• Title/Summary/Keyword: 시스템 식별기술

Search Result 919, Processing Time 0.025 seconds

Discovery of Market Convergence Opportunity Combining Text Mining and Social Network Analysis: Evidence from Large-Scale Product Databases (B2B 전자상거래 정보를 활용한 시장 융합 기회 발굴 방법론)

  • Kim, Ji-Eun;Hyun, Yoonjin;Choi, Yun-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.87-107
    • /
    • 2016
  • Understanding market convergence has became essential for small and mid-size enterprises. Identifying convergence items among heterogeneous markets could lead to product innovation and successful market introduction. Previous researches have two limitations. First, traditional researches focusing on patent databases are suitable for detecting technology convergence, however, they have failed to recognize market demands. Second, most researches concentrate on identifying the relationship between existing products or technology. This study presents a platform to identify the opportunity of market convergence by using product databases from a global B2B marketplace. We also attempt to identify convergence opportunity in different industries by applying Structural Hole theory. This paper shows the mechanisms for market convergence: attributes extraction of products and services using text mining and association analysis among attributes, and network analysis based on structural hole. In order to discover market demand, we analyzed 240,002 e-catalog from January 2013 to July 2016.

A Study on Awareness and Experience of Data Publishing by Scientists (과학기술분야 연구자들의 데이터 출판경험 및 인식 연구)

  • Hyekyong Hwang;Youngim Jung;Sung-Nam Cho;Tae-Sul Seo;Jihyun Kim
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.1
    • /
    • pp.45-68
    • /
    • 2023
  • This study aims to investigate the awareness and experiences of domestic researchers regarding data publishing, which has been recognized as a new channel of data sharing as scholarly communication evolves in the open science environment. A survey is conducted among researchers from five government-funded research institutes in the field of science and technology and members of the GeoAI Data Society to confirm the awareness of data publishing. As a result of the study, domestic researchers recognized providing explanations for data, stable access to data, citation, and quality assurance through peer review as the advantages of data journals. On the contrary, a low level of recognition for data paper as one of the research outputs was presented. With regard to the properties of data publication, the respondents answered that the data description, metadata description, and permanent identifiers are highly related, however, their recognition of the relation between the properties of data publication and the data submission to a repository and data peer review was relatively low. Finally, to expand the data publication, the need for the development of an editorial system that supports data paper peer review and cross-linking to a data repository as well as the development of a repository that supports data citation was identified. This study on the domestic researchers' experience and awareness of data publishing can provide insights for the implementation of data publishing services and infrastructure in the future.

Forward Security Protection Protocol of RFID System using New Key Generation Method (새로운 키 생성 방법을 통한 RFID시스템의 전방위보안성 보호 프로토콜)

  • Cho Jung-Hwan;Cho Jung-Sik;Yeo Sang-Soo;Kim Sung kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.19-21
    • /
    • 2005
  • 현대의 산업화 사회에서는 자동인식을 통해서 사람과 사물을 식별하고자 하는 연구들이 진행되고 있다. 그 대표적인 예로 바코드를 이용한 접촉식 판별기술이 있고, 라디오 주파수를 이용한 RFID(Radio Frequency Identification) 기술을 들 수 있다. RFID의 경우는 무선 주파수를 이용하기 때문에 대량의 사물을 동시에 인식 할 수 있다는 장점이 있다. 하지만. 어떠한 상황에서 리더의 요청에 응답을 하는 리더-태그 시스템이기 때문에 사용자의 프라이버시 침해 문제를 야기 할 수 있다. 사용자의 프라이버시 침해문제를 막기 위해서 많은 연구들이 진행되고 있다. 그 중에서, Miyako Ohkubo의 Hash체인을 이용한 프라이버시 보호 기법은 정보유출, 위치추적공격(Location Tracking Attack), 전방위보안성(Forward Security)과 같은 프라이버시 침해문제들로부터 사용자의 프라이버시를 보호 할 수 있는 프로토콜이다. 그러나 Hash함수를 태그에 구현하는 것은 현재까지는 불가능한 상황이다. 또, Martin Feldhofer의 AES(Advanced Encryption Standard)를 사용한 프로토콜은 실제로 태그에 구현 가능하면서 내부구조가 8bit인 AES를 사용함으로써 암호학적인 강도를 높였으나, 프라이버시 침해 문제에서 단점을 드러냈다. 이러한 단점을 보완한 AES기반에서의 개선된 RFID 프라이버시 보호 프로토콜은 실제적으로 태그에 구현 가능한 AES를 이용한 암호화 체인을 통해서 프라이버시 보호에 우수하면서 실제 사용이 가능한 프로토콜을 제안하였다[1]. 그러나, 이 프로토콜은 생성되는 키 값들이 물리적 공격을 통해서 노출이 되었을 때, 이전의 seed값과 키 값들이 노출 되는 단점이 있다. 본 논문에서는 이러한 문제들을 해결하고자 프라이버시보호에 새로운 키 생성 방법을 통한 강력한 프로토콜을 제안 한다.하였으나 사료효율은 증진시켰으며, 후자(사양, 사료)와의 상호작용은 나타나지 않았다. 이상의 결과는 거세비육돈에서 1) androgen과 estrogen은 공히 자발적인 사료섭취와 등지방 침적을 억제하고 IGF-I 분비를 증가시키며, 2) 성선스테로이드호르몬의 이 같은 성장에 미치는 효과의 일부는 IGF-I을 통해 매개될 수도 있을을 시사한다. 약 $70 {\~} 90\%$의 phenoxyethanol이 유상에 존재하였다. 또한, 미생물에 대한 항균력도 phenoxyethanol이 수상에 많이 존재할수록 증가하는 경향을 나타내었다. 따라서, 제형 내 oil tomposition을 변화시킴으로써 phenoxyethanol의 사용량을 줄일 수 있을 뿐만 아니라, 피부 투과를 감소시켜 보다 피부 자극이 적은 저자극 방부시스템 개발이 가능하리라 보여 진다. 첨가하여 제조한 curd yoghurt는 저장성과 관능적인 면에서 우수한 상품적 가치가 인정되는 새로운 기능성 신제품의 개발에 기여할 수 있을 것으로 사료되었다. 여자의 경우 0.8이상이 되어서 심혈관계 질환의 위험 범위에 속하는 수준이었다. 삼두근의 두겹 두께는 남녀 각각 $20.2\pm8.58cm,\;22.2\pm4.40mm$으로 남녀간에 유의한 차이는 없었다. 조사대상자의 식습관 상태는 전체 대상자의 $84.4\%$가 대부분이 하루 세끼 식사를 규칙적으로 하고 있었으며 식사속도는 허겁지겁 빨리 섭취하는 경우가 남자는 $31.0\%$, 여자는 $21.4\%$로 나타났고 이들을 제외한 나머지 사람들은 보통 속도 혹은 충분한 시간을 가지고 식사를 하였다. 평소 식사량은 조금 적게 혹은 적당하게 섭취하는 사람이 대부분이었으며 남자가 여자보다는 배부르게 먹는 경 향이 유의적으로 높았다(p<0.05). 식사는 혼자 하는 경우가 남자

  • PDF

A Design of Passenger Detection and Sharing System(PDSS) to support the Driving ( Decision ) of an Autonomous Vehicles (자율차량의 주행을 보조하기 위한 탑승객 탐지 및 공유 시스템 개발)

  • Son, Su-Rak;Lee, Byung-Kwan;Sim, Son-Kweon;Jeong, Yi-Na
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.2
    • /
    • pp.138-144
    • /
    • 2020
  • Currently, an autonomous vehicle studies are working to develop a four-level autonomous vehicle that can cope with emergencies. In order to flexibly respond to an emergency, the autonomous vehicle must move in a direction to minimize the damage, which must be conducted by judging all the states of the road, such as the surrounding pedestrians, road conditions, and surrounding vehicle conditions. Therefore, in this paper, we suggest a passenger detection and sharing system to detect the passenger situation inside the autonomous vehicle and share it with V2V to the surrounding vehicles to assist in the operation of the autonomous vehicle. Passenger detection and sharing system improve the weighting method that recognizes passengers in the current vehicle to identify the passenger's position accurately inside the vehicle, and shares the passenger's position of each vehicle with other vehicles around it in case of emergency. So, it can help determine the driving of a vehicle. As a result of the experiment, the body pressure sensor applied to the passenger recognition sub-module showed about 8% higher accuracy than the conventional resonant sensor and about 17% higher than the piezoelectric sensor.

A Method to Manage Faults in SOA using Autonomic Computing (자율 컴퓨팅을 적용한 SOA 서비스 결함 관리 기법)

  • Cheun, Du-Wan;Lee, Jae-Yoo;La, Hyun-Jung;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.12
    • /
    • pp.716-730
    • /
    • 2008
  • In Service-Oriented Architecture (SOA), service providers develop and deploy reusable services on the repositories, and service consumers utilize blackbox form of services through their interfaces. Services are also highly evolvable and often heterogeneous. Due to these characteristics of the service, it is hard to manage the faults if faults occur on the services. Autonomic Computing (AC) is a way of designing systems which can manage themselves without direct human intervention. Applying the key disciplines of AC to service management is appealing since key technical issues for service management can be effectively resolved by AC. In this paper, we present a theoretical model, Symptom-Cause-Actuator (SCA), to enable autonomous service fault management in SOA. We derive SCA model from our rigorous observation on how physicians treat patients. In this paper, we first define a five-phase computing model and meta-model of SCA. And, we define a schema of SCA profile, which contains instances of symptoms, causes, actuators and their dependency values in a machine readable form. Then, we present detailed algorithms for the five phases that are used to manage faults the services. To show the applicability of our approach, we demonstrate the result of our case study for the domain of 'Flight Ticket Management Services'.

Provision of a Novel Unlicensed Access Relay Station in IEEE 802.16-based Broadband Wireless Access Networks (IEEE 802.16 기반의 무선 액세스 망에서 Unlicensed 대역 액세스 릴레이에 대한 설계)

  • Choi, W.;Shon, T.S.;Choi, H.H.;Lee, Y.
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.169-177
    • /
    • 2007
  • Existing wireless access (mobile) routers are based commonly on the network address and port translation (NAPT) technique which permits simultaneously sharing a subscriber's connection to the network with multiple users. However, the NAPT architecturally makes the users invisible on the network side, thus becoming a user-oriented connection technique. In this paper, we propose a novel service provider-oriented unlicensed nomadic access relay station (WiNNERS) for helping wireless broadband network service providers to make their business more lucrative by accommdating unlicensed band users as subscribers into their network. The WiNNERS offers service providers the capability to directly manage each of the unlicensed band users at the network side. This direct management allows the service providers to flexibly and simply handle QoS, access control, and billing for each user. In order to distinguish each of the unlicensed band users the WiNNERS constructs a virtual tunnel from each user's terminal to the network access router using connection identifiers which is defined for service flow management within the WiBro system, Consequently, our proposed service provider-oriented relay station can be included into the WiBro network system with minimum modifications.

Facial Expression Training Digital Therapeutics for Autistic Children (자폐아를 위한 표정 훈련 디지털 치료제)

  • Jiyeon Park;Kyoung Won Lee;Seong Yong Ohm
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.581-586
    • /
    • 2023
  • Recently a drama that features a lawyer with autism spectrum disorder has attracted a lot of attention, raising interest in the difficulties faced by people with autism spectrum disorders. If the Autism spectrum gets detected early and proper education and treatment, the prognosis can be improved, so the development of the treatment is urgently needed. Drugs currently used to treat autism spectrum often have side effects, so Digital Therapeutics that have no side effects and can be supplied in large quantities are drawing attention. In this paper, we introduce 'AEmotion', an application and a Digital Therapeutic that provides emotion and facial expression learning for toddlers with an autism spectrum disorder. This system is developed as an application for smartphones to increase interest in training autistic children and to test easily. Using machine learning, this system consists of three main stages: an 'emotion learning' step to learn emotions with facial expression cards, an 'emotion identification' step to check if the user understood emotions and facial expressions properly, and an 'expression training' step to make appropriate facial expressions. Through this system, it is expected that it will help autistic toddlers who have difficulties with social interactions by having problems recognizing facial expressions and emotions.

The Study on the Metadata Elements to Develop KORMARC Datafield for Archives (기록물용 KORMARC 데이터필드 개발을 위한 메타데이터 요소에 관한 연구)

  • Park, Jin-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.3 s.57
    • /
    • pp.351-378
    • /
    • 2005
  • The study intended to develop KORMARC for archives in order to integrate archives with library materials. The results of the study can be summarized as follows; (1) 2 areas for conservation and physical description are added to the existing 7 areas of ISAD(G)2. The study has also proved that the existing 26 elements of ISAD(G)2 are not fully enough to satisfy the information demands' of institutions and its users as well. (2) For the use of domestic archives in particular, the study has added the description elements of archives that appeared in the Government Regulations of Office Management and those forms of documents that are specified by law for the sake of computerization. The study has added the possible release and grade, release dates, release range, conservation periods, conservation periods, conservation value, the status description of archives elements that are specified in Public Record Management Law. (3) The study has developed the following data fields to be added into KORMARC. 512 creation dates note, 555 finding aids note, 583 action note and 584 accumulation note. Also it reorganizes and adds the indicators of the 245 title statement, 300 physical description 306 playing time, 506 restriction on access note, 534 original version note, 535 location of originals/duplicates note, 540 terms governing use and reproduction notes, 541 immediate source of acquisition note, 545 biographical or historical note, 581 publication note, 850 holding institution data fields.

Contactless Fingerprint Recognition Based on LDP (LDP 기반 비접촉식 지문 인식)

  • Kang, Byung-Jun;Park, Kang-Ryoung;Yoo, Jang-Hee;Moon, Ki-Young;Kim, Jeong-Nyeo;Shin, Jae-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.9
    • /
    • pp.1337-1347
    • /
    • 2010
  • Fingerprint recognition is a biometric technology to identify individual by using fingerprint features such ridges and valleys. Most fingerprint systems perform the recognition based on minutiae points after acquiring a fingerprint image from contact type sensor. They have an advantage of acquiring a clear image of uniform size by touching finger on the sensor. However, they have the problems of the image quality can be reduced in case of severely dry or wet finger due to the variations of touching pressure and latent fingerprint on the sensor. To solve these problems, the contactless capturing devices for a fingerprint image was introduced in previous works. However, the accuracy of detecting minutiae points and recognition performance are reduced due to the degradation of image quality by the illumination variation. So, this paper proposes a new LDP-based fingerprint recognition method. It can effectively extract fingerprint patterns of iterative ridges and valleys. After producing histograms of the binary codes which are extracted by the LDP method, chi square distance between the enrolled and input feature histograms is calculated. The calculated chi square distance is used as the score of fingerprint recognition. As the experimental results, the EER of the proposed approach is reduced by 0.521% in comparison with that of the previous LBP-based fingerprint recognition approach.

Cybersecurity Architecture for Reliable Smart Factory (신뢰성 있는 스마트팩토리를 위한 사이버보안 아키텍처)

  • Kim, HyunJin;Kim, SungJin;Kim, Yesol;Kim, Sinkyu;Shon, TaeShik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.629-643
    • /
    • 2019
  • In the era of the 4th industrial revolution, countries around the world are conducting projects to rapidly expand smart factory to secure competitiveness in manufacturing industries. However, unlike existing factories where the network environment was closed, smart factories can be vulnerable because internal and external objects are interconnected and various ICT technologies are used. And smart factories are likely to be the subject of cyber-attacks that are designed to cause monetary damage to certain targets because economic damage is so serious when an accident occurs. Therefore, it is necessary to study and apply security for smart factories, but there is no specific smart factory system architecture, so there is no establish for smart factory security requirements. In order to solve these problems, this paper derives the smart factory architecture that can extract and reflect the main characteristics of a smart factory based on the domestic and foreign reference model of smart factories. And this paper identifies the security threats based on the derived smart factory architecture and present the security requirements to cope with them for contributing to the improvement of the security of the smart factory.