• Title/Summary/Keyword: 스마트 워크

Search Result 1,498, Processing Time 0.027 seconds

A framework of management for preventing illegal distribution of pdf bookscan file (PDF 형식 북스캔 파일 불법 유통 방지를 위한 관리 프레임워크)

  • Lee, Kuk-Heon;Chung, Hyun-Ji;Ryu, Dae-Gull;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.897-907
    • /
    • 2013
  • Since various smart devices are being developed, a growing number of people are reading eBooks instead of paper books. However, people started making eBooks on their own by scanning paper books because there are not enough eBooks provided from market. The term "Bookscan" was made with this reason. The number of bookscan company is increasing because the equipment is too expensive. However, the commercial activity of bookscan company is against copyright law. Also bookscan files are in danger of being illegally distributed on web, because bookscan companies are not protecting copyright. Publication market follows the same procedure with sound market which was collapsed due to copyright problem. Therefore, the technical methods should be prepared for law system against bookscan. The previous ICOP(Illegal Copyrights Obstruction Program) system has been applied to sound and movie files, but not applied to publication. This paper suggests the framework for bookscan file management based on practical mechanism.

The Development of Real-time Feedback Vibration Control System Using Wireless Sensor Networks (무선 센서 네트워크를 이용한 실시간 Feedback 진동제어 시스템 개발)

  • Heo, Gwang Hee;Kim, Chung Gil;Ahn, Ui Jong
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.16 no.3
    • /
    • pp.60-66
    • /
    • 2012
  • This paper aims to constitute a feedback vibration control system using wireless sensor networks and experiment it on a model structure to verify its effectiveness. For the purpose, we set up a feedback vibration control system composed of a wireless input/output(I/O) sensor node based on bluetooth, a home-made shear type MR damper, a shaker which generates a constant size of sine wave, and a simple beam model structure. The vibration control experiment was performed by shaking the 1/4 point of beam with a shaker. At the moment of shaking, we controled the vibration with MR damper which was placed vertically on the center of beam. Simultaneously, by acquiring acceleration response at the 2/4 point of beam, we evaluated the effectiveness of control capability. The control command was set to send a voltage signal to MR damper when the acceleration response, acquired from the wireless I/O sensor node placed at the center of beam, was more than a certain amount. Although the realtime feedback vibration control system constituted in this paper is effective only within a limited command system, it has been proven that the system was able to effectively decrease the vibration of structure by generating a control command aimed for realtime purpose. The system also showed a possibility to be used as a structural response control system adapting a variety of semi-active control algorithm.

A Time Slot Assignment Scheme for Sensor Data Compression (센서 데이터의 압축을 위한 시간 슬롯 할당 기법)

  • Yeo, Myung-Ho;Kim, Hak-Sin;Park, Hyoung-Soon;Yoo, Jae-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.846-850
    • /
    • 2009
  • Recently, wireless sensor networks have found their way into a wide variety of applications and systems with vastly varying requirements and characteristics such as environmental monitoring, smart spaces, medical applications, and precision agriculture. The sensor nodes are battery powered. Therefore, the energy is the most precious resource of a wireless sensor network since periodically replacing the battery of the nodes in large scale deployments is infeasible. Energy efficient mechanisms for gathering sensor readings are indispensable to prolong the lifetime of a sensor network as long as possible. There are two energy-efficient approaches to prolong the network lifetime in sensor networks. One is the compression scheme to reduce the size of sensor readings. When the communication conflict is occurred between two sensor nodes, the sender must try to retransmit its reading. The other is the MAC protocol to prevent the communication conflict. In this paper, we propose a novel approaches to reduce the size of the sensor readings in the MAC layer. The proposed scheme compresses sensor readings by allocating the time slots of the TDMA schedule to them dynamically. We also present a mathematical model to predict latency from collecting the sensor readings as the compression ratio is changed. In the simulation result, our proposed scheme reduces the communication cost by about 52% over the existing scheme.

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.

A Prioritization Method Considering Trip Patterns to Introduce Short-turn Buses (단거리 순환버스 도입을 위한 통행패턴 기반의 우선순위 결정방법)

  • Moon, Sedong;Kim, Dong-Kyu;Cho, Shin-Hyung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.5
    • /
    • pp.1-18
    • /
    • 2019
  • A short-turn bus is a bus that is operated within a subsection of an existing bus line. Previous studies regarding short-turn buses decided optimal turn-back points for a single bus line rather than a bus network. Also, in-vehicle crowding which has a significant impact on transit convenience was rarely considered. Therefore, this study aimed to develop a methodology to set priorities for the introduction of short-turn buses of bus lines and sections, considering crowding. To achieve this objective, we calculated occupancies and crowding alleviation benefits of existing bus lines overlapping a new short-turn route based on transit card data, before and after the introduction of short-turn strategy. Also, operator and social costs caused by the introduction of short-turn buses were calculated. Those procedures were iterated over bus lines and sections to operate a short-turn service, and a section whose benefit-to-cost ratio (B/C) is the largest in a line was selected to operate a short-turn service in the line. After, priorities of bus lines to introduce short-turn services could be determined based on B/C values, and the optimum total fleet size could be determined when a short-turn strategy is applied in multiple lines.

High Quality Video Streaming System in Ultra-Low Latency over 5G-MEC (5G-MEC 기반 초저지연 고화질 영상 전송 시스템)

  • Kim, Jeongseok;Lee, Jaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.2
    • /
    • pp.29-38
    • /
    • 2021
  • The Internet including mobile networks is developing to overcoming the limitation of physical distance and providing or acquiring information from remote locations. However, the systems that use video as primary information require higher bandwidth for recognizing the situation in remote places more accurately through high-quality video as well as lower latency for faster interaction between devices and users. The emergence of the 5th generation mobile network provides features such as high bandwidth and precise location recognition that were not experienced in previous-generation technologies. In addition, the Mobile Edge Computing that minimizes network latency in the mobile network requires a change in the traditional system architecture that was composed of the existing smart device and high availability server system. However, even with 5G and MEC, since there is a limit to overcome the mobile network state fluctuations only by enhancing the network infrastructure, this study proposes a high-definition video streaming system in ultra-low latency based on the SRT protocol that provides Forward Error Correction and Fast Retransmission. The proposed system shows how to deploy software components that are developed in consideration of the nature of 5G and MEC to achieve sub-1 second latency for 4K real-time video streaming. In the last of this paper, we analyze the most significant factor in the entire video transmission process to achieve the lowest possible latency.

Approaches to Digital Health Passport for Healthy Travel in the the Era of COVID-19 (COVID-19시대에 건강한 여행을 위한 Digital Health Passport에 대한 접근법)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.81-92
    • /
    • 2021
  • The purpose of this study is to present an approach to the "Digital Health Passport" (DHP), which will be the most important in the change of the travel industry among the sudden environmental changes brought about by COVID-19. To this end, this study reviewed a variety of empirical literature on DHP, and proposed a framework for DHP based on literature review. The framework is composed of travel intention, health information provision intention, and new technology acceptance/adoption of tourists. First, in terms of travel intention, providing information to DHP should not undermine the travel intention of the travelers. It should be possible to facilitate the travelers' enjoyment by using the information provided by the traveler. In addition, there is a need to assure that the data provided by travelers is managed in a reliable way. Second, it is necessary to understand why the travelers want to provide additional personal information (information disclosure), rather than seeing healthcare information only in terms of mandatory information provision. Finally, from the perspective of new technology, it is necessary to understand the intention of travelers to use/adopt DHP. The key implication of this work is that it proposed a DHP framework for realizing the travel bubble to predict and respond to foreign travelers' behaviors.

Sensitivity Analysis of Drought Impact Factors Using a Structural Equation Model and Bayesian Networks (구조방정식모형과 베이지안 네트워크를 활용한 가뭄 영향인자의 민감도 분석)

  • Kim, Ji Eun;Kim, Minji;Yoo, Jiyoung;Jung, Sungwon;Kim, Tae-Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.1
    • /
    • pp.11-21
    • /
    • 2022
  • Drought occurs extensively over a long period and causes great socio-economic damage. Since drought risk consists of social, environmental, physical, and economic factors along with meteorological and hydrological factors, it is important to quantitatively identify their impacts on drought risk. This study investigated the relationship among drought hazard, vulnerability, response capacity, and risk in Chungcheongbuk-do using a structural equation model and evaluated their impacts on drought risk using Bayesian networks. We also performed sensitivity analysis to investigate how the factors change drought risk. Overall results showed that Chungju-si had the highest risk of drought. The risk was calculated as the largest even when the hazard and response capacity were changed. However, when the vulnerability was changed, Eumseong-gun had the greatest risk. The sensitivity analysis showed that Jeungpyeong-gun had the highest sensitivity, and Jecheon-si, Eumseong-gun, and Okcheon-gun had highest individual sensitivities with hazard, vulnerability, and response capacity, respectively. This study concluded that it is possible to identify impact factors on drought risk using regional characteristics, and to prepare appropriate drought countermeasures considering regional drought risk.

Revitalize the Tourism Experience Program of Hyanggyo and Seowon - Focusing on World Heritage sites in Korea - (향교·서원의 관광체험 프로그램 활성화 방안 - 국내 세계유산을 중심으로 -)

  • Bang, Mee Young
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.249-255
    • /
    • 2023
  • World Heritage is a very important heritage that is worth protecting and handing down to future generations. In Korea, which has a long history and culture of 5,000 years, Seowon is a great advantage in that it can develop tangible and intangible Neo-Confucian ideas shared in China and East Asia, and preserve and experience them as a unique cultural resource of Korea until the present day. In order to encourage the direct experience of this long-standing cultural heritage, the government supports the national treasury and seeks to expand the demand for tourism. Accordingly, in this study, an analysis was conducted on program satisfaction, participation, and activation plans. As a result, it was found that value to see and value to experience must coexist in order for our world heritage, which requires comprehensive and continuous management and operation, and lacks accessibility, to become a tourist attraction. Also, for this purpose, promotion and development of differentiated tourism experience contents should be carried out first.

A Study on the Digital Holographic Image Acquisition Method using Chroma Key Composition (크로마키 합성을 이용한 디지털 홀로그래피 이미지 획득 방법 연구)

  • Kim, Ho-sik;Kwon, Soon-chul;Lee, Seung-hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.313-321
    • /
    • 2022
  • As 5G is getting developed, people are getting interested in immersive content. Some predicts that immersive content may be implemented in real life such as holograms, which were only possible in movies. Holograms, which has been studied for a long time since Dennis Gabor published the basic theory in 1948, are constantly developing in a new direction with digital technology. It is developing from a traditional optical hologram, which is produced by recording the interference pattern of light to a computer generated hologram (CGH) and a digital hologram printer. In order to produce a hologram using a digital hologram printer, holographic element (Hogel) image must first be created using multi-view images. There are a method of directly photographing an actual image and a method of modeling an object using 3D graphic production tool and rendering the motion of a virtual camera to acquire a series of multi-view images. In this paper, we propose a new method of getting image, which is one of the visual effect, VFX, producing multi-view images using chroma key composition. We shoot on the green screen of actual object, suggest the overall workflow of composition with 3D computer graphic(CG) and explain the role of each step. We expected that it will be helpful in researching a new method of image acquisition in the future if all or part of the proposed workflow to be applied.