• Title/Summary/Keyword: u-서비스

Search Result 1,791, Processing Time 0.035 seconds

Analysis of Price competitiveness of Asian Hub Airports (아시아권 허브 공항의 가격 경쟁력 분석)

  • Yeo, Hyeong-Gu;Gang, Gyeong-U;Jang, Hye-Jin
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.5
    • /
    • pp.125-133
    • /
    • 2007
  • Through open-sky policy, USA and European selected market principle of multiuser. However, in Asian case, major airlines monopolize airports. It is purpose that analyzes fare competition of Asian Hub Airport and the position of Incheon airport in Asia. Passengers required longer time and distance to go to the destination because direct flights decreases. But passengers increased in airport every year. Because of routes that decrease, airlines provide more services of flights. So airlines prefer to Hub Airports. As a result, both passengers and airlines are profitable by various routs and the increased frequency. On the assumption that distance and fare are related, the final formula is as following that defined the air fare from hub(H) to destination(Z) by logarithm. Analysis showed that log Rdist is not 1 but 0.08. As distance increases, fare doesn't increase. If distance from hub to destination airports is longer, Log dist_HZ is negative. It is that fare decreases from origin to destination via hub or that fare increases from hub to destination. HHI_HZ and HHI_AZ are negative. It means that if the degree of monopolization of hub and origin airports is lager, fare decreases from origin to destination via hub. Or fare increases from hub to destination. And it compares the Incheon airport with the other Asian hub airports and it examines the competitive fare by market division. As compared with the Incheon airport, Singapore, Beijing and Narita airports are higher fares. They compete with the other ones by Asian hub airports. But Hong Kong and Taipei airports must have more passengers through fare competition yet.

Ground Security Activities for Prevention of Aviation Terrorism -Centered on San Francisco International Airport of the U.S.A.- (항공테러방지를 위한 지상 보안활동 -미국 샌프란시스코국제공항을 중심으로-)

  • Kang, Maeng-Jin;Kang, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.2
    • /
    • pp.195-204
    • /
    • 2008
  • With the growth of airline management, as well as computer and IT security, the international trade in this modern society has been rapidly increasing, Along with the advancing, airplanes have become a universal means of communication. However, the complications associated with airplane safety have also been brought up as a result, the most concerning of which is terrorism. One of the main counterplans for preventing terrorism is Ground security activities the core of Ground security activities is absolute safety for passengers in both passenger terminal and freight terminal. Subastral security refers to physical protection, proximity control and 100% security search and freight guarding of the passengers' possessions, and the personnel's duties to perform such jobs are be! coming more crucial. On the other hand, Airport security check has bee n gradually developing since the 1960's, when hijacking began to take place. Although the airports have been providing more safe and comfortable services to their customers, terrorism is still happening today. When Ground security activities is minute, the users feel displeasure and discomfort, yet considering solely their convenience can brings problems in achieving safety. Since the 9.11 terror in 2001, the idea of improving and strengthening airport security was reinforced and a considerable amount of estate is being spent today for invention and application of new technology. Various nations, including the United States, have been improving their systems of security through public services; public police department is actively carrying out their duties in airports as well. In San Francisco International Airport, private police department is in charge of collection of data, national events, VIP protection, law enforcement, cooperation within facilities, daily-based patrol and traffic control. Under guidance and supervision of national organizations, such as TSA, general police department interprets X-Rays, operates metal detectors, checks passports or IDs and observes reactions to explosives. Under these circumstances, studies about advancement of cooperation and duties of general police department and private police department necessitated: especially about private police department and their training for searching equipments, decrease in number of turn over rate, invention of technology and prior settlement in estate for security. The privacy of the public, who make up the major population of airport passengers, must also be minimized. In the following research, the activities of police departments in San Francisco International Airport will be analyzed in order to understand recent actions of the United States on airport security.

Development of Topic Trend Analysis Model for Industrial Intelligence using Public Data (텍스트마이닝을 활용한 공개데이터 기반 기업 및 산업 토픽추이분석 모델 제안)

  • Park, Sunyoung;Lee, Gene Moo;Kim, You-Eil;Seo, Jinny
    • Journal of Technology Innovation
    • /
    • v.26 no.4
    • /
    • pp.199-232
    • /
    • 2018
  • There are increasing needs for understanding and fathoming of business management environment through big data analysis at industrial and corporative level. The research using the company disclosure information, which is comprehensively covering the business performance and the future plan of the company, is getting attention. However, there is limited research on developing applicable analytical models leveraging such corporate disclosure data due to its unstructured nature. This study proposes a text-mining-based analytical model for industrial and firm level analyses using publicly available company disclousre data. Specifically, we apply LDA topic model and word2vec word embedding model on the U.S. SEC data from the publicly listed firms and analyze the trends of business topics at the industrial and corporate levels. Using LDA topic modeling based on SEC EDGAR 10-K document, whole industrial management topics are figured out. For comparison of different pattern of industries' topic trend, software and hardware industries are compared in recent 20 years. Also, the changes of management subject at firm level are observed with comparison of two companies in software industry. The changes of topic trends provides lens for identifying decreasing and growing management subjects at industrial and firm level. Mapping companies and products(or services) based on dimension reduction after using word2vec word embedding model and principal component analysis of 10-K document at firm level in software industry, companies and products(services) that have similar management subjects are identified and also their changes in decades. For suggesting methodology to develop analysis model based on public management data at industrial and corporate level, there may be contributions in terms of making ground of practical methodology to identifying changes of managements subjects. However, there are required further researches to provide microscopic analytical model with regard to relation of technology management strategy between management performance in case of related to various pattern of management topics as of frequent changes of management subject or their momentum. Also more studies are needed for developing competitive context analysis model with product(service)-portfolios between firms.

Toward Cinema for All People -Barrier-free Films and Cultural Civil Rights ('더 많은' 모두를 위한 영화 -배리어프리 영상과 문화적 시민권)

  • Lee, Hwa-Jin
    • Journal of Popular Narrative
    • /
    • v.25 no.4
    • /
    • pp.263-288
    • /
    • 2019
  • Barrier-free films enhance accessibility to audiovisual image contents by providing specific information on screen and through sound so that people with vision or hearing loss can receive the same amount of information as those without disabilities and immerse themselves in the audiovisual images. This study pays attention to barrier-free audiovisual contents in relation to the cultural civil rights of people with vision or hearing loss in South Korea. While institutional efforts have been made in the 2010s to improve the access to audiovisual media of people with vision or hearing loss, the goal of enabling people with vision or hearing loss to fully enjoy all audiovisual contents at a level equal to the non-disabled has not yet been realized. Amid the lingering conflict between disabled groups and multiplexes that has lasted years, the global video streaming service Netflix has aggressively threatened the dominance of local multiplexes with the launch of its Korean service. As Netflix, which is subject to U.S. regulations guaranteeing the rights of people with vision or hearing loss, has produced original dramas and movies involving Korean production teams, the cultural civil rights discourse of the disabled has transitioned to the issue of the rights of cultural consumers crossing national borders in the era of globalization. Changes in the media environment raise the issue of civil rights guarantees in which disabled people enjoy the right to simultaneously watch movies and comment on movies by participating in a common discourse, equally with non-disabled people. The "right to be part of the audience for Korean cinema" for Korean deaf people, which has long been neglected, should also be considered as a cultural civil right that crosses the boundaries of language, nation and disabilities. This essay examines the current issues surrounding the right to cultural entertainment of people with vision or hearing loss in South Korea in conjunction with the contemporary trend of rapid changes in the media environment and the global spread of the movement for cultural civil rights of people with disabilities, and suggests the need for visual culture studies to take a serious step toward disability studies.

Development of Practical Problem-Based Home Economics Teaching.Learning Process Plans by Blended Learning Strategy - Focusing on a Unit 'the Youth and Consumer Life' - (Blended Learning(BL) 전략을 활용한 실천적 문제 중심 가정과 교수 학습 과정안 개발 - '청소년과 소비생활' 단원을 중심으로 -)

  • Lee, Jin-Hee;Chae, Jung-Hyun
    • Journal of Korean Home Economics Education Association
    • /
    • v.20 no.4
    • /
    • pp.19-42
    • /
    • 2008
  • The purpose of this study was to develop practical problem-based home economics teaching.learning process plans about a unit 'the youth and consumer life' of middle school eighth-grade Technology and Home Economics by applying blended learning(BL) strategy. According to ADDIE instructional design model, this study was conducted in the following procedure: analysis, design/development, implementation, and evaluation. In the stage of design and development, the selected unit was converted into a practical problem-based unit, and practical problem-based teaching. learning process plans were designed in detail by using BL strategy. An online study room for practical problem-based home economics instruction grounded in BL strategy was prepared by using Edunet(http://community.edunet4u.net/${\sim}$consumer2). Eight-session lesson plans were mapped out, and study aids for students and materials for teachers were prepared. In the implementation stage, the first-session teaching plans that dealt with a minor question 'what preparations should be made to become a wise consumer' were utilized when instruction was provided to 115 eighth graders who were in three different province, and the other one was in a middle school in the city of Daejeon. The experimental teaching was implemented for two weeks in the following procedure: preliminary program, pre-online learning, main instruction and post- online learning. The preliminary program was carried out in a session in the classroom, and pre-online learning was provided before the main instruction was given in a session in the classroom. After the main instruction was completed, post-online learning was offered. In the evaluation stage, a survey was conducted on all the learners and teachers to find out their opinions and suggestions.

  • PDF

A Study of Anomaly Detection for ICT Infrastructure using Conditional Multimodal Autoencoder (ICT 인프라 이상탐지를 위한 조건부 멀티모달 오토인코더에 관한 연구)

  • Shin, Byungjin;Lee, Jonghoon;Han, Sangjin;Park, Choong-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.3
    • /
    • pp.57-73
    • /
    • 2021
  • Maintenance and prevention of failure through anomaly detection of ICT infrastructure is becoming important. System monitoring data is multidimensional time series data. When we deal with multidimensional time series data, we have difficulty in considering both characteristics of multidimensional data and characteristics of time series data. When dealing with multidimensional data, correlation between variables should be considered. Existing methods such as probability and linear base, distance base, etc. are degraded due to limitations called the curse of dimensions. In addition, time series data is preprocessed by applying sliding window technique and time series decomposition for self-correlation analysis. These techniques are the cause of increasing the dimension of data, so it is necessary to supplement them. The anomaly detection field is an old research field, and statistical methods and regression analysis were used in the early days. Currently, there are active studies to apply machine learning and artificial neural network technology to this field. Statistically based methods are difficult to apply when data is non-homogeneous, and do not detect local outliers well. The regression analysis method compares the predictive value and the actual value after learning the regression formula based on the parametric statistics and it detects abnormality. Anomaly detection using regression analysis has the disadvantage that the performance is lowered when the model is not solid and the noise or outliers of the data are included. There is a restriction that learning data with noise or outliers should be used. The autoencoder using artificial neural networks is learned to output as similar as possible to input data. It has many advantages compared to existing probability and linear model, cluster analysis, and map learning. It can be applied to data that does not satisfy probability distribution or linear assumption. In addition, it is possible to learn non-mapping without label data for teaching. However, there is a limitation of local outlier identification of multidimensional data in anomaly detection, and there is a problem that the dimension of data is greatly increased due to the characteristics of time series data. In this study, we propose a CMAE (Conditional Multimodal Autoencoder) that enhances the performance of anomaly detection by considering local outliers and time series characteristics. First, we applied Multimodal Autoencoder (MAE) to improve the limitations of local outlier identification of multidimensional data. Multimodals are commonly used to learn different types of inputs, such as voice and image. The different modal shares the bottleneck effect of Autoencoder and it learns correlation. In addition, CAE (Conditional Autoencoder) was used to learn the characteristics of time series data effectively without increasing the dimension of data. In general, conditional input mainly uses category variables, but in this study, time was used as a condition to learn periodicity. The CMAE model proposed in this paper was verified by comparing with the Unimodal Autoencoder (UAE) and Multi-modal Autoencoder (MAE). The restoration performance of Autoencoder for 41 variables was confirmed in the proposed model and the comparison model. The restoration performance is different by variables, and the restoration is normally well operated because the loss value is small for Memory, Disk, and Network modals in all three Autoencoder models. The process modal did not show a significant difference in all three models, and the CPU modal showed excellent performance in CMAE. ROC curve was prepared for the evaluation of anomaly detection performance in the proposed model and the comparison model, and AUC, accuracy, precision, recall, and F1-score were compared. In all indicators, the performance was shown in the order of CMAE, MAE, and AE. Especially, the reproduction rate was 0.9828 for CMAE, which can be confirmed to detect almost most of the abnormalities. The accuracy of the model was also improved and 87.12%, and the F1-score was 0.8883, which is considered to be suitable for anomaly detection. In practical aspect, the proposed model has an additional advantage in addition to performance improvement. The use of techniques such as time series decomposition and sliding windows has the disadvantage of managing unnecessary procedures; and their dimensional increase can cause a decrease in the computational speed in inference.The proposed model has characteristics that are easy to apply to practical tasks such as inference speed and model management.

A Thermal Time-Driven Dormancy Index as a Complementary Criterion for Grape Vine Freeze Risk Evaluation (포도 동해위험 판정기준으로서 온도시간 기반의 휴면심도 이용)

  • Kwon, Eun-Young;Jung, Jea-Eun;Chung, U-Ran;Lee, Seung-Jong;Song, Gi-Cheol;Choi, Dong-Geun;Yun, Jin-I.
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.8 no.1
    • /
    • pp.1-9
    • /
    • 2006
  • Regardless of the recent observed warmer winters in Korea, more freeze injuries and associated economic losses are reported in fruit industry than ever before. Existing freeze-frost forecasting systems employ only daily minimum temperature for judging the potential damage on dormant flowering buds but cannot accommodate potential biological responses such as short-term acclimation of plants to severe weather episodes as well as annual variation in climate. We introduce 'dormancy depth', in addition to daily minimum temperature, as a complementary criterion for judging the potential damage of freezing temperatures on dormant flowering buds of grape vines. Dormancy depth can be estimated by a phonology model driven by daily maximum and minimum temperature and is expected to make a reasonable proxy for physiological tolerance of buds to low temperature. Dormancy depth at a selected site was estimated for a climatological normal year by this model, and we found a close similarity in time course change pattern between the estimated dormancy depth and the known cold tolerance of fruit trees. Inter-annual and spatial variation in dormancy depth were identified by this method, showing the feasibility of using dormancy depth as a proxy indicator for tolerance to low temperature during the winter season. The model was applied to 10 vineyards which were recently damaged by a cold spell, and a temperature-dormancy depth-freeze injury relationship was formulated into an exponential-saturation model which can be used for judging freeze risk under a given set of temperature and dormancy depth. Based on this model and the expected lowest temperature with a 10-year recurrence interval, a freeze risk probability map was produced for Hwaseong County, Korea. The results seemed to explain why the vineyards in the warmer part of Hwaseong County have been hit by more freeBe damage than those in the cooler part of the county. A dormancy depth-minimum temperature dual engine freeze warning system was designed for vineyards in major production counties in Korea by combining the site-specific dormancy depth and minimum temperature forecasts with the freeze risk model. In this system, daily accumulation of thermal time since last fall leads to the dormancy state (depth) for today. The regional minimum temperature forecast for tomorrow by the Korea Meteorological Administration is converted to the site specific forecast at a 30m resolution. These data are input to the freeze risk model and the percent damage probability is calculated for each grid cell and mapped for the entire county. Similar approaches may be used to develop freeze warning systems for other deciduous fruit trees.

A Study on the Characteristics of Jobs in Academic Libraries According to Different Generations (대학도서관 업무의 시대별 변천에 따른 특성 연구)

  • Cho, Chul-Hyun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.1
    • /
    • pp.135-170
    • /
    • 2015
  • This study aimed to investigate the transition of academic libraries' jobs by developing a model based on a shift of library generations including Library 1.0, Library 2.0, and Library 3.0 corresponding to the shift of web generations and to explore generational characteristics of library duties as well. The research used three phases of procedure: literature review about different library generations; job analyses for academic libraries in South Korea and the U.S.A.; the Delphi technique in tree sequential order. The research findings were as follows. First of all, there were 170 duties that continued from Library 1.0 to Library 3.0. There were 58 duties which continued from Library 2.0 to Library 3.0 whereas three duties that continued from Library 1.0 to Library 2.0. In addition, three distinctive duties existed only in Library 1.0 whereas one unique duty was only in Library 2.0. Library 3.0 generated 25 new duties. Secondly, considering general characteristics which cover specific parts of individual duties, there was a significant increase in importance, difficulty, and frequency of library administration throughout the three generations. In terms of importance, difficulty, and frequency of collection development and management, there was a significant increase only from Library 2.0 to Library 3.0. Considering information organization, there was a significant decrease in importance from Library 1.0 to Library 2.0. In addition, there was a significant decrease in frequency and there was no significant difference in difficulty throughout the three generations. In the case of information service, while there was a significant increase in importance among three generations, there was a significant increase in difficulty only from Library 1.0 to Library 2.0. However, there was no generational difference in frequency. With the respect of information system development and management, there was a significant increase in importance and frequency throughout the three generations, but there was no significant difference in difficulty among three generations.

Examination of the Current Situations of Security Dogs and it's Development Plans (경호탐지견의 운용실태 및 발전방안)

  • Park, Hyung-Kyu;Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.215-234
    • /
    • 2007
  • Our country security industry 1960's service expense of the beginning U.S. army unit it accomplishes the growth which is quick with start, currently about 2,500 triumph the security enterprises which it goes over are being active. But the majority in these enterprise about lower cotton can a forever characteristic with pressure and the manpower civil official ability insufficient back of faithlessness management and capital power. To sleep with afterwords it presents the security dogs deployment plan for an efficient security together from the research which it sees hereupon and it does. First, it cultivates the domestic mountain progress dog which is a breed which is suitable with the security dogs and the shovel flesh dog back with the security dogs. Specially the Jindo of the breed which is excellent training which is suitable in task of the security dogs it leads and if it uses appropriately, it industrializes our specific the Jindo and protection there is a possibility of getting the effect which falls to also the gist which it rears rightly. It cultivate the second, security dogs and it magnifies training. The security dogs consequently is it will be able to accomplish the task above 2 branches to training method. Namely, after finishing obedience training, it is to be in security activity it will execute guard or detection back special training which is suitable in task and it will be able to commit. Third, it uses the security dogs which is trained rightly in task. The security dogs the adult escorts, facility expense, the explosive and narcotic drug detection, it will be able to use with the other blind man guidance dogs back. The narcotic drug detection dogs which currently is used specially technique intelligence anger, when considering the tendency of the narcotic drug smuggling offense field which becomes diversification that the role very it is important is a possibility of saying at day. It cultivate a fourth, escort relation specialty manpower and it improves the breed of the security dogs. The hazard which cultivate the security dogs use necessary personnel the breed of security dogs, the security dogs training center it opens the security crane relation subject of the college which stands and (university) it improves it establishes and training which is suitable in task it is to do to execute letting in the training map company. Specially, the hazard which improves the breed of security dogs in the progress mind quality which stands against the portion where the breed improvement is demanded as the portion where the internal organs research and investment are necessary sees. The security dogs compares in labor cost and the expense holds few, if it uses the our specific domestic dogs it will be able to use efficiently in the task which is various it solves the multi branch plans for wisly with the security dogs industrial development security of course contemporary history sliced raw fish sees demands compared to being immediacy and the life which is happy business the place where it does it sees it will be able to contribute a lot as.

  • PDF

Timing and Risk Factors of Adoption for Legally-Free Foster Children after Having Parental Rights Terminated in the U. S. (미국 위탁아동의 친권상실선고 이후 입양 결정요인에 관한 생존분석)

  • Song, Min-Kyoung
    • Korean Journal of Social Welfare
    • /
    • v.59 no.1
    • /
    • pp.301-327
    • /
    • 2007
  • The purpose of this study is to examine the timing and the risk factors associated with the adoption of legally-free foster children. The sample of the study was drawn from foster care files of Adoption and Foster Care Analysis and Reporting System(AFCARS) in 32 states between October 1998 (FY 1999) and September 2002(FY 2002). The timing post-TPR to adoption was examined by plotting the Kaplan-Meier cumulative hazard function for adoption and by plotting the KM hazard functions stratified by child's race and child's age at TPR. Cox proportional-hazards regression analysis was used to identify risk factors for adoption of legally-free foster children after TPR. The hazard of adoption was very low immediately after TPR but increased steadily starting at 3 months and then declined after 20 months. The cumulative hazard functions for White non-Hispanic children and Black non-Hispanic children crossed over at 13 months after TPR. Racial minority status, older age, and disability were negatively associated with the hazard of adoption. Physical abuse, sexual abuse had the lower hazard for adoption compared by neglect. Caretaker's inability to cope had the slightly lower hazard for adoption whereas inadequate housing showed the slightly greater hazard for adoption. Characteristics of foster care services turned into be powerful predictors of adoption. Specifically, legally-free children placed in pre-adoptive homes, those who shared the same racial/ethnic background with their foster caretakers, and those who were placed in two-parent families have a greater likelihood of adoption. The findings highlight the importance of foster care service provisions after TPR to facilitate adoption of legally-free foster children. Furthermore, a more substantial resources and targeted support for foster children who experience physical abuse and sexual abuse in need of adoption should be provided for moving the foster children into permanency.

  • PDF