• Title/Summary/Keyword: 과학기술정보서비스

Search Result 1,611, Processing Time 0.034 seconds

Design and Implementation of a Distribute Multimedia System (분산 멀티미디어 스트리밍 시스템 설계 및 구현)

  • 김상국;신화종;김세영;신동규;신동일
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2000.11a
    • /
    • pp.66-69
    • /
    • 2000
  • 웹이 등장하면서 지금까지 인터넷 상에서 텍스트와 이미지를 이용하여 정보를 표현하고 전달하는 방법이 가장 많이 사용되어왔다. 그러나 웹 관련 기술의 비약적인 발달과 네트워크 속도의 증가 및 인터넷의 급속한 보급으로 단순한 텍스트와 이미지 중심의 HTML 문서를 이용한 정보의 전달이 아닌 멀티미디어 데이터를 이용한 정보의 표현과 전달이 점차 증대되고 있다. 이에 따라 멀티미디어 데이터를 전송하기 위한 스트리밍 프로토콜도 등장하였다. 최근에는 컴퓨터의 성능 증가 및 네트워크 속도의 증가(초고속 통신 서비스의 보급)에 의해 멀티미디어 데이터의 전송이 가능하게 됨으로써 기존의 공중파나 CATV 방송국의 형태 지니고 인터넷 상에서 실시간 생방송 서비스와 VOD(Video On Demand) 서비스를 제공하는 인터넷 방송국이 급속하게 생겨나고 있다. (11) 인터넷 방송은 동영상과 오디오의 실시간 전달을 가능하게 하는 멀티미디어 스트리밍 기술과 멀티미디어를 실시 간으로 전송할 수 있는 실시간 전송 프로토콜을 기반으로 발전하고 있다. 인터넷 상에서 멀티미디어 스트리밍 서비스를 하는 대부분의 인터넷 방송은 스트리밍 서버로서 RealNetworks사의 RealSystem과 Microsoft사의 WMT(Windows Media Technologies)를 사용하고 있다. 본 논문은 Real Server와 WMT의 비교 분석을 통해 실시간 전송 프로토콜을 지원하고, 멀티미디어 스트리밍 기술을 지원하는 자바를 기반으로 한 분산 서버 구조의 스트리밍 서버, 서버간의 부하를 제어하는 미들웨어, 멀티미디어 스트림을 재생할 수 있는 클라이언트를 설계하고 구현한다.있다.구현한다. 이렇게 구현된 시스템은 전자 상거래, 가상 쇼핑몰, 가상 전시화, 또는 3차원 게임이나 가상교육 시스템과 같은 웹기반 응용프로그램에 사용될 수 있다.물을 보존·관리하는 것이 필요하다. 이는 도서관의 기능만으로는 감당하기 어렵기 때문에 대학정보화의 센터로서의 도서관과 공공기록물 전문 담당자로서의 대학아카이브즈가 함께 하여 대학의 공식적인 직무 관련 업무를 원활하게 지원하고, 그럼으로써 양 기관의 위상을 높이는 상승효과를 낼 수 있다.하여는, 인쇄된 일차적 정보자료의 검색방법등을 개선하고, 나아가서는 법령과 판례정보를 위한 효율적인 시스템을 구축하며, 뿐만 아니라 이용자의 요구에 충분히 대처할 수 잇는 도서관으로 변화되는 것이다. 이와 함께 가장 중요한 것은 법과대학과 사법연수원에서 법학 연구방법에 관한 강좌를 개설하여 각종 법률정보원의 활용 내지 도서관 이용방법에 관하여 교육하는 것이다.글을 연구하고, 그 결과에 의존하여서 우리의 실제의 생활에 사용하는 $\boxDr$한국어사전$\boxUl$등을 만드는 과정에서, 어떤 의미에서 실험되었다고 말할 수가 있는 언어과학의 연구의 결과에 의존하여서 수행되는 철학적인 작업이다. 여기에서는 하나의 철학적인 연구의 시작으로 받아들여지는 이 의미분석의 문제를 반성하여 본다. 것이 필요하다고 사료된다.크기에 의존하며, 또한 이러한 영향은 $(Ti_{1-x}AI_{x})N$ 피막에 존재하는 AI의 함량이 높고, 초기에 증착된 막의 업자 크기가 작을 수록 클 것으로 여겨진다. 그리고 환경의 의미의 차이에 따라 경관의 미학적 평가가 달라진 것으로

  • PDF

Future Technological Foresight and Promising Emerging Technology Selection Frameworks based on Six Human Senses (인간의 6감각 기반의 미래 기술예측조사 및 유망기술 발굴 체제연구)

  • Cho, Ilgu;Lee, Jungmann
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.4
    • /
    • pp.229-236
    • /
    • 2017
  • Technology foresight is the process which investigate long term science, technology, economic and social effects to derive strategic R&D and future promising technologies. This study shows that new systematic framework based on technology classifications of space and action in human society, future six senses was employed as a new research method for effective process of future technology foresight. In addition, to increase the acceptance, forecasting, and uniqueness of new technology, we derived major issues of future society and demand-base products and services through the new process of ICT future mega trend analysis, the findings and selections of future technology, and future scenario based on human six senses.

A Survey on Deep Learning based Face Recognition for User Authentication (사용자 인증을 위한 딥러닝 기반 얼굴인식 기술 동향)

  • Mun, Hyung-Jin;Kim, Gea-Hee
    • Journal of Industrial Convergence
    • /
    • v.17 no.3
    • /
    • pp.23-29
    • /
    • 2019
  • Object recognition distinguish objects which are different from each other. But Face recognition distinguishes Identity of Faces with Similar Patterns. Feature extraction algorithm such as LBP, HOG, Gabor is being replaced with Deep Learning. As the technology that identify individual face with machine learning using Deep Learning Technology is developing, The Face Recognition Technology is being used in various field. In particular, the technology can provide individual and detailed service by being used in various offline environments requiring user identification, such as Smart Mirror. Face Recognition Technology can be developed as the technology that authenticate user easily by device like Smart Mirror and provide service authenticated user. In this paper, we present investigation about Face Recognition among various techniques for user authentication and analysis of Python source case of Face recognition and possibility of various service using Face Recognition Technology.

Design and Implemention of Real-time web Crawling distributed monitoring system (실시간 웹 크롤링 분산 모니터링 시스템 설계 및 구현)

  • Kim, Yeong-A;Kim, Gea-Hee;Kim, Hyun-Ju;Kim, Chang-Geun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.45-53
    • /
    • 2019
  • We face problems from excessive information served with websites in this rapidly changing information era. We find little information useful and much useless and spend a lot of time to select information needed. Many websites including search engines use web crawling in order to make data updated. Web crawling is usually used to generate copies of all the pages of visited sites. Search engines index the pages for faster searching. With regard to data collection for wholesale and order information changing in realtime, the keyword-oriented web data collection is not adequate. The alternative for selective collection of web information in realtime has not been suggested. In this paper, we propose a method of collecting information of restricted web sites by using Web crawling distributed monitoring system (R-WCMS) and estimating collection time through detailed analysis of data and storing them in parallel system. Experimental results show that web site information retrieval is applied to the proposed model, reducing the time of 15-17%.

Policy and Mechanism for Safe Function-level Dynamic Kernel Update (함수 단위 동적 커널 업데이트를 위한 보안 정책 및 기법의 설계)

  • Park, Hyun-Chan;Yoo, Chuck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.8
    • /
    • pp.808-812
    • /
    • 2008
  • In recent years, the software vulnerability becomes an important problem to the safety in operating system kernel. Many organizations endeavor to publish patches soon after discovery of vulnerability. In spite of the effort, end-system administrators hesitate to apply the patches to their system. The reasons of hesitation are the reboot disruption and the distrust of patches. To solve this problem we propose a dynamic update system for non-updatable kernel, named DUNK. The DUNK provides: 1) a dynamic update mechanism at function-level granularity to overcome the reboot disruption and 2) a safety verification mechanism to overcome the distrust problem, named MAFIA. In this paper, we describe the design of DUNK and detailed algorithm of MAFIA.

Analysis and Implementation of RFID Security Protocol using Formal Verification (정형검증을 통한 RFID 보안프로토콜 분석 및 구현)

  • Kim, Hyun-Seok;Kim, Ju-Bae;Han, Keun-Hee;Choi, Jin-Young
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.7
    • /
    • pp.332-339
    • /
    • 2008
  • Radio Frequency Identification (RFID) technology is an important part of infrastructures in ubiquitous computing. Although all products using tags is a target of these services, these products also are a target of attacking on user privacy and services using authentication problem between user and merchant, unfortunately. Presently, it is very important about security mechanism of RFID system and in this paper, we analyze the security protocol among many kinds of mechanisms to solve privacy and authentication problem using formal verification and propose a modified novel protocol. In addition, the possibility of practical implementation for proposed protocol will be discussed.

The Study of Data Integration Methods for Heterogeneous Sensors in a Cloud Environment (클라우드 환경에서 이기종 센서를 위한 데이터 통합에 대한 연구)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.354-356
    • /
    • 2014
  • Recently, The sensor technology Has been used in many fields, it is detected data of various types of sensors, is very difficult to integrate due to differences in the standards and each other unit. Also, when we providing a service or program on a data cloud, it is important that integrates of such data in order to take advantage of the detected data in the similar field. In this paper, we propose a approaches to integrating data to be provided as a service in the cloud of data arising from a heterogeneous sensors. The approaches are generating a standard meta-data based on ontology, it is mapping with detected data by the sensor data. Accordingly, the detected data is possible to improve the efficiency of data transfer between the sensor and the application by sending an application in a standard format.

  • PDF

A Study on the User Behavior of Korean Defense R&D Researchers (국방연구개발 연구원들의 정보이용 행태에 관한 연구)

  • Song, Jong-Ho;Oh, Dong-Geun
    • Journal of Information Management
    • /
    • v.39 no.2
    • /
    • pp.1-25
    • /
    • 2008
  • This study is to investigate the user behavior of defense development and test researchers working for A research institute to provide advanced library services. Based on the prior studies about the subject, survey through questionnaires were conducted, and the data analyzed using SPSS 12.0. Results of the analyses are as follows: The researchers generally gathered information 2 to 3 times per month. The major reason for information gathering was to solve problems and do their tasks. They considered accuracy of information as the most important factor when they gather information. Finding and selecting information sources were the most difficult task for them in retrieving, acquiring and using information. They have most frequently used digital materials (67%), printed materials next (26%), and non-book materials (6%). Internet was both the most frequently used and most satisfied information source for the researchers.

A Technique to Specify and Generate .NET Components in MDA/PSM for Pervasive Service (MDA/PSM상에서 퍼베이시브 서비스를 지원하는 닷넷 컴포넌트의 명세 및 생성 기법)

  • Kum, Deuk-Kyu;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.7
    • /
    • pp.635-645
    • /
    • 2007
  • Component technology has been widely accepted as an effective way for building software systems with reusable components, and Microsoft (MS) .NET is one of the recent representative component technologies. Model Driven Architecture (MDA) is a new development paradigm which generates software by transforming design models automatically and incrementally. Transformation of structural models in MDA has been successfully applied. However, transformation of dynamic models and pervasive services, such as transaction service, security service, synchronization service and object pooling are largely remains as an area for further research. The recent enterprise system has multi tier distributed architecture, and the functionality of early mentioned pervasive services is essential for this architecture. .NET platform can implement Component Object Model+ (COM+) component for supporting pervasive services by specify Attribute code. In this paper, we specify the functionalities of the COM+ component offering pervasive services, and then those functionalities are defined by UML profile. By using the profile, the Platform Specific Model (PSM) for .NET/C# is specified, and .NET components are automatically generated through our tool. The development productivity, extensibility, portability, and maintenance of software can be dramatically improved by using of the proposed methods.

Informal Communication in Research Activities (연구활동에 있어서의 비공식 커뮤니케이션)

  • Sakong, Bok Hee
    • Journal of the Korean Society for information Management
    • /
    • v.1 no.1
    • /
    • pp.127-145
    • /
    • 1984
  • The purpose of the present paper is (1) to clarify the significance and the role of informal communication in research activities, (2) to grasp the characteristics of Invisible College, the social organization for informal communication, and its effect on research activities and (3) to pay consideration to formalization of informal communication systems. To comprehend all the things is necessary to improve information services.

  • PDF