. The results of the analyses show that the models of hospital cost determinants adopted are well chosen. The various models analyzed have the (goodness of fit) overall determination (R2) which all turned out to be significant, regardless of the variables put in to represent the cost determinants. Specifically, the size and scope of service, no matter how it is measured, i. e., number of admissions per bed, number of ambulatory visits per bed, adjusted inpatient days and adjusted outpatients, have overall effects of reducing the hospital unit costs as measured by the cost per admission, per inpatient day, or office visit implying the existence of the economy of scale in the hospital operation. Thirdly, the technology used in operating a hospital has turned out to have its ramifications on the hospital unit cost similar to those postulated in the static theory of the firm. For example, the capacity utilization as represented by the inpatient days per employee tuned out to have statistically significant negative impacts on the unit cost of hospital operation, while payroll expenses per inpatient cost has a positive effect. The input-mix of hospital operation, as represented by the ratio of the number of doctor, nurse or medical staff per general employee, supports the known thesis that the specialized manpower costs more than the general employees. The labor/capital ratio as represented by the employees per 100 beds is shown to have a positive effect on the cost as expected. As for the exogeneous variable's impacts on the cost, when this variable is represented by the percent of urban 100 population at the location where the hospital is located, the regression analysis shows that the hospitals located in the urban area have a higher cost than those in the rural area. Finally, the case study of the sample hospitals offers a specific information to hospital administrators about how they share in terms of the cost they are incurring in comparison to other hospitals. For example, if his/her hospital is of small size and located in a city, he/she can compare the various costs of his/her hospital operation with those of other similar hospitals. Therefore, he/she may be able to find the reasons why the cost of his/her hospital operation has a higher or lower cost than other similar hospitals in what factors of the hospital cost determinants.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Extraction of Landmarks Using Building Attribute Data for Pedestrian Navigation Service (보행자 내비게이션 서비스를 위한 건물 속성정보를 이용한 랜드마크 추출)

  • Kim, Jinhyeong;Kim, Jiyoung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.37 no.1
    • /
    • pp.203-215
    • /
    • 2017
  • Recently, interest in Pedestrian Navigation Service (PNS) is being increased due to the diffusion of smart phone and the improvement of location determination technology and it is efficient to use landmarks in route guidance for pedestrians due to the characteristics of pedestrians' movement and success rate of path finding. Accordingly, researches on extracting landmarks have been progressed. However, preceding researches have a limit that they only considered the difference between buildings and did not consider visual attention of maps in display of PNS. This study improves this problem by defining building attributes as local variable and global variable. Local variables reflect the saliency of buildings by representing the difference between buildings and global variables reflects the visual attention by representing the inherent characteristics of buildings. Also, this study considers the connectivity of network and solves the overlapping problem of landmark candidate groups by network voronoi diagram. To extract landmarks, we defined building attribute data based on preceding researches. Next, we selected a choice point for pedestrians in pedestrian network data, and determined landmark candidate groups at each choice point. Building attribute data were calculated in the extracted landmark candidate groups and finally landmarks were extracted by principal component analysis. We applied the proposed method to a part of Gwanak-gu, Seoul and this study evaluated the extracted landmarks by making a comparison with labels and landmarks used by portal sites such as the NAVER and the DAUM. In conclusion, 132 landmarks (60.3%) among 219 landmarks of the NAVER and the DAUM were extracted by the proposed method and we confirmed that 228 landmarks which there are not labels or landmarks in the NAVER and the DAUM were helpful to determine a change of direction in path finding of local level.

A study on animal SHUNJANG in tombs 39 and 63 in Gyo-dong, Changnyeong (창녕 교동 39·63호분 동물순장 연구)

  • KWON Jooyoung;KIM Bosang
    • Korean Journal of Heritage: History & Science
    • /
    • v.55 no.4
    • /
    • pp.56-70
    • /
    • 2022
  • Tombs No. 39 and No. 63 in Gyo-dong, Changnyeong, are unique in the Changnyeong area in that they do not have additional burials because they are hoenggu-style tombs with an entrance on the north side. This study tried to understand the nature and meaning of the two separate stone walls at the entrance of the tomb along with the burial process of the tomb. These two stone walls mark small tombs built independently within a large tomb, with stone wall No. 39 stone wall No. 3 (No.39-3) and No. 63 stone wall No. 3 (No. 63-3). Both units are located in the middle of the northern wall of the burial body part and share one wall with the burial body part wall stone. All animal fluids inside the stone wall were identified. In particular, it was estimated that at least three dogs were buried as a result of identification of animal fluids No. 63-3. Above all, these animals have their heads facing outward with their backs to the main occupants, and do not overlap in a limited space and are placed side by side. Changnyeong Gyo-dong No. 39-3 and 63-3 were created in the process of building the burial body, and although they are independent relics, they form a subordinate relationship in that they were built along the main burial within one tomb. In addition, it is coercive in that it is placed in an orderly manner according to a certain direction in a state that has not been dismantled after killing an animal. Therefore, It is understood to be the SHUNJANG of dogs. Studies on animal fluids excavated from tombs in the Three Kingdoms period are interpreted as animal stewardship, sacrificial collection, and animal sacrifice depending on their location, and this is known as a series of animal sacrifice rites, namely, animal stewardship and sacrifice. This recognition is based on material objectification of animals, such as food or sacrifices. However, Changnyeong Gyo-dong No. 39-3 and 63-3 are different in that they recognize animals as spiritual beings in the process of funeral rites and are closely related to the ideology that there is life after death. In addition, analysis of the location and directionality of the remains is also required from multiple angles. These two SHUNJANG correspond to the entrance to the tomb, and the location is the most open space at the entrance. The appearance of a dog looking outward, etc., can also be interpreted as the meaning of protecting the tombs and byeoksa. This appearance can be compared with the dog depicted in a mural in a Goguryeo tomb that reflects the ancient world's thought and stone figures excavated from the tomb of King Muryeong of Baekje, and it is also consistent with the meaning of the JINMYOSU protecting the ancient tombs. This suggests that a multifaceted study on animal fluid burial remains is needed in the future.

Real-Time Traffic Information and Road Sign Recognitions of Circumstance on Expressway for Vehicles in C-ITS Environments (C-ITS 환경에서 차량의 고속도로 주행 시 주변 환경 인지를 위한 실시간 교통정보 및 안내 표지판 인식)

  • Im, Changjae;Kim, Daewon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.55-69
    • /
    • 2017
  • Recently, the IoT (Internet of Things) environment is being developed rapidly through network which is linked to intellectual objects. Through the IoT, it is possible for human to intercommunicate with objects and objects to objects. Also, the IoT provides artificial intelligent service mixed with knowledge of situational awareness. One of the industries based on the IoT is a car industry. Nowadays, a self-driving vehicle which is not only fuel-efficient, smooth for traffic, but also puts top priority on eventual safety for humans became the most important conversation topic. Since several years ago, a research on the recognition of the surrounding environment for self-driving vehicles using sensors, lidar, camera, and radar techniques has been progressed actively. Currently, based on the WAVE (Wireless Access in Vehicular Environment), the research is being boosted by forming networking between vehicles, vehicle and infrastructures. In this paper, a research on the recognition of a traffic signs on highway was processed as a part of the awareness of the surrounding environment for self-driving vehicles. Through the traffic signs which have features of fixed standard and installation location, we provided a learning theory and a corresponding results of experiment about the way that a vehicle is aware of traffic signs and additional informations on it.

Design and Implementation of Place Recommendation System based on Collaborative Filtering using Living Index (생활지수를 이용한 협업 필터링 기반 장소 추천 시스템의 설계 및 구현)

  • Lee, Ju-Oh;Lee, Hyung-Geol;Kim, Ah-Yeon;Heo, Seung-Yeon;Park, Woo-Jin;Ahn, Yong-Hak
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.8
    • /
    • pp.23-31
    • /
    • 2020
  • The need for personalized recommendation is growing due to convenient access and various types of items due to the development of information communication and smartphones. Weather and weather conditions have a great influence on the decision-making of users' places and activities. This weather information can increase users' satisfaction with recommendations. In this paper, we propose a collaborative filtering-based place recommendation system using living index by utilizing living index of users' location information on mobile platform to find users with similar propensity and to recommend places by predicting preferences for places. The proposed system consists of a weather module for analyzing and classifying users' weather, a recommendation module using collaborative filtering for place recommendations, and a management module for user preferences and post-management. Experiments have shown that the proposed system is valid in terms of the convergence of collaborative filtering algorithms and living indices and reflecting individual propensity.