• Title/Summary/Keyword: 디지털전환 과정

Search Result 156, Processing Time 0.034 seconds

Library Material Acquisition Process Modeling Applying UML (UML을 이용한 도서관 자료 구입 모델링)

  • 김성혁;김현주;김경옥
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.4
    • /
    • pp.83-101
    • /
    • 2001
  • This study is redesigned library acquisition process to migrate library offline process to online applying the concepts of BPR(Business Process Reengineering), Business Process and Workflows in electronic commerce, and UML that is a one of visual modeling methods was applied to new model form software development. The new model can be processed library’s acquisition process efficiently and rapidly. And library and information center would migrate their back office work from offline to online using this model, so that new roles for librarian in the digital age will be created. The directions of digital library research should be accepted various application technologies like electronic commerce to get synergy effect in the near future.

  • PDF

Optical Visual Cryptography based on Binary Phase Exctraction JTC (BPEJTC를 이용한 광 비쥬얼 크립토그래피)

  • 이상이;이승현
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.8
    • /
    • pp.589-597
    • /
    • 2003
  • Visual cryptography made it possible to decrypt thresholding scheme with not digital system but human vision system. This method, however, has some limit in it. Optical visual cryptography was proposed which used laser instead of human eyesight. As a result, it was possible to adapt cryptography to optical system. However, it also had some difficulties because it did not overcome the existing problem of visual cryptography completely. These problems occurred in the process of transferring data processing system from visual to optics. Therefore, it is appropriate to approach these problems in terms of optics. This paper analyzes the level of noise and the security characteristics for optical visual cryptography in terms of frequency based on joint transform correlator.

Image Conversion in Digital Design (디지털디자인에서 이미지의 變換)

  • Kim, Hun
    • Archives of design research
    • /
    • v.15 no.1
    • /
    • pp.309-318
    • /
    • 2002
  • An expression of image in visual communication design traditionally has a dose relationship with the mechanical part of several expression media. Especially, an image conversion becomes easter by converging various forms of image such as a pictorial expression, a drawing up a plan, an optical expression and a reflected image into digital data in the image expression using digital mode. In addition, synthesis between various forms of visual ,images is activated by the integration of all expression media into digital mode and thus the extent of the image expression becomes diversified. Moreover, there is a tendency that a various dimensional expression such as 3D and 4D is generalized in the image expression of digital design. A partial or whole image conversion has often occurred during the generalization process of several image forms. Such conversion summarized into two factors, a formative side and a technical side. We described the existing pictorial expression as a formative side, an optical expression as a photography, a materialization of image conversion theory of computer graphic image conversion according to data form as a technical side and specific content according to dimension. We summarized objective and demonstrative resets through a simple simulation using a computer for the contents required a technical and qualitative measure and presented an application program of the particular results from the study to the visual communication design work by a case.

  • PDF

A Study on the Efficient e-Commerce Policies under the Smart Phone Environment (스마트융합환경에서의 전자상거래 정책)

  • Kim, Sun-Bae;Kim, Kyoung-Mook
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.125-133
    • /
    • 2012
  • The volume of electronic banking service via smart phone is expected to increase dramatically under smart convergence environment. Under such circumstances, the effort to establish the mobile electronic banking culture which took a major step forward from the conventional electronic commerce method is essential. It is necessary to standardize the mobile payment infrastructure in order to resolve the initiative conflicts between financial institutions and newly launched non-financial institutions. Furthermore, a domestic and international strategy is required as the number of NFC technology based smart phone transaction business is increased. As various types of business enter the electronic commerce field, efforts to resolve the dissatisfaction of the customers are critical. Additionally, security is one of the significant issue due to the conversation process to open-type operating system. This study surveyed and analyzed the current domestic and foreign status, the problems in Korea, and suggested an effective counterplan and policy, which could be helpful in governments' preparation for electronic commerce policy.

The Development of Self- Esteem Improvement Program for Elementary School students by Self-Acceptance (자기수용을 통한 초등학생의 자아존중감 증진 프로그램 개발)

  • Lee, Sang-Hyeon;An, Kwan-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.471-484
    • /
    • 2017
  • The objective of this study is to develop self-esteem program for elementary school students by accepting themselves. Elementary school students' self-esteem is closely related with accepting themselves as they are. For this reason, the contents of this study were consisted of stability, self-understanding, self-acceptance, self-respect, personal relationships. Three experts accomplished program structure and contents design performed by two tests on validity. The need-survey for this was based on the participants who were 93 elementary school students and 32 elementary school teachers. Also, this program was designed in 3 steps of observation, conversion and relation-orientation. The contents of these steps are related with this program's propriety. This program has a little weakness in behavioristic sides because it concentrated on cognitive and affective aspect for the self-esteem development of elementary school students.

Subjectivity of Hope among Korean Middle-Aged Adults (한국 중년성인의 희망에 관한 주관성)

  • Kim, Keum Sook
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.629-638
    • /
    • 2013
  • The Purpose of this study was to discover type of hope among korean middle-aged adult and to identify the major threads that structure various patterns of hope experienced by them. It is necessary to understand that experiencing hope of middle-aged adult experiencing numerous problems and loss at the transition of life. Q-methodology involves five steps in its approach. Collected Q-statements are 112 from 200 adults through 4 open-ended questions. Among them, 34 statements were decided as a Q-sample, The Q-sorting was carried out in 21 middle-aged adults. Three types of subjective experiences of hope emerged as : (1) Passive Wish Type, (2) Positive Pragmatic Hope Type, (3) Active Internal Value-Oriented Hope Type.

A Study on Improving Precision Rate in Security Events Using Cyber Attack Dictionary and TF-IDF (공격키워드 사전 및 TF-IDF를 적용한 침입탐지 정탐률 향상 연구)

  • Jongkwan Kim;Myongsoo Kim
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.9-19
    • /
    • 2022
  • As the expansion of digital transformation, we are more exposed to the threat of cyber attacks, and many institution or company is operating a signature-based intrusion prevention system at the forefront of the network to prevent the inflow of attacks. However, in order to provide appropriate services to the related ICT system, strict blocking rules cannot be applied, causing many false events and lowering operational efficiency. Therefore, many research projects using artificial intelligence are being performed to improve attack detection accuracy. Most researches were performed using a specific research data set which cannot be seen in real network, so it was impossible to use in the actual system. In this paper, we propose a technique for classifying major attack keywords in the security event log collected from the actual system, assigning a weight to each key keyword, and then performing a similarity check using TF-IDF to determine whether an actual attack has occurred.

Metaverse business research for revitalizing the music ecosystem in the web 3.0 era: Focusing on strategies for building music platform (웹 3.0 시대 음악 생태계 활성을 위한 메타버스 비즈니스연구: 음악 플랫폼의 발전 양상 및 구축 전략을 중심으로)

  • Jiwon Kim;Yuseon Won
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.787-800
    • /
    • 2023
  • This paper is a study aimed at facilitating a comprehensive understanding of the music metaverse platform that will emerge in the era of Web 3.0 and exploring productive strategies for its construction. We examine the significance of the metaverse music platform from various perspectives and investigate the developmental process of digital music platforms from Web 1.0 to 3.0. Subsequently, assuming the emergence of metaverse platforms as a transition to Web 3.0, we align this transition with technological(VR technology, wearable devices, generative AI), cultural(digital avatars, fandom), and economic(NFT) discussions related to Web 3.0. These discussions are integrated with the developmental strategies of the metaverse music platform. Through this study, we hope to enhance the understanding of the metaverse music platform and provide insights into potential construction strategies.

A Study on the Overcoming of the Legal Limits and the Status-Consolidating of the Online Services of the German Public Broadcasting System as the Third Media (독일 공영방송 온라인 서비스의 법적 한계 탈피와 제3의 미디어로서 위상 확립과정에 관한 연구)

  • Ko, Su-Cha
    • Korean journal of communication and information
    • /
    • v.47
    • /
    • pp.74-95
    • /
    • 2009
  • With the digital technical development, the German public broadcasting system has enlarged their online services with the rapid growth of internet population and digital channels. In the debate on online services of public broadcasting systems the major issue is that broadcasting fees finance their broadcast, though they are intended to support mass communication only. Therefore the German private broadcasting claimed to the European Union, that broadcasting fee of the German public had to be regarded as state aid concerning fair competition. Due to the autonomy of the German public broadcasting systems, guaranteed by the German Constitutional Law, a public value test was proposed to the EU and was accepted domestically. The cut in rise of broadcasting fees was stated unconstitutional by the German Constitional Court in 2007, when online services were consolidated as the third media amongst TV and radio with regard to basic provision. This with the public value tests of the public and the accept of the EU's Audio Visual Media Services Directive was constituted in the 12th amendment of the State Contract of Broadcasting. This three-dimensional legislative process could be instructive for the korean process, because Korea too is on the verge of constituting a regulatory system of convergence media.

  • PDF

Career map and course map recommendation system for employment (취업준비를 위한 career map and course map 추천 시스템)

  • Kwon, Wonhyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.276-279
    • /
    • 2022
  • The 4th industrial revolution refers to the transition to a knowledge society in which the production speed of knowledge is fast and the proportion of the knowledge industry is greatly increased. The reorganization of the industrial structure and the change of occupations and jobs due to new technologies are bringing about changes in education, and the development of digital technology has made education that is borderless, individual and dynamic, becoming the new standard of education. With these changes, interest in nano-degrees on new technologies or micro-degrees focused on core courses rather than regular course degrees is increasing. As a representative example, Udacity in the United States has opened and operated online nanodegree courses related to jobs, and collaborates with major companies to develop and educate core training courses necessary for companies, thereby efficiently supporting companies in securing talent. With the revitalization of online vocational and job training, an environment has been prepared in which individuals can set goals for vocational competency development and continue their portfolio-based sustainable learning. However, for effective vocational education, automated and personalized educational content design should be preceded. To this end, in this paper, we propose a personalized career and course map recommendation system in the era of online learning

  • PDF