• Title/Summary/Keyword: 과학기술정보서비스

Search Result 1,610, Processing Time 0.027 seconds

Development of Data Synchronization Client based on SyncML (SyncML 기반의 자료 동기화 클라이언트 개발)

  • Jang, Dae-Jin;Park, Kee-Hyun;Ju, Hong-Taek
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.4
    • /
    • pp.357-367
    • /
    • 2005
  • According to the recent advancement of mobile computing technology and the hardware technology, the mobile device has rapidly come into wide use.'rho data in the central management server needs to confirm to that in mobile devices in order for the mobile device users to access the needed data regardless of time and place. This is called Data Synchronization. Currently, major mobile device manufacturing companies provide the data synchronization solutions, but these solutions are not compatible with other mobile devices/other applied services. In order to solve this problem, OMA(Open Mobile Alliance), mainly composed of mobile telecommunication companies, has suggested using the SyncML(Synchronization Markup Language) data synchronization method. This is an attempt to make a public standard. In this paper, the data synchronization client that synchronizes the PIMS (Personal Information Management System) data in mobile devices like PDA is developed, complying with the SyncML standard requirements.

A Survey of Recommendation Intent for Small Business Tax Accounting Services (소규모 사업체의 세무회계서비스 추천 의향 조사)

  • Lee, Jaein;Kim, Sung-Hee
    • Science of Emotion and Sensibility
    • /
    • v.25 no.2
    • /
    • pp.71-78
    • /
    • 2022
  • This study investigates the recommendation for tax accounting services used in many companies. In particular, it aims to create guidelines for small businesses with fewer than 100 employees, which are relatively difficult to manage in terms of cost or time. We surveyed 100 corporate officials on basic business information, such as the number of employees, job titles, and business type, as well as the type of tax accounting service, the recommended score for the service, the reason for the score, and other opinions related to tax accounting services. In particular, the recommendation score seeks to obtain more effective results by using the Net Promoter Score method, which is known to be more effective in understanding customer opinions than general customer satisfaction surveys. The survey revealed a Net Promoter Score for a recommendation of -33 points, lower than the general Net Promoter Score. It also indicated that tax accounting services need improvement. Specifically, the opinions of the respondents who gave a non-recommendation score were as follows: "Not inconvenient or comfortable," "It was just okay," "I don't know if it would be helpful," and "There is no differentiation and there are no special alternatives." We concluded that an improved service for raising recommendation scores was necessary. This survey focused on recommendations for companies with fewer than 100 employees; future studies should incorporate larger companies and more variables.

Semantic Web based Multi-Dimensional Information Analysis System on the National Defense Weapons (시맨틱 웹 기반 국방무기 다차원 정보 분석 시스템)

  • Choi, Jung-Hwoan;Park, Jeong-Ho;Kim, Pyung;Lee, Seungwoo;Jung, Hanmin;Seo, Dongmin
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.11
    • /
    • pp.502-510
    • /
    • 2012
  • As defense science and technology are developing, smart weapons are being developed continually. The collection and analysis of the future strategic weapon information from all over the world have become a greater priority because information sharing became active. So, a system to manage and analyze heterogeneous defense intelligence is required. Semantic Web is the next generation knowledge information management technology for integrating, searching and navigating heterogeneous knowledge resource. Recently, Semantic Web is wildly being used in intelligent information management system. Semantic Web supports the analysis with the high reliability because it supports the simple keyword search as well as the semantic based information retrieval. In this paper, we propose the semantic web based multi-dimensional information analysis system on the national defense weapons that constructs ontology for various weapons information such as weapon specifications, nations, manufacturers and technologies and searches and analyses the specific weapon based on ontology. The proposed system supports the semantic search and multi-dimensional information analysis based on the relations between weapon specifications. Also, our system improves the efficiency on acquiring smart weapon information because it is developed with ontology based on military experts' knowledge and various web documents related with various weapons and intelligent search service.

A Study on the Information and Communication Policy in the era of Smart media and its Policy PR Direction (스마트미디어시대의 정보통신정책과 정책홍보방안)

  • Park, Sung-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.155-164
    • /
    • 2012
  • Nowadays, Smart media services such as smartphone applications are proliferated through the convergence of social media and the information and communication technologies(ICT). In many countries, the ICT policy is strategically used to solve the economic recession and high unemployment rate caused by the global financial crisis. However, the Korean ICT policies have declined with the abolition of the Ministry of information and communication. This paper suggests the dynamic quality of life as a philosophical foundation of Korean ICT policy and the dynamic policy PR methods for the social consultation and people's approval(national consensus), because the component of dynamic quality of life are embodied in the elements of ICT policy that should be realized through the governance, in which both Korean government and people produce and consume the ICT policies together in the era of smart media.

Application of 4th Industrial Revolution Technology to Records Management (제4차 산업혁명 기술의 기록관리 적용 방안)

  • An, Dae-jin;Yim, Jin-hee
    • The Korean Journal of Archival Studies
    • /
    • no.54
    • /
    • pp.211-248
    • /
    • 2017
  • This study examined ways to improve records management by using the new technology of the Fourth Industrial Revolution. To do this, we selected four technologies that have a huge impact on the production and management of records such as cloud, big data, artificial intelligence, and the Internet of Things. We tested these technologies and summarized their concepts, characteristics, and applications. The characteristics of the changed production records were analyzed by each technology. Because of new technology, the production of records has rapidly increased and the types of records have become diverse. With this, there is also a need for solutions to explain the quality of data and the context of production. To effectively introduce each technology into records management, a roadmap should be designed by classifying which technology should be applied immediately and which should be applied later depending on the maturity of the technology. To cope with changes in the characteristics of production records, a flexible data structure must be produced in a standardized format. Public authorities should also be able to procure Software as a Service (SaaS) products and use digital technology to improve the quality of public services.

The Study on the User Behavioral Effects of Perception and Characteristics on the Common Essential Applications of Smartphones (스마트폰 공통 필수앱에 대한 이용자 인식과 특성이 이용 행동에 미치는 영향)

  • Youn, Bo Heum;Lee, Yoon Jae;Choi, Seong Jhin
    • Journal of Broadcast Engineering
    • /
    • v.27 no.3
    • /
    • pp.415-436
    • /
    • 2022
  • This study was conducted by the customer survey of 15 to 65 years old in order to identify the user behavioral effects of perception and characteristics on the common essential applications of smartphones with the United Theory of Acceptance and Use of Technology (UTAUT) and Value-based Acceptance Model (VAM). As a result, it was found that performance expectancy, enjoyment, facilitating conditions, effort expectancy, and social influences, excluding information privacy concern, have a positive effect on use behavior. The moderating effect by age was found that the youth was higher between perceived value and behavioral intention, and the middle-aged was higher between enjoyment and perceived value. This study has significance in providing implications for establishing strategies on designing and pre-loading apps, and increasing usage rate.

A Study on Operational Model of Subject-Based Online Community for Open Access System - with Special Reference to Community Service Functions and Researcher's Participation Will (주제 기반 온라인 학술 커뮤니티의 구축 방향 - 학술 연구자의 온라인 커뮤니티에 대한 기능요구사항과 참여의지에 대한 분석을 중심으로 -)

  • Kim, Young-Ki;Jeong, Jong-Geun;Lee, Soo-Sang
    • Journal of the Korean Society for information Management
    • /
    • v.24 no.4
    • /
    • pp.5-31
    • /
    • 2007
  • The purpose of this study is to provide successive online community operational model in response to the world wide open access movement which supports the broadest possible access to published research and other scholarly writings. This study is divided into four areas in a large. First, this study reviewed general community, online community and open access movement. Second, wellknown online scholarly community, i.e., KISTI Society, BRIC, DSpace were analyzed precisely focusing on the administrative and functional factors to find key to success. Third, based on the above two studies, major functions of community services were identified. For this work, community service functions and participation will were asked to the researchers registered in Korea Research Foundation. According to the results of the above works, this study presents the important functions of online community services as follows: management function of research results, posting function of issue reports, and provision function of integrated information on research proposal should be provided preferentially to researchers aged 30s and 40s.

An ABR Rate-based Control Scheme Avoiding Access Point Buffer Overflow and Underflow during Handoffs in Wireless ATM Networks (무선 ATM망에서 핸드오프시 접속점 버퍼 오버플로우와 언더플로우를 방지하는 ABR 전송률 기반 제어 방안)

  • Ha, In-Dae;Oh, Jung-Ki;Park, Sang-Joon;Choi, Myung-Whan
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.527-539
    • /
    • 2001
  • The wireless asynchronous transfer mode (ATM) system has the advantage of providing the broadband services with various quality-of-service requirements to the mobile terminal efficiently by utilizing the ATM technology developed for the wired ATM system. The available bit rate (ABR) service among various ATM services utilizes the available bandwidth remaining in the ATM link, which allows the efficient bandwidth usage. During the handoff of the mobile terminal, however, the queue length in the access point (AP) which resides in the boundary of the wired ATM network and the wireless ATM network may increase abruptly. In this paper, we propose a scheme which prevents the buffer-overflow and buffer-underflow in the AP during the handoff of the wireless ABR connection in the wireless ATM system using binary feedback rate-based ABR traffic control. This scheme controls the source's cell generation rate during both handoff period and some time interval after the completion of the handoff procedure. The simulation results show that the proposed scheme prevents the buffer-overflow and buffer-underflow. The proposed scheme can contribute to increasing the throughput of the wireless ABR service during handoff by preventing the buffer overflow and underflow during handoff period.

  • PDF

Adaptive Service Mode Conversion to Minimize Buffer Space Requirement in VOD Server (주문형 비디오 서버의 버퍼 최소화를 위한 가변적 서비스 모드 변환)

  • Won, Yu-Jip
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.5
    • /
    • pp.213-217
    • /
    • 2001
  • Excessive memory buffer requirement in continuous media playback is a serious impediment of wide spread usage of on-line multimedia service. Skewed access frequency of available video files provides an opportunity of re-using the date blocks which has been loaded by one session for later usage. We present novel algorithm which minimizes the buffer requirement in multiple sessions of multimedia playbacks. In continuous media playback originated from the disk, a certain amount of memory buffer is required to synchronize asynchronous disk. Read operation and synchronous playback operation. As aggregate playback bandwodth increases, larger amount of buffer needs to be allocated for this synchronization purpose. The focus of this work is to study the asymptotic behavior of the synchronization buffer requirement and to develop an algorithm coping with this excessive buffer requirement under bandwidth congestioon. We argue that in a large scale continuous media server, it may not be necessary to read the blocks for each session directly from the disk. The beauty of our work lies in the fact that it dynamically adapts to disk utilization of the server and finds the optimal way of servicinh the individual sessions while minimizing the overall buffer space requirement. Optimality of the proposed algorithm is shown by proof. The effectiveness and performance of the proposed scheme is examined via simulation.

  • PDF

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.