• Title/Summary/Keyword: 개방 데이터

Search Result 734, Processing Time 0.024 seconds

A Study on the Characteristics of Detroit's Improving Empty Homes Method from the perspective on abandoned space (유휴공간 관점의 디트로이트 빈집정비 방식의 특성에 관한 연구)

  • Oh, Joon-Gul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.475-480
    • /
    • 2016
  • Abandoned empty houses are largely left neglected as unused space, due to the slowdown in the real estate market that has resulted from the declination of urban functions. This research aims to analyze the characteristics of the City of Detroit's policies and regeneration efforts regarding abandoned houses, based on the perspective of unused space. This is expected to provide the baseline data for similar efforts to be applied to abandoned houses in the Korean context, thus preventing the decline of urbanism by adopting relevant policies and regeneration efforts. Some of the key features of the City of Detroit's regeneration efforts are: 1) the active participation of residents and open-data policies, 2) the diversification of regeneration strategies depending on the potential of the unused space, and 3) securing differential plurality of the regeneration processes.

Multiple Object Tracking and Identification System Using CCTV and RFID (감시 카메라와 RFID를 활용한 다수 객체 추적 및 식별 시스템)

  • Kim, Jin-Ah;Moon, Nammee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.51-58
    • /
    • 2017
  • Because of safety and security, Surveillance camera market is growing. Accordingly, Study on video recognition and tracking is also actively in progress, but There is a limit to identify object by obtaining the information of object identified and tracked. Especially, It is more difficult to identify multiple objects in open space like shopping mall, airport and others utilized surveillance camera. Therefore, This paper proposed adding object identification function by using RFID to existing video-based object recognition and tracking system. Also, We tried to complement each other to solve the problem of video and RFID based. Thus, through the interaction of system modules We propose a solution to the problems of failing video-based object recognize and tracking and the problems that could be cased by the recognition error of RFID. The system designed to identify the object by classifying the identification of object in four steps so that the data reliability of the identified object can be maintained. To judge the efficiency of this system, this demonstrated by implementing the simulation program.

Redesigning Electronic Records Preservation Formats Based on Open Formats (공개포맷에 기반한 전자기록 보존 포맷 재설계 방향 연구)

  • Oh, Seh-La;Jung, Mi Ri;Yim, Jin Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.16 no.4
    • /
    • pp.79-120
    • /
    • 2016
  • Along with the changing computing environment, the production of public documents is moving to G-Cloud and On-nara System, which are re-engineered on G-Cloud. In this process, it is predicted that the Open Document Format (ODF) will replace the proprietary document format, HWP, and will become widely used in the near future. To preserve digital records produced in ODF, this study reviewed the current long-term preservation strategies and identified considerations for new formats. For ODF source files, it is suggested to eliminate the conversion to PDF/A-1 and preserve the documents in the extended ODF with added metadata of records management. Moreover, ODF is presented as an alternative format for preserving proprietary formats. Finally, this study reviewed the current long-term preservation format, i.e., NEO, and suggests a zipped BagIt package, which has an ISO 21320 specification.

Construction of an Hybrid Firewall for School Networks and Implementation of a Graphical Interface for Access Control Rules (학교망을 위한 혼합방화벽 구축 및 접근제어 규칙을 위한 그래픽 인터페이스 구현)

  • Park, Chan-Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.3 no.2
    • /
    • pp.67-75
    • /
    • 2000
  • Due to the advantages of Internet, many teachers use Internet as an educational tool and due to the computerized works in schools, the usages of the Internet increase. However, because of the openness of the Internet, the sensitive data of an organization are exposed to outsiders and the Internet-based working has some problems such as the corruptions of instructional data or on-line assessment results. The need for protecting a school network from outsiders increases but the school networks with firewalls rarely exist. In this paper, in order to solve the security problem of a school network, we construct a hybrid firewall for school networks. In addition, we implement a graphical user interface for teachers to set up the access control rules of a hybrid firewall easily. The interface also provides the facilities such as log analysis, a real-time monitor for network traffics, and the statistic on traffics.

  • PDF

GUI Implementation for 3D Visualization of Ocean Hydrodynamic Models (해수유동모델 결과의 3차원 가시화를 위한 GUI 구현)

  • Choi, Woo-Jeung;Park, Sung-Eun;Lee, Won-Chan;Koo, Jun-Ho;Suh, Young-Sang;Kim, Tae-Hyun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.7 no.3
    • /
    • pp.99-107
    • /
    • 2004
  • This study presents an application of GIS technologies to construct the graphic user interface for 3-dimensional exhibition of the results obtained by ocean hydrodynamic model. In coastal management studies, GIS provide a receptacle for scattered data from diverse sources and an improvement of the 3D visualization of such data. Within the frame of a GIS a variety of analytical, statistical and modeling tools can be applied to transform data and make them suitable for a given application. A 3D hydrodynamic model was driven by time-dependent external forcing such as tide, wind velocity, temperature. salinity, river discharge, and solar radiation under the open boundary condition. The Jinhae bay was selected as a case study. Here, we have used GeoMania v2.5 GIS software and its 3D Analyst extension module to visualize hydrodynamic model result that were simulated around the Jinhae bay.

  • PDF

Determinants of the Regional Competitiveness in the Era of the Globalization and the Climate Change (세계화.기후변화시대의 지역 경쟁력 요인 분석)

  • Roh, Young Sik;Lee, Hee Yeon
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.15 no.4
    • /
    • pp.601-614
    • /
    • 2012
  • This paper is aimed to analyze the determinants and their relative importance that affect regional competitiveness in the era of globalization and climate change. The panel model was set by a balanced panel data for 7 metropolitan areas & 9 provinces and for the period of 2001~2010. Gross regional income per capita is used as the dependent variable and competitiveness-based factors, economic production factors, and climate change adaptation factors are selected as the explanatory variables. In this study, Model 1(typical regional competitiveness model) and Model 2 (added adaptation to climate change adaptation factors) were compared. The important findings can be summarized as follows. The most influential determinants on regional competitiveness are the ratio of knowledge-based industries and human capital and energy inefficiencies decrease the regional competitiveness. Compared to Model 1, Model 2 showed that the effects of the regional openness and the technology innovation capital are relatively more influential in Model 2. The results of this empirical study provide policy implications to strengthen the regional competitiveness in the future of the era of globalization and climate change.

  • PDF

A Study on Spillover of Technology Trade against Post- BRICs (BRICs 이후 신흥국과의 기술무역 확산방안 연구)

  • Baek, Eun-Young
    • International Commerce and Information Review
    • /
    • v.16 no.5
    • /
    • pp.361-385
    • /
    • 2014
  • This study focused on Spillover of Technology Trade against Post- BRICs of the Technology export of Korea. Therefore this study made an empirical analysis for investigating the competitiveness of technology export in Korea and using panel data 2003-2012 of technology trade data between 6 Countries(Indonesia, Mexico, Nigeria, South Africa, Turkey, Vietnam). In particular, the study deduced the correlation between technology export in Korea using the variables of Gross Domestic Expenditure on R&D and Per capita GDP, distance, population, free-trade index, FDI, Technology-Intensive Manufactures, Pattern Investment fixed effect model in panel linear regression model. It is found that the Technology export of Korea SMEs made a significant effect on the pop, free_trade, and distance. and also it is found that the Technology export of Korea Big Business made a significant effect on the per-GDP, Fdi from Korea, free_trade, and distance. The results suggest that the study should use technology gap variables and the strategy for activating the Technology export of Korea should be made for future works.

  • PDF

Anomaly Intrusion Detection using Fuzzy Membership Function and Neural Networks (퍼지 멤버쉽 함수와 신경망을 이용한 이상 침입 탐지)

  • Cha, Byung-Rae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.595-604
    • /
    • 2004
  • By the help of expansion of computer network and rapid growth of Internet, the information infrastructure is now able to provide a wide range of services. Especially open architecture - the inherent nature of Internet - has not only got in the way of offering QoS service, managing networks, but also made the users vulnerable to both the threat of backing and the issue of information leak. Thus, people recognized the importance of both taking active, prompt and real-time action against intrusion threat, and at the same time, analyzing the similar patterns of in-trusion already known. There are now many researches underway on Intrusion Detection System(IDS). The paper carries research on the in-trusion detection system which hired supervised learning algorithm and Fuzzy membership function especially with Neuro-Fuzzy model in order to improve its performance. It modifies tansigmoid transfer function of Neural Networks into fuzzy membership function, so that it can reduce the uncertainty of anomaly intrusion detection. Finally, the fuzzy logic suggested here has been applied to a network-based anomaly intrusion detection system, tested against intrusion data offered by DARPA 2000 Intrusion Data Sets, and proven that it overcomes the shortcomings that Anomaly Intrusion Detection usually has.

Implementation of the LDAP interoperability testing tool with object-oriented approach (객체 지향 접근을 통한 LDAP 상호운용성 시험도구 구현)

  • Kim Youn-su;Lee Soong-Hee;Lee Jong Hyup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5B
    • /
    • pp.247-252
    • /
    • 2005
  • The testing tools implemented up to now for the LDAP(Light-weight Directory Access Protocol) interoperability tests are not easy to modify or add new test items since their source codes are not open. The object-oriented approach, therefore, is required to implement such a testing tool which can be easily modified or add new test items. Thus we designed the architecture for the testing tool applying the object-oriented approach. Java language, appropriate for the object-oriented approach, was used to implement the testing tool. The newly implemented testing tool can modify partly to adapt to the already stored data in the test suite information even during tests. Five LDAP servers can be tested simultaneously with the same configuration setup. Actual testing for the two LDAP servers validates the usefulness of the designed architecture with the proper working of the implemented testing tool according to the architecture.

A Study on Appropriate S-box of DES in Radio Channel (무선채널에 적합한 DES의 S박스에 관한 연구)

  • Park, Mi-Og;Choi, Yeon-Hee;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1C
    • /
    • pp.18-24
    • /
    • 2004
  • Nowadays, the development of wireless communications provides a convenience for many people. On the other hand, the openness of wireless communications poses serious security threats and the security of wireless communications is necessary to support the secure communication channel. The common security method on wireless is the stream cipher that generates the pseudorandom number. In this paper, we propose the usage of the nonlinear function S-box and the mechanism according to it in stream cipher as the study to securely protect data transferred on wireless communications. Besides, it goes abreast a study on S-box with the best random characteristic among the used S-boxes on wireless communications. By means of test, we investigate the most appropriate S-box of DES on wireless communications environment and prove the efficiency of the proposed model by comparing and analysis of the randomness of the based stream cipher and the proposed model.