• Title/Summary/Keyword: 네트워크적 영역성

Search Result 628, Processing Time 0.03 seconds

A study on ecosystem model of the magazines for smart devices Focusing on the case of magazine business in foreign countries (스마트 디바이스 잡지 생태계 모델 연구 - 외국 잡지의 비즈니스 사례를 중심으로)

  • Chang, Yong Ho;Kong, Byoung-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.2641-2654
    • /
    • 2014
  • In the smart media environment, magazine industry has been experiencing a transition to ecosystem of value network, which includes high complexity and ambiguity. Using case study method, this article conducts research on digital convergence, the model of magazine ecosystem and adaptation strategy of global magazine companies. Research findings have it that the way of contents production of global magazines has been based on collaborative production system within communities, expert communities, creative users, media contents companies and magazine platform. The system shows different patterns and characteristics depending on magazine-driven platform, Platform-driven platform or user-driven platform. Collaboration system has been confirmed in various cases: Huffington Post and Zinio which collaborate with media contents companies, Amazon magazines and Bookish with magazine companies, Huffington Post and Wired with expert communities, and Flipboard with creative users and communities. Foreign magazine contents diverge into (paper, electronic, app and web magazine) as they start the lively trades of their contents on the magazine platform. In the area of contents uses, readers employ smart media technology effectively such as cloud computing, artificial intelligence and module individualization, making it possible for the virtuous cycle to remain in the relationship within communities, expert communities and creative users.

A study on the design of an efficient hardware and software mixed-mode image processing system for detecting patient movement (환자움직임 감지를 위한 효율적인 하드웨어 및 소프트웨어 혼성 모드 영상처리시스템설계에 관한 연구)

  • Seungmin Jung;Euisung Jung;Myeonghwan Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.29-37
    • /
    • 2024
  • In this paper, we propose an efficient image processing system to detect and track the movement of specific objects such as patients. The proposed system extracts the outline area of an object from a binarized difference image by applying a thinning algorithm that enables more precise detection compared to previous algorithms and is advantageous for mixed-mode design. The binarization and thinning steps, which require a lot of computation, are designed based on RTL (Register Transfer Level) and replaced with optimized hardware blocks through logic circuit synthesis. The designed binarization and thinning block was synthesized into a logic circuit using the standard 180n CMOS library and its operation was verified through simulation. To compare software-based performance, performance analysis of binary and thinning operations was also performed by applying sample images with 640 × 360 resolution in a 32-bit FPGA embedded system environment. As a result of verification, it was confirmed that the mixed-mode design can improve the processing speed by 93.8% in the binary and thinning stages compared to the previous software-only processing speed. The proposed mixed-mode system for object recognition is expected to be able to efficiently monitor patient movements even in an edge computing environment where artificial intelligence networks are not applied.

A Development of Curriculum for Information Security Professional Manpower Training (정보보안 전문인력 양성을 위한 교육과정 개발)

  • Lee, Moongoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.46-52
    • /
    • 2017
  • Social attention to information security field is inspired, and manpower demand forecast of this area is getting high. This study surveyed information security knowledge of practitioners who work in a field of information security such as computer and network system. We analyzed a connection between survey data, information protection job system that was suggested by NICE, IT skills that NCS and KISA classified and security field classification system. Base on data that analyzed, this study suggests a curriculum that trains professional manpower who perform duties in the field of information security. Suggested curriculum can be applied to 2 year college, 3 year college and 4 year college. Suggested curriculum provides courses that students who want to work in a field of information security must learn during the college. Suggested courses are closely connected to a related field and detailed guideline is indicated to each course to educate. Suggested curriculum is required, and it combines a theoretical education that become basis and a practical education so that it is not weighted to learn theory and is not only focusing on learning simple commands. This curriculum is established to educate students countermeasures of hacking and security defend that based on scenario that connected to executive ability. This curriculum helps to achieve certificates related to a field more than paper qualification. Also, we expect this curriculum helps to train convergent information security manpower for next generation.

Color Path : A Location Based Drawing and Storytelling Project (위치기반의 드로잉과 스토리텔링 연구)

  • Woo, Suk-Young;Park, Seung-Ho
    • Archives of design research
    • /
    • v.20 no.1 s.69
    • /
    • pp.65-78
    • /
    • 2007
  • The mobile phone and wireless network, location based technology and other newly introduced technologies and communication media gave birth to the new terminology "ubiquitous" and are changing our daily life. Influence of such technologies and communication media is not an exception in the arts. New media art pieces using these technologies are increasing, and taking on the characteristics of public art within a wider scope of a city as a backdrop, beyond the traditional boundaries of art galleries. Of such art, locative media art using locative media has a closer relationship with city space than any other form of an, and makes various attempts to allow the spectator to reinterpret and experience city space and induce communication. These characteristics of locative media art can be considered as a method that can solve quality problems of the city space, especially the loss of the sense of place and the absence of communication. is one such locative media project with a purpose of solving quality problems of city space, especially the recovery of commercial sites and inducing communication. This project uses the paths of the city as its canvas, movement of people as its brush, the color of the roads as its pallet, and by allowing the partakers to draw paths of their own and to share their paths with others. People are encouraged to share stories about their paths. The project proceeds using barcodes that are frequently used commercially. When users wish to create their own place, they can enter their place and colors of their choice using input devices installed in the city space. Paths that are created through such a process will be displayed in public areas throughout the city, shared with others, and can create and share a stories about the city using on/off-line media.

  • PDF

Development of Battery-free SAW Integrated Microsensor for Real Time Simultaneous Measurement of Humidity and $CO_2$ component (습도와 $CO_2$ 농도의 실시간 동시감지를 위한 무전원 SAW 기반 집적 센서 개발)

  • Lim, Chun-Bae;Lee, Kee-Keun;Wang, Wen;Yang, Sang-Sik
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.16 no.1
    • /
    • pp.13-19
    • /
    • 2009
  • A 440MHz wireless and passive surface acoustic wave (SAW) based chemical sensor was developed on a $41^{\circ}YX\;LiNbO_3$ piezoelectric substrate for simultaneous measurement of $CO_2$ gas and relative humidity (RH) using a reflective delay line pattern as the sensor element. The reflective delay line is composed of an interdigital transducer (IDT) and several shorted grating reflectors. A Teflon AF 2400 and a hydrophilic $SiO_2$ layer were used as $CO_2$ and water vapor sensitive films. The coupling of mode (COM) modeling was conducted to determine optimal device parameters prior to fabrication. According to simulation results, the device was fabricated and then wirelessly measured using the network analyzer. The measured reflective coefficient $S_{11}$ in the time domain showed high signal/noise (S/N) ratio, small signal attenuation, and few spurious peaks. In the $CO_2$ and humidity testing, high sensitivity ($2^{\circ}/ppm$ for $CO_2$ detection and $7.45^{\circ}/%$RH for humidity sensing), good linearity and repeatability were observed in the $CO_2$ concentration ranges of $75{\sim}375ppm$ and humidity levels of $20{\sim}80%$RH. Temperature and humidity compensations were also investigated during the sensitivity evaluation process.

  • PDF

Cis-acting Replication Element Variation of the Foot-and-mouth Disease Virus is Associated with the Determination of Host Susceptibility (구제역바이러스의 숙주 특이성 결정에 연관되어있는 구제역바이러스 cis-acting replication element 변이 분석 연구)

  • Kang, Hyo Rin;Seong, Mi So;Ku, Bok Kyung;Cheong, JaeHun
    • Journal of Life Science
    • /
    • v.30 no.11
    • /
    • pp.947-955
    • /
    • 2020
  • The foot-and-mouth disease virus (FMDV), a member of the Aphthovirus genus in the Picornaviridae family, affects wild and domesticated ruminants and pigs. During replication of the FMDV RNA (ribonucleic acid) genome, FMDV-encoding RNA polymerase 3D acts in a highly location-specific manner. This suggests that specific RNA structures recognized by 3D polymerase within non-coding regions of the FMDV genome assist with binding during replication. One such region is the cis-acting replication element (CRE), which functions as a template for RNA replication. The FMDV CRE adopts a stem-loop conformation with an extended duplex stem, supporting a novel 15-17 nucleotide loop that derives stability from base-stacking interactions, with the exact RNA nucleotide sequence of the CRE producing different RNA secondary structures. Here, we show that CRE sequences of FMDVs isolated in Korea from 2010 to 2017 exhibit A and O genotypes. Interestingly, variations in the RNA secondary structure of the Korean FMDVs are consistent with the phylogenetic relationships between these viruses and reveal the specificity of FMDV infections for particular host species. Therefore, we conclude that each genetic clade of Korean FMDV is characterized by a unique functional CRE and that the evolutionary success of new genetic lineages may be associated with the invention of a novel CRE motif. Therefore, we propose that the specific RNA structure of a CRE is an additional criterion for FMDV classification dependent on the host species. These findings will help correctly analyze CRE sequences and indicate the specificity of host species for future FMDV epidemics.

A Study on the Strategy of IoT Industry Development in the 4th Industrial Revolution: Focusing on the direction of business model innovation (4차 산업혁명 시대의 사물인터넷 산업 발전전략에 관한 연구: 기업측면의 비즈니스 모델혁신 방향을 중심으로)

  • Joeng, Min Eui;Yu, Song-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.57-75
    • /
    • 2019
  • In this paper, we conducted a study focusing on the innovation direction of the documentary model on the Internet of Things industry, which is the most actively industrialized among the core technologies of the 4th Industrial Revolution. Policy, economic, social, and technical issues were derived using PEST analysis for global trend analysis. It also presented future prospects for the Internet of Things industry of ICT-related global research institutes such as Gartner and International Data Corporation. Global research institutes predicted that competition in network technologies will be an issue for industrial Internet (IIoST) and IoT (Internet of Things) based on infrastructure and platforms. As a result of the PEST analysis, developed countries are pushing policies to respond to the fourth industrial revolution through cooperation of private (business/ research institutes) led by the government. It was also in the process of expanding related R&D budgets and establishing related policies in South Korea. On the economic side, the growth tax of the related industries (based on the aggregate value of the market) and the performance of the entity were reviewed. The growth of industries related to the fourth industrial revolution in advanced countries overseas was found to be faster than other industries, while in Korea, the growth of the "technical hardware and equipment" and "communication service" sectors was relatively low among industries related to the fourth industrial revolution. On the social side, it is expected to cause enormous ripple effects across society, largely due to changes in technology and industrial structure, changes in employment structure, changes in job volume, etc. On the technical side, changes were taking place in each industry, representing the health and medical sectors and manufacturing sectors, which were rapidly changing as they merged with the technology of the Fourth Industrial Revolution. In this paper, various management methodologies for innovation of existing business model were reviewed to cope with rapidly changing industrial environment due to the fourth industrial revolution. In addition, four criteria were established to select a management model to cope with the new business environment: 'Applicability', 'Agility', 'Diversity' and 'Connectivity'. The expert survey results in an AHP analysis showing that Business Model Canvas is best suited for business model innovation methodology. The results showed very high importance, 42.5 percent in terms of "Applicability", 48.1 percent in terms of "Agility", 47.6 percent in terms of "diversity" and 42.9 percent in terms of "connectivity." Thus, it was selected as a model that could be diversely applied according to the industrial ecology and paradigm shift. Business Model Canvas is a relatively recent management strategy that identifies the value of a business model through a nine-block approach as a methodology for business model innovation. It identifies the value of a business model through nine block approaches and covers the four key areas of business: customer, order, infrastructure, and business feasibility analysis. In the paper, the expansion and application direction of the nine blocks were presented from the perspective of the IoT company (ICT). In conclusion, the discussion of which Business Model Canvas models will be applied in the ICT convergence industry is described. Based on the nine blocks, if appropriate applications are carried out to suit the characteristics of the target company, various applications are possible, such as integration and removal of five blocks, seven blocks and so on, and segmentation of blocks that fit the characteristics. Future research needs to develop customized business innovation methodologies for Internet of Things companies, or those that are performing Internet-based services. In addition, in this study, the Business Model Canvas model was derived from expert opinion as a useful tool for innovation. For the expansion and demonstration of the research, a study on the usability of presenting detailed implementation strategies, such as various model application cases and application models for actual companies, is needed.

"Improving women's and children's health in DPRK" project funded by the Republic of Korea (현재 진행되고 있는 남북한 의료협력사업 : 영유아 지원 사업을 중심으로)

  • Shin, Young-Jeon
    • Clinical and Experimental Pediatrics
    • /
    • v.51 no.7
    • /
    • pp.671-689
    • /
    • 2008
  • The economic recession of North Korea has been prolonged, the need for humanitarian assistance for the women and children of DPRK has been raised. In March 2006, South Korean government signed MOU with World Health Organization (WHO) to financially support "Improving Women's and Children's Health in DPRK (IWCH)" project. The assistance projects through UNICEF and the non-government organizations of South Korea were also followed. IWCH project consists of three parts; nutrition, disease management, children and maternity care. The first term (2006-2007) of the project leading by WHO was finished, and the second term (2008-2010) is just begun. The projects driven by NGOs have relatively been delayed due to difficulties in negotiating on project contents and places with North Korea. Recently, however, re-modeling processes of an obstetric/gynecology hospital and a children hospital in Nampo were started. Up to recently, South Korean government has played only a limited role in the humanitarian assistance for North Korea. IWCH project is, however, a full-scale initiative driven by government based on a systematic review of need and priorities. A significant amount of budget and relatively long term (five year) project compare to the previous short term and small size programs were expected to make more meaningful achievement. Despite these positive aspects, the project remains a list of unsolved problems a lack of mutual trust, a different decision making process between South and North Korea, a lack of conflict management process, and unpredictability and complexity of international politics. In spite of such kind of political uncertainty, the health care sector will be a leading area in the process of improving relationship between South and North Korea, particularly, humanitarian assistance for women and children will play a crucial role in the process. The successful implementation of IWCH project, therefore, will contribute to provide the reference model in developing the mutually constructive relationship between South and North

Longest First Binary Search on Prefix Length for IP Address Lookup (최장 길이 우선 검색에 기초한 프리픽스 길이에 따른 이진 IP 검색 구조)

  • Chu Ha-Neul;Lim Hye-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8B
    • /
    • pp.691-700
    • /
    • 2006
  • Based on the destination IP address of incoming packets, the Internet routers determine next hops and forward packets toward final destinations through If address lookup. The bandwidth of communication links increases exponentially fast as well as the routing table size grows significant as the number of single host networks attached to the Internet increases. Since packets should be processed at wire-speed, the increased link speed reduces the processing time of a packet in routers, and hence more efficient and fast IP address lookup algorithms and architectures are required in the next generation routers. Most of the previous IP lookup schemes compare routing prefixes of shorter length first with a given input IP address. Since IP address lookup needs to find the most specific route of the given input, search continues until the longest matched prefix is found while it keeps remembering the current test matching prefix. In this paper, based on binary search on prefix length, we proposed a new IP address lookup algorithm which compares longer prefixes first. The proposed scheme is consisted of multiple tries with prefixes on leaves only. The trie composed of the longest prefixes is primarily searched whether there is a match with the given input. This processing is repeated for the trio of the next longer prefixes until there finds a match. Hence the proposed algorithm provides the fast search speed. The proposed algorithm also provides the incremental update of prefixes while the previous binary search on length scheme does not provide the incremental update because of pre-processing requirement. In this paper, we performed extensive simulations and showed the performance comparisons with related works.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.