• Title/Summary/Keyword: remove and management

Search Result 475, Processing Time 0.024 seconds

A Optimal Method of Sensor Node Deployment for the Urban Ground Facilities Management (도시지상시설물 관리를 위한 최적 센서노드 배치 방법)

  • Kang, Jin-A;Nam, Sang-Kwan;Kwon, Hyuk-Jong;OH, Yoon-Seuk
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.12 no.4
    • /
    • pp.158-168
    • /
    • 2009
  • As nation and society progresses, urban ground facilities and their management system get more complicated and the cost and effort to control the system efficiently grows exponentially. This study suggests to the deployment method of a sensor node by Wireless Sensor Network for controling the Urban Ground Facilities of National Facilities. First, we achieve the management facilities and method using the first analysis and then make the coverage of sensing and then set up the Sensor Node in Urban Ground Facilities. Second, we propose the solution way of repetition by the second analysis. And, we embody the GIS program by Digital Map and this method, we improve the reality by overlapping an aerial photo. Also we make an experience on the sensor node allocation using making program. we can remove the repetition sensor node about 50%, and we can confirm that the sensor nodes are evenly distributed on the road.

  • PDF

Character Segmentation and Recognition Algorithm for Various Text Region Images (다양한 문자열영상의 개별문자분리 및 인식 알고리즘)

  • Koo, Keun-Hwi;Choi, Sung-Hoo;Yun, Jong-Pil;Choi, Jong-Hyun;Kim, Sang-Woo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.4
    • /
    • pp.806-816
    • /
    • 2009
  • Character recognition system consists of four step; text localization, text segmentation, character segmentation, and recognition. The character segmentation is very important and difficult because of noise, illumination, and so on. For high recognition rates of the system, it is necessary to take good performance of character segmentation algorithm. Many algorithms for character segmentation have been developed up to now, and many people have been recently making researches in segmentation of touching or overlapping character. Most of algorithms cannot apply to the text regions of management number marked on the slab in steel image, because the text regions are irregular such as touching character by strong illumination and by trouble of nozzle in marking machine, and loss of character. It is difficult to gain high success rate in various cases. This paper describes a new algorithm of character segmentation to recognize slab management number marked on the slab in the steel image. It is very important that pre-processing step is to convert gray image to binary image without loss of character and touching character. In this binary image, non-touching characters are simply separated by using vertical projection profile. For separating touching characters, after we use combined profile to find candidate points of boundary, decide real character boundary by using method based on recognition. In recognition step, we remove noise of character images, then recognize respective character images. In this paper, the proposed algorithm is effective for character segmentation and recognition of various text regions on the slab in steel image.

A study of Effect of Information Security Management System [ISMS] Certification on Organization Performance (정보보호관리체계[ISMS] 인증이 조직성과에 미치는 영향에 관한 연구)

  • Bae, Young-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.4224-4233
    • /
    • 2012
  • As Internet usage is rapidly spreading, tasks that were only possible offline are now available in cyber space but at the same time, new security threats such as hacking and viruses have also increased. For that reason, Comprehensive and methodical information security systems are therefore required in enterprises and organizations. Consequently, the Information Security Management System certification system has been in effect in Korea since July 2001. As of December 2012, 130 enterprises have been certified, and more than 120 ISO27001 certifications have been issued. As such, since the introduction of the ISMS certification system in Korea, the demand for the certification has been steadily increasing, and it is now recognized as an integral part of maintaining the competitiveness in an enterprise. However, the qualitative aspects of certification regarding the effectiveness of ISMS have been continuously questioned by actual customers. In order to clarify the situation and remove such doubts, this study will substantiate the fact that development and certification of ISMS positively affect the business performance of enterprises so that they will recognize the effect of obtaining ISMS certification and eventually prevent security accidents and improve their business performance by developing ISMS.

Monitoring of Neonicotinoid Pesticide Residues in Paprika Using UPLC-MS/MS from Gyeongnam Region (UPLC-MS/MS를 이용한 경남지역 파프리카 중 neonicotinoid계 농약 잔류 모니터링)

  • Kim, Nam-Kuk;Lee, Seung-Hwa;Nam, Yu-Jeong;Moon, Kyung-Mi;Park, Min-Ho;Yun, Mun-Hee;Kim, Mi-Young;Jang, Hyun-Min;Shin, Bong-Shig
    • The Korean Journal of Pesticide Science
    • /
    • v.15 no.1
    • /
    • pp.15-21
    • /
    • 2011
  • Monitoring or follow-up surveying pesticide residues in agricultural commodities is the key to meet the international regulations and to enhance international competitiveness of Korean agricultural commodities. Six neonicotinoid insecticides, acctamiprid, clothianidin, dinotefuran, imidacloprid, thiacloprid, and thiamethoxam were monitored in 95 paprika samples collected from Gyeongnam area. Thc pesticide residues were extracted by EN 15662 buffer based on the QuEChERS method, clean-upped with dispersive solid-phase extraction method to remove interfering pigments, and analyzed using UPLC-MS/MS. The neonicotinoid pesticides were detected in 90.5% of the paprika samples. Two or more pesticides were detected in 82.3% of samples. Although detection frequencies were high, all samples complied with the maximum residue limits (MRLs) set by both the Korea Food and Drug Administration (KFDA) and Japanese Ministry of Health, Labour and Welfare.

An Assessment on Efficiency of MBAS Removal in Urban Stream Maintenance Water by Using Sand Filtration (모래여과를 이용한 도시하천유지용수의 MBAS 제거 효율 평가)

  • Kim, hong bae;Ahn, kyung soo
    • Journal of Wetlands Research
    • /
    • v.8 no.2
    • /
    • pp.45-51
    • /
    • 2006
  • Biological enhanced treatment and send filtration are established being operated to remove nutrients and MBAS(Methylene Blue Activate Substance) in the most of Waste Water Treatment Plant(WWTP) in Korea. However, untreated synthetic detergents and nutrients which directly run into the water system present an unpleasant view because of the foam, taste and odor generating filamentous periphytic algae and interrupting self-purification in the stream. Therefore, this research was enforced to know the MBAS removal efficiency of the sand filtration about G WWTP which reuses effluent as urban stream management water. As a result, the maximum removal efficiency using sand filtration was 63% after 24 hours and particularly 30% after 2 or 4 hours which turned out to be not that effective. In conclusion, It is recognized that other methods of MBAS removal and a research will be needed which reuse effluent as urban stream management water from now on. Because the MBAS removal with sand filtration is insufficient with economical efficiency from the fact that it needs long hours for a sand filtration treatment and the removal efficiency was almost below the expectation.

  • PDF

The Quartile Deviation and the Control Chart Model of Improvement Confidence for Link Travel Speed from GPS Probe Data (사분위편차 및 관리도 모형에 의한 GPS 수집기반 구간통행속도 데이터 이상치 제거방안 연구)

  • Han, Won-Sub;Kim, Dong-Hyo;Hyun, Cheol-Seung;Lee, Ho-Won;Oh, Yong-Tae;Lee, Choul-Ki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.6
    • /
    • pp.21-30
    • /
    • 2008
  • The travel speed collected by the prove-car equipped with the GPS has the problems, which are the data's stability and finding out the representative travel speed, by the influence of the traffic signal and etc. at the interrupted traffic. This study was conducted to develop the method of filtering the outlier data from the data collected by the prove-car. The method to remove the outlier data from the serial data which were collected by the prove-car was adapted to each of the quartile deviation statistics model and the management graphic statistics model. The rate of removing the outlier data by the quartile deviation method was $0{\sim}3.7%$ while the rate by the management graphic statistic methods was $0.3{\sim}7.2%$. Both methods show the low removal rate at the dawn time when the traffic is inactivity, on the other hand the remove rate is high during the daytime. However, both methods have the problem such that the threshold level for removing the outlier data was established at the low bound in the case as good as the statistics model. Therefore, it is required for the experience calibration.

  • PDF

Improvement Factors for Reinforced Concrete Firm against Removing the restriction of Construction Market Activation (겸업제한 폐지에 따른 철근콘크리트 전문건설업체의 발전요인)

  • Park, Jeong-Ho;Jun, Hun-Bai;Cho, Kyu-Man;Hong, Tae-Hoon;Koo, Kyo-Jin;Hyun, Chang-Taek
    • Korean Journal of Construction Engineering and Management
    • /
    • v.9 no.1
    • /
    • pp.118-125
    • /
    • 2008
  • Recently, the Ministry of Construction and Transportation announced a notice of the legislation related to remove the restriction of construction market activation in advance. he removement is an overwhelming change of the business structure in the Korean construction industry and has a far-reaching influence on general and trade contractors. The purpose of this research was to suggest improvement factors to survive an excessive competition in reinforced concrete market. This research did SWOT analysis to examine the strength, weakness, opportunity and threat of reinforced concrete firm, and established business strategies. The factor analysis was also applied with questionnaire survey to staff in charge of reinforced concrete company. It is expected that the suggested improvement factors can give effective business strategies to reinforced concrete firm. Furthermore, trade contractors having difficulty in a bottleneck in management can get help from the result of this research.

A Study on the Subjectivity of Pain Management of Nurse (간호사의 통증관리에 대한 주관성 연구)

  • Park, Kyung Sook;Song, Mi Seung;Kim, Kyung Hee
    • Korean Journal of Adult Nursing
    • /
    • v.13 no.1
    • /
    • pp.123-135
    • /
    • 2001
  • The purpose of this study is to analyze the structural pattern of nurses' pain management with patients who experience pain. As a research method, the Q methodology, which is useful for an objective view of a highly abstract concept, was applied. The data collecting activity of this study was from August, 21st, 2000 to November, 24th 2000. The Q-population, the previous thesis and a literature review were done. Questions about pain management by the nurse on the patients, caregivers, nursing students, doctors, nurses, and others were asked in documentary work and in-depth interviews. In all, 223 units of the Q-population were formed, and the last 35 units of the Q-population were extracted. The data on the P-sample was collected from 41 nurses who worked in the medical and surgical units of a hospital that belonges to C university in Seoul. The research results were constituted in 3 types. Type I was the 'pattern of judging by objectivity'. The statement on which most of the people highly agreed for those patterns was shown by 'If patients said that they are suffering from pain, we sufficiently performed an assessment about the etiology, location, duration and degree'. For type I, the same pain was found in different locations according to the patients, so the etiology of the pain should be identified first place. Since ways of coping are different according to pain etiology, it was thought that it is important to assess sufficiently the pain etiology, location, duration, and degree. Therefore, when patients complain of pain, the pain etiology should be identified and assessed; according to the result, pain management should be performed systematically. Type II was the 'pattern of accepting by subjectivity'. The statement on which most of the people highly agreed for those patterns was shown as 'If patients said that they are suffering from pain, the medical treatment should be performed rapidly and speedily.' For type II, when the patient complains of pain, treatment should be performed quickly in order to prevent the condition getting worse, and it is thought that activity is a reasonable duty. Further, by trying to show empathy after pain is admitted and by understanding and coping rapidly with the pain of patients, an attitude which matched the altruistic morals of nurses is being shown. Type III was the 'pattern of worrying about', and the statement on which most of the people highly agreed for those patterns was shown is 'When there is a pain, to help patients to tolerate the pain to the highest degree.' In type III, the pain is a subjective expression, so there is a difference according to every individual. Therefore, actually if there is no measurement of pain, it could be exaggerated so nurses should help patients to tolerate it to the utmost. Even if there is a way to remove pain without an analgesic drug, nurses were reluctant to perform pain management as they possibly could. Through these research results, pain management of nurses was classified in 3 types, and structural characteristics in each type were discovered. Based upon the characteristics according to the type, an individualized pain management intervention strategy should be established and the follow up work performed.

  • PDF

Effectiveness of the Verif $EYE^{TM}$ machine -vision technology for complying with reducing microbial indicator counts on beef carcasses

  • Lee, Jeong-Ah;Kim, Sa-Hyun;Lee, Sang-Koan;Kim, Gi-Cheol;Oh, Hye-Won;Jung, Tae-Nam;Lee, Yang-Soo;Jung, Chang-Jin;Jang, Won-Hyuck
    • Korean Journal of Veterinary Service
    • /
    • v.30 no.2
    • /
    • pp.191-196
    • /
    • 2007
  • The slaughter process for cattle will inevitably transfer some bacteria onto the carcasses. The goal of food safety programs is to minimize and effectively remove this contamination. This study was attempted by the Verif $EYE^{TM}$ machine-vision technology that might be useful for reducing microbial indicator counts and could reduce the contamination chance of E coli O157:H7 and Salmonella spp on beef carcasses. For the evaluation of the effectiveness of the Verif $EYE^{TM}$ technology, 80 samples were examined by the inspection device over 15 days. On an examination of FDS-positive samples compared to negative controls from the same carcasses, aerobic plate counts were bigger than the negative control samples (5.26 vs 4.60 log). Enterobacteriaceae counts were greater on the positive samples than the corresponding negative control samples (2.07 vs 1.17log). There was a consistent correlation between samples detected by the Verif $EYE^{TM}$ system with detectable counts. For example, 100% of positive samples had detectable APC and 91.2% of positive samples had detectable TCC. Therefore, if areas detected as positive for contamination by the Verif $EYE^{TM}$ system were removed from the carcasses, significant sources of microbial contamination will be reduced for objective compliance with HACCP. This results suggest that the use of Verif $EYE^{TM}$ machine-vision technology might be useful for reducing microbial indicator counts (APC, TCC) and could help reduce the risk of presence of E coJi O157:H7 and Salmonella spp on Beef carcasses.

Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device (휴대용통신단말의 효과적인 보안관리를 위한 보안 재구성기법의 설계 및 구현)

  • An, Gae-Il;Kim, Ki-Young;Seo, Dong-Il
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.691-698
    • /
    • 2009
  • A mobile communication device is a small size of portable computer which provides communication service, such as smart phone and PDA. Currently, one of the biggest barriers in developing the mobile communication device is security issue. Even though there are excellent security functions which can remove the security issues, there is a problem that the mobile communication device can not be loaded with all the functions because it has low storage, poor computational power, and inconvenient user interface, compared to the desktop personal computer. This paper proposes a context-aware security reconfiguration scheme for effective security management of the mobile communication device. The scheme can provide the mobile communication device with the optimized security service which is most adapted to its current security context. Through the prototype implementation and the experiments of the proposed scheme, we have confirmed that the proposed scheme is excellent in terms of computing resource efficiency and usability, without degrading security level.